Archive for the ‘CyberChaos’ Category

How to use electrical outlets and cheap lasers to steal data

Sunday, August 16th, 2009

If attackers intent on data theft can tap into an electrical socket near a computer or if they can draw a bead on the machine with a laser, they can steal whatever is being typed into it.

How to execute these attacks will be demonstrated at the Black Hat USA 2009 security conference in Las Vegas later this month by Andrea Barisani and Daniele Bianco, a pair of researchers for network security consultancy Inverse Path.

“The only thing you need for successful attacks are either the electrical grid or a distant line of sight, no expensive piece of equipment is required,” Barisani and Bianco say in a paper describing the hacks.

More…

Hacker intrusion on US power grid sparks security fears

Wednesday, April 8th, 2009

“The severity of what we’re seeing is off the charts,” said Tom Kellermann, vice president of security awareness for Core Security Technologies and a member of the Commission on Cyber Security that is advising President Barack Obama.

“Most of the critical infrastructure in the US has been penetrated to the root by state actors.”

SAN JOSE, California – Spies hacked into the US electric grid and left behind computer programmes that would let them disrupt service, exposing potentially catastrophic vulnerabilities in key pieces of national infrastructure, The Associated Press has learned.

The intrusions were discovered after electric companies gave the government permission to audit their systems, a former US government official told the AP. The ex-official was not authorised to discuss the matter and spoke on condition of anonymity.One possible future

The inspections of the electric grid were triggered by fears over a March 2007 video from the Idaho National Laboratory, which had staged a demonstration of what damage hackers could do if they seized control of a crucial part of the electric grid. The video showed a power turbine spinning out of control until it became a smoking hulk and shut down.

Although the resulting audits turned up evidence of spying, the former official told the AP that the extent of the problem is unknown, because the government does not have blanket authority to examine other electric systems.

“The vulnerability may be bigger than we think,” the official said, adding that the level of sophistication necessary to pull off such intrusions is so high that it is “almost without a doubt” done by state sponsors.

The Wall Street Journal, which reported the intrusions earlier, said officials believe the spies have not yet sought to damage the nation’s electric grid, but that they likely would try in a war or another crisis.

More…

UK police get power to hack into PCs

Tuesday, January 13th, 2009

LONDON – Police have been given the power to hack into personal computers without a court warrant.

The Home Office is facing anger and the threat of a legal challenge after granting permission. Ministers are also drawing up plans to allow police across the European Union to collect information from computers in Britain.

The moves will fuel claims that the Government is presiding over a steady extension of the “surveillance society” threatening personal privacy.

Hacking – known as “remote searching” – has been quietly adopted by police across Britain since the development of technology to access computers’ contents at a distance. Police say it is vital for tracking cyber-criminals and paedophiles and is used sparingly but civil liberties groups fear it is about to be vastly expanded.

More…

– Hat tip to Cryptogon

Trojan virus steals banking info

Thursday, November 6th, 2008

The details of about 500,000 online bank accounts and credit and debit cards have been stolen by a virus described as “one of the most advanced pieces of crimeware ever created”.

The Sinowal trojan has been tracked by RSA, which helps to secure networks in Fortune 500 companies.

RSA said the trojan virus has infected computers all over the planet.

“The effect has been really global with over 2000 domains compromised,” said Sean Brady of RSA’s security division.

He told the BBC: “This is a serious incident on a very noticeable scale and we have seen an increase in the number of trojans and their variants, particularly in the States and Canada.”

The RSA’s Fraud Action Research Lab said it first detected the Windows Sinowal trojan in Feb 2006.

Since then, Mr Brady said, more than 270,000 banking accounts and 240,000 credit and debit cards have been compromised from financial institutions in countries including the US, UK, Australia and Poland.

Security companies recommend that PC owners keep anti-virus programs up to date and regularly scan their machine for malicious software.

The lab said no Russian accounts were hit by Sinowal.

“Drive-by downloads”

RSA described Sinowal as “one of the most serious threats to anyone with an internet connection” because it works behind the scenes using a common infection method known as “drive-by downloads”.”

Users can get infected without knowing if they visit a website that has been booby-trapped with the Sinowal malicious code.

More…

US Announces Revised Plan for National ID Cards

Saturday, January 12th, 2008

– I’m not sure how I feel about this.

– In a perfect world where the laws were fair and the government was truly a representative democracy of the people, by the people and for the people, this might not be a bad idea. I’m thinking here of the idea that if one has nothing to hide, why should one care.

…and that government of the people, by the people, for the people, shall not perish from the earth.

Abraham Lincoln – The Gettysburg Address

– But, other than for idiots and ungrounded idealists, most of us know that’s not the world we live in and things are often made for one stated purpose – and then used for quite another.

– I just finished reading most of a biography about Benito Mussolini by Bosworth. It was a huge tomb; four inches thick. In it, you could see all the things said along the way by the main players as Italy lurched towards Fascism. And what the main players were saying they believed in was inevitably a function of what they thought gave them the best advantage within the current situation. And what they told the people was always what would make the people support them. Mussolini himself began as a rabid Socialist and anti-Church activist and ended persecuting Socialists and being quite cozy with the Vatican. He began as a man of the people and ended up deeply allied with the conservative forces with money in Italy.

– So, in a world where we don’t trust our leaders, we need (just as the U.S.’s founding fathers thought) to possess the means to oppose central authority if it becomes unrepresentative and oppressive. In the U.S., the very bedrock of how the government was originally constituted involved the idea that all citizens should be able to retain weapons in their own homes as a check on possibility of authority gone wrong.

– But when all weapons need to be registered with central authorities and when all people have to carry centralized identity cards, one can feel the chipping away at this ability of the people to provide a check on their government. And it seems it is the governemt that is doing the chipping.

– Does anyone recall a popular movement among the American people in support of National Identity Cards? Mmmm? Nope, I don’t either.

– But, read on good reader and see what you think. Comments welcome.

= = = = = = = = = = = = = = = = = = = = =

By VOA News
11 January 2008

The U.S. Department of Homeland Security has released a revised plan for phasing in a national identification card program that was set to begin this year.

The department has extended deadlines and made other changes to address the concerns of states about the cost and timeframe for compliance.

Passed by the U.S. Congress in 2005, the Real ID Act establishes national standards for driver’s licenses and other state-issued identification cards. The aim is to make it harder for terrorists, illegal immigrants and others to obtain or counterfeit identity documents.

At a news conference Friday in Washington, Homeland Security Secretary Michael Chertoff said the phased-in program gives states greater flexibility in implementing it.

Under the new timetable, people under the age of 50 must be issued Real ID – compliant identification cards by the end of 2014. For people over 50, enrollment may be extended to the end of 2017.

The new ID cards will be needed for boarding a plane or entering a federal building.

The original program was rejected by 17 states in part because it was expensive. But the cost of the new plan has been reduced by more than 70 percent – from $14.6 billion to $3.9 billion. Chertoff estimates it will cost states about eight dollars to make a Real ID license.

Lawmakers called for stricter identification requirements after the September 11, 2001 terrorist attacks. The Department of Homeland Security points out that the hijackers in those attacks obtained 30 drivers licenses and used 364 aliases.

But critics argue the ID program could put at risk the privacy of citizens, saying it creates a database of personal information that could be hacked into or otherwise compromised.

To the original…

– research thx to LisaG.

Electronic Voting Machines – a major danger to American democracy

Saturday, July 28th, 2007

– Well, I thought I wasn’t going to post anymore until I returned from our trip but when I saw the juxtaposition of these two stories, I just had to sit down and write a bit more.

– First, we have the story that the democrats in the Senate, lead by Sen. Dianne Feinstein (D-Calif.), have backed away from requiring all states to employ so-called voter-verified paper records in their systems – even though earlier this year, she called for enacting such changes by 2008.

– Then, next, we have news in from the San Francisco Chronicle which is reporting that computer security researchers throughout the University of California system managed to crack the security on every voting machine they tested that has been approved for use in the state.

– Yeah. If you aren’t concerned yet, take a cruise through these earlier stories I posted on this topic: , , , , , , , , ,

– This is a serious problem, folks. If you are still not sure, ask an expert computer programmer what the chances are that voting machines without verification trails can be hacked.

– I’ve listed this post under “The Perfect Storm”, “Capitalism & Corporations” and “CrashBlogging” because the same urges which cause Capitalism and corporations to be about profits and not people, are also behind the efforts to corrupt our voting systems so that folks can attain power by stealth that they could not attain through a fair ballot box.

Amnesty Charges Web Companies

Thursday, July 20th, 2006

I’m not sure what category to put this item under. It fits ‘Politics – How not to do it’ if you consider what the Chinese authorities are doing. But, on the other hand, it fits ‘Politics – As it should be’ if you focus on what Amnesty is advocating here. And, finaly, if you think about what Microsoft, Yahoo and Google are doing by bending to the Chinese authorities for the sake of money – then I don’t think I have a category to hold that though perhaps I should. Read it for yourself and you decide.

Associated Press 07:34 AM Jul, 20, 2006

BEIJING — Amnesty International accused Yahoo, Microsoft and Google on Thursday of violating human rights principles by cooperating with China’s efforts to censor the web and called on them to lobby for the release of jailed cyber-dissidents.

The London-based human rights group also called on the internet companies to publicly oppose Chinese government requests that violate human rights standards.

“The internet should promote free speech, not restrict it. We have to guard against the creation of two internets — one for expression and one for repression,” said Larry Cox, executive director of Amnesty’s U.S. branch, in a statement.

The companies “have violated their stated corporate values and policies” in their pursuit of China’s booming internet market, the statement said. It appealed to them to “call for the release of ‘cyber-dissidents.'”

More…