Daily Archives: January 20, 2015

Warning Sony of Coming Storm Wasn't NSA's Department

Posted: January 20, 2015 at 12:49 am

The United States National Security Agency knew in advance that North Korea was about to hack into Sony's systems, according to The New York Times.

The NSA apparently penetrated North Korea's network through several vectors, including Chinese networks used to connect with the rest of the world and hacker connections in Malaysia. The NSA was able to burrow in using the networks of South Korea and other allies.

Leveraging the South Korean network was referenced in this now-unclassified NSA document published by Der Spiegel.

The evidence gathered by the NSA reportedly spurred President Obama's accusation that North Korea was behind last year's cyberattacks on Sony.

The report triggered a media storm and drew a wide gamut of responses from readers.

"I wonder if perhaps the NSA did get wind of the planned attack but deliberately withheld that info from Sony because it, the NSA, feared that Sony might react by tightening its security, thereby tipping off NK that the NSA knew what it was up to," mused archer717. "I'll bet Sony's execs are asking themselves just that question as they read this article."

Several expressed support for the NSA's monitoring North Korea's systems.

For example, "I'm very glad the U.S. has the capability to monitor these rogue actors," Tim wrote, pointing out that the NSA's stated mission is collecting foreign signals intelligence to prevent strategic surprises.

On the other hand, many, like Phil Green, argued that the U.S.' own hands are not clean.

"You always figure that, when the U.S. accuses another nation of bad behavior, that the U.S. has done the very act complained of," Green suggested. "We hacked Iran's and Brazil's oil companies and invaded the privacy of everyone on Earth long before we were caught, but not before we had accused others of doing what we do best and more of than anyone else."

See more here:
Warning Sony of Coming Storm Wasn't NSA's Department

Posted in NSA | Comments Off on Warning Sony of Coming Storm Wasn't NSA's Department

NSA: We're in YOUR BOTNET

Posted: at 12:49 am

The NSA quietly commandeered a botnet targeting US Defence agencies to attack other victims including Chinese and Vietnamese dissidents, Snowden documents reveal.

The allegation is among the latest in a cache of revelations dropped by Der Spiegel that revealed more about the spy agency.

The "Boxingrumble" botnet was detected targeting the Defence Department's Nonsecure Internet Protocol Router Network prompting NSA bods to redirect the attack to a server operated by the Tailored Access Operations unit.

A DNS spoofing attack tricked the botnet into treating the spies as trusted command and control agents. The NSA then used the bot's hooks into other victims to foist its own custom malware.

Much of the bot-hijacking attacks dubbed "Quantumbot" by the NSA was conducted under its operation DEFIANT WARRIOR which utilised XKeyscore and infrastructure of Five Eyes allies including Australia, New Zealand, the UK and Canada to identify foreign bots ripe for attack.

The work granted broader network exploitation, attack and vantage points, NSA Power Point slides revealed (pdf).

It was part of what appeared to be the NSA's dream of having "a botnet upon which the sun never sets", a goal noted under the slide title "if wishes were ponies".

Bots found in the US would be referred to the FBI for cleansing, but infected victims in other countries were considered collateral.

The documents also revealed the NSA's Tutelage program (pdf), a sister to Turmoil and part of the Turbulence family of surveillance and exploitation kit, was used to block distributed denial of service (DoS) attacks by the Anonymous collective.

Tutelage was successful in identifying and blocking internet protocol addresses linked to the Low Orbit Ion Cannon DDoS software when US Defence agencies were attacked.

More:
NSA: We're in YOUR BOTNET

Posted in NSA | Comments Off on NSA: We're in YOUR BOTNET

COPWATCH: Illegal Search Officers Find Nothing – Video

Posted: at 12:49 am


COPWATCH: Illegal Search Officers Find Nothing
This was one of two illegal searches I witnessed that were conducted not much more than 100 yards apart from each other. There is no such thing as a fourth amendment in DeKalb, IL.

By: Ryan Scott

See the original post:
COPWATCH: Illegal Search Officers Find Nothing - Video

Posted in Fourth Amendment | Comments Off on COPWATCH: Illegal Search Officers Find Nothing – Video

How the 2014 Elections Were a Second Amendment Success – Video

Posted: at 12:49 am


How the 2014 Elections Were a Second Amendment Success
Townhall #39;s Katie Pavlich explains how more Americans than ever are exercising their Second Amendment right to keep and bear arms in 2015.

By: Townhall Media

Read more:
How the 2014 Elections Were a Second Amendment Success - Video

Posted in Second Amendment | Comments Off on How the 2014 Elections Were a Second Amendment Success – Video

The Making Of The Twenty Second Amendment Part 2 – Video

Posted: at 12:49 am


The Making Of The Twenty Second Amendment Part 2
Think. Create. Inspire. Relax. Become.

By: LPTrax

Read more:
The Making Of The Twenty Second Amendment Part 2 - Video

Posted in Second Amendment | Comments Off on The Making Of The Twenty Second Amendment Part 2 – Video

The Making Of The Twenty First Amendment Part 9 – Video

Posted: at 12:48 am


The Making Of The Twenty First Amendment Part 9
Think. Create. Inspire. Relax. Become.

By: LPTrax

Read the rest here:
The Making Of The Twenty First Amendment Part 9 - Video

Posted in First Amendment | Comments Off on The Making Of The Twenty First Amendment Part 9 – Video

The Making Of The Twenty First Amendment Part 7 – Video

Posted: at 12:48 am


The Making Of The Twenty First Amendment Part 7
Think. Create. Inspire. Relax. Become.

By: LPTrax

Go here to see the original:
The Making Of The Twenty First Amendment Part 7 - Video

Posted in First Amendment | Comments Off on The Making Of The Twenty First Amendment Part 7 – Video

Silk Road Judge: Tor Browser Is "Mumbo-Jumbo To Most People On The Jury Right Now"

Posted: at 12:48 am

Illustrations by Susie Cagle.

The Silk Road trial is a high-tech case of nearly inscrutable levels, and prosecutors are grappling with the burden of having to explain cryptographic technologies to a jury whose demographics lean away from technological sophistication. As Judge Katherine Forrest explained to them on Tuesday, the jury need not have any technical expertise to rule on the issues at trial, since everything they need ought to be presented to them in court. But the prosecutionalthough not for lack of effortseems to be falling short of making sense to the jurors.

In a conference with the attorneys on Wednesday, before the jury entered the courtroom, Judge Forrest complained about the prosecutions explanation of Tor. What [the Tor Browser] is, I think, is mumbo-jumbo to most people on the jury right now. theres room for clarity, here.

Quite early on in the pre-trial process, the judge had asked for the two sides to come up with a glossary of technical terms. But in the end, the prosecution and the defense could not reach an agreement on how the terms should be defined. Although the exact substance and the extent of their disagreement is yet unknown, the filings do show that they often sparred over whether to characterize Bitcoin as a currency (a term favored by the prosecution) or as a payments system (favored by Ross Ulbrichts defense). Another point of contention may have been how to characterize Tor. In the opening statements, the prosecution repeatedly referred to the Tor-hidden service Silk Road as a dark and secret part of the Internet, whereas the defense pointedly mentioned that Tor had actually been developed by the U.S. government for legitimate means.

Only three days have passed and the jury has already been barraged with detailed technical explanations of a dizzying array of cryptographic technologies: Tor, PGP, Bitcoin. The run-downs of these technologies have been interspersed with nearly comical explanations of far more basic elements of the Internethow forum posts work, the difference between forum posts and direct messages, what the Internet Archive is, and the concept of a wiki.

With respect to the last, at one point, the prosecutor asked his first witness, a DHS agent, What is a wiki? The witness began his answer with, Its, uh, its like Wikipedia.

Illustration by Susie Cagle.

For the most part, the prosecutions explanations have been thorough, detailed, and technically correct. Explanations have often been accompanied by exhibits that can only be described as tutorial videos, where Jared Der-Yeghaiyan, the aforementioned DHS agent, walked the jury step by step through how to use Tor, how to track Bitcoin transactions on blockchain.info, and how to encrypt e-mails with PGP. Nonetheless, the prosecution is up against a difficult task: hosting a crypto-party for a group that never asked to be in the room in the first place.

Original post:
Silk Road Judge: Tor Browser Is "Mumbo-Jumbo To Most People On The Jury Right Now"

Posted in Tor Browser | Comments Off on Silk Road Judge: Tor Browser Is "Mumbo-Jumbo To Most People On The Jury Right Now"

InnocentCryptoKitty 012 Music VideoMix Liberty Berlin DCBP CCBP Bitcoin CryptoCurrency P2P Startup – Video

Posted: at 12:48 am


InnocentCryptoKitty 012 Music VideoMix Liberty Berlin DCBP CCBP Bitcoin CryptoCurrency P2P Startup
http://www.twitter.com/VanosEnigmA http://www.facebook.com/VanosEnigma http://www.twitter.com/CryptoEEV Thank you mucho meow for your donation: Bitcoin Address: 1FJ9ZZcnKqhiiYWNh...

By: VanosEnigmA Enigmaisland

See original here:
InnocentCryptoKitty 012 Music VideoMix Liberty Berlin DCBP CCBP Bitcoin CryptoCurrency P2P Startup - Video

Posted in Cryptocurrency | Comments Off on InnocentCryptoKitty 012 Music VideoMix Liberty Berlin DCBP CCBP Bitcoin CryptoCurrency P2P Startup – Video

Vogogo offers free fraud and risk service to cryptocurrency firms

Posted: at 12:48 am

Summary:Vogogo services are being offering for free following a year of cyberattacks against the cryptocurrency industry.

Vogogo's fraud and risk mitigation service is being released as a stand-alone system to help cryptocurrency companies protect themselves against rising rates of cyberattack.

Announced on Monday, the cryptocurrency payment processing and fraud mitigation company said that high demand prompted the release of the service for free, in both use and integration. In the current threat landscape, it is more important than ever that the enterprise invest in cybersecurity measures -- and the crypto industry is no exception.

In recent times, to name but a few, Mt. Gox, Bitfloor and Bitstamp have all been reportedly the victims of cyberattacks. Hackers are able to hijack mining pools or break into a virtual currency exchange's hot wallet system to steal funds, and unfortunately, many exchanges either close or do not have enough funds left in cold storage to compensate traders.

See also: Police suspect Mt. Gox Bitcoin theft was an inside job

Vogogo, which works with companies including CoinTrader, ANXPro, Rock Trading, QuadrigaCX and BitMEX, offers a fraud and risk mitigation service which validates large volumes of high-risk payment transactions. Each separate individual or business involved in a transaction is verified -- as well as each individual transaction itself -- before being processed.

Vogogo CEO Geoff Gordon commented:

It's also frustrating as we believe these types of sophisticated fraud events can be effectively prevented with the right systems in place. Therefore, we have elected to open up our fraud and risk mitigation services to crypto-based businesses, worldwide, free of cost."

Vogogo's chief revenue officer Rodney Thompson said that the decision to open up Vogogo's service was not only to help combat fraud, but to educate players within the fledgling industry on how to manage overall fraud levels and risk.

The offer allows any crypto-based firm free integration and use of the platform for a minimum of three months for free.

See original here:
Vogogo offers free fraud and risk service to cryptocurrency firms

Posted in Cryptocurrency | Comments Off on Vogogo offers free fraud and risk service to cryptocurrency firms