Showing posts sorted by relevance for query UK Government. Sort by date Show all posts
Showing posts sorted by relevance for query UK Government. Sort by date Show all posts

Anonymous Engaged Cyber Attack To Bring Down British Prime Minister’s Office, Home Office & Ministry of Justice

Anonymous Engaged Massive Cyber Attack To Bring Down British Prime Minister’s Office, Home Office & Ministry of Justice 
 
One of the official twitter account of hacker collective Anonymous warned that they will engage cyber attack against the Govt of UK on 4th of April. The tweet said:- "EXPECT a DDOS (Distributed Denial of Service) every Saturday on the UK Government sites." As expected it happens hacktivist performs massive denial of service attacks multiple U.K. government websites over the country’s “draconian surveillance proposals” and “derogation of civil rights.” At the time of writing, the following websites are down: homeoffice.gov.uk (Home Office), number10.gov.uk (10 Downing Street - British Prime Minister’s Office), and justice.gov.uk (Ministry of Justice). A message on the site said the page was currently unavailable homeoffice.gov.uk "due to a high volume of traffic", suggesting a denial of service attack had been perpetrated. A message on Twitter claiming to be from Anonymous, a loosely organised group of hackers, said the action was "for your draconian surveillance proposals". The apparent attack came after it emerged last week that the Government was planning a massive expansion of its powers to monitor the email exchanges and website visits of every person in the UK. Under legislation expected in next month's Queen's Speech, internet companies will be instructed to install hardware enabling GCHQ - the Government's electronic "listening" agency - to examine "on demand" any phone call made, text message and email sent, and website accessed, in "real time" without a warrant.
A Home Office spokesman said: "We are aware of some reports that the Home Office website may be the subject of an online protest. We have put all potential measures in place and will be monitoring the situation very closely." The Home Office added that if a successful denial of service attempt did occur tonight, it would "liaise with the technical team and update as necessary".


-Source (The Huffington Post & BBC)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

UK Announces Plans for ‘Cyber Reserve’ Online Crime Defence Force

UK Govt. Announces Plans for ‘Cyber Reserve’ Online Crime Defense Force

Earlier this week, the UK government announced that it was planning on setting up a ‘cyber reserve’ force aimed at dealing with security threats brought about by online crime. The proposed force will be run by the country’s ministry of defense and is going to allow the armed forces to draw on the nation’s computer-related talents in order to ward off online attacks and stem the tides of cyber crime. Minister for the Cabinet Office Francis Maude claims that ‘critical’ work is required in order to combat online lawbreaking. He says that nine tenths of large British corporations and three quarters of small British businesses have reported experiencing a cyber breach within the last year, meaning that this force has now become a necessity.

Cyber Crime in the UK
Research conducted by a team of academics recruited by the UK Ministry of Defense earlier this year concluded that the country spends a billion US dollars per year on protecting against and cleaning up after instances of cyber crime. This includes the cost of measures taken to safeguard bank account security and reduce computer-related fraud, the money forked out by businesses purchasing anti-virus software and the cost of removing viruses from computers. In addition to criminals, terrorists and rogue states have also targeted computers in the UK, meaning that it is not difficult to see why the country would consider setting up such a force.

More Students Trained in Tackling Cyber Crime Needed
Maude has promised to make the UK one of the safest places in the world to conduct online business. He added that further details of the ‘cyber reserve’ plans would be revealed in 2013 and said that British government agencies and departments are working with professional bodies in order to ensure that the consideration of internet security becomes an integral component of corporate governance and the risk management process. He stated that UK officials want more students in the country trained in the skills required for tackling cyber crime and pointed out that the nation’s ministry of defense is examining new methods for attracting talented cyber security specialists, as they are required for critical areas of work.

Cyber-Spying by Hostile Nations
The UK Ministry of Defence’s announcement came in the wake of revelations that hostile foreign states had carried out ‘mapping’ of the systems that control the country’s power and water supplies. Officials refused to name the nations that were believed to have carried out this mapping but there have been reports in the United States that China and Russia have conducted similar reconnaissance exercises there, which suggests that they could be the countries that are responsible for this cyber-spying activity. With this in mind, it is little wonder the UK is stepping up its security, as it wishes to safeguard vital information.

Cyber Confidence Tracker
Francis Maude stated that the increasing number of threats posed to the UK’s online security is partly down to the growth of the internet economy. He said that the country’s government cannot take sole responsibility for fighting cyber crime and emphasized the fact that individuals and businesses would also have to play their part. Next spring the UK will be taking steps to improve online security for consumers and small businesses. The nation plans on launching a ‘cyber confidence tracker’, which will keep tabs on online behaviors and perceptions about internet security in an effort to ensure that the advise that they are delivering to the public about this subject is being conveyed in the best possible way.

Implications
It appears that the UK is now taking the threat of cyber attack extremely seriously, which it is wise to do considering the increasing trend of nations targeting the infrastructures of those that they are hostile towards via the internet. This is a sign that the web is becoming the new battleground in the international struggle for power. The full extent of the country’s plans for its ‘cyber reserve’ are not yet known. It is also questionable whether it will be used solely for defense purposes. Espionage is no longer dominated by spies being physically placed in another country. It is now evidently moving online, meaning that countries are being forced to adapt and develop cyber spies of their own.


Special article by 
Evelyn Anderson of International Business and Journalism
Guest Editor VOGH








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

GCHQ Awarded 8 UK Universities “Academic Centre of Excellence in Cyber Security Research”

GCHQ Awarded 8UK Universities “Academic Centre of Excellence in Cyber Security Research”
UK is putting more attention on cyber-security. Last Monday GCHQ, the UK's signals intelligence organisation, awarded eight UK universities the 'Academic Centre of Excellence in Cyber Security Research', laying the ground for deeper relationships between the institutions and the government agency. These top eight universities of UK will work closely with GCHQ as centres of excellence for cybersecurity research.
According to GCHQ official release:-
The first eight UK universities conducting world class research in the field of cyber security have been awarded “Academic Centre of Excellence in Cyber Security Research” status by GCHQ in partnership with the Research Councils’ Global Uncertainties Programme (RCUK) and the Department for Business Innovation and Skills (BIS). We hope other universities will also become Centres in the near future as part of an ongoing process.
The Centres of Excellence will benefit the UK by:
  • Enhancing the UK’s cyber knowledge base through original research
  • Providing top quality graduates in the field of cyber security
  • Supporting GCHQ’s cyber defence mission
  • Driving up the level of innovation
  • The Centres of Excellence will help make the UK government, business and consumers more resilient to cyber attack by extending knowledge and enhancing skills in cyber security.
The eight Universities chosen as Centres of Excellence in Cyber Security Research are:
  • University of Bristol    
  • Imperial College London
  • Lancaster University    
  • University of Oxford
  • Queen’s University Belfast    
  • Royal Holloway, University of London
  • University of Southampton    
  • University College London
These Centers will be the first to attain Academic Centre of Excellence in Cyber Security Research status and will benefit from:
  • Closer collaboration with GCHQ, the UK Cyber Community and industry
  • Partnership endorsement in associated publications and prospectuses
  • Better understanding of Government and industrial cyber issues
  • Helping to formulate the future Cyber Security research agenda
  • Extra funding opportunities and £50,000 capital investment
Francis Maude, the minister for cybersecurity, said "These first eight centers will play a vital role in boosting research, expanding our cyber skills base and fostering innovation in the field" He added "We want to make the UK one of the most secure places in the world to do business, by investing in the best expertise to keep pace with technological change." The centres will open for business on 1 July 2012 for five years, during which time GCHQ hopes other universities will beef up their cybersecurity capabilities to meet the criteria for being recognised as centres of excellence.


-Source (GCHQ)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Criminals and foreign spy agencies launched more than 1,000 cyber attacks on the MOD last year





Criminals and foreign spy agencies launched more than 1,000 cyber attacks on the Ministry of Defence last year in an effort to steal secrets and disrupt services, Liam Fox has revealed.
In a speech on Tuesday night, the defence secretary laid out the growing threat to the country from cyberspace, saying that government departments were now under sustained attack.
He underlined the problem by saying that "across the core defence networks there were an average of over a million security alerts every day".
These comprise mainly of spam emails that are blocked before entering government computer systems. But many turn out to be deliberate attempts to infiltrate and steal from the MoD's computer systems.
Last week the Guardian revealed that the UK is now developing a cyber weapons programme to give ministers an attacking capability in cyberspace.
It also emerged that the FBI is investigating allegations that the Google mail accounts of senior US government officials have been attacked by Chinese hackers.
In his speech, Fox set out why the government had committed an extra £650m for cyber security in last year's Strategic Defence and Security Review. He also warned more would need to be done to protect the UK's core infrastructure from cyber attack.
"Between 2009 and 2010, security incidents more than doubled," he said: "Was this in Afghanistan? No. This was in cyberspace and the target was the MoD. I and my senior colleagues are routinely alerted to incidents that could have had severe consequences if they'd not been stopped.
"Our systems are targeted by criminals, foreign intelligence services and other malicious actors seeking to exploit our people, corrupt our systems and steal information.

"To give you an idea of the challenge, last year we in the MoD blocked and investigated over 1,000 potentially serious attacks. "
Fox described it as the "war of the invisible enemy" and said the boundaries between government, business and every individual internet user were becoming blurred."This threat is growing in scale and sophistication. My department is a prime target. Across the core defence networks there were an average of over a million security alerts every day."
He said the opening of a new Global Operations and Security and Control Centre would help to coordinate the Whitehall response to cyber attacks, but conceded that government could not do this alone.
"We now see weekly reports of cyber attacks against businesses, institutions and networks used by people going about their daily lives," he said. "The cost to the UK economy of cyber crime is estimated to be in the region of £27bn a year and rising. These are attacks against the whole fabric of our society.
"There is no Maginot Line in cyber space ... our national intellectual property in defence and security industries is at risk from a systematic marauding. Not only could it severely affect the future success of British industry, our economic advantage, and the country's financial recovery, but also directly impacts upon our national security today."
Last week, the US government said it was intending to rewrite its military rule book to make cyber-attacks a possible act of war. In May, the chancellor George Osborne said foreign intelligence agencies were carrying out cyber-attacks on the Treasury, targeting it with programs designed to steal information.
Some experts have warned against government's over-exaggerating the problems in cyberspace, noting that 80 per cent of all such attacks can be thwarted with better computer 'hygiene' – such as people using less obvious passwords. 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Threatened to Target British Surveillance Agency GCHQ

Anonymous Threatened to Target  British Surveillance agency GCHQ
Few weeks ago Anonymous performed massive denial of service attack to bring down British Prime Minister’s Office, Home Office & Ministry of Justice. In that attack they have declared that such scenario will be repeated on every Saturday. Here again hacker collective Anonymous threatened to continue cyber attacks on government websites again this weekend, this time they are specially focusing in on British surveillance agency GCHQ. A member of the group made a statement via Twitter (@Anon_central). The planned assault come after a recent spate of DoS attacks on UK government websites over the past few weekends. The attacks are part of the group’s “Operation Trial At Home”, which is protesting against the UK government’s extradition treaties with the US, which it sees as unfair.
“#Anonymous #OpTrialAtHome Plan #DDoS on GCHQ on Saturday 21st April at 8pm BST & 3pm EDT,” Anonymous said in a tweet. “@AnonAteam is asking all Anons to fire lazers at http://ghcq.gov.uk.” It said it supports three British citizens involved in extradition to the US: Gary McKinnon, wanted for seven counts of hacking NASA and Pentagon computers; Richard O’Dwyer, alleged to have infringed copyright in the US and Christopher Tappin, wanted in the US for alleged arm dealing. 






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

British Spy Agency GCHQ Performed DDoS Attack Against Anonymous -Snowden Documents Transpired

British Spy Agency GCHQ Performed DDoS Attack Against Hacktivist Anonymous & LulzSec -Snowden Documents Transpired
While excavating the past, it was always found that cyber criminals, large hacker collective groups were the culprits for engaging voluminous denial of service attack. But this widely transfusing story get a one eighty degree reverse turn, when the former NSA contractor Edward Snowden revealed another trade secret. Recently a lurid story get spot lighted, as the whistle blower Snowden unfold yet another breathtaking stealthy  documents taken from the National Security Agency. The clandestine documents taken the mask from the so called good guys, unveiling British spy agency GCHQ had launched a secret war against the infamous hacktivist collective Anonymous and a splinter group known as LulzSec several years ago. Many of you guessed right, this was happened when Anonymous were targeting various UK companies and government websites. The documents disclose that GCHQ carried out seemingly illegal DDoS attacks against the collective, flooding their chatrooms with so much traffic that they would become inaccessible – and all with the approval of the British government. The revelations come less than a year after several LulzSec activists were jailed by a British court for carrying out similar DDoS attacks against targets including the CIA, the UK’s Serious Organized Crime Agency (SOCA), News International, Sony and the Westboro Baptist Church, among others. 
This sensational issue was made public by NBC News deferentially with the help of none other than Edward Snowden. In their exclusive report headed 'War on Anonymous: British Spies Attacked Hackers,' NBC said -The blunt instrument the spy unit used to target hackers, however, also interrupted the web communications of political dissidents who did not engage in any illegal hacking. It may also have shut down websites with no connection to Anonymous. According to the documents, a division of Government Communications Headquarters (GCHQ), the British counterpart of the NSA, shut down communications among Anonymous hacktivists by launching a “denial of service” (DDOS) attack – the same technique hackers use to take down bank, retail and government websites – making the British government the first Western government known to have conducted such an attack.
The documents, from a PowerPoint presentation prepared for a 2012 NSA conference called SIGDEV, show that the unit known as the Joint Threat Research Intelligence Group, or JTRIG, boasted of using the DDOS attack – which it dubbed Rolling Thunder -- and other techniques to scare away 80 percent of the users of Anonymous internet chat rooms. 
The existence of JTRIG has never been previously disclosed publicly. The documents also show that JTRIG infiltrated chat rooms known as IRCs and identified individual hackers who had taken confidential information from websites. In one case JTRIG helped send a hacktivist to prison for stealing data from PayPal, and in another it helped identify hacktivists who attacked government websites. 
As soon as this story getting all the spot lights, immediately the GCHQ responded to this saying all their movements and operations were lawful“All of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensure[s] that our activities are authorized, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All of our operational processes rigorously support this position.” -GCHQ said the press. To know more detail about this story, don't forget to stay tuned with VOGH



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

UK Cops Gave Warning To hacktivist Via Twitter


After arresting several suspected members of high-profile hackers’ groups, the UK police issued their latest warning to other hackers – via a tweet.
In a message on its Twitter account, the UK Metropolitan Police reminded people against computer misuse, adding the probe into the criminal activity of hacktivist groups continues.
 
"The investigation into the criminal activity of so-called ‘hacktivist’ groups #Anonymous and #LulzSec continue(s)," it said.

 
A link on the tweet led to a longer statement, where the Metropolitan Police reiterated anyone considering accessing a computer without authority risk imprisonment.
Hacker groups had taken to using Twitter to inform the public of their latest acts.
Under UK law, “it is an offence if a person acts from within the UK upon a computer anywhere else in the world. It is also an offence if someone anywhere else in the world to criminally affect a computer within the UK," the police tweet said.
The tweet also said UK law penalizes unauthorized access to personal accounts, Distributed Denial of Service (DDOS) Attacks and intrusive hacks where data is taken or systems changed.
"Other jurisdictions have similar law," it said in the extended tweet.
In past weeks, UK police had arrested “Topiary," the suspected spokesman of hacker group Lulz Security, which had joined forces with Anonymous to hack government and corporate sites.
But “Topiary" a.k.a. Jake Davis, 18, was released on bail after he was charged with five offenses relating to computer attacks and break-ins by LulzSec and Anonymous.
Anonymous had issued a press release to free “Topiary" and hinted at getting back at those who led to his arrest.
It called on its Anons in the UK "to revolt and wash this shame brought upon them by a band of traitors and bandits who sold out to Anonymous’ enemies and disparaged the sentiment of this noble, lulzy people."

The group also called on Anons "to revolt altogether to cleanse the world of the ProSec filth who spread mischief in the land."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Taith North Wales Transport & Travel Planning of UK Govt Hacked By Pakistani Hacker

Taith North Wales Transport & Travel Planning (Govt of UK), Few Other High Profile Websites Hacked By 'KHAN' (Pakistani Hacker)
A hacker from Pakistan going by the nick name of 'KHAN' has targeted a several high valued website of United Kingdom. The cyber attack happened few days ago where 'Khan' has hacked into the websites of Taith North Wales Transport and Travel Planning of UK Government. Taith is a joint committee of six county authorities from North Wales that handles transport and travel planning.
Sources revealed that the hacker belongs from Italy has managed to gain access into one the server of UK govt, and thus he successfully hack and change the index page with customized message saying- "today i am again with same message uk goverment deciding Ban Hijab for muslim womens what the hell is this! when your womens wear underware and come out of home beaches, road, you said this is freedom ? this is no problem ? but when our ladies , sisters , mothers wear hijab you said this is problem . so you call this justice ? i will fight for our right like a legend till i die .. We Want Freedom For Our Religion. You can kill us but cant kill our idea!" The hacker also claimed that not only defacement, but also he managed to breach the database of  the website. As soon as the security breach get spotted the authorities of Taith North Wales Transport Dept, took immediate steps and restored the site. While the time of writing this news, Taith Transportation portal has come back to online to its normal format. Also in his deface page 'Khan' took the responsibility of intrusion against Customs of Russia' official website. This slew of hacking rampage also affected several other high profile website of UK such as Hotel Black Boy Inn, Buckley Industry, Groes News, Spirit Models, Livetech, ByteBack Training & few more.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NASA & UFO Hacker Gary McKinnon Will Not Face Prosecution in UK

NASA & UFO Hacker Gary McKinnon Will Not Face Prosecution in UK

Infamous NASA hacker Gary McKinnon who broke into US government computer system, while hunting for evidence of UFOs and fought a long fight against extradition, has been told that he will now not face prosecution in the UK. After discussing the case with US Department of Justice and the police, The Crown Prosecution Service (CPS) has decided the appropriate jurisdiction for the McKinnon case to be heard is the US. According to Karen Todner, McKinnon's solicitor, the decision on Friday is an "interesting" one given that he was first arrested and questioned by UK police.

The reasons for that decision were:
  1. The harm occurred in the US - the activity was directed against the military infrastructure of the US;
  2. An investigation had already been launched in the US;
  3. There were a large number of witnesses, most of whom were located in the US;
  4. All of the physical evidence (with the exception of Mr McKinnon's computer) was located in the US;
  5. The US prosecutors were able to bring a case that reflected the full extent of Mr McKinnon's alleged criminality; and
  6. The bulk of the unused material was located in the US. Given the nature of the offences, this inevitably included highly sensitive information and the US courts were best placed to deal with any issues arising in relation to this material.

In a statement, the CPS's Director of Public Prosecutions (DPP), Kier Starmer QC, and Mark Rowley, Assistant Commissioner of the Metropolitan Police Service, said that they had convened a joint panel to discuss the issue and decide whether a new criminal investigation should take place. They decided that the original reasoning for the trial being held in the US still held, and looked into the possibility of holding the trial in the UK. This would have involved transferring witnesses and sensitive physical evidence to the UK. The panel consulted with the US Department of Justice as to whether this would be possible, given that they believed that "the prospects of a conviction against Mr McKinnon, which reflects the full extent of his alleged criminality, are not high".
According to the statement, the US authorities "indicated to us that they would be willing to co-operate with a prosecution in England and Wales if that would serve the interests of justice." However, the US authorities did not feel that transferring all the witnesses and evidence to the UK would be in that interest, given the panel's representations. The statement goes on to say: "That is a decision the US authorities are fully entitled to reach and we respect their decision." On that basis, the panel concluded that a new criminal investigation should not be started and the Assistant Commissioner accepted that advice.





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Aakash (World’s Cheapest Tablet) is Now In Front of us



Indian government’s ultra low-cost tablet ‘Aakash’ is finally in front of us. The official launch comes after nearly one year telecom minister Kapil Sibal flaunted a prototype of the device. Previously nicknamed as ‘Sakshat’, the Aakash is being touted as the “world’s cheapest tablet”.  The tablet is considered to be a significant accomplishment for the government, which believes the device will bridge the gap between the rural India and the ongoing technology boom in the country.  Of late we have got several queries regarding the new Aakash tablet, so we’ve decided to give you a Facts post, which will help you find answers to most of your queries.
Availability: 
The government will roll out 100,000 units of the Aakash tablet initially.  The details of the availability of the device are bit sketchy. The government says it will distribute the device to students through the institutions they are studying. So, best way to find out exact availability of Aakash tablet is to contact your concerned department of your college/institution.
Commercially, the device will be launched in November. Pre-booking for the Aakash tablet (retail version is known as UbiSlate) has already started. For more info on pre-booking click Here


Price:-
Well, the Aakash tablet will be available for students at a subsidised price of nearly Rs. 1,730. However, the exact price of the Aakash is nearly Rs. 2,276, which the government paid for its procurement. As per the official website, the Aakash tablet a.k.a UbiSlate will be commercially available at Rs. 2,999.
Plans:-
As per official website, UbiSlate will come with an unlimited mobile Internet at Rs.98/month.

Features:-
  • High Quality Web Anytime & Anywhere:
  • Connect via GPRS or WiFi
  • GPRS: Embedded modem eliminates the need for external dongles and allows Internet access everywhere
  • WiFi: Allows fast Youtube videos at hotspots
  • Fast web access even on GPRS networks, across the country using DataWind’s patented acceleration technology
  • Web, Email, Facebook, Twitter and much much more!
  • Multimedia Powerhouse:
  • HD Quality Video
  • Watching movies in the palm of your hand on a 7” screen
  • Audio library software helps manage your full collection of songs
  • Applications Galore with Android 2.2:
  • Games
  • Productivity software: Office suite
  • Educational software
  • Over 150,000 apps!
  • Full sized-USB port & Micro-SD slot:
  • Expand memory to 32GB
  • Use any ordinary pen-drive
  • Even plug-in a 3G dongle
  • And It’s a Phone!
Configuration:-
Hardware:-
  • Processor: Connexant with Graphics accelerator and HD Video processor
  • Memory (RAM): 256MB RAM / Storage (Internal): 2GB Flash
  • Storage (External): 2GB to 32GB Supported
  • Peripherals (USB2.0 ports, number): 1 Standard USB port
  • Audio out: 3.5mm jack / Audio in: 3.5mm jack
  • Display and Resolution: 7” display with 800x480 pixel resolution
  • Input Devices: Resistive touch screen
  • Connectivity and Networking: GPRS and WiFi IEEE 802.11 a/b/g
  • Power and Battery: Up to 180 minutes on battery. AC adapter 200-240 volt range.
Software:-
  • OS: Android 2.2
  • Document Rendering
  • Supported Document formats: DOC, DOCX, PPT, PPTX, XLS, XLSX, ODT, ODP
  • PDF viewer, Text editor
  • Multimedia and Image Display
  • Image viewer supported formats: PNG, JPG, BMP and GIF
  • Supported audio formats: MP3, AAC, AC3, WAV, WMA
  • Supported video formats: MPEG2, MPEG4, AVI, FLV
  • Communication and Internet
  • Web browser - Standards Compliance: xHTML 1.1 compliant, JavaScript 1.8 compliant
  • Separate application for online YouTube video
  • Safety and other standards compliance
  • CE certification / RoHS certification
  • Other: Additional Web Browser: UbiSurfer-Browser with compression/acceleration and IE8 rendering.

Versions:-
Yes, there are two versions of the Aakash tablet. The subsidised Aakash tablet will miss few features such as inbuilt cellular modem and SIM to access Internet. The retail version is likely to sport full-fledged specs as announced by the government.
Developed by:  The Aakash tablet is designed, developed and manufactured by a Canada-based firm called DataWind in co-ordination with IIT Rajasthan. According to reports, DataWind plans to launch a high end version of the device in less price sensitive markets such as the UK and US.

For more information click Here


-News Source (Aakash)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

This Year PCEU Saved £140m



The UK cyber police have saved the country £140m this year, according to government figures.
The coppers at London's Metropolitan Police central e-crimes unit (PCEU) have made some big arrests in the last few months, including Lulzsec's Topiary and several people at the News of the World.
We expect that the £140m saved is not the result of people having no Sunday tabloid to buy however, but rather an accumulation of savings to businesses, banks and consumers. The Met said that its operational activity so far has completed 30 percent of a £504m "harm reduction target", which we expect is the police bureaucracy's term for 'goal'.
"The Police Central e-Crime Unit continues to take action in its continuing efforts to reduce the harm caused to the UK economy and to UK citizens by those making use of the internet to commit crime," said detective superintendent Charlie McMurdie of the PCEU.
"This initial result is only a small sample of the current investigations and interventions being conducted... the figure alone does not capture the other important benefits gleaned from the learning obtained from targeting the higher echelon of cyber criminals that we then share with our partners."
Perhaps the biggest savings came from Operation Pagode. This saw the Met break up an online crime forum that specialised in personal identity theft and allegedly saved some £84m.
It might be just a drop in the bucket, though. According to a government report released this Spring, cyber crime costs the UK around £27bn a year.


-News Source (The Inquirer)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

FBI Used LulzSec To Track & Spy on Wikileaks Founder Julian Assange

FBI Used LulzSec To Track & Spy on Wikileaks Founder Julian Assange

After the inside story of Anonymous former leader Hector Xavier Monsegur aka "Sabu" case get revealed, the world came to know that Sabu was working as an under cover agent of FBI which lead a series of arrest for several key members of hacker collective Anonymous & LulzSec. Now we got another twist which came from a new book written by Parmy Olson, the London bureau chief for Forbes Magazine, saying that FBI used an agent inside the LulzSec hacker group to track and spy on Wikileaks founder Julian Assange. According to the book, an associate of WikiLeaks contacted LulzSec spokesman Topiary on June 16 hours after the assault on the CIA. The two would eventually converse over an Internet Relay Chat channel that was reported to be witnessed by Assange, who confirmed his identity by providing a video to the hacker in real time during their chat. For a few weeks, writes Olson, Assange and/or his associate returned to the LulzSec IRC channel “four or five more times,” during which others occasionally engaged in conversation with both sides. During at least one of those conversations, Assange’s contact at WikiLeaks offered LulzSec a spreadsheet of classified government data contained in a file named RSA 128, which she says was heavily encrypted and needed the manpower of black hat hacktivists to decode.
According to an exclusive report of RT - Aside from a few unsealed court documents, details about the now-defunct hacktivism group LulzSec remains few and far between. One journalist is saying she got inside the organization though — along with Julian Assange.
“We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency” is an upcoming book from Parmy Olson, the London bureau chief for Forbes Magazine. And although her alleged account has not yet hit the shelves, a lengthy excerpt has been leaked to the Web — and its contents suggest that that the world’s once most powerful hacking collective was in correspondence with WikiLeaks founder Julian Assange after he allegedly reached out to the organization for assistance. The US government says that they had already infiltrated LulzSec by then, though, meaning that WikiLeak’s plea to the hacking collective was actually being offered to an FBI mole.
According to Olson, the June 2011 attack on the public website of the US Central Intelligence Agency by LulzSec caught the attention of Assange, who was residing in the countryside manor of an English journalist while on house arrest.Once he saw that a LulzSec-led invasion had crippled CIA.gov, Assange allegedly sent out two tweets from the WikiLeaks Twitter account, only to delete the micomessages shortly after:
"WikiLeaks supporters, LulzSec, take down CIA . . . who has a task force into WikiLeaks," read one."CIA finally learns the real meaning of WTF” reads the other.
Assange “didn't want to be publicly associated with what were clearly black hat hackers” writes Olson, speaking of computer compromisers who target network for perhaps no real intention other than mischief making. “Instead, he decided it was time to quietly reach out to the audacious new group that was grabbing the spotlight,” she says. Olson says that one of those hackers aware the newfangled relationship was Hector Xavier Monsegur, who spearheaded LulzSec by serving as a leader of sorts under the handle Sabu. Perhaps unbeknownst to all engaged in the IRC chats, however, was that Sabu had been arrested on June 7 and, according to the federal government, began immediately working as an FBI informant.
"Since literally the day he was arrested, the defendant has been cooperating with the government proactively," Assistant US Attorney James Pastore said at a secret bail hearing on August 5 2011, according to a transcript released this March after his arrest was made public.
While details of Sabu’s escapades under the direct influence of the FBI are obviously being kept confidential, federal attorneys have said that the hacker more or less masterminded the group under their command until LulzSec dissolved on June 25; Jake Davis — Topiary — was arrested in the UK on August 1. If Olson’s allegations add up, that could mean that the FBI’s top-secret informant, Sabu, was speaking directly with America’s cyber-enemy number one: Julian Assange.
On Wednesday this week, the UK Supreme Court agreed to extradite Assange to Sweden, where he is facing a lawsuit unrelated to his involvement with WikiLeaks. Once there, however, the United States may be able to more easily fight to have him sent stateside to be charged with aiding the enemy — the crime being pegged to alleged WikiLeaks contributor Bradley Manning, who now faces life in prison for that involvement. The uncertainty of who exactly conversed with whom might be near impossible to confirm given the widespread anonymity of hacktivists tied with LulzSec and Anonymous alike, but if Olson’s account adds up, the FBI’s inside man may very well have come close to working with Assange. On his part, Topiary claims that he never received the RSA 128 file.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

UK Implements Cyber Security Strategy (CyberCriminals Have To Face Internet Ban)


Newly implemented UK Cyber Security Strategy causes a lot for Cyber criminals. Cyber-stalkers, fraudsters and other criminals could be banned from accessing the internet, under proposals being considered by the Ministry of Justice and the Home Office. The government may broaden the scope of how it can enforce Serious Crime Prevention Orders to block criminals, sex offenders and others from accessing the internet, it announced on Friday.
"The Ministry of Justice and the Home Office will consider and scope the development of a new wayof enforcing these orders, using 'cyber-tags' which are triggered by the offender breaching the conditions that have been put on their internet use, and which will automatically inform the police or probation service," the government wrote in the strategy document. "If the approach shows promise we will look at expanding cyber-sanctions to a wider group of offenders."

To Download The UK Cyber Security Strategy PDF Click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

ICO gives site operators a year to comply with new cookie law



Website operators have a year to change the way they use cookies to comply with new laws, the Information Commissioner's Office (ICO) has said. Those that make no effort to change could still face sanctions, though, the ICO said. From tomorrow, UK laws based on the EU's Privacy and Electronic Communications Directive will force websites to obtain users' consent in order to store cookies. Cookies are small text files that record user activity on websites. The ICO, the UK's data protection regulator, has given most operators of consumer websites a year's grace before serious enforcement of the new laws will begin. "Although there isn’t a formal transitional period in the Regulations, the government has said they don’t expect the ICO to enforce this new rule straight away," Christopher Graham, the Information Commissioner, said in a statement. "So we’re giving businesses and organisations up to one year to get their house in order. This does not let everyone off the hook. Those who choose to do nothing will have their lack of action taken into account when we begin formal enforcement of the rules," Graham said. The ICO said it was allowing the exemption period because there was no adequate technical solution within browser settings to obtain user consent to cookies. The Government has said it is working with browser manufacturers to establish a new system for gaining user consent through their settings. "Browser settings giving individuals more control over cookies will be an important contributor to a solution," said Graham. The ICO said it would respond to complaints about cookies during the exemption period by advising website owners how to comply with the new Privacy and Electronic Communications Regulations, an ICO guide on how it will enforce the regulations said. "[The Information Commissioner] will provide advice to the organisation concerned on the requirements of the law and how they might comply," the ICO enforcement guide (7-page / 132KB PDF) said. "Where he considers it appropriate, and particularly as May 2012 approaches, he will also ask organisations to explain to him the steps they are taking to ensure that they will in fact be in a position to comply by May 2012," the guide said. The ICO recently published guidance on how organisations can comply with the new regulations. It suggested a variety of options websites could use to gain user consent, including prompting users with pop-up questions about their consent to cookies or writing cookie consent into terms and conditions users have to agree to when registering with a site. Website features, such as videos, that remember how users personalise their interaction, could also determine user consent, the ICO said. The Information Commissioner said the ICO website now operates a header giving users the choice how to manage their cookies but said that it may not be an appropriate solution for other websites. "We’ve decided to place a header bar on our website giving users information about the cookies we use and choices about how to manage them," Christopher Graham said in the ICO press release. "I am not saying that other websites should necessarily do the same. Every website is different and prescriptive and universal ‘to do’ lists would only hinder rather than help businesses to find a solution that works best for them and their customers," Graham said. Under the new UK regulations the ICO has been given extra powers to impose penalties of up to £500,000 on websites that breach the new regulations, the ICO enforcement guide says. The ICO can also investigate the measures taken by website providers to safeguard the security of public electronic communications, investigate and fine websites depending on how they deal with personal data breaches and can demand information about users to investigate how a website complies with the new regulations, the ICO enforcement guide says. "Along with the power to impose financial penalties on telecoms and internet companies who fail to notify us about their data breaches, we will also have stronger powers to investigate the businesses behind nuisance marketing calls and spam texts," Christopher Graham, Information Commissioner, said in the ICO press release. "Tackling the businesses that make money from this is a challenge, but these new powers will give us access to more of the information we need to do the job," Graham said. 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hackers Shutdown Several Swedish Government Websites (#OpFreeAssange)

Hackers Shutdown Several Swedish Government Websites (#OpFreeAssange)

Operation Free Assange dubbed '#OpFreeAssange' continues. After British Home Office, Ministry of Justice and Hertfordshire Police now the supporter of  WikiLeaks have targeted several Swedish government websites. As expected here also the attacker follows the same mechanism and that is massive denial of service (DDoS), which effected the websites of the Swedish government portal, Armed Forces and the Swedish Institute. Niklas Englund, head of digital media at the Swedish Armed Forces, said it was unclear who was behind the so-called denial-of-service attacks, in which websites are overwhelmed with bogus traffic. But he noted that an unidentified group urging Sweden to take its ‘‘hands off Assange’’ claimed responsibility on Twitter. So far it is not clear whether the hacker is linked with infamous hacker collective group Anonymous. But we all know that not only Anon, but also hackers from different part of the world has already joined  #OpFreeAssange. This protest has becoming wilder day by day as activist are hitting hundreds & thousands of websites based on Europe, mainly UK everyday. 
Wikileaks founder Julian Assange has been sheltering at Ecuador’s Embassy in Britain since June 19 in an effort to avoid extradition to Sweden, where prosecutors want to question the founder of the secret-spilling WikiLeaks site over alleged sex crimes.





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Julian Assange Facing Serious Medical Problems & Psychological Issues in Ecuadorian Embassy

Julian Assange Facing Serious Medical ProblemsPsychological Issues in Ecuadorian Embassy -Said Assange Lawyer Garzon

I am sure that the millions of fans and supporters of WikiLeaks will be very unhappy after hearing that general health of Julian Assange getting drastically worsen in embassy. The lawyer of Assange warned that WikiLeaks founder could suffer serious health problems if he stays in London’s Ecuadorian embassy for longer. “Assange is in good health, but the situation is getting steadily worse,” lawyer Baltasar Garzon said during an anti-corruption conference in Rio de Janeiro, Brazil. The confined conditions in which Assange is currently living could cause him to “suffer from serious medical problems,” and lead to “psychological issues,” Garzon said. Assange has been confined inside Ecuadorian Embassy since June 19 in conditions Garzon described as worse than prison. Assange took refuge there to avoid being extradited to Sweden, where he is wanted for questioning on charges of sex crimes. Previously, Ecuadorian vice foreign minister Marco Albuja said that he was “very worried” for Assange’s welfare, and that “he had lost a lot of weight.” The Ecuadorian government has asked the UK for permission to extract Assange from the embassy in London and transfer him to Ecuador. They also called for a guarantee of his safety if he has to be admitted to a London hospital at any time. The British government has flatly refused to negotiate, maintaining that they are legally obligated to hand him over to Sweden should he set foot outside the embassy. The WikiLeaks founder has now spent over four months in the embassy after losing his court battle against extradition. He claims the allegations of sexual abuse against him are politically motivated, and part of a US conspiracy to arrest him.
Assange drew Washington's fury after publishing thousands of classified diplomatic cables on the whistleblowing website WikiLeaks in 2010. The US government has denied claims that there is a secret grand jury case being prepared to prosecute Assange, but has not ruled out the possibility of requesting he be extradited from Sweden to the US. Despite Washington’s denials, there is evidence that the US government has been monitoring Assange for the last few years. Diplomatic cables released a month ago showed how US and Australian authorities shared information on the whistleblower. One of the wires indicated the most successful route to prosecution “would be to show that Mr. Assange had acted as a co-conspirator – soliciting, encouraging or assisting [US Army private] Bradley Manning, to obtain and provide the documents.” 
Bradley Manning, 24, faces a potential life sentence if he is convicted of aiding the enemy after releasing classified military intelligence to WikiLeaks in 2010. Manning’s lawyer said last week that he may plead guilty to some of the lesser charges set against him.


-Source (Cubasi News)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#OpFreeAssange -Hertfordshire Police Website Hacked & Login Information Stolen

#OpFreeAssange -Hertfordshire Police Website Hacked & Login Information Stolen

Just few days ago hacktivist group Anonymous strikes on the cyber fence of UK Government, and sent Ministry of Justice and the Britis Home Office offline for certain period of time. The motive of the cyber attack was directly linked with Wikileaks founder Julian Assange extradition. Not only Anonymous, but also hackers from different part of globe joined 'Operation Free Assange' dubbed '#OpFreeAssange'. As a result  A hacker codenamed '0x00x00' has posted online what appears to be login information for police officers in the Hertfordshire and Nottinghamshire constabularies. The usernames, passwords and PINs were posted to Pastebin on Thursday, along with the banner 'OpFreeAssange' and a quote from Wikileaks founder. The hacker said in the Pastebin document: "This is nothing big not some l33t h4x shit ... but this tells how insecure the Web is." A spokesperson for Nottinghamshire Constabulary said in a statement that, following initial inquiries, the force was "confident at this stage that no restricted or confidential information was accessed or databases compromised". "We continue to investigate and have taken steps to further strengthen security around our website as a precaution," the statement continued. In a statement, Hertfordshire Constabulary said it was investigating the breach, and confirmed that the information had been "stored on a database linked to the public Safer Neighbourhoods pages of the external Constabulary website". 
This is not the very first time, earlier hackers have targeted website of Police Dept many times. A hacker group named Redhack hit Turkish Police Dept and stolen 850+ police officers details. Also hacker from Anonymous has exposed 600 MB of Personal Data of Boston Police Patrolmens Association (BPPA). Also for #OpPiggyBank Ontario Association of Chiefs of Police & Salt Lake City Police Department Hacked by Anonymous. In 2011Austrian PoliceChicago Police Department also get hacked By Anonymous where more 25K+ Officers Personal Data get leaked.  





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Al-Qaeda Network Hacked (Terrorists terrorised)

Computer hackers have disrupted al-Qaeda's ability to communicate via internet by  interrupting the flow of videos and messages of the outfit, an anti-terror expert said.The attack was reportedly carried out by unknown hackers in the past few days.

"Al-Qaeda's online communications have been temporarily crippled, and it does not have a single trusted distribution channel available on the Internet," Evan Kohlmann of Flashpoint Global Partners, which monitors the outfit's communication said.
It was "well coordinated and involved the use of an unusual cocktail of relatively sophisticated techniques," Kohlmann said.
"My guess is that it will take them at least several days more to repair the damage and get their network up and functioning again," he said.

British newspapers reported earlier this month that the UK government had also hacked into al-qaeda's online magazine - Inspire - and replaced instructions to make bombs with instructions to make cupcakes.

It reportedly took the terrorist organization two weeks to get back the original posting.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

BlackBerry blog hacked TriCk (TeaMp0isoN)

Research In Motion found its official BlackBerry blog hacked Tuesday morning, following statements the company made regarding the London riots. Rioters used RIM’s BlackBerry Messenger to communicate far more than using other social networks like Twitter or Facebook. In response to the riots, RIM tweeted, “We feel for those impacted by the riots in London. We have engaged with the authorities to assist in any way we can.”
As we noted yesterday, that seems to indicate that BBM isn’t as private as some rioters may have hoped. In response, a group calling itself TeaMp0isoN hacked the publicly facing Inside BlackBerry blog. The site is now down.
Before the site went down, we were able to capture the following message from the hackers:



Hacked Site:-

http://blogs.blackberry.com/



Mirror Link:-
http://www.zone-h.org/mirror/id/14614130


This hack is a response to this statement by RIM:-

    “We feel for those impacted by this weekend’s riots in London. We have engaged with the authorities to assist in any way we can. As in all markets around the world Where BlackBerry is available, we cooperate with local telecommunications operators, law enforcement and regulatory officials. Similar to other technology providers in the UK we comply with The Regulation of Investigatory Powers Act and co-operate fully with the Home Office and UK police forces.”

    Dear Rim;
    You Will _NOT_ assist the UK Police because if u do innocent members of the public who were at the wrong place at the wrong time and owned a blackberry will get charged for no reason at all, the Police are looking to arrest as many people as possible to save themselves from embarrassment…. if you do assist the police by giving them chat logs, gps locations, customer information & access to peoples BlackBerryMessengers you will regret it, we have access to your database which includes your employees information; e.g – Addresses, Names, Phone Numbers etc. – now if u assist the police, we _WILL_ make this information public and pass it onto rioters…. do you really want a bunch of angry youths on your employees doorsteps? Think about it…. and don’t think that the police will protect your employees, the police can’t protect themselves let alone protect others….. if you make the wrong choice your database will be made public, save yourself the embarrassment and make the right choice. don’t be a puppet..

    p.s – we do not condone in innocent people being attacked in these riots nor do we condone in small businesses being looted, but we are all for the rioters that are engaging in attacks on the police and government…. and before anyone says “the blackberry employees are innocent” no they are not! They are the ones that would be assisting the police

    - TriCk – TeaMp0isoN -
    Greets To: iN^SaNe – Hex00010 – MLT – BlackHacker

    - Knowledge is Power . . . . .

    #FuckTheFeds
     Twitter: @TeaMp0isoN_..."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...