Showing posts sorted by date for query UK Government. Sort by relevance Show all posts
Showing posts sorted by date for query UK Government. Sort by relevance Show all posts

British Spy Agency GCHQ Performed DDoS Attack Against Anonymous -Snowden Documents Transpired

British Spy Agency GCHQ Performed DDoS Attack Against Hacktivist Anonymous & LulzSec -Snowden Documents Transpired
While excavating the past, it was always found that cyber criminals, large hacker collective groups were the culprits for engaging voluminous denial of service attack. But this widely transfusing story get a one eighty degree reverse turn, when the former NSA contractor Edward Snowden revealed another trade secret. Recently a lurid story get spot lighted, as the whistle blower Snowden unfold yet another breathtaking stealthy  documents taken from the National Security Agency. The clandestine documents taken the mask from the so called good guys, unveiling British spy agency GCHQ had launched a secret war against the infamous hacktivist collective Anonymous and a splinter group known as LulzSec several years ago. Many of you guessed right, this was happened when Anonymous were targeting various UK companies and government websites. The documents disclose that GCHQ carried out seemingly illegal DDoS attacks against the collective, flooding their chatrooms with so much traffic that they would become inaccessible – and all with the approval of the British government. The revelations come less than a year after several LulzSec activists were jailed by a British court for carrying out similar DDoS attacks against targets including the CIA, the UK’s Serious Organized Crime Agency (SOCA), News International, Sony and the Westboro Baptist Church, among others. 
This sensational issue was made public by NBC News deferentially with the help of none other than Edward Snowden. In their exclusive report headed 'War on Anonymous: British Spies Attacked Hackers,' NBC said -The blunt instrument the spy unit used to target hackers, however, also interrupted the web communications of political dissidents who did not engage in any illegal hacking. It may also have shut down websites with no connection to Anonymous. According to the documents, a division of Government Communications Headquarters (GCHQ), the British counterpart of the NSA, shut down communications among Anonymous hacktivists by launching a “denial of service” (DDOS) attack – the same technique hackers use to take down bank, retail and government websites – making the British government the first Western government known to have conducted such an attack.
The documents, from a PowerPoint presentation prepared for a 2012 NSA conference called SIGDEV, show that the unit known as the Joint Threat Research Intelligence Group, or JTRIG, boasted of using the DDOS attack – which it dubbed Rolling Thunder -- and other techniques to scare away 80 percent of the users of Anonymous internet chat rooms. 
The existence of JTRIG has never been previously disclosed publicly. The documents also show that JTRIG infiltrated chat rooms known as IRCs and identified individual hackers who had taken confidential information from websites. In one case JTRIG helped send a hacktivist to prison for stealing data from PayPal, and in another it helped identify hacktivists who attacked government websites. 
As soon as this story getting all the spot lights, immediately the GCHQ responded to this saying all their movements and operations were lawful“All of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensure[s] that our activities are authorized, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All of our operational processes rigorously support this position.” -GCHQ said the press. To know more detail about this story, don't forget to stay tuned with VOGH



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Taith North Wales Transport & Travel Planning of UK Govt Hacked By Pakistani Hacker

Taith North Wales Transport & Travel Planning (Govt of UK), Few Other High Profile Websites Hacked By 'KHAN' (Pakistani Hacker)
A hacker from Pakistan going by the nick name of 'KHAN' has targeted a several high valued website of United Kingdom. The cyber attack happened few days ago where 'Khan' has hacked into the websites of Taith North Wales Transport and Travel Planning of UK Government. Taith is a joint committee of six county authorities from North Wales that handles transport and travel planning.
Sources revealed that the hacker belongs from Italy has managed to gain access into one the server of UK govt, and thus he successfully hack and change the index page with customized message saying- "today i am again with same message uk goverment deciding Ban Hijab for muslim womens what the hell is this! when your womens wear underware and come out of home beaches, road, you said this is freedom ? this is no problem ? but when our ladies , sisters , mothers wear hijab you said this is problem . so you call this justice ? i will fight for our right like a legend till i die .. We Want Freedom For Our Religion. You can kill us but cant kill our idea!" The hacker also claimed that not only defacement, but also he managed to breach the database of  the website. As soon as the security breach get spotted the authorities of Taith North Wales Transport Dept, took immediate steps and restored the site. While the time of writing this news, Taith Transportation portal has come back to online to its normal format. Also in his deface page 'Khan' took the responsibility of intrusion against Customs of Russia' official website. This slew of hacking rampage also affected several other high profile website of UK such as Hotel Black Boy Inn, Buckley Industry, Groes News, Spirit Models, Livetech, ByteBack Training & few more.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Oxford University Will Get £1 Million of Investment in Next 2 Year to Tackle Cyber Crime

Oxford University Will Get £1 Million of Investment in Next 2 Year to Tackle Cyber Crime

The rising amount of cyber crime has already put the world of security under a serious threat. Since last five years we have seen many devastating cyber attack which have broken almost every security measure. In short, today the entire cyber space is posing a serious risk. To get rid of this situation many developed countries have already started taking required counter measure. Cyber awareness program, campaigns are going in almost every part of the world. Such steps and countermeasures were mainly limited to government and corporate, but now as we are sitting at the edge of cyber threat, so the security system should be more enhanced. While looking at the current status OXFORD University have came forward, and they are going to open a cyber hub to tackle these ongoing cyber challenges. Acceding to the official website of Oxford Mail - OXFORD University will get £1 million of investment in the next two years to fund a center to tackle cyber crime. Funding for the Government’s Global Center for Cyber Security Capacity Building has been announced by Foreign Secretary William Hague, who pledged £500,000 a year for at least the next two years. It will be based at the home of the Oxford Martin School, with the aim of combating activists and terrorists who are posing a growing threat to our national security and economy.
The school’s director, Ian Goldin, Oxford University Professor of Globalisation and Development, said: “The whole purpose is to address critical challenges of the future. The international scale of the challenge requires new research and connections with the business world, which is part of the school’s mandate.” The centre will be based at the Old Indian Institute, a former university library building, on the corner of Broad Street and Catte Street, which is currently being refurbished. Prof Goldin, whose new book Divided Nations explores the risks brought about by rapid globalization and technological leaps like the internet, said keeping up with criminals will be far from easy. He said: “We are in a race, or struggle, between people who want to keep systems safe and secure and those who – for whatever reasons that may be commercial, nationalist or anarchical – want to undermine the system. That won’t end. 
According to some legitimate sources it has been confirmed that the new center will be a beacon of expertise and put the UK at the forefront of cyber policy development. It will operate from Broad Street from September. The two-year funding will help pay for an additional 12 specialists. Sadie Creese will head the new center as professor of cyber security.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NASA & UFO Hacker Gary McKinnon Will Not Face Prosecution in UK

NASA & UFO Hacker Gary McKinnon Will Not Face Prosecution in UK

Infamous NASA hacker Gary McKinnon who broke into US government computer system, while hunting for evidence of UFOs and fought a long fight against extradition, has been told that he will now not face prosecution in the UK. After discussing the case with US Department of Justice and the police, The Crown Prosecution Service (CPS) has decided the appropriate jurisdiction for the McKinnon case to be heard is the US. According to Karen Todner, McKinnon's solicitor, the decision on Friday is an "interesting" one given that he was first arrested and questioned by UK police.

The reasons for that decision were:
  1. The harm occurred in the US - the activity was directed against the military infrastructure of the US;
  2. An investigation had already been launched in the US;
  3. There were a large number of witnesses, most of whom were located in the US;
  4. All of the physical evidence (with the exception of Mr McKinnon's computer) was located in the US;
  5. The US prosecutors were able to bring a case that reflected the full extent of Mr McKinnon's alleged criminality; and
  6. The bulk of the unused material was located in the US. Given the nature of the offences, this inevitably included highly sensitive information and the US courts were best placed to deal with any issues arising in relation to this material.

In a statement, the CPS's Director of Public Prosecutions (DPP), Kier Starmer QC, and Mark Rowley, Assistant Commissioner of the Metropolitan Police Service, said that they had convened a joint panel to discuss the issue and decide whether a new criminal investigation should take place. They decided that the original reasoning for the trial being held in the US still held, and looked into the possibility of holding the trial in the UK. This would have involved transferring witnesses and sensitive physical evidence to the UK. The panel consulted with the US Department of Justice as to whether this would be possible, given that they believed that "the prospects of a conviction against Mr McKinnon, which reflects the full extent of his alleged criminality, are not high".
According to the statement, the US authorities "indicated to us that they would be willing to co-operate with a prosecution in England and Wales if that would serve the interests of justice." However, the US authorities did not feel that transferring all the witnesses and evidence to the UK would be in that interest, given the panel's representations. The statement goes on to say: "That is a decision the US authorities are fully entitled to reach and we respect their decision." On that basis, the panel concluded that a new criminal investigation should not be started and the Assistant Commissioner accepted that advice.





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

UK Announces Plans for ‘Cyber Reserve’ Online Crime Defence Force

UK Govt. Announces Plans for ‘Cyber Reserve’ Online Crime Defense Force

Earlier this week, the UK government announced that it was planning on setting up a ‘cyber reserve’ force aimed at dealing with security threats brought about by online crime. The proposed force will be run by the country’s ministry of defense and is going to allow the armed forces to draw on the nation’s computer-related talents in order to ward off online attacks and stem the tides of cyber crime. Minister for the Cabinet Office Francis Maude claims that ‘critical’ work is required in order to combat online lawbreaking. He says that nine tenths of large British corporations and three quarters of small British businesses have reported experiencing a cyber breach within the last year, meaning that this force has now become a necessity.

Cyber Crime in the UK
Research conducted by a team of academics recruited by the UK Ministry of Defense earlier this year concluded that the country spends a billion US dollars per year on protecting against and cleaning up after instances of cyber crime. This includes the cost of measures taken to safeguard bank account security and reduce computer-related fraud, the money forked out by businesses purchasing anti-virus software and the cost of removing viruses from computers. In addition to criminals, terrorists and rogue states have also targeted computers in the UK, meaning that it is not difficult to see why the country would consider setting up such a force.

More Students Trained in Tackling Cyber Crime Needed
Maude has promised to make the UK one of the safest places in the world to conduct online business. He added that further details of the ‘cyber reserve’ plans would be revealed in 2013 and said that British government agencies and departments are working with professional bodies in order to ensure that the consideration of internet security becomes an integral component of corporate governance and the risk management process. He stated that UK officials want more students in the country trained in the skills required for tackling cyber crime and pointed out that the nation’s ministry of defense is examining new methods for attracting talented cyber security specialists, as they are required for critical areas of work.

Cyber-Spying by Hostile Nations
The UK Ministry of Defence’s announcement came in the wake of revelations that hostile foreign states had carried out ‘mapping’ of the systems that control the country’s power and water supplies. Officials refused to name the nations that were believed to have carried out this mapping but there have been reports in the United States that China and Russia have conducted similar reconnaissance exercises there, which suggests that they could be the countries that are responsible for this cyber-spying activity. With this in mind, it is little wonder the UK is stepping up its security, as it wishes to safeguard vital information.

Cyber Confidence Tracker
Francis Maude stated that the increasing number of threats posed to the UK’s online security is partly down to the growth of the internet economy. He said that the country’s government cannot take sole responsibility for fighting cyber crime and emphasized the fact that individuals and businesses would also have to play their part. Next spring the UK will be taking steps to improve online security for consumers and small businesses. The nation plans on launching a ‘cyber confidence tracker’, which will keep tabs on online behaviors and perceptions about internet security in an effort to ensure that the advise that they are delivering to the public about this subject is being conveyed in the best possible way.

Implications
It appears that the UK is now taking the threat of cyber attack extremely seriously, which it is wise to do considering the increasing trend of nations targeting the infrastructures of those that they are hostile towards via the internet. This is a sign that the web is becoming the new battleground in the international struggle for power. The full extent of the country’s plans for its ‘cyber reserve’ are not yet known. It is also questionable whether it will be used solely for defense purposes. Espionage is no longer dominated by spies being physically placed in another country. It is now evidently moving online, meaning that countries are being forced to adapt and develop cyber spies of their own.


Special article by 
Evelyn Anderson of International Business and Journalism
Guest Editor VOGH








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Julian Assange Facing Serious Medical Problems & Psychological Issues in Ecuadorian Embassy

Julian Assange Facing Serious Medical ProblemsPsychological Issues in Ecuadorian Embassy -Said Assange Lawyer Garzon

I am sure that the millions of fans and supporters of WikiLeaks will be very unhappy after hearing that general health of Julian Assange getting drastically worsen in embassy. The lawyer of Assange warned that WikiLeaks founder could suffer serious health problems if he stays in London’s Ecuadorian embassy for longer. “Assange is in good health, but the situation is getting steadily worse,” lawyer Baltasar Garzon said during an anti-corruption conference in Rio de Janeiro, Brazil. The confined conditions in which Assange is currently living could cause him to “suffer from serious medical problems,” and lead to “psychological issues,” Garzon said. Assange has been confined inside Ecuadorian Embassy since June 19 in conditions Garzon described as worse than prison. Assange took refuge there to avoid being extradited to Sweden, where he is wanted for questioning on charges of sex crimes. Previously, Ecuadorian vice foreign minister Marco Albuja said that he was “very worried” for Assange’s welfare, and that “he had lost a lot of weight.” The Ecuadorian government has asked the UK for permission to extract Assange from the embassy in London and transfer him to Ecuador. They also called for a guarantee of his safety if he has to be admitted to a London hospital at any time. The British government has flatly refused to negotiate, maintaining that they are legally obligated to hand him over to Sweden should he set foot outside the embassy. The WikiLeaks founder has now spent over four months in the embassy after losing his court battle against extradition. He claims the allegations of sexual abuse against him are politically motivated, and part of a US conspiracy to arrest him.
Assange drew Washington's fury after publishing thousands of classified diplomatic cables on the whistleblowing website WikiLeaks in 2010. The US government has denied claims that there is a secret grand jury case being prepared to prosecute Assange, but has not ruled out the possibility of requesting he be extradited from Sweden to the US. Despite Washington’s denials, there is evidence that the US government has been monitoring Assange for the last few years. Diplomatic cables released a month ago showed how US and Australian authorities shared information on the whistleblower. One of the wires indicated the most successful route to prosecution “would be to show that Mr. Assange had acted as a co-conspirator – soliciting, encouraging or assisting [US Army private] Bradley Manning, to obtain and provide the documents.” 
Bradley Manning, 24, faces a potential life sentence if he is convicted of aiding the enemy after releasing classified military intelligence to WikiLeaks in 2010. Manning’s lawyer said last week that he may plead guilty to some of the lesser charges set against him.


-Source (Cubasi News)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

India & Britain Enhancing Cooperation in Cyber Security to Reduce Cybercrime

IndiaBritain Enhancing Cooperation in Cyber Security to Reduce Cybercrime

Just a week ago on the sidelines of 3rd Worldwide Cybersecurity Summit, Telecom and IT Minister of India, Kapil Sibal said the Indian Government will invest $200 million in coming 4 years, in order to strengthen their cyber security infrastructure. Now another move has been taken by Indian Govt where India and the United Kingdom have decided to enhance cooperation for reduction of the risk of threats from cyberspace to international security and strengthen bilateral cooperation to tackle cyber crime. At a joint press conference with External Affairs Minister Salman Khurshid, British Foreign Secretary William Hague supported India’s bid for membership in four export control regimes. Britain, Mr. Hague said, also looked “forward to the time when India will have a permanent seat in the UN Security Council.” The two nations also finalized strategies on collaborating on building skills and capacities to tackle threats from cyberspace and to use ICT (information and communication technologies) for the objective of economic and social development. They also held discussions on using existing cooperation between universities and business communities to develop synergy in research and development on cyber issues.
Besides the cyber issues, both sides discussed bilateral, regional and international issues of mutual interest.
Henceforth, India and the UK would conduct their Cyber Dialogue on a bi-annual basis to achieve these objectives, said an official release issued by Indian External Affairs Ministry. 
While talking about India-Bratain cooperation in Cyber Security, we would also like to remind you that in 2011, a Cyber Shield deal Between India & US was made. Also in this year India and Israel have agreed to launch a long-term joint program worth USD 10 million annually to facilitate research on Cyber-Security.


-Source (The Hindu)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

US National Archives Has Blocked Search Containing 'WikiLeaks'

US National Archives Has Blocked Search Containing 'WikiLeaks'

The movement of WikiLeaks faced another bar, as the searches for “WikiLeaks” in the public search engine for the US National Archives have been blocked. Any search containing the word “WikiLeaks (like “Congress” and “WikiLeaks”; "Obama" and "WikiLeaks") turns up an error message saying "The page you have requested has been blocked, because the URL is banned" as shown the picture below.

The whistle blowing website of WikiLeaks already lashed out at the move, saying the Archives has  literally turned into “Orwell’s Ministry of Truth.” In a tweet the official twitter account of WikiLeaks said “The US state is literally eating its own brain by censoring its own collective memories about WikiLeaks.” And, in another tweet WikiLeaks said, “The US National Archives censoring searches for its records containing the word ‘WikiLeaks’ is absolutely absurd.” 
The block is likely to be in line with the “Protecting Cyberspace as a National Asset Act,” a form of internet censorship the US adopted back in 2010. It did not become law, but it prompted various US government agencies such as the White House Office of Management and Budget and the US Air Force to advise their employees not to read or access classified documents being made available by sites like WikiLeaks. The Library of Congress went further by blocking access to WikiLeaks content from its server in 2010. According to the official blog post of  Library of Congress “The Library decided to block Wikileaks because applicable law obligates federal agencies to protect classified information.  Unauthorized disclosures of classified documents do not alter the documents’ classified status or automatically result in declassification of the documents.” The White House’s Office of Management and Budget today provided the guidance that “federal agencies collectively, and each federal employee and contractor individually, are obligated to protect classified information pursuant to all applicable laws, as well as to protect the integrity of government information technology systems.” -said Matt Raymond in the blog post of LOC. 
Though it is unknown when the Archives began blocking searches, but according to diplomatic cables released over the past months the US Justice Department’s investigation targeting of both Assange and WikiLeaks is real. So may be this block has connection or may be a return from the U.S. Govt of the last release of WikiLeaks that is  'Detainee Policies'  in what it said more than 100 classified or otherwise restricted files from the United States Department of Defense covering the rules and procedures for detainees in U.S. military custody. At the moment WikiLeaks founder Julian Assange is holed up in the Ecuadorian embassy in London as the UK has forcefully asserted that it will deny him safe passage to Ecuador. Ecuador granted Assange political asylum in August over fears that if extradited to Sweden, Assange could be transferred to the US and once there, face execution.



-Source (RT)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Greater Manchester Police Fined £150,000 By ICO For Using Unencrypted USB Sticks

Greater Manchester Police Fined £150,000 By ICO For Using Unencrypted USB Sticks 

To fight against major security breaches, data loss, cyber theft, and many other cyber challenges, both Government and higher authorities are becoming as tight and strict as they can. While sitting at edge of cyber security, not even a single mistake or carelessness will be negotiated. So either you have to deliver your very best, or you have to penalty, exactly the same thing happened to Greater Manchester Police. Yesterday, I mean 16th of October The UK Information Commissioner's Office (ICO) in the UK recently fined the Greater Manchester Police £150,000 for a data breach. In their press release ICO said - Greater Manchester Police force is being fined for failing to take appropriate measures against the loss of personal data. The action was prompted by the theft of a memory stick containing sensitive personal data from an officer’s home. The device, which had no password protection, contained details of more than a thousand people with links to serious crime investigations. The ICO found that a number of officers across the force regularly used unencrypted memory sticks, which may also have been used to copy data from police computers to access away from the office. Despite a similar security breach in September 2010, the force had not put restrictions on downloading information, and staff were not sufficiently trained in data protection.
The findings prompted the Information Commissioner to use his powers under the Data Protection Act to impose a Civil Monetary Penalty of £150,000. Greater Manchester Police paid that penalty yesterday, taking advantage of a 20 per cent early payment discount (£120,000). 

David Smith, ICO Director of Data Protection, said: -“This was truly sensitive personal data, left in the hands of a burglar by poor data security. The consequences of this type of breach really do send a shiver down the spine. “It should have been obvious to the force that the type of information stored on its computers meant proper data security was needed. Instead, it has taken a serious data breach to prompt it into action.
“This is a substantial monetary penalty, reflecting the significant failings the force demonstrated. We hope it will discourage others from making the same data protection mistakes.” 
The monetary penalty is paid into the Treasury’s Consolidated Fund and is not kept by the Commissioner.   






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hackers Shutdown Several Swedish Government Websites (#OpFreeAssange)

Hackers Shutdown Several Swedish Government Websites (#OpFreeAssange)

Operation Free Assange dubbed '#OpFreeAssange' continues. After British Home Office, Ministry of Justice and Hertfordshire Police now the supporter of  WikiLeaks have targeted several Swedish government websites. As expected here also the attacker follows the same mechanism and that is massive denial of service (DDoS), which effected the websites of the Swedish government portal, Armed Forces and the Swedish Institute. Niklas Englund, head of digital media at the Swedish Armed Forces, said it was unclear who was behind the so-called denial-of-service attacks, in which websites are overwhelmed with bogus traffic. But he noted that an unidentified group urging Sweden to take its ‘‘hands off Assange’’ claimed responsibility on Twitter. So far it is not clear whether the hacker is linked with infamous hacker collective group Anonymous. But we all know that not only Anon, but also hackers from different part of the world has already joined  #OpFreeAssange. This protest has becoming wilder day by day as activist are hitting hundreds & thousands of websites based on Europe, mainly UK everyday. 
Wikileaks founder Julian Assange has been sheltering at Ecuador’s Embassy in Britain since June 19 in an effort to avoid extradition to Sweden, where prosecutors want to question the founder of the secret-spilling WikiLeaks site over alleged sex crimes.





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#OpFreeAssange -Hertfordshire Police Website Hacked & Login Information Stolen

#OpFreeAssange -Hertfordshire Police Website Hacked & Login Information Stolen

Just few days ago hacktivist group Anonymous strikes on the cyber fence of UK Government, and sent Ministry of Justice and the Britis Home Office offline for certain period of time. The motive of the cyber attack was directly linked with Wikileaks founder Julian Assange extradition. Not only Anonymous, but also hackers from different part of globe joined 'Operation Free Assange' dubbed '#OpFreeAssange'. As a result  A hacker codenamed '0x00x00' has posted online what appears to be login information for police officers in the Hertfordshire and Nottinghamshire constabularies. The usernames, passwords and PINs were posted to Pastebin on Thursday, along with the banner 'OpFreeAssange' and a quote from Wikileaks founder. The hacker said in the Pastebin document: "This is nothing big not some l33t h4x shit ... but this tells how insecure the Web is." A spokesperson for Nottinghamshire Constabulary said in a statement that, following initial inquiries, the force was "confident at this stage that no restricted or confidential information was accessed or databases compromised". "We continue to investigate and have taken steps to further strengthen security around our website as a precaution," the statement continued. In a statement, Hertfordshire Constabulary said it was investigating the breach, and confirmed that the information had been "stored on a database linked to the public Safer Neighbourhoods pages of the external Constabulary website". 
This is not the very first time, earlier hackers have targeted website of Police Dept many times. A hacker group named Redhack hit Turkish Police Dept and stolen 850+ police officers details. Also hacker from Anonymous has exposed 600 MB of Personal Data of Boston Police Patrolmens Association (BPPA). Also for #OpPiggyBank Ontario Association of Chiefs of Police & Salt Lake City Police Department Hacked by Anonymous. In 2011Austrian PoliceChicago Police Department also get hacked By Anonymous where more 25K+ Officers Personal Data get leaked.  





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Hit Ministry of Justice & British Home Office Over Protest Against Assange Case

Anonymous Hit Ministry of Justice & British Home Office Over Protest Against Assange Case

Hacker collective Anonymous again stand for Wikileaks founder Julian Assange. This time hackers affiliated with Anonymous have targeted a few British government websites in the last 24 hours. The hacker group claimed responsibility on Twitter for the denial-of-service attacks which affected the Ministry of Justice and the Home Office"Justice.gov.uk seems to be offline. Odd. #Anonymous #Assange," said a posting on the group's Twitter website at the time of the attacks on Monday night. It later added: "Sorry for the delay Forgot to say no3 #TangoDown aprox 1 hour ago ;) number10.gov.uk/ #OpFreeAssange."
The incident comes as the Wikileaks founder is staying at Ecuador's embassy in London to avoid extradition to Sweden over sex assault claims, which he denies. He was granted asylum by Ecuador last week. He has been at the embassy since June and on Sunday addressed crowds of his supporters from the embassy's balcony, thanking Ecuador and other South American countries for their support. The UK has insisted it is obliged to extradite Mr Assange, 41, and wants a "diplomatic solution", making clear that Mr Assange will be arrested if he leaves the embassy.
Downing Street, the office of Prime Minister David Cameron, and the Home Office said attempts to disrupt the work of their sites had failed or caused minor problems, although the Ministry of Justice (MoJ) said the attack had affected its website. This is not the very first time, few months ago (April, This year) Anonymous engaged massive cyber attack which bring down British Prime Minister’s Office, Home Office & Ministry of Justice. We would also like to remind you another instance, where both members of the hacktivist group, Anonymous and supporters of Julian Assange stood together outside of the Supreme Court in London to protest against the extradition of the Wikileaks founder to Sweden. 


-Source (BBC & Reuters) 







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

FBI Used LulzSec To Track & Spy on Wikileaks Founder Julian Assange

FBI Used LulzSec To Track & Spy on Wikileaks Founder Julian Assange

After the inside story of Anonymous former leader Hector Xavier Monsegur aka "Sabu" case get revealed, the world came to know that Sabu was working as an under cover agent of FBI which lead a series of arrest for several key members of hacker collective Anonymous & LulzSec. Now we got another twist which came from a new book written by Parmy Olson, the London bureau chief for Forbes Magazine, saying that FBI used an agent inside the LulzSec hacker group to track and spy on Wikileaks founder Julian Assange. According to the book, an associate of WikiLeaks contacted LulzSec spokesman Topiary on June 16 hours after the assault on the CIA. The two would eventually converse over an Internet Relay Chat channel that was reported to be witnessed by Assange, who confirmed his identity by providing a video to the hacker in real time during their chat. For a few weeks, writes Olson, Assange and/or his associate returned to the LulzSec IRC channel “four or five more times,” during which others occasionally engaged in conversation with both sides. During at least one of those conversations, Assange’s contact at WikiLeaks offered LulzSec a spreadsheet of classified government data contained in a file named RSA 128, which she says was heavily encrypted and needed the manpower of black hat hacktivists to decode.
According to an exclusive report of RT - Aside from a few unsealed court documents, details about the now-defunct hacktivism group LulzSec remains few and far between. One journalist is saying she got inside the organization though — along with Julian Assange.
“We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency” is an upcoming book from Parmy Olson, the London bureau chief for Forbes Magazine. And although her alleged account has not yet hit the shelves, a lengthy excerpt has been leaked to the Web — and its contents suggest that that the world’s once most powerful hacking collective was in correspondence with WikiLeaks founder Julian Assange after he allegedly reached out to the organization for assistance. The US government says that they had already infiltrated LulzSec by then, though, meaning that WikiLeak’s plea to the hacking collective was actually being offered to an FBI mole.
According to Olson, the June 2011 attack on the public website of the US Central Intelligence Agency by LulzSec caught the attention of Assange, who was residing in the countryside manor of an English journalist while on house arrest.Once he saw that a LulzSec-led invasion had crippled CIA.gov, Assange allegedly sent out two tweets from the WikiLeaks Twitter account, only to delete the micomessages shortly after:
"WikiLeaks supporters, LulzSec, take down CIA . . . who has a task force into WikiLeaks," read one."CIA finally learns the real meaning of WTF” reads the other.
Assange “didn't want to be publicly associated with what were clearly black hat hackers” writes Olson, speaking of computer compromisers who target network for perhaps no real intention other than mischief making. “Instead, he decided it was time to quietly reach out to the audacious new group that was grabbing the spotlight,” she says. Olson says that one of those hackers aware the newfangled relationship was Hector Xavier Monsegur, who spearheaded LulzSec by serving as a leader of sorts under the handle Sabu. Perhaps unbeknownst to all engaged in the IRC chats, however, was that Sabu had been arrested on June 7 and, according to the federal government, began immediately working as an FBI informant.
"Since literally the day he was arrested, the defendant has been cooperating with the government proactively," Assistant US Attorney James Pastore said at a secret bail hearing on August 5 2011, according to a transcript released this March after his arrest was made public.
While details of Sabu’s escapades under the direct influence of the FBI are obviously being kept confidential, federal attorneys have said that the hacker more or less masterminded the group under their command until LulzSec dissolved on June 25; Jake Davis — Topiary — was arrested in the UK on August 1. If Olson’s allegations add up, that could mean that the FBI’s top-secret informant, Sabu, was speaking directly with America’s cyber-enemy number one: Julian Assange.
On Wednesday this week, the UK Supreme Court agreed to extradite Assange to Sweden, where he is facing a lawsuit unrelated to his involvement with WikiLeaks. Once there, however, the United States may be able to more easily fight to have him sent stateside to be charged with aiding the enemy — the crime being pegged to alleged WikiLeaks contributor Bradley Manning, who now faces life in prison for that involvement. The uncertainty of who exactly conversed with whom might be near impossible to confirm given the widespread anonymity of hacktivists tied with LulzSec and Anonymous alike, but if Olson’s account adds up, the FBI’s inside man may very well have come close to working with Assange. On his part, Topiary claims that he never received the RSA 128 file.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Personal Information of 123,000 US Government Employees Stolen

Personal Information of 123,000 US Government Employees Stolen
Personal information of over 123,000 federal employees have been exposed after a cyber attack in last July. The cyberattack occurred against a Thrift Savings Plan (TSP) contractor, Serco Inc. The FBI notified both Serco and the TSP last month about the attack. According to the Guardian has called Serco "probably the biggest company you have never heard of." It's on the FTSE 100 (Big!), has 100,000 employees and operates everything from railways in the UK and Australia to driver licensing in Ontario, Canada to retirement accounts for US government employees, members of the armed forces and US Postal Service workers. Perhaps taking advantage of the holiday weekend in the United States, Serco announced this morning that hackers had compromised systems at its Thrift Savings Plan (TSP) operation.
After extensive forensic investigation it was determined that 43,000 members' names, addresses and Social Security Numbers had been accessed by the intruders, and the Social Security Numbers of another 80,000 may have been involved. 
"Serco regrets this incident and the inconvenience it may cause to some Thrift Savings Plan participants and payees whose personal data was involved," said Serco Chairman and CEO Ed Casey in the statement. "We have fortified our information security measures and cyber defenses."
Further information has been published that shows the original intrusion into Serco's system occurred in July 2011. Information that was accessed has been available to criminals for nearly a year before Serco was notified by the FBI.


-Source (FOX News & NS)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The Pirate Bay Criticize Anonymous DDoS Attack on Virgin Media

The Pirate Bay Criticize Anonymous DDoS Attack on Virgin Media
 
Earlier in this month High Court has ruled to block The Pirate Bay in U.K. In action hacker collective Anonymous performed massive denial of service attack which targeted Virgin Media - one of those ISP who immediately followed the Court order and blocked Pirate Bay. It is said that the denial of service attack was simply a tit for tat as Virgin Media is the 1st ISP who instantly followed the High Court order while saying- "As a responsible ISP, Virgin Media complies with court orders addressed to the company but strongly believes that changing consumer behaviour to tackle copyright infringement also needs compelling legal alternatives, such as our agreement with Spotify, to give consumers access to great content at the right price." And this make Anonymous angry with Virgin and as a result they sent Virgin Media offline for a certain time. 
But here comes a twist and that is The Pirate Bay has denounced an Anonymous DDoS campaign that took down Virgin Media, calling it an "ugly" method that's no better than the UK court order for ISPs to block users from getting to The Pirate Bay. 

In their official statement TPB said - "Seems like some random Anonymous groups have run a DDOS campaign against Virgin media and some other sites. We'd like to be clear about our view on this:
We do NOT encourage these actions. We believe in the open and free internets, where anyone can express their views. Even if we strongly disagree with them and even if they hate us. So don't fight them using their ugly methods. DDOS and blocks are both forms of censorship.
If you want to help; start a tracker, arrange a manifestation, join or start a pirate party, teach your friends the art of bittorrent, set up a proxy, write your political representatives, develop a new p2p protocol, print some pro piracy posters and decorate your town with, support our promo bay artists or just be a nice person and give your mom a call to tell her you love her."
As far as the Anonymous DDoS goes, Virgin Media put out a statement that said the attack lasted one hour. Virgin Media also reiterated that it didn't have a choice to block The Pirate Bay; rather, the government forced its hand.


-Source (NS)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hackers Breached The Security System of Ministry of Defence (MoD)

Hackers Breached The Security System of Ministry of Defence (MoD) 

Couple of days ago we have seen  Serious Organised Crime Agency (SOCA) had become the victim of denial of service attack. And now its the turn of MoD. The military's head of cyber-security has revealed that hackers have managed to breach some of the top secret systems within the Ministry of Defence (MoD). Major General Jonathan Shaw told - "The number of serious incidents is quite small, but it is there," he said. "And those are the ones we know about. The likelihood is there are problems in there we don't know about." Government computer systems come under daily attack, but though Shaw would not say how or by whom, this is the first admission that the MoD's own systems have been breached.
A former director of UK special forces, Shaw, 54, said he thought the military could learn a trick or two from firms such as Facebook. The company has a "white hat" programme in which hackers are paid rewards for informing them when they have found a security vulnerability.
Nine people in the UK have been paid a total of $11,000 for working with Facebook. Shaw said this was the kind of "waacky idea we need to bring in".
Shaw has spent the last year reviewing the MoD's approach to cyber-security, and the kind of cyber-capability the military will need in the future.
He says next year's MoD budget is expected to include new money for cyber-defence – an acknowledgment that even during a time of redundancies and squeezed budgets, this is now a priority.
The general said the MoD wasn't "doing badly … but we could do a hell of a lot better. We will get there, but we will have to do it fast. I think it was a surprise to people this year quite how vulnerable we are, which is why the measures have survived so long in the [budget] because people have become aware of the vulnerabilities and are taking them seriously." 
Shaw said the number of attacks was "still on an upward curve … and the pace of change is unrelenting". In his last interview before retiring, Shaw said the UK had to develop an array of its own cyber-weapons because it was impossible to create entirely secure computer systems.



-Source (Guardian)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Threatened to Target British Surveillance Agency GCHQ

Anonymous Threatened to Target  British Surveillance agency GCHQ
Few weeks ago Anonymous performed massive denial of service attack to bring down British Prime Minister’s Office, Home Office & Ministry of Justice. In that attack they have declared that such scenario will be repeated on every Saturday. Here again hacker collective Anonymous threatened to continue cyber attacks on government websites again this weekend, this time they are specially focusing in on British surveillance agency GCHQ. A member of the group made a statement via Twitter (@Anon_central). The planned assault come after a recent spate of DoS attacks on UK government websites over the past few weekends. The attacks are part of the group’s “Operation Trial At Home”, which is protesting against the UK government’s extradition treaties with the US, which it sees as unfair.
“#Anonymous #OpTrialAtHome Plan #DDoS on GCHQ on Saturday 21st April at 8pm BST & 3pm EDT,” Anonymous said in a tweet. “@AnonAteam is asking all Anons to fire lazers at http://ghcq.gov.uk.” It said it supports three British citizens involved in extradition to the US: Gary McKinnon, wanted for seven counts of hacking NASA and Pentagon computers; Richard O’Dwyer, alleged to have infringed copyright in the US and Christopher Tappin, wanted in the US for alleged arm dealing. 






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Engaged Cyber Attack To Bring Down British Prime Minister’s Office, Home Office & Ministry of Justice

Anonymous Engaged Massive Cyber Attack To Bring Down British Prime Minister’s Office, Home Office & Ministry of Justice 
 
One of the official twitter account of hacker collective Anonymous warned that they will engage cyber attack against the Govt of UK on 4th of April. The tweet said:- "EXPECT a DDOS (Distributed Denial of Service) every Saturday on the UK Government sites." As expected it happens hacktivist performs massive denial of service attacks multiple U.K. government websites over the country’s “draconian surveillance proposals” and “derogation of civil rights.” At the time of writing, the following websites are down: homeoffice.gov.uk (Home Office), number10.gov.uk (10 Downing Street - British Prime Minister’s Office), and justice.gov.uk (Ministry of Justice). A message on the site said the page was currently unavailable homeoffice.gov.uk "due to a high volume of traffic", suggesting a denial of service attack had been perpetrated. A message on Twitter claiming to be from Anonymous, a loosely organised group of hackers, said the action was "for your draconian surveillance proposals". The apparent attack came after it emerged last week that the Government was planning a massive expansion of its powers to monitor the email exchanges and website visits of every person in the UK. Under legislation expected in next month's Queen's Speech, internet companies will be instructed to install hardware enabling GCHQ - the Government's electronic "listening" agency - to examine "on demand" any phone call made, text message and email sent, and website accessed, in "real time" without a warrant.
A Home Office spokesman said: "We are aware of some reports that the Home Office website may be the subject of an online protest. We have put all potential measures in place and will be monitoring the situation very closely." The Home Office added that if a successful denial of service attempt did occur tonight, it would "liaise with the technical team and update as necessary".


-Source (The Huffington Post & BBC)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

GCHQ Awarded 8 UK Universities “Academic Centre of Excellence in Cyber Security Research”

GCHQ Awarded 8UK Universities “Academic Centre of Excellence in Cyber Security Research”
UK is putting more attention on cyber-security. Last Monday GCHQ, the UK's signals intelligence organisation, awarded eight UK universities the 'Academic Centre of Excellence in Cyber Security Research', laying the ground for deeper relationships between the institutions and the government agency. These top eight universities of UK will work closely with GCHQ as centres of excellence for cybersecurity research.
According to GCHQ official release:-
The first eight UK universities conducting world class research in the field of cyber security have been awarded “Academic Centre of Excellence in Cyber Security Research” status by GCHQ in partnership with the Research Councils’ Global Uncertainties Programme (RCUK) and the Department for Business Innovation and Skills (BIS). We hope other universities will also become Centres in the near future as part of an ongoing process.
The Centres of Excellence will benefit the UK by:
  • Enhancing the UK’s cyber knowledge base through original research
  • Providing top quality graduates in the field of cyber security
  • Supporting GCHQ’s cyber defence mission
  • Driving up the level of innovation
  • The Centres of Excellence will help make the UK government, business and consumers more resilient to cyber attack by extending knowledge and enhancing skills in cyber security.
The eight Universities chosen as Centres of Excellence in Cyber Security Research are:
  • University of Bristol    
  • Imperial College London
  • Lancaster University    
  • University of Oxford
  • Queen’s University Belfast    
  • Royal Holloway, University of London
  • University of Southampton    
  • University College London
These Centers will be the first to attain Academic Centre of Excellence in Cyber Security Research status and will benefit from:
  • Closer collaboration with GCHQ, the UK Cyber Community and industry
  • Partnership endorsement in associated publications and prospectuses
  • Better understanding of Government and industrial cyber issues
  • Helping to formulate the future Cyber Security research agenda
  • Extra funding opportunities and £50,000 capital investment
Francis Maude, the minister for cybersecurity, said "These first eight centers will play a vital role in boosting research, expanding our cyber skills base and fostering innovation in the field" He added "We want to make the UK one of the most secure places in the world to do business, by investing in the best expertise to keep pace with technological change." The centres will open for business on 1 July 2012 for five years, during which time GCHQ hopes other universities will beef up their cybersecurity capabilities to meet the criteria for being recognised as centres of excellence.


-Source (GCHQ)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...