Showing posts sorted by date for query top secret. Sort by relevance Show all posts
Showing posts sorted by date for query top secret. Sort by relevance Show all posts

Twitter & Yahoo Tightening Their Security to Prevent Eavesdropping of NSA

Twitter & Yahoo Tightening Their Security to Prevent Eavesdropping of NSA & Other Govt Agencies 
Last month a untold and sensational story came to light, when the whistle blowers Edward Snowden unveiled one of the top secret program of NSA called called “Muscular” Former NSA contractor Snowden himself disclosed that the National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world in order to collect and snoop the private data of millions of internet users. NSA’s acquisitions directorate sends millions of records every day from internal Yahoo and Google networks to data warehouses at the agency’s headquarters at Fort Meade, Md. In the preceding 30 days, the report said, field collectors had processed and sent back 181,280,466 new records including “metadata,” which would indicate who sent or received e-mails and when, as well as content such as text, audio and video. Both Yahoo & Google said that they had never gave access to nay Govt agency to their data centers. Yahoo spokeswoman said, “We have strict controls in place to protect the security of our data centers, and we have not given access to our data centers to the NSA or to any other government agency.” Google’s chief legal officer, David Drummond said “We are outraged at the lengths to which the government seems to have gone to intercept data from our private fiber networks, and it underscores the need for urgent reform,” 

But the matter of fact is that NSA has indeed sniffed the personal & private communication of million internet users of tech giants like Yahoo and Google. To get rid of this kind of privacy breach, now the tech giants who hold the personal record and credential of mass, are tightening and enhancing their existing security system. According to Marissa Mayer, CEO of Yahoo "We’ve worked hard over the years to earn our users’ trust and we fight hard to preserve it." Yahoo also says it will encrypt all information moving between its data centers by the end of the first quarter, and it will work on getting international partners to enable HTTPS encryption in Yahoo-branded Mail services.Yahoo says it will give users an option to encrypt all data flow to and from Yahoo. "Yahoo has never given access to our data centers to the NSA or to any other government agency ever. There is nothing more important to us than protecting our users’ privacy. To that end, we recently announced that we will make Yahoo Mail even more secure by introducing https (SSL - Secure Sockets Layer) encryption with a 2048-bit key across our network by January 8, 2014." added Marissa Mayer.

Not only Yahoo, but the social networking giant Twitter, who have registered users of almost 550 million with an active user of 250 million across the globe has also taken immediate steps after this breathtaking story of spying by NSA get the spot light. Twitter is implementing new security measures that should make it much more difficult for anyone to eavesdrop on communications between its servers and users. The entire security mechanism has been taken to tighten the data privacy of its users. According to a blog post of twitter the company has implemented "perfect forward secrecy" on its Web and mobile platforms, which made eavesdropping almost impossible. "As part of our continuing effort to keep our users’ information as secure as possible, we’re happy to announce that we recently enabled forward secrecy for traffic on twitter.com, api.twitter.com, and mobile.twitter.com. On top of the usual confidentiality and integrity properties of HTTPS, forward secrecy adds a new property. If an adversary is currently recording all Twitter users’ encrypted traffic, and they later crack or steal Twitter’s private keys, they should not be able to use those keys to decrypt the recorded traffic." -said the blog post.

While talking about Muscular program of NSA, we would also like to remind you that couple weeks ago we came to know about 'Royal Concierge' another secret program of GCHQ & NSA to spy foreign diplomats through hotel bookings uncovered by Edward Snowden.

-Source (CIO & PC World) 


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

'Royal Concierge' Secret Program of GCHQ to Spy Foreign Diplomats Through Hotel Bookings Unveiled By Edward Snowden

'Royal Concierge' Secret Program of GCHQ to Spy Foreign Diplomats By Hotel Bookings Unveiled By Edward Snowden

Edward Snowden the American whistle blowers who is currently living in Russia under temporary asylum, after Snowden is considered a fugitive by American authorities who have charged him with espionage and theft of government property  yet again uncovered what it called sensational information. This time he unfold a top secret program of Britain's GCHQ intelligence agency & US National Security Agency (NSA). In which they infiltrated the reservation systems of around 350 luxury hotels popular among diplomats and government officials with the help of a sophisticated program code-named "Royal Concierge" Royal Concierge designed to keeps tabs on foreign diplomats by monitoring their hotel bookings. This can include monitoring a hotel room and its guest by wiretapping the telephone and fax machine, gaining access to computers hooked up to the hotel network, or eavesdropping on the diplomat in the hotel bar. This surveillance program, uses a logo with a penguin -- meant to stand for the black and white uniforms worn by staff at top hotels -- wearing a crown, a purple cape and holding a wand. The top secret program automatically checked whether the e-mail address of a visitor on the hotel booking system matched with the address of his government and with this information the GCHQ could take the necessary steps to bug the concerned hotel room, to tap its telephones or to eavesdrop into the electronic data transfer, the news weekly said. Snowden said GCHQ has been using the search and analyse program for more than three years to track diplomats and government officials among hotel guests. 

The above breathtaking information first came on a German magazine 'Der Spiegel' on Sunday. And this exciting leaks been provided by former US intelligence contractor Edward Snowden. After this lurid information came to light, press asked questions to GCHQ, in response an official of GCHQ said "We are not going to comment on this report". But the entire conversation with Der Spiegel reporter with GCHQ officials came to the conclusion of GCHQ "neither confirms nor denies the allegation". On th other hand Britain's top spy chiefs reacted angrily to leaks by Snowden, a fugitive former analyst for the US National Security Agency, in an appearance this month before a parliamentary committee. Denying Britons were under mass surveillance, the heads of the foreign spy agency MI6, the domestic intelligence service MI5 and GCHQ warned that al-Qaeda and other enemies were "lapping up" intelligence revelations by Snowden and using them to change the way they operate.


-Source (AFP, News 24)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

'The Secret Files'- Hackers Exposed Personal Details of Celebrities, Public Figure, FBI Director & National Leaders

'The Secret Files'- Hackers Exposed Personal Details of Celebrities, Public Figure, FBI Director & National Leaders 

Yet again celebrities fallen victim to cyber attack, no this time not the nude photo but confidential personal information. Renowned public figure, national leaders, celebrities like Kim Kardashian, US Vice President Joe Biden, Hillary Clinton, Mel Gibson, Michelle Obama, Ashton Kutcher, Jay Z, Beyoncé, Paris Hilton, Britney Spears, Sarah Palin, Hulk Hogan, Donald Trump and Arnold Schwarzenegger together became prey. The list does not end here, the hacker catches two more big fishes in his net and they are head of the Los Angeles police force Charlie Beck and FBI Director Robert Mueller. Many of you might be astonished of how such big public figure, including Vice President, FBI Director became victim in single round of cyber attack! Let me tell you what exactly happened- the hacked data dubbed "The Secret Files" by the hackers contains personal information and credit reports (including social security numbers, details of their mortgages, addresses, and details of their credit card and banking details) was made public by those hackers on a new website, as shown in the picture below. 

The hacker left a message or in other word a satire while saying "The Secret Files - If you believe that God makes miracles, you have to wonder if Satan has a few up his sleeve." Such hack, is very rare, where numbers of big fish get caught. The nature of this hack can be categorized as a clear identity theft. But the question is how? Well the answer is some of the United States' top credit bureaus have come forward and acknowledged that fraudulent and unauthorized access to the records of well-known figures have taken place. Most of the reports were apparently obtained from one of the three major U.S. credit ratings agencies Equifax, TransUnion and Experian — via a special Internet portal they maintain for the public to check their own credit ratings. All three companies have said that some of their reports had been fraudulently accessed since Monday by someone using personal data about the victims. Security experts said that suggests the attack is a “social hack” rather than a classic cyber security data breach


-Source (Sophos & WT)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

WikiLeaks Tweet Revealed- Aaron Swartz Was an Ally & Possible Source of WikiLeaks

WikiLeaks Tweet Revealed- Aaron Swartz Was an Ally & Possible Source of WikiLeaks 

WikiLeaks, the organization who used to dig the truth and bring them in front, has disclosed a sensational matter while saying that the late internet activist and renowned hacker Aaron Swartz who committed suicide a few weeks ago was possibly an active worker and source for WikiLeaks

Over the weekend, in a series of tweets, WikiLeaks said that activist and hacker Swartz, who committed suicide earlier this month while awaiting trial on computer fraud charges, "assisted" the organization and "was in communication with Julian Assange, including during 2010 and 2011,"  

Unfortunately those tweets did not go so far as to name Swartz as a WikiLeaks source, only saying, "We have strong reasons to believe, but cannot prove, that" he was. 

WikiLeaks -globally famous for exposing classified classified and top secrete documents of several government said it decided to reveal these details in light of the US Secret Service's involvement in Swartz's  case. At the time of his death, Swartz was awaiting trial for allegedly harvesting millions of scholarly articles over the Massachusetts Institute of Technology's network. He was charged with computer fraud and other crimes in July 2011, and faced up to 35 years in prison. 
Although WikiLeaks doesn't elaborate on its decision, the organization has a policy of maintaining anonymity for its sources. "As far as we can ascertain, WikiLeaks has never revealed any of its sources," according to its website. "We cannot provide details about the security of our media organization or its anonymous drop box for sources because to do so would help those who would like to compromise the security of our organization and its sources."  But after these round of tweets we can say that Wikileaks may have broken its own rules of anonymity by doxxing (removing the anonymity) of Swartz as an ally and possible source. 






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Ministry of Defense Argentina Hacked By LulzSec Peru, Sensitive Information (Aircraft, Submarines, Weapons) Leaked

Ministry of Defense Argentina Hacked By LulzSec Peru, Sensitive Information (Aircraft, Submarines, Weapons) Leaked

A hacktivist group claiming to be the part of infamous LulzSec, targeted the official website of Argentinian Ministry of Defense. This round of cyber attack taken sensitive data from Ministry of Defense server, along with that the index page also get defaced by the hacker group calling them selves 'LulzSec Peru'. The leaked data, allegedly said “top secret” documents from the ministry’s systems has been posted on AnonPaste. The total leak is almost 100 megabytes in size, contains information on submarines, radars and weapons. It also contains user details such as usernames, passwords, the names of officials and other sensitive information. The release on AnonPaste also did satire of the cyber security system of Argentinian Ministry while saying "According to statements by the DEPARTMENT OF ARGENTINA DEFENSE the computer systems area say they had a system impossible to hack, thing turned otherwise. The event should not be taken as terrorism, was for the simple fact to prove that the system was totally vulnerable. The documents contain highly sensitive material rated SECRET (aircraft, submarines, guns)..."
As per sources the data dump, leaked by the hacker was indeed stolen from Ministry's system, also the deface mirror on Zone-H is showing that the official website was indeed hacked and defaced. Though the officials of Argentinian Ministry did not commented about this incident. After the hack was spotted on the wild, the authorities restored their system, and the website came back to its normal format very soon. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NSA Refused to Disclose Obama's Secret Cyber Security Directive

NSA Refused to Disclose Obama's Secret Cyber Security Directive

The cyber security directive of United States President Barack Obama has been twisted a little as the National Security Agency (NSA) has refused to release details of a secret presidential directive document that would establish a broader set of standards that would guide federal agencies in confronting Cyber threats. Several experts are presuming that the cyber security directive could allow the military and intelligence agencies to operate on the networks of private companies, such as Google and Facebook. According to the last week report by Washington Post, cited several U.S. officials saying that Obama signed off on the secret cyber security order, believed to widely expand NSA’s spying authorities, in mid-October. “The new directive is the most extensive White House effort to date to wrestle with what constitutes an “offensive” and a “defensive” action in the rapidly evolving world of cyber war and cyber terrorism,” the report states.  
The Electronic Privacy and Information Center (EPIC), filed a Freedom of Information Act (FOIA) request to make the document public because it said the measure could expand NSA’s Cyber security authority. “Transparency is crucial to the public’s ability to monitor the government’s national security efforts and ensure that federal agencies respect privacy rights and comply with their obligations under the Privacy Act,” said EPIC’s request.
EPIC said that NSA denied the request on Nov. 21 arguing that it doesn’t have to release the document because it is a confidential presidential communication and contains information that is classified “Secret” and “Top Secret” by the agency. NSA said disclosure of the order could “reasonably be expected to cause exceptionally grave damage to the national security.” The agency said EPIC could file an appeal with the NSA/Central Security Service denial and EPIC said it plans to do so. The privacy group said it is litigating similar FOIA requests with NSA, including the release of NSPD 54, a 2008 presidential directive setting out the NSA’s cyber security authority. The group called NSA a “black hole for public information about cyber security” in an official statement to Congress earlier this year. National Security Agency whistle blower William Binney said in Mid July that the U.S. government is secretly gathering information “about virtually every U.S. citizen in the country”, in “a very dangerous process” that violates Americans’ privacy.
Former President George W. Bush signed a presidential order in 2002 allowing the National Security Agency (NSA) to monitor without a warrant the international (and sometimes domestic) telephone calls and e-mail messages of hundreds or thousands of citizens and legal residents inside the United States. The program eventually came to include some purely internal controls -- but no requirement that warrants be obtained from the Foreign Intelligence Surveillance Court as the 4th Amendment to the Constitution and the foreign intelligence surveillance laws require.



-Source (GSN Magazine & Press TV)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The US military Calls Julian Assange & WikiLeaks 'Enemy of State'


The US military Calls Julian Assange & WikiLeaks 'enemy of state'

The US military has designated Julian Assange and WikiLeaks as enemies of the United States - the same legal category as the al-Qaeda terrorist network and the Taliban insurgency. Declassified US Air Force counter-intelligence documents, released under US freedom-of-information laws, reveal that military personnel who contact WikiLeaks or WikiLeaks supporters may be at risk of being charged with "communicating with the enemy", a military crime that carries a maximum sentence of death. The documents, some originally classified "Secret/NoForn" - not releasable to non-US nationals - record a probe by the air force's Office of Special Investigations into a cyber systems analyst based in Britain who allegedly expressed support for WikiLeaks and attended pro-Assange demonstrations in London. The counter-intelligence investigation focused on whether the analyst, who had a top-secret security clearance and access to the US military's Secret Internet Protocol Router network, had disclosed classified or sensitive information to WikiLeaks supporters, described as an "anti-US and/or anti-military group".
The suspected offence was "communicating with the enemy, 104-D", an article in the US Uniform Code of Military Justice that prohibits military personnel from "communicating, corresponding or holding intercourse with the enemy". The analyst's access to classified information was suspended. However, the investigators closed the case without laying charges. The analyst denied leaking information. Mr Assange remains holed up in Ecuador's embassy in London. He was granted diplomatic asylum on the grounds that if extradited to Sweden to be questioned about sexual assault allegations, he would be at risk of extradition to the US to face espionage or conspiracy charges arising from the leaking of hundreds of thousands of secret US military and diplomatic reports.
US Vice-President Joe Biden labelled Mr Assange a "high-tech terrorist" in December 2010 and US congressional leaders have called for him to be charged with espionage. Sarah Palin and Mike Huckabee - both once involved in presidential campaigns - have both urged that Mr Assange be "hunted down".
Mr Assange's US attorney, Michael Ratner, said the designation of WikiLeaks as an "enemy" had serious implications for the WikiLeaks publisher if he were to be extradited to the US, including possible military detention. US Army private Bradley Manning faces a court martial charged with aiding the enemy - identified as al-Qaeda - by transmitting information that, published by WikiLeaks, became available to the enemy. Mr Ratner said that under US law it would most likely have been considered criminal for the US Air Force analyst to communicate classified material to journalists and publishers, but those journalists and publishers would not have been considered the enemy or prosecuted.
"However, in the FOI documents there is no allegation of any actual communication for publication that would aid an enemy of the United States such as al-Qaeda, nor are there allegations that WikiLeaks published such information," he said.
"Almost the entire set of documents is concerned with the analyst's communications with people close to and supporters of Julian Assange and WikiLeaks, with the worry that she would disclose classified documents to Julian Assange and WikiLeaks. "It appears that Julian Assange and WikiLeaks are the 'enemy'. An enemy is dealt with under the laws of war, which could include killing, capturing, detaining without trial, etc."










SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

FBI Used LulzSec To Track & Spy on Wikileaks Founder Julian Assange

FBI Used LulzSec To Track & Spy on Wikileaks Founder Julian Assange

After the inside story of Anonymous former leader Hector Xavier Monsegur aka "Sabu" case get revealed, the world came to know that Sabu was working as an under cover agent of FBI which lead a series of arrest for several key members of hacker collective Anonymous & LulzSec. Now we got another twist which came from a new book written by Parmy Olson, the London bureau chief for Forbes Magazine, saying that FBI used an agent inside the LulzSec hacker group to track and spy on Wikileaks founder Julian Assange. According to the book, an associate of WikiLeaks contacted LulzSec spokesman Topiary on June 16 hours after the assault on the CIA. The two would eventually converse over an Internet Relay Chat channel that was reported to be witnessed by Assange, who confirmed his identity by providing a video to the hacker in real time during their chat. For a few weeks, writes Olson, Assange and/or his associate returned to the LulzSec IRC channel “four or five more times,” during which others occasionally engaged in conversation with both sides. During at least one of those conversations, Assange’s contact at WikiLeaks offered LulzSec a spreadsheet of classified government data contained in a file named RSA 128, which she says was heavily encrypted and needed the manpower of black hat hacktivists to decode.
According to an exclusive report of RT - Aside from a few unsealed court documents, details about the now-defunct hacktivism group LulzSec remains few and far between. One journalist is saying she got inside the organization though — along with Julian Assange.
“We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency” is an upcoming book from Parmy Olson, the London bureau chief for Forbes Magazine. And although her alleged account has not yet hit the shelves, a lengthy excerpt has been leaked to the Web — and its contents suggest that that the world’s once most powerful hacking collective was in correspondence with WikiLeaks founder Julian Assange after he allegedly reached out to the organization for assistance. The US government says that they had already infiltrated LulzSec by then, though, meaning that WikiLeak’s plea to the hacking collective was actually being offered to an FBI mole.
According to Olson, the June 2011 attack on the public website of the US Central Intelligence Agency by LulzSec caught the attention of Assange, who was residing in the countryside manor of an English journalist while on house arrest.Once he saw that a LulzSec-led invasion had crippled CIA.gov, Assange allegedly sent out two tweets from the WikiLeaks Twitter account, only to delete the micomessages shortly after:
"WikiLeaks supporters, LulzSec, take down CIA . . . who has a task force into WikiLeaks," read one."CIA finally learns the real meaning of WTF” reads the other.
Assange “didn't want to be publicly associated with what were clearly black hat hackers” writes Olson, speaking of computer compromisers who target network for perhaps no real intention other than mischief making. “Instead, he decided it was time to quietly reach out to the audacious new group that was grabbing the spotlight,” she says. Olson says that one of those hackers aware the newfangled relationship was Hector Xavier Monsegur, who spearheaded LulzSec by serving as a leader of sorts under the handle Sabu. Perhaps unbeknownst to all engaged in the IRC chats, however, was that Sabu had been arrested on June 7 and, according to the federal government, began immediately working as an FBI informant.
"Since literally the day he was arrested, the defendant has been cooperating with the government proactively," Assistant US Attorney James Pastore said at a secret bail hearing on August 5 2011, according to a transcript released this March after his arrest was made public.
While details of Sabu’s escapades under the direct influence of the FBI are obviously being kept confidential, federal attorneys have said that the hacker more or less masterminded the group under their command until LulzSec dissolved on June 25; Jake Davis — Topiary — was arrested in the UK on August 1. If Olson’s allegations add up, that could mean that the FBI’s top-secret informant, Sabu, was speaking directly with America’s cyber-enemy number one: Julian Assange.
On Wednesday this week, the UK Supreme Court agreed to extradite Assange to Sweden, where he is facing a lawsuit unrelated to his involvement with WikiLeaks. Once there, however, the United States may be able to more easily fight to have him sent stateside to be charged with aiding the enemy — the crime being pegged to alleged WikiLeaks contributor Bradley Manning, who now faces life in prison for that involvement. The uncertainty of who exactly conversed with whom might be near impossible to confirm given the widespread anonymity of hacktivists tied with LulzSec and Anonymous alike, but if Olson’s account adds up, the FBI’s inside man may very well have come close to working with Assange. On his part, Topiary claims that he never received the RSA 128 file.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hackers Breached The Security System of Ministry of Defence (MoD)

Hackers Breached The Security System of Ministry of Defence (MoD) 

Couple of days ago we have seen  Serious Organised Crime Agency (SOCA) had become the victim of denial of service attack. And now its the turn of MoD. The military's head of cyber-security has revealed that hackers have managed to breach some of the top secret systems within the Ministry of Defence (MoD). Major General Jonathan Shaw told - "The number of serious incidents is quite small, but it is there," he said. "And those are the ones we know about. The likelihood is there are problems in there we don't know about." Government computer systems come under daily attack, but though Shaw would not say how or by whom, this is the first admission that the MoD's own systems have been breached.
A former director of UK special forces, Shaw, 54, said he thought the military could learn a trick or two from firms such as Facebook. The company has a "white hat" programme in which hackers are paid rewards for informing them when they have found a security vulnerability.
Nine people in the UK have been paid a total of $11,000 for working with Facebook. Shaw said this was the kind of "waacky idea we need to bring in".
Shaw has spent the last year reviewing the MoD's approach to cyber-security, and the kind of cyber-capability the military will need in the future.
He says next year's MoD budget is expected to include new money for cyber-defence – an acknowledgment that even during a time of redundancies and squeezed budgets, this is now a priority.
The general said the MoD wasn't "doing badly … but we could do a hell of a lot better. We will get there, but we will have to do it fast. I think it was a surprise to people this year quite how vulnerable we are, which is why the measures have survived so long in the [budget] because people have become aware of the vulnerabilities and are taking them seriously." 
Shaw said the number of attacks was "still on an upward curve … and the pace of change is unrelenting". In his last interview before retiring, Shaw said the UK had to develop an array of its own cyber-weapons because it was impossible to create entirely secure computer systems.



-Source (Guardian)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#OpRobinHood By TeaMp0isoN & Anonymous, Thousands Of User Data Stolen From United Nations Server


Hacktivist Anonymous is now teamed up with another hacker group named TeaMp0isoN for their latest campaign Operation RobinHood (#OpRobinHood). As a result more than 1,000 usernames and passwords stolen from a United Nations server. TeamPoison and Anonymous posted an announcement while threatening a series of data breaches and robberies against major banks under the name Operation Robin Hood, which the two groups describe as a continuation of the Occupy Movement protests begun in New York two months ago. 
As a way to strike back against "the banks," TeamPoison and Anonymous will take from the rich and give to the poor through some kind of ill-defined credit-card scam, though it's not clear if the credit cards being targeted will belong to "the banks" or whether Anonymous and TeamPoison plan to make fraudulent charges on consumer credit cards that will indirectly punish the banks backing those cards. 
The stolen username and passwords from the United Nations server was openly posted on a pastebin, later it was removed for violence. 

Anonymous & TeaMp0isoN Official Press Release:-

"#OpRobinHood: TeaMp0isoN and Anonymous 
Hello, we are p0isAnon. Anonymous and TeaMp0isoN have joined forces to fight censorship in the name of OpCensorThis. There is a new operation that has been taking place over the actions of Banks in response to the Occupy Movement. We have watched our brothers and sisters being refused their hard earned money by the banks on top of being beaten and brutalized by officers during peaceful demonstrations. Congratulations banks, you have gotten our attention. 
You ignore your customers and use authorities to censor their voices. Operation Censor This will not stand for such acts and is spawning another operation under Operation Cash Back which already removed well over 500,000 accounts from banks and put them into credit unions. This is the next step. Banks have stolen millions from its customers as well as lacked the security to protect them. We give you Operation Robin Hood. 
In regards to the recent demonstrations and protests across the globe, we are going to turn the tables on the banks. Operation Robin Hood is going to return the money to those who have been cheated by our system and most importantly to those hurt by our banks. Operation Robin Hood will take credit cards and donate to the 99% as well as various charities around the globe. The banks will be forced to reimburse the people there money back.
We are going to take what belongs to us. The Banks have thrown people out on the streets with corrupted actions. When the poor steals, it’s considered violence, but when the banks steal from us, it’s called business. 
We have already taken Chase, Bank of America, and CitiBank credit cards with big breaches across the map. We have returned it to the poor (the TRUE 99%) who deserve it. 
We have donated thousands to many protests around the world. We have donated thousands to the homeless and other charities. Our government has fallen short in many ways. It’s time for the people to step up. We are finished depending on our government to do right by us. How safe can the banks be keeping you when we are easily able to steal thousands already. You have the benefit of us being the good guys.
We are not afraid of the Police, Secret Service, or the FBI. We are going to show you banks are not safe and take our money back. We are going to hit the true evil while not harming theirs customers and helping others. We are not only starving the banks but are ready to start the attack. We have come to take the 99% ‘s money back. We are not asking permission. 


Let’s see how Banks like paying out money like they made us do. Is it called stealing when one takes what was theirs in the first place? Is it called stealing elections when banks are funneling our millions into paying off congressmen and lobbyists. It’s time for the banks to pay for their crimes and corruption. We are not waiting for our government to step up and take action. It’s time for the banks to pay for not protecting you and only causing harm. But why feel sorry for them while they make us pay every day? Make us over pay for their services? Make us pay all their little charges? Operation Robin Hood urges YOU, to now move your accounts into secure credit unions, before it’s too late while we hit them from the inside. 
We are going to make the banks deliver your money back to you with a smile on their faces and hate in their heart. The only fraud happening has been the actions of the banks frauding the people. It’s time for the banks to do business with Anonymous and TeaMp0isoN. And one of us is not as harsh as all of us. We are looking forward to start doing business with you pigs. 
How loud will you squeal when the same is being done to you? We will avenge every person banks turned down and stolen from. Join us in Operation Robin Hood. Take from the banks and give to the poor. Our actions will be swift. It’s time for the people to rise up and the banks to remember who they work for. It’s time we fight back. It’s time YOU take back your freedom. We are done asking politely.
Banks, you have got the attention of the Hydra of the internet that has grown fangs of poison. 
The only question now, is do they expect us? 


We are p0isAnon
We are Robin Hood
We are Legion
We do not forgive
We do not forget
Expect us.


Operation Robin Hood… fully initiated."








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Fin Bank of Nigeria Hacked By Hitcher (Database Compromised)


Official website of Fin Bank of Nigeria Hacked and defaced by Pakistani hacker Hitcher. He also hacked into the Databse of the Bank and exposed lots of top secret documents.

Hacked Site:-
http://www.finbank.com.ng/newhitcher.html
Mirror Link:-
http://legend-h.org/mirror/224188/finbank.com.ng/newhitcher.html

To download the Hacked DB Click Here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Team Ghost Exposed Secrete Documents of DOD, NATO, NSA, Home Land Security & Many More


The team "Ghosts" uploaded a .Zip file containing files from Government, Military, DOD, NSA, Homeland security, NATO and many more organizations. The download itself contained 27 PDF Files, 13 Microsoft Word Files, 1 ppt File and a Text file.
The text file contains 130+ login details  for a website that had been infiltrated an hour beforehand.
www.Westdorset.org.uk

The download contained information such as forms, Top secret cover sheets and restricted and classified information about the organisation.

To download the secrete file uploaded by  Ghost click Here

Twitter Page of Team Ghost:- https://twitter.com/BlackHatGhosts
FB Page of Team Ghost:- http://www.facebook.com/TeamGhosts

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Advanced Encryption Standard (AES) Cracked


AES stands for Advanced Encryption Standard. It is a specification for the encryption of electronic data. It was first implied by US government. Today its is used to secure the top-secret government documents to online banking transactions. Recently cryptographers have discovered a way to break this encryption. The technique was revealed in Crypto 2011 cryptology conference in Santa Barbara, California.

The research is the combine work of Mr. Andrey Bogdanov of Katholieke Universiteit Leuven,Mr. Dmitry Khovratovich of Microsoft and Mr. Christian Rechberger of Ecole Normale Superieure

In this technique, the attacker is allowed to recover AES secret keys up to five times faster than previously possible. It introduces a tact known as biclique cryptanalysis to remove about two bits from 128-, 192-, and 256-bit keys. This research is groundbreaking as it is the first method of breaking single-key AES that is faster than brute force. 

To download the Research Paper Click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NSA (National Security Agency) is Searching For Good Hackers

 
The National Security Agency has a challenge for hackers who think they’re hot stuff: Prove it by working on the “hardest problems on Earth.”
Computer hacker skills are in great demand in the U.S. government to fight the cyberwars that pose a growing national security threat — and they are in short supply.

For that reason an alphabet soup of federal agencies — DOD, DHS, NASA, NSA — are descending on Las Vegas this week for Defcon, an annual hacker convention where the $150 entrance fee is cash only — no registration, no credit cards, no names taken. Attendance is expected to top 10,000.
The NSA is among the keen suitors. The spy agency plays offence and defence in the cyberwars. It conducts electronic eavesdropping on adversaries, and it protects U.S. computer networks that hold super-secret material — a prime target for America’s enemies.

“Today it’s cyberwarriors that we’re looking for, not rocket scientists,” said Richard “Dickie” George, technical director of the NSA’s Information Assurance Directorate, the agency’s cyber-defense side.

“That’s the race that we’re in today. And we need the best and brightest to be ready to take on this cyberwarrior status,” he told Reuters in an interview.
The NSA is hiring about 1,500 people in the fiscal year, which ends Sept. 30, and another 1,500 next year, most of them cybersecurity experts. With a workforce of about 30,000, the Fort Meade-based NSA dwarfs other intelligence agencies, including the CIA.
It also engages in cyber-spying and other offensive operations, something it rarely, if ever, discusses publicly.
But at Defcon, the NSA and other “Feds” will be competing with corporations looking for hacking talent.
The NSA needs cybersecurity experts to harden networks, defend them with updates, do “penetration testing” to find security holes and watch for signs of cyberattacks.
The NSA is expanding its fold of hackers, but George said there is a shortage of those skills. “We are straining to hire the people that we need.”


It might seem to be an odd-couple fit — strait-laced government types with their rules and missions trying to recruit hackers who by definition want to defy authorities.
George said the NSA is an environment where the hacker mind-set fits with “a critical mass of people that are just like them.”
But what about culture rifts?
“When I walk down the hall there are people that I see every day and I never know what color their hair’s going to be,” George said. “And it’s a bonus if they’re wearing shoes. We’ve been in some sense a collection of geeks for a long, long time.”
The agency has long been known for its brilliant, but sometimes eccentric, mathematicians and linguists.
Jeff Moss, a hacker known as Dark Tangent, knows something about bridging the two worlds. He founded Defcon and the companion Black Hat conference for security professionals and is now a member of the Department of Homeland Security’s Advisory Council, which advises the government on cybersecurity.
“They need people with the hacker skill set, hacker mind-set. It’s not like you go to a hacker university and get blessed with a badge that says you’re a hacker. It’s a self-appointed label — you think like one or you don’t,” Moss told Reuters.

-News Source (Washington Post)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

ANC Youth League Hacked by ‘Warbird’


Hours after a South African newspaper revealed that the lavish lifestyle of ANC Youth League (ANC YL) president Julius Malema was being bankrolled by a secret trust fund, the organisation’s website has been hacked.
The hack takes the form of a banner across the top of the site and shows a laughing Malema with silhouetted masses gathered behind him. Alongside the picture is the text “HA HA HA I have a 16 Million Rand house [sic]And all of you don’t!!!”. Clicking on the banner directs users to a page of comments in support of the league’s controversial policy of nationalising South Africa’s mines.
The youth wing of South Africa’s ruling party has been beset by internet security issues in recent months. In March this year, a fake post was put on the page claiming that Malema was going to step down as president of the organisation.
At the time of writing, the league had not taken down the banner, nor had it commented on the hack.
The story which prompted the attack had, however, received some attention. A statement on the story suggests that the league views it as part of a series of “continued attempts by sections of the media and right wing political parties to divert attention of the ANC YL and South African society through spread of pathetic lies”.
Alongside hacks like the ones listed above, the ANC YL has a history of mishandling its own online presence.
The most infamous instance of this mishandling arose from its reaction to the existence of a fake Malema twitter account late last year. In an open letter, the league famously threatened to “closer (sic.) Twitter if its administrators are not able to administer reports for violation of basic human rights and integrity”.
In the aftermath of this statement, the number of fake Malema accounts kept growing until it was impossible to tell which, if any, belonged the real Julius Malema and which belonged to the original, fake Julius Malema .

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NATO Said:- Anonymous will be "infiltrated" and "persecuted"


The North Atlantic Treaty Organization contains the combined military might of 28 member countries, including Germany, the United Kingdom, and France. All three of those nations, and the United States, possess huge armies, nuclear weapons, and are committed to Article Five of NATO's charter:
"The Parties agree that an armed attack against one or more of them in Europe or North America shall be considered an attack against them all and consequently they agree that, if such an armed attack occurs, each of them, in exercise of the right of individual or collective self-defence recognised by Article 51 of the Charter of the United Nations, will assist the Party or Parties so attacked."
Yet reading NATO's new draft general report on cyber security, one gets the impression that what the alliance worries about most these days is not an "armed attack," but a cyberattack on its network servers, or the infrastructure of any of its member countries.
"In this Information Age, the North Atlantic Alliance faces a dilemma of how to maintain cohesion in the environment where sharing information with Allies increases information security risks," NATO's Information and National Security survey observes, "but where withholding it undermines the relevance and capabilities of the Alliance."
And WikLeaks and Anonymous get top billing as visible threats to NATO's efforts to control its information perimeters.
"The time it takes to cross the Atlantic has shrunk to 30 milliseconds, compared with 30 minutes for ICBMs and several months going by boat," the report warns. "Meanwhile, a whole new family of actors are emerging on the international stage, such as virtual 'hactivist' groups. These could potentially lead to a new class of international conflicts between these groups and nation states, or even to conflicts between exclusively virtual entities."

The irony of 9/11:-

Authored by Lord Michael Jopling, Rapporteur for NATO, the study begins with an irony. Following the attacks of September 11, 2001 on New York City and Washington, DC, the United States government concluded that one of the reasons that the plot succeeded was because information about its perpetrators wasn't widely shared among US intelligence agencies, especially the Department of Defense, CIA, State Department, and Federal Bureau of Investigation.
And so the US opened up its data sharing practices. This made matter worse, Jopling appears to suggest. It "resulted in an exponential number of people obtaining access to classified information." Over 850,000 functionaries now enjoy some kind of "top-secret" security status, he claims. Many have access to the DoD's Secret Internet Protocol Router Network (SIPRNet), dispenser of embassy cables.
The study cites critics of SIPRNet who say that it lacks the ability to detect unauthorized access. "Thus, those in charge of the network design relied on those who had access to this sensitive data to protect it from abuse. These users were never scrutinized by any state agency responsible for the data-sharing system."
Jopling doesn't explicitly blame this openness policy for WikiLeaks phenomenon, but his narrative leads right into Private Bradley Manning, accused of providing documents for the outfit, prompting the group's famous publication of a continuous stream of State Department cables.
Not surprisingly, he thinks that this is bad:
The Rapporteur believes that even if one is in favour of transparency, military and intelligence operations simply cannot be planned and consulted with the public. Transparency cannot exist without control. The government, and especially its security agencies, must have the right to limit access to information in order to govern and to protect. This is based on the premise that states and corporations have the right to privacy as much as individuals do and that secrecy is required for efficient management of the state institutions and organizations.

Hacktivity:-

A big chunk of the assessment is devoted to the activities of Anonymous, most notably its denial-of-service attacks against PayPal, MasterCard, Visa, and Amazon.com for shutting down financial and server space services to WikiLeaks. Next comes the Anonymous assault on HBGary Federal, which had been planning some methods to take down WikiLeaks and expose Anonymous. It didn't turn out that way, of course. Instead, Anonymous penetrated the security company, erasing data, publishing e-mails, and wrecking its website.
The author seems confident, however, that the notorious group's days are numbered. "It remains to be seen how much time Anonymous has for pursuing such paths," Jopling writes. "The longer these attacks persist the more likely countermeasures will be developed, implemented, the groups will be infiltrated and perpetrators persecuted."
But the larger question hovering over this document is what NATO should do if one of its over two-dozen member nations is cyberattacked. The US has lately been pondering this dilemma as well.
"Certain hostile acts conducted through cyberspace could compel actions under the commitments we have with our military treaty partners," says a White House strategy report published in mid-May. "When warranted, the United States will respond to hostile acts in cyberspace as we would any other threat to our country."
This NATO draft seems to want to go in a similar direction—especially if something on the scale of a Stuxnet malware attack is deployed against a member nation. Designed to penetrate software for industrial equipment, researchers believe that it was originally intended for Iran's nuclear program.
"Some argue that Article 5 should not be applied with respect to cyberattacks because their effect so far has been limited to creating inconvenience rather than causing the loss of human lives and because it is hard to determine the attacker," Jopling notes. "However, The Rapporteur believes that the application of Article 5 should not be ruled out, given that new developments in cyber weapons such as Stuxnet might eventually cause damage comparable to that of a conventional military attack."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Indian army officer's ( ISI Major) email hacked



A serving Inter-Services Intelligence (ISI) officer Major Sameer Ali hacked an Indian Army major's e-mail account in 2010 and extracted many sensitive documents, intelligence sources said. Ali has been named by India in the list of 50 'most wanted' terrorists sheltered by Pakistan for involvement 
in the Mumbai attacks conspiracy,The news of the hacking was given to Indian probe agencies by the FBI, which was then interrogating Mumbai attack accused David Coleman Headley.  The US agency told the CBI Ali had been accessing an Indian Army officer's rediffmail account from the ISI headquarters.
The hacked account was traced to Major Shantanu De of 21 Bihar Regiment, who was at that time posted in the Andamans. De's computer was seized and scrutinised jointly by the Intelligence Bureau, National Investigation Agency and the Military Intelligence.
What was baffling was that his computer and e-mail had more than 4,000 sensitive documents - some of them marked 'secret' and 'top secret'-which he was not supposed to be in possession of, leading to suspicions of espionage on part of Major De.

While the joint investigation cleared De, it came to light how an innocuous posting of his own photograph in uniform in the social networking site Orkut with his various details made him the ISI's target.
He had collected the documents out of interest and also to prepare for his departmental exams that were slated for September 2010.
De has since been demoted after being held guilty of violating the Army's Standard Operating Procedures on cyber security.
Another of Ali's colleague in the ISI, Major Iqbal, who also figures in India's "most wanted" list, was Headley's handler for the ISI.
On April 26, a US court had also chargesheeted Major Iqbal for conspiracy in the 2008 Mumbai terror strike. Iqbal's role has also been confirmed by Headley during his confessions.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...