Als het totaal geen impact heeft, waarom valt het dan onder cybercrime?quote:Op vrijdag 7 december 2012 14:32 schreef Mint_Clansell het volgende:
Die DDOS'jes niet nee, althans niet op de langere termijn.
Dat was ook het punt dat ik wilde maken.quote:Op vrijdag 7 december 2012 14:37 schreef Mint_Clansell het volgende:
Ik had erbij moeten zeggen dat het geen impact heeft op de langere termijn. Het valt onder cybercrime omdat je wel mensen, bedrijven en instanties dupeert.
Waarom hebben we het dan nog steeds over een DDOS uit 2010?quote:Op vrijdag 7 december 2012 14:32 schreef Mint_Clansell het volgende:
Die DDOS'jes niet nee, althans niet op de langere termijn.
quote:Dallas man linked to hacker group Anonymous faces new charges related to Stratfor attack
A Texas man who has described himself as a spokesman for the hacker-activist group Anonymous faces new charges over data stolen from the private intelligence firm Stratfor last Christmas.
Federal prosecutors said Friday that Barrett Brown was indicted on a dozen charges that include aggravated identity theft and device fraud. The 31-year-old Dallas man already was in federal custody after being indicted in October for allegedly making threats on the Internet to an FBI agent.
Brown's attorney, Doug Morris, had no comment on the new charges Friday.
According to the U.S. attorney's office, Brown made public an Internet link providing access to credit card information and other data stolen from Stratfor.
Brown was a de facto spokesman for Anonymous, willing to speak for a movement that prides itself on anonymity.
De Startfor hack was al een tijd terug. Where have you been?quote:Op zaterdag 8 december 2012 00:08 schreef Mint_Clansell het volgende:
Dit gaat dan wel even wat verder dan een simpele ddos-aanval...
quote:
quote:"We left the boxes in the village. Closed. Taped shut. No instruction, no human being. I thought, the kids will play with the boxes! Within four minutes, one kid not only opened the box, but found the on/off switch. He’d never seen an on/off switch. He powered it up. Within five days, they were using 47 apps per child per day. Within two weeks, they were singing ABC songs [in English] in the village. And within five months, they had hacked Android. Some idiot in our organization or in the Media Lab had disabled the camera! And they figured out it had a camera, and they hacked Android."
quote:http://www.twitlonger.com/show/k8vqj0
The World Conference on International Telecommunications – 12 (December 3 - 14)
Call to Activists by Civil Society participants
We, the physical and remote participants at The World Conference on International Telecommunications WCIT12 in Dubai, United Arab Emirates, wish to call the attention of all human rights and technology activists that the recent outage of the ITU website has proved to be of considerable disadvantage to the efforts on the review of the International Telecommunications Regulations - ITRs.
The World Conference on International Telecommunications (WCIT) is a critical event that the Civil Society believes is key in shaping greater connectivity and growth in international telecommunications. The satisfactory functioning of the ITU website, is central to the success of the meeting as it serves as the document repository, primary webcast channel and orientation platform for all participants.
We therefore call on all concerned activists to refrain from any possible disruptions, hacks or attacks on the ITU website and its related domains. Such effort will be counterproductive, and will hugely disenfranchise remote participants.
The Civil Society participation in ITU deliberations is the result of a long and a hard process that requires constructive efforts for improvement.
We invite you to follow remotely on http://www.itu.int/en/wcit-12/Pages/default.aspx
And #WCIT12 on Twitter
Dubai World Trade Center
Dubai, United Arab Emirates
Friday, 7th of December 2012
quote:http://www.anonpaste.me/a(...)VciFy932YEfU3HM06SA=
Here are LEAKED "confidential" PDF documents from private ITU meeting. The recommendations NEVER discuss the impact of DPI.
A FEW EXAMPLES OF POTENTIAL DPI USE CITED BY THE ITU:
"I.9.2 DPI engine use case: Simple fixed string matching for BitTorrent"
"II.3.4 Example “Forwarding copy right protected audio content”"
"II.3.6 Example “Detection of a specific transferred file from a particular user”"
"II.4.2 Example “Security check – Block SIP messages (across entire SIP traffic) with specific content types”"
"II.4.5 Example “Identify particular host by evaluating all RTCP SDES packets”"
"II.4.6 Example “Measure Spanish Jabber traffic”" "II.4.7 Example “Blocking of dedicated games”" "II.4.11 Example “Identify uploading BitTorrent users”"
"II.4.13 Example “Blocking Peer-to-Peer VoIP telephony with proprietary end-to-end application control protocols”"
"II.5.1 Example “Detecting a specific Peer-to-Peer VoIP telephony with proprietary end-to-end application control protocols”"
Download: https://anonfiles.com/file/f42cd5e944e61c5152c8e34fea668606 With love, Stun https://twitter.com/57UN #Anonymous #OpWCIT #FuckITU
With love, Stun https://twitter.com/57UN #Anonymous #OpWCIT #FuckITU
quote:
https://www.unodc.org/doc(...)rrorist_Purposes.pdfquote:Buried in a recent 158-page U.N. report on how terrorists use the Internet is the so-called “protocol of a systematic approach.” The protocol, which was authored by an elite Italian special operations unit called the Raggruppamento, is significant because it has been implemented by authorities across the world, according to the United Nations.
The document outlines the stages law enforcement agencies should go through when conducting electronic surveillance of suspects: first, by obtaining data and “cookies” stored by websites like Facebook, Google, eBay and Paypal; second, by obtaining location data from servers used by VoIP Internet phone services (like Skype); then, by conducting a “smart analysis” of these data before moving on to the most serious and controversial step: intercepting communications, exploiting security vulnerabilities in communications technologies for “intelligence-gathering purposes,” and even infecting a target computer with Trojan-horse spyware to mine data.
Almost without exception, law enforcement agencies around the world refuse to talk publicly about these tactics and how they use them because they say doing so could compromise security. Despite civil liberties groups pushing for more transparency, internal police surveillance manuals or guidelines are closely guarded, and on the rare occasions they are released, they will tend to be heavily redacted.
quote:
quote:A member of the online activist movement Anonymous, sup_g was part of a small team of politically motivated hackers who had breached Stratfor's main defenses earlier that month – ultimately "rooting," or gaining total access to, its main web servers.
quote:Pirate Bay Founder Released From Solitary Confinement
After three months in solitary confinement Pirate Bay co-founder Gottfrid Svartholm will be released from custody. The prosecutor suspects Gottfrid of being involved in several hacking and fraud cases but he has yet to be charged in any of these cases. The Pirate Bay founder will now be transferred to a new prison which he will leave as a free man in five months if no new charges are brought against him.
Following his arrest late August, Pirate Bay co-founder Gottfrid Svartholm was deported from Cambodia to Sweden.
Initially it was assumed that Gottfrid was sent to Sweden because of the outstanding one year prison sentence in the Pirate Bay case.
However, once he touched down at Stockholm’s Arlanda Airport, the authorities said he was suspected of being involved in the hacking of Logica, a Swedish IT company that works with the local tax authorities.
Immediately after his arrival in Sweden, Gottfrid was put into custody awaiting the hacking related charges. Since then the Pirate Bay founder has been kept in solitary confinement, locked up 23 hours a day for weeks on end.
The prosecution kept extending custody and later implicated him in second hacking case along with accusations of four instances of serious fraud and four attempted frauds. Again, no official charges were filed.
Yesterday, after three months in custody, things changed for the better. Gottfrid’s mother Kristina Svartholm informed TorrentFreak that her son will no longer be kept in solitary confinement and will soon be released from custody.
“The prosecutor decided this morning that Gottfrid should be released from custody, which is great news. This means of course a much better situation for him, as he will no longer be kept in isolation,” Kristina said.
The authorities are currently looking for a prison where Gottfrid will serve the rest of his Pirate Bay sentence.
“Until then he will stay at the custody facility, but without any restrictions. This means that he can meet other people, not only his old mom,” Kristina told TorrentFreak.
The suspicions in the hacking and fraud cases haven’t been dropped but Gottfrid has not yet been charged for any of these offenses yet. If there is no change his prison term will end in May, as the time served in custody will be credited to his Pirate Bay sentence.
While Gottfrid wasn’t allowed to meet anyone except his mother during his solitary confinement, he was able to read many of the letters TorrentFreak readers and Gottfrid supporters everywhere wrote to him.
Kristina is grateful for this overwhelming support and told us previously that she is proud of what The Pirate Bay represents.
“I have learned so much about what TPB means to people. I feel so proud not only of what Gottfrid did but also of the other guys and what they created together. I am also proud of the crew that works on it today,” she said.
quote:
quote:Er lijkt definitief geen downloadverbod te komen en ook de blokkering van sites als The Pirate Bay wordt mogelijk voorkomen. D66 gaat daarvoor volgende week twee moties indienen tijdens het auteursrechtendebat in de Tweede Kamer, die waarschijnlijk door een meerderheid van de Kamer gesteund worden, meldt NU.nl.
quote:Internet remains unregulated after UN treaty blocked
Failure to sign agreement at ITU conference stops governments having greater powers to control phone calls and data
A proposed global telecoms treaty that would give national governments control of the internet has been blocked by the US and key western and African nations. They said they are "not able to sign the agreement in its current form" at the end of a International Telecoms Union (ITU) conference in Dubai.
The proposals, coming after two weeks of complex negotiation, would have given individual governments greater powers to control international phone calls and data traffic, but were opposed as the conference had seemed to be drawing to a close late on Thursday.
The move seems to safeguard the role of the internet as an unregulated, international service that runs on top of telecoms systems free of direct interference by national governments.
The US was first to declare its opposition to the draft treaty. "It is with a heavy heart and a sense of missed opportunities that I have to announce that the United States must communicate that it is unable to sign the agreement in its current form," Terry Kramer, head of the US delegation, told the conference, after what had looked like a final draft was approved.
"The internet has given the world unimaginable economic and social benefit during these past 24 years. All without UN regulation. We candidly cannot support an ITU Treaty that is inconsistent with the multi-stakeholder model of internet governance."
The US was joined in its opposition by the UK, Canada, Costa Rica, the Czech Republic, Denmark, Egypt, Kenya, the Netherlands, New Zealand, Poland, Qatar and Sweden. All said they would not sign the proposed final text, meaning that although a number of other countries will sign it, the treaty cannot be effectively implemented.
"In the end, the ITU and the conference chair, having backed themselves to the edge of a cliff, dared governments to push them off," commented Kieren McCarthy, who runs the internet consultancy dot-nxt. "They duly did."
But Access Now, a lobbying group against ITU oversight of the internet, said that "despite all of the assurances of the ITU secretariat that the WCIT wouldn't discuss internet governance, the final treaty text contains a resolution that explicitly 'instructs the [ITU] secretary-general to take the necessary steps for the ITU to play and active and constructive role in... the internet.'" It urged governments not to sign it.
The ITU is a UN organisation responsible for coordinating telecoms use around the world. The conference was meant to update international treaties which have not evolved since 1988, before the introduction of the internet.
But the conference has been the source of huge controversy because the ITU has been accused of seeking to take control of the internet, and negotiating behind closed doors. Google has mounted a vociferous campaign against conference proposals that would have meant that content providers could be charged for sending data and which would have given national governments more control of how the internet works. Instead, lobbyists have said the treaties should simply not mention the internet at all because it is a service that runs atop telecoms systems.
But a bloc led by Russia, with China and the United Arab Emirates – where the conference is being held – said the internet should be part of the treaties because it travels over telecoms networks. A Russia-driven vote late on Wednesday seemed to push to include the internet in a resolution – a move the US disagreed with.
The failure to reach accord could mean that there will be regional differences in internet efficacy. "Maybe in the future we could come to a fragmented internet," Andrey Mukhanov, of Russia's Ministry of Telecom and Mass Communications, told the Reuters news agency. "That would be negative for all, and I hope our American and European colleagues come to a constructive position."
The US and Europe have indicated that they instead want private companies to drive internet standards.
McCarthy, who has published ITU planning documents that would otherwise have been kept out of sight on dot-nxt's website, criticised the conduct of the meeting: "attendees were stunned to find a conference style and approach stuck in the 1970s," he said.
Writing on the dot-nxt site, he said: "A constant stream of information was available only in downloadable Word documents; disagreement was dealt with by increasingly small, closed groups of key government officials; voting was carried out by delegates physically raising large yellow paddles, and counted by staff who walked around the room; meetings ran until the early hours of the morning, and "consensus by exhaustion" was the only fall-back position."
Attempts by the ITU to encourage the US to sign the proposed treaty by removing clauses – such as one that would give individual countries rights over website addresses – failed.
Het artikel gaat verder.quote:Subscribe for Quick Updates BSNL telecom server hacked by Anonymous Group against Section 66A of IT Act
The Homepage of BSNL ( Bharat Sanchar Nigam Limited ) http://www.bsnl.co.in/ was hacked today morning by hacking group Anonymous. BSNL is an Indian state-owned telecommunications company, the largest provider of fixed telephony and fourth largest mobile telephony provider in India, and is also a provider of broadband services.
The website's homepage was hacked saying, " Hacked by Anonymous India, support Aseem trivedi (cartoonist) and alok dixit on the hunger strike, remove IT Act 66a, databases of all 250 bsnl site has been deleted.............Do not think of BACKUP" with a images of Mr. Aseem while he was arrested by Police.
Hack was performed by Anonymous India hacking group and claiming to hack whole server, with 250 Databases. Hacker wrote on deface page, that they deleted all the databases and dump credentials of BSNL database servers in a pastebin File.
After analyzing the dump of database login information, we found that company is really unconscious about their security from several years and choosing passwords of sensitive servers like "Password123" , "p3nib2", "enquiry999" , "password" , "DelBSi666" , "vpt123". Most obvious, these passwords are easily available in any wordlist and can be bruteforced in minutes.
We can judge the lack of security from the point that, BSNL is using "Password123" as password for 9 Databases.
What is Section 66A of IT Act ?
According to Indian Laws, Section 66A of IT Act is Punishment for sending offensive messages through communication service --
1.) any person who sends, by means of a computer resource or a communication device.
2.) any information that is grossly offensive or has menacing character or any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will, persistently by making use of such computer resource or a communication device.
3.) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such message.
shall be punishable with imprisonment for a term which may extend to three years and with fine.
quote:
quote:Having turned industries and governments upside down, the Internet has claimed its first organizational scalp, subjecting the United Nations' International Telecommunication Union (ITU) to a humiliating failure at the World Conference on International Telecommunications (WCIT) in Dubai earlier today.
quote:The collapse will come as a severe embarrassment to the ITU. Efforts to bring its core telecom regulations into the Internet era had exposed the organization to modern realities that it was incapable of dealing with. In the end, they proved overwhelming.
quote:Russia first submitted, then revised, then pulled, then resubmitted an explosive contribution that effectively undermined the existing global structures that make the Internet work. The ITU's Secretary General foolishly insisted on including text on the unrelated matter of human rights in an effort to see off media criticism that some of the other proposals would allow governments to monitor people online. Old telco companies tried to rewire the Internet so they received millions of dollars in revenue from Internet companies such as Google and Facebook.
Mistake piled on mistake and yet the ITU seemed incapable of responding, relying on member states to arrive at their own solutions and ignoring civil society, the technical community and even hundreds of thousands of concerned global citizens that took to online petitions to express their disgust at decisions being made over the Internet in closed, government groups.
quote:
quote:It's just one facet of the "internet" in North Korea, a uniquely fascinating place.
In a country where citizens are intentionally starved of any information other than government propaganda, the internet too is dictated by the needs of the state - but there is an increasing belief that this control is beginning to wane.
"The government can no longer monitor all communications in the country, which it could do before," explains Scott Thomas Bruce, an expert on North Korea who has written extensively about the country.
quote:China tightens 'Great Firewall' internet control with new technology
Companies and individuals affected by new system thought to 'learn, discover and block' encrypted communications
China appears to be tightening its control of internet services that are able to burrow secretly through what is known as the "Great Firewall", which prevents citizens there from reading some overseas content.
Both companies and individuals are being hit by the new technology deployed by the Chinese government to control what people read inside the country.
A number of companies providing "virtual private network" (VPN) services to users in China say the new system is able to "learn, discover and block" the encrypted communications methods used by a number of different VPN systems.
China Unicom, one of the biggest telecoms providers in the country, is now killing connections where a VPN is detected, according to one company with a number of users in China.
VPNs encrypt internet communications between two points so that even if the data being passed is tapped, it cannot be read. A VPN connection from inside China to outside it also mean that the user's internet connection effectively starts outside the "Great Firewall" – in theory giving access to the vast range of information and sites that the Chinese government blocks. That includes many western newspaper sites as well as resources such as Twitter, Facebook and Google.
Users in China suspected in May 2011 that the government there was trying to disrupt VPN use, and now VPN providers have begun to notice the effects.
Astrill, a VPN provider for users inside and outside China, has emailed its users to warn them that the "Great Firewall" system is blocking at least four of the common protocols used by VPNs, which means that they don't function. "This GFW update makes a lot of harm to business in China," the email says. "We believe [the] China censorship minister is a smart man … and this blockage will be removed and things will go back to normal."
But the company added that trying to stay ahead of the censors is a "cat-and-mouse game" – although it is working on a new system that it hopes will let it stay ahead of the detection system.
quote:
quote:Anonymous group takes down all the websites of Cyprus government as Cyprus nears euro bail-out deal. The group claimed responsibility for the hit via facebook at https://www.facebook.com/events.
The Denial of Service attack (DDoS) affected over 50 websites as reported via twitter, which are still offline for about 30 minutes now some of them are listed below :
quote:
quote:Anonymous hacktivists target the Westboro Baptist Church after members announce plans to picket Sandy Hook Elementary School, where a gunman killed 20 school children and six adults on Friday, Dec. 14.
On Saturday, Dec. 15, Shirley Phelps-Roper announced that the Westboro Baptist Church would picket Sandy Hook Elementary School located in Newtown, Connecticut, with the following tweet:In response, Anonymous released the personal contact information of members of the Westboro Baptist Church, including the home address, email address and phone number of numerous church members.twitter:DearShirley twitterde op zaterdag 15-12-2012 om 15:20:08Westboro will picket Sandy Hook Elementary School to sing praise to God for the glory of his work in executing his judgment. reageer retweet
Preaching a hate filled gospel so obnoxious most Christians reject their teaching, the Westboro Baptist Church is an anti-gay Christian fundamentalist church notorious for its "God Hates Fags" signs and the picketing of soldiers’ funerals.
In addition to the release of personal information belonging to the church, Anonymous is also promoting a petition at whitehouse.gov asking the Obama administration to legally recognize the Westboro Baptist Church as a hate group. The petition notes that the church “has been recognized as a hate group by organizations, such as The Southern Poverty Law Center, and has repeatedly displayed the actions typical of hate groups.”
quote:'Patriot' Hacker Forces School-Massacre Twitter Feed Offline
On Friday (Dec. 14), the shadowy "patriot hacker" was instrumental in taking down a Twitter account that mocked the victims of that morning's Newtown, Conn., elementary school massacre.
The account, at @z0bm13d, used a news photo of a bloodied, crying child as its wallpaper, and a photo of a little boy wearing bloody zombie makeup as its icon. Its displayed name was "Sandy Hook Victim."
"I now have more holes that my daddy can [have sex with]," the account posted. "I forgive Ryan Lanza for what he did to me."
(Ryan Lanza of Hoboken, N.J., was erroneously named by several news outlets Friday as the Newtown shooter. The killer was actually his younger brother, Adam Lanza, who appeared to have been carrying identification naming him as Ryan Lanza.)
Public outcry
It's not clear how quickly the alarm was raised, but on Friday evening a Twitter account at @GonzoPhD posted, "I never do this so listen to me this one time — report this sick piece of [garbage] .@z0mb13d for parodying today's shootings."
The Jester, whose Twitter account is @th3j35t3r, and whose activities are mostly limited to attacking Islamic extremist websites, noticed and tried to alert Twitter management directly.
"@twitter @support @safety 'FIX' THIS >> @z0mb13d," he tweeted. "Retrieve any IP details logged, pass to LEA's, I'd be happy to give perp some 'bad news'."
But it seemed the Jester, who has managed to keep his own identity secret, wasn't willing to wait for Twitter to take action.
"Only hope is a very clever SE [social engineering] attack," he tweeted. "@z0mb13d I have a very particular set of skills acquired over a long career. Skills that make me a nightmare for people like u."
(Twitter refused to comment for this story. The Jester did not respond to a request for comment.)
[Can Mental Screening Prevent Mass Murder?]
Connecting the dots
First, the Jester said, he looked at @z0mb13d's followers and quickly correlated them to a similarly named group in the Steam online-gaming community.
"Guy behind this despicable account >@z0mb13d is part of 'zomb13' gaming crew on steam, look at his followers, then look at steam," the Jester wrote. "How long b4 one of ur 'buddies' rats u out as pressure mounts?"
Within a couple of hours, the Jester dug up and posted a partial telephone number belonging to a friend of the @z0mb13d account owner.
Around the same time one of @z0mb13d's first followers, whose account bore the same handle as a member of the gaming crew, closed his Twitter account.
An hour later, the Jester had linked the offensive account to an Indiana college student who worked at Dairy Queen and liked the horror-rap group Insane Clown Posse — and @z0mb13d had been suspended by Twitter.
Just as soon as that small victory was achieved, however, another threat to online decency presented itself.
The Westboro Baptist Church, famed for picketing military funerals with "God Hates Fags" signs, promised via Twitter to do the same at Sandy Hook Elementary School.
Soon afterwards, the Jester posted another tweet: "#WBC #Westboro baptist church site .godhatesfags.com — seems to be experiencing 'technical difficulties'."
twitter:th3j35t3r twitterde op maandag 17-12-2012 om 05:24:38#WBC - When truckers, bikers, hackers, preachers, teachers, soldiers Anonymous & me agree you're a piece of shit...you're a piece of shit. reageer retweet
quote:Westboro Baptist Church Plans to Picket Sandy Hook Elementary School, Incurs Wrath of Anonymous
After prominent Westboro Baptist Church member/professional troll/mother of illegitimate son Shirley Phelps-Roper announced her group's intention to picket Sandy Hook Elementary School "to sing praise to God for the glory of his work in executing his judgment," the wrath came quickly.
An anonymous offshoot promptly launched #OpWestboro with the intention of "destroying" the church and its members.
Within hours the group began posting personal contact info and credit card numbers of WBC congregants, and hacking the church's various online properties.
A coup de grâce of sort came with the takeover of Phelps-Roper's personal twitter account. The hack is attributed to notorious teen hacker Cosmo the God who appears to have violated the terms of his newly minted parole in order to take part in the operation.
Meanwhile, others are attempting a less tech-savvy method of bringing down the church: Convincing the government to label WBC a hate group. A We the People petition to do just that has already amassed nearly 100,000 signatures in less than three days.
http://pastebin.com/PtkQAJectwitter:Anonchimp twitterde op maandag 17-12-2012 om 07:15:12RT: @YourAnonNewsIt's so nice of #WBC to provide the internet with a list of their twitter handles... http://t.co/VdVwigsC #OpWestboro reageer retweet
twitter:OpPinkPower twitterde op zondag 16-12-2012 om 13:43:34RT @lilithlela: #OPWestboro: Westboro Church members List, or, Why are they all related? http://t.co/2j85fsKF... http://t.co/E5Fl4WX3 reageer retweet
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |