Archive

Archive for the ‘Cyberwarfare’ Category

CISPA-Internet going black


Posted on April 19, 2013 by Akashma Online News

by Marivel Guzman

CISPA worse than SOPAThe collective anonymous group announced on Friday,  that next Monday, the internet will go black as a protest for the passing in the senate of CISPA, another draconian law, which passed the House on Thursday. If signed into law, CISPA would make it legal for websites to give your personal information to the U.S. government without your permission.

The government had been using every event to push for laws that trample in our freedoms. Why they want to control us so bad?

A subset of Anonymous, posting on a site titled Anon Insiders, posted the following:

We are going dark on MONDAY April 22nd at 6 AM GMT for 24 hours to protest your illogical and terrorizing bill against the Internet itself. Even with the whole Internet crying out to stop this BILL, the US House of Representatives failed to do so blinded by lobbyist’s money and cum in your eyes. So we will take action ourselves and open your eyes. Every popular/mainstream websites will be black until you, Mr. DronObama promise us to use your VETO power to stop this bill at Senate. Take this as a protest or a warning, as you wish. One thing is for certain, neither you or anyone else in this world can control the Internet, so don’t even try.

The plan doesn’t involve shutting down or attacking the Internet in any way, it just wants all websites to go dark in protest for 24 hours on Monday. It is not yet known which websites will participate in this blackout. The popular Anonymous Twitter feed YourAnonNews echoed the message on Friday:

The YouTube account “anonops” published a video (above) as well calling for support. Various Anonymous-related accounts are attempting to get the hashtag #CISPABlackout to trend on Twitter, in order to spread awareness of the cause.

This will not be the first Internet blackout in protest of a government bill. On January 18, 2012, more than 7,000 websites, including Wikipedia, Reddit and Google, protested SOPA (Stop Online Piracy Act) and PIPA (Protect IP Act), which were accused of similar breaches on online privacy. Two days later, the bill was shelved indefinitely.

President Obama has threatened to veto CISPA for failing to adequately address privacy concerns.

The House has passed a controversial cybersecurity bill co-sponsored by Rep. Mike Rogers, left, and Rep. C.A. "Dutch" Ruppersberger. (J. Scott Applewhite / Associated Press / October 8, 2012)

The House has passed a controversial cybersecurity bill co-sponsored by Rep. Mike Rogers, left, and Rep. C.A. “Dutch” Ruppersberger. (J. Scott Applewhite / Associated Press / October 8, 2012)

Remember Aaron Swartz, he fought for our internet rights, do not allow his dead to be in vane.

Aaron Swartz, the internet activist who wrote key parts of early RSS code, helped establish Reddit, opposed the Stop Online Piracy Act, and pushed hard for open access to information like U.S. case law and academic journals. Information that should be freely available to the public.

Can Comment Crew, Anonymous and Luzsec endarger Capitalism?

February 22, 2013 1 comment

Posted on February 20, 2013 by Akashma Online News

by Marivel Guzman

The New York Times released yesterday a special report on ‘Comment Crew’, a group of hackers from China. The U.S. government knew about them since 2005. But Obama Administration is keeping its mouth shut regarding ‘Comment Crew’. According to The New York Times, Comment Crew was tracked down to a white tall building in Shanghai, China.

On the outskirts of Shanghai, in a run-down neighborhood dominated by a 12-story white office tower, sits a People’s Liberation Army base for China’s growing corps of cyber warriors.

The building off Datong Road is the headquarters of P.L.A. Unit 61398. A growing body of digital forensic evidence -confirmed by U.S. intelligence officials who say they have tapped into the activity of the unit for years – leaves little doubt that an overwhelming percentage of attacks on U.S. corporations, organizations and government agencies originate in and around the white tower. The New York Times

Hackivists around the world as they are widely known, are a group of hackers that serve social interest for the general public. The corporate world, and the governments see them as cyber criminals, crimes that can landed them in jail for 100 years if the governments wanted to, or 5 years or less if they take a plea. There had been all types of arrests on the hacker community, but there are many types of hackers and common criminals as well.

David Thomas known as El Mariachi was a common criminal and not a hackivist. His activities and crimes can not even be considered to be the work of a hacker, this type of crime does not involve hacking into computers. They have a gang working together, people that work in banks, or in places where there is a database to be extracted, but not by means of hacking. See Hakcers Wars

Attorney General Eric Holder promises the Justice Department will play a "pivotal role" in thwarting efforts by WikiLeaks or any other organization to extract data illegally from U.S. companies.(Credit: White House)

Attorney General Eric Holder promises the Justice Department will play a “pivotal role” in thwarting efforts by WikiLeaks or any other organization to extract data illegally from U.S. companies.
(Credit: White House)

Madiant Security Firm reports(SPT&SPT1) speak of serious threat coming from China, “they have the evidence”, Madiant said. Why then the U.S. government insist on looking the other way. In the latest White House public release, Obama Administrations blames Wikileaks, Anonymous, and Luzsec as a threat to the U.S. and its American corporations.

White House warns of dangers posed by WikiLeaks, LulzSec, other ‘hacktivists’

New Obama administration strategy says organizations such as WikiLeaks and hacking group LulzSec may conduct “economic espionage against U.S. companies. Attorney General Eric Holder at press conference, February 20

The recent published 74 pages report of Mandiant security firm amount of information is impressive, they give an scope of  the type of activities ‘Comment Crew’ is interested in: APT1 Exposing One of China’s Cyber Espionage Units. (APT-Advanced Persistent Threat) Mandiant_APT1_Report

On 2004 Mandiant started tracking the groups APT, that according to this security firm amount to 20 or so of these groups. In 2010 Mandiant published the first report on these Chinese groups, APT Report.

“The Chinese government may authorize this activity, but there’s no way to determine the extent of its involvement. Now, three years later, we have the evidence required to change our assessment” .Mandian said

This issues needs to be taken very seriously and not just like another paper published. There are serious consequences and ramifications to this report.
There is no news that all the governments have an army of cyber warriors, but the interesting point on this report is the deep of the insertion of ‘Comment Crew’ into the U.S. government databases. Remember this group is in China, where more of the illegal cyber activity occurs apart from Indonesia where there are more than 65,000 known hackers.

The war on words started last year when U.S. Rep. Mike Rogers accused China of cyber espionage. There are serious consequences when you speaking publicly acting as a representative of the U.S. government. Specially is your adversary is China, known to buy U.S. debt and owning trillions of dollars of it.

China’s economic espionage has reached an intolerable level and I believe that the United States and our allies in Europe and Asia have an obligation to confront Beijing and demand that they put a stop to this piracy. Beijing is waging a massive trade war on us all, and we should band together to pressure them to stop. Combined, the United States and our allies in Europe and Asia have significant diplomatic and economic leverage over China, and we should use this to our advantage to put an end to this scourge. — U.S. Rep. Mike Rogers, October, 2011

Chinese Defense Minister on January, 2013 responded to such charges, saying that it is unprofessional and groundless to accused the Chinese Military of launching cyber attacks without conclusive evidence.

Why will China want to steal American Corporate secrets? Isn’t the U.S. government sent our corporations and its secrets to China a decade ago? The American Corporations become greedy and exchanged security for cheaper operational costs. They moved to China.

Made in China

100 % of Microsoft Hardware – Read the Microsoft Hardware – The China Connection

SMT and DIP PCB Assembly, Mother Boards and circuits.

Modems, speakers, microphones, cameras, video cameras

PCB Assembling Network Board

Networking PCBA

CISCO and Linksys Routers, Modems, Network adapters Where Linksys products are make?

When we think communication, we think Internet. Most of our communication gadgets come from China. How hard will be to install mini dropping devices inside every product that China produce?.

Beijing, China—November 14, 2006: IBM Chairman, President and CEO Samuel J. Palmisano (left) and Dr. Zhou Ji (right), Minister of the Ministry of Education, People’s Republic of China, at the launch of a major initiative to bring IBM’s global information technology services expertise and capabilities to China in support of the country’s increased focus on developing its services industry. Sam Palmisano before a sign “What makes us special? IBM China” magnifying-glass Sunil Mittal being recognised by Samuel J. Palmisano and President APJ Abdul Kalam India President APJ Abdul Kalam, Samuel J. Palmisano and IBMers lighting the lamp magnifying-glass Samuel J. Palmisano shaking hands with IBMers magnifying-glass

2006-2010: Remaking IBM into a globally integrated enterprise

IBM was clear on its strategy; making it a reality took a lot of work. The transformation took place in phases that often overlapped. From 2006 to 2008, IBM expanded its presence in Asia, Latin America and Eastern Europe, and today nearly half of its employees are in emerging markets. The company set up a network of global delivery centers in India, China, Brazil and other countries. By standardizing processes and outputs across its large, diverse client base, IBM could deliver quality services to its IT and business process outsourcing clients consistently, with the right skills, in the right place—wherever that would be. Projects could be staffed more quickly, delivering greater value to clients sooner.

Sharing resources

The model of shared services caught on. Global procurement was centralized in China.
Beijing, China—November 14, 2006: IBM Chairman, President and CEO Samuel J. Palmisano (left) and Dr. Zhou Ji (right), Minister of the Ministry of Education, People’s Republic of China, at the launch of a major initiative to bring IBM’s global information technology services expertise and capabilities to China in support of the country’s increased focus on developing its services industry.

Dell will consider transferring its factories to central and western China if wages in coastal areas continue to rise. However, the company supports higher wages for workers in coastal areas, said Amit Midha, the president of Dell in Greater China and South Asia, on June 21, 2010
Several electronic manufacturers including Foxconn have previously decided to move factories to inland regions. In 2009, Taiwan Hon Hai Group, the parent company of Foxconn, established a joint venture for producing laptop computers with Hewlett-Packard in Chongqing.

Taiwan Quanta Computer, another major laptop contract manufacturer, also established factories in Chongqing in early 2010.

Cyber espionage and cyber warfare has everything to do with China, theoretically speaking. If People Liberation Army controls every aspect of the life in China, including people jobs, habitat, and food. Chances are, that China government is taking advantage of  the greed of American Corporations. Pay back time for the years of abusing the people of China. The government of China allowed for a whole decade to use their people as slaves workers for American companies.

While this phenomenon of jobs transfer was going to China, American Corporate world was enjoying a steady raise in their profits, and China as Imperial power, become stronger, controlling the price of the dollar, monopoly of products made in China, buying American debt, accelerated production of weapons of all calipers and strategically straightening its power in the world.

For China the ‘One Child Policy” paid off.  On the backs of their citizens the Chinese Imperial Power Become a World Power.

Read on this issue Negligence at home while giving away our power in the name of greed and slavery: The mentality that everything could be made in China grew to a devastating proportions for United States.

We the United States of North America sent our manufacturers to China, even some of the Military gadgets were to be made in China, critical technology for the Defense Department was even ‘Made In China’.

Report links China’s army to cyber attacks


Published on February 19, 2013 by Akashma Online News

By David E. Sanger
The New York Times

On the outskirts of Shanghai, in a run-down neighborhood dominated by a 12-story white office tower, sits a People’s Liberation Army base for China’s growing corps of cyber warriors.=

The building off Datong Road is the headquarters of P.L.A. Unit 61398. A growing body of digital forensic evidence -confirmed by U.S. intelligence officials who say they have tapped into the activity of the unit for years – leaves little doubt that an overwhelming percentage of attacks on U.S. corporations, organizations and government agencies originate in and around the white tower.

A 60-page study to be released by the U.S. security firm Mandiant tracks for the first time individual members of the most sophisticated of the hacking groups-known to many of its victims as “Comment Crew” or “Shanghai Group” – to the doorsteps of the military unit’s headquarters.-

Exposing Issue

The computer security firm Mandiant provided an advance copy of its report, saying hoped to “bring visibility to the issues addressed.” New York Times reporters then tested the conclusion with others experts inside and outside government. (Mandiant was hired by The New York Times Co. to investigate a Chinese-origin attack on its news operations, but concluded it was not the work of Comment Crew, but another group. The firm is not currently working for The Times.)

“Either they are coming from inside Unit 61398,” said Kevin Mandia, the founder and chief executive of Mandiant, in an interview last week, “or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about of thousands of people generating attacks from this neighborhood.”

Other firms that have tracked “Comment Crew” say they also believe the group is state-sponsored, and a recent classified National Intelligence Estimate, issue as a consensus document for all 16 U.S. Intelligence agencies, makes a strong case that many of these groups are either run by army officers or are contractors working for commands like Unite 61398.

While Comment Crew has drained terabytes of data from companies like Coca-Cola, increasingly its focus is on companies involved in physical and virtual infrastructure electrical power grids, gas lines, waterworks and government and corporate databases. According to the security researchers, one target was a company with remote access to more than 60 percent of oil and gas pipelines in North America.

Contacted Monday, Chinese officials in Washington said their government does not engage in computer hacking, and that such activity is illegal. They described China itself as victim of hacking, and note that other are many hacking groups in the United States. But in recent years the Chinese attacks have grown significantly, security researchers say. Mandiant has detected more than 140 Comment Crew intrusions since 2006.

“Right now there is no incentive for the Chinese to stop doing this,” Rep. Mike Rogers, R-Mich., chairman of the House Intelligence Committee, said in an interview. “If we don’t create a high price, it’s only going to keep accelerating.”

The White House said it was “aware” of the report, and Tommy Vietor, the spokesman for the National Security Council, said, “We have repeatedly raised our concerns..with senior Chinese officials, including in the military, and we will continue to do so.”

Under a directive signed by President Barack Obama last week, the government plans to share with American Internet providers-starting today-information it has gathered about the unique digital signature of the largest of the hacking groups, including Comment Crew and other emanating from near where Unit 61398

is based.

While the warnings will not explicitly link those groups or their giant computer servers to the Chinese army, U.S. officials say they are planning to tel China’s new leaders in coming weeks that the volume and sophistication of the attacks have become so intense that they threaten the relation between Washington and Beijing.

The U.S. government also has cyber warriors. But officials insist they operate under strict, if classified, rules that bar using offensive weapons for nonmilitary purposes or stealing corporate data.

The Hackers wars

February 9, 2013 1 comment

Posted on February 04, 2013 by Akashma Online News

by Marivel Guzman

Young bright computer geeks and social activists, at war with the establishment of governmental control and corporate greed.

Hacktivists against Government’s hackers-snitch-ex-anons or simply Fedhackers

I m a hacker enter my world

What it is the maximum penalty for internet hacking? 1,5,10,35, or life in prison? All depend actually. If you are individual of interest for the district attorney’s office, you can be offer a deal, a deal you can not refuse.
If Aaron Swartz, our young privacy advocate, political and social activist was alive today, he probably can tell you about his 6 months in jail deal. Well, not that he accepted, so he was facing 35 years in jail, all because he did not want to play the district attorney’s sinister deal. This cost him his life.

What about the other “cyber breakers”? They all being offered a deal. One by one saw its day at the district attorney’s office. What do they do? All acted according to their conscience and sense of justice.

The district attorney’s office managed to brake few of them. Some of them “went to work” for the DA, some refused, but the simple truth is that now they are divided, scared and scattered.

Simple as this. The divide and conquer start showing inside the anon community. The paranoia is running wild. By now the Anons do not know who is snitch, who is being followed, and who is real anonymous. Once you see an anon’s name in the news, you are considered to be exposed.

The anons are doxing each other, they are snitching. And more scary for the anons, is that the Feds are hiring some of them and using them to infiltrate the ranks of the hackivist community. Who is wining this cyber war? Just in Indonesia, there is an estimate that

In some other instances the feds are blackmailing the anons already detained,they are being forced to work as snitches, in exchange to drop some of the charges.

By now, you should know how the district attorney’s office of crooks and escalators works. Once they arrest one anon, they will be offered two deals; One, to be an informant, a snitch in other words, if that is not accepted, they will probably be offer a deal, if that is refused also, the DA will play with the life of the defendants, using the unconstitutional trick called, plea bargain  or blackmail.  The DA assure with deals an 80 % of the cases a wining verdict. For them plea bargain or cases won sqare and fair in the court room is the same. They use this convictions to move up in the ladder of the office of the district attorney.

The less they care is justice being served. We can not help, but to remember Aaron Shwartz, the latest of its victims. Using the scare tactic, bringing outrageous charges, unheard charges on the book. Its call plea bargain. Aaron was offer 6 months in jail to plea guilty, off course innocent as he was he refused the Plea, Ortiz got mad and charged him with 9 counts of bogus charges that carried all together 35 years in jail.

Pleas Bargaining has come to dominate the administration of justice in America.
According to one legal scholar, “Every two seconds during a typical workday, a criminal case is disposed of in an American courtroom by way of a guilty plea or nolo contender plea. Even though plea bargaining pervade the justice system. He argue that the practice should be abolished because it is unconstitutional.

Government should not retaliate against individuals who exercise their right to trial by jury.

Plea Bargain it is one of the dirtiest tactics used by the government to coerce individuals into agreeing to plea guilty charges that they did not commit in exchange for waving their constitutional rights of a court trial.

Paul Lewis Hayes, serving life sentencing for writing a check of $ 88.30 and declining to accept  a plea bargain of 5 years. The district attorney retaliated and charge him with another crime “Habitual Criminal Act”, which carries a mandatory life imprisonment. Hayes lost and appealed his conviction, took his case to the Supreme Court and 5 to 4 the supreme court upheld the conviction.  The Case Against Plea Bargaining

The government has already understood that they lose the cyberwar, the youth in the planet outnumber the old. We seen the youth rebelling against the old in the

Please stop by and read International Strategy for Cyberspace, US government had said that will respond hackers attack military if necessary.

As a cyber space race looms, the military is looking for a few good geeks.

In Hacker Wars, rogue hackers on the payroll of malevolent corporations are taking over the Internet. Our privacy and basic liberties are being swept aside at an alarming rate. The only way to stop them is to beat them at their own game! Hackers like you have to stand on the side of freedom and fight for those who can not fight for themselves. In this war of the electron and the switch, there is no substitute for victory.

In Hacker Wars, rogue hackers on the payroll of malevolent corporations are taking over the Internet. Our privacy and basic liberties are being swept aside at an alarming rate. The only way to stop them is to beat them at their own game! Hackers like you have to stand on the side of freedom and fight for those who can not fight for themselves. In this war of the electron and the switch, there is no substitute for victory.

High school hackers, crackers and digital deviants: Uncle Sam wants you. Again the government blackmailing the youth of America. They want to use our youth to snitch each other in exchange for a pay check.

Anons hackers doxing each other. Who they working for? Feds? private firms, ego? Next Generation Fuckery

I Was a Cybercrook for the FBI-David Thomas ran one of the most popular online crime hubs, while the FBI ran him. El Mariachi

Anonymous hacker, commentator, journalist, and fameball Barrett Brown was arrested in a dramatic takedown last night live and on-camera, in the middle of a TinyChat with a dozen others.

Some weren’t worried. “Cool how the FBI staged @BarrettBrownLOL‘s arrest live on cam to bolster the idea he hasn’t been working for them for some time already,” said Methadonna on Twitter, voicing the suspicions of many. Daily Dot

The hacker group Anonymous is dealing with the arrest and betrayal of one of its most vocal members the only way it knows how: By hacking a security firm and covering its website with a rant against feds and snitches. To Snitch Sabu

Read the following story of Sabu, the mention of the victim SONY, makes the crimes more expensive and the years of jail multiply by the dollar $ Sign!!!!!

Hector Xavier Monsegur, a.k.a. Sabu, was outed Tuesday as a Puerto-Rican American resident of New York who pleaded guilty in August to an indictment on charges of computer crimes against targets ranging from Visa and Mastercard to the security firm HBGary and Sony that carried a maximum sentence of up to 124 years and six months in prison.

Six top computer hackers associated with groups such as Anonymous, LulzSec and AntiSec have been arrested and charged in New York in connection with a series of attacks on computers used by the entertainment industry, credit card companies, intelligence firms and even an Irish political party, U.S. officials announced Tuesday. Los Angeles Times

The FBI and Secret Service have successfully infiltrated the underground world of computer hackers in the US: 25 percent are secretly informing the government about their peers for fear of a long prison sentence. In fact, the community is riddled with paranoia and mistrust as it is not clear who is part of this “army of informants.” Tech Spot on hackers

One of the six, Hector Xavier Monsegur – also known by his computer name of “Sabu” – pleaded guilty and was said by officials to be working with the government against his former colleagues.

Brian Salcedo, now 23, has been in custody since 2003, when an FBI stakeout caught him and a partner breaking into several Lowe’s networks over an unsecured Wi-Fi connection at a suburban Detroit store. 8 years for Crazy Long Hacker

A skilled San Francisco computer intruder was sentenced here Friday to 13 years in federal prison for stealing nearly two million credit card numbers from banks, businesses and other hackers — in what is the longest hacking sentence in U.S. history. Record Sentence for hacker Max Vision

We see these hackers thieves that stole millions of dollars in wire fraud, their sentences are very small compared to Aaron Swartz 35 years sentence.
Hackers and thieves are notorious nowadays. In fact it’s all anyone tends to hear in the news, and they get long sentences. A con artist/thief stole millions of dollars and got sentenced to 150 years in Jail. Which obviously he won’t ever survive. A man who murdered two children, aged 10, and 12 respectively, got 14 years combined.

Who decide when a crime deserve more years in jail? Justice, Judge, Governor, District Attorney? Make your opinion count, demand accountability for harsh punishment and outrageous district attorney charges for social activist and dissidents.

“Being a federal prosecutor isn’t just a job, it’s a privileged position of power… And one of the things that goes with the unbridled power to decide who to indict and what charges will be brought; is the responsibility to use that power appropriately. Anyone who does not understand that responsibility should not be allowed to pass the bar, much less be handed the power to ruin lives with relative impunity.” Kurt Hopking

On January 14, 2013, Yesterday, it became public that Stephen Heyman oversaw TWO excessive prosecutions of hacker-defendants who committed suicide, Aaron Swartz and Jonathan James.

Swartz was charged with using the Massachusetts Institute of Technology’s computer networks to steal more than 4 million articles from JSTOR, an online archive and journal distribution service. He faced a maximum sentence of 31 years if convicted. Federal Reserve HACKED

Jonathan Joseph James (December 12, 1983 – May 18, 2008), was an American hacker who was the first juvenile incarcerated for cybercrime in the United States.The South Florida native was 15 years old at the time of the first offense and 16 years old on the date of his sentencing. He died on May 18, 2008, of a self-inflicted gunshot wound.

Leonard Harris Sassaman (1980 – July 3, 2011) was an advocate for privacy, maintainer of the Mixmaster anonymous remailer code and remop (operator) of the randseed remailer.

Sassaman was a well-known cypherpunk, cryptographer and privacy advocate. He worked for Network Associates on the PGP encryption software, was a member of the Shmoo Group, a contributor to the OpenPGP IETF working group, the GNU Privacy Guard project, and frequently appeared at technology conferences like DEF CON. Sassaman was the co-founder of CodeCon along with Bram Cohen, co-founder of the HotPETS workshop (with Roger Dingledine of Tor and Thomas Heydt-Benjamin), co-author of the Zimmermann–Sassaman key-signing protocol, and at the age of 21, was an organizer of the protests following the arrest of Russian programmer Dmitry Sklyarov. He committed suicide.

Ilya Zhitomirskiy (12 October 1989 – 12 November 2011)[1] was a Russian-American software developer and entrepreneur. Zhitomirskiy was a co-founder and developer of the Diaspora social network and the Diaspora free software that powers it. Diaspora could have destroyed facebook platform if being developed as Zhitomirskiy had planned.

On the evening of 12 November 2011, Zhitomirskiy was found dead in his San Francisco home by police responding to calls about a suspected suicide. An autopsy report from the Medical Examiner’s office formally ruled the death a suicide in April 2012. While press reports questioned whether the pressure of working on Diaspora had led to his suicide, Diaspora co-founder Maxwell Salzberg disagreed. Salzberg stated, “Yes, I agree that being a startup founder is stressful. But it wasn’t the stress of work that killed Ilya. He had his own issues. He was sick.” Zhitomirskiy’s mother, Inna Zhitomirskiy, did not comment on reports of his history of mental illness, but she did say on his participation in Diaspora, “I strongly believe that if Ilya did not start this project and stayed in school, he would be well and alive today.”

Diaspora is the Privacy Aware Open Source Social Network that puts you in control of your information.

With Diaspora you decide what you’d like to share, and with whom. RIP Ilya Co-founder of Diaspora

“”Indonesia has 65 thousand hackers and the largest base in Yogyakarta, Yogyakarta hackers on a more active and creative,” says IT analyst Onno W. Purbo here on Thursday. and the largest base in Yogyakarta, Yogyakarta hackers on a more active and creative,” says IT analyst Onno W. Purbo here on Thursday.

CHINA has revealed that millions of its computers have been hacked by the US in the past year, as it hits back at claims foreign media organisations had been infiltrated by Chinese spies. The Australian

Iranian official says bank attack blame is a smoke screen for the U.S. to continue launching cyber attacks against Iran. US blame Iran for hacking US bank

Hackers crew Jember Hacker terrorists (JHT) deface the official website of Indonesian president (http://www.presidensby.info) with a message reads, “This is a PayBack From Jember Hacker Team”.
Hackers deface website of president Susilo Bambang Yudhoyono (SBY) apparently in protest at growing corruption and wealth inequality in the country and because of increasing anger at the current administration.
Indonesian president website defaced
Deface page mention hacker code name as “MJL007” who performed the hack and government is working with law enforcement teams to examine log files in a bid to trace the origin of the attack.
Corruption is rampant, the poor are everywhere. The rich get richer, the poor get poorer,” hacker told. Mirror of hack is available at Zone-H.

Justice for Aaron Swartz


Justice for Aaron Swartz

by John Halle on January 13, 2013
UPDATED by Marivel Guzman

Remove United States District Attorney Carmen Ortiz from office for overreach in the case of Aaron Swartz.

Aaron Swartz’s death needs justice. He was not a crazy person with suicide thoughts. Aaron was perfectly sane individual charged with bogus made up crimes. We all know that our system is rotten. The prosecutors in our “justice” system make crimes to climb up in their careers.
In our system The People (Prosecutor) has to prove a person guilty and the judge needs to have hard evidence before he/she allows a person to be charged with a crime.
In Aaron Swartz’s case neither the Prosecutor Ortiz or the Judge had any hard evidence to charge Aaron with the dozens or so crimes he was charged with, and regardless of the evidence they went ahead with the outrageous charges.
With the abuse of power they displayed, Aaron was overwhelmed by the outcome of wrong verdict, and saw his bright future blurred by 35 years in federal prison plus 1,000,000 dollars.
Who ever had felt the power of the justice in the flesh knows the power of the District Attorney’s office. How they Deal with the life of the “Defendants”. They deal with the lives as if dealing in a game of cards. The district Attorney and the Defendant’s attorney interchange cases as conveniently as they come. The two sides build illustrious careers with the people lives.
Aaron Swartz is one special case, they,  the District Attorney’s office conspired with other powerful behind the scenes actors, they played a macabre game to show Aaron a lesson.
They wanted to send a lesson to all the internet dissenters, to all the social and political activists, to the hacktivist community. They wanted to silence Aaron and all the Aarons in the world.
They certainly did, they did it so well that Aaron could not survive the bullying, bullying that drove him to kill himself.
Our system needs balance, needs honesty, and Aaron Swartz needs justice.
In the name of Justice and truth, the culprits need to be brought to the real justice system and pay for the crime. SHARE AND SIGN THE PETITION Akashma News

Aaron Swartz, who committed suicide on Friday, was by all accounts a remarkable person. But he was by no means a radical. In his brief role as an organizer with the Progressive Change Campaign Committee, he was among those who were convinced that with sufficient pressure from its activist base, the Obama administration would eventually reveal its deeply obscured roots in traditional New Deal/Great Society liberalism.

It hardly needs to be said that those of us who argued against him at the time, as I did, take no pleasure in having been proven right in the years since. The most tragic indication came two years ago when the Obama justice department charged Swartz himself with a 12 count violation of the 1986 Computer Fraud and Abuse Act for his attempt to acquire, via the MIT server, the JSTOR scholarly archive and make it available to the general public.

A small, delicate and bookish 26 year old, the prospect of a lengthy prison term, according to friends, terrified him and this, compounded by a history of depression, was, according to a statement released by this family, a primary reason for his suicide.

This was, of course, an almost unspeakable tragedy for those who knew him.

For them there is an understandable tendency to focus on Swartz’s extraordinary life and accomplishments and a reluctance to point fingers at those who are responsible.

Those of us who only know of Swartz’s work in passing shouldn’t feel any compunction about doing so, and there is plenty of blame to go around.

Most conspicuously, there is the Obama administration, and its deep pocket contributors in the high tech, publishing and entertainment industries who have attempted to make what they call the “theft” and what Swartz regarded as the liberation of intellectual property a crime meriting the most severe punishment. A ridiculously disproportionate 35 year sentence was being aggressively pursued by Massachusetts Federal Attorney, Carmen Ortiz who likely viewed the prosecution as an opportunity to raise her profile within the party. The strategy seemed to be working: Massachusetts Governor and close friend of Obama Deval Patrick mentioned her as a likely successor.

It should be our job to ensure that Ms. Ortiz’s cynical calculation will not pay off. A petition demanding her removal from office is being circulated and should be signed, though this is a bare minimum. Demonstrations at her office should become routine and her public appearances should be greeted with conspicuous displays of opposition. Should she receive the nomination for governor, or any other position in the future, those honoring Schwartz’s memory should pledge to nominate, finance, and actively support a third party candidate who can benefit from the legitimate outrage at Ortiz’ exercise in prosecutorial over-reach and extreme Democratic Party triangulation.

The other target, MIT, is not used to having the light of publicity affixed to it, but it is well deserved. As the Swartz’s family notes, by filing charges when the primary victim JSTOR refused to do so, MIT’s acquiesence was required for the federal prosecution to proceed.

Although MIT enjoys a near pristine reputation as America’s premier scientific and technical institution, it has more than a few skeletons in its closet due to its having been for years a leading beneficiary of federal government contracts, much of this tied to the development and production of costly, destabilizing and unnecessary weapons systems.

Complementing this flow of cash is the revolving door connecting its faculty with high level positions in industry and the federal government. MIT Professors such as CIA director John Deutsch, Treasury Secretary Lawrence Summers and National Security Advisor Walt Rostow, among many others, have been leading figures within the Washington establishment.

The presence of these naturally raises suspicions with respect to the Obama Justice Department having influenced MIT’s decision to pursue prosecution. While this is necessarily a matter of speculation, it is difficult to see what MIT gained, since its own intellectual property was not being compromised. Furthermore, the climate at the institute, particularly within higher technology circles has historically promoted a culture of openness and sharing of ideas. The prosecution seriously if not fatally undermined this culture and this is what the Swartz’s family meant by MIT failing “to stand up for… its community’s most cherished principles.”

MIT faculty, particularly those in fields such as computer science and software engineering where Swartz made, at a very young age, substantial contributions, should demand an explanation for the administration’s catastrophic and tragic decision to move forward with the prosecution. And it should demand the release of all communications with federal officials relating to the Swartz case, should they exist.

Doing so would serve justice and, ultimately, the best interests of MIT as an institution.

It is the least which the MIT community can do to honor Swartz’s memory.

Reform the Computer Fraud and Abuse Act to reflect the realities of computing and networks in 2013. The act is much too open ended. Any reasonable use of a computer system that isn’t explicitly authorized can be classified a computer crime. 

Tagged as: Aaron Swartz, Carmen Ortiz, JSTOR, MIT

{ 2 comments… read them below or add one }

Aaron Aarons January 13, 2013 at 8:43 pm

While I am fully in solidarity with the major points of this article, I want to point out, in a comradely way, an example of the kind of thinking, or at least of rhetoric, that leftist enemies of the ruling order should avoid, even in making an incidental point:

[MIT has] been for years a leading beneficiary of federal government contracts, much of this tied to the development and production of costly, destabilizing and unnecessary weapons systems.

This use of the word “unnecessary” leaves the implication that some weapons systems that are developed and produced for the U.S. government are “necessary”, without questioning what interests they might be “necessary” for, and will reinforce in many minds the notion that some such weapons systems are “necessary” in the abstract, and not “necessary” specifically to serve the interests of the U.S. ruling class.

Again, I am fully in solidarity with the intent of this post and hope to see further discussion of the topic, including on how to accomplish exactly the kind of liberating task that Aaron Swartz was persecuted for attempting.

Aaron Swartz First Hacktivist Martyred

January 13, 2013 8 comments

Posted on January 12, 2013 by Akashma Online News

By Marivel Guzman

UPDATED:Aaron Swartz’s supporters will be remembering Aaron’s 30-year birthday Saturday, Nov. 5 and Sunday, Nov. 6 in San Francisco, Calif. in a two-day lectures, workshops and reception.

Aaron Swartz was not criminal, he was not a hacker, Aaron was an intellectual, a young social activist looking for balance in our society.

Co-founder of Reddit Aaron Swartz found dead 😦 😥

Aaron Swartz Indicted For Hacking JSTOR.-

Tragic that the imminent end of life rotten in a federal prison pushed this young intellectual to take his life.

Aaron SwartzAaron Swartz, the internet activist who wrote key parts of early RSS code, helped establish Reddit, opposed the Stop Online Piracy Act, and pushed hard for open access to information like U.S. case law and academic journals. Information that should be freely available to the public.

Last year Aaron Swartz the internet hacktivist was indicted for charges of wire fraud, computer fraud, data theft and property damage, Today Aaron Swartz is death. Found death in his apartment on apparently suicide.

A spokeswoman for New York’s Medical Examiner says 26-year-old Aaron Swartz hanged himself in his Brooklyn apartment. He was found Friday.

Swartz’s death was confirmed by his attorney, Elliot Peters, in an email to MIT’s The Tech newspaper.

“The tragic and heartbreaking information you received is, regrettably, true,” Peters wrote.

Before you go any further on the indictment charge of our young bright Aaron Swartz, you need to learn about his alleged crime.

The Truth about Aaron Swartz’s “Crime”- hardly a crime at all

25-year-old Swartz, who is best known as co-author of the initial RSS specification, allegedly broke into a computer closet at MIT, accessed MIT’s network connected to JSTOR and downloaded “a major portion of JSTOR’s archive” without authorization, and distributed the acquired content through file sharing networks.

These are are words used in the indictment of Aaron, but this could have been proven wrong by an IT specialist that had cracked the most difficult cases in the IT industry. Alex Stamos is the CTO of Artemis Internet, he was the defense witness in Aaron Swartz case. Please take a minute to read his post “The truth about Aaron Swartz’s Crime”.

Aaron Swartz, was web pioneer who advocated for free online content. This more than suicide it is a crime delivered directly from  the the Justice Department in their attempts to keep the profits soaring for the Corporate Gangsters.

Demand Progress, a website for which Swartz previously served as Executive Director, set up a web page and petition in support of Swartz, indicating that the indictment came with surprise and questioning a legal strategy that makes downloading “so many journal articles” a felony that should be punished with jail time. Demand Progress also noted that “the alleged victim has settles any claims against Aaron, explained they’ve suffered no loss or damage, and asked the government not to prosecute.” Toms Guide

Aaron-Swartz dead at 26 January 12 2013

Swartz himself reached out to his Twitter followers and thanked for their support via tweets. Demand Progress’ current Executive Director David Segal said that “Aaron’s career has focused on serving the public interest by promoting ethics, open government, and democratic politics. We hope to soon see him cleared of these bizarre charges.”
It is outrageous to think that the life of a young person be wasted this way. The Justice Department should respond for this crime.
It is not that we do not have enough with the trampling of our rights as a citizens, now we are facing greater threats to our physical integrity, when Law Thugs like District Attorneys base their career creating crimes with the pen.

35 years in prison for distributing old academic journals/papers? I can’t imagine a non-profit like JSTOR going after someone with the fury of the entertainment industry. If anything they should see the writing on the wall; most journals are required to move towards open access. According to JSTOR they did not want to press charges, but the Federal Government went full blown against this 25 year old internet activist, and was facing 50 years in Jail and more than 1,000,000 in fines. What a ridicule and out of proportion judgment, when we have Real criminals directing our life.
Most of our politicians are hacking each other, they have the best technology money can buy and they get away with it.

Last year, Swartz openly criticized the US and the Israeli regime for launching joint cyber attacks against Iran. The blogger was also vocal in criticizing Obama’s so-called kill list and other policies. Obama has been reportedly approving the names put on the “kill lists” used in the targeted killing operations carried out by US assassination drones.

Every week or so, more than 100 members of the US national security team gather via secure video teleconference run by the Pentagon and go over the biographies of suspects in Yemen, Somalia, and Pakistan, and “nominate” those who should be targeted in the attacks.
Obama is then provided with the identities of those put on the “kill list” and signs off on every strike in Yemen and Somalia as well as the risky strikes in Pakistan.
Swartz was critical of monopoly of information by corporate cartels and believed that information should be shared and available for the benefit of society.

“Information is power. But like all power, there are those who want to keep it for themselves,” he wrote in an online “manifesto” in 2008.

Some DA at the United States Attorney’s Office was trying to get herself a promotion and killed this amazing young man in the process. Justice is backward,  law enforcement is covering the real criminals. There are real crimes out there, this is not one of them.
Anonymous“I’m so sick of living in a world without compassion and understanding. The laws on the books don’t automatically force prosecution and saying ‘its just my job’ is a justification that has never worked in history. In fact, those who claim this are often the worst of us, and by far. I’m sick of the monied interests having so much power and controlling our fates. From the office of the President down to the lowliest street beggar – money rules. Money become the evil that control our everyday lives. Copyright, IP, patents aren’t more important than my freedom or my ability to educate myself and others. This is an attack on my basic right to speak!

I’m so angry right now. The world only produces a few thousand Aaron Swartz’s a generation. Instead of us building a system to enable and empower people like him, we build systems by old men to protect the assets of old men while pissing on young men. They are destroying the boomer generation, you’ve become traitors to the American dream and to basic American freedom. The systems they build enable DAs and money men to toss the people who try to do better in this life in jail.” Internet Forums

The family of Aaron Swartz and the internet community are demanding the Federal Prosecutor to be charge with the murder of Aaron. The unjustifiable thread of excessive charges  brought our young activist to depression and ultimately to his death. The office of the Federal Prosecutor unable to stop the chains of hacking events in the internet and DDS attacks prompted them to look for scapegoats. Aaron’s death demand justice.

I hope Anonymous and others hacktivists show a lesson to the Corporate Scam of the world, and their prostitutes. This is a crime against our youth. This is not how our youth deserve to be treated.

Aaron Swartz was a truly beautiful person. The world is unquestionably dimmer without him. RIP Aaron, you will be missed and remembered. The more since condolences to his family and friends.

Aaron Swartz Speech on SOPA

The Network Transformation

Hackers say coming air traffic control system lets them hijack planes

January 11, 2013 1 comment

Posted on January 11, 2013 by Akashma Online News

GPS Hijacking Catches Feds, Drone Makers Off Guard

Source CSOonline

by Taylor Armerding

UPDATED by Marivel Guzman

When Iran brought down the US drones, their specialist insisted that Iran had hijacked the GPS system of the drones making with this outmaneuvers easy to drive down the drone without damage the computer system. Now we started to understand how easy is to divert planes, to drive planes onto buildings, or simply to highjack their computer systems.
Some conspiracy theories circulated on the internet circles about the remote control of the planes that crashed the Twin towers in New York in 2011, now does not look that hard, does it?

If a teenager can hijack a Multi Billion dollars system, imagine what an specialist trained on software field for years can do?

Years earlier the Israeli Michael Goff working for PTech, an Arab owned software company that develops key enterprise software for many government institutions like NORAD and FAA, using his secure channel with another israeli Amit Yoran, somehow manages to give Israeli army computer programmers access to this critical computer code. It was due to this manipulation that the hijackings on 9/11 remained unnoticed by the flight controller of NORAD. Once this was in place the planes could be taken over by remote control and flown into the World Trade Center. How 911 was done

An ongoing multibillion-dollar overhaul of the nation’s air traffic control (ATC) system is designed to make commercial aviation more efficient, more environmentally friendly and safer by 2025.

But some white-hat hackers are questioning the safety part. The Next Generation Air Transportation System (NextGen) will rely on Global Positioning Systems (GPS) instead of radar. And so far, several hackers have said they were able to demonstrate the capability to hijack aircraft by spoofing their GPS components.

The Federal Aviation Administration (FAA) has declared that it already has multiple measures to detect fake signals. But it has so far not allowed any independent testing of the system.

On June 19, when University of Texas researchers successfully hijacked a drone by “spoofing” it — giving it bad GPS coordinates – they showed the Department of Homeland Security how civilian drones could fall into the wrong hands, exposing a potentially serious security flaw. It was exactly what Todd Humphreys, the lead researcher, anticipated in a TEDx talk in February: “You can scarcely imagine the kind of havoc you could cause if you knew what you were doing with a GPS spoofer.” July 20, 2012

The hacking exploits are not new. National Public Radio’s “All Tech Considered” reported last August that Brad Haines, a Canadian computer consultant known online as “RenderMan,” noted that the radio signals aircraft will send out to mark their identity and location under NextGen, called automatic dependent surveillance-broadcast (ADS-B), were both unencrypted and unauthenticated.

By spoofing those signals, Haines said he could create fake “ghost planes.”

“If I can inject 50 extra flights onto an air traffic controller’s screen, they are not going to know what is going on,” he told NPR. “If you could introduce enough chaos into the system – for even an hour – that hour will ripple though the entire world’s air traffic control.”

Haines presented his findings at the Defcon hacking conference in Las Vegas last summer

Then there is the group of researchers from the University of Texas that successfully hijacked a civilian drone at the White Sands Missile Range in New Mexico during a test organized by the Department of Homeland Security (DHS) last summer.

The system used to hijack the drone cost about $1,000. The NextGen program is expected to cost taxpayers $27 billion, plus another $10 billion spent by the commercial aviation industry.

In a third case, NPR reported that Andrei Costin, a Romanian graduate student in France, was able to build a software-defined radio hooked to a computer that created fake ADS-B signals in a lab. It cost him about $2,000. Costin made a presentation at last summer’s Black Hat conference.

Paul Rosenzweig, founder of Red Branch Law & Consulting and a former deputy assistant secretary for policy at DHS, wrote in a post last week on Lawfare that this amounts to the FAA continuing to dig itself into a deeper hole. One problem, he wrote, is that the eventual goal is to eliminate radar, which is inefficient because it requires planes to fly on designated radar routes.

“But the hardware for radar broadcasting and reception can’t (that I know of) be spoofed,” he wrote. “Today, when planes fly using GPS they ‘double check’ their location with radar. [But] the entire plan behind NextGen is to eventually get rid of the radar system — an expensive 20th century relic, I guess. But then we are completely dependent on GPS for control.”

[See also: Insecure industrial control systems, hacker trends prompt federal warnings]

The FAA told NPR that besides confirming ADS-B signals with radar, the NextGen system will automatically check to make sure the correct receivers are picking up the correct signals. If a “ghost plane” is sending a signal to the wrong receiver, it would be spotted as fake. Third, it will use a technique called “multilateration” to determine exactly where every ADS-B signal is sent from.

Nick Foster, a partner of Brad Haines, praised the use of multilateration. “But I still wonder if it would be possible to fool the system on the edges,” he told NPR. “I think the FAA should open it up and let us test it.”

The risks of GPS hacks extend beyond aviation. Logan Scott, a GPS industry consultant, told Wired magazine last year [http://www.wired.com/dangerroom/2012/07/drone-hijacking/2/] that GPS is also used to control the power grid, to power banking operations including ATMs and to keep oil platforms in position. The world’s cellular networks also rely on it.

And given that it is free, unauthenticated and unencrypted makes it vulnerable. “The core problem is that we’ve got a GPS infrastructure which is based on a security architecture out of the 1970s,” Scott said.

Not everybody sees the GPS vulnerability as a major safety problem, however. Martin Fisher is now director of information security at Wellstar Health System, but worked previously in commercial aviation for 14 years. He said radar will still be around, even when the transition to NextGen is complete.

“Don’t for a moment believe there won’t be radar anymore,” he said. “Commercial aircraft will still have anti-collision radar and proximity alarms.”

Beyond that, he said, “do not make the assumption that the pilots flying your aircraft simply follow the instructions of ATC like automatons. These are very highly trained men and women with years of experience flying day, night, good weather, bad weather.”

Paul Rosenzweig said he would still be much more comfortable if the FAA would allow the system to be “stress tested.”

Whatever bugs are in the system, there may be more than 12 years available to fix them. The Washington Post reported in September that Calvin L. Scovel III, inspector general for the Department of Transportation, told a House subcommittee that the program was “four years behind schedule and $330 million over budget.”

The Trojan Horse than landed in Iran – Drones are Spies on the air, steel birds that fly at low altitude and can pick up signals of conversations from cell phones, cordless phones, digital radios, digital TV’s sets and they have the capabilities to take images using infrared technology, and snap pictures as small a few pixels, this amazing and surprising disturbing technology that have taken away the peace of mind, sleep and every bit of privacy to the citizens of the world. These steel birds  have the spies agencies  and best reverse engineers (theives) of the world fighting each other for the software and hardware blue prints.

Cyber criminals could increasingly look to attack, hijack smartphones in 2013 (Yahoo Security) – Some cyber criminals who disseminate viruses and malware in attempts to hijack computers are beginning to shift their focus. Your smartphone may be their next target. PC users have learned to be constantly vigilant to the threat of viruses, which attack relentlessly, slow down computers and potentially put valuable personal information at risk. Windows computers will continue to be targeted going forward but cyber thieves are casting a wider net in the hunt for digital prey.

Read more about access control in CSOonline’s Access Control section.

Related Stories

Using a laptop, a small antenna and an electronic GPS “spoofer” built for $3,000, GPS expert Todd Humphreys and his team at the University of Texas took control of the sophisticated navigation system aboard an $80 million, 210-foot super-yacht in the Mediterranean Sea.

“We injected our spoofing signals into its GPS antennas and we’re basically able to control its navigation system with our spoofing signals,” Humphreys told Fox News. http://www.foxnews.com/tech/2013/07/26/exclusive-gps-flaw-could-let-terrorists-hijack-ships-planes/

%d bloggers like this: