Showing posts with label Hackers. Show all posts
Showing posts with label Hackers. Show all posts

30 January 2009

Austin : Watch Out for Zombies

Austin road signs warn of zombies. Photo from KXAN.

Construction signs warn of zombies:
Hackers change public safety message.

By Shannon Wolfson / January 29, 2009
See Video below.
AUSTIN -- Austin drivers making their morning commute were in for a surprise when two road signs on a busy stretch of road were taken over by hackers. The signs near the intersection of Lamar and Martin Luther King boulevards usually warn drivers about upcoming construction, but Monday morning they warned of "zombies ahead."

"I thought it was pretty funny," said University of Texas sophomore Jane Shin, who saw the signs while driving down Lamar Bouelvard with friends Sunday night. "We wondered who did it."

The City of Austin does not own the signs, but they are responsible for the message. The contractor on the construction project owns the signs. A city spokesperson said the hacked messages were only up for a few hours, until the construction project manager saw them during his morning commute and immediately ordered them to be changed back.

"Even though this may seem amusing to a lot of people, this is really serious, and it is a crime," said Austin Public Works spokesperson Sara Hartley. "And you can be indicted for it, and we want to make sure our traffic on the roadways stays safe."

Hartley said though it was a locked sign, the padlock for it was cut. Signs such as these have a computer inside that is password-protected.

"And so they had to break in and hack into the computer to do it, so they were pretty determined," said Hartley.

This crime is a class C misdemeanor in Texas, and Hartley said it endangers the public.

"The big problem is public safety," said Hartley. "Those signs are out there to help our traffic on the roadway to stay safe and to know what's coming up."

KXAN Austin News cameras caught many drivers slowing down to read the signs as they approached. Some read, "Zombies ahead! Run for your lives!"

Hartley said the city will discuss more secure safety measures with the manufacturer of the signs.

Speculation among the tech-savvy on the Internet is that the signs were inspired by the video game Call of Duty 5, World at War, which is the top game in the country right now and features "nazi zombies," or an upcoming movie about zombies called "Dead Snow" (an official selection at Sundance '09). There are also several online sites that teach people how to break into these construction signs.



Source / KXAN News

Thanks to Mariann Wizard / The Rag Blog

[+/-] Read More...

17 September 2008

Mike Hanks on Sarah Palin's Hacked Emails : Wet Dream No. 365

Photo by Robyn Beck / AFP.

'That's right folks, Gov. Palin's secret e-mail account has been hacked!'
By William Michael Hanks / The Rag Blog / September 18, 2008

Suppose you could read anyone's personal mail you wanted to. Then suppose it's not only personal mail but sensitive business of the State. And then suppose it's not just anyone's personal/State business mail but the secret mail box of a Governor who just got named as a Vice-Presidential candidate.

A hacker group has released the full contents of Sara Palin's two Yahoo e-mail accounts to Wikileaks who has posted a good part of the contents. Of course the great irony is that is is alleged that these accounts were set up to circumvent the public disclosure laws to which official correspondence is subject.

Just think ... if we elect McCain and Palin this kind of strategic genius will be guiding the military intelligence affairs of our country. How could we go wrong? Let me count the ways, after I read a few more of these e-mails.

Check it out at Wikileaks.

FBI Investigates Sarah Palin's Yahoo Account After Hackers Break in...

Alaska governor criticised for avoiding transparency by using private account for official government business
By Bobbie Johnson / September 18, 2008

SAN FRANCISCO -- FBI investigators are examining an email account belonging to the vice-presidential candidate Sarah Palin, after hackers broke into it and posted contents on the internet.

Screenshots and photographs taken from the account — which was hosted by Yahoo — were put online yesterday after being sent to the whistleblowing website Wikileaks.

The images showed a sequence of messages between Palin — the governor of Alaska and surprise choice as Republican vice-presidential nominee — and her state government aides, as well as a draft letter to the California governor, Arnold Schwarzenegger.

Although some of the emails — from the address gov.palin@yahoo.com — appeared to be private, Wikileaks defended its decision by saying that Palin was violating standards on keeping public records by sending official emails through a private account.

"Governor Palin has come under criticism for using private email accounts to conduct government business and in the process avoid transparency laws," the website said. "The list of correspondence, together with the account name, appears to reinforce the criticism."

The hack has been attributed to an activist group known as Anonymous, a loose grouping of internet pranksters, vigilantes and anarchists that has previously locked horns with scientologists and internet paedophiles.

Federal investigators are believed to be examining details of the hack to determine the identities of those responsible — though forensic experts have said this could take some time. Last night the Wikileaks website appeared to have gone down, though the reason was unclear.

A spokesman for the Republican presidential campaign said the attack was invasive and unwarranted. "This is a shocking invasion of the governor's privacy and a violation of law," said Rick Davis, the McCain-Palin campaign manager, in a statement.

"The matter has been turned over to the appropriate authorities and we hope that anyone in possession of these emails will destroy them. We will have no further comment."

The use of non-government email services to conduct official business has been strongly criticised in the past. Official government communications are required to be preserved under federal law, but without using official communications channels, it remains unclear whether emails from private accounts are being correctly preserved.

Last year the issue came to the fore after it emerged that the Bush administration had been using private accounts to conduct White House business.

Some senior Bush advisers — including the former political strategist Karl Rove — had used private accounts, contrary to accepted practice. Documentation lost as a result included email conversations discussing the controversial dismissal of a number of United States attorneys, which critics claim was done because they were unsympathetic to the Republican cause.

The attack by Anonymous is also reported to have stemmed from recent speculation about Palin's decision to fire the Alaska public safety commissioner in July. An independent investigation is under way to examine allegations that she governor sacked Walter Monegan because of his refusal to dismiss a state trooper, Mike Wooten — who was locked in a custody battle with Palin's sister at the time.

"Where you've got a governor apparently using a Yahoo account for state business, that's kind of a complete inversion of what ought to be happening in terms of public records," Charles Davis, executive director of the National Freedom of Information Coalition, told the Anchorage Daily News this week.

Source / Guardian, U.K.

Also see Palin's Email Account Hacked / The Huffington Post, with email screengrabs.

The Rag Blog

[+/-] Read More...

14 August 2008

TECHNOLOGY : How I Became a Soldier in the Georgia-Russia Cyberwar

Cyber Monster by TY Koh

An Army of Ones and Zeroes

'In recent weeks, Georgia's government Web sites have been besieged by denial-of-service attacks and acts of vandalism.'

By Evgeny Morozov / August 14, 2008

As Russian and Georgian troops fight on the ground, there's a parallel war happening in cyberspace. In recent weeks, Georgia's government Web sites have been besieged by denial-of-service attacks and acts of vandalism. Just like in traditional warfare, there's a lot of confusion about what's going on in this technological battle—nobody seems to know whether this is a centralized Russian attack, the work of a loose band of hackers, or something else. Having read so many contradicting accounts, I knew that the only reliable way to find out what was really happening was to enlist in the Russian digital army myself.

Don't get me wrong: My geopolitical sympathies, if anything, lie with Moscow's counterparts. Nor do I see myself as an Internet-savvy Rambo character. I had a much simpler research objective: to test how much damage someone like me, who is quite aloof from the Kremlin physically and politically, could inflict upon Georgia's Web infrastructure, acting entirely on my own and using only a laptop and an Internet connection. If I succeeded, that would somewhat contradict the widely shared assumption—at least in most of the Western media—that the Kremlin is managing this cyberwarfare in a centralized fashion. My mission, if successful, would show that the field is open to anyone with a grudge against Georgia, regardless of their exact relationship with state authorities.

Not knowing exactly how to sign up for a cyberwar, I started with an extensive survey of the Russian blogosphere. My first anonymous mentor, as I learned from this blog post, became frustrated with the complexity of other cyberwarfare techniques used in this campaign and developed a simpler and lighter "for dummies" alternative. All I needed to do was to save a copy of a certain Web page to my hard drive and then open it in my browser. I was warned that the page wouldn't work with Internet Explorer but did well with Firefox and Opera. (Get with the program, Microsoft!) Once accessed, the page would load thumbnailed versions of a dozen key Georgian Web sites in a single window. All I had to do was set the page to automatically update every three to five seconds. Voilà: My browser was now sending thousands of queries to the most important Georgian sites, helping to overload them, and it had taken me only two to three minutes to set up.

But now I knew that there must be other more sophisticated options out there. After some more investigation, I unearthed two alternatives, one creative and one emotional.

The creative option was to write my own simple program. Although my experience with software development is nonexistent, the instructions looked manageable. All I had to do was create a blank text file, copy and paste the URLs of any Web sites that I wanted to attack, specify how many times these sites should be pinged, and copy and paste a few lines of code from the original instructions. The last bit was to rename it with a .BAT extension, instantly converting it into a file that Windows recognizes as an executable program.

My e-Molotov cocktail was ready to go. I just had to double-click the file, and all those sites that I listed would be inundated with requests. The original blog post also encouraged me to run my program at certain times of the day to coincide with attacks launched by others, thus multiplying their effectiveness.

So far, it looked as if my experiment was succeeding. In less than half an hour, I already had two options that could potentially cause some damage, if I hadn't stopped after the first few seconds of testing. What I found missing in my first two trials, though, was a sense of priorities. If I were truly interested in destabilizing the Georgian sites, how would I know whether to focus on the Ministry of Transportation or the Supreme Court? What if other volunteers like me were attacking one but not the other? Were my resources more vital on other e-fronts?

Faced with these dilemmas, I turned to the site StopGeorgia for help. This was the emotional option. Branding itself as a site by and for the "Russian hack underground," StopGeorgia declared that it wouldn't tolerate "aggression against Russia in cyberspace." In addition to this militaristic rhetoric, the site offered a very convenient list of targets—Web sites that either belonged to Georgian government agencies or to potential friends of the country (including those of the U.K. and U.S. embassies in Tbilisi). This list included plus and minus signs to indicate whether the sites were still accessible from Russia and, for some reason, Lithuania. The sites with the plus signs were, logically, the primary target; there was no point in attacking the sites that were already down.

The administrators of StopGeorgia did not stop there; they also offered visitors a virtual present. The treat was a software utility called DoSHTTP, which the site encouraged all readers to download. DoSHTTP's creators bill it as a program to "test" the so-called "denial-of-service attacks" that have become synonymous with modern cyberwarfare. But if you believe the rhetoric on StopGeorgia, its capabilities extend far beyond mere testing—the site encouraged all visitors to use the program to launch attacks, not test them.

After making sure that I wasn't downloading a virus, I installed DoSHTTP and started playing around with it. Along with offering customizable options to advanced users, there was also a nice option for beginners like me. After entering a URL, I could initiate an attack by clicking something that said "Start Flood." A flood did follow—war at the touch of a button.

In less than an hour, I had become an Internet soldier. I didn't receive any calls from Kremlin operatives; nor did I have to buy a Web server or modify my computer in any significant way. If what I was doing was cyberwarfare, I have some concerns about the number of child soldiers who may just find it too fun and accessible to resist.

My experiment also might shed some light on why the recent cyberwar has been so hard to pin down and why no group in particular has claimed responsibility. Paranoid that the Kremlin's hand is everywhere, we risk underestimating the great patriotic rage of many ordinary Russians, who, having been fed too much government propaganda in the last few days, are convinced that they need to crash Georgian Web sites. Many Russians undoubtedly went online to learn how to make mischief, as I did. Within an hour, they, too, could become cyberwarriors.

Source / Slate

The Rag Blog

[+/-] Read More...

Only a few posts now show on a page, due to Blogger pagination changes beyond our control.

Please click on 'Older Posts' to continue reading The Rag Blog.