01/19/13

Government Spying on everyone -Thanks Microsoft

gAtO lEaRnOn 01-01-213 we hear that Microsoft buys Skype and makes changes to allow Police surveillance. Then on 01-07-2013 we hear that a professor at the Warsaw University of Technology, Wojciech Mazurczyk, found a way to insert secret 70 bits of data and add secret information similar to steganography.spy-spy

Lawful Intercept is what it’s called and we just heard punch – counter-punch from the government. I just posted about corporations and governments using offensive cyber weapons to fight crime, but this looks like just plain old spying on citizens like China, Iraq and Syria does. Skype is owned by Microsoft and we know that Word and other products have back doors for them to snoop and governments to use in criminal cases. I guess they do it the proper way and get a real FISA document to monitor us it’s citizens.

mEoW 12-30-2012 our re-elected President Obama signs FISA Warrantless Wiretapping Program. STOP – SAY WHAT. mEoW – Forget about gun control how about the privacy of citizens, are we becoming like China, Iraq and Syria the more I find out about this the crazier it becomes. I hate Skypes but now finding this out NO WAY DUDE-

I did a little digging and I found a document from the Straford hack from the LutzBoat crew and this has been on the play board for a long time. More and more governments that play nice with the America and Microsoft will have to live with the fact that they are spying on us, the people. I voted for Obama but I’m pretty sure any president would want to be able to justify this abuse of power to monitor it’s citizens, what get’s me is we scream and yell when other countries do it but here we are doing to ourselves and nobody is talking about this- Hay press wake up. I have nothing to hide but if you do you have been warned – enjoy your government spying on you behind your back - gAtO oUt

Lab Notes:

IT security continues to be the greatest challenge facing government CIOs worldwide. Most experts agree that governments require stronger partnerships between the public and private sectors for both better protection of government IT systems from intruders and for greater visibility into operators’ network traffic to fight crime. However, government systems and intelligence activities constitute a very sensitive information environment. Governments must proceed with caution when forming technology partnerships for hardening their IT network security. Melissa E. Hathaway, who in February 2009 was named to be the Obama Administration’s top cyber security official, points out how

Lawful Intercept

Challenge

Criminals, predators and hackers now use chats, blogs, webmail and Internet applications such as online gaming and file-sharing sites to hide their communications.

Solution

Qosmos provides law enforcement agencies with a powerful solution to identify a target using multiple virtual IDs and intercept all related IP- based communications. Any trigger, such as a “user login = target” initiates intercept of all IP traffic related to the “target.”

Example of recognized applications and protocols

VoIP Email (POP, SMTP)

Webmail (Gmail, Hotmail, Live Mail, SquirrelMail, Yahoo mail, etc.)

Instant Messaging (Aim, SNM, Skype, Yahoo, Google Talk, QQ, Maktoob, Paltalk, etc.)

Online games (World of Warcraft)

Online classified ads

Audio/Video (H.323, SIP, MGCP, RTP, RTCP, MMSE, RTSP, SHOUTcast, Yahoo Video,

MSN Video, SCCP, etc.)

Web applications (Dailymotion, Google, eBay, Google Earth, HTTP, MySpace, Wikipedia,

YouTube, etc.)

Example of information extracted

Caller, phone number, called party, duration of call

Webmail login, email address, sender, receiver, subject matter, attached documents

Instant messaging sender, receiver, contact lists and status

Forum login, IP address, MAC address, mobile ID (IMSI, IMEI)

Protocols identified even for unidirectional traffic (e.g. email by satellite).

http://www.huffingtonpost.com/2012/12/30/obama-fisa-warrantless-wiretapping_n_2385690.html

http://enterprise-call-recording.tmcnet.com/topics/enterprise-call-recording/articles/321789-sounds-silence-skype-hold-more-than-expected-thanks.htm

http://www.ronpaulforums.com/showthread.php?399961-Microsoft-Buys-Skype-Makes-Changes-to-Allow-Police-Surveillance

08/18/11

The Chosun Ilbo (English Edition): Daily News from Korea – Chinese Hackers Blamed for Latest Leak at Nate, Cyworld

Chinese hackers were responsible for stealing the personal information of 35 million users of Internet portal Nate and blogging site Cyworld, police said on Thursday.

The stolen information, which included the people’s names and resident registration numbers, may be used to facilitate spam mail or voice phishing.

The Cyber Terror Response Center of the National Police Agency briefed reporters on the findings of their investigation, saying that the hackers used ALZip, a Korean file compression program, to access the data. The stolen personal information was leaked to a server that is believed to be based in China via another server in a third location. The ALZip program produced by ESTsoft is distributed free of charge and has around 14 million users.

via The Chosun Ilbo (English Edition): Daily News from Korea – Chinese Hackers Blamed for Latest Leak at Nate, Cyworld.

08/1/11

CHINA Either China’s Communist Party opens up to democracy or falls – Asia News

An analysis of China’s domestic political situation shows how, increasingly, moderates want to take part in the decision-making process. However, they face the all-out opposition of the party, which fears losing its leadership role. Social unrest is just around the corner.

via CHINA Either China’s Communist Party opens up to democracy or falls – Asia News.

07/29/11

DailyTech – Chinese Hackers Score Heist of 35 Million South Koreans’ Personal Info

China is home to some of the world’s most sophisticated hackers, many of which are given a virtual green light to attack foreign governments and businesses, in attacks that assist China’s government and Chinese businesses.  It’s a well known fact, but everyone is too afraid to try to stand up to the Asian nation, as it hold large amounts of debt, as well as enjoys control of much of the world’s rare mineral resources and manufacturing.

via DailyTech – Chinese Hackers Score Heist of 35 Million South Koreans’ Personal Info.

07/27/11

Are spymasters targeting hacktivists? | TG Daily

With more and more cyber attacks against governments and corporations, there is a growing belief that hackers could be potentially be exploited or actively recruited by various government entities.

For example, cyber activists associated with Anonymous have targeted a number of servers belonging to the U.S. government, federal defense contractors and high-profile companies.

via Are spymasters targeting hacktivists? | TG Daily.

07/25/11

China: Losing The War Against The Internet

Losing The War Against The Internet

July 25, 2011: China’s surging economic, and military, power has a fatal flaw. Several decades of enforcing the  ”one child” policy has prevented China’s population from spiraling out of control over the last few decades. But it also means that there will be too many old people and too few workers in another decade, and for several decades after that. Meanwhile, the shortage of young workers is already here, as the first “one child” generations come of age. These workers demand more money, and attention. Wages are moving up rapidly, and there’s still a shortage of workers. There’s also a shortage of skilled people in the armed forces. Plenty of low skilled or inept volunteers, but not the ones that are most needed, and in demand.

via China: Losing The War Against The Internet.