STE WILLIAMS

News International mail server password FAIL exposed

A letter from News International chairman James Murdoch to the Commons Culture Select Committee has let slip details of how to gain full access to the company’s MS Exchange email system – albeit the information is from four years ago.

MPs published a raft of letters this lunchtime including one from jailed News of the World royal editor Clive Goodman, who claimed senior figures at the now-defunct Sunday tabloid knew that phone hacking was going on at the publication.

James Murdoch has consistently denied any knowledge of widespread phone-tapping beyond the illegal methods employed by “one rogue reporter” at the newspaper.

Among the evidence submitted to the committee was an email between an individual named Simon Avery and the company’s London law firm Harbottle Lewis co-founder Lawrence Abramson.

The email offers a step-by-step guide on how to access News International’s web mail server.

It includes the URL required for accessing the company’s gateway Exchange server as well as the domain and username, and was provided to Harbottle Lewis in May 2007, a few months after Goodman was sacked in February that year.

The instructions reveal that a frankly piss-poor password (mailreview) was issued by the NI sysadmin to the lawyers.

Harbottle Lewis had been granted “independent” access to relevant emails relating to allegations made by Goodman, who appealed his dismissal from the sister firm of Rupert Murdoch’s News Corp on the grounds that other individuals were aware of – and supported – illegal phone-hacking methods used by the former NotW royal correspondent.

Goodman also claimed, according to then-NI director of legal affairs Jon Chapman, that “others were carrying out similar illegal procedures” at the firm.

It was Chapman who granted Harbottle Lewis access to emails inserted in five subfolders within NI’s Exchange public folders for review by the lawyers.

The culture committee, unlike with its roughshod handling of highly sensitive details of NI’s gateway, has redacted information about emails that were searched relating to six individual accounts.

Abramson concluded an email to Chapman on 25 May 2007 with the following statement:

“I can confirm that we did not find any evidence that proved that either [redacted], [redacted] or [redacted] knew that Clive Goodman, Glen Mulcaire or any other journalists at the News of the World were engaged in illegal activities prior to their arrest.”

Mulcaire had worked as a private investigator at the newspaper. He was jailed for six months in January 2007 after admitting to conspiring with Goodman to illegally access voicemail messages.

In a letter on 2 March 2007 to NI HR boss Daniel Cloke, Goodman rejected News International’s notice of termination of employment on the grounds of “gross misconduct”.

He claimed in the missive that phone hacking was “widely discussed” at the paper and alleged that News International had promised to re-hire him after he was convicted of intercepting voicemail messages on the provision that he didn’t implicate the newspaper in court.

Meanwhile, the paperwork submitted to the committee today also revealed exactly how much money Goodman was paid when he was sacked by News International in 2007.

The ex-royal editor was paid £90,502.08 and a further £140,000 in compensation. He was given another £13,000 from News International to pay for his lawyer’s bill.

Separately, Harbottle Lewis told Culture Committee chairman John Whittingdale that the firm had been given “remote electronic access to emails on News International’s server”.

The law firm added that the emails made available to it for review were contained in the aforementioned five sub-folders, which meant “access was not entirely straightforward”. Harbottle Lewis added that the firm had been “instructed only to look for evidence” in those folders in May 2007. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/08/16/news_international_letters_sysadmin_password_fail_clive_goodman/

Malware mints virtual currency using victim’s GPU

Security researchers have unearthed a piece of malware that mints a digital currency known as Bitcoins by harnessing the immense power of an infected machine’s graphical processing units.

According to new research from antivirus provider Symantec, Trojan.Badminer uses GPUs to generate virtual coins through a practice known as minting. That’s the term for solving difficult cryptographic proof-of-work problems and being rewarded with 50 Bitcoins for each per correct block.

General purpose GPUs far outstrip CPUs at performing math calculations and can do so in massively parallel software threads, making them a superior platform for trying huge numbers of possible keys needed to solve the Bitcoin problems.

“This makes the idea of GPGPU extremely attractive for the purpose of bitcoin mining, brute force hash attacks against password databases, and folding (the processing of simulating protein folding, a project initiated by Stanford University known as Folding@home),” Symantec researcher Poul Jensen wrote in a post published Tuesday.

An infected computer that contains an AMD Radeon 6990 CPU could process about 758.82 million cryptographic hashes per second, he wrote. That’s a far cry from an Intel’s Atom N270 netbook CPU, which is capable of handling just 1.19 Mhash/s. Rob Graham, CEO of the firm Errata Security, recently published a thought-provoking post that analyzed the economics of password cracking and Bitcoin-mining using a variety of GPU hardware.

In the event an infected machine has no GPU card, Trojan.Badminer will make do with the CPU.

GPU use could go a long way to solving a problem that has vexed malware developers who want to use other people’s computers to mine Bitcoins. As fellow Symantec researcher Peter Coogan surmised in June, a botnet of 100,000 machines that worked on a problem continuously would earn just $97,000 a month. That’s a paltry amount compared to other botnet enterprises, such as stealing online banking credentials.

“With the advent of Trojan.Badminer and common usage of fast graphics cards, it may well begin to make economic sense to rent botnets in order to carry out distributed bitcoin mining and run the process on an industrial scale,” Jensen wrote.

Of course, crooks investing resources in Bitcoin theft still must grapple with another challenge: The price of the highly decentralized coin fluctuates wildly. It has reached exchange rates as high as $29, but has plummeted since then, with the current price a little more than $11. ®

This post was rewritten to correct inaccuracies about the way Trojan.Badminer worked.

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/08/16/gpu_bitcoin_brute_forcing/

IT admin cops to crippling ex-employer’s network

A Georgia IT administrator has pleaded guilty to crippling the computer system of a Japanese pharmaceutical company’s US subsidiary several months after his employment there ended.

Jason Cornish, 37, admitted using a public internet connection at a McDonald’s restaurant in Smyrna, Georgia, to access the network of the Shionogi subsidiary using an old account, according to federal prosecutors in New Jersey. He then deleted the contents of 15 VMware hosts used to run the equivalent of 88 servers that supported email, employee Blackberrys, order tracking and other essential services.

“The February 3 attack effectively froze Shionogi’s operations for a number of days, leaving company employees unable to ship product, to cut checks, or even to communications via email,” prosecutors wrote in a criminal complaint filed in June. In all, the attack cost the company $800,000.

FBI agents linked the attack to the McDonald’s by analyzing the IP addresses used during the attack. They later discovered Cornish had used his credit card at the restaurant a few minutes earlier.

Cornish faces a maximum of 10 years in prison and $250,000 in fines. Sentencing is scheduled for November 10. He joins a growing roster of disgruntled IT admins charged and convicted of sabotaging their former employers. For a sampling, see related stories below. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/08/17/it_admin_revenge/

Dob in suspect blingy neighbours on Facebook, say cops

Lothian and Borders police has launched a new initiative that allows the public to report suspected criminals, anonymously if they wish, “using facebook or via Bluetooth” or using the Crimestoppers website.

The Scottish force said that the ‘Made from Crime’ scheme is the first of its kind in the country.

The intelligence-gathering campaign is designed to make full use of the Proceeds of Crime Act, specific legislation that allows officers to seize assets that have been purchased through criminal activity.

Lothian and Borders said that more than £41m has already been seized from criminals through the Act, with the money being reinvested in community projects across Scotland. It hopes that the use of social media and other online tools will help them to identify more criminals.

Iain Livingstone, assistant chief constable at the force, said that the launch of the campaign sends out a strong message that Lothian and Borders is serious about tackling criminals profiting from crime in the area.

“I personally appeal to local communities who have any information to come forward immediately, either to Crimestoppers or to Lothian and Borders police,” he added.

The scheme also has the backing of the Scottish Government, the Crown Office and Procurator Fiscal Service.

Solicitor general Lesley Thomson QC said: “We have vast powers available to us through the proceeds of crime legislation and I am delighted that this new initiative will allow people to use social media to report anonymously those who they see flaunting ill-gotten gains before them.

“The Crown Office and Procurator Fiscal Service will continue to take a robust approach to anyone who chooses to fund their lifestyle through crime – and we will use every power available to us as prosecutors to seize their assets and disrupt their activities.”

This article was originally published at Guardian Government Computing.

Guardian Government Computing is a business division of Guardian Professional, and covers the latest news and analysis of public sector technology. For updates on public sector IT, join the Government Computing Network here.

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/08/17/report_crime_on_facebook_say_lothian_and_borders_coppers/

App developer slurped kids’ data without consent

A mobile applications developer will be fined $50,000 for allegedly collecting and disclosing children’s personal information without parental consent, the US Federal Trade Commission (FTC) has said.

The US consumer regulator settled charges against W3 Innovations and its owner, Justin Maples, over the company’s alleged violation of the US’ Children’s Online Privacy Protection Act (COPPA) and the FTC’s rules that ensure enforcement of the Act, it said. A court has yet to approve the voluntary agreement which would withdraw the threat of criminal charges.

The agreement would also prohibit W3 and Maples from violating COPPA in the future and force them to delete all personal information collected in violation of the laws, the FTC said.

“According to the [FTC’s] complaint, [W3 and Maples] did not provide notice of their information-collection practices and did not obtain verifiable parental consent before collecting and/or disclosing personal information from children. The FTC charged that those practices violated the COPPA Rule,” the FTC said in a statement.

COPPA requires that “the operator of any website or online service directed to children that collects personal information from children or the operator of a website or online service that has actual knowledge that it is collecting personal information from a child … obtain verifiable parental consent for the collection, use, or disclosure of personal information from children”.

W3, operating as Broken Thumbs Apps, developed games apps for kids, including Emily’s Girl World, Emily’s Dress Up and Emily’s Runway High Fashion.

The Emily apps “encouraged children to email ‘Emily’ their comments and submit blogs to ‘Emily’s Blog’ via email, such as ‘shout-outs’ to friends and requests for advice. The FTC alleges that the defendants collected and maintained thousands of email addresses from users of the Emily apps”, the FTC said.

“In addition to collecting and maintaining children’s email addresses, the FTC alleges that the defendants also allowed children to publicly post information, including personal information, on message boards,” the FTC statement said.

More than 50,000 Broken Thumbs Apps were downloaded via Apple’s App Store and the company collected personal data of thousands of children under the age of 13 without consent, the FTC claimed.

The FTC voted to refer the case to the US Department of Justice, which filed the FTC’s complaint and proposed a settlement agreement with a district court in California. The court will now decide whether to approve the settlement.

“The FTC’s COPPA Rule requires parental notice and consent before collecting children’s personal information online, whether through a website or a mobile app,” FTC chairman Jon Leibowitz said.

“Companies must give parents the opportunity to make smart choices when it comes to their children’s sharing of information on smartphones,” Leibowitz said.

The FTC said it was the first time it had been involved in a case against an apps developer.

Copyright © 2011, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/08/17/app_dev_collected_kid_data_says_ftc/

Profit-disaster CEO at Blue Coat: I’ll get my coat

Blue Coat boss Michael Borman has fallen on his sword following declining sales and profits in fiscal first quarter 2012.

The web security and WAN optimisation minnow saw sales come in at $109.5m (£66.7m) down 9 per cent sequentially and 11 per cent on last year, as profits fell 70 per cent quarter-on-quarter to $2.7m (£1.6m) and 81 per cent on Q1 2010.

The exit of Borman, who only joined the firm early September last year – he had previously been CEO at Avocent – was confirmed at the same time as the numbers.

“Our first quarter results were disappointing as they came in below our expectations,” said David Hanna, chairman at Blue Coat. “We are taking the necessary actions.”

His replacement, Gregory Clark – most recently president and CEO at enterprise software group Minicom – is set to join Blue Coat from the middle of next month in the same roles.

The Q1 financials were impacted by “go-to-market challenges” and “weakness in the US Federal vertical” which pushed down revenues and profits, the firm said. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/08/17/blue_coat_ceo_quits/

Facebook wannabe rioters cop large helpings of porridge

Two men have been banged up for four years apiece, after unsuccessfully inciting violent disorder on Facebook.

Jordan Blackshaw, 20, of Vale Road in Marston near Northwich and Perry Sutcliffe-Keenan, 22, of Richmond Avenue, Warrington, were handed the harsh sentences at Chester Crown Court yesterday.

“If we cast our minds back just a few days to last week and recall the way in which technology was used to spread incitement and bring people together to commit acts of criminality it is easy to understand the four-year sentences that were handed down in court today,” said Chester police assistant chief constable Phil Thompson.

jordan blackshaw

Jordon Blackshaw

“In Cheshire, we quickly recognised the impact of the situation on our communities and the way in which social media was being used to promote and incite behaviour that would strike fear in to the hearts of our communities.”

The court hoped that the hefty sentences would deter others from writing similar stupid posts on social networks.

Perry Sutcliffe-Keenan

“Officers took swift action against those people who have been using Facebook and other social media sites to incite disorder,” added Thompson.

“The sentences passed down today recognise how technology can be abused to incite criminal activity and send a strong message to potential troublemakers about the extent to which ordinary people value safety and order in their lives and their communities. Anyone who seeks to undermine that will face the full force of the law.”

The two men pleaded guilty under sections 44 (intentionally encouraging or assisting an offence) and 46 (encouraging or assisting offences believing one or more will be committed) of the Serious Crime Act.

However, neither Blackshaw or Sutcliffe-Keenan were successful in their efforts to incite a riot in their home towns, after posting “events” and “pages” on Facebook.

The Crown Prosecution Service told the BBC that Blackshaw had called on Facebookers who were members of the “Mob Hill Massive Northwich Lootin'” group to “Smash d[o]wn in Northwich Town”.

That group has now been removed from Facebook.

The event created by Blackshaw urged people to meet on the afternoon of 9 August “behind maccies” – understood to mean the McDonald’s fast food joint – in Northwich town centre.

He also posted the first comment on the page, declaring: “We’ll need to get this kickin off all over.”

Only the police turned up at Maccie-D’s, however, and Blackshaw was promptly arrested.

Sutcliffe-Keenan, meanwhile, created a Facebook page calling on people to “riot” on 10 August. His message went out to 400 contacts on the site, but he took down the page the following morning, claiming the post had been a joke.

Similarly, no rioting took place as a result of Sutcliffe-Keenan inciting people to do exactly that in his home town of Warrington.

But both men were handed tough sentences yesterday for their actions on Facebook.

Their profiles no longer exist on the social network. But inevitably, a page in support of the pair has already appeared on Facebook.

The “Free Jordan Blackshaw Perry Sutcliffe-Keenan” page currently has 20 people who “like” it.

However, many of the posts on the site are heavily abusive comments. So presumably the Facebook police will see this and take down the page.

There’s also a separate page urging Facebookers to campaign “Against Jail Sentences for Rioters Looters”.

It currently has one solitary fan. ®

[We submit for your consideration the term ‘flashplod’ for a planned flashmob event where only police turn up – apparently now quite common – ed]

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/08/17/facebook_riot_four_year_sentences/

WikiLeaks admits insider deleted loads of its data

WikiLeaks admits insider deleted loads of its data

  • alert
  • print
  • comment
  • tweet

We do have more than one source, honest. Well, we did

Free whitepaper – Creating Order from Chaos in Data Centers and Server Rooms

WikiLeaks has explained the non-appearance of Bank of America data it frequently promised to publish: a defector took the only copies with him when he left the organisation and has now deleted the files.

Daniel Domscheit-Berg left WikiLeaks last summer and took the documents with him following a dispute with Julian Assange. This seems to have centred on Berg’s relationship with a woman at Microsoft.

Berg was suspended at the end of August 2010 and, WikiLeaks claims, has tried to extract money from the group in return for their data. In January he set up his own version of WikiLeaks, but the site has been inactive since then. He also wrote a book about his time at the site.

Assange’s organisation confirmed on Twitter that Berg had destroyed 20 gigabytes of information from the Bank of America, the entire US no-fly list and US intercept arrangements for 100 companies as well as details and emails from 20 neo-Nazi groups and a German far right group. ®

Free whitepaper – Data Center Projects

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/08/22/wikileaks_data_lost/

Anonymous/LulzSec chick-lit MP kid threat pooh-poohed

Chick-lit authoress and politician Louise Mensch, somewhat famed for being fired from EMI due to “inappropriate dress” and copping to possible drug use and bad dancing in her salad days, says that hacktivists from Anonymous and/or LulzSec have threatened her children by email.

The Tory MP, who has penned various lighthearted lipstick’n’bonking-themed ladies’ reads under the name Louise Bagshawe, tweeted:

Had some morons from Anonymous/LulzSec threaten my children via email. As I’m in the States, be good to have somebody from the UK police advise me where I should forward the email. To those who sent it; get stuffed, losers.

Oh and I’m posting it on Twitter because they threatened me telling me to get off Twitter. Hi kids! ::waves::

I’ve contacted the police via the House of Commons and the email is with them now. I don’t bully easily, kids. Or in fact at all.

Security-firm mouthpiece Graham Cluley (of Sophos) pooh-poohed the notion that Anons or LulzSec-ers might be behind the outrage, commenting:

In my opinion it doesn’t sound very likely that the threatening email (which hasn’t been released) was from Anonymous or LulzSec. Neither group has a history of engaging in physical violence, preferring to sit behind computer keyboards instead.

Furthermore, it seems very odd that Anonymous or LulzSec would send an email, when their normal practice is to post a message on Twitter or a link to a statement on PasteBin.

Mensch previously achieved modest fame after being contacted by “an investigative journalist” (unidentified) following her participation in political grillings aimed at exploring the extent of skulduggery in Fleet Street journalism. The supposed journo referred to claims that she had possibly taken drugs and committed dance blunders while working at EMI in the 1990s.

The punchy MP stated on that occasion:

Although I do not remember the specific incident, this sounds highly probable … since I was in my twenties, I’m sure it was not the only incident of the kind; we all do idiotic things when young. I am not a very good dancer and must apologise to any and all journalists who were forced to watch me dance that night at Ronnie Scott’s …

[This was] not why I was fired by EMI. “Leaving work early” and “missing the odd day at work” along with “inappropriate dress” were the reasons quoted to me.

So there. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/08/22/louise_mensch/

German authorities park tanks on Facebook’s lawn

Facebook has once again been criticised by a data protection authority in Germany for siphoning off information about the country’s citizens to servers based in the US.

This time the company’s “like” button and “pages” feature have been attacked by DPA officers in the Northern German federal state of Schleswig-Holstein.

On Friday, Germany’s Independent Centre for Privacy Protection (ULD) called on website operators based in that region to “shut down their fan pages on Facebook and remove social plug-ins such as the ‘like’-button from their websites,” according to a statement on the DPA’s website.

It said it had concluded that those features violated the German Telemedia Act as well as the Federal Data Protection Act.

The Schleswig-Holstein DPA noted that anyone using the functions within the dominant social network would have their “service traffic and content data” transferred to servers located in the US.

“Whoever visits facebook.com or uses a plug-in must expect that he or she will be tracked by the company for two years,” it claimed.

“Facebook builds a broad individual and for members even a personalised profile. Such a profiling infringes German and European data protection law.

“There is no sufficient information of users and there is no choice; the wording in the conditions of use and privacy statements of Facebook does not nearly meet the legal requirements relevant for compliance of legal notice, privacy consent and general terms of use,” the ULD argued.

It said it expected website owners based in Schleswig-Holstein to bar such user data being passed on to Facebook by “deactivating” such services.

Formal complaints could be brought against public organisations that fail to comply, said the ULD, while fines could be slapped on private outfits who flout the rules, which the authority plans to introduce by the end of next month.

“ULD has pointed out informally for some time that many Facebook offerings are in conflict with the law. This unfortunately has not prevented website owners from using the respective services and the more so as they are easy to install and free of charge,” said ULD commissioner Thilo Weichert.

“Institutions must be aware that they cannot shift their responsibility for data privacy upon the enterprise Facebook which does not have an establishment in Germany and also not upon the users.”

The commissioner added that the Schleswig-Holstein state was continuing to analyse the “privacy impact” of Facebook applications.

“Users can take their part by trying to avoid privacy adverse offerings,” the commissioner added.

“To internet users, ULD offers the advice to keep their fingers from clicking on social plug-ins such as the ‘like’-button and not to set up a Facebook account if they wish to avoid a comprehensive profiling by this company. Profiles are personal information; Facebook is requiring its members to register their actual name.”

This is Germany’s latest privacy crackdown against Facebook.

A few weeks ago, Hamburg’s data protection authority warned the social network that it could be fined if the company failed to delete the “biometric data” it harvests from its facial recognition tech, which was quietly rolled out to the service in Europe earlier this year.

Facebook quickly rejected the claim that it wasn’t meeting its obligations under EU data protection law.

The company isn’t actually breaching any Brussels’ data protection law as of today. But legislation is expected in the autumn from the EU that will be applied to any business operating in Europe.

“We firmly reject any assertion that Facebook is not compliant with EU data protection standards. The Facebook Like button is such a popular feature because people have complete control over how their information is shared through it,” said the firm in an emailed statement.

“For more than a year, the plugin has brought value to many businesses and individuals every day. We will review the materials produced by the ULD, both on our own behalf and on the behalf of web users throughout Germany.” ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2011/08/22/schleswig_holstein_facebook_dislikes_like_and_pages/