STE WILLIAMS

Posh potty owners flushed by dodgy Bluetooth password

Cloud storage: Lower cost and increase uptime

A high-tech toilet that takes care of everything except wiping its owner has been left wide open to attackers thanks to a basic security flaw.

toilet

Bluetooth blunder leaves bollocks prone to blasting


The Satis toilet, a $5,686 (£3,821) appliance built by Japanese (of course) manufacturer Lixil, is designed to open itself when the owner approaches, perfumes the air with deodorant while the user does their business, activates a bidet function and then a hot-air blower for drying before lowering its lid.

It can be activated by a My Satis application that sits on the user’s smartphone and alerts the toilet when the user moves within Bluetooth range. But an investigation by Trustwave’s Spiderlabs shows the application and toilet use a default 0000 password, meaning anyone with the app can activate the controls.

“An attacker could simply download the ‘My Satis’ application and use it to cause the toilet to repeatedly flush, raising the water usage and therefore utility cost to its owner,” its advisory reads. “Attackers could cause the unit to unexpectedly open/close the lid, activate bidet or air-dry functions, causing discomfort or distress to user.”

It’s fair to say that anyone willing to splash out thousands of dollars on a top-class toilet isn’t going to be too bothered by an increased water bill. But having the toilet seat bite you in the ass or getting an unexpected blast of water to the privates would be more discomforting – and the latter trick has been popular throughout the centuries.

Hellbrunn Palace

Austrian noblemen had a sick sense of humor

Visitors to the Austria’s Hellbrunn Palace, built in the 17th century by Prince-Archbishop Markus Sittikus von Hohenems, will have used the ancient prankster’s outdoor dining table with stone seats. Those invited to dine were bound by etiquette not to rise before Sittikus, and he used to enjoy firing water jets up through the seats and watching his guests’ discomfort.

While such games might seem childish now, El Reg is willing to bet that there will be more than a few people out there who would take great delight in hanging around outside expensive bathrooms and listening to the screams as blasts of water or hot air are sent to the unfortunate user’s unmentionable areas.

What the advisory does show, however, is the lamentable state of firmware security. Far too many vulnerable devices, from laptop batteries to nuclear missiles, have used default zeros as an access code and it’s the first thing any enterprising hacker checks.

The advisory also shows that the company involved doesn’t seem to be very interested in the problem. Trustwave contacted the vendor two months ago to fix this, but so far there’s been no response, so if you do own a posh potty, be careful while you pee. ®

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/05/posh_potty_owners_left_flushed_by_poor_bluetooth_password/

Step into the BREACH: HTTPS encrypted web cracked in 30 seconds

Cloud storage: Lower cost and increase uptime

Black Hat 2013 A new hacking technique dubbed BREACH can extract login tokens, session ID numbers and other sensitive information from SSL/TLS encrypted web traffic, say researchers.

Secret data crucial to securing online banking and shopping can be lifted from an HTTPS channel in as little as 30 seconds, we’re told.


BREACH (short for Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) attacks the common Deflate data compression algorithm used to save bandwidth in web communications. The exploit is a development of the earlier Compression Ratio Info-leak Made Easy (CRIME) exploit, which also involved turning compression of encrypted web requests against users.

The code-breaking research behind BREACH was unveiled by security researchers Angelo Prado, Neal Harris and Yoel Gluck during a presentation at the Black Hat hacking conference in Las Vegas on Thursday.

All versions of TLS/SSL are at risk from BREACH regardless of the encryption algorithm or cipher that’s in play, the trio said.

The attacker just has to continually eavesdrop on the encrypted traffic between a victim and a web server before tricking marks into visiting a website under the miscreant’s control.

The attacker’s booby-trapped website hosts a script that runs the second phase of the attack: this forces the victim’s browser to visit the targeted website thousands of times, over and over, each time appending a different combination of extra data. When the attacker-controlled bytes match any bytes originally encrypted in the stream, the browser’s compression kicks in and reduces the size of the transmission, a subtle change the eavesdropper can detect.

This data leakage – a type of Oracle attack – means an eavesdropper can gradually piece together an email address or security token in a HTTPS exchange, byte by byte, using a technique akin to a high-tech game of Battleships. The time needed to perform a successful attack, and how many requests need to be sent, is dependant of the size of the secret information attackers are targeting, Ars Technica notes.

The leaked data provides enough clues to decrypt a user’s supposedly protected cookies or other targeted content. The recovery of secret authentication cookies open the door for attackers to pose as their victims and hijack authenticated web sessions, among other attacks, the British Computer Society (BCS) notes in a blog post.

The practical upshot is that tokens and other sensitive information sent over SSL connections could be lifted even though the encrypted contents of emails and one-off orders sent to e-commerce websites are beyond the scope of the attack. Prado, Harris and Gluck released tools to test whether websites are vulnerable to BREACH, as well as techniques to defend against the exploit during their presentation at Black Hat.

Not so lucky

BREACH is the latest in a growing list of attacks against HTTPS encryption, the internet’s gold standard for secure communication, following attacks such as CRIME, BEAST, Lucky 13 and others.

During a debate at Black Hat, security researchers expressed fears that over the medium term algorithms such as RSA and Diffie-Hellman will be weakened or broken as a result of advances in crypto-analysis as well as the development of attacks such as BREACH.

“There’s a small, but definite chance that RSA and non-ECC Diffie-Hellman will not be usable for security purposes within two to five years,” said Alex Stamos of Artemis Internet, a division of iSEC Partners. “We’re not saying this is definite,” he added.

Kaspersky Lab’s Threatpost blog has more on the debate here. Stamos is not alone in looking forward towards the end of life of cryptographic tools and techniques that have served us well but are increasing showing their age. The RSA algorithm is about to turn 40, for example.

Adi Shamir (the S in RSA) urged security researchers to think about post-cryptography security during a debate at the RSA Conference cryptographers’ panel session back in March. ®

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/02/breach_crypto_attack/

Earn £8,000 a MONTH with bogus apps from Russian malware factories

Cloud storage: Lower cost and increase uptime

Just 10 professionally run malware-making workshops in Russia are responsible for 30 per cent of the Trojans, spyware and other nasties infecting smartphones globally. That’s according to a study by mobile security outfit Lookout.

These underground crime labs churn out DIY kits ideal for scriptkiddies looking to make a fast buck: the tools can be used to distribute malware and earn money from it with little or no coding experience or hacking skills. Once installed on a device, the malware is typically disguised as a legit, popular app and secretly texts premium-rate numbers, thus racking up charges on the victims’ phone bill.


The Russian development centres are skilled at releasing new Android builds and configurations of their code every two weeks; organising hosting for the malware; registering short-code phone numbers that victims’ mobes text; and creating marketing campaign management tools — the malware developers’ customers get paid for marketing and distributing the bogus apps.

These affiliates customise their copy of the malware to make it look like the latest Angry Birds or Skype utility, for example. Then they use social networks, such as Twitter, to draw people into downloading the booby-trapped software. Almost all the malware targets Android smartphones.

“We reviewed 250,000 unique Twitter handles and of those, nearly 50,000 linked directly to these toll fraud campaigns,” Lookout researcher Ryan Smith explained in a blog post.

“The victim of the scheme is usually a Russian-speaking Android user looking for free apps, games, MP3s or pornography.

“The victim may have been using search engine or click through links in tweets or mobile ads, then unwittingly download the malicious app which secretly adds a premium SMS charge to their phone bill.”

A research paper from Lookout on its Dragon Lady* investigation explains the malware creation centres have taken many ideas on how to run their businesses from legitimate small software houses.

“Organised groups of Android malware authors are operating like startups: tapping multiple individuals or organisations for specialisation in different business areas, leveraging online tools for promotion and developing affiliate programs,” the Lookout team explained.

“We’ve seen evidence that these affiliate marketers have earned between $700/month to $12,000/month [£450/month to £7,800/month] from these scams, and estimate that there are thousands of individual distributors and potentially tens of thousands of affiliate websites promoting these custom SMS malware in the same manner as traditional affiliate web marketers.”

More than 50 per cent of Lookout’s total malware detections during the first half of 2013 were Russian-based toll fraud. And 60 per cent of this activity can be traced back to just 10 centres in Russia.

Lookout has been actively tracking SMS fraud since the first example was found in the wild in August 2010. Lookout has been classifying Russian SMS-swindling malware in individual groups or “families” based on similarities in code and key features in the three years since. The data has also allowed the security biz to track individual malware families back to affiliates and the programmers’ headquarters.

The firm unveiled its research during a presentation at Def Con 21 in Las Vegas at the weekend. Its complete Dragon Lady research paper into the phenomenon can be found here. ®

Bootnote

* The “Dragon Lady” code-name Lookout has applied to its research references the U-2 reconnaissance aircraft that were used during the Cold War to monitor the Soviet Union.

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/05/mobile_malware_lookout/

Lumpy milk and exploding yoghurt? Your fridge could be riddled with MALWARE

Cloud storage: Lower cost and increase uptime

Antivirus guru AVG is preparing for a future where even fridges and freezers are targeted by malware, the firm’s chief operating officer has said.

In an interview with El Reg, John Giamatteo said AVG was keeping an open mind about where the next big malware threats were going to come from. It has already shifted its focus from the PC market towards mobile and tablet security software, but sees white goods as well as the wider internet of things as possible areas for expansion. The vulnerability of web-connected devices to malware has already been the subject of a keynote by Vint Cerf at RSA. There are already web-connected fridges on the market, so who knows, it may already have happened.


The firm is riding high on the back of the PRISM scandal, which has boosted the security sector by showing the public “how exposed” they are to online threats.

On the back of global concerns about NSA surveillance, AVG has increased its user base by about a quarter, from 121 million in June last year to 155 million. This growth has also been driven by the “explosive” level of demand for mobile security apps that work on smartphones or tablets, which accounts for 44 million of the total number of users.

Giamatteo said: “The PC market is very mature, but we are seeing strong growth on tablets, smartphones and connected devices like cars. Earlier in the year, we signed a partnership with Renault which resulted in us providing our security portfolio for use in their intelligent smart cars.

“This is the sort of thing we will see more and more. Smart TVs, as they become ever more interconnected, are an area for growth. If you go to Korea, there are interconnected fridges and freezers. We are very much on the forefront of that and will look to get a fair share of the market. The sky’s the limit.”

He added: “Wherever there is a connected device in the the connected home, we’ll be there.”

The COO said the PRISM scandal had been “helpful” for AVG and the wider security industry, as it raised awareness of privacy issues and the potential damage malware could wreak upon consumers’ lives.

“It certainly increased awareness for people, who realised through being exposed to what was going on that there was a need for some sort of service to protect themselves. It has been helpful in the sense that it really raised awareness.”

In September, AVG will release a product which will allow users to control the privacy and security of all their devices at once, using a “dashboard” system. All AVG’s current software is being updated with this new system in mind.

AVG has also released results showing it had a strong quarter. Revenue for the second quarter of 2013 was $100.4 million, compared with $82.5 million in the second quarter of 2012, representing an increase of 22 percent.

Warnings about white goods viruses have been knocking about for a while. More than a decade ago, The Register warned that malware could make your fridge fling its doors open in the middle of the night, potentially playing havoc with the temperature of breakfast-time milk. Luckily, just like the Millennium Bug, the grim prophecy has not yet come to pass.

Click here to see a Tumblr page dedicated to internet fridges (and be prepared for a few swears).

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/05/food_gone_rotten_perhaps_your_fridge_has_got_a_virus/

Upgraded 3D printed rifle shoots 14 times before breaking

Magic Quadrant for Enterprise Backup/Recovery

Get ready for another wave of debate on weaponised 3D printers, because the Canadian behind a one-shot-and-it’s-dead 3D printed rifle has come back with a weapon that doesn’t break when used.

The Canadian in question is known only as Matthew and posts videos of his creation on a YouTube channel previously dedicated to the ukulele.


The channel now has two new videos showing the “Grizzly 2.0”, as the weapon is known. One depicts upgrade being fired by someone we’ll assume is “Matthew” holding the Grizzly in his very own hands, not the kind of thing one would do if it were going to explode!

Vulture South does, however, have some doubts about just what you’ll see in the video below. We raise suspicions because the barrel of the weapon is always taken out off frame when loaded. If one wished to demonstrate a successful firing of such a weapon, would one not perhaps also try to make it very plain just what’s going on?

We’re also a little suspicious about the lack of any smoke. Some might say glare in the background of the shot explains that, but why not arrange a better background to make the demonstration more effective and remove any doubt?

Watch Video

Once you’ve viewed the video you may counter that some small, brassy, cylinders emerge from the barrel after each shot. Or you may look at the video below, featuring hand-held firing, which at about the 0:50 mark does show “Matthew” putting something metallic and yellow into the barrel.

Watch Video

On the plus side, the description of the ten shots video says the ammunition used is the Winchester Dynapoint, a model it’s not hard to find online and which also resemble the yellow cylinders in the video.

But of course if one wanted perpetrate a hoax of this nature, one would take care of little details like that.

In any case, the weapon is still far from perfect: the barrel split after the 14th shot.

Other hints from the video suggest “Matthew” now has backers, as he writes “Special Thanks to those who donated for materials costs”. He also says “Files will be available for download shortly.” Let the next wave of hysteria begin! ®

Cloud storage: Lower cost and increase uptime

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/05/upgraded_3d_printed_rifle_shoots_14_times_before_breaking/

Tor servers vanish as FBI swoops on kiddie-smut suspect

Cloud storage: Lower cost and increase uptime

Network anonymisation outfit TOR has posted a fascinating piece of commentary on reports that some of the anonymous servers it routes to have disappeared from its network.

“Around midnight on August 4th we were notified by a few people that a large number of hidden service addresses have disappeared from the Tor Network,” the piece starts. “There are a variety of rumors about a hosting company for hidden services: that it is suddenly offline, has been breached, or attackers have placed a javascript exploit on their web site”.


As it explores the rumours, the post goes on to name an entity called Freedom Hosting, and to vigorously dissociate TOR from the organisation.

Distancing TOR from Freedom seems a fine idea given numerous reports, such as this from The Irish Examiner, suggest its founder Eric Eoin Marques has been arrested because the FBI believes he facilitated the distribution of child pornography using TOR. The FBI wants to extradite Marques to the USA.

TOR’s not sure if the arrest and the disappearance of some nodes is linked, but is saying “someone has exploited the software behind Freedom Hosting … in a way that it injects some sort of javascript exploit in the web pages delivered to users.” That payload results in malware reaching users’ PCs, possibly thanks to “potential bugs in Firefox 17 ESR, on which our Tor Browser is based.”

TOR is “investigating these bugs and will fix them if we can”.

Various forums online, however, report that the malware has spread beyond sites hosted by Freedom. Some suggest TORmail, TOR’s secure email service, may also have been compromised, or that the attack means TOR is no longer able to mask users’ IP addresses.

TOR’s post says it’s not sure what’s really happening and that it will update users once it learns more.

We’ll do likewise. ®

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/05/tor_servers_vanish_as_fbi_swoops_on_kiddiesmut_suspect/

FBI spooks use MALWARE to spy on suspects’ Android mobes

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

The Federal Bureau of Investigation is using mobile malware to infect, and control, suspects’ Android handsets, allowing it to record nearby sounds and copy data without physical access to the devices.

That’s according to “former officers” interviewed by the Wall Street Journal ahead of privacy advocate Christopher Soghoian’s presentation at hacker-conflab Black Hat later today.


The FBI’s Remote Operations Unit has been listening in to desktop computers for years, explains the paper, but mobile phones are a relatively new target.

It would never work with tech-savvy suspects, though: suspects still need to infect themselves with the malware by clicking a dodgy link or opening the wrong attachment. This is why computer hackers are never targeted this way – they might notice and publicise the technique, said the “former officers”, who noted that in other cases it had proved hugely valuable.

Such actions do require judicial oversight, but if one is recording activities rather than communications, the level of authorisation needed is much reduced. A US judge is apparently more likely to approve reaching out electronically into a suspect’s hardware than a traditional wiretap, as the latter is considered a greater intrusion into their privacy.

Gaining control of that hardware still requires a hole to crawl through; ideally a zero-day exploit of which the platform manufacturer is unaware.

The WSJ cites UK-based lawful spook spyware supplier Gamma International as selling such exploits to the Feds. The company was recently in the news after allegations that it was also supplying dodgy governments with kit – allegedly including malware disguised as the Firefox browser.

Given the convergence of mobile and desktop, it’s no surprise to see desktop techniques being applied to mobile phone platforms by both hackers and law enforcement agencies.

The usual techniques of not opening unknown attachments or unsigned downloads should protect you against the FBI, just as it would against any spear-phishing attempt. But then again, if you know that, they probably wouldn’t try using it against you. ®

Magic Quadrant for Enterprise Backup/Recovery

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/02/fbi_staff_admit_hacking_android/

Step into the BREACH: New attack developed to read encrypted web data

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Black Hat 2013 A new hacking technique dubbed BREACH can extract login tokens, session ID numbers and other sensitive information from SSL/TLS encrypted web traffic, say researchers.

Secret data crucial to securing online banking and shopping can be lifted from an HTTPS channel in as little as 30 seconds, we’re told.


BREACH (short for Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) attacks the data compression algorithms used to save bandwidth. The exploit is a development of the earlier Compression Ratio Info-leak Made Easy (CRIME) exploit, which also involved turning compression in encrypted web requests against users.

The code-breaking research behind BREACH was unveiled by security researchers Angelo Prado, Neal Harris and Yoel Gluck during a presentation at the Black Hat hacking conference in Las Vegas on Thursday.

All versions of TLS/SSL are at risk from BREACH regardless of the encryption algorithm or cipher that’s in play, the trio said.

The attacker just has to continually eavesdrop on the encrypted traffic between a victim and a web server before tricking marks into visiting a website under the miscreant’s control.

The attacker’s booby-trapped website hosts a script that runs the second phase of the attack: this forces the browser to visit the website the victim was using thousands of times, over and over, each time appending a different combination of extra data. When the attacker-controlled bytes match any bytes originally encrypted in the stream, the browser’s compression kicks in and reduces the size of the transmission, a subtle change the eavesdropper can detect.

This data leakage – a type of Oracle attack – means an eavesdropper can gradually piece together an email address or security token in a HTTPS exchange, byte by byte, using a technique akin to a high-tech game of Battleships. The time needed to perform a successful attack, and how many requests need to be sent, is dependant of the size of the secret information attackers are targeting, Ars Technica notes.

The leaked data provides enough clues to decrypt a user’s supposedly protected cookies or other targeted content. The recovery of secret authentication cookies open the door for attackers to pose as their victims and hijack authenticated web sessions, among other attacks, the British Computer Society (BCS) notes in a blog post.

The practical upshot is that tokens and other sensitive information sent over SSL connections could be lifted even though the encrypted contents of emails and one-off orders sent to e-commerce websites are beyond the scope of the attack. Prado, Harris and Gluck released tools to test whether websites are vulnerable to BREACH, as well as techniques to defend against the exploit during their presentation at Black Hat.

Not so lucky

BREACH is the latest in a growing list of attacks against HTTPS encryption, the internet’s gold standard for secure communication, following attacks such as CRIME, BEAST, Lucky 13 and others.

During a debate at Black Hat, security researchers expressed fears that over the medium term algorithms such as RSA and Diffie-Hellman will be weakened or broken as a result of advances in crypto-analysis as well as the development of attacks such as BREACH.

“There’s a small, but definite chance that RSA and non-ECC Diffie-Hellman will not be usable for security purposes within two to five years,” said Alex Stamos of Artemis Internet, a division of iSEC Partners. “We’re not saying this is definite,” he added.

Kaspersky Lab’s Threatpost blog has more on the debate here. Stamos is not alone in looking forward towards the end of life of cryptographic tools and techniques that have served us well but are increasing showing their age. The RSA algorithm is about to turn 40, for example.

Adi Shamir (the S in RSA) urged security researchers to think about post-cryptography security during a debate at the RSA Conference cryptographers’ panel session back in March. ®

Magic Quadrant for Enterprise Backup/Recovery

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/02/breach_crypto_attack/

Terror cops swoop on couple who Googled ‘backpacks’ and ‘pressure cooker’

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Freelance writer Michele Catalano thought she might get herself a pressure cooker to prepare Quinoa, the south American wonder-grain. Her husband wanted a new backpack.

Both did what you do these days: go online and search for them. Catalano’s husband did so from his work computer, and later left his job.


Nothing to see here, you say to yourself … except for the nasty coincidence that alleged Boston bombers Dzhokhar and Tamerlan Tsarnaev are said to have hidden pressure cookers in backpacks. But when Catalano’s husband left a job and his old boss looked at his search history, he or she decided to tip off the authorities.

The Catalanos found that out the hard way when, as Michele has blogged her husband “saw three black SUVs in front of our house; two at the curb in front and one pulled up behind my husband’s Jeep in the driveway, as if to block him from leaving.”

Here’s what happened next:

“Six gentleman in casual clothes emerged from the vehicles and spread out as they walked toward the house, two toward the backyard on one side, two on the other side, two toward the front door.”

Catalano says the six men were from the “joint terrorism task force” and asked her husband “Have you ever looked up how to make a pressure cooker bomb?” and numerous other questions to identify him, discern if he possessed a pressure cooker or has any interest in bombs.

After about 45 minutes, the agents left, leaving a shaken man, a very-viral blog post and a fascinating little insight into the war on terror behind them.

The last, Catalano says, was an utterance by one of the agents that “They mentioned that they do this about 100 times a week. And that 99 of those visits turn out to be nothing.”

Since Catalano’s first post, she’s popped out another explaining the source of the tip was not PRISM-style surveillance, but a tip from hubby’s employer to the local Suffolk Police Department. The fine men and women of that department have confirmed the source of the tip.

Her post concludes “All I know is if I’m going to buy a pressure cooker in the near future, I’m not doing it online.

“I’m scared. And not of the right things.”

Since that post it’s emerged that her fears should be directed at the climate of paranoia that led hubby’s employer to join the dots and find the image of a terrorist. Which of course is just how the terrorists want us to feel. ®

Magic Quadrant for Enterprise Backup/Recovery

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/02/michele_catalano_home_visit_after_googling_backpacks_and_pressure_cookers/

Latvian foreign minister speaks out against giving up alleged Gozi writer to US

Cloud storage: Lower cost and increase uptime

Latvia has set itself on a collision course with America after the tiny nation’s foreign minister said he did not want the alleged creator of the notorious Gozi trojan extradited to face justice in the US.

Writing on the Latvian Foreign Ministry’s website, Edgars Rinkēvičs insisted he would not like to see Dennis Calovskis spend the rest of his life in an American jail. The 27-year-old Latvian programmer is accused of designing the Gozi trojan, a Trojan which has stolen millions from bank accounts across the world.


However, Latvian courts have knocked back Calovskis’ extradition appeal for a second time, a decision that could potentially put politicians and judges at loggerheads. Rinkēvičs wanted to see Latvia change its whole extradition treaty with the US, a call rejected by judges.

In his article, which we have run through Google Translate and edited slightly for the sake of clarity, the Latvian foreign minister wrote:

I am not entitled to express an opinion as to whether the person has or has not violated the law. That is explored by purely legal means. However, I do have my own reasons to vote against the extradition of Dennis Calovskis for trial in the United States.

Rinkēvičs warned that the Latvian suspect could face more than 60 years in prison, a “disproportionate” sentence that possibly infringed the “high standards” of human rights that Latvia has promised to stick to as a member of the European Union.

He said that the programmer should face justice in Latvia, because it was far from clear that he actually committed a crime on American soil. The case would be a good chance for the tiny nation’s cybercops to “grow their own skills and expertise in investigating sophisticated breaches of laws”.

The Latvian foreign minister also drew attention to the case of Gary McKinnon, the Briton who became famous after the American authorities sought his prosecution for hacking into NASA and other US government machines in search of UFO information.

McKinnon avoided extradition (after an extremely protracted legal struggle) and also any subsequent prosecution in the UK. He was never accused of attempting to gain financially from his actions, and his defence was successful in large part due to the fact that he suffered from Asperger’s Syndrome and was deemed medically unfit to be extradited, imprisoned and tried in the US.

In January Preet Bharara, United States Attorney for the Southern District of New York, said Calovskis was a “top international criminal” whose nickname is “Miami”. She alleged that Calovskis, along with Russian Nikita Kuzmin and Romanian Mihai Paunescu, designed Gozi and used it to infect least a million computers around the world, resulting in the loss of “tens of millions of dollars from bank accounts of individuals and businesses”. ®

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/08/02/latvian_foreign_minister_tells_america_he_will_not_extradite_alleged_virus_designer/