Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

How to drain the Deep Swamp

SUBHEAD: The WikiLeaks files made accusations of Russian hacking, and Trump links meaningless.

By Raul Ilargi Meijer on 8 March 2017 for the Automatic Earth -
(https://www.theautomaticearth.com/2017/03/how-to-drain-the-deep-swamp/)


Image above: Wired Magazine "Wanted" cover detail from November 2012 subtitled "How  Kim Dotcom outsmarted the FBI and Hollywood to become the hunted man on the internet". Should he be advising Trump. From (http://www.networkagency.com.au/story/wired-magazine-kim-dotcom).

[IB Publisher's note: Just when you thought things could not get crazier... they just have. This Automatic Earth article shows how schizophrenic the Western world has become. We now know that the CIA is competing with the NSA to not only gather all communication data and content between Americans through their electronic devices; but they are also in the business of creating "fake news" and attributing their activity as originating in Russia. Russia is likely doing the same. Trump, the fool, has been a gullible tool of his worst enemies. His selfishness, narcissism and eight year old bully mentality are leading us into real trouble. Those still holding onto a hope that his operations will lead to a more peaceful and prosperous world are delusional. The real enemy of America (and the rest of the "civilized" world is the inability to get off "growth" and fossil fuels that feed it. Hunker down folks, the storm is about to engulf us.]

Obviously, like hopefully many people, I’ve been following the WikiLeaks CIA revelations, and closely. It’s too early for too many conclusions, if only because WikiLeaks has announced much more will flow from that same pipeline.

But one thing is already clear: the CIA is -still- a club that sees enemies behind every tree, and behind every TV set too. Which is not as obvious a world view as it may seem; it’s just something we’ve become used to.

Moreover, as we see time and again, organizations like the CIA and NATO have no qualms about ‘creating’ enemies if they are in short supply. The flavor du jour has now been, for years, Russia, but don’t be surprised if another one is cultivated alongside it. ISIS, China, North Korea, plenty of options, and plenty of media more than willing to aid the cultivation process.

It’s a well-oiled machine geared towards making something out of nothing, a machine very adept at making you believe anything it wants you to.

In this way, our friends can become our enemies, and our enemies our friends.

What gets lost in translation is that this way in reality we become our own worst enemies.

While the upper and most secretive layers of society, filled with folk of questionable psychological constitution -sociopaths and psychopaths-, get to chase their dreams of wealth and power, those who try to live normal decent lives are, for that very purpose, increasingly subjected to poverty, misery and fear. As our economies decline further, this will only get worse.

Who needs your -conscious- vote or voice if these can be easily manipulated? Or do you not think you’re being manipulated? How many of you, American or European, think Russia is an actual threat to you? I’m afraid by now there’s a majority on each continent who perceive Putin as an evil force.

The president of a country that spends one-tenth on its military of what the US does. Trump’s announced military spending increase alone is almost as much as Russia spends in a whole year.

If Putin is really the threat he’s made out to be, to both Europe and the US, he must be extremely smart; merely devious wouldn’t do it. A man who can be an active threat to two entire continents and almost a billion people while spending a fraction on building that threat of what those he threatens do, must be a genius. Or the victim of media-politico manipulation.

But we don’t stop there. As the CIA spying and hacking files once again make abundantly clear, America increasingly seeks its enemies at home. This may be presented in the shape of Donald Trump, or terrorists on US soil, imported or not, but claiming that we can still tell a real threat from an invented one is no longer credible.

We are led along on a propaganda leash 24/7, and the best thing about it is we believe we are not.

That’s why it’s a good idea to pay close attention to what WikiLeaks is telling us.

The most extreme example of the political machinery turning our friends into enemies is probably right there, in the WikiLeaks and whistleblower corner of society. Earlier today I wrote:
The CIA spent a huge wad of taxpayer money on this, and then lost it all. It’s early days to say what this will mean for the agency’s abilities, and the nation’s safety, as well as that of American citizens, but it’s not good. Question is: who’s going to investigate how this could have happened? (Snowden and Kim Dotcom could)… And who’s going to repair the damage done? Anyone could be spying on your phone and your TV by now, not just the CIA -as if that wouldn’t be bad enough.
Then later I saw I wasn’t the only one who had thought of this. Dotcom tweeted:
Hi @realDonaldTrump, you're in real danger. You need good intel on CIA threat. We can help you. Conf with Julian, Edward and myself? RT
Edward Snowden and Kim Dotcom and Julian Assange and Chelsea Manning are ‘the enemy’, so say our ‘leaders’. They have received this honorable label for exposing secrets these same leaders were trying to hide from us. Secrets most of us, if we think it over, would say should not be kept from us.

The NSA spying on the American people, or the CIA turning your phones and TVs and cars into objects that can be used against you, these are things that don’t belong in our societies.

Still, as I’ve always said, if they can do it -from a technical point of view-, they will, damn the law. So we will have to make very sure the laws keep up with these developments, or we’re defenseless.

The Obama administration hasn’t been much help with this, and the rest of Washington won’t be either, they’re not just part of the machine, they are the engine that drives the machine. Obama allegedly gave in to the CIA for fear of ending up like JFK and the rest, along with the press, is under control too.

So perhaps Trump is our best chance at putting a stop to this coup, this deep state, from taking over. If we still can. And for that we might well need Snowden and Dotcom and Assange, who are not the enemies they are made out to be, they are the smartest among us, or at least they belong right up there.

And they are not only the smartest, they are the bravest too.

Locking them up would be a huge disservice to our societies, it would be much better to ask them to help us figure out what game the hell is being played.

One thing the WikiLeaks files accomplished is they made all accusations of Russian hacking, and of links between Trump and Russia, utterly meaningless in one fell swoop.

Because the CIA has acquired the capability, both through hacking Russian files and through coding, to leave ‘footprints’ that make it look like the Russians left them. And the only ‘proof’ there ever was for all these accusations was based on these footprints. That’s one narrative that must now be restarted from scratch -just one of many.

All we need now is for Trump to figure out who his enemies are, and who his friends. He already knows the CIA is not his friend, but has he figured out yet that the whistleblowers are not his enemy? And has his crew?

Kim Dotcom is right, Trump is in real danger, he’s been watched, and being watched, 24/7. Whether Obama ordered that or not is not very relevant. There are more urgent matters at hand.

And somewhere along the way he’s going to have to figure out that chasing women and children around the country and out of it is not just ugly, it’ll cost him too much sympathy too.

But so far all protests come from the Democrats and their supporters, who have all been left voiceless and shapeless by the election and now see their Russian conspiracy narratives blown to smithereens too, so why wouldn’t he please his own voters for a bit longer?

Well, for one thing, because he has to start to realize he’s going to need very broad support, and soon, be a president for all Americans so to speak, to fend off the CIA et al, and in what may be the hardest thing to do, he needs to invoke transparency, explain to people exactly what he does, and why, to drain the deep swamp.

If he fails in all this, and for now the odds point in that direction, those who protest him today will feel validated, right, and winners. They will be tragically wrong. Because if Trump loses this, the CIA wins. And then we will all live in 1984 for as far into the future as we can see.

I know there’s a lot that’s not to like about Trump and Bannon and all those guys. However, look at it this way: they are the only ones who can keep the doors of the vault from slamming shut for the rest of our lives, leaving time for y’all to wake up and find a president who doesn’t seek to turn your friends into your enemies.

At least you’ll still have that choice.

With present-day Washington, Democrat or Republican, there’s no such choice. They’re CIA, as are the media. Kim Dotcom tweeted this too today:


Image above: An excerpt from the first chapter of George Orwell's "1984" that begin with "Behind Winston's back the voice from the telescreen was still babbling away about pig iron and the overfulfillment of the Ninth Three-Year Plan..." Those were the good old days when Ronald Reagan was President. See (http://www.theorwellreader.com/excerpt.shtml).

IB Publisher's end note: This from Wikipedia:
"Kim Dotcom, also known as Kimble[7] and Kim Tim Jim Vestor,[8] is a German-Finnish Internet entrepreneur, businessman, musician, and political party founder who resides in Auckland, New Zealand.[9] He first rose to fame in Germany in the 1990s as a teenage Internet entrepreneur. Dotcom is best known for being the founder of now-defunct file hosting service Megaupload (2005-2012).[10][11] Earlier, he achieved notoriety in Germany as a teen hacker who was booked 2 years suspended sentence for selling identities that he had siphoned from telephone operators’ client database. After the closure of Megaupload, he has been accused of criminal copyright infringement and other charges, such as money laundering, racketeering and wire fraud, by the U.S. Department of Justice.[12] Dotcom has denied the charges, and is currently fighting attempts to extradite him to the United States.[13] On February 20, 2017, a New Zealand court ruled that Kim, as well as co-accused Mathias Ortmann, Bram van der Kolk and Finn Batato, could be extradited to the US on charges related to Megaupload. Kim and his lawyer will appeal the decision." 

Could this be a reason for his approach to Donald Trump - a pardon?

.

America versus the Deep State

SUBHEAD: The NSA propaganda was designed as a smokescreen to conceal the veracity of the Wikileaks releases.

By James Kunstler on 9 January 2017 for Kunstler.com-
(http://kunstler.com/clusterfuck-nation/america-versus-deep-state/)


Image above: NYT headquarters. Home of the "Gray Lady" and Deep State news outlet. From (https://globalelite.tv/2016/page/23/).

The bamboozlement of the public is nearly complete. The Deep State has persuaded 80 percent of Americans that all news is propaganda, especially the news emanating from the Deep State’s own intel department.

They’re still shooting for 100 percent. The fakest of all “fake news” stories turns out to be… “Russia Hacks Election.” It was reported conclusively Saturday on the front page of The New York Times, a wholly-owned subsidiary of the Deep State:
Putin Led a Complex Cyberattack Scheme to Aid Trump, Report Finds
WASHINGTON — President Vladimir V. Putin of Russia directed a vast cyberattack aimed at denying Hillary Clinton the presidency and installing Donald J. Trump in the Oval Office, the nation’s top intelligence agencies said in an extraordinary report they delivered on Friday to Mr. Trump.
You can be sure that this is now the “official” narrative aimed at the history books, sealing the illegitimacy of Trump’s election. It was served up with no direct proof, only the repeated “assertions” that it was so. In fact, it’s just this repetition of assertions-without-proof that defines propaganda. It can also be interpreted as a declaration of war against an incoming president.

The second civil war now takes shape: It begins inside the groaning overgrown apparatus of the government itself. Perhaps after that it spreads to the WalMart parking lots that have become America’s new town square. (WalMart sells pitchforks and patio torches.)

Did the Russians make Hillary Clinton look bad? Or did Hillary Clinton manage to do that herself?

The NSA propaganda was designed as a smokescreen to conceal the veracity of the Wikileaks releases. Whoever actually rooted out the DNC and Podesta emails for Wikileaks ought to get the Pulitizer Prize for the outstanding public service of disclosing exactly how dishonest the Hillary operation was.

The story may have climaxed with Trump’s Friday NSA briefing, the heads of the various top intel agencies all assembled in one room to emphasize the solemn authority of the Deep State’s power.

Trump worked a nice piece of ju-jitsu afterward, pretending to accept the finding as briefly and hollowly as possible and promising to “look into the matter” after January 20th — when he can tear a new asshole in the NSA.

I hope he does. This hulking security apparatus has become a menace to the Republic.

Whether Trump himself is a menace to the Republic remains to be seen. Certainly he is the designated bag-holder for all the economic and financial depravity of several preceding administrations. When the markets blow, do you suppose the Russians will be blamed for that? Did Boris Yeltsin repeal the Glass-Steagall Act?

Was Ben Bernanke a puppet of Putin? No, these actions and actors were homegrown American. For more than thirty years, we’ve been borrowing too much money so we can pretend to afford living in a blue-light-special demolition derby. And now we can’t do that anymore. The physics of capital will finally assert itself.

What we’re actually seeing in the current ceremonial between the incoming Trump and the outgoing Obama is the smoldering wreckage of the Democratic Party (which I’m still unhappily enrolled in), and flames spreading into the Republican party — as idiots such as Lindsey Graham and John McCain beat their war drums against Russia.

The suave Mr. Obama is exiting the scene on a low wave of hysteria and the oafish Trump rolls in on the cloudscape above, tweeting his tweets from on high, and perhaps it’s a good thing that the American people for the moment cannot tell exactly what the fuck is going on in this country, because from that dismal place there is nowhere to go but in the direction of clarity.

.

Is Grizzly Steppe a joke?

SUBHEAD: No,Grizzley Steppe is not a locale in Yellowstone Park or a Chippandale dancer's name. It's just propaganda.

By Deirdre Fulton on 30 December 2016 for Common Dreams -
(http://www.commondreams.org/news/2016/12/30/critics-still-see-holes-us-evidence-russian-election-interference)


Image above: Jeh Johnson, Director of the Department of Homeland Security under cover as male stripper "Grizzly Steppe" of Chipendale's. From Wikipedia and (https://s-media-cache-ak0.pinimg.com/originals/d1/64/ba/d164ba23e6e8a95d8f29ae33813c23e7.jpg). Mashup by Juan Wilson.

[IB Publisher's note: Grizzly Steppe is actually a ridiculous name made up by US intelligence agencies. On Thursday, the DHS and FBI released a report on alleged Russian election interference, dubbed GRIZZLY STEPPE]

Critics still see holes in US 'Evidence' of Russian election interference. Like the Bush administration's claims of Iraqi WMDs, the charges that Russia 'hacked' the presidential election in November have not been established beyond secret intelligence sources.

As the U.S. expels 35 Russian diplomats over hacking charges, critics say the so-called evidence released Thursday alongside President Barack Obama's sanctions is an insufficient response to calls for hard proof of the allegations.

The FBI/Department of Homeland Security Joint Analysis Report "Grizzly Steppe" (pdf), published as part of the White House's response to alleged Russian government interference in the 2016 election process, "adds nothing to the call for evidence that the Russian government was responsible for hacking the [Democratic National Committee, or DNC], the [Democratic Congressional Campaign Committee], the email accounts of Democratic party officials, or for delivering the content of those hacks to WikiLeaks," wrote cybersecurity expert Jeffrey Carr on Friday.

The brief report "merely listed every threat group ever reported on by a commercial cybersecurity company that is suspected of being Russian-made and lumped them under the heading of Russian Intelligence Services (RIS) without providing any supporting evidence that such a connection exists," Carr said.
He continued:
If the White House had unclassified evidence that tied officials in the Russian government to the DNC attack, they would have presented it by now. The fact that they didn't means either that the evidence doesn't exist or that it is classified.
If it's classified, an independent commission should review it because this entire assignment of blame against the Russian government is looking more and more like a domestic political operation run by the White House that relied heavily on questionable intelligence generated by a for-profit cybersecurity firm with a vested interest in selling "attribution-as-a-service."
In fact, cyber-expert Robert M. Lee, in his posted critique on Friday, noted that the FBI/DHS report "is intended to help network defenders; it is not the technical evidence of attribution."

As such, Lee argued, it is likely to "confuse readers" who are seeking such evidence.

Meanwhile, Intercept journalist Sam Biddle, who recently published a take-down of the public evidence that had been put forth as of mid-December, added his voice to calls for more in the way of hard evidence:
Sam Biddle @samfbiddle
GRIZZLY STEPPE only restates premise that APT 28/29 are Russian gov, rather than proving it. let’s hope for more in congressional testimony
And The Young Turks politics reporter Jordan Chariton also raised questions in a video posted Thursday afternoon:


Video above: Jordan Chiriton From (https://youtu.be/snJin79SbaU).

For raising these questions, Chariton and others who supported his demand were branded "Kremlin cheerleaders," continuing what journalist Glenn Greenwald described as a trend:
Glenn Greenwald @ggreenwald
it's worse than that. If you question adequacy of the evidence or want to see more, they'll accuse you of disloyalty & being a Russian agent https://twitter.com/JustinRaimondo/status/814875448651853824 
Glenn Greenwald @ggreenwald
Lets be clear: U aren't an American patriot & don't respect Constitution if u believe Saddam more than our President & intelligent services https://twitter.com/matthewjdowd/status/814615305729220609 
Glenn Greenwald @ggreenwald
Words don't exist for how low it is to depict someone as a Kremlin agent or traitor for questioning adequacy of evidence for USG assertions.
Like Greenwald, author and media critic Howard Friel sees parallels between the lead-up to the U.S. invasion of Iraq and the current "unconfirmable claims" of Russian election interference.
"Like the Bush administration's claims of Iraqi [weapons of mass destruction], the charges that Russia 'hacked' the presidential election in November have not been established beyond secret intelligence sources, which have been treated and printed by the New York Times as impeccable," Friel wrote on Friday.     

He continued:
Just as the Times editorial page in February 2003 had no basis for concluding that Colin Powell's presentation at the UN was "the most powerful case to date" that Iraq possessed WMD, the Times today has no confirmable basis for concluding that "there should be no doubt" that Russia hacked the presidential election last month or that President Obama has any basis for "punishing Russia," which in any event is unprofessional and jingoistic journalistic usage from the leading newspaper in the United States.

Yet, it reflects the warlike tone and tenor of the liberal political and journalistic establishments, led by the New York Times, which seems determined to drive us over the cliff once again toward war.
Meanwhile, Russian President Vladimir Putin said Friday he would not expel any U.S. diplomats in retaliation for Obama's moves—"a surprisingly calm reaction," as the Guardian described, "that appears to be designed as an overture to the incoming U.S. president, Donald Trump."

.

Wilileaks internet connection cut


SUBHEAD: Julian Assange has implemented contingency plans including release of "dead Man Keys".

By Tyler Durden on 17 October 2016 for Zero Hedge -
(http://www.zerohedge.com/news/2016-10-17/wikileaks-activates-contingency-plans-after-unknown-state-party-cuts-julian-assanges)


Image above: mashup of Julian Assange in the cross hairs.  From (http://www.thegatewaypundit.com/2016/10/breaking-julian-assange-internet-connection-cut-off-midst-podesta-clinton-document-dump/).

In what may be the first official retaliation against Julian Assange and Wikileaks since the organization started disseminating the hacked Podesta emails, this morning WikiLeaks announced it has "activated contingency" plans after Assange's internet link was intentionally cut off by a state party, WikiLeaks has said in a tweet.

There was little actual detail, aside from a subsequent tweet in which WikiLeaks called on the public to support it by donating.

Previously on Sunday, there was concern about Assange's well-being when Wikileaks tweeted out what some suggested were the "dead man keys" that are allegedly the encryption codes for highly damaging secret documents to be unveiled in the case of Assange's death.

Assange tweeted these keys:
pre-commitment 1: John Kerry 4bb96075acadc3d80b5ac872874c3037a386f4f595fe99e687439aabd0219809

pre-commitment 2: Ecuador
eae5c9b064ed649ba468f0800abf8b56ae5cfe355b93b1ce90a1b92a48a9ab72

pre-commitment 3: UK FCO f33a6de5c627e3270ed3e02f62cd0c857467a780cf6123d2172d80d02a072f74
These may have been the "contingency plans" referred to in the subsequent Wiki tweet.

Even former outspoken Trump advisor Roger Stone got involved tweeting that "John Kerry has threatened the Ecuadorian President with "grave consequences for Equador" if Assange is not silenced" adding that "Reports the Brits storm the Ecuadorian Embassy tonite while Kerry demands the UK revoke their diplomatic status so Assange can be seized."

So far this appears to be just wild speculation. The latest news in the Assange saga comes as WikiLeaks continues to release on a daily basis hacked emails from Hillary Clinton’s campaign manager John Podesta, which could ruin Clinton’s chances of becoming the next US president.

Clinton’s campaign has suggested that WikiLeaks is working together with the Russian government to help defeat them in favor of Trump.

The latest, 9th, batch comes amid revelations of Clinton’s cozy relationship with the mainstream media, and how they work closely to control the media landscape and set up stories that show her in a favorable light. Earlier this month, it emerged that Hillary Clinton reportedly wanted to “drone” WikiLeaks founder Julian Assange when she was the US secretary of state.

So far there had been no intervention by outside entities to attempt to silence Julian Assange, so the latest intervention "by a state party", if confirmed would be a notable escalation in the status quo, and suggests that Wikileaks may have even more damaging revelations to come.



"State Party" Internet Interuption
SUBHEAD: WikiLeaks claims 'state party' cut Assange's internet connection.

By Louis Nelson on 17 October 2016 for Politico - (http://www.politico.com/story/2016/10/julian-assange-internet-connection-cut-229875)

The internet connection of WikiLeaks founder Julian Assange has been cut “by a state party,” the document-dumping organization announced Monday morning on Twitter.

In a post to its Twitter account, WikiLeaks did not announce which state party had cut the internet connection.

Assange has lived inside the Ecuadorian Embassy in London since 2012, where he has remained in order to avoid extradition to Sweden, where he is wanted in connection with a rape allegation.

Assange has said he fears he would be extradited to the United States to face espionage charges if he were to step outside the Ecuadorian Embassy.

WikiLeaks has taken on a greater role in the presidential election in recent days, releasing thousands of pages of allegedly hacked emails from the personal account of Hillary Clinton campaign chairman John Podesta.

Neither the Clinton campaign nor Podesta himself has verified the authenticity of the emails, which detail the inner working of the former secretary of state’s White House bid.

Podesta is far from the only high-level political figure to become the target of online hackers.

An attack on the email systems of the Democratic National Committee yielded embarrassing messages that led to the resignation of committee Chairwoman Debbie Wasserman Schultz just days before the start of her party’s nominating convention in Philadelphia.

And emails belonging to former Secretary of State Colin Powell exposed his criticisms of both Clinton and Republican presidential candidate Donald Trump.

Earlier this month, the U.S. government blamed those attacks and others on Russia, whose “thefts and disclosures are intended to interfere with the U.S. election process,” Secretary of Homeland Security Jeh Johnson said.

That the emails have been hacked almost exclusively from Democratic sources has led many to assume that the attacks are intended to favor Trump, seen as friendlier candidate to the Russian government.

Podesta said it was a “reasonable conclusion” that Roger Stone, a Trump ally who has spoken to Assange, has been given advance warning of the leaks. Both Stone and Republican vice presidential candidate Mike Pence have denied any connection to any email hacking.

White House Press Secretary Josh Earnest said last week that he could not specifically tie Podesta’s hacked emails to the Russian government since their publication did not begin until after the U.S. had released its intelligence assessment on the other attacks.

In its Tweet announcing that Assange’s internet connection had been severed, WikiLeaks said that it had “activated the appropriate contingency plans.”
 
Any impediment to WikiLeaks' posting abilities caused by the cutting of Assange's internet connection appeared remedied by Monday afternoon, when the organization posted another batch of allegedly hacked Podesta emails to its website.

WikiLeaks had previously been posting such batches in the morning but waited until the afternoon on Monday to release its latest group of emails.

The group claimed on Twitter later on Monday that Ecuador was behind the disruption, without offering any evidence.

"We can confirm Ecuador cut off Assange's internet access Saturday, 5pm GMT, shortly after publication of Clinton's Goldman Sachs speechs," the group tweeted.
.

Screwing with the internet

SUBHEAD: Yesterday there was a peculiar breakdown of internet service. It could have been a glitch or it could have been the NSA.

By Juan Wilson on 11 September 2012 for Island Breath -
(http://islandbreath.blogspot.com/2012/09/screwing-with-internet.html)


Image above: Anonymous and V for Vendetta, or is it the NSA. From (http://www.examiner.com/article/go-daddy-hosted-sites-off-line-anonymous-member-claims-responsibility).

Yesterday morning when we booted our computer to post the days articles on Island Breath a strange thing happened. We couldn't raise our website. We have a peculiar structure to our site... it resides in two realms. One is at (www.islandbreath.org). This is the overarching parent and frame of Island Breath as well as the location of all graphic images. Articles created prior to 2009 are also there.

The other realm is where new individual articles are posted (http://islandbreath.blogspot.com). I won't go into the details, but this arrangement makes it easier for our editors to put the stories together.

The (www.islandbreath.org) was unavailable yesterday morning, whereas (http://islandbreath.blogspot.com) was available. As a result no one, including us, could get to our home page, and if they could find a posted article there was no graphics. This was because the host for  (www.islandbreath.org) who have their servers in Phoenix, Arizona, could not be reached through any web browser we tried in Windows or Mac operating systems.

Our blogspot  posted articles are hosted by Google and Google did not seen affected by the overall blackout, but other sites were.

Yesterday morning Chris Record wrote at (http://www.empowernetwork.com/takemassiveaction/blog/godaddy-hacked-on-9-10-2012/)
GoDaddy has been Hacked!
If you use email, or surf the web, or have any domains at GoDaddy, you are likely affected by the Anonymous Hack on Godaddy today.

Servers are down.  Emails are down.  Websites are Down.  Millions of them…They are currently troubleshooting the issues, and there is not much that we can do but sit back and wait and contemplate what life is like without the internet for a little while.

Godaddy Hacked!

Well, it wasn't just GoDaddy sites affected. We use (www.VoxDomains.com) and all the sites they hosted, as well as their parent site, were down. Calls to the company resulted in either that funny beeping you get when you cannot make a connection  - or when you could - an insane mix of muzak and interrupted robotic messages about how important our call was, and all we had to do was hang on.

We noticed that big corporate internet sites seemed unaffected. Lots of independent  and small business sties were. For example, the website of storage facility at the Lawai Cannery was out all morning and intothe afternoon. There business database is online and was unavailable.

Maybe it was an Anonymous hack and maybe not. Another suggestion was that it was an NSA interruption to better secure flow and control of selected intelligence targets.

See also:
http://techcrunch.com/2012/09/10/godaddy-outage-takes-down-millions-of-sites
http://www.examiner.com/article/go-daddy-hosted-sites-off-line-anonymous-member-claims-responsibility
Ea O Ka Aina: Big Brother's New Home 3/15/12
.

Urgent Call to Halt Smart Meters

SOURCE: Ken Taylor (taylork021@hawaii.rr.com) SUBHEAD: There is not a "smart" device on the grid that is protected from some sort of Trojan Horse. By David Chalk on 12 April 2012 for Forbidden Knowledge - (http://www.forbiddenknowledgetv.com/videos/smart-1/hacking-expert-joins-urgent-callto-halt-smart-grid.html) Image above: Cargo cranes as Trojan Horses on the Smart Grid. Mashup by Juan Wilson. The vulnerability of the energy industry's new wireless smart grid will inevitably lead to lights out for everyone, according to leading cyber expert David Chalk. In an online interview for an upcoming documentary film entitled 'Take Back Your Power' (www.thepowerfilm.org), Chalk says the entire power grid will be at risk to being taken down by cyber attack, and if installations continue it's only a matter of time. “Unless we wake up and realize what we're doing, there is 100% certainty of total catastrophic failure of the entire power infrastructure within 3 years” “We're in a state of crisis,” said Chalk. “The front door is open and there is no lock to be had. There is not a power meter or device on the grid that is protected from hacking - if not already infected - with some sort of trojan horse that can cause the grid to be shut down or completely annihilated.” “One of the most amazing things that has happened to mankind in the last 100 years is the Internet. It's given us possibility beyond our wildest imagination. But we also know the vulnerabilities that exist inside of it. And then we have the backbone, the power grid that powers our nations. Those two are coming together. And it's the smart meter on your home or business that's now allowing that connectivity.” Chalk also issued a challenge to governments, media and technology producers to show him one piece of digital technology that is hack-proof. “The computer companies that are involved, the manufacturers that are involved, bring forward a technology and I will show you that it's penetrable,” said Chalk. “I'll do it on national TV, I'll do it anywhere. But I can guarantee you 100% that there is nothing out there today – nothing – that can't be penetrated.” Chalk's strong words come amidst increasing reports of the smart grid's fatal insecurities, even from the governments and energy companies who are forcing their hand with the smart program. “Every endpoint [meter] is a new potential threat vector,” according to Doug Powell, manager, SMI Security, Privacy & Safety, for Canadian utility BC Hydro. And in an interview with energynow.com, former CIA Director James Woolsey was also highly critical of energy policy makers, whose plans received multi-billion dollar funding as part of the Economic Stimulus Act of 2008. “The so-called 'smart grid' that is as vulnerable as what we've got now is not smart at all,” said Woolsey. “It's a really, really stupid grid.” But there's more. In an audit released in January, the US Inspector General Gregory Friedman was also highly critical. “Without a formal risk assessment and associated mitigation strategy, threats and weaknesses may go unidentified and expose the ... systems to an unacceptable level of risk,” Friedman wrote. Energy officials knew of these weaknesses but approved plans for the projects anyway, auditors said. “The initial weaknesses had not always been fully addressed, and did not include a number of security practices commonly recommended for federal government and industry systems.” And security is not the only technologically-based obstacle faced by smart grid proponents. In March, alarm bells were rung following current CIA Director David Patraeus' confirmation that governments will use wireless smart appliances to spy on citizens. “Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters,” Patraeus said at a meeting of In-Q-Tel, the CIA's venture capital firm. He added that this will prompt a rethink of “our notions of identity and secrecy.” With strong criticism to the smart grid now coming from many directions, energy corporations and governments now have the challenge to explain to an increasingly unapproving public why they continue to fast-track smart grid installations. Citizen groups and organizations throughout the US, Canada and Europe have launched legal actions to stop the installation of smart meters. They cite issues such as cost increases, health risks, privacy concerns, grid vulnerability and the lack of democratic process. In Chalk's home province of British Columbia, Citizens for Safe Technology (www.citizensforsafetechnology.org) and the BC Coalition to Stop Smart Meters are leading a growing challenge. Options for opting out of the smart metering program have been announced in markets including California, Maine, Vermont, Louisiana, Michigan, Connecticut, Quebec, the UK and the Netherlands. In the US, several regions including the counties of Santa Cruz and Marin are enforcing outright moratoriums. “Unless we wake up and realize what we're doing, there is 100% certainty of total catastrophic failure of the entire power infrastructure within 3 years,” said Chalk. “This could actually be worse than a nuclear war, because it would happen everywhere. How governments and utilities are blindly merging the power grid with the Internet, and effectively without any protection, is insanity at its finest.” Video above: Cyber expert on massive vulnerability of Smart Frid. From (http://www.forbiddenknowledgetv.com/videos/smart-1/hacking-expert-joins-urgent-callto-halt-smart-grid.html) and (http://youtu.be/2c1sadZCO60). Note: The full video interview with David Chalk can be seen on www.thepowerfilm.org. The feature film documentary 'Take Back Your Power', which critically examines the smart grid program, will be released online this spring. Ea O Ka Aina: How to avoid Smart Meters on Kauai 4/15/12 Ea O Ka Aina: Refuse to Opt In! 4/16/12 Ea O Ka Aina: Smart Meter Surveillance 4/8/12 .

Hackers go after Gung Ho sites

SUBHEAD: Anonymous targets military related sites in latest holiday hacks revealing personal user information.

 By Michelle Meyers on 29 December 2011 for CNET - 
(http://news.cnet.com/8301-1009_3-57349976-83/anonymous-targets-military-gear-site-in-latest-holiday-hack)


Image above: Graphic for tee-shirt illustrating an armed special forces team dressed as Santas and about to parachute into a drop zone. From (http://www.specialforces.com/t-shirts-clothing-gifts/sfg-shirts/twas-the-night-xmas).

 On Christmas Day the target was security think tank Strategic Forecasting, or Stratfor. This time it was SpecialForces.com, a Web site that sells military gear.

"Continuing the week long celebration of wreaking utter havoc on global financial systems, militaries, and governments, we are announcing our next target: the online piggie supply store SpecialForces.com," the group wrote in a Pastebin posting today.

The hackers said they breached the SpecialForces.com site months ago, but only just got around to posting the customer data. Even though the site's data was encrypted, they claim to have 14,000 passwords and details for 8,000 credit cards belonging to Special Forces Gear customers.

In a statement to CNET, Special Forces Gear founder Dave Thomas confirmed that his company's Web servers were compromised by Anonymous in late August, resulting in a security breach that allowed the hackers to obtain customer usernames, passwords, and possibly encrypted credit card information in some cases. "We have no evidence of any further security breaches, and we believe that the recent Stratfor incident is being used to bring this old news back into the spotlight," he noted.
Thomas added that the compromised passwords were from a backup of a previous version of the Web site that is more than a year old. "Most of the credit card numbers are expired, and we don't have evidence of any credit card misuse at this time," he wrote. "The current Web site does not store customer passwords or credit card information."

After the security breach, "we completely rebuilt our Web site and hired third-party consultants to help us shore up Web site security," he said, adding that the vast majority of the sites' sales are custom t-shirts and related gifts, and that the company donates a portion of its profits to charity.
Identity Finder, a New York-based data loss and identity theft prevention service, determined that files posted to date by Anonymous and its AntiSec offshoot related to this breach include 7,277 unique credit card numbers; 68,830 e-mail addresses (of which 40,854 are unique); and 36,368 plain-text usernames and passwords, some of which might be duplicates.

In the statement issued today, the hackers also took another shot at Stratfor for its alleged confusion over whether its data had been encrypted or not:
We also laughed heartily whilst these so-called protectors of private property scrambled desperately to recover the sensitive information of all the customers who they wronged by failing to use proper security precautions.
SpecialForces.com does encrypt customer data. "Nevertheless, our voodoo prevailed and we were quickly able to break back into the military supplier's server and steal their encryption keys," the hackers wrote. "We then wrote a few simple functions to recover the cleartext passwords, credit card numbers, and expiration dates to all their customers' cards. That's how we roll."

Anonymous hacks StratFor Inc  

By Jim Finkle on 30 December 2011 for the Chicago Tribune - 
(http://www.chicagotribune.com/business/sns-rt-us-usa-cyberattack-stratfortre7bt10z-20111230,0,6489174.story)

Hackers affiliated with the Anonymous group published hundreds of thousands of email addresses they claimed belong to subscribers of private intelligence analysis firm Strategic Forecasting Inc.

 The list, published late on Thursday, includes email addresses appearing to belong to people working for large corporations, the U.S. military and major defense contractors - information that hackers could potentially use to target them with virus-tainted emails in an approach known as "spear phishing." The Antisec faction of Anonymous last weekend disclosed that it had hacked into the firm, which is widely known as Stratfor and is also dubbed a "shadow CIA" because it gathers open-source intelligence on international crises.

 The hackers had promised to cause "mayhem" by releasing stolen data from the private group. Stratfor issued a statement confirming that the published email addresses had been stolen from the company's database, saying it was helping law enforcement probe the matter and conducting its own investigation. "At Stratfor, we try to foster a culture of scrutiny and analysis, and we want to assure our customers and friends that we will apply the same rigorous standards in carrying out our internal review," the statement said.

 "There are thousands of email addresses here that could be used for very targeted spear phishing attacks that could compromise national security," said John Bumgarner, chief technology officer of the U.S. Cyber Consequences Unit, a non-profit group that studies cyber threats. The Pentagon said it saw no threat so far. "We are not aware of any compromise to the DOD information grid," said Lieutenant Colonel Jim Gregory, a spokesman for the Department of Defense, or DOD.

 In a posting on the data-sharing website pastebin.com, the hackers said the list included some information from about 75,000 customers of Stratfor and approximately 860,000 people who had registered to use its site. It said that included some 50,000 email addresses belonging to the U.S. government's .gov and .mil domains. The list also included addresses at contractors including BAE Systems Plc, Boeing Co, Lockheed Martin Corp and several U.S. government-funded labs that conduct classified research in Oak Ridge, Tennessee; Idaho Falls, Idaho; and Sandia and Los Alamos, New Mexico.

 Corporations on the list include Bank of America, Exxon Mobil Corp, Goldman Sachs & Co and Thomson Reuters. The entries included scrambled versions of passwords. Some of them can be unscrambled using databases known as rainbow tables that are available for download over the Internet, according to Bumgarner. He said he randomly picked six people on the list affiliated with U.S. military and intelligence agencies to see if he could crack their passwords. He said he was able to break four of them, each in about a second, using one rainbow table. .