Skip to main content

Home/ New Media Ethics 2009 course/ Group items tagged Hacking

Rss Feed Group items tagged

Weiye Loh

Climate Emails Stoke Debate - WSJ.com - 0 views

  • The scientific community is buzzing over thousands of emails and documents -- posted on the Internet last week after being hacked from a prominent climate-change research center -- that some say raise ethical questions about a group of scientists who contend humans are responsible for global warming.
  • Some emails also refer to efforts by scientists who believe man is causing global warming to exclude contrary views from important scientific publications.
  • "This is what everyone feared. Over the years, it has become increasingly difficult for anyone who does not view global warming as an end-of-the-world issue to publish papers. This isn't questionable practice, this is unethical."
  • ...4 more annotations...
  • "The selective publication of some stolen emails and other papers taken out of context is mischievous and cannot be considered a genuine attempt to engage with this issue in a responsible way," the university said.
  • A partial review of the hacked material suggests there was an effort at East Anglia, which houses an important center of global climate research, to shut out dissenters and their points of view. In the emails, which date to 1996, researchers in the U.S. and the U.K. repeatedly take issue with climate research at odds with their own findings. In some cases, they discuss ways to rebut what they call "disinformation" using new articles in scientific journals or popular Web sites. The emails include discussions of apparent efforts to make sure that reports from the Intergovernmental Panel on Climate Change, a United Nations group that monitors climate science, include their own views and exclude others. In addition, emails show that climate scientists declined to make their data available to scientists whose views they disagreed with.
  • Phil Jones, the director of the East Anglia climate center, suggested to climate scientist Michael Mann of Penn State University that skeptics' research was unwelcome: We "will keep them out somehow -- even if we have to redefine what the peer-review literature is!"
  • John Christy, a scientist at the University of Alabama at Huntsville attacked in the emails for asking that an IPCC report include dissenting viewpoints, said, "It's disconcerting to realize that legislative actions this nation is preparing to take, and which will cost trillions of dollars, are based upon a view of climate that has not been completely scientifically tested."
  •  
    The scientific community is buzzing over thousands of emails and documents -- posted on the Internet last week after being hacked from a prominent climate-change research center -- that some say raise ethical questions about a group of scientists who contend humans are responsible for global warming.
Weiye Loh

News of the World phone-hacking scandal - live updates | Media | guardian.co.uk - 0 views

  •  
    News of the World phone-hacking scandal -As it happened* Andy Coulson and Clive Goodman arrested * Guardian reveals it warned Cameron over Coulson* Both being held at separate south London police stations* Cameron announces two inquiries, one by judge* Ofcom expected to announce investigation of News Corp * News International exec may have deleted emails
Weiye Loh

Nick Davies on phone hacking, Murdoch and News of the World - video | Media | guardian.... - 0 views

  • The investigative journalist Nick Davies on how the phone-hacking scandal has escalated, leading to News of the World's announced closure
  •  
    Nick Davies explains phone hacking, Murdoch and News of the World - video http://bit.ly/r3EpNl #NotW
Weiye Loh

brianwhelan.net - Is Johann Hari a copy-pasting churnalist? - 0 views

  • many hacks lift quotes and thats not a crime but Hari appears to be passing off copy-pasted text from Levy’s writings in Haaretz and interviews with other hacks as an exclusive interview
  • The quote is sewn together with a string of other ideas Levy may or may not have shared with Hari but at no point does Hari indicate the quotes are taken from elsewhere. While Hari has questions to answer over the quotes he claims were given directly to him he also seems to be freely creating mash-up quotes out of disparate statements levy has made over the years. Not the practice of an award winning hack.
  • Hari has issued a reply that fails to explain why quotes are passed off as having been said directly to him; When interviewing a writer for a 6000-word profile, accurately quoting their writing is not “plagiarism” or “cut & paste journalism” Perhaps he would do better to heed his own words from August 2010; You don’t have a choice about being wrong sometimes: mistakes will be your life-long companion. But you do have a choice about whether to approach your error in terror so you suppress, ignore and repeat it – or to make it your honest, open ally in trying to get to the truth.
  •  
    Orwell Prize winning hack Johann Hari has some explaining to do. After reading a recent blog post detailing how he seems to have plagiarised large parts of his interview with Antonio Negri I thought I'd have a closer look at his work.
Weiye Loh

New Statesman - How widespread was phone hacking in high-profile investigations? - 0 views

  •  
    How widespread was phone hacking in high-profile police investigations? My new post at @NewStatesman: http://bit.ly/l74wzg #HackedOff
Reseena Abdullah

Hacker used Twitter to control infected PCs - 0 views

  •  
    To summarize the article, it basically talks about a hacker who used his Twitter account to send out messages that were in turn used to direct the infected PCs to malicious websites. Ethical Question: I think it is actually quite important to look at the intention behind using technology in this way. In this case, the hacker took advantage of his Twitter account to engage in criminal activities. But what if this for of hacking was used to perhaps take down an online criminal ring? Would it still be considered 'right' or 'ethical' to hack into other people's computers in that case? Ethical Problem: I think the main problem would be accountability. To what extent should Twitter be held responsible?
Weiye Loh

Anonymous speaks: the inside story of the HBGary hack - 0 views

  • It has been an embarrassing week for security firm HBGary and its HBGary Federal offshoot. HBGary Federal CEO Aaron Barr thought he had unmasked the hacker hordes of Anonymous and was preparing to name and shame those responsible for co-ordinating the group's actions, including the denial-of-service attacks that hit MasterCard, Visa, and other perceived enemies of WikiLeaks late last year.
  • When Barr told one of those he believed to be an Anonymous ringleader about his forthcoming exposé, the Anonymous response was swift and humiliating. HBGary's servers were broken into, its e-mails pillaged and published to the world, its data destroyed, and its website defaced. As an added bonus, a second site owned and operated by Greg Hoglund, owner of HBGary, was taken offline and the user registration database published.
  • HBGary and HBGary Federal position themselves as experts in computer security. The companies offer both software and services to both the public and private sectors. On the software side, HBGary has a range of computer forensics and malware analysis tools to enable the detection, isolation, and analysis of worms, viruses, and trojans. On the services side, it offers expertise in implementing intrusion detection systems and secure networking, and performs vulnerability assessment and penetration testing of systems and software. A variety of three letter agencies, including the NSA, appeared to be in regular contact with the HBGary companies, as did Interpol, and HBGary also worked with well-known security firm McAfee. At one time, even Apple expressed an interest in the company's products or services.
  • ...1 more annotation...
  • One might think that such an esteemed organization would prove an insurmountable challenge for a bunch of disaffected kids to hack. World-renowned, government-recognized experts against Anonymous? HBGary should be able to take their efforts in stride. Unfortunately for HBGary, neither the characterization of Anonymous nor the assumption of competence on the security company's part are accurate, as the story of how HBGary was hacked will make clear. Anonymous is a diverse bunch: though they tend to be younger rather than older, their age group spans decades. Some may still be in school, but many others are gainfully employed office-workers, software developers, or IT support technicians, among other things. With that diversity in age and experience comes a diversity of expertise and ability.
Weiye Loh

Magazine's database of US military personnel is hacked | Technology | The Guardian - 0 views

  • names, passwords and email addresses had been hacked, and that other details, such as duty status, pay grades and type of service, were also obtained by the hackers.
Weiye Loh

John Yates: I failed victims of News of the World phone hacking - Telegraph - 0 views

  •  
    Scotland Yard Assistant Commissioner John Yates says his decision not to reopen an investigation into News International in 2009 had been "a pretty crap one", which he now deeply regretted. In an exclusive interview with The Sunday Telegraph, Mr Yates also accuses senior executives at the Murdoch-owned company of failing to co-operate with the original Scotland Yard inquiry, first begun in 2005.
Weiye Loh

Phone hacking: David Cameron is not out of the sewer yet - Telegraph - 0 views

  • Murdoch himself was protected by his potent political contacts. Tony Blair, for example, would do anything to help out his close friend and ally. I can even disclose that, before the last election, Tony Blair rang Gordon Brown to try to persuade the Labour Prime Minister to stop the Labour MP Tom Watson raising the issue of phone hacking. And as recently as two weeks ago both Ed Miliband and David Cameron attended the News International (News Corp’s British newspaper publishing arm) summer party, despite the fact that the newspaper group was the subject of two separate criminal investigations.
  •  
    For more than three decades the most powerful man in Britain has not been a politician; it has been the brilliant but ruthless US-based media tycoon Rupert Murdoch, who burst on to the scene with the purchase of the News of the World in an audacious takeover bid in 1968. Within barely a decade he had built up a controlling interest in British newspapers.But he did not just control our media. He dominated British public life. Politicians - including prime ministers - treated him with deference and fear. Time and again the Murdoch press - using techniques of which we have only just become aware - destroyed political careers. Murdoch also claims to determine the results of general elections.
Weiye Loh

Hacktivists as Gadflies - NYTimes.com - 0 views

  •  
    "Consider the case of Andrew Auernheimer, better known as "Weev." When Weev discovered in 2010 that AT&T had left private information about its customers vulnerable on the Internet, he and a colleague wrote a script to access it. Technically, he did not "hack" anything; he merely executed a simple version of what Google Web crawlers do every second of every day - sequentially walk through public URLs and extract the content. When he got the information (the e-mail addresses of 114,000 iPad users, including Mayor Michael Bloomberg and Rahm Emanuel, then the White House chief of staff), Weev did not try to profit from it; he notified the blog Gawker of the security hole. For this service Weev might have asked for free dinners for life, but instead he was recently sentenced to 41 months in prison and ordered to pay a fine of more than $73,000 in damages to AT&T to cover the cost of notifying its customers of its own security failure. When the federal judge Susan Wigenton sentenced Weev on March 18, she described him with prose that could have been lifted from the prosecutor Meletus in Plato's "Apology." "You consider yourself a hero of sorts," she said, and noted that Weev's "special skills" in computer coding called for a more draconian sentence. I was reminded of a line from an essay written in 1986 by a hacker called the Mentor: "My crime is that of outsmarting you, something that you will never forgive me for." When offered the chance to speak, Weev, like Socrates, did not back down: "I don't come here today to ask for forgiveness. I'm here to tell this court, if it has any foresight at all, that it should be thinking about what it can do to make amends to me for the harm and the violence that has been inflicted upon my life." He then went on to heap scorn upon the law being used to put him away - the Computer Fraud and Abuse Act, the same law that prosecutors used to go after the 26-year-old Internet activist Aaron Swart
Kathleen Tan

Hacked blogger seeks Russia probe - 20 views

http://news.bbc.co.uk/2/hi/technology/8194395.stm To sum it up, the article is about a russian blogger who asked Russian President Dmitry Medvedev to hold an inquiry, claiming that russian...

Hacking denial of service online rumours political spam

started by Kathleen Tan on 16 Aug 09 no follow-up yet
juliet huang

Virus as a call for help, as a part of a larger social problem - 7 views

I agree with this view, and I also add on that yes, it is probably more profitable for the capitalist, wired society to continue creating anti-virus programs, open more it repair shops etc, than to...

Virus

Kathleen Tan

Forthcoming Leona Lewis tracks leaked onto the net by hackers - 11 views

http://www.dailymail.co.uk/tvshowbiz/article-1207707/Forthcoming-Leona-Lewis-tracks-leaked-internet-highest-profile-hacking-case.html Basically, hackers managed to gain access to unreleased tracks...

Intellectual property hacking piracy

started by Kathleen Tan on 25 Aug 09 no follow-up yet
Weiye Loh

Anonymous speaks: the inside story of the HBGary hack - 0 views

  • The attackers just needed a little bit more information: they needed a regular, non-root user account to log in with, because as a standard security procedure, direct ssh access with the root account is disabled. Armed with the two pieces of knowledge above, and with Greg's e-mail account in their control, the social engineers set about their task. The e-mail correspondence tells the whole story: From: Greg To: Jussi Subject: need to ssh into rootkit im in europe and need to ssh into the server. can you drop open up firewall and allow ssh through port 59022 or something vague? and is our root password still 88j4bb3rw0cky88 or did we change to 88Scr3am3r88 ? thanks
  • Thanks indeed. To be fair to Jussi, the fake Greg appeared to know the root password and, well, the e-mails were coming from Greg's own e-mail address. But over the course of a few e-mails it was clear that "Greg" had forgotten both his username and his password. And Jussi handed them to him on a platter. Later on, Jussi did appear to notice something was up: From: Jussi To: Greg Subject: Re: need to ssh into rootkit did you open something running on high port?
  • From: Jussi To: Greg Subject: Re: need to ssh into rootkit hi, do you have public ip? or should i just drop fw? and it is w0cky - tho no remote root access allowed
  • ...2 more annotations...
  • So there are clearly two lessons to be learned here. The first is that the standard advice is good advice. If all best practices had been followed then none of this would have happened. Even if the SQL injection error was still present, it wouldn't have caused the cascade of failures that followed.
  • The second lesson, however, is that the standard advice isn't good enough. Even recognized security experts who should know better won't follow it. What hope does that leave for the rest of us?
Weiye Loh

Hacker attacks threaten to dampen cloud computing's prospects | Reuters - 0 views

  • Security is a hot issue in the computing world. Hackers broke into Sony's networks and accessed the information of more than 1 million customers, the latest of several security breaches.The breaches were the latest attacks on high-profile firms, including defense contractor Lockheed Martin and Google, which pointed the blame at China.
  • Analysts and industry experts believe hardware-based security provides a higher level of protection than software with encryption added to data in the servers. Chipmakers are working to build more authentication into the silicon.
  • one of the problems cloud faces is that it is a fragmented market where many vendors provide different security solutions based on their own standards.Intel's rival ARM and Advanced Micro Devices are also in the process of embedding higher security in their chips and processors, but working with different partners.If there was an open standard to follow, it would help the industry to build a much secure cloud system, according to AMD.
Weiye Loh

The Fall of the House of Murdoch - Jonathan Schell - Project Syndicate - 0 views

  • All of this is far removed from what a journalistic organization is supposed to do. Journalism’s essential role in a democracy is to enable people to fulfill their roles as citizens by providing information about government, other powerful institutions, civil movements, international events, and so on. But News Corporation replaces such journalism with titillation and gossip, as it did when it took over the 168-year-old News of the World and turned it into a tabloid in 1984, and with partisan campaigns, as it did when it created Fox News in 1996.
  • the UK phone-hacking scandal is of a piece with the Murdochs’ transformation of news into propaganda: both reflect an assault on democracy’s essential walls of separation between media, the state, and political parties. The Murdochs are fusing these entities into a single unaccountable power that, as we see in Britain today, lacks any restraint or scruple.
  • too many people want what the News Corporation has been offering. And what too many people want can be dangerous to a civilized, law-based society.
Weiye Loh

100+ Google Tricks That Will Save You Time in School - Eternal Code - 0 views

  •  
    With classes, homework, and projects-not to mention your social life-time is truly at a premium for you, so why not latch onto the wide world that Google has to offer? From super-effective search tricks to Google hacks specifically for education to tricks and tips for using Gmail, Google Docs, and Google Calendar, these tricks will surely save you some precious time. Search Tricks These search tricks can save you time when researching online for your next project or just to find out what time it is across the world, so start using these right away.
Weiye Loh

Data Without Borders - 0 views

  •  
    Data is everywhere, but use of data is not. So many of our efforts are centered around making money or getting people to buy more things, and this is understandable; however, there are neglected areas that could actually have a huge impact on the way we live. Jake Porway, a data scientist at The New York Times, has a proposition for you, tentatively called Data Without Borders. [T]here are lots of NGOs and non-profits out there doing wonderful things for the world, from rehabilitating criminals, to battling hunger, to providing clean drinking water. However, they're increasingly finding themselves with more and more data about their practices, their clients, and their missions that they don't have the resources or budgets to analyze. At the same time, the data/dev communities love hacking together weekend projects where we play with new datasets or build helpful scripts, but they usually just culminate in a blog post or some Twitter buzz. Wouldn't it be rad if we could get these two sides together?
1 - 20 of 38 Next ›
Showing 20 items per page