Skip to main content

Home/ History Readings/ Group items tagged hacker

Rss Feed Group items tagged

cartergramiak

Cyberattacks Discovered on Vaccine Distribution Operations - The New York Times - 0 views

  • A series of cyberattacks is underway aimed at the companies and government organizations that will be distributing coronavirus vaccines around the world, IBM’s cybersecurity division has found, though it is unclear whether the goal is to steal the technology for keeping the vaccines refrigerated in transit or to sabotage the movements.
  • “cybersecurity diligence at each step in the vaccine supply chain.” He urged organizations “involved in vaccine storage and transport to harden attack surfaces, particularly in cold storage operation.”
  • Outside experts said they doubted it was China, which has been accused of trying to steal vaccine information from universities, hospitals and medical researchers, because it would be unlike Chinese hackers to impersonate executives at a major Chinese firm.
  • ...4 more annotations...
  • The cyberattackers “were working to get access to how the vaccine is shipped, stored, kept cold and delivered,” said Nick Rossmann, who heads IBM’s global threat intelligence team. “We think whoever is behind this wanted to be able to understand the entire cold chain process.”
  • If they are correct, the lead suspects would be hackers in Russia and North Korea, both of which have also been accused by the United States of conducting attacks to steal information about the process of manufacturing and distributing vaccines. Sometimes it is hard to tell the difference between official hacking operations for the Russian or North Korean governments and those run for private gain.
  • The attackers’ emails were addressed to companies that provide key components of the cold chain process. Those include ice-lined boxes for vaccines and the solar panels that can power refrigerated vaccine containers — an important feature in poor countries where electricity can be scarce.
  • There is no indication so far that the attackers were aiming at Pfizer or Moderna, whose vaccines are expected to be the first ones approved for emergency use in the United States.
B Mannke

U.S. Demands China Crack Down on Cyberattacks - NYTimes.com - 0 views

  • “acceptable norms of behavior in cyberspace.”
  • was the first public confrontation with China
  • : public recognition of the urgency of the problem; a commitment to crack down on hackers in China; and an agreement to take part in a dialogue to establish global standards.
  • ...3 more annotations...
  • a delicate balancing act at a time when the United States is seeking China’s cooperation in containing North Korea’s nuclear and missile programs, and joining in sanctions on Iran
  • “perfect storm”
  • the United States had assets in place “to insure that South Korea’s defense is provided for.”
grayton downing

Financial Times Web Site Is Hacked - NYTimes.com - 0 views

  • The Web site and several Twitter accounts belonging to The Financial Times were hacked on Friday by the Syrian Electronic Army
  • In The A.P. attack, the group used its access to the agency’s Twitter feed to plant a false story about explosions at the White House that sent the stock market into temporary free fall.
  • The hacker sent screenshots taken during the attack to prove the Syrian group was behind it
  • ...1 more annotation...
  • “attack the media and spread truth on it” and the second is to “make damage to a specific country or to the terrorist groups in Syria by using the famous media’s social media accounts or Web sites to publish false news.”
izzerios

Donations to Foundation Vexed Hillary Clinton's Aides, Emails Show - The New York Times - 0 views

  • In the years before Hillary Clinton announced she would run again for president, her top aides expressed profound concerns in internal emails about how foreign donations to the Clinton Foundation and Bill Clinton’s own moneymaking ventures would affect Mrs. Clinton’s political future.
  • The emails, obtained by hackers and being gradually released by WikiLeaks this month,
  • personal income from some foundation donors and “gets many expensive gifts from them.”
  • ...13 more annotations...
  • Clinton Foundation gathering in Morocco at the behest of its king, who had pledged $12 million to the charity.
  • “She created this mess and she knows it,” a close aide, Huma Abedin, wrote of Mrs. Clinton in a January 2015 email.
  • Founded in 1997, when Mr. Clinton was still president, the foundation has raised roughly $2 billion to fund projects around the world, helping African farmers improve their yields, Haitians recover from a devastating 2010 earthquake and millions of people gain access to cheaper H.I.V./AIDS medication, among other accomplishments.
  • At the time, she was beginning to exert influence at the foundation, expressing concerns that Mr. Band and others were trying to use the charity to make money for themselves, and accusing another aide in her father’s personal office of installing spyware.
  • One such donor, Laureate International Universities, a for-profit education company based in Baltimore, was paying Mr. Clinton $3.5 million annually “to provide advice” and serve as its honorary chairman
  • Chelsea Clinton helped enlist an outside law firm to audit the Clinton Foundation’s practices.
  • the foundation “ensure that all donors are properly vetted and that no inappropriate quid pro quos are offered to donors in return for contributions.”
  • In August, the foundation said it would no longer accept foreign donations should Mrs. Clinton win the White House.
  • Russian government’s efforts to use cyberattacks to influence the election in favor of the Republican nominee, Donald J. Trump.
  • asked whether Mrs. Clinton’s name would be used in connection with the foundation, which is formally known as the Bill, Hillary and Chelsea Clinton Foundation. “It will invite press scrutiny and she’ll be held accountable for what happens there,”
  • a lawyer and top aide, said she discussed with Mrs. Clinton various “steps” to take to adjust her relationship with the foundation, including her resignation from the foundation’s board.
  • Mr. Band, who helped Mr. Clinton build the foundation, clearly felt irritated by Chelsea Clinton’s stream of implications that he had padded his own pockets from his work for her father.
  • “As they say, the apple doesn’t fall far,” he wrote. “A kiss on the cheek while she is sticking the knife in the back, and front.”
redavistinnell

Iceland election could propel radical Pirate party into power | World news | The Guardian - 0 views

  • Iceland election could propel radical Pirate party into power
  • A party that favours direct democracy, complete government transparency, decriminalising drugs and offering asylum to Edward Snowden could form the next government in Iceland after the country goes to the polls on Saturday.
  • The radical party, founded by activists and hackers four years ago as part of an international anti-copyright movement, captured 5% of the vote in 2013 elections, winning three seats in Iceland’s 63-member parliament, the Althingi.
  • ...9 more annotations...
  • A poll last week put the Pirates, who hang a black pirate flag in their parliamentary office, on nearly 21% of the vote, far short of the 40%-plus it was polling at the height of mass anti-government protests this spring,
  • The party has ruled out any possibility of forming a coalition with either of the current two ruling parties
  • “the parties forming a government … hiding behind compromises in coalition – enabling them to cheat voters again and again”.
  • nce the 2008 crash when Iceland’s three biggest banks collapsed owing 11 times the country’s GDP, Reykjavík’s stock market fell 97% and the value of the krona halved, Iceland has recovered economically.
  • Support for the Independence party, the Pirates’ rival for the position of largest party, seems to be holding.
  • Birgitta Jónsdóttir, the Pirates’ parliamentary leader, has said her party is willing to form a government with any party that subscribes to its agenda of “fundamental system change”, including the introduction of a new, crowdsourced national constitution.
  • the party advocates an “unlimited right” for citizens to be involved in political decision-making, with voters able to propose new legislation and decide on it in national referendums.
  • This election follows the resignation of Iceland’s prime minister, Sigmundur Davið Gunnlaugsson, who became the first major casualty of the Panama Papers
  • “Across Europe, increasingly many people think that the system that is supposed to look after them is not doing it any more,” Jónsdóttir said. “But we know we are new to this, and it is important that we are extra careful and extra critical on ourselves to not take too much on.”
ethanmoser

Kremlin counts days to Trump's inauguration, blasts Obama | Fox News - 0 views

  • Kremlin counts days to Trump's inauguration, blasts Obama
  • Exulted by Donald Trump's victory in the U.S., the Kremlin is counting the days to his inauguration and venting its anger at Barack Obama's outgoing administration, no holds barred.
  • Trump's open admiration of Putin has brought wide expectations of improved Moscow-Washington relations, but Trump has not articulated a clear Russia policy.
  • ...8 more annotations...
  • Careful not to hurt chances for a thaw in U.S.-Russia relations, President Vladimir Putin and other Russian officials have deferred questions about their plans for future contacts with Trump and any agenda for those talks until he takes office on Friday.
  • Moscow calls Obama's team a "bunch of geopolitical losers" engaged in a last-ditch effort to inflict the maximum possible damage to U.S.-Russia ties to make it more difficult for Trump to mend the rift.
  • His Cabinet nominees include both a retired general with a hawkish stance on Russia and an oil executive who has done extensive business in Russia.
  • While Putin and his lieutenants hope Trump will open up to Russia, they know any attempt to fix ties will face massive obstacles, including possible strong resistance in the U.S. Congress.
  • The complexity of the conflict in Syria — where opposition groups backed by regional players are pitted against Assad's troops and often fight each other — makes hopes for quick progress elusive.
  • Putin has pushed for the U.S. to recognize Moscow as an equal global heavyweight and to acknowledge that Russia's ex-Soviet neighbors are in its sphere of "vital interests" — demands rejected by the West. Many in Russia hope that Trump could be more inclined to strike a "grand bargain" with Putin, carving up spheres of influence and helping cement Russia's role as a global power.
  • U.S. intelligence officials' accusations that Russian hackers — acting on Putin's orders — interfered into the vote to help Trump win have put the U.S. president-elect in a difficult position. Trump has grudgingly conceded that Russia was likely responsible for hacking the Democratic National Committee, but emphasized there was no evidence that hacking affected the U.S. election results. The Kremlin has rejected the hacking accusations and also hotly denied reports that it has collected compromising information about Trump.
  • Obama's administration still has a few days left to "destroy the world," Zakharova wrote.
lindsayweber1

France at risk of being next election hacking victim - POLITICO - 0 views

  • PARIS — The French presidential election is at high risk of being hacked and campaign staff have “zero” training in how to stop it, the Socialist Party’s security chief warned.
  • “The question of cyberattacks is a real worry that is growing stronger at all levels [of government], both on the intensity of the threat and the sophistication of recent attacks,” said Pietrasanta. “The state has deployed financial means, but there is still lots of concern given what happened in the United States with the hacking of the Democratic Party.”
  • In the United States, the intelligence community’s conclusion that Russia tried to sway the result of the presidential election via hacking prompted the expulsion of 35 Russian diplomats.
marleymorton

NSA risks talent exodus amid morale slump, Trump fears - 0 views

  •  
    The National Security Agency risks a brain-drain of hackers and cyber spies due to a tumultuous reorganization and worries about the acrimonious relationship between the intelligence community and President Donald Trump, according to current and former NSA officials and cybersecurity industry sources.
julia rhodes

U.S. Promotes Network to Foil Digital Spying - NYTimes.com - 0 views

  • A group of academics and computer enthusiasts who took part in the 2011 uprising in Tunisia that overthrew a government deeply invested in digital surveillance have helped their town become a test case for an alternative: a physically separate, local network made up of cleverly programmed antennas scattered about on rooftops.
  • The State Department provided $2.8 million to a team of American hackers, community activists and software geeks to develop the system, called a mesh network, as a way for dissidents abroad to communicate more freely and securely than they can on the open Internet. One target that is sure to start debate is Cuba; the United States Agency for International Development has pledged $4.3 million to create mesh networks there.
  • “There’s so much invasion of privacy on the Internet,” said Michael Holbrook, of Detroit, referring to surveillance by the National Security Agency. “The N.S.A. is all over it,” he added. “Anything that can help to mitigate that policy, I’m all for it.”
  • ...5 more annotations...
  • “It is in my mind one of the great, unreported ironies of the first Obama administration.”
  • “People are asking us, how do they protect their privacy?” Mr. Meinrath said.
  • Radio Free Asia, a United States government-financed nonprofit, has given $1 million to explore multiple overseas deployments. The countries involved have not been revealed, Mr. Meinrath said, adding, “I can’t talk about specific locations because lives could be at risk.”
  • The mesh software, called Commotion, is a major redesign of systems that have been run for years by experts across Europe, said Mr. Meinrath, who is now director of the New America Foundation’s X-Lab. The idea, he said, was to take the technology out of what he calls “the geekosphere” and make it accessible to the public. (Commotion is available to download free from the project’s website.)
  • Resilience could become the prime argument for mesh networks, with privacy as a bonus, said Jonathan Zittrain, a professor of law and computer science at Harvard and co-founder of the Berkman Center for Internet and Society. That is similar to the original Internet, before it was controlled by corporate hands and scoured by government spies, he said.“It makes mesh more like the Internet than the Internet,” he said.
redavistinnell

Hillary Aides Knew of Private Email Risks - The Daily Beast - 0 views

  • Hillary Aides Knew of Private Email Risks
  • In one June 2011 email, recently-departed Director of Policy Planning Anne-Marie Slaughter wrote that senior State Department officials, “routinely end up using their home email accounts” due to the antiquated nature of the State Department’s technology, and that someone inside or outside the department should issue a statement or op-ed on the “woeful state” of affairs.
  • On another email chain, in July 2011, Clinton joked about being hacked by the Chinese. After not being able to find the email of a State Department staffer, she wrote: “must be the Chinese!”
  • ...6 more annotations...
  • More than 37 percent of the Clinton’s email collection held by State has now been released.
  • Clinton aide Jake Sullivan also expressed concerns, according to the email thread, leading Slaughter to back off from the idea. “Perhaps a better approach is to make the point more quietly to legislators through H[illary],” she concludes.
  • . If an attachment was opened, the AP noted, hackers would have been able to take control of Clinton’s computer.
  • Much of the attention on the Democratic presidential favorite’s personal email account has been drawn by the special committee expressly set up by House Republicans to investigate the 2012 attacks in Benghazi, which killed four Americans including the U.S. Ambassador.
  • Democrats pointed out that the committee has spent $4.5 million and has been around longer than the committee set up to investigate Watergate.
  • “Taxpayer dollars should be spent to improve the quality of life for the American people, not to fuel a naked political attack,” said the top Democrat on the committee, Rep. Adam Smith.
Javier E

150 Years of Misunderstanding the Civil War - Tony Horwitz - The Atlantic - 0 views

  • n recent years, historians have rubbed much of the luster from the Civil War and questioned its sanctification. Should we consecrate a war that killed and maimed over a million Americans? Or should we question, as many have in recent conflicts, whether this was really a war of necessity that justified its appalling costs?
  • Unlike the revisionists of old, Goldfield sees slavery as the bedrock of the Southern cause and abolition as the war's great achievement. But he argues that white supremacy was so entrenched, North and South, that war and Reconstruction could never deliver true racial justice to freed slaves, who soon became subject to economic peonage, Black Codes, Jim Crow, and rampant lynching.
  • Nor did the war knit the nation back together. Instead, the South became a stagnant backwater, a resentful region that lagged and resisted the nation's progress. It would take a century and the Civil Rights struggle for blacks to achieve legal equality, and for the South to emerge from poverty and isolation.
  • ...21 more annotations...
  • Emancipation and reunion, the two great results of this war, were badly compromised," Goldfield says. Given these equivocal gains, and the immense toll in blood and treasure, he asks: "Was the war worth it? No."
  • Gary Gallagher, a leading Civil War historian at the University of Virginia, argues that the long-reigning emphasis on slavery and liberation distorts our understanding of the war and of how Americans thought in the 1860s. "There's an Appomattox syndrome--we look at Northern victory and emancipation and read the evidence backward,"
  • Recent scholarship has also cast new light on the scale and horror of the nation's sacrifice.
  • hindsight has dimmed recognition of how close the Confederacy came to achieving its aims. "For the South, a tie was as good as a win," he says. It needed to inflict enough pain to convince a divided Northern public that defeating the South wasn't worth the cost. This nearly happened at several points, when rebel armies won repeated battles in 1862 and 1863. As late as the summer of 1864,
  • Allen Guelzo, director of Civil War studies at Gettysburg College, adds the Pennsylvania battle to the roster of near-misses for the South
  • Imagining these and other scenarios isn't simply an exercise in "what if" history, or the fulfillment of Confederate fantasy fiction. It raises the very real possibility that many thousands of Americans might have died only to entrench secession and slavery.
  • Very few Northerners went to war seeking or anticipating the destruction of slavery. They fought for Union, and the Emancipation Proclamation was a means to that end: a desperate measure
  • J. David Hacker, a demographic historian, has used sophisticated analysis of census records to revise the toll upward by 20%, to an estimated 750,000, a figure that has won wide acceptance from Civil War scholars. If correct, the Civil War claimed more lives than all other American wars combined
  • many historians, who cited the numbing totals of dead and wounded but rarely delved into the carnage or its societal impact.
  • That's changed dramatically with pioneering studies such as Drew Gilpin Faust's This Republic of Suffering, a 2008 examination of "the work of death" in the Civil War: killing, dying, burying, mourning, counting.
  • "When we go to war, we ought to understand the costs," she says. "Human beings have an extraordinary capacity to forget that
  • "When you incorporate these elements, the war looks less like a conflict over lofty principles and more like a cross-societal bloodletting."
  • Just as the fight against Nazism buttressed a moral vision of the Civil War, so too have the last decade's conflicts given us a fresh and cautionary viewpoint. "We should be chastened by our inability to control war and its consequences," Brundage says. "So much of the violence in the Civil War is laundered or sanctified by emancipation, but that result was by no means inevitable."
  • The last century's revisionists thought the war was avoidable because they didn't regard slavery as a defining issue or evil. Almost no one suggests that today. The evidence is overwhelming that slavery was the "cornerstone" of the Southern cause,
  • But Lincoln's proposals for compensated emancipation fell on deaf ears, even in wartime Delaware, which was behind Union lines and clung to only 2,000 slaves, about 1.5% of the state's population.
  • Nor is there much credible evidence that the South's "peculiar institution" would have peacefully waned on its own.
  • "It was stronger than it had ever been and was growing stronger."
  • Most historians believe that without the Civil War, slavery would have endured for decades, possibly generations.
  • We are commemorating the four years of combat that began in 1861 and ended with Union victory in 1865. But Iraq and Afghanistan remind us, yet again, that the aftermath of war matters as much as its initial outcome.
  • Looking backwards, and hitting the pause button at the Gettysburg Address or the passage of the 13th amendment, we see a "good" and successful war for freedom. If we focus instead on the run-up to war, when Lincoln pledged to not interfere with slavery in the South, or pan out to include the 1870s, when the nation abandoned Reconstruction, the story of the Civil War isn't quite so uplifting.
  • In some respects, the struggle for racial justice, and for national cohesion, continues still.
Javier E

U.S. Spy Chief: Get Ready for Everything to be Hacked All the Time | Foreign Policy - 0 views

  • the United States’ top spy said Thursday the greatest online threat isn’t a crippling digital strike against American infrastructure — but the near-constant, lower-grade attacks that are carried out routinely
  • Director of National Intelligence James Clapper also raised eyebrows among House lawmakers when he declined to describe a recent breach of servers belonging to the Office of Personnel Management as an “attack.” Rather, Clapper called the operation, which U.S. officials privately attribute to China, “a passive intelligence collection activity, just as we do.” The breach resulted in the exfiltration of the personal information of some 21.5 million current, past, and prospective federal employees.
  • In testimony to the House Intelligence Committee, Clapper described a permissive online environment in which hackers worldwide are able to operate essentially without impunity. That environment has resulted in difficulties for U.S. officials to deter future attacks, Clapper said, and has led American intelligence officials to conclude that cyber threats will probably intensify in the near future.
  • ...3 more annotations...
  • our primary concerns are the low- to moderate-level cyber attacks from a variety of sources, which will continue and probably expand.”
  • Though Clapper likened the operation against OPM to activities carried out by the United States, much of Thursday’s hearing was preoccupied with the lack of norms in cyberspace and how the absence of a common framework, such as the Geneva Conventions, has resulted in a highly permissive environment. Discussions within the global intelligence community have ratcheted up recently, Clapper said, about how to provide some “rules for the road” governing conduct in cyberspace.
  • According to the spy chief, the next frontier in cyberspace will feature the manipulation of data, rather than theft or destruction. Such tools, Clapper said, could be used to alter decision making, and prompt business executives and others to question the credibility of information they receive.
maddieireland334

Millions of US government workers hit by data breach - BBC News - 0 views

  •  
    Chinese hackers are suspected of carrying out a "massive breach" affecting the data of millions of US government workers, officials said. The Office of Personnel Management (OPM) confirmed on Thursday that almost four million current and past employees have been affected. The breach could potentially affect every federal agency, officials said.
Javier E

Bank Not Responsible for Letting Hackers Steal $300K From Customer | Threat Level | Wir... - 0 views

  • Patco sued the bank for failing to notice the fraudulent activity and stop it. According to Patco, the out-of-character transactions triggered alarms inside the bank, but the bank didn’t notice them and let the transfers go through. Patco also accused the bank of failing to implement “best” security practices by requiring customers to use multi-factor authentication. Ocean maintained that it had done its due diligence in verifying that the ID and password used were authentic. Judge Rich agreed that Ocean Bank could have done more to authenticate that the person initiating the transfers was indeed an authorized part
  • the law does not require the bank to implement the “best” security measures available and that the bank is clear to customers when they sign up about the level of security it provides and the amount of liability it will assume if money is stolen from a customer account.
mollyharper

ISIS Is Cited in Hacking of Central Command's Twitter Feed - 0 views

  •  
    WASHINGTON - Hackers claiming to be working on behalf of the Sunni militant group the Islamic State took over the Twitter feed of the United States Central Command on Monday. "In the name of Allah, the Most Gracious, the Most Merciful, the CyberCaliphate continues its CyberJihad," one post said.
mollyharper

CENTCOM Twitter Account Hacked By Individuals Claiming To Be Part Of ISIS - 0 views

  •  
    Posted: The Twitter account for U.S. Central Command (CENTCOM) was hacked on Monday by individuals claiming to be part of the Islamic State, the militant group formerly known as ISIS. "ISIS is already here, we are in your PCs, in each military base," read a message posted to CENTCOM's account by the hackers.
jlessner

N.S.A. Tapped Into North Korean Networks Before Sony Attack, Officials Say - NYTimes.com - 0 views

  • The trail that led American officials to blame North Korea for the destructive cyberattack on Sony Pictures Entertainment in November winds back to 2010, when the National Security Agency scrambled to break into the computer systems of a country considered one of the most impenetrable targets on earth.
  • A classified security agency program expanded into an ambitious effort, officials said, to place malware that could track the internal workings of many of the computers and networks used by the North’s hackers, a force that South Korea’s military recently said numbers roughly 6,000 people.
  • Most are commanded by the country’s main intelligence service, called the Reconnaissance General Bureau, and Bureau 121, its secretive hacking unit, with a large outpost in China.
  • ...1 more annotation...
  • Mr. Obama’s decision to accuse North Korea of ordering the largest destructive attack against an American target — and to promise retaliation, which has begun in the form of new economic sanctions — was highly unusual: The United States had never explicitly charged another government with mounting a cyberattack on American targets.
Javier E

Plane Enthusiasts Spy Air Force One, Reveal Trump's Secret Trip - The Atlantic - 0 views

  • Plane spotters like Meloy have been watching out for aircraft for decades but, as David Cenciotti, a respected aviation blogger, notes, new technical tools at their disposal along with the near-instantaneous communications afforded by the internet have changed the dynamic. “You are crowdsourcing something that 20 years ago would require weeks of investigations and letters exchanged with other geeks,” Cenciotti told me.
  • Planes are just the most obvious area in which the worlds of government and security services connect with civilians and hobbyists in potentially dangerous ways. Another is the world of cyber-security, where nation-states, criminal hackers, and enthusiasts can interact.
« First ‹ Previous 41 - 60 of 80 Next ›
Showing 20 items per page