8GB of Data Stolen From Italian Cybercrime Unit 123
Orome1 writes "Evidence servers of the Italian National Anti-Cybercrime Center for the Protection of Critical Infrastructure (CNAIPIC) have been breached and some of their contents published by a group of hackers calling themselves 'Legion of Anonymous Doom,' who apparently got on board the AntiSec campaign. The group has made clear that its sitting on around eight GB of stolen data and that it plans to release it all."
Somebody has to do it... (Score:5, Funny)
Re: (Score:2)
Well suppose some of your tanks was to get broken...
From the title... (Score:4, Informative)
8GB of Data Stolen sounds like a USB flash drive was stolen
Re: (Score:1)
Look a flash drive! Lets see whats in it.
It seems it came from Italian National Anti-Cybercrime Center. Lets wreck havock and say that we hacked their data.
Re: (Score:2)
I got a grin out of that typoo. ;)
"Look, someone wreaked havoc! Lest wreck the havoc someone wreaked!"
Wreck havoc and lose the dogs of war!
Re: (Score:2)
HTH
Re: (Score:2)
True, but that would spoil the joke.
Re: (Score:2)
Don't you woosh you would have gotten it?
Yes, I know you're posting anonymously because you're moderating (and modded the OP down). Bad form, dude. If you didn't get the joke it's either because
HAND.
Douglas A20 (Score:1)
There was a light bomber in World War II called the Douglas A20 Havoc. I would guess that quite a few of them were wrecked.(by being shot down
(In RAF service the were called the Boston)
Re: (Score:2)
and nothing of value was lost....
Re: (Score:2)
and nothing of value was lost....
That USB drive had my porn stash on it, you insensitive clod.
Re: (Score:3)
and you only had 8 gigs of porn? Did you just get internet yesterday? :P
HEX
Re: (Score:3)
Re: (Score:1)
Re: (Score:3)
You're inferring that a cyber-crime division has ever been successful. And that's a LOT of inferring.
It doesn't take a "cybersecurity expert" to find child porn. It's almost harder NOT to find underage self-shots by (mostly) girls with low self-esteem.
I've heard.
*cough*
Uhm. Think of the children!!
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
As someone who has to adhere to NDAs and thus can't really say more, let me only say this: You're WAY off. It's not most likely CP. It's not even close to most likely. You'd probably be very surprised if you saw what kind of porn you'll find in their evidence vault.
Re: (Score:1)
TFS looks like a bad google translation. Maybe it's because I'm on my first cup this morning, but ""Evidence servers of the Italian National Anti-Cybercrime Center for the Protection of Critical Infrastructure (CNAIPIC) have been breached" doesn't parse. There are some adverbs missing or something. Should it have read ""there is Evidence that servers of the Italian National Anti-Cybercrime Center for the Protection of Critical Infrastructure (CNAIPIC) have been breached"? Or was it "The 'evidence' servers o
Re: (Score:1)
The "Evidence servers" have been breached. Get more coffee.
Hmmm. (Score:2)
Re: (Score:3)
Re: (Score:2)
Hint (Score:1)
Re:Hint (Score:5, Insightful)
If somebody has nothing against you personally, a comparatively small amount of money, some positive social feedback, and the chance to not get sodomized in prison, can often turn them into a useful and productive security researcher.
If somebody does have something against you personally, taking them onboard just means that you can be more or less certain that you have an insider threat, rather than it merely being a possibility, as before.
Re: (Score:2)
No. Just no. No way, no chance, not a moment I'd consider someone like this for a security job.
Why? Because I cannot trust them. I cannot trust them not to break the law, and very obviously I cannot trust them to at least shut up about it. And the very last thing I need is my security group being associated with black hat hacking.
Stolen or Copied? (Score:3)
Was it actually stolen, as in it no longer exists on CNAIPIC's computers, or was it simply copied?
Re:Stolen or Copied? (Score:4, Insightful)
They walked in, unplugged a USB key, pocketed it and walked out.
Does that count as theft ? ;-)
Re: (Score:1)
Nope, it's copyright infringement, unauthorized access, maybe trespassing depending on jurisdiction, but still no theft.
Re: (Score:3)
Re: (Score:2)
Sorry, I read it as them going in and copying data onto their own USB stick.
Re: (Score:2)
Re: (Score:1)
If they're sharing it? It's still theft if you hand it back? Sounds more like borrowing to me.
Re: (Score:2)
Yes it's theft if they hand it back. Theft means you don't have permission, borrowing it means you do have permission.
Why does this need explaining?
If you copy something you didn't have permission to*, then no it's not theft. it's illegal trespass to the system.
*this can be implied or implicit.
Re: (Score:2)
Only if they handed back that USB stick. Then it could be seen akin to Joyriding [wikipedia.org]. Still a crime, but no theft at least.
Re: (Score:2)
Only if they show they took it for pleasure with no other intent.
Re: (Score:2)
Oh believe me, I'd get great pleasure out of that data. ;)
Re: (Score:2)
What thing did they take that doesn't belong to them? I see that they made unauthorised copies of data, and know that this is a crime in many jurisdictions, but see no thing that has been taken.
Re:Stolen or Copied? (Score:4, Funny)
Pastebin is a news source now (Score:3, Interesting)
Re:Pastebin is a news source now (Score:4, Interesting)
I'm not surprised that the BBC article didn't link to the pastebin source.
When is 'big media' going to figure out that, on the internet, you can cite your sources?
Re: (Score:2)
I have noticed, too.
I think pastebin works somewhat like AnonOps news and Twitter. Withouth the size limits of Twitter.
Some dude X can upload a text to pastebin. And some dude Y can link to it, and make it public. Is anonymous and searchable (google index it).
Since is indexed in google Y can be a person that don't know X. X could have find the paste in google, and be one of the first to be reporting it. Since soon a lot of people will cite the link, no one can know whos the first poster of the link.
Tha
Only in Italy... (Score:2)
Seriously: if they aren't pushing for some kind of concession on the part of the data owners, the best thing they could have done was just publish the information FIRST, then STFU. Or take credit for it afterward, if their egos simply couldn't stand the pressure. But announce it FIRST, and threaten to publish it LATER
Re: (Score:2)
Seeing as they didn't make any demands in that press release, I think they're seeking media hype rather than attempting extortion.
Re: (Score:2)
"... they've put up some documents to substantiate their claim and have said they will publish it."'
Ahem... excuse me... that's called a "threat". Until it's published, that's all it is: a threat.
"Seeing as they didn't make any demands in that press release, I think they're seeking media hype rather than attempting extortion."
That's precisely what's so silly. They could get the identical amount of attention by just publishing it, rather than threatening to, and inviting some kind of harsh intervention.
Re:Only in Italy... (Score:4, Insightful)
This lasts longer - they get the attention due to the threat, and due to the actual release.
Re: (Score:2)
It's not a threat. a threat involves an act of coercion. It's a statement.
No talking about publishing gets you more attention from more source because those source have more time to find out about it, so when you do publisher, you have a bigger audience. had the just published it, it would have been a blurb in a few news articles and nothing more.
Re: (Score:2)
"It's not a threat. a threat involves an act of coercion. It's a statement."
No, it doesn't. It can, but it doesn't have to. Look it up.
A threat can be in retaliation for something prior, for example (says so right there in the dictionary). In which case there is no coercion involved at all. In this case, the data release is pretty clearly in retaliation for a perceived wrong.
Re: (Score:2)
"Wan't Assange doing the same?"
No. It wasn't the same at all.
Re: (Score:2)
That particular instance may not be exactly the same but Wikileaks has been following this pattern for a long, long time. Drumming up hype and keeping it in the news until the inevitable payoff.
Re: (Score:2)
First off, I would try to establish at least SOME sort of credentials as a "journalistic" or "news" source, as opposed to "a kid in his mother's basement" source. I'm not saying that can't be a source of legitimate news! But it should be an established source of news FIRST. For self-protection.
Second (AFAIK they did not do this, but others have): don't try to blackmail actions out of somebod
Re: (Score:2)
"But it should be an established source of news FIRST. For self-protection."
Right, because that worked out so well for Assange, who when he fell out with his media partners such as the NYT and The Guardian started attacking his character? Sorry no, the established press has shown itself irresponsible and easily bought. There's no protection there, at best an illusion of it.
"Second (AFAIK they did not do this, but others have): don't try to blackmail actions out of somebody in exchange for not releasing the
Re: (Score:2)
"There's no protection there..."
Yes, there is. At least in the US, some claim to journalism affords at least a little more legal protection, especially when it comes to revealing sources. The politicization of the Assange case notwithstanding. He made some very serious enemies (whether that was justified or not), and it is not too surprising that they would bend the rules to "get him".
"Yeah, except they've not tried to blackmail any actions..."
Ahem... that's what I wrote.
"We can use that argument against Wikileaks because they still haven't release the financial institution data they were saying they would a fair while ago, and so likely were just shit talking, but this lot have hardly had chance yet."
They AREN'T WikiLeaks. A point I went out of my way to make. The whole point of what I wrote there was that for beginners, they
Re: (Score:2)
As far as we've come with internet related technology, 8gb is still a lot of data. They need to actually sort it and make it available for download. One guy with an old laptop as the only seed of an 8gb torrent isn't going to work very well. Also, they made it clear that this is a preview of things to come. Even if you didn't click through to the pastebin, if you bothered to read the article, you would have noticed this line:
"The gr
Re: (Score:2)
"Can't tell if trolling, or commenting without having read the article."
Neither. I was making a comment about their stupid actions.
Look it up. If you've "made it clear" you're going to do something, but haven't actually done it, it's called a "threat". It's a pretty simple concept. Until you do it, it is nothing more than a threat.
I have a dictionary you might want to attend: "Threat: n a declaration of an intention or determination to inflict punishment, injury, etc., in retaliation for, or conditionally upon, some action or course; menace."
Is that clear enough for you?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Can't tell if [insert adverb here] trolling, or commenting without having read the article
You can't attend a dictionary. A dictionary is not an event.
I teach an ESL class you might want to attend.
I think if I was trying to learn English, I'd rather have a native speaker as an instructor.
How to Publish??? (Score:1)
Reason behind the attack (Score:3)
This corrupted organization gathered all the evidence from the seized property of suspected computer professional entertainers and utilized it over many years to conduct illegal operations with foreign intelligence agencies and oligarchy to facilitate their lust for power and money, they never used obtained evidence to really support ongoing investigations.
Also, it's nice to see that CNAIPIC subscribes to the "big useless video wall" [imgur.com] school of command center design. (there are also diagrams of their network architecture in that album)
Re: (Score:3)
"Yo. dudes, as a stopgap until you get get some sort of 3D gesture-based 'cyber-space' interface up and running, go find 6 or 8 of the l33t3st looking network monitoring programs, then run them all on a big screen at the front of the room, far enough away from all the operators that nobody can read any of the text without intense eyestrain..."
Re:Reason behind the attack (Score:4, Insightful)
I really love the ergonomic excellence of this one [imgur.com]...
"Yo. dudes, as a stopgap until you get get some sort of 3D gesture-based 'cyber-space' interface up and running, go find 6 or 8 of the l33t3st looking network monitoring programs, then run them all on a big screen at the front of the room, far enough away from all the operators that nobody can read any of the text without intense eyestrain..."
This is an overfunded government department. That huge video screen exists to look high tech, make managers feel good and justify their huge budget for next year.
If they had any sense they would buy two normal widescreens per desk and spend the savings on employing someone who can fix those nagios errors on the bottom right.
Re: (Score:2)
Eh? No (Score:1)
Actually, if you're running a system monitoring app, having a big screen in your monitoring/operations center does have an important purpose.
Most monitoring systems use some form of color-coded status, so green=good, red=bad. Now if your one of the important systems that monitoring depends on goes down (say your mail server or SMS gateway, whatever), you're not going to be getting those important alerts when stuff breaks. However, if you've still got the "big wall of status" up, then there's still a decent
Antisec movement is obvious false flag. (Score:1)
I mean why not just call it the "anti police" movement, or the "anti government" movement.
Who exactly benefits from an anti-sec movement? Hackers don't generally benefit from it. Users don't generally benefit from it. Who benefits from it?
If you are a hacker and a teenager, someday you'll be working in the security industry. So basically you'll be killing your job prospects if you support such a movement and you'll be making it impossible for hackers in the future to ever go legit. This is like drug dealers
Re: (Score:2)
Or arm up and start a revolution. Egypt has won democracy this way.
Anarchy IS democracy and the preferred political system for lulzsec, anonymous, Kevin Mitnick and alike. Death to the Jew World Order masqueraded as law and order.
Re: (Score:1)
Or arm up and start a revolution. Egypt has won democracy this way.
Anarchy IS democracy and the preferred political system for lulzsec, anonymous, Kevin Mitnick and alike. Death to the Jew World Order masqueraded as law and order.
LMAO. Revolution? I think you mean a civil war. The USA isn't Egypt. There isn't/aren't a CIA or other NATO or other intelligence agencies waiting to arm the so called cyber revolutionaries, and you'll have no country to flee to if you start losing.
Re: (Score:3)
China, Canada and Mexico are easy to get into.
Re: (Score:2)
Sounds like they want (pinky to corner of mouth) One Million Dollars!
Sunlight is the best disinfectant (Score:5, Interesting)
Governments are going to have to get used to operating under a bright light as these hacks and leaks keep happening.
There's just so much sensitive information, accessible to huge numbers of people, and scattered across so many poorly secured systems.
Re: (Score:2, Informative)
Uhm, you know I actually read that link... it
1. Doesn't say anything about installing the software on "every PC", just every PC for that person accused of a crime.
2. Was withdrawn, and replaced with a command not to use computers until the trial is complete.
It would hardly help against anonymous people, since you wouldn't know which computers to install it on beforehand.
Re: (Score:1)
You're right, my mistake.
But this is still a move I expect the FBI to make if they haven't already.
Re: (Score:2)
On the network side, there is a whole different set of alphabet codenames and alphabet soup. ECHELON, CALEA, Carnivore, a number of former Information Awareness Office projects(IAO itself managed to creep congress out, and was defunded; but some of its activities survive under other names), virtually anything you can buy from Narus, whatever t
What about corporations? (Score:2)
Who cares about governments? Corporations write the fkn laws.
Dont wait - release it (Score:5, Insightful)
its high time we started to learn what is being done with our taxes.
Pre-release announcements (Score:5, Funny)
Pre-release announcements are *getting old*. Please save it for when you have something that's going to be really earthshaking. The Pope rape tapes. Oswald's gunsight cam. The Illuminati's member list. Proof that not only does God exist, but he's being detained in Gitmo.
Y'know, shit that could start a war.
For anything else, please just post the torrent already, okay?
Re: (Score:2)
Torrent hashes in the DHT should have tags, so your torrent client can comb through the torrent hases automatically downloading those tags.
Italy... (Score:2)
It's Italy, what can you expect? A country that had a prime minister - Andreotti - who turned out to be a mobster? A country where the current prime minister owns all TV stations?
Re: (Score:2)
Better yet - one that can't organise refuse collections in Naples because the resident Mafia are the incumbent refuse collectors, and they just dump it around the country wherever they like (including commercial/toxic waste).
Naples has been up to its neck in household rubbish for a few years now, to the point where the residents are marching in front of government buildings demanding a cleanup.
Yeah, and then they vote for the mafia guy (Score:3)
Power without accountability is a terrible thing. Police for instance has power, so they must be accountable. But voters also have great power... but how are they held accountable? How are the voters for Berlusconi held to account for their actions?
That is why democracy is flawed. In a dictatorship you only need one responsible person. In a democracy you need millions.
Re: (Score:2)
As for accountability in democracy, the theory is that voters are held accountable by giving them what they asked for. Good and hard.This doesn't help much in the case of majoritarian repression of a minority(which is why absolute democracies along Athenian lines fell out of favor with the Enlightenment set, and
Re: (Score:2)
Re: (Score:2)
Power without accountability is a terrible thing. Police for instance has power, so they must be accountable. But voters also have great power... but how are they held accountable? How are the voters for Berlusconi held to account for their actions?
That is why democracy is flawed. In a dictatorship you only need one responsible person. In a democracy you need millions.
And the flaw of dictatorship is that a single person is never flawless. Oh, let's take a guess, I suppose you are?
Re: (Score:2)
Power without accountability is a terrible thing. Police for instance has power, so they must be accountable. But voters also have great power... but how are they held accountable? How are the voters for Berlusconi held to account for their actions?
That is why democracy is flawed. In a dictatorship you only need one responsible person. In a democracy you need millions.
They are held accountable when the people/things they irresponsibly voted for go horribly wrong. To quote someone that is rather controversial here on slashdot: "To vote is to wield authority, the supreme authority from which all other authority derives...[and] the converse of authority [is] responsibility....To permit irresponsible authority is to sow disaster...If [you vote] the impossible, the disastrous possible happens instead."
Democracy itself is not flawed, it is one of, if not the best system of g
if there's a Legion of Anonymous Doom... (Score:5, Funny)
Re: (Score:2)
Yes, there is a Hall of Anonymous Justice.
PossiblyAquaman said so.