Hackers Who Hit CIA Director Break Into Law Enforcement Tools (wired.com) 35
An anonymous reader writes: The same group of hackers who hacked into the personal email account of CIA director John Brennan have now exploited a vulnerability to gain access to a private law enforcement portal. They demonstrated access to a system called JABS — the Joint Automated Booking System — which is a database of arrest records. "It was through the vulnerable law enforcement portal that the hackers say they also obtained a list of about 3,000 names, titles, email addresses and phone numbers for government employees that they posted to Pastebin on Thursday. The posting, which they indicated was just "Part 1" of a presumably multi-part leak, consisted of a snippet of an alphabetical list of government employees working for the FBI and other federal agencies as well as various local police and sheriff departments around the country. It included job titles, email addresses and phone numbers."
will Hillary be in there (Score:2)
*Someone* is trying to keep our gov't accountable (Score:1)
Well, the methods suck but at least SOMEONE is trying to keep the US government accountable.
The knob-slobberers at The New York Times and The Washington Post sure as hell aren't.
Re:*Someone* is trying to keep our gov't accountab (Score:4, Insightful)
You're missing the point of the whole goddam event.
Hackers hit a "freemail" and, from there, wormed their way to important shit.
The government (and businesses, and you, and me) are not competent enough to stop phishing schemes or plug all the goddam holes in the crapware tech vendors have been handing out for years.
Re: (Score:3)
Their "resisting arrest" is almost a certainty at this point.
Don't worry, a quick review will be done and the officer's actions deemed legitimate.
Fine Example. (Score:5, Insightful)
This is really one of the bigger reasons to NOT want the government collecting every little tidbit it can on you under the disguise of "national security". Even if THEY actually have no ill intentions with the data, things like this prove that they don't have their own shit together enough to protect that data from hackers/criminals/etc.
I'd find it rather hilarious if the exploit used was one of those the NSA knew about and decided to keep secret so they could exploit it themselves rather than get it reported and patched.
Re:Fine Example. (Score:5, Insightful)
This is really one of the bigger reasons to NOT want the government collecting every little tidbit it can on you under the disguise of "national security". Even if THEY actually have no ill intentions with the data, things like this prove that they don't have their own shit together enough to protect that data from hackers/criminals/etc.
That may very well be the point - but, if so, they should be saying that explicitly (and keep doing so!). I have no confidence that the general public is going to figure it out on their own.
Re:Fine Example. (Score:5, Insightful)
Actually, my working theory is that the general public HAS figured it out.
You and I have the same tools as the big guys. One thing we have that they don't is a sense of paranoia. This guy had a non-government email and either jumped a phishing link or had predictable two-level secret questions guarding the gate.
Having hacked into the "freemail," the hacker examined the contents for clues and hit pay dirt on an exploit or took advantage of reused passwords.
I am not a hacker and neither are you, but we could be. It's not hard work to move from where we are, technically, to that skill level.
There are many more people outside any governments than there are on the inside.
The theory of probability and statistics implies that there are smarter people among the masses than there are smart people working for the government.
We're all using the same machinery, the same skills, the same software ... it's a level playing field and everyone has a gun.
Some of us just don't load up.
Re: (Score:2)
Your use of a buzzword, having nothing to do with the problem, reveals that you have a non-zero chance in hell of knowing anything about probabilities other than a buzzword. This is slashdot. Nerds visit this place, including statisticians.
Re: (Score:2)
We sure as fuck know which side has literacy going for them.
Re: (Score:2)
This is what the national security people don't understand or can't admit.
Information like most things flows for a high concentration to a low concentration. The more you collect centralize and organize the more effort required to keep it where you want it, the greater the potential consequences when you fail. (See OPM hack).
Mass surveillance and information sharing makes us less safe.
Re: (Score:2)
Re: Fine Example. (Score:1)
Re: (Score:2)
Nothing to fear? (Score:1)
Nothing to hide.
For the morbidly curious, here're the links (Score:1)
Here's the deleted Twitter messages referred to in the article:
http://tweettunnel.com/phphax
In that link, the Cryptobin link and password are on the bottom. It appears as though the Pastebin has been deleted.
Re: (Score:2)
Purge the whole database or corrupt all the data
The entire planet witnessed what happened in Iraq when the US military sacked the Iraqi public service from the police chief and mayor all the way down to garbage collectors, cops, firemen, etc. Then stood by as the looters and vandals pulled their own society apart. Why are so many Americans keen to repeat that mistake in their own country? Expose serious wrongdoing by all means possible, but IMO your purge/corrupt suggestion is just random vandalism.
Law Enforcement Tools (Score:1)
"Law Enforcement Tools" is a euphemism for "cops"
If only (Score:5, Funny)
If only we had some agency that specialized in security.
If only (Score:4, Funny)
Huh? (Score:2)
Name, job title and phone number of govt employees are a matter of public record (or should be) and as such exposable under FOIA in any case.
The fact that this is regarded as secret says far more about a government than it does about the people publishing it.
No surprise at all (Score:2)
Governments and their organizations are routinely completely incompetent with regards to technology. They are used to being able to solve everything the cave-man way: With being able to dish out more violence. As soon as that fails, they come unarmed to a battle of wits.
This is also why any kind of backdoors and intentional weaknesses introduced into IT systems is such a bad idea: No government will be able to keep these safe and very soon they are will be available to the criminal world.
OPSEC (Score:3)
From TFA,"One U.S. official said the hackers managed to cover their tracks well, but the official expressed confidence they would be found."
If they are found it will probably be through someone shooting their mouth off on a web site rather than by tracing them through some technical means. If you're going do to this kind of naughty then you really need to STFU. It will be interesting to see if the hackers can maintain their discipline.