MARYLAND IS GROUND ZERO FOR SPYING, SURVEILLANCE, AND CYBER-SECURITY-----
The US has almost entirely moved its Federal and State budgets to the industry of spying and surveillance. The NSA has proven to include a Wall Street industrial spying network and is run by US corporations infiltrating all avenues of people's lives. Hundreds of billions of dollars are being funneled to support this spying network, to devise ways to protect these networks from hackers, and now we see our taxpayer dollars working to protect Wall Street banks from hackers. The NSA and all of the defense industry analysts have stated openly-----
WE CANNOT STOP THE HACKING AND GROWING INTERNET FRAUD AND CANNOT SEE BEING ABLE TO PROTECT EVEN THE FEDERAL DATABASES.
So, we all know that the business structures being built around online business that includes information that needs security---like banking accounts, charge card information, medical transactions----cannot be secure. Why do we keep spending tons of money building more and more fixes rather than back away from this total movement online? IT IS ONLY ABOUT 'INNOVATION' MAKING REASONS FOR PRODUCTS AND PROFITS'. That is it. In Maryland we have an entire university structure for cyber-security----cyber-development---cyber-businesses. The US is hiring the hackers to hack others.
IT IS CRAZY AND VERY, VERY, VERY BAD PUBLIC POLICY ALMOST NO ONE WANTS.
All of this heightened security comes because we have allowed Wall Street and global corporations to go without oversight and accountability-----allowing them to defraud and abuse overseas making lots of people world-wide angry at the US and Americans do not even want this as it takes over their lives as well. The answer is to stop allowing neo-liberals and neo-cons to control both the Republican and Democratic Parties. These global corporate pols are simply funneling trillions of dollars into these security systems we do not need.
Bernie Sanders seems to be the only candidate for President that may walk the talk on protecting privacy and controlling NSA and spying and surveillance. We need people in Executive offices like governor and mayor that will do the same. Computerizing all schools works against this movement as does computerizing medical records and moving all banking to online only which is where they are going. They cannot protect against this and people's identity and assets will be under constant attack. How long do you think corporations are going to continue to off-set accounts hacked?
PLEASE SHOUT OUT AGAINST THIS HACKING AND SPYING CULTURE. PLEASE FIGHT THE SATURATION OF OUR SOCIETY WILL ALL THAT IS TECH. WE CAN HAVE INNOVATION WITH PROTECTION BEFORE MARKETING.
Anonymous so far has only hacked into systems to release information about fraud and corruption. Whether you think it is right or wrong-----the point is that so much human capital is now being expended in what we know cannot be a protected system. The people taking classes at Maryland universities may well be the next Snowden leaker and NSA knows it cannot stop this.
Anonymous infiltrates PRISM… Hacks Obama’s Skype account… Leaks more NSA documents…
June 11th, 2013
Anonymous infiltrates PRISM, intercepts Obama’s Skype
Anonymous hackers claimed to have infiltrated PRISM’s network infrastructure after gaining access to the graphical user interface which was intended only for use by federal agents in cases of terrorism. Because the PRISM system has access to a log of all Internet phone calls (voIP via Skype, Google, etc.) and video chats, Anonymous vigilante intelligence researchers quickly unearthed evidence of high-level collusion between corporate executives and government officials. “We have access to President Obama’s Skype,” said a spokesperson for Anonymous, “and we’re only afraid it’s too absurd to be true.”
Anonymous will not comment on details of the leak until the information has been confirmed and verified. This time, Anonymous is seeking input from government sources so that their final release will be seen by the public as an even-handed nonpartisan attempt at uncovering the truth. “We want to know the government’s point of view simply because it will help us build a more complete view of what’s really going on. Even clever lies, denials, and evasion help us in our pursuit of truth. We won’t release the information until we’ve run it all over with several officials and received a frank appraisal of its context.”
Read more at http://investmentwatchblog.com/anonymous-infiltrates-prism-hacks-obamas-skype-account-leaks-more-nsa-documents/#uOE8JFBsL8LLPeVK.99
When citizens have to work to keep government from all of their private business----you have a totalitarian society. It is illegal-----violating all rights to privacy and protection of property. The NSA seems to be connected as well to the collection of data for sale as we hear that data collected by the NSA makes its way to US corporations. Below you see American citizens working to beat the NSA while the NSA works to beat the citizens.
Every aspect of social structure----programs and services are being dismantled so we can send all that money to useless government activities like these!
TURN NSA ONTO WALL STREET FOR GOODNESS SAKE!
NSA-Proof Blackphone hacked in 5 minutes
By: Praveen Kashyap | Posted in: News, NSA PRISM
Published Time: On August 12, 2014 at 6:18 pm 0
Before reading any posts on HNB, we would like to tell you that every post here is for your online security, safety or for awareness, and we do not teach hacking through our articles, if you find something which is being used to damage your online property or something like that, REPORT HERE.
It is said to be a phone that is more stronger than the decryption method used by spies agencies like NSA, GCHQ and others, but this time hackers proved that Nothing is impossible and hacked the Blackphone in just 5 minutes.
Blackphone released earlier this year.
Yes, dude, they hacked that phone in just 5 minutes, so I think, NSA would be able to hack this in just a minute :p
As, the phone software is a modified Android OS version termed ‘PrivatOS’ that is forked from Android 4.2 Jelly Bean, to provide multiple security tools/options, so developers hacked the Android to make this and hackers hacled an Android again.
I am 100% sure, till now nothing is happening instead of claiming a powerful security after the NSA Spying programs. After the truths and motive behind the NSA disclosed by the Former NSA Employee Edward Snowden, many of the apps, emails, and many more stuff released in the name of NSA proof security, but none of them seems to be working perfectly and can defeat the hackers or spy agencies to break that.
Blackphone is also said to be the world’s most secure Android phone, @TeamAndIRC hacked the Blackphone in five minutes at the recent Defcon Hacking conference.
About the Hack? According to the group, they were able to hack the Blackphone and found two issues with the phone:
1. First issue was exploited by gaining access to the Android Debug Bridge (ADB)
2. Second issue was exploited by executing a chain of commands to obtain confidential data, by obtaining shell access.
However, the second issue has reportedly been fixed, and the first issue regarding opening up ADB is reportedly not a vulnerability, and the ADB was earlier closed (disabled) to prevent bugs.
Blackphone is the invention of Geeksphone and Silent Circle.
Hope they are doing their best to serve a better security, but I want to say—they should use every technique themselves to hack the phone, so they better would find the loopholes.
I am not a luddite-----I appreciate what the internet brings. We have allowed products to advance before protections and the cost is incredible and it is impossible to maintain. They will soak the American people for every last dime to advance these products until the system collapses. We will see a collapse as cyber-warfare takes all money we have. THINK REAGAN AND HIS NUCLEAR RACE WITH THE RUSSIANS. It is all about building products.
Defending Against Cybercriminals
Today’s world is more interconnected than ever before. Yet, for all its advantages, increased connectivity brings increased risk of theft, fraud, and abuse. During National Cyber Security Awareness Month 2012, the Department of Homeland Security (DHS) and its partners from the public and private sector are highlighting the importance of protecting against cyber crime.
As Americans become more reliant on modern technology, we also become more vulnerable to cyber attacks such as:
- Corporate Security Breaches: The majority of corporate security breaches occur when hackers exploit employees through social engineering and scams.
- Spear Phishing: Hackers target employees through emails that appear to be from colleagues within their own organizations, allowing cyber criminals to steal personal information.
- Social Media Fraud: Cyber criminals increasingly using social media to engage in identity theft and entice individuals to download malicious code or reveal passwords.
DHS also collaborates with the financial and other critical infrastructure sectors to improve network security. Additionally, DHS components, such as the U.S. Secret Service and U.S. Immigrations and Customs Enforcement (ICE), have special divisions dedicated to fighting cyber crime:
The Secret Service maintains Electronic Crimes Task Forces (ECTFs), which focus on identifying and locating international cyber criminals connected to cyber intrusions, bank fraud, data breaches, and other computer-related crimes. The Secret Service’s Cyber Intelligence Section has directly contributed to the arrest of transnational cyber criminals responsible for the theft of hundreds of millions of credit card numbers and the loss of approximately $600 million to financial and retail institutions. The Secret Service also runs the National Computer Forensic Institute, which provides law enforcement officers, prosecutors, and judges with cyber training and information to combat cyber crime.
ICE’s Cyber Crimes Center (C3) works to prevent cyber crime and solve cyber incidents. From the C3 Cyber Crime Section, ICE identifies sources for fraudulent identity and immigration documents on the Internet. C3's Child Exploitation Section investigates large-scale producers and distributors of child pornography, as well as individuals who travel abroad for the purpose of engaging in sex with minors.
Cybersecurity is a shared responsibility, and each of us has a role to play in making it safer, more secure and resilient. For more information about National Cyber Security Awareness Month or the Stop.Think.Connect. Campaign, please visit www.dhs.gov/stopthinkconnect and Cybersecurity.
Last Published Date: September 18, 2012
Why do universities have so many cyber attacks and need now to spend money that should be going to education protecting against proprietary information losses?
UNIVERSITIES ARE NOW CORPORATE RESEARCH FACILITIES AND THEY ARE NOW THE SITE FOR HACKERS SEEKING CORPORATE SECRETS.
So, not only are the taxpayers and students paying to subsidize corporate research-----they are using taxpayer money to build these cyber-security networks. Meanwhile, college is becoming unattainable for most American students.
6 Colleges and Universities That Are Fighting Against Cyber Attacks
Universities across the country are becoming proactive in fighting cyber crime as the number and sophistication of the attacks grow
By Erin Palmer
Posted July 22, 2013 01:00 PM
With American universities becoming a major target of cyber attacks, some schools are going on the offensive in the fight against cyber crime.
Millions of hacking attempts against universities are made each week, according to a recent article by The New York Times. Most universities don’t find out about the attacks until afterward, and it can be difficult to figure out what, if anything, was taken.
Not only do cyber attacks put Social Security numbers and other personal information at risk, but it could affect the university’s research and patents as well.
Increasing cyber security efforts can help to protect a school’s data and intellectual property. Here are some colleges and universities that are working to keep their institutions safe from cyber attacks:
Bucknell University, Susquehanna University and Franklin & Marshall College
After the 2012 cyber attacks against LinkedIn, Eric Smith, an information security employee from Bucknell University, saw the need to improve the university’s security strategy. Instead of having Smith work exclusively on updating Bucknell’s cyber security policies, the university partnered with nearby schools that had similar needs.
Since March, Smith has been chief information security officer for Bucknell, Susquehanna University and Franklin & Marshall College. The arrangement allows all three schools to get the maximum amount of resources at a lower cost.
"The benefit of having Eric in this role is not only having his expertise, he can also look at best practices among the three schools he's working with," said Mark Huber, CIO and director of information technology for Susquehanna, in a story for Bucknell’s website. "There is a real consortial emphasis on this role."
North Carolina State University
Aside from keeping their own systems safe, some universities are also contributing to the cyber safety of the entire United States. A team of researchers at North Carolina State University have created an algorithm that can identify and isolate a cyber attack on networked control systems.
Networked control systems are used to connect computers and physical devices for vital infrastructures across the country, like power and transportation. These systems can control a building’s lighting, air condition, heating units and security programs, so a successful cyber attack can do a lot of damage.
The software algorithm created at NC State manages to isolate the specific area being attacked so that the rest of the system stays protected and can continue to function as normal, rather than having an attack on one area compromise the whole system.
The findings were reported in a paper written by NC State Ph.D. student, Wente Zeng and co-authored by Dr. Mo-Yuen Chow, a professor of electrical and computer engineering at the university.
“We have demonstrated that the system works, and are now moving forward with additional testing under various cyber-attack scenarios to optimize the algorithm’s detection rate and system performance,” said Zeng in a May 2013 new release on NC State’s website.
After President Barack Obama addressed the nation’s cyber security issues in his 2013 State of the Union address, the education community responded. In April 2013, Indiana University announced a collaboration with Internet2, a not-for-profit organization that focuses on innovations in technology.
Together, they created a $2 million initiative to inspire colleges and universities to collaborate on fighting cyber threats in the public sector. The initiative invites other colleges and universities to participate in improving cyber security research.
"Higher education has a significant responsibility in the fight to secure our nation's cyber infrastructure… the higher education community possesses the expertise necessary not only to develop technological responses to cyber attacks, but also to innovate ways to make those responses effective, appropriate, and practical,” said Brad Wheeler, vice president and CIO of Indiana University, in a press release.
University of California, Berkeley
Sometimes cyber security solutions are as simple as increasing resources. As cyber attacks on colleges and universities grow, it takes more resources to combat them. UC Berkeley realized this need and doubled its already multimillion dollar cyber security budget since last year.
“The time between when a vulnerability is announced and when we see attempts to exploit it has become extremely small,” said Larry Conrad, associate vice chancellor and CIO of Berkeley, in The New York Times article. “It’s days. Sometimes hours.”
With such a small window of opportunity available, additional resources could be the difference between stopping an attack just in time or being too late.
The expansion of tech is only working to ingrain something into people's lives that is unsustainable. You can see here how broad this is becoming and all of our taxpayer money is simply subsidizing this protection industry all under the guise of protecting the public. Do we really need to have SMART METERS? Only if you intend to ration energy and water and sell personal data. Do we really need online banking or can we return to simply going to our local bank office? Do we really need our children connected and online in school all day?
OF COURSE NOT. THIS IS SIMPLY A PLOY TO CREATE NEW PRODUCTS AND SERVICES AND THE AMERICAN TAXPAYER IS SUBSIDIZING ALL THE COSTS AND LOSING THEIR CONSTITUTIONAL RIGHTS.
Fighting cyber crime in the US – Infographic August 21, 2014 by Melanie Watson
With 1.5 million monitored cyber attacks and a 700% increase in distributed denial-of-service (DDoS) attacks last year, US businesses are under significant pressure to protect their data. Cyber attacks are only expected to increase as more businesses move their data onto corporate networks, mobile devices, and the Cloud.
Created by IT Governance, this infographic gathers the latest facts and figures on cyber crime in the US, and offers suitable solutions to fight back.
Find out more about IT Governance’s four structured solutions to implement ISO27001.