jump to navigation

O’Reilly Hacked for Comments about Palin Hack September 20, 2008

Posted by cyberpatrol in 4chan.org, Anonymous, cyberbullying, cybercrime, Cybercrime groups, cyberterrorism, Hacking, stalking.
Tags: , ,
2 comments

Wired, 19 Sept 2008

A hacker claims to have cracked the web site of Fox News commentator Bill O’Reilly and purloined a list of subscribers to the site, which includes their names, e-mail addresses, city and state, and the password they use for their registration to the site.

The attack was retaliation for comments that O’Reilly made on the air this week about web sites that published e-mails obtained from the Yahoo account of Alaska Governor Sarah Palin, according to a press release distributed by WikiLeaks late Friday.

The hacker sent WikiLeaks a screenshot of O’Reilly’s subscriber list as proof of the deed, which WikiLeaks has posted online.

This week on his Fox show, O’Reilly slammed web sites, such as WikiLeaks and Gawker, for posting screenshots of e-mails, family photos and a list of contacts taken from Palin’s private e-mail account.

“They’re trafficking in stolen merchandise,” O’Reilly said during one of his shows, calling for their prosecution. He also referred to a site that published the screenshots as “despicable, slimy, scummy.”

In the video above, O’Reilly spoke with Amanda Carpenter, a reporter for Townhall.com who agreed with him and said that a web site that published such information was “complicit” in the hack of Palin’s e-mail account.

“They think it’s newsworthy, even though the information was absolutely, illegally obtained,” she said.

Neither O’Reilly nor Carpenter mentioned the First Amendment protection that media organizations, such as Fox News and Townhall.com, are generally afforded for publishing newsworthy information.

That segment was followed the next day by a segment with Fox News anchor, Megyn Kelly, a lawyer, who explained why the First Amendment would protect the sites. (See video below.)

O’Reilly, disagreed with her, however.

“If your grandma sends you 50 bucks for your birthday and somebody steals the letter and gives it to somebody else and they take the 50 bucks, they’re going to get charged as well as this person who stole the letter,” he said.

Kelly explained that taking stolen money and publishing news were not the same.

“That’s crazy,” he said.

“No it’s not crazy,” Kelly replied. “Because . . . what if somebody obtained a document illegally that proved some massive conspiracy among the presidential candidates and they leaked it to Fox News and we knew it was stolen. You don’t think we’d put it on the air? You’re darn right we would. And it’s not illegal.”

WikiLeaks said in its press release that it had confirmed the authenticity of the list, but didn’t mention how it did so.

Efforts by Threat Level to contact Fox News and some of the subscribers on the list to independently verify the authenticity of the list were unsuccessful.

Advertisements

Palin Hacker Group’s All-Time Greatest Hits September 20, 2008

Posted by cyberpatrol in 4chan.org, Anonymous, cyberbullying, cybercrime, Cybercrime groups, cyberterrorism, Hacking, stalking.
Tags: , , , ,
1 comment so far

Wired, 19 Sept 2008

By Ryan Singel September 19, 2008 | 3:04:51 PMCategories: Hacks and Cracks

Anonymous isn’t so anonymous anymore.

At least not after one “member” of Anonymous, the loose confederation of online troublemakers, broke into the personal e-mail account of Republican vice-presidential nominee Sarah Palin and then posted the new password to Anonymous’ online message board.

From there, others slipped screenshots and family photos to the leak-releasing website Wikileaks, launching a maelstrom of media coverage and widespread speculation as to the e-mail hacker’s real name.

For those unfamiliar, Anonymous is a group you can’t join, except by hanging out for a long time in the internet’s most juvenile corners — usually one of the image boards where everyone posts anonymously. 4chan’s /b/ board — or random — seems to be the main hangout, though other chans and IR channels seem to serve as adjunct clubhouses as well. The hangouts have almost no rules —  though using some variation of the terms fag, nigger and jew seems mandatory in every post.

The self-identified Palin-email burglar who uses the online handle Rubico said he got the idea while hanging out at 4chan — specifically its random or /b/ board (NSFW).

After watching others on the board temporarily lock up the e-mail account by trying primitive ways to break in, Rubico decided to call on the power of Google. With a combination of answers found through searches and an educated guess, Rubico was able to reset the account’s password.

Though Fox News famously and hilariously called Anonymous “hackers on steriods,” in large part they have little skill besides knowing how to use a web proxy to mask their IP addresses.

Instead, Anonymous keyboard miscreants combine online Fight Club-like bravado, inside jokes documented only on the world’s stupidest wiki, and harassment tactics that sound funny in theory but in practice are streaked with cruelty. The point? Fun at other people’s expense — otherwise known as Lulz.

The basic repertoire? Prank phone calls, ordering pizzas to someone’s house, flooding a message board with obscene ASCII art. Advanced techniques include finding a way into someone’s MySpace account in order to send messages to their friends saying they are gay.

What are Anonymous’ greatest or worst hits?

The Epilepsy Attack — In March, a group of internet griefers flooded an epilepsy message board with flashing images that caused migraine headaches and seizures in some users. While it’s not certain whether it was properly the work of Anonymous, the assault was rumored to have started on a thread at 7chan.org — another Anonymous hang out — and much was blamed on eBaumsworld, an online site often derided by Anonymous.

The FBI is reportedly investigating what may be the first computer attack that physically harmed people.

The Scientology War — In January, Anonymous decided to take on a real target — the Church of Scientology — which its members considered to be an overly litigious cult. Soon, anonymous pranksters were ordering pizzas to Scientology offices, using denial-of-service attacks to scuttle its web servers and posting previously unseen secret Scientology documents.

They also briefly pointed denial-of-service attack tools at the wrong IP address — which happened to be a Dutch school.

The publicity drew hordes who wanted to participate, and soon many longtime Anonymous users found themselves annoyed with the new converts who thought Anonymous was a crusading organization.

The Habbo Hotel Raid – Anonymous has staged many minor incursions into other people’s online playgrounds, but one of the most storied involved a virtual world known as Habbo — a frequent target for bored Anonymous lurkers interested in ruining other people’s fun.

In 2006, hundreds of Anonymous users showed up using identically dressed avatars: a black man with an Afro in a grey suit. They blocked off the pool to other users, claiming it was infected with AIDS. They also formed swastika-like formations and flooded the site with stupid internet sayings. When users were banned, they claimed it was racist.

The Mitchell Henderson Harassment — The suicide of Mitchell Henderson, a seventh grader, stirred Anonymous, who gleefully decided that Henderson shot himself because he had lost his iPod, a fact he’d noted on his MySpace page. Anonymous grabbed onto a badly written message on an online memorial page for him, and turned the phrase “an hero” into an internet meme.

For more than a year, Anonymous kept up the fun, calling Henderson’s parents, pretending to be his ghost.

The Hal Turner Campaign – In late 2006 and early 2007, Anonymous had much fun with Hal Turner, a small-time white supremacist who ran an online radio show. Anonymous flooded one of his shows with prank calls, which then escalated in mutual internet stupidity.

Anonymous eventually flooded his site with too much traffic for his web host to handle. Turner tried suing the image boards — unsuccessfully — and finally he closed down his show after a hacker managed to unearth correspondence suggesting Turner was an FBI informant.

Web proxy firm working with FBI to trace Palin e-mail hacker September 18, 2008

Posted by cyberpatrol in 4chan.org, Anonymous, cyberbullying, cybercrime, Cybercrime groups, cyberterrorism, Hacking, stalking.
Tags: , , ,
2 comments

IDG, 18 Sept, 2008

The Webmaster of a proxy service called Ctunnel.com, which may have been used by a hacker to illegally access the e-mail account of Republican vice presidential candidate Sarah Palin, is working with law enforcement authorities to track down the person behind the break-in.

Gabriel Ramuglia, the Athens, Ga.-based Webmaster of Ctunnel, said Thursday that URLs in screenshots of Palin’s e-mail — photos were posted online Wednesday on 4chan.org and other sites — suggested that whoever accessed her Yahoo! account had used his proxy service.

Ramuglia said in an interview that he was contacted by FBI officials last night and asked to retain computer logs of the last few days’ activity on his service and make sure nothing is deleted. Ramuglia, who normally stores only a week’s worth of log data, said he would not have deleted anything anyway because of the illegal nature of what had happened.

Ramuglia is now in the process of importing more than 80GB worth of log data into a database for analysis. He said he’s reasonably confident he can help authorities sift through the logs and trace access back to the originating IP address — especially because the self-professed hacker has admitted using just one proxy service to access Palin’s account.

Notorious board user

The alleged hacker said in an online posting that he gained access by simply resetting the password to Palin’s Yahoo! e-mail account using its password recovery service. That’s according to a description of events posted on a blog site run by conservative syndicated columnist Michelle Malkin.

The first-person account was originally posted on a Web site called 4chan.org by a poster identified only as “Rubico.” That post, along with a related thread, was later deleted from that site — but not before a reader of Malkin’s blog apparently snagged a copy of it and sent it along to Malkin. Rubico’s claims could not be verified and security analysts have been skeptical of the claims.

According to the Malkin blog reader, 4chan.org hosts multiple boards, each of which is dedicated to specific subjects. The individual who first broke into Palin’s e-mail account apparently belonged to a group called /b/, which the reader described as the “most notorious” of the boards on 4chan.org.. /b/tards, as its denizens are called, are interested only in their own amusement,” the reader claimed.

Reset the password

Rubico allegedly became interested in Palin’s e-mail after reading media reports of her using a Yahoo! e-mail account and decided to try and access it by resetting her password. “It took seriously 45 mins on wikipedia and google to find the info” needed, Rubico claimed. “Birthday? 15 seconds on wikipedia, zip code? well she had always been from wasilla, and it only has 2 zip codes (thanks online postal service!)”

Rubico said it was harder to find the answer to one of the other questions needed for a password recovery: Where had Palin met her husband? After some digging, Rubico determined that the couple first met at Wasilla High School.

He said he used the information to reset Palin’s password and go through her e-mail to see for anything incriminating that might “derail her campaign.”

It was only after finding nothing that the hacker realized how easily he could be caught, since he had used only one proxy to access the account. So he decided to make access to it available to others on the /b/ board by posting Palin’s recently reset password. Rubico claimed he “then promptly deleted everything, and unplugged my Internet and just sat there in a comatose state.”

However, one of the other members of the bulletin board who Rubico described as a “White knight f..,” saw the thread and used the new password to go back into Palin’s account and reset it. That person then sent an e-mail to a “friend of Palin’s” informing her of the new password and what had happened, Rubico claimed.

Alaska Governor Palin’s email account hacked via social engineering September 18, 2008

Posted by cyberpatrol in 4chan.org, Anonymous, cyberbullying, cybercrime, Cybercrime groups, cyberterrorism, Hacking, stalking.
Tags: , ,
add a comment

ZDNet, 19 September 2008

Details describing how someone hacked into the Yahoo Mail account of Republican vice presidential candidate Sarah Palin (pictured) emerged on Thursday.

The hack appears to have been accomplished through little more than social engineering, the process of acquiring personal information through social manipulation. The hackers exploited known weaknesses in Yahoo Mail’s password-recovery feature.

The Knoxville News Sentinel reported that a 20-year-old University of Tennessee student has been contacted in connection to the federal investigation of the break-in.

Since Tuesday, anonymous posters using a forum on the 4chan.org website have been circulating password-protected zip files containing the contents of the now-deleted email account once belonging to Palin. Various posts to the /b/ board have also provided insight into how the hack was carried out.

Like most web account services, Yahoo Mail provides an option to reset or recover one’s user name and password. What is unclear is how the account recovery was rerouted from the alternative email address chosen by Palin to a secondary email address.

One poster said it took only 15 seconds on Wikipedia to answer Yahoo Mail’s prompt for Palin’s birthday.

As regards the prompt for a ZIP code, Wasilla, Alaska, has only two ZIP codes.

However, Palin’s personal security question — ‘Where did you meet your spouse?’ — did slow the process down. The poster claimed it took several tries before they eventually hit upon the correct answer: Wasilla High School.

Webmail accounts are not alone in using online security questions.

In May, Acxiom, a Little Rock, Arkansas-based data-warehouse company, announced it was introducing a biographical authentication service that asks users of online banking and e-commerce sites random questions based on their personal lives, such as “How many fireplaces are in your current residence?”. The answer can be obtained from any US real-estate website.

What is Anonymous? September 5, 2008

Posted by cyberpatrol in 4chan.org, Anonymous, cyberbullying, cybercrime, Cybercrime groups, cyberterrorism, Hacking.
Tags: ,
2 comments

Anonymous traces back to 2004 as a group of computer gamers and aspiring hackers, harassing other computer users. Message and image boards [Internet forums that permit users to post images and messages together] such as “enturbulation.org,” “4chan,” “7chan,” “420chan,” “711chan” and other *chans continue to form the core online haunts for the group. The London Guardian described 4chan as “lunatic, juvenile …” Anonymous derives its inspiration from forbidden fascist literature, such as their reference to Mein Kampf and liberally uses symbols of hate to instill fear into people.


Anonymous traces back to 2004 as a group of computer gamers and aspiring hackers, harassing other computer users. Message and image boards [Internet forums that permit users to post images and messages together] such as “enturbulation.org,” “4chan,” “7chan,” “420chan,” “711chan” and other *chans continue to form the core online haunts for the group. The London Guardian described 4chan as “lunatic, juvenile …” Anonymous derives its inspiration from forbidden fascist literature, such as their reference to Mein Kampf and liberally uses symbols of hate to instill fear into people.

One of Anonymous’s resources is Encyclopedia Dramatic (ED), a sick parody of Wikipedia written in an abusive style. Its “humor” is thin veneer covering deeply-rooted hate speech. There is no justification for pages such as the pages “Ni***r Manual” that advocates regular beatings of African Americans, or their page describing the Holocaust as “good times” with graphic images of the death and destruction perpetrated during the Holocaust.

Coordinating their actions through these forums and image boards, particularly 4chan and enturbulation.org, Anonymous has flooded computers of MySpace users with viruses and pornographic pictures and has raided online gaming sites. Their actions are anti-Semitic or racist or some other manifestation of bigotry; when people object, members respond with telephone threats uttered by computer-generated voices or with malicious computer attacks.

Anonymous is a convenient facade for criminal activity on the Internet and in the real world. Behind that facade are people, some of whom literally, not just figuratively, hide behind masks as they vent their basest impulses while rationalizing that their anonymity frees them from responsibility for their acts.

In July 2007, Fox News aired a special report exposing the actions of Anonymous. The report covered an attack on a MySpace user, whose account had been “hacked” into by Anonymous, and plastered with images of gay pornography. The MySpace user also claimed a virus written by Anonymous hackers was sent to him and to ninety friends on his MySpace contact list, crashing thirty-two of his friends’ computers. The report also included “raids” on other Internet communities.

In response, Fox News computers were assaulted with massive attacks from multiple computer systems designed to overload Fox’s computers (i.e a DDoS attack – Distributed Denial of Service attack) and Anonymous issued an even bolder statement of their purpose than it had previously ever articulated.

“We are the face of chaos and the harborings [sic] of judgment. We’ll laugh in the face of tragedy. We’ll mock those who are in pain. We ruin the lives of other people simply because we can. A man takes out his aggression on the cat. We laugh. Hundreds die in a plane crash. We laugh. The nation mourns over a school shooting, we laugh. We’re the embodiment of humanity with no remorse, no caring, no love, or no sense of morality.”

In keeping with this “mission statement,” the Anonymous hit list has included MySpace, Fox News, the Epilepsy Foundation website, prominent hip-hop websites and many others. Their attack against the Church of Scientology is for the same purpose.

On January 17, 2008, “Anonymous” declared its intention to destroy the Church of Scientology.

Immediately following that declaration, Scientology churches, leaders, staff members, and parishioners were deluged by bomb threats, death threats, vandalism, harassment, attempts at intimidation, and systematic interference with their telephones, fax machines, and websites. Individual Scientologists were harassed and prevented from attending services at their churches. Hate speech and hate crimes became a coordinated activity, and the perpetrators hid their identities behind masks like common criminals and terrorists.

Anonymous has fueled religious hatred and intolerance by denigrating the Scientology religion and its founder.

Hate crimes of Anonymous against the Church of Scientology per the Church of Scientology in Los Angeles:

– Death threats against Scientologists and its ecclesiastical leaders

– Threats to destroy churches of Scientology by detonating bombs in churches in the United States

– Mailing of envelopes containing fake anthrax to 25 churches

– 41 death threats

– 56 bomb and arson threats

– 103 threats of other violence

– 40 incidents of vandalism, including an attempt to set fire to one of our churches in Los Angeles

– 3.6 million harassing emails and 141 million malicious hits against Church websites, in an attempt to bring down those sites.

Anonymous attacks against the Church of Scientology have resulted in multiple local law enforcement investigations and two federal investigations into the individuals behind the crimes, putting the matter rightfully in the hands of law enforcement for prosecution of their hate crimes.

Posted with approval of the author.

Anonymous – a threat to society and peace September 2, 2008

Posted by cyberpatrol in 4chan.org, Anonymous, cyberbullying, cybercrime, Cybercrime groups, cyberterrorism, Hacking, myspace, stalking.
Tags: , , , ,
add a comment

Anonymous is a convenient facade for criminal activity on the Internet and in the real world. Behind that facade are people, some of whom literally, not just figuratively, hide behind masks as they vent their basest impulses while rationalizing that their anonymity frees them from responsibility for their acts.

Documentation for download (PDF)

Hackers for hire July 17, 2008

Posted by cyberpatrol in cybercrime, Cybercrime groups, Hacking.
add a comment

the Inquirer, 17 July 2008

Dirty deeds done dirt cheap

Hackers are now professionals using white boards, pie charts and spouting words like ‘paradigm’, ‘cash cow’, and ‘model’.

A report from web security outfit called Finjan claims that the days of the lone hacker who steals and resells credit card numbers is a thing of the past.

Hacks for fame have been replaced by the concept of creating a business where you have frequent customers who buy your stolen product.

Finjan staff went under cover by pretending to be potential customers and found that cybercrime outfits have a structure much like the Mafia.

There is a ‘boss’ who is a business entrepreneur and doesn’t commit the crimes himself, with an ‘underboss’ who manages the operation. The number two sometimes provides the software tools. Then there are ‘campaign managers’ who lead their own attacks to steal data with their ‘affiliation networks’.

Stolen data is sold by ‘resellers’, similar to the Mafia’s ‘associates’. Since these individuals did not partake in the actual cybercrime, they know nothing about the original attacks.

Stolen credit cards and bank accounts are cheap while stolen healthcare-related information, login credentials for organisations, e-mail, and FTP accounts are more expensive.

At the Uneasy Intersection of Bloggers and the Law July 15, 2008

Posted by cyberpatrol in 4chan.org, Anonymous, cyberbullying, cybercrime, Cybercrime groups, cyberterrorism, Hacking.
add a comment

New York Times, 15 July 2008

There is no better way to get a blogger talking than by telling him what he cannot publish — although you might forgive a government prosecutor for thinking otherwise.

A grand jury subpoena sent by prosecutors in the Bronx earlier this year sought information to help identify people blogging anonymously on a Web site about New York politics called Room 8.

The subpoena carried a warning in capital letters that disclosing its very existence “could impede the investigation being conducted and thereby interfere with law enforcement” — implying that if the bloggers blabbed, they could be prosecuted. (go to the full article)

Simon Fraser launches cyber crime research centre, aims to fight child porn with viruses July 9, 2008

Posted by cyberpatrol in Anonymous, cybercrime, Cybercrime groups, cyberterrorism.
2 comments

The Canadian Press, 9 July 2008

SURREY, B.C. — Cyber crime has a new enemy.

Simon Fraser University launched an International Cybercrime Research Centre on Tuesday, saying child pornography will be its first target with a type of “good virus” that scours systems with the tenacity of a chomping Pac Man character.

“In the same way that a bad virus works by infecting machines, by hunting for certain symbols, so a good virus can operate in much the same way,” said the centre’s new director, Robert Gordon. “Like Pac-Man, actually starting to destroy particular forms of imagery on the Internet.”

Gordon said they are already experimenting with the virus in some operating systems.

There are about 14 million pornography websites in operation today, and B.C. Labour Minister Iain Black pointed out it’s estimated there are about one million child abuse images contained inside those websites.

“I am very, very pleased the centre will be working to protect children,” Black told a crowd gathered at the Surrey, B.C., campus of the university.

Black announced provincial government support of $350,000 to help set up and operate the centre, as well as secure data and purchase lab equipment.

The B.C. government operates one of the largest Internet networks in North America, with 750,000 users.

While child pornography and identity theft are considered the most serious cyber crimes, the centre will also do research on criminal harassment through the Internet, money laundering, economic crimes and computer viruses.

Black compared the problem to the many-headed creature Hydra in Greek mythology.

“Each time you chop one (head) off another one appears. It happens in this case because the profits for criminals are absolutely enormous,” he said.

Black quoted a recent Canadian survey that found more Canadians believe they’re likely to be victims of Internet crime than they would be victims of crime on the street.

Many people ignore or delete requests for money, their bank account information or credit card numbers, but the mass quantities of illegal requests going out means that some people do send information to criminals.

Gordon believes that getting the word out about these scams will be a key priority for the centre.

“It’s the same old confidence trickery that’s been going around for about 500 years, but it’s just in this new mode,” he explained.

Gordon said in the last few days he has received similar requests from criminals and simply deleted them.

He said the centre will also focus on crime detection and helping to prosecute those responsible, a difficult predicament when the person accused of committing the crime is likely in another country.

“That requires international agreements around investigations and such proceedings,” Gordon said.

Vancouver Police Insp. Kevin McQuiggan, of the forensic services section, said the centre is an excellent way to collaborate on these types of crimes.

“I think it goes beyond the police, and that police and industry and academia all have to work together to address the problem.”

The centre will also investigate crime trends and help establish new tools to counter constantly changing Internet crimes.

Cyber sleuths operate in the digital realm Computer crime unit has paid dividends, local police say June 29, 2008

Posted by cyberpatrol in Cybercrime groups.
add a comment

The Eagle Tribune, 29 June 2008

By Jim Patten
Staff Writer

From the comfort of his North Andover home, Richard Disler trolled the Internet chat rooms, trying to hook up with underage girls.

That’s where the 43-year-old accountant met a girl named “Sara.” They began chatting online, and she eventually suggested a place where they could meet.

But Disler was arrested before the meeting occurred. That’s when he learned that “Sara” was actually Medford police Lt. John J. McLean, commander of the North East Massachusetts Law Enforcement Council’s Computer Crime Unit.

The Computer Crime Unit was also called in several years ago when a Vermont man traveled to Haverhill to have sex with an underage local girl he had met online. While in Haverhill, the man took nude pictures of the girl. He was caught by police, and the Computer Crime Unit retrieved the pictures from his laptop.

Haverhill Detective Capt. Alan Ratte said as criminals become more adept with their use of technology, the Computer Crime Unit’s expertise is critical to local police departments.

“I think the value of the unit speaks for itself,” he said.

North Andover police Detective Lt. Paul Gallagher agreed, calling the unit an “invaluable asset” to local police.

NEMLEC and its various specialized units serve 48 police departments and two sheriff’s departments in Essex and Middlesex counties. Formed in 2001, the seven-member Computer Crime Unit has investigated 800 cases, averaging between 135 and 200 a year, McLean said. It is based out of Medford and Peabody.

“Seventy-four percent of our case load is child exploitation,” he said. The rest are financial crimes, fraud, threats, and other crimes.

Officers assigned to the unit are drawn from various Massachusetts police departments. They must have good computer and investigative skills, and are sent to a series of training courses to become certified.

Computer crime investigations involve both forensic work and cyber investigations.

In forensic work, investigators examine the contents of computers that have been seized, and contact internet service providers to determine what information the user had on the computer, McLean said. Cyber investigations involve actual online work, tracking offenders and making undercover approaches to them, as in the Disler case.

Since the formation of NEMLEC’s Computer Crime Unit, there has been an explosion in technology and its uses, McLean said. Now the unit is getting involved in homicides, rapes, and other crimes because of what criminals are putting online or sending via their cell phones.

“The days of old where we just did kiddie porn and electronic crime are long gone,” he said.

Middlesex County Deputy Sheriff Tim McGibbon, a three-year veteran of the unit, says the effort is definitely worthwhile.

“More and more search warrants are including standard language to grab computers, cell phones, and PDAs,” he said. “Everybody knows everything is stored on computers.”

For all of their hard work, McLean said, he is concerned about the future of the Computer Crime Unit because it doesn’t have a steady source of funding.

“Without sustained funding, I don’t know what the future holds,” he said.

McLean said the unit depends on contributions from NEMLEC member communities and corporate donations for support. He said the costs for hardware, software, training and upgrades can reach about $75,000 a year, and that does not include the salaries of unit members, which are paid by their respective departments.

“That is a reasonable figure, but on the low end for the size of the unit and the number of jurisdictions we cover,” he said.

FIRST Moves to bring cyber crime fighters together June 24, 2008

Posted by cyberpatrol in Cybercrime groups.
add a comment

Webwire, 24 June 2008

VANCOUVER, CANADA, A new initiative to ease tensions between law enforcers and internet security experts was launched here today at the 20th annual conference of FIRST, the Forum of Incident Response and Security Teams.

During a session which heard warnings that the war against cyber crime was in danger of being lost, members were told that computer emergency response teams from the finance industry were moving to find an answer to one of security experts’ key complaints: that national law enforcement agencies refuse to investigate cyber criminals when the value of their thefts is below a certain threshold.

Foy Shiver [FOY SHIVER] Deputy Secretary-General of the Anti-Phishing Working Group, announced that a forum was being established which would allow different teams to pool and analyse intelligence from individual attacks that so disparate crimes by the same criminal gangs could be aggregated and presented to law enforcers in a single body of evidence.

Mr Shiver said: “There are issues like privacy which will need to be sorted out, but we’re confident we can resolve them”

Delegates had complained that, particularly in commercial enterprises, it was hard to sustain a business case for security teams if law enforcers failed to follow up evidence – one said that in his territory, police wouldn’t investigate a cyber crime that had a haul of less than $50,000.

FIRST’s law enforcement special interest group decided to launch a website to provide both sides with useful and instructional materials.

Opening the session, Chris Painter [PAINTER], of the US Department of Justice, who chairs the G8 High Tech Crime Group, said that Internet crime gangs were increasingly more organised, and often masterminded their operations simultaneously in different countries.

John Pignataro, [PIGNATARO] director of Security Incident Response Team Investigations at Citigroup reported that the number of new phishing sites encountered by his bank had quadrupled in five years from 15 each week to nearer 60, and Tom Mullen [MULLEN], Head of Investigations for BT, the British telecommunications giant, revealed a 35 per cent per annum increase in reported incidents over four years.

Levi Gundert [LEVI GUNDERT], who moved from working for the US Secret Service in Los Angeles to join Team Cymru, the Internet security research firm, called for collaboration between law enforcers and security teams to be more structured, and for the two sides to teach and help each other.

“I thought things were bad when I worked for the Secret Service,” he said. “But now I am at Team Cymru I understand how bad it really is. We are losing the war against cyber crime badly.

“There is frustration on both sides – on the law enforcers’ side, about lack of resources and perceived lack of results, and about information overload, and on the security teams’ side, about the information they supply seeming to go into a black hole and the law enforcers not appearing to respond.”
Two speakers from the host country – Robert Pitcher of the Canadian Cyber Crime Incident Response Centre, and Dan Howard of the RCMP Integrated Technological Crime Unit – described how collaboration was achieved in Canada.

More than 400 delegates are attending the FIRST conference. Founded in 1990, FIRST is a non-profit body which consists of internet emergency response teams from 194 corporations, government bodies, universities and other institutions from across the Americas, Asia, Europe and Oceania. It leads the world’s fight-back against cyber-crime, sabotage and terrorism, and promotes co-operation between IERT’s and law enforcement agencies.

More information about the conference at: www.first.org/conference/2008
And about FIRST:
http://www.first.org/
http://www.first.org/about/

Contact Information
Frank Wintle
Communications Officer
FIRST
+44 7850 102194
frankwintle@panmedia.co.uk