Category: FBI

fbi-cia-director-hacked-crackas-with-attitudeUS authorities have arrested two North Carolina men on charges that they were part of the notorious hacking group “Crackas With Attitude.” Crackas with Attitude is the group of hackers who allegedly was behind a series of audacious and embarrassing hacks that targeted personal email accounts of senior officials at the CIA, FBI, the White House, Homeland Security Department, and other US federal agencies. Andrew Otto Boggs, 22, of North Wilkesboro, N.C., who allegedly used the handle “INCURSIO,” and Justin Gray Liverman, 24, of Morehead City, who known online as “D3F4ULT,” were arrested on Thursday morning on charges related to their alleged roles in the computer hacking, according to a press release by Department of Justice. A 16-year-old British teenager suspected of being part of the group was arrested in February by the FBI and British police.

Read more at
http://thehackernews.com/2016/09/fbi-cia-hacker-arrested.html

US-Homeland-SecurityThe U.S. Department of Homeland Security (DHS) has published guidelines on when, how and to which government agency US organizations should report cyber incidents. This follows last week’s release of Presidential Policy Directive 41 (PPD-41) on United States Cyber Incident Coordination — which specifically requires the DHS to ‘maintain and update’ such a fact sheet.

The fact sheet (PDF) makes no mention of PPD-41’s Incident Severity Schema. That schema defined six levels (0-5) that provide a common framework for evaluating incident severity; and according to PPD-41, government agencies should get involved from level 3 upwards.

The DHS guidelines first define a cyber incident (“an event that could jeopardize the confidentiality, integrity, or availability of digital information or information systems”), and then define whether the severity of the incident warrants reporting. “Victims,” it explains, “are encouraged to report all cyber incidents that result in significant loss; impact a large number of victims; indicate a compromise of critical IT systems; affect the critical infrastructure; or impact national security, economic security, or public health and safety. Fundamentally, it remains a value judgment by the affected organization.

Read more at
http://www.securityweek.com/dhs-details-cyber-incident-reporting-process

FBI-TOR-Firefox-HackMozilla has filed a brief with a U.S. District Court asking the FBI to disclose the potential vulnerabilities in its Firefox browser that the agency exploited to unmask TOR users in a criminal investigation. Last year, the FBI used a zero-day flaw to hack TOR browser and de-anonymize users visiting child sex websites. Now, Mozilla is requesting the government to ask the FBI about the details of the hack so that it can ensure the security of its Firefox browser.TOR is an anonymity software that provides a safe haven to human rights activists, government, journalists but also is a place where drugs, child pornography, assassins for hire and other illegal activities has allegedly been traded.
 

 

FBI-Hack-any-Computer
The Federal Bureau of Investigation (FBI) can now Hack your computers anywhere, anytime.
The FBI appeared to have been granted powers to hack any computer legally across the country, and perhaps anywhere in the world, with just a single search warrant authorized by any United States judge. The U.S. Supreme Court approved yesterday a change in Rule 41 of the Federal Rules of Criminal Procedure that would let U.S. judges issue warrants for remote access to electronic devices outside their jurisdiction.

FBI-Unmask-TOR-UsersDo you know who created malware for the FBI that allowed Feds to unmask Tor users?
It’s an insider’s job… A former Tor Project developer. In an investigation conducted by Daily Dot journalists, it turns out that Matthew J. Edman, a former part-time employee of Tor Project, created malware for the Federal Bureau of Investigation (FBI) that has been used by US law enforcement and intelligence agencies in several investigations, including Operation Torpedo. Matthew Edman is a computer scientist who specializes in cyber security and investigations and joined the Tor Project in 2008 to build and enhance Tor software’s interactions with Vidalia software, cross-platform GUI for controlling Tor. After 2009, Matthew was hired by a contractor working for defense and intelligence agencies, including the FBI, to develop an anti-Tor malware.

Read more at
http://thehackernews.com/2016/04/tor-unmask-malware.html

 

FBI-Unlock-iPhone

FBI Director James Comey said Wednesday that the agency was able to avoid a prolonged legal battle with Apple by buying a tool from a private source to hack into terrorist Syed Farook’s iPhone 5C.

Apple was engaged in a legal battle with the Department of Justice (DOJ) for a month over a court order that forces the company to write new software, which could disable passcode protection on Farook’s iPhone to help them access data on it.

Read more at
http://thehackernews.com/2016/04/unlock-iphone-hacking-tool.html

Hack-iphone-6The FBI didn’t disclose the identity of the third-party company that helped them access the San Bernardino iPhone, but it has been widely believed that the Israeli mobile forensic firm Cellebrite was hired by the FBI to put an end to the Apple vs. FBI case.
For those unfamiliar in the Apple vs. FBI case: Apple was engaged in a legal battle with the Department of Justice over a court order that was forcing the company to write software, which could disable passcode protection on terrorist’s iPhone, helping them access data on it.

Read more at
http://thehackernews.com/2016/04/fbi-hack-iphone-6.html

Apple_FBI

Apple and the FBI will return to US Congress next week to testify before lawmakers about their heated disagreement over law enforcement access to encrypted devices, a congressional committee announced today.

Apple’s general counsel, Bruce Sewell, and Amy Hess, executive assistant director for science and technology at the Federal Bureau of Investigation, will testify on separate panels before a House Energy and Commerce subcommittee, in addition to other law enforcement officials and technology experts.

FBI director James Comey appeared before a separate congressional committee last month to defend his agency’s pursuit of a court order to compel Apple’s assistance in unlocking an iPhone linked to one of the San Bernardino, California, shooters. Sewell also testified at that hearing.

Read more at
http://www.itnews.com.au/news/apple-fbi-to-face-off-again-in-congress-over-encryption-418247

Spear Phishing AttackA former employee of the Nuclear Regulatory Commission (NRC) has been sentenced to 18 months in prison after offering to hand over the email addresses of Energy Department employees to a foreign government for use in cyber attacks, and then trying to carry out a spear phishing campaign.

Charles Harvey Eccleston, 62, pleaded guilty in February to one count of “attempted unauthorized access and intentional damage to a protected computer,” after being arrested in the Philippines in 2015, according to the Justice Department.

He first came to the attention of the FBI in 2013 after entering a foreign embassy in Manila and offering to sell a list of over 5,000 e-mail accounts of employees of the agency, which he claimed he could get thanks to his security clearance – despite having being sacked three years earlier.

Read more at
http://www.infosecurity-magazine.com/news/former-us-boffin-18-months-spear/

FBI-Director-tape-over-webcamWhat do you do to protect your ‘Privacy‘ while using your computer? FBI Director James Comey uses tape to cover up his laptop webcam to ensure Privacy.
Yes, you heard it right. During the Q&A session at Kenyon College last week, Comey said that he uses tape to cover his laptop webcam in order to mitigate the danger of secret surveillance.
While giving a speech about encryption and privacy, Comey repeated his argument that “absolute privacy” hampers the law enforcement and has never existed in America – until now, when by default encryption offered by big tech giants created boundaries where law enforcement can’t enter, even with a court order.This isn’t the first time Comey made this kind of statement. Comey has always suggested tech companies to adopt encryption techniques that help federal agencies intercept end-to-end encrypted communications when necessary.

Read more at
http://thehackernews.com/2016/04/tape-webcam.html