From a small town in Romania, Guccifer skewered and glorified the power elite.
If Snowden perfectly fit the profile of geek crusader, Lehel, a stone-faced, disheveled man in a tight leather jacket, seemed an odd candidate for one of the world’s most notorious hackers. But Guccifer is to hacking what the Beatles are to rock and roll. He had predecessors, 4Chan cowboys like Anonymous and Sabu of LulzSec, but he’s changed the nature of hacking fame. Guccifer rose by exploiting the connections people make online to infiltrate the private lives of some of the most powerful people on Earth. He served up the results to the media, irresistible high-low raw material for an online news cycle driven by leaks and voyeurism and racked by anxiety over privacy.
What Is A Guccifer? [more inside]
The Limits of Computer Trespass Law
(Lengthy video with audio available) "Have you ever borrowed a smartphone without asking? Modified a URL? Scraped a website? Called an undocumented API? Congratulations: you might have violated federal law!"
Legal and internet thinkers (including Ed Felten, Jennifer Granick, Dan Auerbach, & others) talk about vagueness in the Computer Fraud and Abuse Act
, chilling effects, and the prosecution of Aaron Swartz
in a panel discussion at Stanford's Center for Internet and Society
. [more inside]
"During his civil lawsuit against the People's Republic of China, Brian Milburn
says he never once saw one of the country's lawyers. He read no court documents from China's attorneys because they filed none. The voluminous case record at the U.S. District courthouse in Santa Ana contains a single communication from China: a curt letter to the U.S. State Department, urging that the suit be dismissed. That doesn't mean
Milburn's adversary had no contact with him." [China Mafia-Style Hack Attack Drives California Firm to Brink
"Millions" Of Home Routers Vulnerable to a Web Hack
At the upcoming Black Hat Conference
, to be held on July 29th in Las Vegas this year, a security researcher and ethical hacker
named Craig Heffner
will reveal a software tool to exploit a large-scale vulnerability
in most home routers that will give users outside of the network access to the device. [more inside]
Ghost shift ghost chips.
A tale about a Chumby hardware developer with a keen investigative eye noticing some oddities about microSD FLASH cards from supposedly reputable suppliers.
Gmail account isn't secure
. Announced at Defcon
, Jay Beale's tool, The
(man-in-the-middle) to steal session ID from not only Gmail users,
but LinkedIn, LiveJournal, Facebook, and presumably any site that uses a session-based
Serious as a heart attack:
A collaboration of various medical researchers in the academic field has led to proof that pacemakers can be remotely hacked
with simple and accessible equipment. This is a proof of concept, but the real question is: How many other pacemakers and medical devices are similarly vulnerable? (Writers may note a new twist available for the assassination of characters in their novels and screenplays.)
A hacker breaks into the forums of the guild Band of Brothers on the MMORPG Eve,
where he discovers an Eve devolper, called t20, is not only a high-ranking member of the alliance, but has been feeding BoB expensive and rare in-game items.
CCP, the company who runs EVE, denies any wrong doing, before it is revealed
that CCP knew about t20's abuses for over six months.
Players are not happy.
Idiot Tries to Hire Hacker to Change his GPA
Why study when you can just hire a hacker to adjust your GPA to something more to your liking? Or not.
And now an amazing (and scary) amount of his personal information is pwned!
Boing Boing says he's a Lynx user
, but British Telecom declared him a hacker and that's what the BBC
is carrying. There's no way to tell who's right yet, but I'd say the Bloggers are betting on Lynx user
. Anyone got an update?
Christopher Andrew Phillips
, the University of Texas at Austin student accused of "hacking" the school's computer system, has turned himself in. But reading about his method
makes me wonder if this really is hacking and/or illegal...
Not only can Kevin Mitnick not touch a computer, cell phone, or the Internet for three years, but a judge is trying to bar him from the lecture circut
because he's talking about hacking and technology. I wonder, if they get him to stop talking
about technology, are they going to bust him for thinking
about it too?
They bagged the kid who was responsible
for all those Denial-of-Service attacks a couple of months ago. He's Canadian.
Here's an interesting legal question: could the US extradite him? The crimes were committed in the US, but he was in Canada at the time he did it, since he worked through the Internet. Whose laws apply?
(By the way, I've seen no indication that the US is considering extradition; I was just curious whether they could
Last night Kevin Mitnick
was on 60 minutes (the gist of the interview is quoted here
), and I have to say he came off as an utterly harmless geek. He was an information junkie that enjoyed the challenge of cracking firewalls. He never profited from his activities and the affected companies made up their monetary losses. It's a shame he was forced to waste away in prison instead of offer his security expertise to the affected companies.
Kevin Mittnick is finally being released from prison today,
but I wouldn't call what he's getting as being "free". Prohibiting Kevin from touching a computer for 3 years? This isn't like giving a toddler to a ex-con child molester, it's a computer. A person can do a lot of things besides hack into company servers. How does anyone expect Kevin to make the $125 restitution he owes each month, if he can't use a computer or get a job that requires a computer? Now that I think about it, what percentage of decent jobs are completely free of computers?