Researcher Gets 20 Days In Prison For Hacking State Websites As Political Stunt

An anonymous reader writes from a report via Softpedia: David Levin, 31, of Estero, Florida will spend 20 days in prison after hacking two websites belonging to the Florida state elections department. Levin, a security researcher, tested the security of two Florida state election websites without permission, and then recorded a video and posted on YouTube. The problem is that the man appearing in the video next to Levin was a candidate for the role of state election supervisor, running for the same position against the incumbent Supervisor of Elections, Sharon Harrington. Harrington reported the video to authorities, who didn’t appreciate the media stunt pulled by the two, and charged the security researcher with three counts of hacking-related charges. The researcher turned himself in in May and pleaded guilty to all charges. This week, he received a 20-day prison sentence and two years of probation. In court he admitted to the whole incident being a political stunt. Read more of this story at Slashdot.

View the original here:
Researcher Gets 20 Days In Prison For Hacking State Websites As Political Stunt

White House Names Retired Air Force General As First Cyber Security Chief

An anonymous reader quotes a report from Reuters: The White House on Thursday named a retired U.S. Air Force general as the government’s first federal cyber security chief, a position announced eight months ago that is intended to improve defenses against hackers. Gregory Touhill’s job will be to protect government networks and critical infrastructure from cyber threats as federal chief information security officer, according to a statement. President Barack Obama announced the new position in February alongside a budget proposal to Congress asking for $19 billion for cyber security across the U.S. government. Touhill is currently a deputy assistant secretary for cyber security and communications at the Department of Homeland Security. He will begin his new role later this month, a source familiar with the matter said. Grant Schneider, who is the director of cyber security policy at the White House’s National Security Council, will be acting deputy to Touhill, according to the announcement. wiredmikey adds from a report via SecurityWeek.Com: The White House today announced that Brigadier General (retired) Gregory J. Touhill has been named the first Federal Chief Information Security Officer (CISO). Back in February, President Barack Obama unveiled a cybersecurity “national action plan” (CNAP) which called for an overhaul of aging government networks and a high-level commission to boost security awareness. As part of the plan, the White House said it would hire a federal CISO to direct cybersecurity across the federal government. General Touhill is currently the Deputy Assistant Secretary for Cybersecurity and Communications in the Office of Cybersecurity and Communications at the Department of Homeland Security (DHS). The key hire comes at a time when the government needs cybersecurity talent more than ever. Earlier this week a report published by the U.S. House of Representatives Committee said the data breaches disclosed by the Office of Personnel Management (OPM) last year were a result of culture and leadership failures, and should not be blamed on technology. Read more of this story at Slashdot.

Follow this link:
White House Names Retired Air Force General As First Cyber Security Chief

Personal Information of Nearly 200 Democrats Leaked in Latest Hack

We already knew that a recent hack that targeted Democratic officials was going to be more than just access to possibly incriminating emails, but we didn’t realize it would be this soon. Read more…

More:
Personal Information of Nearly 200 Democrats Leaked in Latest Hack

Facebook Admits Blocking WikiLeaks’ DNC Email Links, But Won’t Say Why

An anonymous reader writes: Facebook has admitted it blocked links to WikiLeaks’ DNC email dump, but the company has yet to explain why. WikiLeaks has responded to the censorship via Twitter, writing: “For those facing censorship on Facebook etc when trying to post links directly to WikiLeaks #DNCLeak try using archive.is.” When SwiftOnSecurity tweeted, “Facebook has an automated system for detecting spam/malicious links, that sometimes have false positives. /cc, ” Facebook’s Chief Security Officer Alex Stamos replied with, “It’s been fixed.” As for why there was a problem in the first place, we don’t know. Nate Swanner from The Next Web writes, “It’s possible its algorithm incorrectly identified them as malicious, but it’s another negative mark on the company’s record nonetheless. WikiLeaks is a known entity, not some torrent dumping ground. The WikiLeaks link issue has reportedly been fixed, which is great — but also not really the point. The fact links to the archive was blocked at all suggests there’s a very tight reign on what’s allowed on Facebook across the board, and that’s a problem.” A Facebook representative provided a statement to Gizmodo: “Like other services, our anti-spam systems briefly flagged links to these documents as unsafe. We quickly corrected this error on Saturday evening.” Read more of this story at Slashdot.

Read More:
Facebook Admits Blocking WikiLeaks’ DNC Email Links, But Won’t Say Why

Pro-Clinton Super PAC Caught Spending $1 Million On Social Media Trolls

An anonymous reader quotes a report from US Uncut: A Super PAC headed by a longtime Clinton operative is spending $1 million to hire online trolls to “correct” Bernie Sanders’ supporters on social media. Correct The Record (CTR), which is operated by Clinton attack dog and new owner of Blue Nation Review David Brock, launched a new initiative this week called “Barrier Breakers 2016” for the purpose of debating supporters of Senator Bernie Sanders — or “Bernie Bros, ” as they’re referred to in Correct the Record’s press official release — on Facebook, Twitter, Reddit, and other social media platforms. The “Barrier Breakers” will also publicly thank Hillary Clinton’s superdelegates and fans for supporting her campaign. The paid trolls are professional communicators, coming from public relations and media backgrounds. “The task force staff’s backgrounds are as diverse as the community they will be engaging with and include former reporters, bloggers, public affairs specialists, designers, Ready for Hillary alumni, and Hillary super fans who have led groups similar to those with which the task force will organize, ” CTR stated. Read more of this story at Slashdot.

Originally posted here:
Pro-Clinton Super PAC Caught Spending $1 Million On Social Media Trolls

DOJ Threatens To Seize iOS Source Code

An anonymous reader writes from an article posted on iDownloadBlog: The DoJ is demanding that Apple create a special version of iOS with removed security features that would permit the FBI to run brute-force passcode attempts on the San Bernardino shooter’s iPhone 5c. Meanwhile, President Barack Obama has made public where he stands on the Apple vs. FBI case, which has quickly become a heated national debate. In the court papers, DoJ calls Apple’s rhetoric in the San Bernardino standoff as “false” and “corrosive” because the Cupertino firm dared suggest that the FBI’s court order could lead to a “police state.” Footnote Nine of DoJ’s filing reads: For the reasons discussed above, the FBI cannot itself modify the software on the San Bernardino shooter’s iPhone without access to the source code and Apple’s private electronic signature. The government did not seek to compel Apple to turn those over because it believed such a request would be less palatable to Apple. If Apple would prefer that course, however, that may provide an alternative that requires less labor by Apple programmers. As Fortune’s Philip-Elmer DeWitt rightfully pointed out, that’s a classic police threat. “We can do this [the] easy way or the hard way. Give us the little thing we’re asking for — a way to bypass your security software — or we’ll take [the] whole thing: your crown jewels and the royal seal too, ” DeWitt wrote. “With Apple’s source code, the FBI could, in theory, create its own version of iOS with the security features stripped out. Stamped with Apple’s electronic signature, the Bureau’s versions of iOS could pass for the real thing, ” he added. Read more of this story at Slashdot.

Read the article:
DOJ Threatens To Seize iOS Source Code

North Korea’s Operating System Analyzed

Bruce66423 points out an analysis at The Guardian of North Korea’s Red Star Linux-based OS, based on a presentation Sunday to the Chaos Communication Congress in Berlin : The features of their Fedora based OS include a watermarking system to enable tracking of files — even if unopened. The operating system is not just the pale copy of western ones that many have assumed, said Florian Grunow and Niklaus Schiess of the German IT security company ERNW, who downloaded the software from a website outside North Korea and explored the code in detail. … This latest version, written around 2013, is based on a version of Linux called Fedora and has eschewed the previous version’s Windows XP feel for Apple’s OS X – perhaps a nod to the country’s leader Kim Jong-un who, like his father, has been photographed near Macs. The OS, unsurprisingly, allowed only tightly fettered access to web sites, using a whitelist approach that gives access to government-controlled or approved sites. Read more of this story at Slashdot.

More:
North Korea’s Operating System Analyzed

Clinton Home Servers Had Ports Open

Jim Efaw writes: Hillary Clinton’s home servers had more than just the e-mail ports open directly to the Internet. The Associated Press discovered, by using scanning results from 2012 “widely available online”, that the clintonemail.com server also had the RDP port open; another machine on her network had the VNC port open, and another one had a web server open even though it didn’t appear to be configured for a real site. Clinton previously said that her server featured “numerous safeguards, ” but hasn’t explained what that means. Apparently, requiring a VPN wasn’t one of them. Read more of this story at Slashdot.

View the original here:
Clinton Home Servers Had Ports Open

Government Finds New Emails Clinton Did Not Hand Over

PolygamousRanchKid writes with this Reuters report that The U.S. Defense Department has found an email chain that Hillary Clinton failed to turn over to the State Department despite her saying she had provided all work emails from her time as Secretary of State.The correspondence with General David Petraeus, who was commander of U.S. Central Command at the time, started shortly before she entered office and continued during her first days as the top U.S. diplomat in January and February of 2009. News of the previously undisclosed email thread only adds to a steady stream of revelations about the emails in the past six months, which have forced Clinton to revise her account of the setup which she first gave in March. Nearly a third of all Democrats and 58 percent of all voters think Clinton is lying about her handling of her emails, according to a Fox News poll released this week. Clinton apologized this month for her email setup, saying it was unwise. But as recently as Sunday, she told CBS when asked about her emails that she provided ‘all of them.’ The emails with Petraeus also appear to contradict the claim by Clinton’s campaign that she used a private BlackBerry email account for her first two months at the department before setting up her clintonemail.com account in March 2009. This was the reason her campaign gave for not handing over any emails from those two months to the State Department. The Petraeus exchange shows she started using the clintonemail.com account by January 2009, according to the State Department. Read more of this story at Slashdot.

Originally posted here:
Government Finds New Emails Clinton Did Not Hand Over

Tracking a Bluetooth ATM Skimming Gang In Mexico

tsu doh nimh writes: Brian Krebs has an interesting and entertaining three-part series this week on how he spent his summer vacation: driving around the Cancun area looking for ATMs beaconing out Bluetooth signals indicating the machines are compromised by crooks. Turns out, he didn’t have to look for: His own hotel had a hacked machine. Krebs said he first learned about the scheme when an ATM industry insider reached out to say that some Eastern European guys had approached all of his ATM technicians offering bribes if the technicians allowed physical access to the machines. Once inside, the crooks installed two tiny Bluetooth radios — one for the card reader and one for the PIN pad. Krebs’s series concludes with a closer look at Intacash, a new ATM company whose machines now blanket Cancun and other tourist areas but which is suspected of being connected to the skimming activity. Read more of this story at Slashdot.

View the original here:
Tracking a Bluetooth ATM Skimming Gang In Mexico