Chinese hackers reportedly accessed U.S. weapons designs

More than two dozen advanced weapons systems were accessed, although documents obtained by The Washington Post do not indicate whether the breaches occurred on government or contractor networks. [Read more]        

Follow this link:
Chinese hackers reportedly accessed U.S. weapons designs

The New York Times has taken an interesting look at hacking culture in China—where it seems the prac

The New York Times has taken an interesting look at hacking culture in China —where it seems the practice is no longer an underground phenomenon, but a massive commercial enterprise. Read more…        

More:
The New York Times has taken an interesting look at hacking culture in China—where it seems the prac

Tesla Motors Repays $465M Government Loan 9 Years Early

Tesla Motors announced today it has completely repaid the $465 million loan from the U.S. Department of Energy the company received in 2010. The funds were generated by Tesla through a recent sale of their stock, worth close to a billion dollars. The stock price had risen sharply after the company reported its first profitable quarter (and the stock still sits roughly 50% higher than before their earnings release). Today’s payment of $451.8 million finished off both the loan’s principal and its interest, nine years before the final payment was due. Tesla CEO Elon Musk said, ‘I would like to thank the Department of Energy and the members of Congress and their staffs that worked hard to create the ATVM program, and particularly the American taxpayer from whom these funds originate. I hope we did you proud.’ Read more of this story at Slashdot.

More here:
Tesla Motors Repays $465M Government Loan 9 Years Early

NYPD Detective Accused of Hiring Email Hackers

An anonymous reader writes “Edwin Vargas, a detective with the New York City Police Department, was arrested on Tuesday for computer hacking crimes. According to the complaint unsealed in Manhattan federal court, between March 2011 and October 2012, Vargas, an NYPD detective assigned to a precinct in the Bronx, hired an e-mail hacking service to obtain log-in credentials, such as the password and username, for certain e-mail accounts. In total, he purchased access to at least 43 personal e-mail accounts belonging to 30 different individuals, including at least 19 who are affiliated with the NYPD.” Read more of this story at Slashdot.

Follow this link:
NYPD Detective Accused of Hiring Email Hackers

Power utilities claim ‘daily’ and ‘constant’ cyberattacks, says report

U.S. Congressmen Ed Markey and Henry Waxman pen a report outlining the increased hacks on power grid computer systems, saying that one utility receives about 10,000 attempted cyberattacks per month. [Read more]        

Link:
Power utilities claim ‘daily’ and ‘constant’ cyberattacks, says report

Yahoo! Japan May Have Had 22 Million User IDs Stolen

hypnosec writes with report of the possible theft of up to 22 million user IDs revealed by Yahoo! Japan. That scale is massive, but, he writes, “According to Yahoo, the information that was stolen didn’t have passwords or any other information that would allow unauthorized users to carry out user identity verification.” A story at the Japan Times adds a bit more detail. Read more of this story at Slashdot.

Read this article:
Yahoo! Japan May Have Had 22 Million User IDs Stolen

Fed. Appeals Court Says Police Need Warrant to Search Phone

An anonymous reader writes “In a decision that’s almost certainly going to result in this issue heading up to the Supreme Court, the Federal 1st Circuit Court of Appeals [Friday] ruled that police can’t search your phone when they arrest you without a warrant. That’s contrary to most courts’ previous findings in these kinds of cases where judges have allowed warrantless searches through cell phones.” (But in line with the recently mentioned decision in Florida, and seemingly with common sense.) Read more of this story at Slashdot.

More:
Fed. Appeals Court Says Police Need Warrant to Search Phone

Computer scientists to FBI: don’t require all our devices to have backdoors for spies

In an urgent, important blog post, computer scientist and security expert Ed Felten lays out the case against rules requiring manufacturers to put wiretapping backdoors in their communications tools. Since the early 1990s, manufacturers of telephone switching equipment have had to follow a US law called CALEA that says that phone switches have to have a deliberate back-door that cops can use to secretly listen in on phone calls without having to physically attach anything to them. This has already been a huge security problem — through much of the 1990s, AT&T’s CALEA controls went through a Solaris machine that was thoroughly compromised by hackers, meaning that criminals could listen in on any call; during the 2005/6 Olympic bid, spies used the CALEA backdoors on the Greek phone company’s switches to listen in on the highest levels of government. But now, thanks to the widespread adoption of cryptographically secured messaging services, law enforcement is finding that its CALEA backdoors are of declining utility — it doesn’t matter if you can intercept someone else’s phone calls or network traffic if the data you’re captured is unbreakably scrambled. In response, the FBI has floated the idea of “CALEA II”: a mandate to put wiretapping capabilities in computers, phones, and software. As Felten points out, this is a terrible idea. If your phone is designed to secretly record you or stream video, location data, and messages to an adverse party, and to stop you from discovering that it’s doing this, it puts you at huge risk when that facility is hijacked by criminals. It doesn’t matter if you trust the government not to abuse this power (though, for the record, I don’t — especially since anything mandated by the US government would also be present in devices used in China, Belarus and Iran) — deliberately weakening device security makes you vulnerable to everyone, including the worst criminals: Our report argues that mandating a virtual wiretap port in endpoint systems is harmful. The port makes it easier for attackers to capture the very same data that law enforcement wants. Intruders want to capture everything that happens on a compromised computer. They will be happy to see a built-in tool for capturing and extracting large amounts of audio, video, and text traffic. Better yet (for the intruder), the capability will be stealthy by design, making it difficult for the user to tell that anything is amiss. Beyond this, the mandate would make it harder for users to understand, monitor, and fix their own systems—which is bad for security. If a system’s design is too simple or its operation too transparent or too easy to monitor, then wiretaps will be evident. So a wiretappability mandate will push providers toward complex, obfuscated designs that are harder to secure and raise the total cost of building and operating the system. Finally, our report argues that it will not be possible to block non-compliant implementations. Many of today’s communication tools are open source, and there is no way to hide a capability within an open source code base, nor to prevent people from simply removing or disabling an undesired feature. Even closed source systems are routinely modified by users—as with jailbreaking of phones—and users will find ways to disable features they don’t want. Criminals will want to disable these features. Ordinary users will also want to disable them, to mitigate their security risks. Felten’s remarks summarize a report [PDF] signed by 20 distinguished computer scientists criticizing the FBI’s proposal. It’s an important read — maybe the most important thing you’ll read all month. If you can’t trust your devices, you face enormous danger. CALEA II: Risks of wiretap modifications to endpoints        

Read more here:
Computer scientists to FBI: don’t require all our devices to have backdoors for spies