background preloader

Hackers & hacking

Facebook Twitter

Meet The Darpa-Backed Hackers Building A Google For Every Web Weakness. Meet Telecomix, The Hackers Bent On Exposing Those Who Censor And Surveil The Internet. HPVAC. Intelligence Gap: How a Chinese National Gained Access to Arizona’s Terror Center. Lizhong Fan’s desk was among a crowd of cubicles at the Arizona Counter Terrorism Information Center in Phoenix.

Intelligence Gap: How a Chinese National Gained Access to Arizona’s Terror Center

For five months in 2007, the Chinese national and computer programmer opened his laptop and enjoyed access to a wide range of sensitive information, including the Arizona driver’s license database, other law enforcement databases, and potentially a roster of intelligence analysts and investigators. The facility had been set up by state and local authorities in the aftermath of the 9/11 terror attacks, and so, out of concerns about security, Fan had been assigned a team of minders to watch him nearly every moment inside the center.

You Can Get Hacked Just By Watching This Cat Video on YouTube. You Can Get Hacked Just By Watching This Cat Video on YouTube. FBI’s Huge Hacker Bust Could Be Bogus. The story of the British intelligence agent who rigged an election, installed a king loyal to the British, drew new borders—and gave us today’s ungovernable country.

FBI’s Huge Hacker Bust Could Be Bogus

Hacktivists on Trial. Prosecutors are warping the law to throw activist hackers like Aaron Swartz behind bars for years.

Hacktivists on Trial

(AP Photo/File) How Antisec Died — Notes from a Strange World. First, an introduction: I write about hackers, and for the past few years that has meant I write about Anonymous.

How Antisec Died — Notes from a Strange World

At the time of the Stratfor hack I was working for Wired covering Anonymous — notably the antics of Antisec anons much of the time. I had missed the Lulzsec period, which I spent under federal investigation myself. Meet The Hackers Who Sell Spies The Tools To Crack Your PC (And Get Paid Six-Figure Fees) Shopping For Zero-Days: A Price List For Hackers' Secret Software Exploits. A Saudi Arabia Telecom's Surveillance Pitch. Last week I was contacted by an agent of Mobily, one of two telecoms operating in Saudi Arabia, about a surveillance project that they’re working on in that country.

A Saudi Arabia Telecom's Surveillance Pitch

Hack This Site! Hacking Secret Ciphers with Python. Aaron Swartz. Jeremy Hammond. Statement From @ItsKahuna. iPad Hack Statement Of Responsibility. Editor’s note: Andrew Auernheimer, also known by his pseudonym weev, is an American grey hat hacker and self-described Internet troll.

iPad Hack Statement Of Responsibility

Follow him on Twitter @rabite. Teenage Hacker "Cosmo the God" Sentenced by California Court. “Cosmo the God” in a park near his home in Long Beach, California.

Teenage Hacker "Cosmo the God" Sentenced by California Court

Photo: Sandra Garcia/Wired The 15-year-old UG Nazi hacker known as Cosmo* or Cosmo the God was sentenced in juvenile court on Wednesday in Long Beach, California. According to Cosmo, he pleaded guilty to multiple felonies in exchange for a probation, encompassing all the charges brought against him, which included charges based on credit card fraud, identity theft, bomb threats, and online impersonation. On eve of incarceration, Anonymous hacker clears the air. When 22-year-old John Anthony Borell, a.k.a.

On eve of incarceration, Anonymous hacker clears the air

ItsKahuna of now-defunct Anonymous offshoot CabinCr3w, stood trial for hacking police department websites across the country—and even after he was sentenced to pay restitution of $227,736 and serve three years in prison—he was none too forthcoming about his crimes or motivations. But yesterday, just weeks away from his Dec. 6 incarceration date, he posted an open letter in hopes of somewhat clearing the air. Borell still wasn’t interested in divulging his exact objectives in breaching municipal and law enforcement Web properties based out of Salt Lake City, Syracuse, St. Louis, and Los Angeles. He was, however, compelled to defend himself against rumors spread by his fellow hackers, many of whom believed that he worked with federal authorities to help bring down CabinCr3w member Higinio O.

"Privacy is becoming a forgotten thing of the past as mass surveillance has progressed as an everyday thing in the world. Unsafe at Any Bitrate News. MJM as Personified Evil Says Spyware Saves Lives Not Kills Them. In the secretive world of surveillance technology, he goes just by his initials: MJM.

MJM as Personified Evil Says Spyware Saves Lives Not Kills Them

His mystique is such that other security professionals avoid using wireless Internet near him. MJM himself suggests that those he meets allay their paranoia by taking batteries out of their mobile phones. Special Report: Unsafe at Any Bitrate. How Apple and Amazon Security Flaws Led to My Epic Hacking. In the space of one hour, my entire digital life was destroyed.

How Apple and Amazon Security Flaws Led to My Epic Hacking

Hackers claim 12 million Apple IDs from FBI. Hacker Family Tree Charts Hacker Group Origins And Relations. The hackers-and-activists Daily. Hackers Said to be Planning to Launch Own Satellites to Combat Censorship. Hackers reportedly plan to fight back against Internet censorship by putting their own communications satellites into orbit and developing a grid of ground stations to track and communicate with them. The news comes as the tech world is up in arms about proposed legislation that many feel would threaten online freedom. According to BBC News, the satellite plan was recently outlined at the Chaos Communication Congress in Berlin. Without Computer Security, Sources’ Secrets Aren’t Safe With Journalists. International hacktivists help Syrian citizens circumvent Internet censorship.

Human rights groups and the international community are calling for an arms embargo and an end to government repression in Syria, which has resulted in almost 2,000 deaths since March. Like in Egypt and Tunisia earlier this year, Syria has responded to the uprising not only with violence, but also by putting its citizens under surveillance and censoring the internet. What such regimes didn't count on was that international internet activists would step in and fight back. Since the Arab Spring began, hacktivists have been building ad hoc telecommunications systems all over the Middle East to help citizens get information on what's going on there out of these countries. When the government shut down the Internet, Telecomix helped Egyptians by getting them access to dial-up modems. Ghost in the Wires - By Kevin Mitnick - Book Review - NYTimes.com -

Meet Dark Tangent, the hacker behind Black Hat and DEF CON. Jeff Moss founded the hacker conferences Black Hat and DEF CON, which take place this week in Las Vegas. Jeff Moss, aka Dark Tangent, founded DEF CON and Black Hat Both conferences are for hackers and computer-security professionals Moss says hackers can help make the Internet and computers safer. U.S. government hankers for hackers. The NSA has its own team of elite hackers. NSA headquarters at Fort Meade, MD where TAO's main team reportedly works (Wikipedia) Our Post colleagues have had a busy day. First, they released documents revealing the U.S. intelligence budget from National Security Agency (NSA) leaker Edward Snowden.

DOJ Won't Ask Supreme Court to Review Hacking Case. U.S. Outgunned in Hacker War. Anonymous & LulzSec.