Norwegian Investigators Bust Child Pornography Racket over Dark Web

January 3, 2017

A yearlong investigation has busted a huge child pornography racket and resulted in a seizure of 150 Terabytes of pornographic material. Out of 51 accused, 20 so far have been arrested.

New Nationalist in a news piece titled – 150 Terabytes! Norway Busts Largest Dark Web, Child Porn Networks in History — US, UK Media Ignore Story says:

It’s one of the largest child sex abuse cases in history. A year-long special investigation called “Operation Darkroom” resulted in the seizure of 150 terabytes of data material in the form of photos, movies and chat logs containing atrocities against children as young as infancy, Norwegian police announced at a news conference in late November.

The investigation has opened a Pandora’s box of pedophiles. The accused list mostly comprises of educated individuals like politicians, lawyers, teachers, and a police officer too. Most accused are yet to be apprehended by the investigators.

Despite the bust happening in November followed by a press conference, US and UK based media has turned a blind eye towards this happening. The news report further states:

The Library of Congress holds about 600 terabytes of Web data. Its online archive grows at a rate of about 5 terabytes per month. Also note the horrifically sadistic nature of the material seized. And note that police are investigating the reach as worldwide, which means it involves a massive scale of evil filth. But nobody in the criminally compliant mainstream media thinks its newsworthy.

It might be possible that the world media was busy with US Presidential elections, thus its reporting was very low key. An interesting take away from this entire sad episode – the Dark Web is not a hideout of hackers, terrorists, drug dealers, and hitmen – seemingly upright citizens lurk on Dark Web too.

Vishal Ingole, January 3, 2017

Legal Clarity Recommended for Understanding Cyberthreat Offense and Defense

January 2, 2017

Recently a conference took place about cybersecurity in the enterprise world. In the Computer World article, Offensive hackers should be part of enterprise DNA, the keynote speaker’s address is quoted heavily. CEO of Endgame Nate Fick addressed the audience, which apparently included many offensive hackers, by speaking about his experience in the private sector and in the military. His perspective is shared,

“We need discontinuity in the adoption cure,” Fick said, “but you can’t hack back. Hacking back is stupid, for many reasons not just that it is illegal.” He argued that while it is illegal, laws change. “Remember it used to be illegal to drink a beer in this country, and it was legal for a kid to work in a coal mine,” he said. Beyond the issue of legality, hacking back is, what Fick described as, climbing up the escalatory ladder, which you can’t do successfully unless you have the right tools. The tools and the power or ability to use them legally has historically been granted to the government.

Perhaps looking toward a day where hacking back will not be illegal, Fick explains an alternative course of action. He advocates for stronger defense and clear government policies around cybersecurity that declare what constitutes as a cyberthreat offense. The strategy being that further action on behalf of the attacked would count as defense. We will be keeping our eyes on how long hacking back remains illegal in some jurisdictions.

Megan Feil, January 2, 2017

Austrian Ministers Wants to Look into Your Private Communications

January 2, 2017

Under the garb of curbing terrorist activities, an Austrian minister has proposed setting up of federal Trojan or an agency that can read encrypted messages over WhatsApp and Facebook.

DeepDotWeb in an article titled Austrian Government Wants a Federal Trojan to Patrol the Dark Web says:

Austrian Interior Minister Wolfgang Sobotka (ÖVP) is preparing to implement a “federal trojan” to patrol the dark net. With this state spying software, Austrian law enforcement authorities hope they can prevent cybercriminal activity on the dark web.

The minister is demanding that government should possess a Trojan or technology that will allow it to read what messages exchanged by people over WhatsApp and Facebook messenger. This ze feels is necessary to foil terrorist attacks in Austria.

The entire argument hinges on:

Multiple researches have proven that the Islamic State uses social media platforms and encrypted messaging for recruiting potential terrorists and for other communications. The German government is also working on a similar device by the Central Agency for Information Technology in the security area (Zitis). Currently, about 400 IT professionals are on the project.

This is the second attempt by the Interior Minister to get a Bill passed that allowed federal agencies to snoop on private citizens. The minister wants unfettered access to messages and other data of citizens; terrorists or not.

If the Bill is passed, it will have serious implications on privacy of citizens. However, what would be more interesting is to see how companies like Facebook, Google and Apple respond to it.

Vishal Ingole January 2, 2017

Google May Erase Line Between History and Real Time

December 30, 2016

Do you remember where you were or what you searched the first time you used Google? This investors.com author does and shares the story about that, in addition to the story about what may be the last time he used Google. The article entitled Google Makes An ‘Historic’ Mistake reports on the demise of a search feature on mobile. Users may no longer search published dates in a custom range. It was accessed by clicking “Search tools” followed by “Any time”. The article provides Google’s explanation for the elimination of this feature,

On a product forum page where it made this announcement, Google says:

After much thought and consideration, Google has decided to retire the Search Custom Date Range Tool on mobile. Today we are starting to gradually unlaunch this feature for all users, as we believe we can create a better experience by focusing on more highly-utilized search features that work seamlessly across both mobile and desktop. Please note that this will still be available on desktop, and all other date restriction tools (e.g., “Past hour,” “Past 24 hours,” “Past week,” “Past month,” “Past year”) will remain on mobile.  

The author critiques Google, saying this move force users back to the dying desktop for this feature no longer prioritized on mobile. The point appears to be missed in this critique. The feature was not heavily utilized. With the influx of real-time data, who needs history — who needs time limits? Certainly not a Google mobile search user.

Megan Feil, December 30, 2016

Now Watson Wants to Be a Judge

December 27, 2016

IBM has deployed Watson in many fields, including the culinary arts, sports, and medicine.  The big data supercomputer can be used in any field or industry that creates a lot of data.  Watson, in turn, will digest the data, and depending on the algorithms spit out results.  Now IBM wants Watson to take on the daunting task of judging, says The Drum in “Can Watson Pick A Cannes Lion Winner?  IBM’s Cognitive System Tries Its Arm At Judging Awards.”

According to the article, judging is a cognitive process and requires special algorithms, not the mention the bias of certain judges.  In other words, it should be right up Watson’s alley (perhaps the results will be less subjective as well).  The Drum decided to put Watson to the ultimate creative test and fed Watson thousands of previous Cannes films.  Then Watson predicted who would win the Cannes Film Festival in the Outdoor category this year.

This could change the way contests are judged:

The Drum’s magazine editor Thomas O’Neill added: “This is an experiment that could massively disrupt the awards industry. We have the potential here of AI being able to identify an award winning ad from a loser before you’ve even bothered splashing out on the entry fee. We’re looking forward to seeing whether it proves as accurate in reality as it did in training.

I would really like to see this applied to the Academy Awards that are often criticized for their lack of diversity and consisting of older, white men.  It would be great to see if Watson would yield different results that what the Academy actually selects.

Whitney Grace, December 27, 2016

Shorter Content Means Death for Scientific Articles

December 26, 2016

The digital age is a culture that subsists on digesting quick bits of information before moving onto the next.  Scientific journals are hardly the herald of popular trends, but in order to maintain relevancy with audiences the journals are pushing for shorter articles.  The shorter articles, however, presents a problem for the authors says Ars Technica in the, “Scientific Publishers Are Killing Research Papers.”

Shorter articles are also pushed because scientific journals have limited pages to print.  The journals are also pressured to include results and conclusions over methods to keep the articles short.  The methods, in fact, are usually published in another publication labeled supplementary information:

Supplementary information doesn’t come in the print version of journals, so good luck understanding a paper if you like reading the hard copy. Neither is it attached to the paper if you download it for reading later—supplementary information is typically a separate download, sometimes much larger than the paper itself, and often paywalled. So if you want to download a study’s methods, you have to be on a campus with access to the journal, use your institutional proxy, or jump through whatever hoops are required.

The lack of methodical information can hurt researchers who rely on the extra facts to see if it is relevant to their own work.  The shortened articles also reference the supplementary materials and without them it can be hard to understand the published results.  The shorter scientific articles may be better for general interest, but if they lack significant information than how can general audiences understand them?

In short, the supplementary material should be included online and should be easily accessed.

Whitney Grace, December 26, 2016

Bank App Does Not Play Well with Tor Browser

December 22, 2016

Bank apps are a convenient way to access and keep track of your accounts.  They are mainly used on mobile devices and are advertised for the user on the go.  One UK bank app, however, refuses to play nice with devices that have the Tor browser, reports the Register in the article, “Tor Torpedoed!  Tesco Bank App Won’t Run With Privacy Tool Installed.”

Tesco is a popular bank present in supermarkets, but if you want to protect your online privacy by using the Tor browser on your mobile device the Tesco app will not work on said device.  Marcus Davage, the mainframe database administrator, alerted Tesco patrons that in order to use the Tesco app, they needed to delete the Tor browser.  Why is this happening?

The issue appears to be related to security. Tesco’s help site notes that the Android app checks for malware and other possible security risks (such as the phone being rooted) upon launching and, in this case, the Tor software triggers an alert.  The Tor Project makes two apps for Android, the aforementioned Orbot and the Orfox browser, both of which allow users to encrypt their data traffic using the Tor network. According to the Play Store, Orbot has been downloaded more than five million times by Android users.

App developers need to take into account that the Tor browser is not malware.  Many users are concerned with their online privacy and protecting their personal information, so Tor needs to be recognized as a safe application.

Whitney Grace, December 22, 2016

Healthcare Technology as a Target for Cyberthreats

December 20, 2016

Will the healthcare industry become the target of cyber threats? Security Affairs released a story, Data breaches in the healthcare sector are fueling the dark web, which explains medical records are among the most challenging data sources to secure. One hacker reportedly announced on the Dark Web he had over one million medical records for sale. The going rate is about $60 per record. According to the Brookings Institute, more than 155 medical records have been hacked since 2009. We learned, 

The healthcare sector is a labyrinth of governance and compliance with risk mitigations squarely focused on the privacy of patient data. We in the industry have accepted the norm that “security is not convenient” but for those in the healthcare industry, inconvenience can have a catastrophic impact on a hospital, including the loss of a patient’s life. Besides patient records, there’s a multitude of other services critical to patient health and wellbeing wrapped by an intricate web of cutting-edge and legacy technologies making it perhaps the most challenging environment to secure. This may explain the rise in attacks against healthcare providers in the last six months.

When it comes to prioritizing secure healthcare technology projects in healthcare organizations, many other more immediate and short-term projects are likely to take precedence. Besides that barrier, a shortage of healthcare technology talent poses another potential problem.

Megan Feil, December 20, 2016

In Pursuit of Better News Online

December 20, 2016

Since the death of what we used to call “newspapers,” Facebook and Twitter have been gradually encroaching on the news business. In fact, Facebook recently faced criticism for the ways it has managed its Trending news stories. Now, the two social media firms seem to be taking responsibility for their roles, having joined an alliance of organizations committed to more competent news delivery. The write-up, “Facebook, Twitter Join Coalition to Improve Online News” at Yahoo News informs us about the initiative:

First Draft News, which is backed by Google [specifically Google News Lab], announced Tuesday that some 20 news organizations will be part of its partner network to share information on best practices for journalism in the online age. Jenni Sargent, managing director of First Draft, said the partner network will help advance the organization’s goal of improving news online and on social networks.

Filtering out false information can be hard. Even if news organizations only share fact-checked and verified stories, everyone is a publisher and a potential source,’ she said in a blog post. ‘We are not going to solve these problems overnight, but we’re certainly not going to solve them as individual organizations.

Sargent said the coalition will develop training programs and ‘a collaborative verification platform,’ as well as a voluntary code of practice for online news.

We’re told First Draft has been pursuing several projects since it was launched last year, like working with YouTube to verify user-generated videos. The article shares their list of participants; it includes news organizations from the New York Times to BuzzFeed, as well as other interested parties, like Amnesty International and the International Fact-Checking Network. Will this coalition succeed in restoring the public’s trust in our news sources? We can hope.

Cynthia Murrell, December 20, 2016

Potential Tor Browser Vulnerability Reported

December 19, 2016

Over at Hacker Noon, blogger “movrcx” reveals a potential vulnerability chain that he says threatens the entire Tor Browser ecosystem in, “Tor Browser Exposed: Anti-Privacy Implantation at Mass Scale.” Movrcx says the potential avenue for a massive hack has existed for some time, but taking advantage of these vulnerabilities would require around $100,000. This could explain why movrcx’s predicted attack seems not to have taken place. Yet. The write-up summarizes the technique:

Anti-Privacy Implantation at Mass Scale: At a high-level the attack path can be described by the following:

*Attacker gains custody of an addons.mozilla.org TLS certificate (wildcard preferred)

*Attacker begins deployment of malicious exit nodes

*Attacker intercepts the NoScript extension update traffic for addons.mozilla.org

*Attacker returns a malicious update metadata file for NoScript to the requesting Tor Browser

*The malicious extension payload is downloaded and then silently installed without user interaction

*At this point remote code execution is gained

*The attacker may use an additional stage to further implant additional software on the machine or to cover any signs of exploitation

This attack can be demonstrated by using Burp Suite and a custom compiled version of the Tor Browser which includes a hardcoded root certificate authority for transparent man-in-the-middle attacks.

See the article for movrcx’s evidence, reasoning, and technical details. He emphasizes that he is revealing this information in the hope that measures will be taken to nullify the potential attack chain. Preferably before some state or criminal group decides to invest in leveraging it.

Cynthia Murrell, December 19, 2016

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta