Posts Tagged With: hackers

Hillary Clinton’s worst nightmare: Hint — it’s not Bernie Sanders…


By Judge Andrew P. Napolitano…

Hillary Clinton’s nightmare is not the sudden resurgence of Bernie Sanders. It is the fidelity to the rule of law of the FBI.

The recent revelations of the receipt by Clinton of a Special Access Program email, as well as cut and pasted summaries of state secrets on her server and on her BlackBerry nearly guarantee that the FBI will recommend that the Department of Justice convene a grand jury and seek her indictment for espionage. Here is the backstory.

It seems that every week, more information comes to light about Clinton’s grave legal woes. Her worries are in two broad categories: One is her well-documented failure to safeguard state secrets and the other is her probable use of her position as secretary of state to advance financially her husband’s charitable foundation. The FBI is currently and aggressively investigating both. What I will describe below is in the state secrets category. It is apparently not new to the FBI, but it is new to the public.

Among the data that the FBI either found on the Clinton server or acquired from the State Department via its responses to Freedom of Information Act requests is a top-secret email that has been denominated Special Access Program. Top secret is the highest category of state secrets (the other categories are confidential and secret), and of the sub-parts of top secret, SAP is the most sensitive.

SAP is clothed in such secrecy that it cannot be received or opened accidentally. Clinton — who ensured all of her governmental emails came to her through her husband’s server, a nonsecure nongovernmental venue — could only have received or viewed it from that server after inputting certain codes. Those codes change at unscheduled times, such that she would need to inquire of them before inputting them.

The presence of the SAP-denominated email on her husband’s server, whether opened or not, shows a criminal indifference to her lawful obligation to maintain safely all state secrets entrusted to her care. Yet, Clinton has suggested that she is hopelessly digitally inept and may not have known what she was doing. This constitutes an attempted plausible deniability to the charge of failing to safeguard state secrets.

But in this sensitive area of the law, plausible deniability is not an available defense; no judge would permit the assertion of it in legal filings or in a courtroom, and no lawyer would permit a client to make the assertion.

This is so for two reasons. First, failure to safeguard state secrets is a crime for which the government need not prove intent. The failure can be done negligently. Thus, plausible deniability is actually an admission of negligence and, hence in this case, an admission of guilt, not a denial.

Second, Clinton signed an oath under penalty of perjury on Jan. 22, 2009, her first full day as secretary of state. In that oath, she acknowledged that she had received a full FBI briefing on the lawfully required care and keeping of state secrets. Her briefing and her oath specified that the obligation to safeguard state secrets is absolute — it cannot be avoided or evaded by forgetfulness or any other form of negligence, and that negligence can bring prosecution.

What type of data is typically protected by the SAP denomination? The most sensitive under the sun — such as the names of moles (spies working for more than one government) and their American handlers, the existence of black ops (illegal programs that the U.S. government carries out, of which it will deny knowledge if exposed), codes needed to access state secrets and ongoing intelligence gathering projects.

The crime here occurs when SAPs are exposed by residing in a nonsecure venue; it does not matter for prosecution purposes whether they fell into the wrong hands.

Clinton’s persistent mocking of the seriousness of all this is the moral equivalent of taunting alligators before crossing a stream. SAPs are so sensitive that most of the FBI agents who are investigating Clinton lack the security clearances needed to view the SAP found among her emails. Most FBI agents have never seen a SAP.

Shortly after the presence of the SAP-denominated email was made known, the State Department released another email Clinton failed to erase wherein she instructed her subordinates to take state secrets from a secure venue, to cut and paste and summarize them, and send them to her on her nonsecure venue. Such an endeavor, if carried out, is a felony — masking and then not safeguarding state secrets. Such a command to subordinates can only come from a criminal mind.

Equally as telling is a little-known 2013 speech that recently surfaced given by one of Clinton’s former subordinates. The aide revealed that Clinton and her staff regularly engaged in digital conversations about state secrets on their BlackBerries. This is not criminal if the BlackBerries were government-issued and secured. Clinton’s was neither. It was purchased at her instructions off the shelf by one of her staff.

Can anyone doubt that Clinton has failed to safeguard state secrets? If her name were Hillary Rodham instead of Hillary Rodham Clinton, she’d have been indicted months ago.

What remains of the rule of law in America? The FBI will soon tell us.

Categories: Congress, Constitution, Democrats, Government Secrets, Obama, Politics, Strange News, Uncategorized | Tags: , , , , , , , , , , | Leave a comment

Target data hack only the beginning of massive, sophisticated attack…..


The Target data breach may be just the tip of the iceberg in what seems to be a massive sophisticated attack on U.S. retailers that may have possibly originated in Russia, according to newly discovered evidence. The Wall Street Journal reports that federal and private investigators who are looking into the matter have discovered that parts of the malware used to hit Target has been available on the black market since last spring, and was written in Russian, leading them to believe the attack may have ties to organized crime in the former Soviet Union.

The investigators have also revealed that any known antivirus software couldn’t detect the malware used, with hackers having also added in features that covered the fact that they were actually copying data from the credit and debit cards swiped in point-of-sale (POS) machines. Interestingly, the malware was programmed to steal data during prime business hours (i.e from 10:00 a.m. to 5:00 p.m. local time) and store it on an internalTarget server that was also controlled by the hackers.

“What’s really unique about this one is it’s the first time we’ve seen the attack method at this scale,” iSight Partners senior vice president Tiffany Jones said. “It conceals all the data transfers. It makes it really hard to detect in the first place.”

Some of these newly revealed details confirm what a recent Krebs on Security report said, although we’re now getting a better idea of the scope of the Target attack. Neither Krebs on Security, nor the investigators cited by the Journal have revealed how the malware was actually injected into Target’s POS machines.

iSight on Thursday issued its own report on the KAPTOXA (name of program written in Russian) POS malicious software it discovered, acknowledging the fact that it’s investigating the matter with the U.S. Secret Service. The security company warns retailers that the malware “has potentially infected a large number of retail information systems,” and they should contact the Secret Service and the company in case they believe they were infected. The security firm also advises consumers to keep an eye for fraudulent bank transactions and to avoid opening any emails or links that may have been sent by their banks or financial institutions, and instead contact those institutions via telephone or website.

Finally, Reuters on Friday exclusively reported that six ongoing attacks similar to the one suffered by Target have discovered by security firm IntelCrawler, although actual names of the companies involved were not revealed at the time this article was written.

Categories: Identity Theft Protection, Strange News, Uncategorized | Tags: , , , , , , , , , | Leave a comment

Skype targeted by ‘worm’ malware infecting Windows PCs……


 

Skype, the internet communications platform, is being used by hackers to distribute a “worm” that infects Windows PCs.

When users click on an instant message saying “lol is this your new profile pic?” they unwittingly download a file containing a Trojan horse malware file.

This opens a backdoor allowing hackers to hijack infected PCs and recruit them into a “botnet army”.

Users can be locked out of their machines and held to ransom.

According to internet security specialist Sophos, the worm is a variant of the well-known “Dorkbot” worm which has been spread by social media platforms such as Facebook and Twitter.

When the worm infects a computer it sends out the “lol” message to the user’s contact list.

Unsuspecting recipients think the message has originated from someone they know and click on the link, thereby downloading the malware payload.

When users click on an instant message saying “lol is this your new profile pic?” they unwittingly download a file containing a Trojan horse malware file.

This opens a backdoor allowing hackers to hijack infected PCs and recruit them into a “botnet army”.

Users can be locked out of their machines and held to ransom.

According to internet security specialist Sophos, the worm is a variant of the well-known “Dorkbot” worm which has been spread by social media platforms such as Facebook and Twitter.

When the worm infects a computer it sends out the “lol” message to the user’s contact list.

Unsuspecting recipients think the message has originated from someone they know and click on the link, thereby downloading the malware payload.

Hijacked computers

Skype said in a statement: “Skype takes the user experience very seriously, particularly when it comes to security. We are aware of this malicious activity and are working quickly to mitigate its impact.

“We strongly recommend upgrading to the newest Skype version and applying updated security features on your computer.

“Additionally, following links – even when from your contacts – that look strange or are unexpected is not advisable.”

Botnets are often used to mount distributed denial of service (DDoS) attacks – forcing websites offline – to run spyware or to send out spam emails.

Publicity about the threat has made many users wary of clicking on strange-looking links posted via social networks, which may have prompted the perpetrators of this latest attack to switch tactics.

“The danger is, of course, that Skype users may be less in the habit of being suspicious about links sent to them than, say, Facebook users,” said Sophos’s senior technology consultant Graham Cluley.

Categories: Strange News | Tags: , , , , , , , , | Leave a comment

WARNING..INTERNET EXPLORER USERS….SECURITY PROBLEM


BOSTON (Reuters) – Microsoft Corp urged Windows users on Monday to install a free piece of security software to protect PCs from a newly discovered bug in the Internet Explorer browser.
The security flaw, which researchers say could allow hackers to take remote control of an infected PC, affects Internet Explorer browsers used by hundreds of millions of consumers and workers. Microsoft said it will advise customers on its website to install the security software as an interim measure, buying it time to fix the bug and release a new, more secure version of Internet Explorer.
The free security tool, which is known as the Enhanced Mitigation Experience Toolkit, or EMET, is available on Microsoft’s website: http://bit.ly/Kv497S
Eric Romang, a researcher in Luxembourg, discovered the flaw in Internet Explorer on Friday, when his PC was infected by a piece of malicious software known as Poison Ivy that hackers use to steal data or take remote control of PCs.

Categories: Uncategorized | Tags: , , , , , , | Leave a comment

Blog at WordPress.com.

mayanexplore.com

Riviera Maya Travel Guide

Cajun Food, Louisiana History, and a Little Lagniappe

Preservation of traditional River Road cuisine, Louisiana history & architecture, and the communities between Baton Rouge & NOLA

Jali Wanders

Wondering and Wandering

Southpaw Tracks

“If ever a time should come, when vain and aspiring men shall possess the highest seats in Government, our country will stand in need of its experienced patriots to prevent its ruin.” ~Samuel Adams

Pacific Paratrooper

This WordPress.com site is Pacific War era information

what's the formula?

Nurturing awesomeness: from the parents of celebrities, heroes, trailblazers and leaders

Tarheel Red

A Voice of Conservatism Living in Carolina Blue

cancer killing recipe

Just another WordPress.com site

dreamshadow59

A great WordPress.com site

Mike's Look at Life

Photography, memoirs, random thoughts.

Belle Grove Plantation Bed and Breakfast

Birthplace of James Madison and Southern Plantation

Letters for Michael

Lessons on being gay, of love, life and lots of it

Sunny Sleevez

Sun Protection & Green Info

Backcountry Tranquility

A journal about my travels and related experiences :)

LEANNE COLE

Art and Practice

Lukas Chodorowicz

Travel, culture and lifestyle experienced on my adventures around the world. All photos taken by me. Instagram: @colorspark

BunnyandPorkBelly

life is always sweeter and yummier through a lens. bunnyandporkbelly [at] gmail [dot] com

%d bloggers like this: