LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   General (https://www.linuxquestions.org/questions/general-10/)
-   -   Small Businesses Hacked (https://www.linuxquestions.org/questions/general-10/small-businesses-hacked-895536/)

frankbell 08-04-2011 08:48 AM

Small Businesses Hacked
 
Interesting little story at Bloomberg with all the ingredients: Worms, theft, wire transfers, insensitive banks, and mysterious international fraudsters.

http://www.bloomberg.com/news/2011-0...indemnify.html

Peufelon 08-04-2011 11:47 AM

A PR campaign by US secret police?
 
That is an interesting news story, and the authors make some valid points.

But I'd like to put it in perspective. I follow the comp-security/privacy news very closely, so I can often spot trends others might miss.

In recent weeks I've seen quite a few US-centric news stories thumping on these themes:
  • cyberinsecurities hurt everyone, including US small businesses
  • the US intelligence community should be given much greater freedom to snoop 24/7 on everyone's packets.
These stories rarely point out that the US secret police already operates at internet choke points inside the USA purpose-built (many GB/sec) deep packet inspection (DPI) boxes which tee selected traffic to spook servers; recently the executive openly gave them authority to do this, allegedly to monitor traffic in and out of US defense firms and other "critical industries" including telecoms, and for this stated purpose the "density" of DPI boxes has recently been greatly expanded. Allegedly:
  • all packets of all US persons can be inspected at the point where they enter the internet (server rooms of US ISPs),
  • all packets of interest to US spooks are allegedly teed to their own datacenters.
Those stories which do discuss this point make much of the legal distinction between "header" and "content" of packets. But very often the content is in the "header" (for example, look at the url of a typical internet search request), and in any case, recent directives appear to erase this distinction; allegedly, it is already common for US spooks to monitor the content of text messages and VOIP calls inside the US, for example.

What is behind the news stories harping on the common themes I listed above? Well, the US spooks are campaigning for public support for their request to the US Congress for the "legal authority" to DPI anyone's traffic without having to give anyone a reason for intercepting email/VOIP/financial-transactions (which is allegedly what they have been doing illegally for almost a decade).

One clue that the story you cited is part of their PR campaign is this excerpt:
Quote:

“I think they’re losing more now than to the James Gang and Bonnie and Clyde and the rest of the famous gangs combined,” said U.S. Senator Sheldon Whitehouse, a Rhode Island Democrat who chaired a Select Committee on Intelligence task force on U.S. cybersecurity in 2010.
I put "legal authority" in quotes because the authorities which the US executive branch has already granted the US secret police (mostly in secret directives) have mostly never been challenged in court, and many US legal scholars feel they are probably unconstitutional.

These issues affect persons living outside the US, because a large portion of the world's internet traffic passes at some point through the US, and the US spooks have long operated DPI boxes at the point where international traffic enters US controlled territory. Also, intelligence agencies in many other countries model their ambitions after those of the US spooks (but are generally even less able to actually pay for 24/7 universal population surveillance without creating huge budget deficits).

My feeling about US three letter agencies is they should be all one thing or all the other. In particular
  • NSA, CIA were founded as intelligence agencies; espionage is illegal in every country, so these agencies are law-breaking agencies,
  • FBI was founded as a law-enforcement agency.
15 years ago there was a high impenetrable wall between the law-breaking and law-enforcement three letter agencies, and for very good reasons. After 9/11 this wall was taken down and now DHS, CIA, NSA, FBI (and especially their private spyco partners) appear to all be deeply involved in lawbreaking. In my opinion, this cripples the moral authority of agencies such as FBI which still claim to also be in part law enforcement agencies.

Furthermore, while the DPI boxes are expensive, the real hidden cost in this vast-expansion-of-domestic-spookery initiative appears to be the cost of the datacenters needed to analyze the vast torrents of data the US spooks are slurping up. To sort through this data, the secret police have been quietly building several huge datacenters around the USA, each drawing as much power as a city the size of Baltimore, MD. In order to roboinspect (and optionally store for later retrieval and/or human inspection) absolutely every packet which enters the US internet anywhere anytime--- which is their ultimate goal--- they will need many more. The total cost of the existing internet snooping appears to be upwards of 100 billion annually and is said to be by far the largest component of the combined US intelligence budget of some 150 billion annually and growing fast (could be 300 billion annually by 2015).

The stories in this campaign never mention the cost, because in the current climate of fiscal austerity it obviously simply does not make sense to further expand the already huge US intelligence budget. And these datacenters also contribute to global warming, which is another reason why in my opinion, US lawmakers should be asking some very tough questions about whether the US should really be in the business of spying 24/7 on absolutely everything anyone does on-line, especially because it is far from clear that this would even be effective in actually combatting cybercrime. Indeed, I think it is quite clear that the real purpose of 24/7 universal population surveillance has nothing to do protecting small businesses from international cybercrime, but has everything to do with monitoring thought crime. The US executive is deeply worried that as the US continues to decline and its economy worsens, the US may experience political turmoil similar to that recently seen in countries like Egypt and Syria.

It is also relevant that US/UK based companies which make these specialized multi GB/sec DPI boxes have also been selling them for years to the secret police of countries like Egypt, Syria, Libya... Exact same equipment designed for 24/7 universal surveillance, for exactly the same purpose: oppression.

In my view, if you really want to combat cybercrime, it would be more effective to increase computer security, and I suspect that the most cost effective way to do that is to start fining major US software vendors for security blunders which cost more than a certain threshold. Then and only then will they finally start building in security from the start of each software project.

Also, in my view, a major part of the problem for US small businesses is that they have no friends in the struggle against cybercrime, because the US FBI and its partners appear to have morphed into law-breaking agencies, which means they cannot be trusted. Also, they appear to have adopted the maxim that everyone is a suspect all the time, which is typical of counter-intelligence agencies but in my view is utterly inappropriate for a law enforcement agency. It follows, I think, that if you believe, as I do, in the rule of law, and the principle that all persons should be equal before the law, then we cannot cooperate with lawbreaking agencies.

Another major issue which the stories in this PR campaign never mention is that all this domestic spookery requires not only a vast data processing capability but also a vast army of human "criminal intelligence analysts", numbering in the millions, each granted (it is said) full access to the geolocation, phone records, utility records, property records, credit records, banking records, local/interstate/international travel records, search records, voice mail, email, social media user accounts, religious affiliations, and medical records of anyone they suspect for any reason. And when it was revealed that the FBI was failing to properly enforce what little oversight mechanisms it had created to try to ensure that this army of spooks does not abuse their power, the response of the FBI was to eliminate any attempt at oversight.

And its even worse that that: a large portion of this army of domestic cyberspooks consists of contract employees working for private spycos hired to provide "CIAs" to state and local fusion centers inside the US. Indeed, the FBI appears to have outsourced to private companies many of its most objectionable domestic espionage activities, paying them large sums in return for having them assume the legal liabilities if they are caught and brought to justice. Where might this all lead? I point to the examples of countries such as Russia and China, where there is endemic corruption in the government and, it is said, extensive cooperation between organized crime and intelligence operations. At the very least, the governments of these countries appear to often turn a blind eye to spamming and cybercrime operations targeting citizens of their rivals on the international stage.

I would have to recommend to small business people that they not even report problems to US CERT, FBI, etc., but instead adopt open source software and come to forums like this for security advice, as a stop-gap measure until better measures are available. Because to reform the FBI, Americans will need to boycott the FBI.

And if you want to prevent political turmoil inside the US, the best way to do that is to provide good government at a cost the US can afford. Further vast expansions in the US secret police budget runs contrary to such a common sense strategy.

I cannot claim that there any easy solutions to the problem of cybercrime. Only the US spooks do that, when they imply (without presenting any real evidence) that if they are only given the legal authority and equipment they need to spy 24/7 on absolutely everything everyone does on-line, without any need to seek any warrants and without any oversight (which would add still more to the cyber-budget), they can eradicate cybercrime, terrorism, radicalism, nonconformism, atheism...

H_TeXMeX_H 08-04-2011 01:40 PM

Today security = surveillance. This was not the case some time ago tho. Don't worry tho, there's nothing you can do, just accept your doom.

Peufelon 08-04-2011 01:59 PM

How to verify my claims
 
Thanks for reading my little essay!

Quote:

Originally Posted by H_TeXMeX_H (Post 4433838)
there's nothing you can do

Can't agree with that. In fact there is a great deal Americans can do, such as
  • keeping abreast of the computer-security/privacy/human-rights news, including international news because these issues are global issues,
  • monitoring their own PC/laptop for the signs of intrusion/monitoring by intelligence agencies foreign and domestic,
  • joining organizations like the ACLU, EFF, EPIC, CDT,
  • boycotting the FBI, until meaningful reforms are implemented (above all, returning to the quaint notion that a law-enforcement agency can have no truck with severe and sustained violations of the law),
  • telling their congresspeople that
    • the US shouldn't be turned into an even more repressive police state comparable to Iran, Syria, Muburak-era Egypt... or even China, Russia...
    • it can't even afford even current levels of domestic espionage,
    • it can't provide the neccessary oversight of the millions already hired by the Surveillance State, much less new legions of domestic spooks,
    • it shouldn't be funding "surveillance and disruption" of domestic civil-rights organizations like the ACLU,
    • it shouldn't be targeting its own citizens with disinformation/astroturfing campaigns in English language forums,
    • US/UK based companies shouldn't be selling DPI boxes to the secret police of countries like Libya, Syria, China,
    • US police agencies shouldn't be using spy drones (full/micro/nano-sized versions) to maintain warrantless surveillance of US persons, particularly since few if any victims are suspected of any actual wrongdoing,
    • US police/intell agencies shouldn't have warrantless access to geolocation, travel records, banking records, medical records, and all that, of US persons, and shouldn't be allowed to listen in on emails and phone calls without first obtaining a non-FISA warrant,
    • they want agencies like the FBI to be purely law-enforcement agencies,
    • they want the FBI and DHS to get the heck out of the law-breaking business,
    • in particular, they want an end to CIPAV-style trojaning/keystroke-logging of the computers of US persons; there is nothing a law-enforcement agency can learn this way which they cannot learn better by obtaining a search warrant and seizing the allegedly "offending" computer, and which is the investigative modus operandi stipulated in a little known document called the US Constitution,
    • they want an end to this nonsense about developing offensive cyberwar capabilities (first they went after Iran, next they went after you and I),
    • they want to end the outsourcing of illegal activities by agencies like the FBI to murky private spycos subject to even less oversight than their overlords,
    • they don't want their phone company, ISP, etc. enlisted into the Surveillance State,
    • they demand well-supported answers to hard questions about the effectiveness of (mostly) illegal domestic espionage from 2001-2011 (which I think will prove that further increasing these civil-rights abuses would be not only anti-American but also ineffective),
    • they want enforcement of the anti-trust legislation already on the books, and in particular they want the media conglomerates broken up in the interest of fostering genuine muckraking journalism as a counter to governmental/corporate corruption and abuses.

I feel that I can support all the claims I have made in this thread, but providing links would be a lot of work and in the past, my lists of links have been summarily deleted. But here are a few to get you started, if you are interested in trying to see whether or not my claims are accurate and documented by documents obtained under US FOIA and from leaks of documents which have been admitted to be genuine:
Call me a meddler, but IMO, in their own best interests, Americans should strenuously resist every attempt of the US secret police to make the US look even less like the nation envisioned in the US Constitution and even more like these countries:Next, you can research for yourself where these countries' secret police obtain their DPI boxes, spydrones, poison gas, and other surveillance/opression technology. You can start here:
http://www.opennet.net/west-censorin...sors-2010-2011
Now look to see which companies make DPI boxes and where they maintain overseas offices. Don't take my word for it, see for yourself!

Some other countries where privacy, civil-rights, and ultimately democracy itself are under assault:To state the obvious: yes, of course I know that abuses in the CANZUS nations (US, UK, Canada, Australia, New Zealand) and France are not yet as severe as in China or Russia, much less the other countries named above. My point is: citizens who live in the first group of nations need to remain vigilant and to vigorously oppose measures which would make these countries more closely resemble nations in the second and third groups.

Quote:

Originally Posted by H_TeXMeX_H (Post 4433838)
just accept your doom.

IMO, Americans who simply give in to the Surveillance State without a struggle are helping to ensure that the streets of the US will someday see scenes like those currently being enacted in Hama and Homs. Is that what you want? I hope not!

So I hope you will reconsider your defeatist attitude and consider joining an organization such as the ACLU.

frankbell 08-04-2011 09:00 PM

I know one blogger who follows the cyberwar hype from a standpoint of pointing out the hype. (I know there are others, but this is one I stumbled on), George Smith of the Dick Destiny Blog.

http://dickdestiny.com/blog1/

I have to be all blame-the-victim, but I think a lot of folks who use computers fail to educate themselves on even the basics of security.

Also, I think the news media make themselves easy pickings for the hype, because by-and-large they don't have a clue about networks and how they work.

I second the ACLU. For all they sometimes defend lousy people, they consistently defend good principles and good law.

H_TeXMeX_H 08-05-2011 03:25 AM

When I have a paying job, I will donate to those organizations in the hope that they will help slow the inevitable. I do not believe, however, that they can stop the inevitable. I'm quite sure they've been planning this for some time, and it's not just in the US, it is global. Just look around and see that the same measures are being applied globally, and the same words and notions are used. This is the work of an organization with god-like powers, I very much doubt they can be defeated. This is the dawn of the NWO.

Peufelon 08-05-2011 10:14 AM

The US Surveillance State will defeat itself, but better to dismantle before that happens
 
@ frankbell:

I also (sometimes) read Dick Destiny Blog!

Bruce Schneier has also often debunked cyberwar hype in his various writings, including I think his own blog.

Quote:

I think a lot of folks who use computers fail to educate themselves on even the basics of security.
Agreed, with two reservations:
  • I hear that currently many universities offer far greater opportunity for their students to learn a bit (or even more than a bit) about computer/network security, but for those who are trying to play catch-up by self-education, I think that learning about vulnerabilities and how to fix them can be a very considerable challenge--- one which is probably insurmountable by those with limited time or ability,
  • broadly defining "sysadmin" as anyone responsible for securing any computer (so the owner of a home PC would be the "sysadmin" for that PC), I tend to feel that individual "sysadmins" are blameworthy to the extent that they leave open security flaws which they have the knowledge, background, and ability to fix. So by that standard the typical small businessperson, who is not a "security expert", lacks the time to try to become one, and who probably doesn't have sufficient financial backing to hire one, shouldn't be held responsible for vulnerabilities they cannot reasonably be expected to fix.

I find that when discussing computer security/privacy issues, it is difficult to maintain the appearance of self-consistency without going on and on about fine distinctions, because these issues are so complicated, in part because the underlying technological issues are often both unfamiliar and complex. So in the interests of brevity I will not attempt to explain why I don't think it is really inconsistent for me to say:
  • some of the most vigorous proponents of cyberwarfare
    Code:

    echo 'I mention no names' | sed 's/I men/Rich/' | sed 's/tion/ard/' | sed 's/nam/Clar/' | sed 's/es/ke/' | sed 's/no//'
    certainly appear (to me) to be positioning themselves to make billions if they can persuade already cash-strapped governments to ramp up even further their "offensive" and defensive efforts in this area,
  • anyone can become a victim of state-sponsored "cracking"/cyberwarfare; my own experience suggests that in 2011 it is quite possible for an ordinary citizen to be targeted by intelligence agencies (foreign or domestic); to mention just one example: according to Google and other sources familiar with the Aurora attacks, the malefactors targeted not only huge "Western" defence firms but also persons whom certain arms of the Chinese government apparently believed to be Chinese dissidents living abroad, or non-Chinese citizens assisting Chinese dissidents. My own experience suggests that posting links to HRW and RSF is like waving a red flag in front of the secret police of the countries named above as chronic abusers of human rights.

Quote:

they consistently defend good principles and good law.
Yes, people who dismiss the ACLU on the basis of nonsense they have heard should look into what they actually do. Everyone, even and perhaps especially non-Americans, should support their work. For example: the ACLU has consistently fought in the courts against a wide range of clearly unconstitutional "directives" by the US executive which flagrantly violate the human rights of non-US citizens.

@ H_TeXMeX_H:

Quote:

I'm quite sure they've been planning this for some time, and it's not just in the US, it is global. Just look around and see that the same measures are being applied globally, and the same words and notions are used. This is the work of an organization with god-like powers, I very much doubt they can be defeated.
"They"? Are we still talking about the same thing? If you are trying to make a serious argument, you'll need to elaborate it before I can understand the point you are trying to make.

Let me reiterate two points:
  • Not only do I believe that the US Surveillance State can be defeated, by political means which are standard in the US, I don't see how proposed vast expansions in the US version can be sustainable, because no government, certainly not the US government, can possibly afford it. So if they go down that road they'll just bankrupt the US government, as per the Soviet example. IOW, I believe that the US Surveillance State will defeat itself if the US Congress don't step in to dismantle it before it (plus a few endless and unwinnable wars) bankrupts the nation.
  • I think we all agree that coverups are standard operating procedure in the US and many other countries. But if anyone seriously thinks that US government coverups are impenetrable, I would suggest that history suggests quite the opposite! With a little effort and moral courage, abuses by the US government are often easy to expose, especially if the U.S. Congress holds televised hearings, as happened with the Watergate scandal, the Iran-contra scandal... If the US citizenry supports calls for such hearings, the US version of the Surveillance State will be dismantled. That would be a good thing for the US and for the world.

H_TeXMeX_H 08-05-2011 11:13 AM

I mostly agree, but I don't think you're seeing the bigger picture. The s*** is gonna hit the fan soon, so maybe then you will see. I'm sure we can agree that the future includes: extreme poverty, oppression, surveillance, human rights abuse, war, and basically a new dark age. I saw it coming several years ago, and it is getting close.

Peufelon 08-05-2011 06:20 PM

Quote:

I don't think you're seeing the bigger picture
I am certainly not seeing your point!

frankbell 08-05-2011 07:23 PM

You said so much that I will not try to respond to it all.

I didn't mean to imply that a home "sysadmin" needs to understand the finer points of security. I was thinking more in terms of "don't do stupid stuff," such as click on one of those links that tells you are infected and have to install some kind of ransomware (it's run watching them pretend to scan a Linux box and tell you that C:\ is infected), don't go on the internet without a well-reputed anti-virus and firewall, investigate error messages before you panic, and don't believe emails that tell you to log click the link to log into your bank account to validate your information. That is hardly rocket-science.

I will hold up my girlfriend as an example, because she's a fairly typical user. She surfs the web a little, plays some online games (being female, most word games), emails, and does work. She's atypical I guess to this extent--although she has a Facebook account, she seldom uses it and, when she does, it's mostly for chats with her sister in Hungary (she's a Hungarian who's father brought her out after the 1956 Revolution)--no Farmville.

I periodically scan her computer with Adaware and Spybot; they have not yet turned up anything. AVG never finds anything.

Why? Because she thinks before she clicks.

Peufelon 08-07-2011 10:32 AM

Insecure behavior by persons who clearly know better
 
Quote:

That is hardly rocket-science.
True, and I hope they are teaching all this stuff in schools everywhere.

I don't think we really disagree on anything, just are shifting the emphasis. Of course I agree that not clicking on probable phishing links, etc., is common sense, but would point out that variation within any human population larger than say 20 is much larger than variation between any populations. Some people are by no means dull but are very trusting by nature, and developmentally disabled adults use computers too. And I am sure we have all encountered organizations where well-educated users are officially advised to do something extremely stupid, by sysadmins who are, I guess, over their head. So:
  • I tend to feel that most individual users are mostly already doing about as much as can reasonably be expected of that person.
  • computers are so complicated that no single sysadmin can be reasonably expected to secure very much these days, I think, and the demand so far outstrips the talent pool that IMO it is unreasonable to expect miracles from sysadmins either. (Education can't help, since one needs the kind of intelligence and talent which only occurs in a small percentage of the human population. Growing the human population could help, but that is infeasible for other reasons.)

So who can we blame? Well, I'm biased, but I'll name those short-sighted executives who wouldn't listen, who refused a decade ago to build security in from the ground floor. We took a system whose idea of security derived from the MIT computing lab and very quickly grew that into a system with three billion users, without fundamentally changing the security model. The result, predictably enough: chaos.

Actually, there is an example of knowledgeable users being officially advised to do something really stupid, and doing it, right in front of us right here in this forum. When any of us surf here, we encounter a pane in the upper right corner which invites us to log in. We all know that username and password are transmitted in the clear, and that this is very easy to sniff by anyone who has a packet sniffer installed in any of dozens of places where they can access the right packet as it passes by. So logging into this forum violates every notion of secure user behavior, yet we all do it, and very few of us even protest that this forum should use encryption to secure logins. Even better, secure all web transactions: https://www.httpsnow.org/. (OK, "secure" in scare quotes, because we all know that SSL is broken. But it would be better than what we have now, which is no security at all.)

Many of us also share personal information in unencrypted posts or profile pages, which can be hazardous. particularly for sysadmins and persons expressing views which some governments might wish to repress. See
So maybe we should also blame social media magnates, and even ourselves (as knowlegeable users who accept insecure logins).

EDIT: oh, fiddlesticks! I was one of the LQ users who complained, and I just learned by accident that LQ did implement SSL here: try
Code:

https://www.linuxquestions.org/questions/login.php
Someone might have told me! Well, thanks, LQ, better late than never.

Quote:

as an example
Giving up any personal information for CANZUS persons (residents of US, UK, Canada, Australia, New Zealand) is profoundly unsafe in a world in which social media profiles, credit records, calling circle, utility records, ISP account information, family history, property records, voting records, banking records, travel records (municipal, national, international), medical records, emails, voice mail records, content of VOIP calls, search terms, websurfing logs, etc., are readily available without a search warrant to millions of poorly vetted and largely unsupervised "authorized persons", not to mention PIs and hacktivist groups who can probably also gain access to all of that (bearing in mind that small US local police departments are probably not well secured against unauthorized intrusion into "secure" LE databases via their departmental computers). See
P.S.: my attempt to post this encountered what may have been a hijack attempt.

EDIT: that probably would not have happened had I known that LQ apparently does now support https. Has anyone tested this to make sure it is working properly?

cascade9 08-07-2011 01:40 PM

I dont hink its just about money myself. Politicians and the #$^#$ scum who pay them (opps, 'donate') see the internet as a way of getting a level of surveillance on the general population that even the old DDR (east german) government could only dream of, at a fraction of the cost.

Quote:

Originally Posted by Peufelon (Post 4433851)
Some other countries where privacy, civil-rights, and ultimately democracy itself are under assault:[list][*] Australia: http://www.hrw.org/asia/australia, http://en.rsf.org/surveillance-australia,39749.html

The internet filter is just the most internationally visible bit as far as australia goes.

If you care anything about australian politics, a good place to see a different 'prong' of this attack is ""Australians for Honest Politics Trust"

To cut a long story short, one the pollies (who is now "leader of the opposition") from the 2 main political parties created a slush fund for attacking a fairly new party, "One Nation". I persoanlly cant stand One Nation, they are mostly a bunch of right wing racists, but the way the attack happened was VERY dirty.

Some links here-

http://www.smh.com.au/specials/abbottaffair/

Quote:

Originally Posted by H_TeXMeX_H (Post 4434324)
When I have a paying job, I will donate to those organizations in the hope that they will help slow the inevitable. I do not believe, however, that they can stop the inevitable. I'm quite sure they've been planning this for some time, and it's not just in the US, it is global. Just look around and see that the same measures are being applied globally, and the same words and notions are used. This is the work of an organization with god-like powers, I very much doubt they can be defeated. This is the dawn of the NWO.

NWO is soooo 1991-

http://www.youtube.com/watch?v=_CWBTL33MpA

I didnt have you pegged an a 'we cant do anything, just give up' emo H_TeXMeX_H.

If we allow this to happen, there is nobody to blame but ourselves. "Better die on your feet than to live on your knees".

Peufelon 08-07-2011 03:38 PM

Quote:

level of surveillance on the general population that even the old DDR (east german) government could only dream of
Exactly. Unfortunately, "Western" technology coupled with Stasi mentality has led to the situation we have today.

What does the future have in store for us? The US secret police are currently drooling in glee over the prospect of software which supposedly will know that you might be about to commit thought crime before you yourself are aware of it. And they are salivating over nano spydrones the size of flies. And, unfortunately, much much more.

Amazing how prescient Orwell really was--- I urge everyone to re-read his novel. Operatives of the US Surveillance State appear to have read it, asking "great idea! how can we implement it?"

Quote:

If you care anything about australian politics,
I do, and thanks for the link.

I have found that a concern for privacy/human rights inevitably draws one into national debates in nations ranging from Australia to Thailand. Of course, some countries don't even pretend to allow discussion of political issues at all, much less controversial issues, like Zimbabwe.

As an example, I have followed the controversy in Australia over transit cards. Did you know that the databases which track the movements of transit riders in Brisbane and other cities is apparently operated by a US spyco? Specfically, while current and accurate information is not easily obtained, as of a few year ago, when I researched this issue, I believe that the Brisbane database, and other aspects of the fare collection system, is maintained by Cubic Transportation Systems Inc. (CTS), a San Diego based subsidiary of US defense giant Cubic Corp. In 2011, Cubic was the 75th largest US Federal contractor with some 278 million annually in contracts. It claims to be
Quote:

a global leader in defense and transportation systems and services... emerging as an international supplier of smart cards and RFID solutions. Cubic also provides homeland security systems and services for maritime, airport, public transportation and government customers.
Cubic Transportation Systems claims it is
Quote:

the world's leading turnkey solution provider of automated fare collection systems for public transport including bus, bus rapid transit, light rail, commuter rail, heavy rail, ferry and parking. Cubic's solutions and services include system design, central computer systems, equipment design and manufacturing, device-level software, integration, test, installation, warranty, maintenance, computer hosting services, call centre services, card management and distribution services, financial clearing and settlement, multi-application support and outsourcing services... Cubic has delivered over 400 projects in 40 major markets on five continents. Active projects include London; New York/New Jersey region; Washington, D.C./Baltimore/Virginia region; Los Angeles region; San Diego region; San Francisco; Minneapolis/St. Paul; Chicago; Atlanta; Miami; Vancouver and Edmonton, Canada; Brisbane, Australia; and Scandinavia.
Another Cubic subsidiary, Cubic Defense Applications, Inc., also headquartered in San Diego, but with a major establishment in the NSA's Crystal City research park, where it works on "intelligence analysis" and "psychological operations", among other things. See http://projects.washingtonpost.com/t...lications-inc/


It can be a bit difficult to follow the trail of who runs surveillance in transit systems, since as you know transit conglomerates tend to be public-private partnerships which continually change their names, and several transitcard giants have reorganized due in part to bad publicity and in part to financial losses due to their many failures worldwide to even get the fares paid. Also, the public-private partnerships are often secretive about what companies they work with, and often harrass security researchers who uncover serious shortcomings. To name just one recent example:
  • Elinor Mills, "Journalist faces charges over transit card flaw reports", Cnet News, 1 August 2011

However, as you probably know, Cubic stepped in when one Australian transit card project suffered an epic fail and the previous company was fired. The name of the villain in the story by Elinor Mills, Trans Link Systems, may ring a bell with some Aussies.

The CTS blurb mentions "call centre services" (that's outsourcing to you and I!). One reason why so many call centers use VOIP is allegedly that the content of incoming calls is easier for companies like Cubic to digitize, analyze (spectrographically and also for keywords) and serve up to data centers operated by intelligence agencies. Apparently it is easier for them to claim they are doing this legally without a warrant if they use VOIP. But if the population knew what is going on, I suspect that a popular outcry would induce national legislatures to try to put a stop to it.

In threads like this LQ thread, I have tried to make the Linux community aware of the far-reaching significance of the HBGary leaks. In one of the emails which Aaron Barr sent which was leaked in HBGary breach, he expressed jocose regret that he had not yet been able to locate the "missile coordinates" of Anonymous members. This remark may seem less amusing if you know that before joining HBGary, Barr worked at Northrup Grumman, which manufactures a number of drones for the US military, including
  • MQ-8B Fire Scout (one is apparently stationed in Webster Field, MD and may be tasked with spying on Washington, DC)
  • RQ-4 Global Hawk
  • Euro Hawk (a variant of the Global Hawk used by the Bundeswehr)
and is actively involved in trying to sell microdrones to riot police forces around the world.

Something to think about when you watch recent footage from the mean streets of Syria.

Earlier in the thread, I said that I believe that the news story cited in one of many which originate in a publicity campaign by the U.S. Surveillance State, which wishes to further expand its warrantless intrusions into the private lives of all US persons (and everyone else). A concurrent campaign consists of stories offering a feel-good profile of a recruitment drive at DEFCON (as I write, being held in Las Vegas, Nevada, USA). I'd urge any DEFCON attendees approached by the NSA to carefully consider the implications of the fact that joining the bad guys (the secret police) is like joining the Mafia: if things don't work out the way you hoped, you can't just quit and go back to working for the good guys (the independent security researchers, excluding informants). And depending upon how deeply you get drawn into activities like assasinations which violate international law, you could one day wind up in the dock in the International Criminal Court in the Hague. Something to think about: who would want to be cellmates with Ratko Mladic?

frankbell 08-07-2011 08:45 PM

Peufelon, I see no disagreement between us at all. I was speaking more about sensible user practices; you were speaking about sensible network practices. We need both. And I commend your attempts to bring more public awareness to these issue. You might find this podcast interesting.

Your point about social networks is well-made. Persons develop a personal relationship with their computers and forget that the internet is a public place. Any information you place there should be information you expect may become public; it should not be anything you would not mind being public.

I have posted a lot of pictures on Facebook. None of them are of my family or friends--it is not my place to share their stuff--most of my pix are of scenery.

I was trading emails today with a friend of mine who found a bogus charge for some SMS service slammed on her cell phone bill.

Her cell phone provider promptly revoked the charge without question and, in the course of the conversation, told her that one of the most unsafe things persons can do is put their cell phone numbers on Facebook (which she doesn't, by the way). The phone slammers cruise FB and grab the numbers, then slam the accounts.

By the way, Peufelon, check my profile. You might recognize my website.

H_TeXMeX_H 08-08-2011 08:48 AM

Quote:

Originally Posted by cascade9 (Post 4436113)
I didnt have you pegged an a 'we cant do anything, just give up' emo H_TeXMeX_H.

If we allow this to happen, there is nobody to blame but ourselves. "Better die on your feet than to live on your knees".

You're right, I'm not usually one to give up, and in the past I was more like you. Maybe I have become weak, or gone mad, or maybe I just understand more of what is going on and was has happened. Either way, I certainly will not be around when they implement their Orwellian system. I'll run to somewhere where they won't find me for a long time.

I don't really see much hope, because I see how people are. They are sheep. I can't imagine being able to convince the sheep that their master will have them on the chopping block soon, and for them to do something or help out. I think all they will say is their usual 'baaaaaa a a aa'

Peufelon 08-08-2011 12:10 PM

Don't give up the fight!
 
@frankbell:

Thank you for the moral support! I expect I will soon be inserted into a slot in some Syrian wall, but I hope others will continue the global struggle against oppression.

One of the key points about human rights which I haven't had a chance to stress yet is that open-source software developers possess valuable skills which I hope they can put to use assisting activists who live in countries currently experiencing grave human rights abuses, for example by constantly striving to develop/test/debug innovative technological countermeasures to surveillance/disruption of communications with the outside world.

Since I just mentioned Zimbabwe, I feel I should draw attention to a news story which just appeared:
  • Hilary Andersson, "Marange diamond field: Zimbabwe torture camp discovered", BBC News, 8 August 2011, http://www.bbc.co.uk/news/world-africa-14377215
    Quote:

    A torture camp run by Zimbabwe's security forces is operating in the country's rich Marange diamond fields, BBC Panorama has found. The programme heard from recent victims who told of severe beatings and sexual assault. The claims come as the European Union pushes to let some banned diamonds from the country led by President Robert Mugabe back onto world markets.
The marketing of "blood diamonds" is of course another example of amoral corporatism run amok.

I mentioned Syria too, and I want to stress that people trying to get information out (including but not limited to footage of the Syrian army firing on street protests) are at great risk of arrest and torture. And when I criticize "Western" spycos which sell DPI boxes (and microdrones, databases, poison gas, and other equipment useful for opression) and technical assistance to countries like Syria, it is essential to understand that this stuff is used to arrest and torture people who are simply seeking better government for their own people. See

Quote:

(New York) - Syrian security forces have intensified their campaign of mass arrests in cities across the country that have had anti-government protests, Human Rights Watch said today. The targeted cities include including Hama, Homs, and various suburbs around Damascus.:

Reliable activists and witnesses contacted by Human Rights Watch estimate that since late June, 2011, security forces have arrested more than 2,000 anti-government protesters, medical professionals providing aid to wounded protesters, and those alleged to have provided information to international media and human rights organizations.
...
People held in incommunicado detention are at risk of torture. Human Rights Watch has already documented widespread torture from the accounts of people who have been released, causing concern that many detainees still in detention are being tortured.
I'd also like to point out that according to a "minimalist disclosure" to the US Senate by the US DOJ, in 2007,2008,2009 the US DOJ obtained on behalf of foreign governments the ISP account information of 6,18, and 11 persons. (These figures are surely gross underestimates; strangely, the DOJ seems to have retroactively decreased some of the figures, which I take as further evidence of creative accounting of the kind which led to the mortgate mess.) I think the Senate Judiciary Committee should look into whether any of these requests came from countries like Mubarak-era Egypt, Libya and Syria, all of which were considered "allies" in the US "War on Terror" until early in 2011. The US DOJ typically denies any knowledge of what happens to US persons after the USG furnishes information on them to foreign governments. This claim is patently absurd.

I'd also like to remind readers of this thread that Syria has been one of the favorite destinations for "extraordinary rendition" by the secret police of the US and its "allies" in the "War on Terror" for many years. I would again remind operatives of the Surveillance State that such actions will--- if there is any justice--- result in their one day being put on trial in the Hague. The currently obvious decline of US overlordism on the global stage will hasten the process in which American officials are brought to justice for such flagrant violations of every standard of moral decency and international law.

More news from DEFCON: employees of Backtrace (one of the hundreds of US spycos to which the US Surveillance State outsources some of its dirty work) have verbally attacked "Anonymous" for their scattershot approach to hacktivism. IMO to some extent they have a point, but I keep coming back to the damning fact that--- as we all know very well--- "Anonymous" has done more in six months than a decade of DEFCON to draw the attention of the scatter-brained "legitimate" media to the problem of computer/network insecurity, and the HBGary leak in particular is IMO comparable to the Watergate hearings in terms of the far-reaching significance of the abuses it brought to light. Another objection is that despite diplomatic protests from the US and some of its allies (with an awkward contribution from the government of Saudi Arabia, which is not exactly known for espousing free speech rights or religious freedoms), the much vaunted cyberwarfare capability of the US military has not been unleashed against the horrific Assad regime. Once again it appears that the only Westerners actually taking real risks to oppose the Assad government are the human rights activists and reporters inside Syria who are trying to get the word out, and the members of "Anonymous" whom Backtrace intends to arrest:
  • Graham Cluley, "Syrian Ministry of Defense website hacked", Sophos, 8 August 2011,
    http://nakedsecurity.sophos.com/2011...ebsite-hacked/
    Quote:

    Once again, hacking has turned political - with the website of the Ministry of Defense in Syria defaced by the Anonymous hacktivist collective.

    Amid news reports of thousands of deaths in Syria after the authorities cracked down with deadly force using tanks and armoured vehicles against anti-government protests, visitors to the Syrian military department's website have been greeted with the Anonymous logo and images and links to videos of dead protesters.
I am not sure whether such minor defacements (as opposed to leaking the identities of the secret policemen, say) are really helpful--- I suppose that time will tell. But my point is that, for those US persons "on the sidelines" in the struggle of "Anonymous" vs. Oppression (if I might so frame the fight), more traditional alternatives which might be even more effective are ready to hand, like visiting your congressional representatives and asking them to examine abuses by the US Surveillance state and in particular vital assistance from "Western" spycos to some of the most brutal regimes on Earth.

I ask again: if the FBI and US cyberwarriors are the heroes of the global internet, as they claim, why is that they are doing nothing while "Anonymous" is actually doing something to help ensure that the "legitimate" media does not allow the Assad regime to duck under the cover of the global financial crisis?

Quote:

The phone slammers cruise FB and grab the numbers, then slam the accounts.
Oh, they do much more than that. If the US Congress, UK/Canadian Parliaments, etc., took the trouble to hold hearings, they'd find evidence that rogue employees in major North American and European telecoms routinely sell information to such criminal gangs, and of course to PIs and spycos. As you know, their employers often find it convenient to connive in such activities, apparently because in the long run it somehow helps their bottom line.

IMO, anyone who expects corporations to behave themselves without regulation with oversight is... naive. But regulations and oversights cost money, and "Western" legislatures appear to currently be in no mood to require the telecom industry to pay for the mechanisms which would keep them all somewhat better behaved.

Compared to abuses in Zimbabwe and Syria, such violations of consumer rights might appear trivial, and in one sense they are. But my point is that since 9/11 the "Western" countries have been riding the slippery slope towards absolutism and failed-statism. Everyone should contemplate very seriously the implications of the fact that companies like Gamma are making such enormous profits manufacturing secret police equipment, and selling the same stuff to countries like Mubarak era Egypt as they use in the UK and other alleged havens of democratic government.

The "Western" Surveillance State claims that they "need" to spy on everyone all the time in order to stave off the kind of street violence currently on display in Syria. I insist that this is a completely bogus argument. The way to stave off revolution is to provide effective and wise government responsive to the real needs of the population, and this needs to happen long before the government descends to the depths of intolerance, ineptitude, endemic corruption, and brutal oppression which have been exhibited for so many years by governments such as the regime of Bashar al-Assad and his predecessor.

Call me a meddler, but IMO US persons should think hard about the implications of the fact that the US (and other CANZUS nations) have been in a semi-declared State of Emergency since 9/11, a state in which civil rights are progressively eliminated in favor of such policies as indefinite detention without trial, "extraordinary rendition", torture, and "extra-legal execution". Mubarak era Egypt maintained a "State of Emergency" for 40 years. I think the implication is obvious: the US population needs to get busy forcing their government (presumably by such traditional means as lobbying their legislatures) to make changes well before the US comes to resemble Mubarak era Egypt even more closely than it does today. Investigation into cooperation between US agencies and Syrian secret police would further underline the point that the CANZUS nations already resmemble countries like Syria more closely than most people want to believe.

Quote:

You might find this podcast interesting.
For security reasons I have disabled software suitable for viewing videos, podcasts, etc.

@ H_TeXMeX_H:

Quote:

I certainly will not be around when they implement their Orwellian system.
But as you yourself pointed out, they already have. From 2002 or so forward, they have merely been tweaking the fine tuning on the telescreen.

Quote:

I'll run to somewhere where they won't find me for a long time.
Sure, I'd book a flight, too--- if only it were possible! Unfortunately, there is no operational interstellar emigration service, and no place left on Earth where anyone can hide. Vanatu? Costa Rica? Forget it--- Gamma has a huge operation in Latin America too. Don't take my word for it, search for their own websites and press releases. They are not as shy about their nefarious activities as most "Western" spycos. And unfortunately, Gamma is just one of literally thousands of Western spycos, many with tens of thousands of employees and multi-billion dollar annual profits. Good business? I would say that the modern spyco is the very model of an inherently evil business, of the kind which every decent human being should oppose to the bitter end of days.

cascade9 08-08-2011 01:29 PM

Quote:

Originally Posted by Peufelon (Post 4436193)
I do, and thanks for the link.

No problems. ;)

Quote:

Originally Posted by Peufelon (Post 4436193)
As an example, I have followed the controversy in Australia over transit cards. Did you know that the databases which track the movements of transit riders in Brisbane and other cities is apparently operated by a US spyco? Specfically, while current and accurate information is not easily obtained, as of a few year ago, when I researched this issue, I believe that the Brisbane database, and other aspects of the fare collection system, is maintained by Cubic Transportation Systems Inc. (CTS), a San Diego based subsidiary of US defense giant Cubic Corp. In 2011, Cubic was the 75th largest US Federal contractor with some 278 million annually in contracts.

I actually live in brsbane, and yeah, I knew about cubic. When they 1st started putting the card scanners into busses, they were marked 'cubic systems', and I did a bit of digging. The 'cubic' logo has been gone for a while now.

The odd thing is that I've never seen any australian media mention that connection. Wel, not that odd considering that the media are really behind this whole 'security state' push.

Quote:

Originally Posted by Peufelon (Post 4436193)
Earlier in the thread, I said that I believe that the news story cited in one of many which originate in a publicity campaign by the U.S. Surveillance State, which wishes to further expand its warrantless intrusions into the private lives of all US persons (and everyone else). A concurrent campaign consists of stories offering a feel-good profile of a recruitment drive at DEFCON (as I write, being held in Las Vegas, Nevada, USA). I'd urge any DEFCON attendees approached by the NSA to carefully consider the implications of the fact that joining the bad guys (the secret police) is like joining the Mafia: if things don't work out the way you hoped, you can't just quit and go back to working for the good guys (the independent security researchers, excluding informants). ?

Even in the 'good old days' it wasnt exactly easy to get out the the spyco business. I wont go into that in public though, too much dirt and some of it could lead back to people I really dont want to get into any trouble. *thinks* Any more trouble than they have already been in might be a better way of putting it.....

Quote:

Originally Posted by H_TeXMeX_H (Post 4436772)
You're right, I'm not usually one to give up, and in the past I was more like you. Maybe I have become weak, or gone mad, or maybe I just understand more of what is going on and was has happened. Either way, I certainly will not be around when they implement their Orwellian system. I'll run to somewhere where they won't find me for a long time.

To quote obscure an 1980s hair metal band-

And you can shake your fist at the T.V. set
And you can slam your hand in the table
And you can cry and curse
Through tightlocked teeth
Just as hard as you are able
But you can't run away from trouble
'Coz there ain't no place that far

Quote:

Originally Posted by H_TeXMeX_H (Post 4436772)
I don't really see much hope, because I see how people are. They are sheep. I can't imagine being able to convince the sheep that their master will have them on the chopping block soon, and for them to do something or help out. I think all they will say is their usual 'baaaaaa a a aa'

People can be sheeple, yes. But they can also go the other way.

IMO the main reasons why there hasnt been a general uproar abou the whole security state issue is because people are being lied to by pollies and the media.

'Sheeple' is a cop-out in this case IMO.

Peufelon 08-08-2011 01:56 PM

Don't give up the fight!
 
Quote:

Any more trouble than they have already been in might be a better way of putting it...
Wink!

I have never been employed in any capacity by any intelligence or secret police organization, nor have I ever held any secret clearances. In particular, I am not a paid informant. (Those who are probably lie about it, to be sure.) But through no fault of my own, I seem to know many secret police operatives, and I think the same might be said of many others here.

As we both know, nothing worries the US Surveillance State so much as internal dissension and the possibility of devastating insider leaks. In the US, internal controversies are hard to keep entirely out of public view, and can be leveraged by those fighting oppression. I am convinced that despite its frightful powers of intrusion, and its willingness to go beyond intimidation to kidnap and torture its opponents, the Surveillance State is by no means irresistable. To the contrary, it will inevitably destroy itself due to its unsustainable cost and infeasible appetite for human resources... but it is in everyone's best interests to contain and control it before that happens.

Quote:

IMO the main reasons why there hasnt been a general uproar abou the whole security state issue is because people are being lied to by pollies and the media.
It appears to be true that simply being able to document abuses (in this thread, by giving links to highly respected sources like HRW) does not seem to be enough to generate mainstream media stories even when these would clearly be in the public interest. One reason is that editors are warned to keep many stories out of print, and supposed "investigative reporters" [sic] are in too many cases intimidated into refusing to use strong encryption, which of course means that the people with good tips can't convey them. The contrast with the brave bloggers reporting from places like Syria could not be greater.

But I have noticed that anything which is slashdotted is picked up by the mainstream media, which suggests that if enough of us investigate (using what the spooks like to call "open source intelligence") questions like "what are the spycos, who are their clients, what are their technical capabilities, who are their targets?" and to report our findings in forums like this, eventually a critical mass of the population at large may become sufficiently aware, not only of the nature and extent of abuses of their own civil rights, but of how it will affect their lives in the long run, that they will demand real change.

In US law there are currently still some remaining protections for "prominent" professional journalists and "established" academic researchers. (UK: not so much, I think.) I urge these people again to adopt and use strong crypto and to use their power to expose wrongdoing while they are still at liberty to do so.

I believe that the most effective revelations of specific insecurities are those which describe in detail how anyone (or at least, anyone sufficiently sophisticated) can verify the problem. Unfortunately, such revelations are currently dangerous for anyone but a "prominent" journalist to reveal. I feel that those US journalists who are not actively seeking such verifiable stories are doing the US public a great disservice, and I urge them to work up the moral courage (and the modest technical knowhow, I guess) to prominently post their GPG keys.

Certain LQ moderators often accuse me of allegedly counterfactual "hype", and I admit to not understanding many of my observations. As an untutored amateur I am clearly vulnerable to such accusations. But I know that I have stumbled over quite a few phenomena in which so far unpublished security/privacy violations are unambiguous and verifiable. If reporters only used GPG I would have tipped them years ago.

Transit payment/surveillance systems are another rich vein which "legitimate" investigative reporters have failed to mine. Anyone who looks into this issue will quickly discover that a few huge companies dominate the global market, and all have been dogged by years of hugely mismanaged projects, outrageous insecurities, and even official corruption. And they all tend to respond (I already cited one recent example) to disclosures in the public interest with all the legal intimidation they can muster.

Quote:

The 'cubic' logo has been gone for a while now.
Yes, and not just in Brisbane. Some cities are so secretive about Cubic's involvement that not a word about it appears anywhere in the local press. My guess is that both the municipalities and Cubic itself are sensitive to the rather glaring disconnect between providing glorified fare boxes and providing all manner of equipment and "services" to militaries around the world, including some customers foreign and domestic which would raise the brow of many a transit rider.

But I am sure you can think of ways to verify ("open source intelligence") that Cubic maintains employees in specific cities not mentioned on Cubic's website, from which one can draw a likely inference. Study their financial statements and press releases (especially in trade e-zines), locate their regional offices, determine their corporate structure, profile their executives, identify their business partners, follow the money. Local resources such as public libraries may be able to assist.

I'd encourage you, since there is already considerable local interest in this issue in Brisbane, to get together with some other civic minded people, and synthesize a global investigation of transit system privacy/security problems into a story you can submit to a local paper. IMO the (bad) Australian experience with transist fare collection systems only make sense when placed into a global context.

Same theme as "fusion centers" staffed by contract employees of private spycos: huge profits for a handful of corporate giants, at a huge cost to taxpayers, with very little apparent public benefit. When they claim otherwise, demand proof. Their silence will then speak louder than any words.


All times are GMT -5. The time now is 11:46 AM.