PDA

View Full Version : Poo shows we are in deep poo



Fredkc
22nd November 2010, 14:49
WASHINGTON — (http://www.msnbc.msn.com/id/40306517/ns/us_news-security/) How did a hacker, Lin Mun Poo, in Malaysia manage to penetrate a computer network operated by the Federal Reserve Bank of Cleveland?

And what was the same accused cybercriminal doing this summer when he allegedly tapped into the secure computers of a large Defense Department contractor that managed systems for military transport movements and other U.S. military operations?

Those are among the puzzling questions raised by allegations against Lin Mun Poo, a 32-year-old Malaysia native whose case illustrates the mounting national secrets threats posed by overseas cyberattacks, U.S. law enforcement and intelligence officials tell NBC News.

Poo was arrested by Secret Service agents last month shortly after flying into New York's John F. Kennedy airport with a "heavily encrypted" laptop computer containing a "massive quantity of stolen financial account data," including more than 400,000 credit card, debit card and bank account numbers, according to a letter filed by federal prosecutors last week laying out a "factual proffer" of their evidence against Poo.
Oh! And in his spare time, he hacked "several major US banks, and The Federal Reserve!

Then he got a big time Pentagon contractor, who does system management for military transport. Gee, if you want to know what the military is up to, look where they get sent, right?

Now for something quite revealing. If you want a clue about how far behind the curve "security" people really are...
"If a guy from Malaysia can get into networks like this, you can imagine what the Chinese and Russians, the people with real capabilities, are able to do," said one former senior U.S. intelligence official
First of all, anyone who thinks that being in any particular age group, in some country, or another, from any socio-economic, or cultural background somehow removes them from the world of computer hacking, is so out of touch with reality, they really have no business advising anyone about security.

No, that wasn't me being politically correct. It's that computers are not that mysterious. Fact is that anyone on this planet, past the age of 12, willing to put in the time, can grasp what's needed to do this.

It gets worse:
In fact, the penetration of sensitive national security computers by overseas hackers — many of them believed to be state sponsored — is rapidly emerging as one of the country’s most alarming national security threats, officials said. And the threat is not just from foreign governments and for-profit hackers. Officials have also expressed worries that terrorist groups may be capable of the same sorts of sophisticated penetrations.
"rapidly emerging"??
Welcome to 1990, "officials"!! Successful efforts to subvert modern US domestic servers, both commercial and military has been in full bloom since the late 1990's.



China Web hijacking... (http://redtape.msnbc.com/2010/11/china-web-hijacking-shows-net-at-risk.html)
The cyber cold war between China and the U.S. just got a little chillier. Twice this year, China demonstrated its ability to "substantially manipulate" the Internet, a congressional commission said in a report issued on Tuesday. In one incident, traffic headed to 15 percent of the world's websites was redirected through Chinese servers for about 20 minutes.

The high-level hijacking included bits and bytes headed for the U.S. Senate, the Army, the Navy, the Marine Corps, the Air Force, the secretary of defense, NASA, and other government offices, along with commercial entities like Dell, Yahoo, Microsoft, and IBM, the report said.
"rapidly emerging"??
This isn't a simple test, this is a demonstration of power. Both stories are linked here. Both contain a wealth of interesting info.

What is most interesting to me is the fact that the fear-based, reactive mode of security practiced nowadays is a bankrupt mindset. And so far, all you'll see them talking about in these articles is simply more of what already doesn't work.

Welcome to Monday :)
Fred

Afterthought: Any bets they give this guy about a 20 year prison sentence?
When what they should be doing is giving him immunity, and a $2 million/year, 20 year contract to consult on security. ;)

Fredkc
22nd November 2010, 15:01
More from the 2nd story;
"This is a troubling development. It could be innocuous, and China is claiming it's an accident, but this has a pretty wide-ranging set of implications," he said. "That traffic could be eavesdropped upon."

The report comes near the end of a tumultuous year for China and the Internet. Beijing had a very public spat with Google early in the year, and the nation was ultimately accused of spying on Google employees. It was also accused of a sophisticated plot to use the Internet to spy on the Dalai Lama and other detractors.

The March incident involved a flaw in the way the Internet converts friendly website addresses -- like msnbc.com -- into their reference IP addresses – such as 128.206.11.1. The conversions occur through a system of networked computers called Domain Name Servers.

The Chinese government has unbelievable control of the DNS system. Has had it for 10 years. In 2000 I watched computers in China shut down access to sites world-wide, for the entire west coast of the US. They simply used a "weakness" in the way DNS servers talk to each other.

This flaw still exists today. Never been fixed.

And by the way... I am a rank amateur at this stuff. People who really do know about all this, probably can't get the funding from the MBA Suits to deal with it.

Fredkc
22nd November 2010, 15:44
What is most interesting to me is the fact that the fear-based, reactive mode of security practiced nowadays is a bankrupt mindset.
Problem is that modern day security software is all written completely backwards. Therefore "Ain't never worked, Ain't never gonna". It is reactive, not "pro-active".

The way you build genuinely secure systems is by denying access to everyone, and everything, from gitgo. Then you build a limited set of users, and protocols that are given access. The beauty of this is:
1. You eliminate the constant worry about "new leaks".
2. The more sensitive the data, the more restrictive the access list,
the easier this becomes to implement. But...

Millions of man hours, and billions of dollars are all invested in a system that
1. Identifies an existing leak.
2. Writes a block for the leak.
3. Distributes the block.

It means that all such software is always two steps behind the threat. The answer to this has also been known for decades, it's just "too much trouble" to implement. Inertia at work, really.

Luke
22nd November 2010, 16:04
Like you want Corporatchik or Aparatchik to grasp that ? not enough "ho's booze and coke", not enough 10^9$. Meaning : no profit. Broken mainframes mean more mainframes need replacing. Bad software mean another govt bid. Why worry?

If you have capital reins of the world in hands of guys who are mentally robber barons straight from late middle ages, what do you expect?

All they can do is bash each other brains out. But they are mighty good at that.

Sophistication, on the other hand, does not seem like a pro in this job.

As for Russ and Han, well, they have all this young people that strongly believe in their State Corporation PR.

Luke
22nd November 2010, 16:17
Also lemme add desktops of our favourite CEO/MBA's .. MMA .. whatever 3 letters you want (via zerohedge.com (http://www.zerohedge.com/))
Timothy Geithner:http://www.zerohedge.com/article/artists-rendering-tim-geithners-desktop
http://www.zerohedge.com/sites/default/files/images/user5/imageroot/trichet/Geithner%20desktop_0.jpg
Ben Bernanke: http://www.zerohedge.com/article/artists-rendering-ben-bernankes-desktop
http://www.zerohedge.com/sites/default/files/images/user5/imageroot/trichet/Bernanke%20Desktop_0.jpg
You can also see : Lloyd Blankfein (God's work/G$) (http://www.zerohedge.com/article/artists-rendering-lloyd-blankfeins-desktop) and Rahm Emmanuel (Former POTUS advisor) (http://www.zerohedge.com/article/artists-rendering-rahm-emanuels-desktop)

Do you expect those guys to pay for stinking security?

irishspirit
22nd November 2010, 16:33
Fred,

Hope you are well. Well written thread mate.

I cannot believe that they just got through the back door like that. However, I do remember seeing that China is writting back doors into the boards that they are making.

Interesting times ahead.

Luke
22nd November 2010, 16:40
However, I do remember seeing that China is writting back doors into the boards that they are making
Not only that, if you consider possibilities of quantum-entangled materials.
Govt bids are for very specific machines.

Possibilities are endless

But also keep in mind: country vs country hostilities are shell game for us, peasants.

Kulapops
22nd November 2010, 17:31
[INDENT]WASHINGTON — (http://www.msnbc.msn.com/id/40306517/ns/us_news-security/) How did a hacker, Lin Mun Poo, in Malaysia manage to penetrate a computer network operated by the Federal Reserve Bank of Cleveland?


Hey, Fred ! Is this guy any relation to Hu Flung Dung ?

It could be the work of a gang.

...Probably just sh*t stirrers...

Ahkenaten
22nd November 2010, 17:40
Back Door Man
http://www.youtube.com/watch?v=OWjKNRweZvI

Teakai
23rd November 2010, 00:17
There's no way you can not go past a thread with a title like that.

Is this mainstream news, Fred?
If it is do you think it might be all about showing the public what looks to be a justifiable reason shutting down the internet?

They did set up the terrorists after all, maybe this is just another set up and they're just smearing Poo's name and getting him in the sh*t'

HAHAHHAHAHA couldn't help it.

Lucrum
23rd November 2010, 07:13
Good article there Fred! :thumb:

However, it doesn't surprise me one bit. There is not a single security system in the world that can't be broken. Some may still remain unbroken, but it's just a matter of time before someone finds the door and lets everyone in.

Don't want burglars in your house? Have a house with no doors and no windows! Have no doors or windows? You locked out yourself, mate! ;)
If the intended user can get in, someone else eventually can too.

norman
23rd November 2010, 08:54
It's a propaganda war against Open Source thinking. The web and IT has been way too free and easy for those guys. They HAVE to turn it into a struggle between good and evil or else they are not the top dogs.

Hey, I bet they even "escorted him onto the plane without a passport and filmed him constantly thoughout the flight"... errr oh no... I think that was the Christmas bomber.

Anchor
23rd November 2010, 09:25
Fred,

Brilliant write up. I had to laugh at this spin:


Poo was arrested by Secret Service agents last month shortly after flying into New York's John F. Kennedy airport with a "heavily encrypted" laptop computer containing a "massive quantity of stolen financial account data," including more than 400,000 credit card, debit card and bank account numbers, according to a letter filed by federal prosecutors last week laying out a "factual proffer" of their evidence against Poo.

So if its heavily encrypted how do they know what was on it?

Option a) Heavily encrypted isnt really so heavy when you have the NSA on your team
Option b) It was not, and this part is all bollocks.

There are safe cryptosystems out there, such as Elliptic Curve, but there are no commercial implementations because the NSA bought the patents. Wonder why?

John..