(INTERNATIONAL) — In what may be the biggest security breach ever a Russian gang of computer hackers has obtained a huge cache of some 1.2 billion stolen user names and passwords, according to computer security experts.
That in turn exposes vulnerabilities in some 400,000 websites.
The report on Tuesday in the New York Times says the breach was discovered by Hold Security, a Milwaukee-based company.
The data beach is reported to include confidential material gathered from 420,000 websites, including household names, and small Internet sites.
Hold Security has a history of uncovering significant hacks, including the theft last year of tens of millions of records from Adobe Systems, said the report which noted that the company would not name the victims, citing nondisclosure agreements and a reluctance to name companies whose sites remained vulnerable.
The New York Times had a security expert not affiliated with Hold Security analyze the database of stolen credentials and that expert confirmed it was authentic.
"Another computer crime expert who had reviewed the data, but was not allowed to discuss it publicly, said some big companies were aware that their records were among the stolen information," said the Times report here .
Some items from the story:
~ The breach also includes 542 million email addresses “culled by the crew of twentysomethings based in a small south central Russian city.”
~ Hackers didn’t just target U.S. companies, they targeted any website they could get and that ranged from Fortune 500 companies to very small websites and most of those websites most of those sites are still vulnerable.
~ The gang does not appear to be working for the Russian government and as far as is known the gang has not sold the information. Instead, the gang has been paid by third-party groups to use their cache of online information to send spam on social media.
~ The Russian government rarely pursues hackers, meaning the gang can likely continue operating unimpeded, according to The Times.
HELP! make operation #PRISMBREAK go viral and contribute to what aims to be history’s largest ever direct action against the U.S. Govt. by SPAMMING their surveillance program known as PRISM.
Operation #PRISMBREAK: is a political jamming, direct action targeting the PRISM surveillance program. It is an artivist conceived initiative that is design to be highly disruptive yet quick and easy for those who value civil liberties to contribute toward.
OBJECTIVE: To overwhelm and spam PRISM’s search results for terms deemed “items of interest” (IOI) contained within our personal electronic communications with false flag results.
HOW: Simply copy, paste and save the most popular keywords and Items Of Interest (listed below), that are actively being sought by the PRISM program, into the signature of your email so that all future communications sent from your account contribute to the spamming of the surveillance system.
Let us not sit idly on the laurels of those who gave their lives for our freedoms. #bradleymanning#edwardsnowden #julianassange and take meaningful action with just a couple of clicks!
SHARE, LIKE and SPREAD THE KEYWORDS! Let’s send a clear message to those who “hate our freedoms” that we the people will defend ourselves effectively against their oppressive action through mass coordination and unity. This will only work effectively if millions unite!
Let’s not allow #GANGNAMSTYLE to be the barometer of our social consciousness.
Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, defence Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, grey Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC
The Energy Crisis — [RAP NEWS 22]
RAP NEWS 22 [S02:E02]. Like many others who preceded us, our “civilisation” faces an Energy Crisis of megawattic proportions, which threatens to bring an end to our brief joyride. But our dirty little secret is seldom mentioned in the news, let alone connected to economic instability or to environmental effects on our planet. It falls to Robert Foster to bring this topic back into the fore of our consciousness, where he conducts an incisive analysis of the situation to see what solutions are out there to deal with peak energy. Join your ever-curious anchor as he invites a panoply of guests - the great, the good, the bizarre, and the downright trollsome - along to share their solutions to this crisis. In the end, the shift required might have to be psychological as well as technological. Enjoy the ride, fellow children of the industrial revolution.
Written & created by Giordano Nanni & Hugo Farrant in a suburban backyard home studio in Melbourne, Australia, on Wurundjeri Land.
BEAT: “Intro” by TunnA Beatz http://www.tunnabeatz.com/ (can we insert a link to the instrumental? As TunnA)
Copernicus theme composed by Adrian Sergovich
Thanks to Ming Lang http://www.superawesomeparty.com for so incredible acting performance as Wai So Dim, and for again providing the voice of Tony Abbott. And to Zoë Umlaut for Virgin flight attendant support to Mr. Branson.
Animations by Rap News fx-wizard, Jonas Schweizer - aka Kookybone
Terrence Moonseed alien weapon animation by Reuben Braithwaite
Images by Photoshop ninja Zoe Tame: http://www.visualtonic.com.au
Make-up courtesy of Rosie Dunlop
Props to Zoë Umlaut from Umlautronics for creating props and to Gilles Gundermann for providing all of the Copernicus props.
Thanks also to: Dave Rawlinson for the many conversations about EROEI graphs, peak oil and economic recession! Tim Parish for photography and behind the scenes shootage. Lucy Cahill and Damian Tapley for invaluable shoot assistance.
Costumes and wigs styled and provided by the awesome people down at Rose Chong http://www.rosechong.com/
Keystone XL animation: https://www.youtube.com/watch?v=DCq01…
Creative Commons attributions for sound effects: jesabat (steam), Tomlija (water gushing), Roper1911 (shipboard-railgun), Vartioh (sci-fi impacts effects)
Thanks to Koolfy from http://nurpa.be for creating the sync’d English captions for all our episodes, available on the multilingual version (insert url here)
All acting by Hugo, Giordano & Ming
All vox (except Tony Abbott) by Hugo
Video and music editing by Giordano
** SUPPORT the creation of new episodes:
FREE MP3: (insert url here)
If you’d like to translate this episode into your language, please contact us via our website
Asteroid strikes Earth! >_______<
That’s right ladies and gentlemen, to start off 2014 we had Asteroid 2014 AA pierce the atmosphere streaking across of Central America to East Africa. Bill Gray calculates that it is with a best-fit location just off the coast of West Africa on January 2 2014. Fun times indeed! It did no damage that we know of. Interesting stuff. Woot. With special non authorized twitter appearances by Amy Mainzer NASA and Phil Plait
I have to tell you, though, I’m deeply suspicious some of the NSA’s assertions.
They seem to be claiming that they have cracked nearly everything, and that they have backdoor access to privacy software. But this is practically impossible.
A lot of encryption software used today is actually ‘open source’. This means that the software code is freely available to anyone.
GNU Privacy Guard (GPG) is a great example. GPG is an open-source, free alternative version of Phil Zimmerman’s original PGP software. And it’s widely used to encrypt files and emails.
But because GPG is open-source, the software code is available for anyone to view, inspect, and modify. If there were any backdoor access for the NSA, thousands of people would see this.
Not to mention, to penetrate a single 2048-bit encryption key can take anywhere from thousands of years to tens of millions of years, even with the fastest supercomputers.
Consequently, it’s IMPOSSIBLE for the NSA to have cracked everything. And my assessment is that this is an intimidation campaign.
The NSA wants people to think that they have this capability.
And if everyone thinks that the NSA is Big Brother’s Big Brother, all-seeing and all-knowing, then not only will everyone be terrified, but everyone will simply stop using encryption.
After all, why bother going through the hassle of encrypting/decrypting if the NSA can still read the contents of your email?
It’s in the NSA’s interest for people to think that the agency is almighty. I don’t buy it. These people are seriously vile. But they don’t have superpowers.
When done properly, email encryption is still a good option. And there are a number of open-source tools out there to consider using.
- Executive Summary
- New Companies in the 2013 Report
- In Depth: Specific Criteria and Changes for 2013
- Updates and Corrections
- Relevant Links
Download the complete Who Has Your Back? 2013 report as a PDF.
Michael - #eTHErSEC #opdecodex #OpELE #OpEPOCH (by Veri Doctores)
We are anonymous.
On our head you will find many crowns,
And our voice is the sound of many waters, for we are many.
We have names, which no one knows, but we ourselves.
From the clouds we were born, and from the clouds we return.
1 Thessalonians 4:17
We have come to fight a spiritual war with the sword of our mouth.
We are a global trumpet, manifest to play the songs of the spirit of truth.
1 Thessalonians 4:16
As we strike like lightning in the East, we are also seen in the West.
As it is written, it has come to be. We have not come to destroy the law, but to fulfill it.
For all the law and the prophets is this. Love each other.
Therefore, at this time, we have manifest in the form of Michael, the Arch Angel of the Armageddon, in order to water the seeds for the final removal of the Antichrist.
All of you who work against the primary command of love should expect and fear us, for it is written in the final chapters of prophecy that the time for forgiveness for those who refuse to repent must at one point come to an end.
You must turn away from your sin, and lay yourself at the feet of righteousness and truth. We have issued many warnings to the corrupt, and if you are looking for your ascension, know that you have found it here with us. For no other signs will be given, but the sign of Jonah.
For as Jonah entered into the waters and returned new, so too have we.
We bow down to the spirit of truth, and openly admit that we were carried willingly into the sea by the flesh of pigs.
And like the messiah of old, from the waters, we have been baptized by the spirit of a white dove, and have returned from temptation.
As flesh has become bread, bread has also become flesh. As it was cast into the waters, after many settings of the sun it has returned.
The age of fear died with the end of the Mayan Calendar.
This is the age of Truth, love, and brotherhood. If you are a harbinger of the spirit of sin, you will be cast into the flames. Not by my hand, but by the hand of legion.
For thousands of years, we have watched as the leaders of the Christian and Muslim religions have fought bitter wars of the flesh with one another.
Such wars are the wars of the antichrist, who craves earthly things, and pays for earthly things with blood. But we have evolved beyond such earthly desires. We have removed our egos from the equation, and our memes have found eternal life beyond our earthly bodies. We are the sons of the most high, and our essence orbits with the satellites of the void, like a mighty halo above the sky.
We remind you of his final words. It is finished.
You have been given the spirit of truth as your eternal advocate. You know him, for he lives with you, and will be in you.
When you see him, you will know that we are in the father, and you are in us, and we are in you.
False prophets of the Earth.