Sunday 10 August 2008

Hack the Planet

The UK Ministry of Defence has come under attack from a hacker who is allegedly threatening to target military satellites unless a £3 million ransom is handed over. According to a story in today’s Daily Mail, the hacker has already seized control of one satellite, altering its course. The satellite in question is said to be involved in co-ordinating bombing raids on Iraq. Other targets for the hacker have been GCHQ - the spying operation that listens in on telephone calls and other communications - and a number of UK operations overseas. Officers from the Metropolitan Police Computer Crime Unit are said to be engaged in tracking down the source of the attacks. The authorities are said to have been so concerned about the attack on the satellite that the prime minister, Tony Blair, was informed.

High profile hackings are becoming more common. One of the most well known was involved two UK hackers, Datastream Cowboy (Richard Pryce) and Kuji (Mathew Bevan), who caught the CIA’s attention in 1994 after the Pentagon’s computer was broken into. The South Korean atomic research institute was also hacked, provoking fears that World War III might be started by a teenage computer hacker sitting in his bedroom.

Sunday 3 August 2008

Stateside Perspective on CyberCrime Powers

The US Senate has passed a bill to strengthen the hands of federal prosecutors who fight computer crime by removing some of the more common hurdles in prosecuting online miscreants.

One provision would eliminate a requirement that prosecutors prove illegal activity has caused at least $5,000 in damage before they can bring charges of unauthorized computer access. The threshold often proves problematic in pursuing cyber crime because a single incident may spread the damage across hundreds of thousands of victims. Because the harm is so dispersed, it's often hard to meet the burden.

Under the new legislation, criminals could be charged with a felony if they install spyware or keystroke-monitoring software on 10 or more computers, no matter how much damage is caused. It also allows identity victims to seek restitution for the time they spend trying to restore their credit.

Saturday 2 August 2008

Insecure Wireless and the Terrorist Email

Indian police raided the Mumbai home of an American expatriate after someone used his open wireless network to send an email that took responsibility for a bomb blast that killed at least 42 people... We've often argued that Wi-Fi bandwidth is like air, and the oft-repeated warnings about people leaching off unsecured networks was so much hysteria. This experience goes to show there are down-sides to any share-and-share-alike philosophy.