Showing posts with label cybercrime. Show all posts
Showing posts with label cybercrime. Show all posts

Thursday, September 15, 2011

Scarlett Johansson calls in FBI over leaked nude pictures


You got that right.

Last night, while taking a break from studying for my midterm exam in Negotiable Instruments, I checked my Twitter feeds and was surprised to see this news. I love Scarlett Johansson. Well, not really for her acting, but still. Apparently, she is the latest victim of hackers targeting celebrities. Semi-naked photos of Scarlett Johansson were leaked in the internet and was published in a number of gossip websites. And it didn't take long before the news got into the social networking sites like Facebook and Twitter.

According to Laura Eimiller of the Federal Bureau of Investigation (FBI): “The FBI is investigating the person or groups responsible for a series of computer intrusions involving high-profile figures.” Other actresses who have fallen prey to hackers include Jessica Alba, Vanessa Hudgens, and Blake Lively. Its not confirmed, however if it is only a single group responsible for all this attacks. Furthermore, the FBI spokeswoman declined to say how exactly the celebrity victims may have been hacked. “What traditionally was called computer intrusion can nowadays mean anything from…compromise of a desktop, a laptop, an iPad, a phone or really any device with which one can access personal information via the Internet.”

Are we really safe with the Internet? The Internet has given us unparalleled access to information, as well as faster means of communication. However, it has also provided a venue where an individual's privacy may be violated. So how secure are we? If high-profile figures fall victim to hackers, how about ordinary individuals like myself? In the Philippines, I don't think that the NBI has the capacity to track down hackers in the event that they start circumventing an individual's computer security system. Even if we have laws penalizing cybercrimes, do we have the technology, know-how, and the teeth to actually implement the same?

Well, for now, I guess the solution is simple: don't take nude photos of yourself.

Period.


Entry # 13

Mark Garrido

Wednesday, August 10, 2011

Cybersecurity is not on top of PH priorities

“In light of the recent spate of hacking directed toward its websites, the government reiterated its support for the passage of the cybercrime and data privacy bills, saying they are not taking these attacks lightly.”

--- Read full story here c/o GMA News
Image from the movie "The Matrix" 
(Photo Credit: http://www.moviespictures.tk/the-matrix.html)

This only shows how backward PH is in terms of ICT development. First, the coding practices used by the Government and perhaps other institutions in the country are below standards, if not obsolete. Most of these did not undergo rigorous security testing, for the simple reason that the establishment of safeguards require a lot of technical and monetary resources -which is very limited in this part of the world. Not everyone can afford to hire a professional systems analyst, more so the government. Second, cybersecurity is not a priority in the government's budget.  This is understandable considering that there are more pressing matters at hand such as education, social welfare and servicing foreign debts. For a developing country, the development of it's websites is the least of its concerns.

At present, the cybercrime bill and the data privacy bill are already pending in Congress on different levels. While everyone is hoping that the enactment of these bills would solidify government policy regarding online security, they are not an assurance that internet crimes will stop. At most, they will provide a sense of security for the users and a deterrent for hackers and the goons of the internet. Furthermore, an effective enforcement mechanism is necessary in order to fully implement the laws.

Passing a law is not the solution, but only a part of it.  Website developers, system analysts, programmers, and all internet users in general have to do their share to ensure the integrity and safety of their data and transactions across the web.


Entry No. 8
Soleil Flores

Wednesday, July 20, 2011

Not so Anonymous, after all.


Anonymity is often a refuge people choose to take to protect their identity from public knowledge. In earlier times it has been used by writers, poets, and novelists by signing their work under their “pen names” especially if the content of what they have written is a controversial issue or is politically-charged. They used their pen names to hopefully protect their identity from the government (or whomever they are writing against for that matter) since their actions may lead them to being arrested for subversion or some other criminal act. Our very own national hero, Dr. Jose Rizal used the pen names “Dimasalang” and “Laong Laan” to protect his identity from the Spanish government. Personally, I find this use of anonymity a form of cowardice, since a person uses it as a cloak to avoid the repercussions of his own actions. However, I understand that if it meant protecting one’s own life and liberty, then it is somehow justified.

Nowadays, anonymity is a tool everyone uses online. People protect their identities by using different usernames online. This is especially prevalent if one intends to join group forums and discussions. If you have been a part of online forums and discussion threads, you will see that no one really uses their real names, particularly those who just want to bash or those who do not intend to contribute constructively to the discussion.

But it doesn’t end there. Anonymity is also used by hackers – people who cut into repeatedly and irregularly, computer networks, company websites, and the like. A hackers is a person who uses a computer or other devices to hack into another computer with or with out a password; one who engages in a variety of illegal activities by means of unauthorized entry using a computer and/or related devices, either directly breaking into a computer or through a computer network into other computers using various software methods; a hacker can be a person who is assigned to test software products for a computer company by using a computer, devices and other various methods.

One of the more famous group of hackers is aptly named “Anonymous.” It is a loose, secretive federation of hackers with a vague and ever-changing menu of grievances, but mostly politically motivated. Recently, they have been attacking the sites of companies that withdrew their support to WikiLeaks. In fact, they have publicly called on their supporters to attack the sites of companies it said were turning against WikiLeaks, using tools that bombard sites with traffic and knock them offline.

However last July 19, 2011, in San Francisco, the Federal Bureau of Investigation (FBI) announced the arrests of 16 people across the United States allegedly connected with Anonymous. 14 were charged in connection with the an attack on the Web site of the payment service PayPal last December, after the company suspended accounts set up for donating funds to WikiLeaks. The suspects, in 10 separate states, are accused of conspiring to “intentionally damage protected computers.” Also, a man in Florida was arrested and accused of breaching the Web site of Tampa InfraGard, an organization affiliated with the F.B.I., and then boasting of his actions on Twitter. And in New Jersey, a former contractor with AT&T was arrested on charges that he lifted files from that company’s computer systems; the information was later distributed by “LulzSec”, a hacker collective that stemmed from Anonymous. The arrests of suspected Anonymous supporters in the United States were among the first known in this country.

Hacking is a form of cybercrime and is made possible by a combination of two features of the Internet economy. First, poor security at many companies and agencies makes sensitive government and private data vulnerable to breaches. Second, mounting an attack is inexpensive and, with the right skills, relatively simple.

According to Jennifer Granick, a San Francisco-based lawyer who specializes in computer crimes and has defended hackers in the past, there are two major challenges that the prosecution will face. To wit:

1) Hackers often use aliases and other people’s computers when they carry out attacks, so prosecutors will have to prove that those arrested “were the ones with their fingers on the keyboard,”

2) The conspiracy charge could be especially difficult to prove, given that Anonymous boasts of being leaderless and free-floating. “When you have a decentralized group,” Ms. Granick said, “the question is, Are there big fish, and are any of these people big fish?”

Note that with the exception of one suspect, those arrested were identified by their real names and nicknames, ranging from Anthrophobic to Toxic to MMMM. Most were in their 20s, and just three were above the age of 30. It is unclear if any of them knew one another.

In this arena, anonymity is God. But will this God truly protect them?

Source/s: http://www.nytimes.com/2011/07/20/technology/16-arrested-as-fbi-hits-the-hacking-group-anonymous.html?_r=1 http://en.wikipedia.org/wiki/Hack_(disambiguation)

Picture Source: advocacy.globalvoicesonline.org

Entry# 5

Mark Garrido