Are these little “extras” for
subscribers(?) anything that concerns management? Perhaps they are
viewed as so trivial, so removed from 'journalism' that they are not
even monitored?
Globe
and Mail online classroom hacked – again and again? Wake up, Globe
and Mail!
November 28, 2011 by admin
Well, I posted this to DataLossDB.org
the other day, but seem to have forgotten to have posted it here.
Globe and Mail, the
Canadian newspaper, had their online classroom site hacked
(globeclassroom.ca). The
hack was disclosed on Pastebin on November 22, at which time I
created an entry for it on DLDB. I then tried to notify Globe and
Mail’s online classroom site that over 600 users’ names, e-mail
addresses, clear-text passwords, job title, school, and school
contact details had been acquired and dumped on the Internet. They
did not respond to my courtesy notification, but one paste was
removed. Another
one, that I had missed, remained.
The removal triggered a response by a
hacker, who re-posted
the original paste and then pointed me to the the second data dump.
I dutifully updated the entry on DLDB.
But now, digging into things a bit
more, I see that this same site had been hacked back in July by a
hacker who identified himself as part of #AntiSec:
Hi! I’m sepo.
For today my target was http://globeclassroom.ca/.
It was hacked by a simple SQL Injection. All the data (login email,
password, first & second name, adress, school etc.) is dumped to
one of my virtual server’s. I was thinking about a deface, but
this wasn’t a good idea. Your sec sux! Your data can be stolen!
This is a part of #Antisec.
Expect us!
The database reportedly held 4,000
users’ data.
So the site was hacked back in July and
again in November. Does Globe and Mail even know?
How many hackers have to point out to them that their site is
insecure before they get the message? And how would all these users
feel if they knew that their passwords were out there with their
e-mail addresses?
Hacks like this one have become a
common occurrence this year, and it is disturbing that so many sites
that have been hacked do not seem to know it and do not check all
their e-mail when people do try to notify them.
Maybe if I tweet it?
Attention Ethical Hackers: To really
bring this home to judges in the US and Canada, I propose that we
create detailed dossiers on each judge. Now, they may find this
irritating so we don't want to have it traced back to us. We need an
alias. I know this Professor at the Law School...
http://www.pogowasright.org/?p=25942
Judges
out of touch on privacy issues, says Ontario privacy czar
November 28, 2011 by Dissent
Vito Pilieci reports:
Canadian judges
and politicians have grown too old and out of touch
with the reality of today’s digital world to be trusted
to make sound policy decisions, according to Ontario’s Privacy
Commissioner.
Speaking at the
Privacy & Information Security Congress 2011 conference in Ottawa
on Monday, Ann Cavoukian expressed her frustration
with recent judicial decisions that she believes trivialize Canadian
privacy rights.
Read more on Ottawa
Citizen
(Related) What say you, your honor?
No harm, no foul?
Courts
Grapple with Concept of “Harm” in Online Privacy Suits
November 28, 2011 by Dissent
Glenn G. Lammi is clearly not a fan of
the type of class action lawsuits we’ve been seeing on a weekly
basis:
The fundamental
legal principle that only those who have been “harmed” can sue in
U.S. courts is being put to the test by the ever-evolving, subjective
concept of “privacy” in the equally organic online world.
U.S. Supreme Court
rulings on so-called Article III standing reflect that a harm must be
1) concrete, particularized, actual, and imminent; 2) fairly
traceable to defendant’s actions; and 3) likely redressed by a
favorable decision. If a party fails to meet this test, the court
will dismiss the suit for lack of jurisdiction.
Plaintiffs’
lawyers, eager to add online privacy “violations” to their
lucrative book of business, have been advancing broad theories of
injury through class action lawsuits. Their claims of harm routinely
center around either emotional or economic injury. Those efforts so
far, with a few exceptions, have met resistance from federal judges.
Read more on Forbes.
I tend to agree with Glenn and think
that most of these lawsuits are misplaced. If we want to discourage
certain behavior, then we either withhold our business, try to effect
change, or punt to the legislature. While the costs of litigation
might dissuade businesses from engaging in certain conduct, for
monster companies like Facebook, it just becomes part of the cost of
doing business. In the meantime, we tend to clog up courts, and the
only ones who make any money are the lawyers.
What;s going on here? Does Twitter
need tools to break through corporate firewalls? (Send sensitive
data out from within?) I know of no reason they would need to shut
down their service – does anyone?
Twitter
Adds Team Who Created Privacy Tools for Activists, But Was it at the
Expense of Activists?
November 28, 2011 by Dissent
Amir Efrati reports:
Twitter on Monday
announced the acquisition of a two-person startup called Whisper
Systems, whose technology protected people’s mobile-phone calls and
text messages from being obtained by third parties such as
governments.
The deal terms
weren’t disclosed. The acquisition led to speculation about what
Twitter, an online-messaging service, might do with Whisper Systems
founders Moxie Marlinspike and Stuart Anderson–who are well-known
in computer security circles–and the technology they built
exclusively for devices running on Google’s Android software.
Whisper Systems
created a suite of services for human-rights activists or other
privacy-conscious individuals, which were used by activists during
the recent “Arab spring” actions. In a blog post, Marlinspike
and Anderson said the services they created will “live on” though
they had to temporarily shut them down.
Read more on WSJ.
Dan Goodin also covers the acquisition
on The
Register, and also covers concerns raised by privacy and security
research Chris Soghoian:
Twitter’s
acquisition of San Francisco-based Whisper Systems came on Monday,
the same day Egyptian citizens participated in their nation’s first
parliamentary elections since the ouster of Hosni Mubarak, whose
repressive regime ruled the country for three decades. That
means Egyptian dissidents who relied on Whisper Systems RedPhone to
encrypt voice calls made with their Android smartphones abruptly lost
the ability to protect calls from government-controlled eavesdroppers
at a time they might need it most.
It was only nine
months ago that Whisper Systems said it was rushing out an
international version of the encryption software to support the
historic protests that were then sweeping the African nation’s
populace.
“The
timing is atrocious,” said Chris Sogohian, a privacy
researcher with the Open Society Foundations. “Today is Egypt’s
first election after it threw out its old regime, and the only
encrypted voice communication tool for Android goes dark. This
couldn’t have happened at a worse time for people in Egypt.”
I really wish Twitter would be more
forthcoming about its timing and its plans. I tend to give them the
benefit of doubt, but Chris has raised some pointed criticisms about
them – and not just over Whisper Systems. Chris has also publicly
challenged Twitter to make HTTPS the default connection. And again,
no response from Twitter. The same platform that fought to at least
notify its users about a court order to compel production of their
records seems to be falling behind its competitors in
terms of other privacy protections.
So, Twitter, because I use you and like
you, how about you agree to make HTTPS the default connection by
Christmas, and you explain how your acquisition of Whisper System and
its talented founders are going to benefit human rights activists,
privacy, and free speech.
(Related) Does Twitter take this
crackdown seriously enough to want a tool that hides their
interaction with users in Europe? Technology they could sell to the
other big Behavioral Advertising companies? And notice that the EU
Commission does not fully understand Facebook.
EU:
Facebook faces a crackdown on selling users’ secrets to advertisers
(updated)
November 28, 2011 by Dissent
This has the potential
to be huge.
Jason Lewis reports:
The European
Commission is planning to stop the way the website “eavesdrops”
on its users to gather information about their political opinions,
sexuality, religious beliefs – and even their whereabouts.
Using
sophisticated software, the firm harvests information from people’s
activities on the social networking site – whatever their
individual privacy settings – and make it available to advertisers.
However, following
concerns over the privacy implications of the practice, a new EC
Directive, to be introduced in January, will ban such targeted
advertising unless users specifically allow it.
Even though most
of the information it harvests is stored on computers in the USA, if
Facebook fails to comply with the new legislation it could face legal
action or a massive fine.
The move threatens
to damage Facebook’s plans to float on the Wall Street stock
exchange next year, by undermining the way it makes money.
Read more on The
Telegraph. Then contrast that to what happened here in the
Fourth Circuit when a judge ruled that Twitter users gave up some of
their privacy when they signed up for Twitter and accepted their TOS
and privacy policy. Of course, everyone other that judge knows that
no one really reads those policies, but that judge would probably
rule that Facebook users have consented to have their data sold to
advertisers – even if they didn’t understand or wade through
Facebook’s 4000 word policy.
Will EU do for Americans’ privacy
what the American Congress has failed to do and what businesses have
failed to do by self-regulation? We’ll have to wait and see.
Update: A report by
ReadWriteWeb
raises some questions about what will really be proposed in the EU
and how it might affect Facebook.
At some point, Big Brother will point
to Facebook and say, “You have volunteered to allow everything you
complain that I do!”
How
to stop Facebook from sharing your location
Facebook is at it again, releasing yet
another feature that I never had the opportunity to politely opt out
of: location sharing.
When Facebook
decided to withdraw efforts from its short-lived check-in
service, Places, it quickly implemented a more passive
location-sharing feature that doesn't even have a name. It's just
there. And it's creepy.
Now, every time you compose a post on a
mobile device or desktop computer, you'll see a light gray location
in the lower left of the status box.
Facebook sneakily grabs your location
via GPS or Wi-Fi router, and attaches it to your post, so your
friends can enjoy a more in-depth stalking experience.
“...and we shall name him Little
Brother.”
The
UK could get a Privacy Commissioner
November 28, 2011 by Dissent
Dave Neal reports:
The United Kingdom
could get a dedicated Privacy Commissioner, according to a tabled
discussion in the House of Lords.
We learned of the
tabled amendment via Privacy International, which pointed followers
towards the document on Twitter and told the INQUIRER that such a
change is needed in the UK, due to what is a poor data protection
situation for UK citizens.
“If successful,
the UK could have a real privacy regulator rather than a weak one
that merely oversees data protection,” it said.
Read more on The
Inquirer.
So let’s get this straight – they’d
have a data protection agency AND a privacy commissioner while over
on this side of the pond, we have neither?
This is just so depressing. And
infuriating.
Fighting certain doom? Granted it is
embarrassing. What's true and what's opinion based on hearsay? (I
doubt “everyone does it” and “It's not a big deal” are
sufficient for acquittal.)
Feds
Withholding Evidence Favorable to Bradley Manning, Lawyer Charges
The civilian lawyer for Bradley
Manning, the Army private who allegedly leaked tens of thousands of
classified U.S. government documents to WikiLeaks, is seeking to
question the severity of the leak by requesting the government’s
own internal damage assessments that reportedly contradict statements
that Manning irreparably damaged national security.
… Published information about the
various reports put them at odds with each other, Coombs notes. One
assessment conducted by the Defense Intelligence Agency concluded
that all of the information allegedly leaked was dated, represented
low-level opinions, or was already commonly known due to previous
public disclosures, while an official at another government office
indicated that the leaks had caused damage to national security.
… “The defense requests any
e-mail, report, assessment, directive, or discussion by — to the
Department of Defense concerning this case in order to determine the
presence of unlawful command influence,” the sentence reads.
At a press conference last week,
members of the Bradley Manning Support Network, which has raised
money for Manning’s defense, argued that public comments that
President Obama made earlier this year suggesting that Manning is
guilty constituted
illegal command influence on the military court from the nation’s
commander in chief.
Obama told an audience in April, “If
I was to release stuff, information that I’m not authorized to
release, I’m breaking the law.”
“I can’t imagine a juror who wants
to have a future in the military … going against the statement of
[guilty] made by his or her commander-in-chief,” said Kevin Zeese,
a legal advisor to the Bradley Manning Support Network.
… In order to make the case that
Manning wasn’t the only soldier to install unauthorized programs on
classified networks, Coombs requested forensic images of each
computer from the Tactical Sensitive Compartmented Information
Facility (T-SCIF) and the Tactical Operations Center (TOC) at Forward
Operating Base Hammer in Iraq, where Manning allegedly downloaded the
data that was passed to WikiLeaks. Coombs is hoping to prove “it
was common for soldiers to add unauthorized computer programs” to
government systems, that apparently helped the soldiers do their
work.
IT Governance Think this will catch
on?
"Thierry Breton, CEO of Atos,
Europe's Largest IT Company, wants
a 'zero email' policy to be in place in 18 months, arguing that
only 10 per cent of the 200 electronic
messages his employees receive per day on average turn out to be
useful, and that staff spend between 5-20 hours
handling emails every week. 'The email is no
longer the appropriate (communication) tool,' says
Breton. 'The deluge of information will be one of the most important
problems a company will have to face (in the future). It is time to
think differently.' Instead Breton wants staff at Atos to use
chat-type collaborative services inspired by social networking sites
like Facebook or Twitter as surveys
show that the younger generation have already all but scrapped email,
with only 11 per cent of 11 to 19 year-olds using it. For his part
Breton hasn't sent a work email in three years. 'If people want to
talk to me, they can come and visit me, call or send me a text
message. Emails
cannot replace the spoken word.'"
Might be interesting to play with...
"Free software activists have
released
a peer-to-peer search engine to take on Google, Yahoo, Bing and
others. The free, distributed search engine, YaCy,
takes a new approach to search. Rather than using a central server,
its search results come from a network of independent 'peers,' users
who have downloaded the YaCy software. The aim is that no
single entity gets to decide what gets listed, or in which order
results appear. 'Most of what we do on the Internet involves search.
It's the vital link between us and the information we're looking
for. For such an essential function, we cannot rely on a few large
companies and compromise our privacy in the process,' said Michael
Christen, YaCy's project leader."
Oh goodie, now I can research why my
Mother's ancestors were banished from Ireland.
British
Library scans 18th and 19th-Century newspapers
Four million pages of newspapers from
the 18th and 19th Centuries have been made available online by the
British Library.
… The archive is free to search,
but there is a charge for accessing the pages themselves.
What does Anatomy have to do with
Health Care? Isn't that all about Billing customers?
Monday, November 28, 2011
Eleven days ago I mentioned a free and
open Computer
Science 101 course being offered through Stanford University.
Today, through Open
Culture, I learned that Stanford is offering thirteen other free
and open online courses during the spring semester. One of the
courses that might be appropriate for high school juniors and seniors
interested in pursuing college programs in healthcare is an
introductory
anatomy course. The course description promises quizzes that
students can use for self-assessment and self-pacing through the
course.
Toys for my Ethical Hackers
"Although Barnes & Noble
receives a lot of credit from the slashdot community for standing
up to Microsoft and for allowing the nook to be so
easy to root, but perhaps Amazon
releasing the source
code to the Kindle will help it gain back supporters it lost
after remotely
removing ebooks."
No comments:
Post a Comment