Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Hackers leap from dark basements to world stage
by Staff Writers
San Francisco (AFP) Oct 10, 2014


Son of Russian lawmaker faces new hacking charges
Washington (AFP) Oct 09, 2014 - A Russian national arrested this year by US officials was indicted on additional hacking charges, alleging he led a scheme to steal some two million credit card numbers, officials said.

Roman Valerevich Seleznev, the 30-year-old son of a Russian lawmaker, now faces 40 criminal counts including wire fraud and identity theft, the Justice Department said in a statement Thursday.

The superseding indictment returned late Wednesday by a grand jury in Seattle, Washington, offered more details on the alleged scheme to create an underground network to facilitate the theft and sales of credit card data.

Seleznev was arrested in July, to face charges in a prior indictment.

Seleznev and his partners hacked into computer payment systems and stole credit card numbers from dozens of retailers in Seattle and other cities around the United States, prosecutors alleged.

The numbers were then sold on "dump shop websites" which facilitate sales of stolen credit card information.

"The additions in this superseding indictment show how cybercriminals use the Internet not only to infiltrate and steal sensitive data, but also to teach other criminals how to navigate the credit-card selling underworld and get equipment that can be used to defraud US citizens," said Assistant Attorney General Leslie Caldwell.

Seleznev is currently scheduled for trial on November 3 and will be arraigned on the new charges sometime next week, officials said. He faces additional charges in Nevada.

Acting US Attorney Annette Hayes said that Seleznev "was a leader in the marketplace for stolen credit card numbers, and even created a website offering a tutorial on how to use stolen credit card numbers to commit crime."

In July, Moscow accused Washington of abducting Seleznev from the Maldives, in a further strain on US-Russia relations.

The State Department countered that there was "no kidnapping involved" in the arrest.

Hackers are shaking off their reputations as nerdy, loner basement dwellers and rebranding themselves on the world stage as members of Internet age tribes with offbeat codes of conduct and capricious goals.

Clans of hackers such as Anonymous, LulzSec and Lizard Squad have caused havoc -- and made news -- in recent years, but the legacy of the online community stretches back decades.

"People think of hackers as non-social people who live in the basement; that is not true at all," said Nico Sell, chief executive of the encrypted messaging service Wickr and the longtime organizer of the DEF CON hacking conference.

"To be good at hacking, you have to understand how society and people work. These geeks are not your normal geeks."

Rebels united by their hacking prowess and identified by sassy pseudonyms have been divided into "white hat" groups that use software skills for good and their "black hat" rivals intent on anything from pranks and political upheaval to espionage or crimes of profit.

Hackers share their stories and skills at forums like DEF CON and in Internet chat venues such an privacy-guarding 4Chan, according to Gabriella Coleman, who holds the Wolfe Chair in Scientific and Technological Literacy at McGill University in Canada.

"There are many reasons one can call hackers a community," said Coleman, whose book "Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous" will be released in November.

"One layer is just their craft: they are building stuff or breaking stuff. The technology is so complex you rely on the help of others to get things done in a serious way," she told AFP.

Next year will mark the 23rd annual DEF CON gathering in Las Vegas. The event -- considered the world's biggest hacker conference -- was started by Jeff Moss, known by the handle Dark Tangent, as a farewell party for a hacker friend about to leave the country.

- Valuing craftiness, humor -

In hacker groups such as Anonymous, amazing code or stunning exploits are revered and personal glory-seeking abhorred, according to Coleman.

Humor -- cracking jokes, pulling pranks and even embedding jokes in source code -- is common.

"There is a love of craftiness and cleverness, and displaying it is a marker defining their identity and binding them together," Coleman said.

Ritualized ways of displaying humility in hacker tribes include leaving it to others to brand one a hacker -- never taking the name for oneself. There is a high value placed on weirdness.

Taboos include being an informant. DEF CON has long had a "Spot The Fed" game with prizes to those who finger undercover police infiltrating the gathering.

Working for the computer security industry is not frowned on, but doing shoddy work certainly is.

The pseudo-anonymous nature of Anonymous allows for a diverse array of people to belong -- some in roles with nothing to do with coding, such as tweeting, making videos or organizing rallies.

"There are people from radically different classes and ethnic backgrounds, and a strong ethic not to seek fame and recognition for your actions is heavily enforced," Coleman said.

- From 'trolling' to activism -

Coleman traced the roots of Anonymous to 4Chan, where bonds forged over sharing the funny, offensive or grotesque grew from "trolling" to underground activism.

"There is a sense of being in the trenches together, battling," Coleman said.

Anonymous evolved into a platform for launching political operations, with high-value targets related to censorship, corruption and privacy.

The group "was known for pranking and hell-raising, and now it is known for activism," Coleman said.

It combined technical prowess with Hollywood presentation, and adopted the Guy Fawkes mask -- seen in the film "V for Vendetta" -- as its symbol.

Hackers often run in groups but tend to be a giving community -- as apt to teach visitors to pick locks or create educational games as they are to hack a major firm's network to prove it is flawed.

"You don't have the same posturing you do in other societies, because you are judged on your merits," Sell said.

"The rock stars are the ones who have brought great things to everybody -- for free."

DEF CON hacker creed includes not hurting anyone needlessly, and giving software makers time to patch chinks in their armor before making vulnerabilities public.

"Hackers don't always follow the rules, but that is different from having integrity and ethics," Sell said.

Defenders of the hacker culture maintain a defining credo is to push systems until they break and then find compelling new ways to put them back together.

Facebook co-founder Mark Zuckerberg made the hacker mindset a theme at the leading social network's campus in Silicon Valley, where the street address is One Hacker Way.

China court moves to tighten grip over 'disorderly Internet'
Beijing (AFP) Oct 10, 2014 - China's top court is putting pressure on Internet service providers to provide the personal details of Web users suspected of "rights violations", state media said Friday.

The move by the Supreme People's Court, outlined in a judicial guideline issued Thursday, is the latest effort by the Communist Party to exert control over China's popular online social networks.

According to the state-run China Daily newspaper, the country's highest court is also moving to curb paid Internet postings and deletions -- tactics that Beijing itself employs in seeking to "guide public opinion" and tamp down on dissent.

"Some posters, as well as workers at network service providers, often use their computer skills to make money, and that leads to a disorderly Internet," court spokesman Sun Jungong told the paper.

Personal information such as home addresses, health conditions and crime records must also not be posted online, the paper said, although it did not give further details.

China maintains a tight grip on information, with the media controlled by the government and online social networks subject to heavy censorship.

Hundreds of bloggers and journalists have since last year been rounded up in a government-backed campaign against "Internet rumours".

According to the official Xinhua news agency, the Supreme People's Court has called for the punishment of Internet service providers that refuse to hand over the real names, IP addresses and other information of users who have committed "rights violations".

The court also deemed that well-known Internet commenters -- dubbed "Big Vs" -- will be held to a higher standard than ordinary online posters.

"If you are a verified celebrity, your obligations when re-posting online information are greater than those of the general public," senior SPC judge Yao Hui told Xinhua.

In addition to legions of censors, Chinese authorities employ "wu mao" (50-cent) web commenters paid by the message to spread the official party line.

In 2010, the state-run Global Times newspaper reported that Gansu province alone was looking to recruit 650 full-time web commentators "to guide public opinion on controversial issues".

Private companies that seek to do the same, however, will be punished according to the new court regulation.

Such paid Internet postings "can boost reputations by creating the impression that the online voices are genuine, when in truth the voices are purchased," the China Daily reported.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
Twitter sues US to disclose more on secret data orders
Washington (AFP) Oct 07, 2014
Twitter sued the US government Tuesday, claiming its free speech rights are being violated by restrictions on its ability to disclose numbers of secret orders to hand over user data. The lawsuit filed in California steps up the battle between the tech sector and US authorities over how much information may be disclosed about vast electronic surveillance in the name of national security. ... read more


CYBER WARS
Solving the mystery of the 'man in the moon'

Origin of moon's 'ocean of storms' revealed

'Man in the Moon' was born from lava - scientists

Turning the Moon into a cosmic ray detector

CYBER WARS
US, India to Collaborate on Earth, Mars Missions

NYT says it's sorry for cartoon mocking India's Mars mission

Four candidate landing sites for ExoMars 2018

Europe shortlists four sites for 2019 Mars mission

CYBER WARS
Club Med board recommends Chinese firm Fosun's new bid

"Dream Chaser" Chases Its Dream

This company is fighting NASA to bring people to space

Virgin Galactic could soon begin trips to space

CYBER WARS
China Successfully Orbits Experimental Satellite

China's first space lab in operation for over 1000 days

China Exclusive: Mars: China's next goal?

Astronauts eye China's future space station

CYBER WARS
Alexander Gerst set for spacewalk

Expedition 41 Preps for First of Three October Spacewalks

Station Crew Checks Out Spacesuits, Conducts Research

NASA Expands Commercial Space Program

CYBER WARS
Europe sat-nav launch glitch linked to frozen pipe

Proton Failure Review Board Concludes Investigation

Arianespace's lightweight Vega launcher is readied for its mission with the European IXV spaceplane

Soyuz Rocket Awaiting Launch at Baikonur Cosmodrome

CYBER WARS
New milestone in the search for water on distant planets

Clear skies on exo-Neptune

Distant planet's atmosphere shows evidence of water vapor

Chandra Finds Planet That Makes Star Act Deceptively Old

CYBER WARS
Ecuador opens tender to acquire radars

Eradicating harmful impacts of manufacturing

New frontier in error-correcting codes

Space debris expert warns of increasing CubeSat collision risk




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.