Hackers Breach the Web Site of Stratfor Global Intelligence

Total Page:16

File Type:pdf, Size:1020Kb

Hackers Breach the Web Site of Stratfor Global Intelligence Hackers Breach the Web Site of Stratfor Global Intelligence By NICOLE PERLROTH Published: December 25, 2011 While the rest of the world engaged in merriment and good cheer, hackers used the holidays to attack a United States research group that puts out a daily newsletter on security issues. Enlarge This Image Patrick Semansky/Associated Press Pfc. Bradley Manning, a suspect in information leaks. On Saturday, hackers who say they are members of the collective known as Anonymous claimed responsibility for crashing the Web site of the group, Stratfor Global Intelligence Service, and pilfering its client list, e-mails and credit card information in an operation they say is intended to steal $1 million for donations to charity. The hackers posted a list online that they say contains Stratfor’s confidential client list as well as credit card details, passwords and home addresses for some 4,000 Stratfor clients. The hackers also said they had details for more than 90,000 credit card accounts. Among the organizations listed as Stratfor clients: Bank of America, the Defense Department, Doctors Without Borders, Lockheed Martin, Los Alamos National Laboratory and the United Nations. The group also posted five receipts online that it said were of donations made with pilfered credit card details. One receipt showed a $180 donation from a United States Homeland Security employee, Edmund H. Tupay, to the American Red Cross. Another showed a $200 donation to the Red Cross from Allen Barr, a recently retired employee from the Texas Department of Banking. Neither responded to requests for comment. Mr. Barr told The Associated Press that on Friday he discovered that $700 had been transferred from his account to charities including the Red Cross, Save the Children and CARE, but that he had not been aware that the transfer was tied to a breach of Stratfor’s site. Stratfor executives did not return calls for comment on Sunday. In an e-mail to subscribers Sunday morning, Stratfor’s chief executive, George Friedman, confirmed that the company’s site had been hacked and said his company was working with law enforcement to track down the parties responsible. “We have reason to believe that the names of our corporate subscribers have been posted on other Web sites,” Mr. Friedman wrote in the e-mail. “We are diligently investigating the extent to which subscriber information may have been obtained.” The hackers took responsibility for the Stratfor attack on Twitter and said the attack would be the beginning of a weeklong holiday hacking spree. The breach was the latest in the online group’s ongoing campaign of computer attacks which, to date, has been aimed at MasterCard, Visa and PayPal as well as groups as diverse as the Church of Scientology, the Motion Picture Association of America and the Zetas, a Mexican crime syndicate. The breach first surfaced on Saturday when hackers defaced Stratfor’s Web site with their own message. “Merry Lulzxmas!” the group wrote in a reference to Lulz Security, a hacking group loosely affiliated with Anonymous. “Are you ready for a week of mayhem?” By Sunday afternoon, the message had been replaced with a banner message that said: “Site is currently undergoing maintenance. Please check back soon.” According to the hackers’ online postings, the group voted on what charities to contribute to. Among their choices were cancer and AIDS research, the American Red Cross, WikiLeaks and the Tor Project, a software that enables online anonymity. Also according to their postings, the breach appears to have been conducted in retaliation for the arrest and imprisonment of Pfc. Bradley Manning, the Army intelligence analyst on trial on charges of leaking classified intelligence information and more than 250,000 diplomatic cables to WikiLeaks last year. The attack was also likely intended to embarrass Stratfor, which specializes in intelligence and security. The hackers said they were able to obtain the credit card details because, they said, Stratfor had failed to encrypt them. “The scary thing is that no matter what you do, every system has some level of vulnerability,” says Jerry Irvine, a member of the National Cyber Security Task Force. “The more you do from an advanced technical standpoint, the more common things go unnoticed. Getting into a system is really not that difficult.” .
Recommended publications
  • Sample Iis Publication Page
    https://doi.org/10.48009/1_iis_2012_133-143 Issues in Information Systems Volume 13, Issue 1, pp. 133-143, 2012 HACKERS GONE WILD: THE 2011 SPRING BREAK OF LULZSEC Stan Pendergrass, Robert Morris University, [email protected] ABSTRACT Computer hackers, like the group known as Anonymous, have made themselves more and more relevant to our modern life. As we create and expand more and more data within our interconnected electronic universe, the threat that they bring to its fragile structure grows as well. However Anonymous is not the only group of hackers/activists or hacktivists that have made their presence known. LulzSec was a group that wreaked havoc with information systems in 2011. This will be a case study examination of their activities so that a better understanding of five aspects can be obtained: the Timeline of activities, the Targets of attack, the Tactics the group used, the makeup of the Team and a category which will be referred to as The Twist for reasons which will be made clear at the end of the paper. Keywords: LulzSec, Hackers, Security, AntiSec, Anonymous, Sabu INTRODUCTION Information systems lie at the heart of our modern existence. We deal with them when we work, when we play and when we relax; texting, checking email, posting on Facebook, Tweeting, gaming, conducting e-commerce and e- banking have become so commonplace as to be nearly invisible in modern life. Yet, within each of these electronic interactions lies the danger that the perceived line of security and privacy might be breached and our most important information and secrets might be revealed and exploited.
    [Show full text]
  • JULIAN ASSANGE: When Google Met Wikileaks
    JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton...
    [Show full text]
  • Stratfor: “US Aims to Prevent a German-Russian Alliance”
    Stratfor: “US aims to prevent a German-Russian alliance” By Eric Zuesse Region: Europe, Russia and FSU Global Research, March 18, 2015 Theme: Intelligence, US NATO War Agenda Deutsche Wirtschafts Nachrichten The head of the private intelligence agency Stratfor has for the first time publicly said that the US government considers to be its overriding strategic objective the prevention of a German-Russian alliance. Blocking that alliance is the only way to prevent an alternative world power capable of challenging extension of the American position of being the world’s lone superpower. [In this video, he says that the U.S. will fail in that overriding objective; German technology and capital will combine with Russian natural resources and “land-power,” to produce a truly bipolar world: U.S. v. Eurasia. So: he sees the U.S. strategy as being to block that, by weakening both Germany and Russia. That strategy would explain what Obama is doing in Ukraine, and the sanctions that are hurting both Russia and Germany, but Friedman thinks that nothing can work.] Background: The American political scientist George Friedman is chief of intelligence think tank “Stratfor Global Intelligence”, which he founded in 1996. The headquarters of Stratfor is located in Texas. Stratfor advises 4,000 companies, individuals and governments around the world, reports the New York Times. These include Bank of America, the US State Department, Apple, Microsoft and Lockheed Martin, Monsanto and Cisco, on security issues. In December 2011 there was a hacker attack on the computer system of Stratfor. Then 90,000 names, addresses, credit card numbers, passwords Stratfor clients were published.
    [Show full text]
  • Terrorist and Organized Crime Groups in the Tri-Border Area (Tba) of South America
    TERRORIST AND ORGANIZED CRIME GROUPS IN THE TRI-BORDER AREA (TBA) OF SOUTH AMERICA A Report Prepared by the Federal Research Division, Library of Congress under an Interagency Agreement with the Crime and Narcotics Center Director of Central Intelligence July 2003 (Revised December 2010) Author: Rex Hudson Project Manager: Glenn Curtis Federal Research Division Library of Congress Washington, D.C. 205404840 Tel: 2027073900 Fax: 2027073920 E-Mail: [email protected] Homepage: http://loc.gov/rr/frd/ p 55 Years of Service to the Federal Government p 1948 – 2003 Library of Congress – Federal Research Division Tri-Border Area (TBA) PREFACE This report assesses the activities of organized crime groups, terrorist groups, and narcotics traffickers in general in the Tri-Border Area (TBA) of Argentina, Brazil, and Paraguay, focusing mainly on the period since 1999. Some of the related topics discussed, such as governmental and police corruption and anti–money-laundering laws, may also apply in part to the three TBA countries in general in addition to the TBA. This is unavoidable because the TBA cannot be discussed entirely as an isolated entity. Based entirely on open sources, this assessment has made extensive use of books, journal articles, and other reports available in the Library of Congress collections. It is based in part on the author’s earlier research paper entitled “Narcotics-Funded Terrorist/Extremist Groups in Latin America” (May 2002). It has also made extensive use of sources available on the Internet, including Argentine, Brazilian, and Paraguayan newspaper articles. One of the most relevant Spanish-language sources used for this assessment was Mariano César Bartolomé’s paper entitled Amenazas a la seguridad de los estados: La triple frontera como ‘área gris’ en el cono sur americano [Threats to the Security of States: The Triborder as a ‘Grey Area’ in the Southern Cone of South America] (2001).
    [Show full text]
  • Russia: Background and U.S. Policy
    Russia: Background and U.S. Policy Cory Welt Analyst in European Affairs August 21, 2017 Congressional Research Service 7-5700 www.crs.gov R44775 Russia: Background and U.S. Policy Summary Over the last five years, Congress and the executive branch have closely monitored and responded to new developments in Russian policy. These developments include the following: increasingly authoritarian governance since Vladimir Putin’s return to the presidential post in 2012; Russia’s 2014 annexation of Ukraine’s Crimea region and support of separatists in eastern Ukraine; violations of the Intermediate-Range Nuclear Forces (INF) Treaty; Moscow’s intervention in Syria in support of Bashar al Asad’s government; increased military activity in Europe; and cyber-related influence operations that, according to the U.S. intelligence community, have targeted the 2016 U.S. presidential election and countries in Europe. In response, the United States has imposed economic and diplomatic sanctions related to Russia’s actions in Ukraine and Syria, malicious cyber activity, and human rights violations. The United States also has led NATO in developing a new military posture in Central and Eastern Europe designed to reassure allies and deter aggression. U.S. policymakers over the years have identified areas in which U.S. and Russian interests are or could be compatible. The United States and Russia have cooperated successfully on issues such as nuclear arms control and nonproliferation, support for military operations in Afghanistan, the Iranian and North Korean nuclear programs, the International Space Station, and the removal of chemical weapons from Syria. In addition, the United States and Russia have identified other areas of cooperation, such as countering terrorism, illicit narcotics, and piracy.
    [Show full text]
  • Wikileaks and the Problem of Anonymity: a Network Control Perspective Rita Zajacz, University of Iowa
    WikiLeaks and the problem of anonymity: a network control perspective Rita Zajacz, University of Iowa WikiLeaks and the problem of anonymity: A network control perspective *This is the accepted version of the article published in the May, 2013 edition of Media, Culture and Society 35 (4): 487 - 503. Between July and November of 2010, WikiLeaks, a shoestring operation dedicated to disseminating confidential information, made available thousands of documents from a trove of half a million confidential U.S. military and diplomatic papers. Subsequently, restrictive measures were imposed to prevent the organization from releasing further information deemed damaging to the United States. Academics, journalists and activists criticized the United States because of the incongruity between these apparent retaliations and Secretary of State Hillary Rodham Clinton’s criticism of authoritarian state suppression of Internet freedom in February 2010. This article picks up on that line of commentary that viewed the United States as acting like all states – authoritarian or otherwise - in the international system, and seeks to develop the concept of ‘network control’ to help us understand state objectives and the challenges they face in securing control over the global communications infrastructure. Control over territory is the state’s domain and it is fully realized when legal claims to sovereignty are backed up by economic and/or military might. Global communications networks have long posed a challenge to territorial control and the WikiLeaks case is but one contemporary example. The case highlights anonymity as the crucial technological obstacle in the 21st century to control over the global Internet. While the public telephone network was designed to identify the source of telephone messages and unidentified radio communications were outlawed early on, anonymity is the norm on the Internet.
    [Show full text]
  • 1 David Kaye UN Special Rapporteur on the Promotion and Protection Of
    David Kaye UN Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression Office of the High Commissioner for Human Rights Geneva, Switzerland 22 June 2015 Submission to the study on the protection of sources and whistleblowers Dear Mr Kaye, Thank you for providing WikiLeaks with the opportunity to contribute to the consultation on protection of sources and whistleblowers and to offer recommendations based on our experience in this area. We are hoping that you find our submission useful in the preparation of your 2015 report to the UN General Assembly. We also accept that this submission may be posted on the web page of the Office of the High Commissioner for Human Rights. If you have any questions about the issues discussed in this submission or you require any additional information, do not hesitate to contact us. We wish you success in your mission. Yours sincerely, Julian Assange Editor-­‐in-­‐chief of WikiLeaks Care of Embassy of Ecuador in London 3 Hans Crescent Knightsbridge London SW1X 0LS United Kingdom Email: [email protected] 1 Submission of WikiLeaks to the study on the protection of sources and whistleblowers Consultation by the UN Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression June 2015 About WikiLeaks WikiLeaks is a not-­‐for-­‐profit media organisation, established in 2006, that aims to bring important news and information to the public. WikiLeaks provides an innovative, secure and anonymous way for sources to supply information to us through our electronic dropbox which, in return, enables us to publish important information in the form of original source material.
    [Show full text]
  • Trump's Foreign Policies Are Better Than They Seem
    Council Special Report No. 84 April 2019 Trump’s Foreign Policies Are Better Than They Seem Robert D. Blackwill The Council on Foreign Relations (CFR) is an independent, nonpartisan membership organization, think tank, and publisher dedicated to being a resource for its members, government officials, business executives, journalists, educators and students, civic and religious leaders, and other interested citizens in order to help them better understand the world and the foreign policy choices facing the United States and other countries. Founded in 1921, CFR carries out its mission by maintaining a diverse membership, with special programs to promote interest and develop expertise in the next generation of foreign policy leaders; convening meetings at its headquarters in New York and in Washington, DC, and other cities where senior government officials, members of Congress, global leaders, and prominent thinkers come together with Council members to discuss and debate major international issues; supporting a Studies Program that fosters independent research, enabling CFR scholars to produce articles, reports, and books and hold roundtables that analyze foreign policy issues and make concrete policy recommendations; publishing Foreign Affairs, the preeminent journal on international affairs and U.S. foreign policy; sponsoring Independent Task Forces that produce reports with both findings and policy prescriptions on the most important foreign policy topics; and providing up-to-date information and analysis about world events and American foreign policy on its website, CFR.org. The Council on Foreign Relations takes no institutional positions on policy issues and has no affiliation with the U.S. government. All views expressed in its publications and on its website are the sole responsibility of the author or authors.
    [Show full text]
  • Twitter Follows Chain Gang
    Twitter Follows Chain Gang Donate for the Cryptome archive of files from June 1996 to the present 15 October 2013 Twitter Follows Chain Gang Until today Cryptome has followed nobody on Twitter to avoid contaminating them. Starting with a single follow of John Perry Barlow, Cryptome followed all those suggested by Twitter for twenty degrees of separation, a machinic-dispensed chain of 278 follows, gradually decreasing to a single suggestion. Beginning with suggested follows slightly similar to Cryptome, the separations slowly degenerated into distant dissimilarities, toward the end into a heavy dose of famous celebrities and giant firms like Google, Facebook, Microsoft and their employees, consultants and investors. Then, exhausting the paid promotional crowd, there were a few desparate suggestions of those little connected to anything prededing follows, ending with, for no clear reason, and could have been any innocent, the estimable Shawn Wildermuth. John, meet Shawn, now chain-ganged with Cryptome and 276 contaminateds, which, if all has gone according to Twitter's promotional plan for IPO, will be, by diabolically devious degrees of in-separation, chain-ganged with all its follows and followers into abject servitude, stored at the Library of Congress for chain-linking whoever the spying advertizers for the national security state must collar for inescapability. 278 follows in reverse order of chaining: file:///C|/following/twitter-chain-gang.htm[10/15/2013 9:12:57 AM] Cryptome (Cryptomeorg) on Twitter Tweets Following Followers Favorites Cryptome Lists @Cryptomeorg New York, New York · cryptome.org Who to follow · Refresh Tim Heuer @timheuer Follow 22 278 6,159 1 Edit profile carlfranklin @carlfranklin TWEETS FOLLOWING FOLLOWERS Follow Jesse Liberty @JesseLiberty Follow Following Find more suggestions Shawn Wildermuth @ShawnWildermuth Following Author, trainer, software guy, Braves fan, guitar player, Xbox maven, coffee addict and Trends · Change astronomy fan.
    [Show full text]
  • Hacktivism: an Analysis of the Motive to Disseminate
    HACKTIVISM: AN ANALYSIS OF THE MOTIVE TO DISSEMINATE CONFIDENTIAL INFORMATION THESIS Presented to the Graduate Council of Texas State University-San Marcos in Partial Fulfillment of the Requirements for the Degree Master of SCIENCE by Warren V. Held, B.A. San Marcos, TX December 2012 HACKTIVISM: AN ANALYSIS OF THE MOTIVE TO DISSEMINATE CONFIDENTIAL INFORMATION Committee Members Approved: ______________________________ Jay D. Jamieson, Chair ______________________________ J. Pete Blair ______________________________ Jeffrey M. Cancino Approved: ____________________________ J. Michael Willoughby Dean of the Graduate College COPYRIGHT by Warren V. Held 2012 FAIR USE AND AUTHOR’S PERMISSION STATEMENT Fair Use This work is protected by the Copyright Laws of the United States (Public Law 94-553, section 107). Consistent with fair use as defined in the Copyright Laws, brief quotations from this material are allowed with proper acknowledgment. Use of this material for financial gain without the author’s express written permission is not allowed. Duplication Permission As the copyright holder of this work I, Warren V. Held, authorize duplication of this work, in whole or in part, for educational or scholarly purposes only. ACKNOWLEDGEMENTS I would like to thank the family members, friends, professors, and others who have lent support, assistance, and guidance throughout the course of my education. This manuscript was submitted on October 26th, 2012. v TABLE OF CONTENTS Page ACKNOWLEDGEMENTS ...............................................................................................
    [Show full text]
  • Independent Assessment of U.S. Government Efforts Against Al- Qaeda Julia Mcquaid, Jonathan Schroden, Pamela G
    Independent Assessment of U.S. Government Efforts against Al- Qaeda Julia McQuaid, Jonathan Schroden, Pamela G. Faber, P. Kathleen Hammerberg, Alexander Powell, Zack Gold, David Knoll, and William Rosenau October 2017 DISTRIBUTION STATEMENT A. Approved for public release: distribution unlimited. This document contains the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the sponsor. Distribution DISTRIBUTION STATEMENT A. Approved for public release: distribution unlimited. SPECIFIC AUTHORITY: N00014-16-D-5003 10/25/2017 Photography Credit: Cover photo compiled by CNA. Sourcing available upon request. Approved by: October 2017 Dr. Eric V. Thompson, Director and VP Center for Strategic Studies Copyright © 2017 CNA Abstract Section 1228 of the 2015 National Defense Authorization Act (NDAA) states, “The Secretary of Defense, in coordination with the Secretary of State and the Director of National Intelligence, shall provide for the conduct of an independent assessment of the effectiveness of the United States’ efforts to disrupt, dismantle, and defeat Al- Qaeda, including its affiliated groups, associated groups, and adherents since September 11, 2001.” The Assistant Secretary of Defense for Special Operations/Low Intensity Conflict (ASD (SO/LIC)) asked CNA to conduct this independent assessment, the results of which are presented in this report. i This page intentionally left blank. ii Executive Summary Section 1228 of the 2015 National Defense Authorization Act (NDAA) states, “The Secretary of Defense, in coordination with the Secretary of State and the Director of National Intelligence, shall provide for the conduct of an independent assessment of the effectiveness of the United States’ efforts to disrupt, dismantle, and defeat Al- Qaeda, including its affiliated groups, associated groups, and adherents since September 11, 2001.” The Assistant Secretary of Defense for Special Operations/Low Intensity Conflict (ASD (SO/LIC)) asked CNA to conduct this independent assessment.
    [Show full text]
  • Google Met Wikileaks Is the Transcript of the Discussion in Book Form
    BEYOND GOOD AND “DON’T BE EVIL” Eric Schmidt is an influential figure, even among the parade of powerful characters with whom I have had to cross paths since I founded WikiLeaks. In mid-May 2011 I was under house arrest in rural Norfolk, about three hours’ drive northeast of London. The crackdown against our work was in full swing and every wasted moment seemed like an eternity. It was hard to get my attention. But when my colleague Joseph Farrell told me the executive chairman of Google wanted to make an appointment with me, I was listening. In some ways the higher echelons of Google seemed more distant and obscure to me than the halls of Washington. We had been locking horns with senior US officials for years by that point. The mystique had worn off. But the power centers growing up in Silicon Valley were still opaque and I was suddenly conscious of an opportunity to understand and influence what was becoming the most influential company on earth. Schmidt had taken over as CEO of Google in 2001 and built it into an empire. I was intrigued that the mountain would come to Muhammad. But it was not until well after Schmidt and his companions had been and gone that I came to understand who had really visited me. *** The stated reason for the visit was a book. Schmidt was penning a treatise with Jared Cohen, the director of Google Ideas, an outfit that describes itself as Google’s in-house “think/do tank.” I knew little else about Cohen at the time.
    [Show full text]