As usual, nothing but creepy security news ...Microsoft took down Rustock botnet thanks to 67 year old counterfeit law ( NeoWin 2013-07-25 )
As it turns out, Microsoft found an interesting loophole in the laws of the US that allowed them to raid those locations. The Washington Post reports that a bill that was passed by Congress in 1946, the Lanham Act, does allow for equipment to be seized in a civil lawsuit if that hardware is being used for counterfeiting.
So what was being counterfeited by the Rustock botnet servers? Microsoft found out that its operators were sending out spam emails with a template that included Microsoft's then current logo. That was enough for the company to use the Lanham act to go after the botnet's operations. Email spam went down by over 24 percent worldwide just the day after the Rustock botnet was shut down.
Oh isn't that just wonderful. Just imagine how that same law can be used to completely stifle the First Amendment, especially the meme graphics containing a Microsoft logo or something.Exclusive: NSA pays £100m in secret funding for GCHQ ( UK Guardian 2013-08-01 )
The US government has paid at least £100m to the UK spy agency GCHQ over the last three years to secure access to and influence over Britain's intelligence gathering programmes.
The top secret payments are set out in documents which make clear that the Americans expect a return on the investment, and that GCHQ has to work hard to meet their demands. "GCHQ must pull its weight and be seen to pull its weight," a GCHQ strategy briefing said.
Use Britain as the black bag men, this let's them not get their hands dirty. Any two governments can use this theory, each having the other do the dirty work so they can say they are acting legally in their own country.The FBI can remotely activate laptop and Android microphones with spyware ( TechSpot 2013-08-02 )The FBI uses the microphone and camera on phones to spy on people ( NeoWin 2013-08-03 )
A report from the Wall Street Journal is claiming that, via unnamed sources, the FBI is doing just that, by tricking suspected criminals into clicking links that install malware on the device. An interesting tidbit of note is that the organization only uses this method on non-technical suspects; they fear that a computer expert would be able to identify and release details of the malware to the public.
Violating any and all computer tampering laws in the process. Our government now acts above the law and believes it is just peachy.FBI Taps Hacker Tactics to Spy on Suspects ( Wall Street Journal 2013-08-03 )
The FBI has been developing hacking tools for more than a decade, but rarely discloses its techniques publicly in legal cases.
Earlier this year, a federal warrant application in a Texas identity-theft case sought to use software to extract files and covertly take photos using a computer's camera, according to court documents. The judge denied the application, saying, among other things, that he wanted more information on how data collected from the computer would be minimized to remove information on innocent people.
Mr. Soghoian, who is presenting on the topic Friday at the DefCon hacking conference in Las Vegas, said information about the practice is slipping out as a small industry has emerged to sell hacking tools to law enforcement. He has found posts and resumes on social networks in which people discuss their work at private companies helping the FBI with surveillance.
More examples, and remember that this is not even the black budget spook agencies. This is the Department of Justice! I'm gonna have to break out the "24" and "Alias" DVD's and watch them once gain. When they ran from about 2001 to 2008 or so we had no idea it might be real. In fact we doubted it would ever get to that point. Who doubts it now?( Original Photo Here )
Edited by CharlotteTheHarlot, 04 August 2013 - 01:38 AM.