Users connecting from Senate, Navy, and Executive Branch computers bragged about ‘wins,’ or nonconsensual nude photos, posted on Anon-IB, a revenge-porn epicenter.
Joseph Cox reports: Revenge porn, where people share intimate images of others in order to intimidate, harass, or embarrass, is rampant. Now, data obtained by a security analyst and shared with The Daily Beast reveals the behind-the-scenes of the epicenter of revenge porn: a notorious image board called Anon-IB, where users constantly upload non-consensual imagery, comment on it, and trade nudes like baseball cards.
The data shows Anon-IB users connecting from U.S. Senate, Navy, and other government computers, including the Executive Office of the President, even as senators push for a bill that would further combat the practice, and after the military’s own recent revenge-porn crisis.
“Wow tig ol bitties. You have any nudes to share?” someone wrote in November, underneath a photo of a woman who apparently works in D.C., while connecting from an IP address registered to the U.S. Senate.
Anon-IB is a free-to-use message board where users post images, typically of women, and which is split into various genre or location sections. Some parts are focused on countries, while U.S. sections may narrow down to a state. Many users pursue so-called wins, which are nude or explicit photos, and may egg each other on to share more images. Anon-IB was also intertwined with a 2014 breach of celebrity nudes referred to as The Fappening.
“Looking for wins of [redacted]. She used to send nudes to my friend all of the time. Would love to see some more,” someone connecting from the U.S. Senate IP address wrote last August.
Whoever is connecting from the Senate appears to have a particular focus on Anon-IB’s so-called Xray section, where users post photos so others can alter the image to make the women appear naked or wearing more revealing clothes, with several Xray posts linked to the Senate. Other posts asked for help from other Anon-IB members editing a photo in this way, including one of a girl the poster says they went to college with. In another message, someone connecting from the Senate shared an image of a model, and identified where they allegedly went to college, likely in the hope that others could dig up more images of the woman. Read the rest of this entry »
The massive siege on Dyn, a New Hampshire-based company that monitors and routes Internet traffic, shows those ominous predictions are now a reality.
“The complexity of this attack is because it’s so distributed. It’s coming from tens of millions of source IP addresses that are globally distributed around the world. What they’re doing is moving around the world with each attack.”
An unknown attacker intermittently knocked many popular websites offline for hours Friday, from Amazon to Twitter and Netflix to Etsy. How the breach occurred is a cautionary tale of the how the rush to make humdrum devices “smart” while sometimes leaving out crucial security can have major consequences.
Dyn, a provider of Internet management for multiple companies, was hit with a large-scale distributed denial of service attack (DDoS), in which its servers were flooded with millions of fake requests for information, so many that they could no longer respond to real ones and crashed under the weight.
Who orchestrated the attack is still unknown. But how they did it — by enslaving ordinary household electronic devices such as DVRs, routers and digital closed-circuit cameras —is established.
The attackers created a digital army of co-opted robot networks, a “botnet,” that spewed millions of nonsense messages at Dyn’s servers. Like a firehose, they could direct it at will, knocking out the servers, turning down the flow and then hitting it full blast once again.
The specific weapon? An easy-to-use botnet-creating software called Mirai that requires little technical expertise. An unknown person released it to the hacker underground earlier this month, and security experts immediately warned it might come into more general use.
Mirai insinuates itself into household devices without the owner’s knowledge, using them as platforms to send the sever-clogging messages even as the device continues to do its day job for its true owner. Read the rest of this entry »
Alexander, who lives in Dobbs Ferry, was charged with felony counts of promoting a sexual performance by a child and possessing an obscene sexual performance by a child after allegedly file-sharing “illegal and obscene performances of sexual conduct by children less than 17 years of age.”
According to the press release from the DA’s office, the office began its investigation July 24 after determining that the IP address associated with the illegal activity was assigned to Alexander’s home.
July 29, 2015 — Westchester County District Attorney Janet DiFiore announced that Jason Alexander (DOB 04/07/64) of 42 Bellair Dr., Dobbs Ferry, New York, was charged today by Felony Complaint with:
- one count of Promoting a Sexual Performance by a Child, a class “D” Felony,
- one count of Possessing an Obscene Sexual Performance by a Child, a class “E” Felony,
for possessing and file-sharing illegal and obscene performances of sexual conduct by children less than seventeen years of age.
On July 24, 2015, an investigator from the Westchester County District Attorney’s Office downloaded child pornography from an IP (internet protocol) address in Westchester County.
The District Attorney’s Office began its investigation and pursuant to a subpoena, it was determined that the IP address was assigned to the defendant’s home.
A search warrant was subsequently executed at the defendant’s home address.
A forensic examination of computers and external hard drives removed from the location revealed digital files of children who are less than sixteen years of age engaged in child pornography.
The defendant was arraigned in Dobbs Ferry Village Court.
Bail was set at $10,000 cash. Read the rest of this entry »
Nina Culver reports:A Cheney man is accused of entering his ex-girlfriend’s Liberty Lake home last month, burning several items and secretly installing a wireless camera to spy on her in her bedroom.
“It was streaming live…It was very well hidden.”
— Liberty Lake police Chief Brian Asmus
The ex-girlfriend called Liberty Lake police on March 27 to report coming home to find several items that Jeremy F. Alvis, 41, had given her while they were dating burned in the backyard fire pit. Other items he had purchased for her were piled on her bed with his photo placed above them, according to court records.
“The woman called police again March 31 to report finding a camera hidden in a light fixture above her bed. She said she was suspicious that Alvis was spying on her and asked a friend with computer skills to check her home.”
Alvis is facing charges of residential burglary, malicious mischief and voyeurism in connection with the incident. He was released on his own recognizance after a brief court appearance Wednesday. His attorney, Mark Hodgson, said in court that the allegations were “salacious” and his client has no criminal history. State records indicate that Alvis is the owner of Vertical Works LLC, a landscaping company, and applied for a marijuana producer license with the state Liquor Control Board. That application still is pending.
“The friend found evidence that a device was hooked up to her home computer’s Wi-Fi.”
The ex-girlfriend told police that Alvis had a key to her home and when she asked for it back after they broke up he claimed to have lost it. A neighbor told police that he saw Alvis leave the home March 27 carrying a mattress pad that was missing from the bed, according to court documents. Read the rest of this entry »
For TechCrunch, Darrell Etherington reports: Twitter has just announced that it has formally joined the cause of those defending use of its service in Turkey, by filing petitions for lawsuits in a number of Turkish courts after working with its Turkish attorney over the course of the past few days. The petitions ask that the ban be lifted formally, and join the existing chorus of Turkish legal community members, citizens and journalists who have already succeeded in winning a stay of the Turkish government’s application to block the service entirely.
Twitter says that the proposed ban is a series of three court orders that it wasn’t privy to before the ban was enacted, which include two that the company claims relate to content on their network that violate their own terms of service, and have accordingly been removed. The last one, which deals with a tweet accusing a former minister of corruption, isn’t in violation of Twitter’s ToS, so the social network is petitioning the courts to overturn that remaining order.
Boundless Informant: the NSAs secret tool to track global surveillance data
Revealed: The NSA’s powerful tool for cataloguing data – including figures on US collection
The color scheme ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance). Note the ‘2007’ date in the image relates to the document from which the interactive map derives its top secret classification, not to the map itself.
The National Security Agency has developed a powerful tool for recording and analysing where its intelligence comes from, raising questions about its repeated assurances to Congress that it cannot keep track of all the surveillance it performs on American communications.
The Guardian has acquired top-secret documents about the NSA datamining tool, called Boundless Informant, that details and even maps by country the voluminous amount of information it collects from computer and telephone networks.
The focus of the internal NSA tool is on counting and categorizing the records of communications, known as metadata, rather than the content of an email or instant message.
The Boundless Informant documents show the agency collecting almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013. One document says it is designed to give NSA officials answers to questions like, “What type of coverage do we have on country X” in “near real-time by asking the SIGINT [signals intelligence] infrastructure.”
An NSA factsheet about the program, acquired by the Guardian, says: “The tool allows users to select a country on a map and view the metadata volume and select details about the collections against that country.”
Under the heading “Sample use cases”, the factsheet also states the tool shows information including: “How many records (and what type) are collected against a particular country.”
A snapshot of the Boundless Informant data, contained in a top secret NSA “global heat map” seen by the Guardian, shows that in March 2013 the agency collected 97bn pieces of intelligence from computer networks worldwide.
The heat map reveals how much data is being collected from around the world. Note the ‘2007’ date in the image relates to the document from which the interactive map derives its top secret classification, not to the map itself.
Iran was the country where the largest amount of intelligence was gathered, with more than 14bn reports in that period, followed by 13.5bn from Pakistan. Jordan, one of America’s closest Arab allies, came third with 12.7bn, Egypt fourth with 7.6bn and India fifth with 6.3bn.
The heatmap gives each nation a color code based on how extensively it is subjected to NSA surveillance. The color scheme ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance).
The disclosure of the internal Boundless Informant system comes amid a struggle between the NSA and its overseers in the Senate over whether it can track the intelligence it collects on American communications. The NSA’s position is that it is not technologically feasible to do so.
At a hearing of the Senate intelligence committee In March this year, Democratic senator Ron Wyden asked James Clapper, the director of national intelligence: “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?”
“No sir,” replied Clapper.
Judith Emmel, an NSA spokeswoman, told the Guardian in a response to the latest disclosures: “NSA has consistently reported – including to Congress – that we do not have the ability to determine with certainty the identity or location of all communicants within a given communication. That remains the case.”
Other documents seen by the Guardian further demonstrate that the NSA does in fact break down its surveillance intercepts which could allow the agency to determine how many of them are from the US. The level of detail includes individual IP addresses.
IP address is not a perfect proxy for someone’s physical location but it is rather close, said Chris Soghoian, the principal technologist with the Speech Privacy and Technology Project of the American Civil Liberties Union. “If you don’t take steps to hide it, the IP address provided by your internet provider will certainly tell you what country, state and, typically, city you are in,” Soghoian said.
That approximation has implications for the ongoing oversight battle between the intelligence agencies and Congress.