Where is the interesting part of the article?
Whatever WikiLeaks eventually thinks of the movie being made about Julian Assange, it’s proving expert in the business of buzz-generation. After shooting began in Reykjavik at the end of January (Iceland Review), the organisation has revealed - completely co-incidentally, of course - an incident in August 2011 in which FBI …
I'm sick to the back teeth of the Hanlon's Razor Nuremberg Defence. "They were only being lazy and stupid."
Ignorance and willful stupidity *are* malice. If you can't be f***ed to learn and you can't be f***ed to understand, that's f***ing malice aforethought. Just 'cause it seems more fuzzy and friendly than outright hostility, it's as antisocial as ti comes nonetheless.
@Falanx Malice would imply some ill will from the FBI towards the authorities of Iceland. I would suggest that "arrogance" is more likely i.e. it probably never occurred to the FBI that other counties have their own laws and procedures and that perhaps they should check before just turning up.
Piss myself laughing if they were actually there on holiday or even better doing something that had fuck all to do with Assange!!
Not that the oxygen thief is getting annoying now, but seriously a couple of FBI agents go to Iceland.....
.......mines the smoking gun on the grassy knoll!!!
That's an interesting theory and crazy notion to actively develop for further exploitation of advanced opportunities with zeroday vulnerabilities in politically inept applications in globally minded institutions with stealthy programming projects.
And whenever it be true, The Vociferous Time Waster, does it indicate that Russia are leading in that particular and peculiar competitive race?
Never attribute to malice what can adequately be explained by incompetence. Probably a procedural balls up ……. AC Posted Sunday 3rd February 2013 23:06 GMT
Probably a procedural balls up, AC? Oh please, you cannot be serious whenever incompetent malice is systemic and endemic in a big scary country.
Yes you're right, it's of no interest that a bit scary country sent it's enforcers illegally to a smaller country, and it was hushed up. Assuming you are the tyrant of said big scary country that is. … tirk Posted Sunday 3rd February 2013 23:14 GMT
If you can believe the evidence/news here, ….. http://www.thedailybell.com/28642/Paul-Craig-Roberts-In-Amerika-Law-No-Longer-Exists-the-extermination-of-truth …. would they be wannabe tyrants of a big scared country/failing executive body/second rate sub prime sysadmin in dire straits need of novel betas with better intellectual property feeds and seeds.
And there is no question of that analysis not being right.
* … Specific Measurable Attainable Realistic Timely Researching
Self-Monitoring, Analysis and Reporting Technology Reviewing
And what are Ögmundur Jónasson's links to Dickileaks pet she-troll Birgitta Jónsdóttir? Given his own involvement in the Icesave mess, maybe he was just paranoid the FBI may have been looking at where all those "protected" Icelandic investors were spending their political contributions.
/Holmes as we don't have a Jack Bauer icon.
"It's interesting that the US managed to move from "moderately trustworthy" to a status well below China and Russia in less than a decade, and continues to dig deeper."
Huh? Seriously? So they were a bunch of huggy my-little-ponies during the 'Red Scares', Cold War, Vietnam, et al? How about when the US government dragged its heels over getting involved in a couple of World Wars until they deliberately racked up enough credit with every other superpower to effectively destroy future competition?
Heck didn't they annex California, New Mexico and Texas before 1850?
The US has been an imperialist, expansionist power.
Like father, like son!
Apparently so. And some Texans I met while there still don't like the situation much.
From a British perspective, much development in the region for agriculture was being bankrolled by London around that time. Needless to say, compensation for the early investors was not generous nor forthcoming.
Provided that I give them all body cavity searches while wearing my shoulder length gloves, and then a good scrub down on one of the CIA style wooden horizontal showers.....
Maybe smear them in their own shit and take photos - or attach electric wires to their genitals etc...
Or how about feeding them Depleted Uranium suppliments, there's 1300 tons of that laying around Iran and Iraq.
A few grams each shouldn't hurt.
FAIL - The Americans and their spreading "Peace and Democracy" to the world, sure has united it. The rest of the world has the same flag as the American's, but theirs is on fire.
1692 - Salem witch trials
1950 - McCarthyism
War on drugs, on terror, forcing thru' IP protectionism...
America has never had a problem with seeing monsters under the bed and trampling all over due process.
But I suppose it's Britains fault really, we should never have let the terrorists win, (1775–1783) - ooh, ouch!
"we should never have let the terrorists win"
Never mind: At least we ALL learned our lesson of not trying to inflict policies on a local population who doesn't want you there, on another continent, at the end of long supply lines, in inhospitable terrain, against irregular forces who are personally invested in the future of their nation.
Be careful what you say about Assange, judging by my earlier comment either people didn't get the humour or they took exception to me referring to St Julian as an Oxygen thief!!
Anyway back on topic, has anybody said what the Feebs were doing in Iceland in the first place, or is it just 2+2=4 or 2+2=Assange, in other words were they looking at Assange or something completely unrelated to Wikileaks?
If you think the FBI left without already having all the info they needed , consider this.
Who knows how many of them stayed after their chummies were sent home ? Don't believe a thing you read or hear in a public news source about secretive organisations.Ain't that a bit of what the lesson left by Wikileaks is about ? This said . Iceland kicking them out could have been part of the plot all along.
Disinformation is just that. Still cheering for Iceland ?
UK Home Secretary Priti Patel today signed an order approving the extradition of Julian Assange to America, where he faces espionage charges for sharing secret government documents.
It also distributed secret files revealing the torture of detainees at Guantanamo Bay, and sensitive communications from the Democratic National Committee and Hillary Clinton's campaign manager, John Podesta, during the 2016 US presidential election.
The FTC is warning members of the LGBTQ+ community about online extortion via dating apps such as Grindr and Feeld.
According to the American watchdog, a common scam involves a fraudster posing as a potential romantic partner on one of the apps. The cybercriminal sends explicit of a stranger photos while posing as them, and asks for similar ones in return from the mark. If the victim sends photos, the extortionist demands a payment – usually in the form of gift cards – or threatens to share the photos on the chat to the victim's family members, friends, or employer.
A 33-year-old Illinois man has been sentenced to two years in prison for running websites that paying customers used to launch more than 200,000 distributed denial-of-services (DDoS) attacks.
A US California Central District jury found the Prairie State's Matthew Gatrel guilty of one count each of conspiracy to commit wire fraud, unauthorized impairment of a protected computer and conspiracy to commit unauthorized impairment of a protected computer. He was initially charged in 2018 after the Feds shut down 15 websites offering DDoS for hire.
Gatrel, was convicted of owning and operating two websites – DownThem.org and AmpNode.com – that sold DDoS attacks. The FBI said that DownThem sold subscriptions that allowed the more than 2,000 customers to run the attacks while AmpNode provided customers with the server hosting. AmpNode spoofed servers that could be pre-configured with DDoS attack scripts and attack amplifiers to launch simultaneous attacks on victims.
The former director of the University of Arkansas’ High Density Electronics Center, a research facility that specialises in electronic packaging and multichip technology, has been jailed for a year for failing to disclose Chinese patents for his inventions.
Professor Simon Saw-Teong Ang was in 2020 indicted for wire fraud and passport fraud, with the charges arising from what the US Department of Justice described as a failure to disclose “ties to companies and institutions in China” to the University of Arkansas or to the US government agencies for which the High Density Electronics Center conducted research under contract.
At the time of the indictment, then assistant attorney general for national security John C. Demers described Ang’s actions as “a hallmark of the China’s targeting of research and academic collaborations within the United States in order to obtain U.S. technology illegally.” The DoJ statement about the indictment said Ang’s actions had negatively impacted NASA and the US Air Force.
Australian Federal Police (AFP) commissioner Reece Kershaw has accused un-named nations of helping organized criminals to use technology to commit and launder the proceeds of crime, and called for international collaboration to developer technologies that counter the threats that behaviour creates.
Kershaw’s remarks were made at a meeting of the Five Eyes Law Enforcement Group (FELEG), the forum in which members of the Five Eyes intelligence sharing pact – Australia, New Zealand, Canada, the UK and the USA – discuss policing and related matters. Kershaw is the current chair of FELEG.
“Criminals have weaponized technology and have become ruthlessly efficient at finding victims,” Kerhsaw told the group, before adding : “State actors and citizens from some nations are using our countries at the expense of our sovereignty and economies.”
State-sponsored Chinese attackers are actively exploiting old vulnerabilities to "establish a broad network of compromised infrastructure" then using it to attack telcos and network services providers.
So say the United States National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Federal Bureau of Investigation (FBI), which took the unusual step of issuing a joint advisory that warns allied governments, critical infrastructure operators, and private industry organizations to hurry up and fix their IT estates.
The advisory states that network devices are the target of this campaign and lists 16 flaws – some dating back to 2017 and none more recent than April 2021 – that the three agencies rate as the most frequently exploited.
The Feds have warned organizations about a lesser-known extortion gang Karakurt, which demands ransoms as high as $13 million and, some cybersecurity folks say, may be linked to the notorious Conti crew.
In a joint advisory [PDF] this week, the FBI, CISA and US Treasury Department outlined technical details about how Karakurt operates, along with actions to take, indicators of compromise, and sample ransom notes. Here's a snippet:
Russian crooks are selling network credentials and virtual private network access for a "multitude" of US universities and colleges on criminal marketplaces, according to the FBI.
According to a warning issued on Thursday, these stolen credentials sell for thousands of dollars on both dark web and public internet forums, and could lead to subsequent cyberattacks against individual employees or the schools themselves.
"The exposure of usernames and passwords can lead to brute force credential stuffing computer network attacks, whereby attackers attempt logins across various internet sites or exploit them for subsequent cyber attacks as criminal actors take advantage of users recycling the same credentials across multiple accounts, internet sites, and services," the Feds' alert [PDF] said.
The FBI and its friends have warned businesses of crooks scraping people's credit-card details from tampered payment pages on compromised websites.
It's an age-old problem: someone breaks into your online store and alters the code so that as your customers enter their info, copies of their data is siphoned to fraudsters to exploit. The Feds this week have detailed one such effort that reared its head lately.
As early as September 2020, we're told, miscreants compromised at least one American company's vulnerable website from three IP addresses: 80[.]249.207.19, 80[.]82.64.211 and 80[.]249.206.197. The intruders modified the web script TempOrders.php in an attempt to inject malicious code into the checkout.php page.
Pay close attention to that resume before offering that work contract.
The FBI, in a joint advisory with the US government Departments of State and Treasury, has warned that North Korea's cyberspies are posing as non-North-Korean IT workers to bag Western jobs to advance Kim Jong-un's nefarious pursuits.
In guidance [PDF] issued this week, the Feds warned that these techies often use fake IDs and other documents to pose as non-North-Korean nationals to gain freelance employment in North America, Europe, and east Asia. Additionally, North Korean IT workers may accept foreign contracts and then outsource those projects to non-North-Korean folks.
Biting the hand that feeds IT © 1998–2022