back to article George Bush's family emails, pics ransacked - and spewed online

A hacker put personal photos of George H W Bush online this week after reportedly breaking into the former US president's family email accounts. One of the leaked snaps shows the 88-year-old Republican recovering from a serious illness in a hospital bed in December last year. His relatives' emails and contact details were also …

COMMENTS

This topic is closed for new posts.
  1. This post has been deleted by a moderator

    1. Anonymous Coward
      Anonymous Coward

      Re: Obama hack

      Oh, for a second there I thought you were talking about Harry's real father.

    2. Anonymous Coward
      Anonymous Coward

      Re: Obama hack

      Man, I hope you were kidding....

      I may not like Obama's politics, but this stupid birther crap needs to die. He's elected; that train, if it ever even existed, has left the station.

      1. Anonymous Coward
        Anonymous Coward

        Re: Obama hack

        They made a stupid mistake when they released a PDF of the birth certificate.

        Instead of the PDF having a single image of the birth certificate it has 9 layers making up the image. Because of this conspiracy theorists claim it is photoshopped and not the real birth certificate.

        The layers contains the following:

        1. Background, outline of form, signature of Attendant, signature of local registrar, start of signature of parent.

        2. Most of the printed text of the document, dates of signatures, rest of signature of parent.

        3. Certification stamp and signature of state registrar

        4. Date stamp from when the copy was made (Apr 25 2011)

        5. Date stamp accepted by general register (Aug 8 1951)

        6. Date assigned by local registrar (Aug 8 1951)

        7. His mother's occupation (None).

        8&9. Various smudges.

        You can download the certificate here: http://www.whitehouse.gov/sites/default/files/rss_viewer/birth-certificate-long-form.pdf

        NOTE: I have no doubts about the authenticity of the document. I think some numpty at the Whitehouse decided to clean up the scanned copy and the 9 layer image is a result.

        1. MondoMan
          Facepalm

          Re: Obama hack

          Given that Obama was born in 1961, not 1951, I think just about anyone would be suspicious of a supposed birth certificate dated ten years before that. I'm hoping it was just a stupid mistake on your part rather than part of a wacko birther scheme.

          1. Anonymous Coward
            Anonymous Coward

            Re: Obama hack

            My mistake. It's 1961 on the form.

        2. This post has been deleted by a moderator

      2. Naughtyhorse
        FAIL

        Re: Obama hack

        Mr. Hagood, meet Mr. Trump

    3. Naughtyhorse
      Trollface

      Re: Obama hack

      would that smoking gun have been recently used to shoot skeet???

      i think we should be told

  2. Anonymous Coward
    Anonymous Coward

    After the patriot act, this seems only fair.

    1. Annihilator Silver badge

      Wrong Bush

      1. nexsphil

        re: Wrong Bush

        You actually think it makes a difference?

    2. Anonymous Coward
      Anonymous Coward

      You DO know that Obama enthusiastically supported and signed the Patriot act too, right?

      1. Anonymous Coward
        Anonymous Coward

        > You DO know that Obama enthusiastically supported and signed the Patriot act too, right?

        ...and if his email was hacked too I would not shed enough tears to moisten a very small thing.

        > Wrong Bush

        Just beating around the bush. I daresay daddy has some publicly-funded things he'd rather keep out of the spotlight too.

        ...not that I have a particular axe to grind with US presidents...I dislike every politician who helps erode the privacy of the public whilst masking their own actions; when things should be completely the opposite way round.

        1. dogged

          I daresay daddy has some publicly-funded things he'd rather keep out of the spotlight too.

          Oliver North could probably say for certain.

  3. Anonymous Coward
    Anonymous Coward

    Completely unrelated

    Oi Reg! Where's my fucking silver badge. I want edit, dammit!

    1. asdf

      Re: Completely unrelated

      Hahaha loser. Seriously though didn't realize edit functionality was not for everyone. What do you get when earn gold (star ha)?

      1. Anonymous Coward
        Anonymous Coward

        Re: Completely unrelated

        You only get edit with silver. Gold badge holders -I believe- get the film of their choice torrented and delivered personally by Andrew Orlowski.

        1. Anonymous Coward
          Anonymous Coward

          Re: Completely unrelated

          YAY! I'm rich! I'm socially secure! I have edit!

          EDIT: See? Who's the loser now?

          EDIT AGAIN (Because I can): It's still me, isn't it? *sigh*

        2. Graham Dawson Silver badge
          Coffee/keyboard

          Re: Completely unrelated

          "get the film of their choice torrented and delivered personally by Andrew Orlowski."

          I think I just gave myself a hernia from laughing so hard.

        3. This post has been deleted by a moderator

          1. JeffyPooh
            Pint

            Re: Completely unrelated

            Drivel alert.

          2. Naughtyhorse

            Re: Completely unrelated

            so how come you only have silver?

            (do they not do a Burberry one?)

  4. NoneSuch Silver badge
    Joke

    I bet the hackers were on the hunt for another kind of bush.

  5. gautam

    Shocking

    That they have not yet blamed the Islamist terrorists' plot behind1 this.

    One more reason to crack the whip and an additional law passed for the security services and snooping agencies.

    1. Anonymous Coward
      Anonymous Coward

      Re: Shocking

      Nah, enemy du jour is China, but I guess this story leaked before they could fabricate the required evidence. All the people who can do that are presently helping Google with that..

      </conspiracy theory>

    2. amanfromMars 1 Silver badge

      Re: Shocking ....... and About Fucking Time Aweful?

      Who's/What's to say it is not the work of the security services and snooping agencies .... flexing their new found virtual muscles and smarter AI team intelligence and taking over the reins of a novel reality to be led by other than idiots in service of enriching themselves at the expense of everybody else?

      Or do you imagine the globes finest in special service are only fit for scratching their balls and doing as they are told by ....... well, let us just say the not very bright and emotionally retarded? After all, it is inevitable and there is no time like the present to deliver fabless stirling engined lead to the future, is there?

      Pussies or lions? What do you think that they be? What do they think that they be and/or wannabe? Does intelligence take orders or issue them?

      So many questions, so much time, so many probabilities in a world of infinite possibilities.

  6. BillG
    Happy

    Coming Soon

    I predict a cold federal prison cell in Guccifer's future.

    1. Anonymous Coward
      Anonymous Coward

      Re: Coming Soon

      Imagine the trail leads to some IP addresses in either London or Ecuador (it's been far too quiet from that corner, I wonder when they get fed up with him).

  7. ian 22
    Black Helicopters

    Look! It's a dron....

    Someone will pay for this. There are empty cells at Guantanamo awaiting.

  8. bag o' spanners
    Mushroom

    It's nice to finally get confirmation that the mighty leader of the penguin underground is also a certified wingnut. The troll can't help it.

  9. Anonymous Coward
    Anonymous Coward

    Bush Koch

    Admit it, you sniggered too.

  10. Twitless

    Correction

    Paragraph nine should read -

    ...was infamous for his lie: "Read my lips, no new taxes"

  11. Anonymous Coward
    FAIL

    George Dubbaya Bush......

    I don't really want to see any of their pictures, unless it's on toilet paper...

    But I'd love to see a cache of "interesting, compromising and socially challenging" pictures go through the web.

    To see George W's home grown version of "Two girls, one cup."

    Including the CIA grade coke and a crate of bourbon.

    Fail: "Yes it's funny they have been hacked.... but for fuck's sake - who wants to see their shit?"

  12. Anonymous Coward
    Anonymous Coward

    I don't care...

    ...for George Bush but I hope the hacker(s) are hung by their thumbs in a public forum for a few months to make a point that hacking is wrong. After 3-4 months the hacker(s) can be set free as i am sure they will have learned their lesson.

  13. adnim

    The sad thing is

    some people will actually want to see this stuff

    1. Tom 13

      Re: The sad thing is

      and most of them will be Reg commenters who still have a Hate On for Bush Sr.

  14. This post has been deleted by a moderator

  15. Naughtyhorse

    I cannot believe....

    that dubyah wasn't the attack vector,

    cos i'll bet you a pound to a pinch of shit his password is 'password'

    and double or quits that it takes him at least 3 goes to get in.

    1. Matt Bryant Silver badge
      Facepalm

      Re: I cannot believe....

      Dude, this twit thinks he's somehow helping world peace or whatever fantasy trip he's on by releasing a pic of someone recovering in hospital? Seriously, I'm amazed he can use a keyboard.

    2. Best Before:
      Joke

      Re: I cannot believe....

      that's why they swapped dubayh's PC for a microwave oven with a keyboard and mouse taped to the side! he can't be trusted with anything more technical ( i hear they also had to unplug the microwave as he even made that insecure!)

This topic is closed for new posts.

Other stories you might like

  • World Economic Forum wants a global map of online crime
    Will cyber crimes shrug off Atlas Initiative? Objectively, yes

    RSA Conference An ambitious project spearheaded by the World Economic Forum (WEF) is working to develop a map of the cybercrime ecosystem using open source information.

    The Atlas initiative, whose contributors include Fortinet and Microsoft and other private-sector firms, involves mapping the relationships between criminal groups and their infrastructure with the end goal of helping both industry and the public sector — law enforcement and government agencies — disrupt these nefarious ecosystems.  

    This kind of visibility into the connections between the gang members can help security researchers identify vulnerabilities in the criminals' supply chain to develop better mitigation strategies and security controls for their customers. 

    Continue reading
  • NSO claims 'more than 5' EU states use Pegasus spyware
    And it's like, what ... 12, 13,000 total targets a year max, exec says

    NSO Group told European lawmakers this week that "under 50" customers use its notorious Pegasus spyware, though these customers include "more than five" European Union member states.

    The surveillance-ware maker's General Counsel Chaim Gelfand refused to answer specific questions about the company's customers during a European Parliament committee meeting on Thursday. 

    Instead, he frequently repeated the company line that NSO exclusively sells its spyware to government agencies — not private companies or individuals — and only "for the purpose of preventing and investigating terrorism and other serious crimes."

    Continue reading
  • Europol arrests nine suspected of stealing 'several million' euros via phishing
    Victims lured into handing over online banking logins, police say

    Europol cops have arrested nine suspected members of a cybercrime ring involved in phishing, internet scams, and money laundering.

    The alleged crooks are believed to have stolen "several million euros" from at least "dozens of Belgian victims," according to that nation's police, which, along with the Dutch, supported the cross-border operation.

    On Tuesday, after searching 24 houses in the Netherlands, officers cuffed eight men between the ages of 25 and 36 from Amsterdam, Almere, Rotterdam, and Spijkenisse, and a 25-year-old woman from Deventer. We're told the cops seized, among other things, a firearm, designer clothing, expensive watches, and tens of thousands of euros.

    Continue reading
  • Israeli air raid sirens triggered in possible cyberattack
    Source remains unclear, plenty suspect Iran

    Air raid sirens sounded for over an hour in parts of Jerusalem and southern Israel on Sunday evening – but bombs never fell, leading some to blame Iran for compromising the alarms. 

    While the perpetrator remains unclear, Israel's National Cyber Directorate did say in a tweet that it suspected a cyberattack because the air raid sirens activated were municipality-owned public address systems, not Israel Defense Force alarms as originally believed. Sirens also sounded in the Red Sea port town of Eilat. 

    Netizens on social media and Israeli news sites pointed the finger at Iran, though a diplomatic source interviewed by the Jerusalem Post said there was no certainty Tehran was behind the attack. The source also said Israel faces cyberattacks regularly, and downplayed the significance of the incident. 

    Continue reading
  • Capital One: Convicted techie got in via 'misconfigured' AWS buckets
    Assistant US attorney: 'She wanted data, she wanted money, and she wanted to brag'

    Updated A former Seattle tech worker has been convicted of wire fraud and computer intrusions in a US federal district court.

    The conviction follows the infamous 2019 hack of Capital One in which personal information of more than 100 million US and Canadian credit card applicants were swiped from the financial giant's misconfigured cloud-based storage.

    Paige Thompson (aka "erratic") was arrested in July 2019 after data was leaked between March and July of that year. The data was submitted by credit card hopefuls between 2005 and early 2019, and Thompson was able to get into Capital One's AWS storage thanks to a "misconfigured web application firewall."

    Continue reading
  • Never fear, the White House is here to tackle web trolls
    'No one should have to endure abuse just because they are attempting to participate in society'

    A US task force aims to prevent online harassment and abuse, with a specific focus on protecting women, girls and LGBTQI+ individuals.

    In the next 180 days, the White House Task Force to Address Online Harassment and Abuse will, among other things, draft a blueprint on a "whole-of-government approach" to stopping "technology-facilitated, gender-based violence." 

    A year after submitting the blueprint, the group will provide additional recommendations that federal and state agencies, service providers, technology companies, schools and other organisations should take to prevent online harassment, which VP Kamala Harris noted often spills over into physical violence, including self-harm and suicide for victims of cyberstalking as well mass shootings.

    Continue reading
  • Interpol anti-fraud operation busts call centers behind business email scams
    1,770 premises raided, 2,000 arrested, $50m seized

    Law enforcement agencies around the world have arrested about 2,000 people and seized $50 million in a sweeping operation crackdown of social engineering and other scam operations around the globe.

    In the latest action in the ongoing "First Light", an operation Interpol has coordinated annually since 2014, law enforcement officials from 76 countries raided 1,770 call centers suspected of running fraudulent operations such as telephone and romance scams, email deception scams, and financial crimes.

    Among the 2,000 people arrested in Operation First Light 2022 were call center operators and fraudsters, and money launderers. Interpol stated that the operation also saw 4,000 bank accounts frozen and 3,000 suspects identified.

    Continue reading
  • Cloud services proving handy for cybercriminals, SANS Institute warns
    Flying horses, gonna pwn me away...

    RSA Conference Living off the land is so 2021. These days, cybercriminals are living off the cloud, according to Katie Nickels, director of intelligence for Red Canary and a SANS Certified Instructor.

    "It's not enough to pay attention to the operating systems, the endpoints, said Nickels, speaking on a SANS Institute panel about the most dangerous new attack techniques at RSA Conference. "Adversaries, a lot of their intrusions, are using cloud services of different types."  

    And yes, living off the land (or the cloud), in which intruders use legitimate software and cloud services to deploy malware or spy on corporations and other nefarious activities, isn't a new type of attack, Nickels admitted. "But what's new here is the levels to which using cloud services [for cyberattacks] has risen." 

    Continue reading
  • Microsoft seizes 41 domains tied to 'Iranian phishing ring'
    Windows giant gets court order to take over dot-coms and more

    Microsoft has obtained a court order to seize 41 domains used by what the Windows giant said was an Iranian cybercrime group that ran a spear-phishing operation targeting organizations in the US, Middle East, and India. 

    The Microsoft Digital Crimes Unit said the gang, dubbed Bohrium, took a particular interest in those working in technology, transportation, government, and education sectors: its members would pretend to be job recruiters to lure marks into running malware on their PCs.

    "Bohrium actors create fake social media profiles, often posing as recruiters," said Amy Hogan-Burney, GM of Microsoft's Digital Crimes Unit. "Once personal information was obtained from the victims, Bohrium sent malicious emails with links that ultimately infected their target's computers with malware."

    Continue reading
  • Cops' Killer Bee stings credential-stealing scammer
    Fraudster and two alleged accomplices nabbed in joint op

    An Interpol-led operation code-named Killer Bee has led to the arrest and conviction of a Nigerian man who was said to have used a remote access trojan (RAT) to reroute financial transactions and steal corporate credentials. Two suspected accomplices were also nabbed.

    The trio, aged between 31 and 38, were detained as part of a sting operation involving law enforcement agencies across 11 countries: Brunei, Cambodia, Indonesia, Laos, Malaysia, Myanmar, Nigeria, Philippines, Singapore, Thailand, and Vietnam. 

    The suspects were arrested in the Lagos suburb of Ajegunle and in Benin City, Nigeria. At the time of their arrests, all three men were in possession of fake documents, including fraudulent invoices and forged official letters, it is claimed.

    Continue reading

Biting the hand that feeds IT © 1998–2022