r00tz is the amazing kid-track of programming at DEFCON, the giant hacker conference held annually in Las Vegas. The organizers have created a "code of conduct" for young hackers that is good advice for anyone doing infosec work, or exploring computers and systems:
The Internet is a small place. Word gets around, fast. Follow these rules at all times:
- Only hack things you own
- Do not hack anything you rely on
- Respect the rights of others
- Know and respect the law
- Find a safe playground (One always exists. If you don’t have support from your parents, get their permission to find an adult who will support you.)
There's more, but it's short and sweet. Go read it. The final statement, "r00tz is about creating a better world. You have the power and responsibility to do so. Now go do it! We are here to help you" sums it up nicely.
MIT is rightfully proud of alumna Limor Fried, the superhero hardware hacker behind AdaFruit Industries, creators of fantastic DIY, open source electronics components and kits. We're proud of Limor too! From MIT News:
Apart from selling kits, original devices and providing hundreds of guides online, Adafruit works around the world with schools, teachers, libraries and hackerspaces — community technology labs — to promote STEM education, designing curricula in circuitry and electronics, among other initiatives."Meet the maker"
The company has released an online children’s show called “A is for Ampere.” On a weekly Saturday night program, “Ask an Engineer,” anyone can ask Fried questions online or show off their original devices.
One of Fried’s favorite stories, from a young viewer of “Ask an Engineer,” illuminates what she sees as the growing diversity of engineering. “A parent emailed us after watching the show with his daughter,” she says. “I had another engineer on the show with me — my friend Amanda — and this parent’s daughter asked, ‘Dad, are there boy engineers too?’”
I found out yesterday that George Hotz, the hacker most known for unlocking the original iPhone and hacking the PS3, is now studying at my alma mater, Carnegie Mellon University. CMU has a bash.org clone for saving ridiculous quotes in IRC and around the computer science campus, and geohot already has some great ones in there.
amwatson: George, you have to start working on the assignment! If you don't, you won't have time to run on the supercomputer!
geohot: Don't worry. I have my own supercomputer!
amwatson: ...You have your own 256-core machine?
geohot: Yeah! Well, I have a botnet...
<geohot> I'm permitted to own Sony products. I'm just not permitted to touch them inappropriately.
< Tony0> I like geohot's method of forcing himself to suck less with vim
< Tony0> apparently he rebound the arrow keys to backspace.
< gwillen> I,I vim is properly appreciated in the original Klingon
Adrian Chen at Gawker has a must-read profile on Weev: so-called "iPad hacker," founder of the anti-blogging Internet-trolling organization "Gay Nigger Association of America," and born-again Mormon troll. Snip:
For Auernheimer, the AT&T breach was one of his finest works as a troll. He personally didn't hack anything—the program used to collect the email addresses was written by Spitler—except the media. He was the hype man for Goatse, and he claims blew the breach up far beyond its actual significance. "The bug that I'm indicted over isn't a big deal," he says. "What made it big is the way I presented it." He boils down his success at promoting the AT&T job to three bullet points: "Rhetoric, persuasion, and meme reference."
But was collecting the email addresses actually a crime? "If somebody mistakenly puts information out there on the web and somebody mistakenly gets that information, that's not illegal," says Jennifer Granick, a lawyer and the director of the Center for Internet and Society at Stanford. This is why Auernheimer decided to fight his charges instead of take a plea deal, as Spitler did last year.
"I contend there is no crime in telling the truth or using AT&T's, or anybody's, publicly accessible data, to cite it to talk about how they made people's data public," he told CNET.
Auernhemier's jury disagreed.
In Slate, Stephen Tobolowsky remembers what it was like to shoot the 1992 hacker/caper flick Sneakers, one of the great hacker movies of all time, with an all-star cast that included Robert Redford and Ben Kingsley:
During part of the big action finale, Robert Redford is chased through a secret lab by all of us bad guys. Phil was choreographing the chase and trying to put us in some kind of order of how fast we were running. He said, "Let's do it this way. Ben, you’re the Academy Award winner, we’ll start with you. Then, Tim, the Emmy winner, you’ll be next. Do we have a Tony winner? Anyway, Stephen, you'll be last."
Here is a Hollywood Zen story. We shot on location around Los Angeles and at Universal. The studio has a going concern of little buses that regularly drive through the back lot area with tourists from all over the world wielding disposable cameras. The tour guide has a set patter, "On your right is the shark from Jaws. On your left is Columbo's automobile." While one of the buses was nearing our stage, we were called to the set. The tour bus had to stop while Robert Redford and James Earl Jones crossed in front of it. No one noticed. The guide just kept up with, "On our right is the bicycle from E.T." People were snapping away at the bicycle and were completely oblivious that two of the most famous actors in the world were a few feet away from them.
At the end of the shoot, Phil said the only thing that could make the whole experience of working on Sneakers better was if the lab lost the film. Then we would be able to do it all over again.
The folks at the NYC Resistor hackerspace found a Macintosh SE that had been abandoned on a Brooklyn sidewalk and decided to conduct a little "digital archeology."
While digging through dumps generated from the Apple Mac SE ROM images we noticed that there was a large amount of non-code, non-audio data. Adam Mayer tested different stride widths and found that at 67 bytes (536 pixels across) there appeared to be some sort of image data that clearly was a picture of people. The rest of the image was skewed and distorted, so we knew that it wasn’t stored as an uncompressed bitmap.
After some investigation, we were able to decode the scrambled mess above and turn it into the full image with a hidden message from “Thu, Nov 20, 1986“
They say there's more curious data in the ROM that they haven't been able to decipher yet.
It’s significant because in recent years, Apple products have been stripped of their image of being hack-proof. The company’s rise has made it a bigger target, as hackers have been discovering bugs in the iPhone since it came out in 2007. Earlier this year, more than 600,000 Macs were infected, the first major malicious software attack targeting Apple computers.
Weev: Not Amused.
Mikko H. Hypponen of F-Secure publishes an email he claims is from a scientist with the Atomic Energy Organization of Iran (or AEOI), which details a new "cyber attack" wave against Iranian nuclear systems.
Mikko can't validate the email or the tale therein, and neither can we, but if it's true? Heh.
* The 'shoop above is mine, not the hackers'.
Quinn Norton has an excellent piece over at Wired:Threat Level on the reactions within "Anonymous" to the news that LulzSec frontman "Sabu" (photo above) was collaborating with the FBI. Kim Zetter's take on the arrests and secret plea deals is here.
The Guardian has more on the big hacking news which Fox News broke yesterday (as noted in a post by Rob). "Sabu," the trash-talking, self-appointed leader of LulzSec, has been working for the FBI for the last six months. The FBI says he helped the US and various European governments identify and arrest five alleged LulzSec members charged with participating in defacement, DDOSing, and "doxing" against high-profile government and corporate targets. Sabu (above) is, in now identified as Hector Xavier Monsegur, a 28-year-old unemployed Puerto Rican guy living in New York, and a father of two. He was charged with 12 criminal counts of conspiracy to engage in "computer hacking and other crimes" last year, pled guilty in August, 2011, then "snitched" on his LulzSec friends.
Here's the FBI news release, which notably omits the names of any prosecutors (perhaps for fear of Anonymous attack).
Snip from Guardian story:
His online "hacker" activity continued until very recently, with a tweet sent by him in the last 24 hours saying: "The feds at this moment are scouring our lives without warrants. Without judges approval. This needs to change. Asap."
In a US court document, the FBI's informant – there described as CW – "acting under the direction of the FBI" helped facilitate the publication of what was thought to be an embarrassing leak of conference call between the FBI and the UK's Serious and Organised Crime Agency in February. Officers from both sides of the Atlantic were heard discussing the progress of various hacking investigations in the call.
A second document shows that Monsegur – styled this time as CW-1 – provided an FBI-owned computer to facilitate the release of 5m emails taken from US security consultancy Stratfor and which are now being published by WikiLeaks. That suggests the FBI may have had an inside track on discussions between Julian Assange of WikiLeaks, and Anonymous, another hacking group, about the leaking of thousands of confidential emails and documents.
The indictments mark the most significant strike by law enforcement officials against the amateur hacker groups that have sprung out of Anonymous. These groups, which include LulzSec, have cost businesses millions of pounds and exposed the credit card details and passwords of nearly 1 million people.
Spanish police also accused one of four suspects picked up in the cities of Madrid and Malaga of releasing personal data about police officers and bodyguards protecting Spain's royal family and the prime minister.
Other arrests were in Argentina, Chile and Colombia, and 250 items of computer equipment and mobile phones were seized across 15 cities, Interpol said. Colombia's Ministry of Defence and presidential websites as well as Chile's Endesa electricity company were among the targets of the hackers, it said.
Emmanuel Goldstein from 2600 Magazine sez, "As part of a massive archiving project, 2600 Magazine is releasing all of the remastered videos from the second Hackers On Planet Earth conference - Beyond HOPE in 1997. Last month, videos from the first HOPE conference back in 1994 were put online. This weekend's hour-by-hour video release from 1997 will include speakers like cryptographer Bruce Schneier, *everyone* from The L0pht and Cult of the Dead Cow, privacy advocates, technologists, along with lots of glimpses at 1990s websites. It's an enlightening trip down Memory Lane to visit a pre-9/11 conspiracy theorist world - from a hacker perspective."