Wednesday, November 3, 2010

Military wants to scan communications to find internal threats

The Pentagon wants computers to see into the future -- and stop crimes before they happen.
As the U.S Army considers whether Col. Nidal Hasan, the suspect in last year's Fort Hood massacre, should face a court-martial, it also is looking at whether the military missed signals that might have indicated what was about to happen.

Now a Pentagon research arm is asking scientists to create a way to scan billions of e-mails to identify suspects in advance so that crimes can be stopped before they are committed

That's the goal of the latest $35 million project announced by DARPA, the Defense Advanced Research Projects Agency, which is credited with breakthroughs like the internet, GPS and stealth technology.
But this latest idea is already is drawing fire from privacy and security experts.
In a request for proposals, the think tank highlights the Fort Hood shootings.

"Each time we see an incident like a soldier in good mental health becoming homicidal or suicidal or an innocent insider becoming malicious, we wonder why we didn't see it coming," DARPA says. "When we look through the evidence after the fact, we often find a trail -- sometimes even an "obvious" one. The question is: Can we pick up the trail before the fact, giving us time to intervene and prevent an incident."
The agency calls the project ADAMS, for "Anomaly Detection at Multiple Scales."
Simply tracking messages to and from people around a single location like Fort Hood would be a vast task. There are 65,000 people at Fort Hood and in a single year they may create 4.68 billion electronic messages between almost 15 million people.

The challenge is to cope with and get accurate results from all this data.
The agency said it would primarily use ADAMS to look at "trusted person(s) in a secure environment with access to sensitive information and information systems and sources."
"There are currently no established techniques for detecting anomalies in data sets of this size at acceptable false positive rates," the agency notes in the request for proposals.

"The focus is on malevolent insiders that started out as 'good guys.' The specific goal of ADAMS is to detect anomalous behaviors before or shortly after they turn," the agency says. "Operators in the counterintelligence community are the target end-users for ADAMS insider threat detection technology."

Even more than the technological challenges, the project raises both policy and legal implications, according to James Lewis of the Center for Strategic and International Studies. He says DARPA and the U.S. government have been struggling for a while with how to use computer software to screen millions of transactions, something credit card companies already do.

"But credit card companies can screen your transactions because you've entered into a contract with them and because it is in your interest to keep your account safe. The same isn't necessarily true for e-mail," Lewis said in an e-mail.

"If you are sending e-mail from your work account, your company has the right to screen it. But if you are sending it from your personal account, no one has the right to screen it unless they get a court order, and getting the court order requires some sort of advance knowledge of malicious intent, which defeats the purpose of screening, Lewis said.

Bruce Schneier, author of "Secrets and Lies" and other books on security technology, criticized the DARPA idea as "un-American" and a police state ploy.
"This is what a police state does -- everyone watching what everyone does and the police watching your every move," Schneier told CNN in a telephone interview. "And what we learn from history is that police states never work. It never is safer."

Read Full Article

Report: Email, social networking sites and mobile devices among leaders in corporate data loss | Messaging Architects

Report: Email, social networking sites and mobile devices among leaders in corporate data loss Messaging Architects

Pennsylvania Homeland Security chief slips up in private email | Messaging Architects

Pennsylvania Homeland Security chief slips up in private email Messaging Architects

British Telecom faces legal issues after failing to leverage email compliance

A recent data loss incident may put British Telecom in the middle of an ongoing legal case in the UK involving a prior issue involving legal firm ACS:Law.

Authorities in the country are debating whether British Telecom violated the Data Protection Act when it recently leaked personal information of more than 500 customers as a result of an email mishap. An official with British Telecom has since confirmed that one of its attorneys sent a Microsoft Excel spreadsheet containing customers' personal information in an unsecured email.

Read Full Article

Report: Lawyer’s Email Slip-up Leads to Zyprexa Leak.

Eli Lilly was in settlement talks with prosecutors over the company’s marketing improprieties of its antipsychotic drug Zyprexa. According to the story, the settlement could end in Lilly’s paying more than $1 billion.

So how’d the NYT get the story? According to Portfolio.com, the source of the leak was a lawyer at Pepper Hamilton, who, believing he or she was sending a packet of confidential documents to co-counsel, Bradford Berenson at Sidley Austin, mistakenly e-mailed the documents to New York Times reporter Alex Berenson.

When Berenson began calling around for comment, reports Portfolio, and seemed to possess remarkably detailed inside infomration about the negotiations, Eli Lilly initially believed that the source of the leak had been the government.

Read Full Article

Leaked Freehills WA Graduate Recruitment Email Confirms Scheme Departure

Leaked Freehills WA Graduate Recruitment Email Confirms Scheme Departure

BT confirms it sent customer info to ACS:Law - unencrypted - But it won't happen again | TechEye

BT confirms it sent customer info to ACS:Law - unencrypted - But it won't happen again TechEye

Highly Sensitive P2P Email Leaked From Gilbert + Tobin’s Peter Leonard

Highly Sensitive P2P Email Leaked From Gilbert + Tobin’s Peter Leonard

Tuesday, November 2, 2010

Question: SAFe - Mail. Is it Really Safe and Secure? Answer: NO!

This is what SAFe-Mail claims on its website; Safe-Mail.net

"Safe-mail is the most secure, easy to use communication system. It includes encrypted mail system with collaboration features and document storage functions. Always accessible at any time from anywhere!"

But we looked further into the product and found the answer about how Secure & Safe the system really is.

As any electronic communication sent across the internet is not secure.

We didn't have to look long for the answer...SAFe-Mail supplied it and showed how secure they think their own product really is.  Below is an excerpt from the TERMS of use a buyer must agree to before purchasing.

"NO REPRESENTATIONS: The Safe-mail.net e-mail system is provided "as is," without any warranty or representation of any kind, either express or implied. We do not promise that the Safe-mail.net system will be uninterrupted, impenetrable, problem or virus-free. Safe-mail.net is not responsible for user generated content."

SAFe-Mail is not safe for sensitive and confidential business communications. SAFe-Mail openly admits this fact with the above quoted disclaimer in its TERMS.

Using encrypted Email services such as Safe-Mail is the equivalent of purchasing Home Owners Insurance for your house...it gives you some piece of mind, but will not stop a fire and possible deaths from happening.

STOLEN E-MAIL MESS SEC LAUNCHES PROBE ON TROUBLED AMERICAN APPAREL

A batch of internal e-mails stolen from American Apparel on Christmas Eve has caught the attention of the Securities and Exchange Commission, sources told The Post.
The SEC has launched a probe into electronic correspondence between executives at the trendy retailer, including an alleged Christmas Eve e-mail from American Apparel's new financial chief saying the company "almost went bankrupt," sources said.


The probe is a fresh distraction for CEO Dov Charney, who is now scrambling to raise cash to pay off impatient creditors amid a brutal shopping environment.


Earlier this month, Charney met with billionaire investor Ron Burkle, requesting new financing to prop up the cash-strapped retailer, sources said.


It couldn't immediately be determined whether Burkle has agreed to help Charney.
Also unclear is whether the SEC probe has reached the status of a formal investigation. An SEC spokesman declined to comment.


Separately, police are investigating a Christmas Eve break-in to American Apparel's computer systems, according to people close to the company.

Read Full Article

American Apparel Eyed By SEC Over “Almost Bankrupt” Emails

American Apparel “almost went bankrupt” before Xmas according to internal emails allegedly stolen from CEO Dov Charney’s porn-based advertising/clothing empire.

This email is AA CFO Adrian Kowalewski explaining to AA pr man Ryan Holiday why he has been unresponsive to press requests for comment:
>—-— Original Message —-—
>From: Adrian Kowalewski
>To: Ryan Holiday
>Cc: Candace Keene
>Sent: Wed Dec 24 13:33:04 2008
>Subject: Re: Solution
>
>
>1. We almost went bankrupt last Friday. I’m sorry but I was busy with that
>for the last several weeks.
>2. I’ve been sick and occupied with other company matters since Friday
>because we’re hardly out of the woods on #1.
>3. It’s the holiday.
>
>If you want to handle these questions and it’s only 15 minutes then please
>go ahead.
Naturally, the SEC is interested in why a company claiming a 10 percent Q4 sales gain is also on the verge of bankruptcy.

Read Full Article

Leaked E-mail Shows How GE Puts The Government To Work For GE

"The intersection between GE's interests and government action is clearer than ever," General Electric Vice Chairman John G. Rice wrote in an Aug. 19 e-mail to colleagues.

Rice was calling on his co-workers to join the General Electric Political Action Committee. "GEPAC is an important tool that enables GE employees to collectively help support candidates who share the values and goals of GE."

The full letter suggests that "share the values and goals of GE" really means "support policies that profit the company."

Steve Milloy, a pro-free market investor at the Free Enterprise Action Fund, obtained this e-mail and says it reveals General Electric for what it really is. "GE is lobbying to become the biggest rent seeker this country has ever seen," Milloy told this column. Rent seeking is using government legislation or regulation to generate private profits the free market wouldn't provide.

"On climate change," Rice wrote, "we were able to work closely with key authors of the Waxman-Markey climate and energy bill, recently passed by the House of Representatives. If this bill is enacted into law it would benefit many GE businesses."

US Military Secrets Sent to Suffolk Tourist Site

A tourist information website promoting a small Suffolk town has had to shut down after it received a barrage of thousands of classified US military emails.

Sensitive information including future flight paths for US Presidential aircraft Air Force One, military strategy and passwords swamped Gary Sinnott's email inbox after he established www.mildenhall.com, a site promoting the tiny town of Mildenhall where he lives, the Anglia Press Agency reports.
As well as Mr Sinnott and his neighbours, Mildenhall is home to a huge US Air Force base and its 2,500 servicemen and women, and the similarity in domain names has led to thousands of misdirected emails from Air Force personnel. Any mail sent to addresses ending @mildenhall.com would have ended up in Mr Sinnott's mailbox.

Now military bosses have blocked all military email to the address, and persuaded him to close down his site to end the confusion. He is giving up ownership of the address next month.

Mr Sinnott said: "You wouldn't believe some of the stuff that I have been receiving - I wonder if they ever had any security training. When I told the Americans they went mental.

"I got mis-sent e-mails right from the start in 2000 but even after I warned the base they just kept on coming. At one stage I was getting thousands of spam messages a week.

Read Full Article

India says RIM is temporarily allowing lawful access to BlackBerry Messenger, and a permanent solution will be in place by end of January 2011


The prolonged dance between BlackBerry-maker Research in Motion and the government of India appears to be entering another phase—and India seems to be getting everything it wants. An Indian interior ministry spokesperson says RIM has set up an “interim arrangement” for lawful interception of BlackBerry Messenger services, and that a permanent solution should be in place by the end of January 2011. The Indian government and RIM are apparently still trying to find a way to satisfy India’s demands of access to encrypted corporate email services. The ministry spokesperson’s comments were reported in the Economic Times; RIM itself has consistently refused to comment on enabling governments to tap into its communications services.
Earlier this month, RIM won yet another reprieve on the shutdown of BlackBerry services in the country, as it continues to work with the Indian government to satisfy their concerns encrypted BlackBerry services could be used by militants and terrorists to plan attacks. Free speech and civil liberties advocates have pointed out the potential for abuse both by governments (who could use the same message interception capabilities for political ends) and by criminals (if they should find a way to access formerly-private communications).

Read Full Article

Leaked Emails Reveal Profits of Anti-Piracy Cash Scheme

September 26, 2010 

Friday night the anti-piracy law firm ACS:Law accidentally published its entire email archive online, effectively revealing how the company managed to extract over a million dollars (£636,758.22) from alleged file-sharers since its operation started. On average, 30% of the victims who were targeted paid up, and this money was divided between the law firm, the copyright holder and the monitoring company.

Right before the weekend the notorious ACS:Law managed to expose backups of its entire website and email database to the outside world. Hundreds of people have meanwhile started to dissect the contents of the mails, and are sharing their findings in forums and in comments posted online.

Aside from a lot of personal stuff, regular passwords, PayPal details and private pictures, the emails also shed a whole new light on the effectiveness of the letters of claim that are being sent out to thousands of
BitTorrent users and how the recouped money was divided.

Read Full Article
.