Teen to Plead Guilty to Staging Bomb Hoaxes For Lulz

A North Carolina teenager has agreed to plead guilty to a federal conspiracy charge for phoning in hoax bomb threats to colleges, middle schools and FBI offices around the country for the amusement of a live internet audience.

Ashton Lundeby, 17, and his associates staged bomb hoaxes from mid-2008 until Lundeby’s arrest in March of last year, according to a plea agreement (.pdf) filed Wednesday. Victims included Purdue University, the University of North Carolina, Clemson University, Florida State University, Boston College, Hamden High School, West Hempfield Middle School, and FBI offices in Colorado and Louisiana.

“He agreed to plead guilty,” says prosecutor Kenneth Hays. “There is a plea hearing scheduled for Wednesday of next week.”

As we reported last year, Lundeby was known online as “Tyrone,” a celebrity in a prank-calling community that grew in 2008 out of the trouble-making “/b/” board on 4chan. Using the VOIP conferencing software Ventrilo, as many as 300 listeners would gather on a server run by Lundeby to listen to him and other amateur voice actors make often-crude and racist phone calls.

“All will be cleansed.” Listen to the March 4, 2009 bomb threats

The pranks became more serious when “Tyrone” began accepting PayPal donations from students eager to miss a day of class. In exchange for a little money, he would phone in a bomb threat that would shutter the donor’s school for a day.

“There are four bombs located in each wing of your school, Wing A, Wing B, Wing C and Wing D, throughout various lockers, bathrooms and receptacles throughout the building,” went one such call to Hamden High School in Connecticut, a recording of which was obtained by Threat Level last year.

Continue Reading “Teen to Plead Guilty to Staging Bomb Hoaxes For Lulz” »

Will 400,000 Secret Iraq War Documents Restore WikiLeaks’ Sheen?

After a brief quiescence, the secret-spilling website WikiLeaks is about to explode again onto the global stage with the impending release of almost 400,000 secret U.S. Army reports from the Iraq War, marking the largest military leak in U.S. history.

Measured by size, the database will dwarf the 92,000-entry Afghan war log WikiLeaks partially published last July. “It will be huge,” says a source familiar with WikiLeaks’ operations, who spoke on condition of anonymity. Former WikiLeaks staffers say the document dump was at one time scheduled for Monday, October 18, though the publication date may well have been moved since then. Some large media outlets were provided an embargoed copy of the database in August.

In Washington, the Pentagon is bracing for the impact. The Defense Department believes the leak is a compilation of the “Significant Activities,” or SIGACTS, reports from the Iraq War, and officials have assembled a 120-person taskforce that’s been scouring the database to prepare for the leak, according to spokesman Col. Dave Lapan.

Continue Reading “Will 400,000 Secret Iraq War Documents Restore WikiLeaks’ Sheen?” »

Supreme Court Won’t Review President’s Right to Eject Critics From Events

The Supreme Court is refusing to hear a legal challenge by two Americans ejected from a President George W. Bush event in 2005 for having a “no more blood for oil” bumper sticker on their vehicle.

Only two justices voted Tuesday to review a lower court’s ruling that said the pair had no First Amendment right to attend Bush’s 2005 public speech at the Wings Over the Rockies Museum in Colorado. The White House had a policy of excluding those who did not agree with the president from his public appearances.

It was a policy a federal appeals court upheld in January and one Justice Ruth Bader Ginsburg blasted on Tuesday. “Ejecting them for holding discordant views could only have been a reprisal for the expression conveyed by the bumper sticker,” (.pdf) Ginsburg wrote. Joining her was Justice Sonia Sotomayor.

Continue Reading “Supreme Court Won’t Review President’s Right to Eject Critics From Events” »

School District Pays $610,000 to Settle Webcam Spying Lawsuits

A suburban Philadelphia school district is agreeing to pay $610,000 to settle two lawsuits brought by students who were victims of a webcam spying scandal in which high school-issued laptops secretly snapped thousands of pictures of pupils.

The agreed payout by the Lower Merion School District comes two months after federal authorities announced they would not prosecute administrators.

Prosecutors and the FBI opened an inquiry following a February privacy lawsuit accusing administrators of spying on students with webcams on the 2,300 district-issued MacBooks. The lawyers who filed lawsuits on behalf of two students acquired evidence in pretrial proceedings showing that the district secretly snapped thousands of webcam images of students, including pictures of youths at home, in bed or even “partially dressed.”

Continue Reading “School District Pays $610,000 to Settle Webcam Spying Lawsuits” »

Caught Spying on Student, FBI Demands GPS Tracker Back

A California student got a visit from the FBI this week after he found a secret GPS tracking device on his car, and a friend posted photos of it online. The post prompted wide speculation about whether the device was real, whether the young Arab-American was being targeted in a terrorism investigation and what the authorities would do.

It took just 48 hours to find out: The device was real, the student was being secretly tracked and the FBI wanted its expensive device back, the student told Wired.com in an interview Wednesday.

The answer came when half-a-dozen FBI agents and police officers appeared at Yasir Afifi’s apartment complex in Santa Clara, California, on Tuesday demanding he return the device.

Afifi, a 20-year-old U.S.-born citizen, cooperated willingly and said he’d done nothing to merit attention from authorities. Comments the agents made during their visit suggested he’d been under FBI surveillance for three to six months.

An FBI spokesman wouldn’t acknowledge that the device belonged to the agency or that agents appeared at Afifi’s house.

“I can’t really tell you much about it, because it’s still an ongoing investigation,” said spokesman Pete Lee, who works in the agency’s San Francisco headquarters.

Afifi, the son of an Islamic-American community leader who died a year ago in Egypt, is one of only a few people known to have found a government-tracking device on their vehicle.

His discovery comes in the wake of a recent ruling by the 9th U.S. Circuit Court of Appeals saying it’s legal for law enforcement to secretly place a tracking device on a suspect’s car without getting a warrant, even if the car is parked in a private driveway.

Brian Alseth from the American Civil Liberties Union in Washington state contacted Afifi after seeing pictures of the tracking device posted online and told him the ACLU had been waiting for a case like this to challenge the ruling.

“This is the kind of thing we like to throw lawyers at,” Afifi said Alseth told him.

“It seems very frightening that the FBI have placed a surveillance-tracking device on the car of a 20-year-old American citizen who has done nothing more than being half-Egyptian,” Alseth told Wired.com.

Afifi, a business marketing student at Mission College in Santa Clara, discovered the device last Sunday when he took his car to a local garage for an oil change. When a mechanic at Ali’s Auto Care raised his Ford Lincoln LS on hydraulic lifts, Afifi saw a wire sticking out near the right rear wheel and exhaust.

Garage owner Mazher Khan confirmed for Wired.com that he also saw it. A closer inspection showed it connected to a battery pack and transmitter, which were attached to the car with a magnet. Khan asked Afifi if he wanted the device removed and when Afifi said yes, Khan pulled it easily from the car’s chassis.

“I wouldn’t have noticed it if there wasn’t a wire sticking out,” Afifi said.

Later that day, a friend of Afifi’s named Khaled posted pictures of the device at Reddit, asking if anyone knew what it was and if it meant the FBI “is after us.” (Reddit is owned by CondeNast Digital, which also owns Wired.com).

“My plan was to just put the device on another car or in a lake,” Khaled wrote, “but when you come home to 2 stoned off-their-asses people who are hearing things in the device and convinced it’s a bomb you just gotta be sure.”

A reader quickly identified it as an Orion Guardian ST820 tracking device made by an electronics company called Cobham, which sells the device only to law enforcement.

No one was available at Cobham to answer Wired.com’s questions, but a former FBI agent who looked at the pictures confirmed it was a tracking device.

The former agent, who asked not to be named, said the device was an older model of tracking equipment that had long ago been replaced by devices that don’t require batteries. Batteries die and need to be replaced if surveillance is ongoing so newer devices are placed in the engine compartment and hardwired to the car’s battery so they don’t run out of juice. He was surprised this one was so easily found.

“It has to be able to be removed but also stay in place and not be seen,” he said. “There’s always the possibility that the car will end up at a body shop or auto mechanic, so it has to be hidden well. It’s very rare when the guys find them.”

He said he was certain that agents who installed it would have obtained a 30-day warrant for its use.

Afifi considered selling the device on Craigslist before the FBI showed up. He was in his apartment Tuesday afternoon when a roommate told him “two sneaky-looking people” were near his car. Afifi, already heading out for an appointment, encountered a man and woman looking at his vehicle outside. The man asked if Afifi knew his registration tag was expired. When Afifi asked if it bothered him, the man just smiled. Afifi got into his car and headed for the parking lot exit when two SUVs pulled up with flashing lights carrying four police officers in bullet-proof vests.

The agent who initially spoke with Afifi identified himself then as Vincent and told Afifi, “We’re here to recover the device you found on your vehicle. It’s federal property. It’s an expensive piece, and we need it right now.”

Afifi asked, “Are you the guys that put it there?” and the agent replied, “Yeah, I put it there.” He told Afifi, “We’re going to make this much more difficult for you if you don’t cooperate.”

Expert: ACTA No Longer Gutting Internet Freedom

The United States is caving on the internet section of a proposed international intellectual-property treaty, meaning its one-time quest to globally dictate draconian copyright rules has come to an abrupt halt.

That’s what Michael Geist, an Anti-Counterfeiting Trade Agreement expert at the University of Ottawa, concluded Wednesday after the United States released the latest draft of the proposal (.pdf).

“If you’re a Wired U.S. reader, from an internet perspective, this really doesn’t change much of anything,” Geist said in a telephone interview.

At one point, the United States was demanding the nine negotiating nations and the European Union adopt rules similar to the U.S. Digital Millennium Copyright Act, which gives internet service providers immunity from copyright violations if they take down content at the request of a rights holder. In Canada, where Geist teaches, there is no such takedown requirement.

Continue Reading “Expert: ACTA No Longer Gutting Internet Freedom” »

Hacked Voting System Stored Accessible Password, Encryption Key

An internet-based voting system that was hacked last week by researchers at the University of Michigan stored its database username, password and encryption key on a server open to attack.

Alex Halderman, a computer scientist at the university, has detailed the vulnerabilities and hacking techniques his students used to completely control the system last week. The hack allowed them to change votes and program the system to play his school’s fight song “Hail to the Victors” after each voter cast their ballot.

The hack, unnoticed by election officials until researchers notified them, forced election officials to take the system offline and adopt a contingency plan for the November elections.

Washington, DC, began testing its internet voting system last Tuesday in advance of the November elections. The system, paid for in part with a $300,000 federal grant, is designed to let overseas military and civilian voters cast ballots quickly, instead of relying on the postal system to deliver their votes in a timely manner.

But within 36 hours of the system going live, Halderman’s team found and exploited a shell-injection vulnerability that “gave us almost total control of the server software, including the ability to change votes and reveal voters’ secret ballots.”

We modified all the ballots that had already been cast to contain write-in votes for candidates we selected. (Although the system encrypts voted ballots, we simply discarded the encrypted files and replaced them with different ones that we encrypted using the same key.) We also rigged the system to replace future votes in the same way.

We installed a back door that let us view any ballots that voters cast after our attack. This modification recorded the votes, in unencrypted form, together with the names of the voters who cast them, violating ballot secrecy.

The hack left lots of traces that an intrusion detection system should have caught. Nonetheless, it went unnoticed for two business days until Friday afternoon when several testers directed election officials to the Michigan fight song playing on their $300,000 voting system.

See also:

Army Updates Espionage Rulebook Following Leaks to WikiLeaks

The Army has updated a 17-year-old rulebook on espionage following internal leaks of classified information to the secret-spilling site WikiLeaks.

The update, released Monday, now requires troops to alert authorities if they suspect someone is leaking classified information to the media or any other unauthorized person, according to the Associated Press, identifying media leaks specifically for the first time. It also requires the Army to create a central system to collect threat reports and for soldiers to report incidents of someone removing classified information from their proper work area.

The previous version of the guidelines simply required troops to report cases of treason or attempted intrusions into automated systems, the AP notes. The Army insists the update is not related to the WikiLeaks leaks but is simply part of a comprehensive review.

In May, a former Army intelligence analyst named Bradley Manning was arrested for allegedly leaking a classified Army video showing a gunship attack in Iraq, which WikiLeaks published in April.

In online chats with a former hacker, Manning claimed to have leaked the video as well as a trove of other classified data to WikiLeaks, including a separate video showing the notorious May 2009 air strike near Garani village in Afghanistan — which WikiLeaks has acknowledged possessing but has not yet published — and a database covering 500,000 events in the Iraq War between 2004 and 2009. Manning said the database included reports, dates, and latitude and longitude of events, as well as casualty figures. According to WikiLeaks insiders, the site is preparing to publish a cache of Iraq War documents on October 18. It appears to be similar to a database of Army reports from the Afghan war that WikiLeaks published in July.

Manning also took credit for leaking a cache of database of 260,000 classified U.S. diplomatic cables to WikiLeaks. Although the site published at least one cable earlier this year that Manning appeared to take credit for in the chats, WikiLeaks founder Julian Assange, in a Twitter message, has denied possessing a cache of 260,000 State Department cables.

Manning has been charged with downloading the classified Iraq video and transmitting it to a third party, in violation of the Espionage Act, 18 U.S.C. 793(e), a section of the act that involves passing classified information to an uncleared party, but not a foreign government.

He’s also charged with allegedly abusing access to the government’s Secret-level SIPR network to obtain more than 150,000 U.S. State Department cables, as well as an unspecified classified PowerPoint presentation.

Secret-Spilling Sources at Risk Following Cryptome Breach 

Secret-spilling site Cryptome was hacked over the weekend, possibly exposing the identities of whistleblowers and other confidential sources, according to a hacker who contacted Wired.com and claimed responsibility for the breach.

The hacker said two intruders from the group Kryogeniks breached the long-running site, where they gained access to a repository of secret files and correspondence. Among them, the hacker claimed, were the records of self-proclaimed WikiLeaks insiders who have been the source of several unconfirmed tips supposedly detailing internal WikiLeaks matters.

Wired.com could not confirm the identity of the hacker, who asked to be identified as “Ruxpin” or “Xyrix.” To verify his claims, the hacker showed Wired.com screenshots of Cryptome founder John Young’s Earthlink account inbox and Cryptome’s directory. The latter showed two WikiLeaks file paths. The hacker also provided a list of about 30 names and e-mail addresses of sources who communicated with Cryptome and the contents of one e-mail exchange between Young and a Wired.com contributor from 2008. The Wired.com contributor and Young have authenticated the e-mail.

The hacker said they broke into Cryptome using a stolen e-mail password for the Earthlink account belonging to Young. They then used the e-mail account to reset the password for his site’s hosting account. The hacker claims they copied 6.8 terabytes of data from Cryptome, though “no files were deleted or altered.”

“Everything was copied for analysis,” one of the hackers wrote Wired.com in an e-mail interview. “Cryptome is an interesting read indeed.” He added that “only data that had relatively new time stamps is being given thought. There is simply too much to sift through.”

Young, reached by phone, confirmed some of the information provided by the hacker but disputed other assertions.

He didn’t know how the hackers got into his site or if data was deleted but said that “all the files were inaccessible,” and that Network Solutions had to restore content from a backup. He disputed the amount of data the hackers say they obtained.

“We had a little over 7 gigabytes, but not terabytes,” he said. “We’ve never had that much.”

Regarding the WikiLeaks insiders, although he acknowledged that some of them communicated with what appear to be e-mail addresses that could identify them, he doesn’t believe they’re actual WikiLeaks insiders and says he’s never done anything to verify their identities, and that the e-mail addresses could have easily been spoofed.

“I’ve not verified any of those and don’t know how one would,” he said. “I’ve been quite skeptical of anyone claiming to be a WikiLeaks insider.”

The hack of Cryptome would seem to illustrate the real value that a site like WikiLeaks offers. Cryptome, a proto-WikiLeaks, has published many important leaks since it was launched in 1996, exposing government secrets and gaffes.

The site, however, doesn’t provide the kind of secure, anonymized submission process that WikiLeaks boasts. Instead, it uses e-mail addresses controlled by Young, raising the risk that sensitive sources could be exposed by this and other hacks. Despite many controversies surrounding WikiLeaks and its founder, that site has never had a security breach, as far as anyone knows. But now Cryptome has.

The WikiLeaks Connection

According to the hacker, Cryptome’s WikiLeaks files contain ample communication between Young and about half-a-dozen supposed WikiLeaks insiders who, out of purported discontent with WikiLeaks founder Julian Assange and his management of the organization, have sent Cryptome unverified tips about supposed malfeasance and other activities inside WikiLeaks.

Young, who has long been suspicious of WikiLeaks’ motives, began publishing the tips this spring, despite expressing doubts publicly about their veracity. The tips prompted the ire of WikiLeaks, which referred to them as a “smear campaign” and has disputed that the sources are insiders.

Cryptome’s hacker claims that although some of the “insiders” initially communicated anonymously with Cryptome using a PGPBoard drop box, they later used personal e-mail addresses for ongoing correspondence, thus potentially exposing their identities to anyone with access to Cryptome’s files.

“Six [WikiLeaks insiders] are on familiar terms with John Young,” he told Wired.com. “Their real names are exposed in their signatures and in their messages. They are using familiar, personal accounts to communicate with Young.”

The hacker noted that “someone@wikileaks.org writes about problems with their leader and problems with money. He sends a PDF (was published to the site recently), some chat logs, and information about the encryption process for submits that he thinks is suspicious. This is from one of the regulars.”

He declined to identify the WikiLeaks correspondents or the e-mail addresses they used.

“Their privacy is to be respected, and they will not be exposed or compromised,” he wrote. “We believe in preserving the system of transparency that Cryptome and other websites represent.”

The hacker claimed that Young demanded proof from the insiders to verify their connection to WikiLeaks and that “he gets it with ease” from them.

“They are legitimate,” the hacker wrote. “Those who are not, appear to get trolled (John Young is absolutely hilarious) and moved to a different folder.”

Asked if the identities of other anonymous sources of Cryptome were also exposed, he replied, “Yes, all of them are. [Young’s] address books were compromised, and many of the messages were not sent from anonymous emails … there are over hundreds. Too many to easily quantify.”

How They Got In

The whois record for Cryptome, which is hosted by Network Solutions, listed the site contact address as jya@pipeline.com, one of Young’s accounts.

The hackers got the password for the e-mail account through Earthlink’s customer service center. Earthlink handles customer service for Pipeline accounts and uses a system, called MIDAS, that stores customer passwords unencrypted, in the clear, according to the hacker.

“Any Earthlink employee using MIDAS can do this without effort,” he wrote. “MIDAS is a legacy ssh application that many of the employees do not use, preferring a web interface called Spirtle instead.”

Earthlink did not return a call for comment.

The hacker said Earthlink’s system was breached about a month ago, at which time Cryptome’s login credentials were seized.

Armed with that password, according to a Network Solutions spokesman, the hackers then initiated a password reset for Cryptome’s hosting account using an online form. Network Solutions sent an automated e-mail to Young’s Pipeline account with a link to reset the password. The hackers, who had control of the e-mail account, then used the link to reset the Network Solutions Cryptome password twice — to passw0rd1 and then letmein1 — locking Young out of his account while they rummaged through Cryptome’s content.

The hackers said they decided to breach Cryptome primarily to harass a fellow hacker named Josh Holly, aka “TrainReq,” by posting a message identifying Holly as Cryptome’s hacker. Holly is best known for allegedly hacking into Miley Cyrus’s Gmail account and stealing provocative photos she purportedly sent of herself to singer Nick Jonas.

“Cryptome is a popular website,” the hacker wrote Wired.com. “Many people would have seen the joke (defacement), and the person (Trainreq) would have been subsequently bombarded with inquires about that to which he was clueless.”

The message included a shout-out to fellow Kryogeniks members EBK and Defiant — Christopher Allen Lewis and James Robert Black, Jr. — who were recently sentenced to 18 months and 4 months in prison respectively for a stunt in which they replaced Comcast’s homepage with a shout-out to fellow hackers.

The Cryptome hackers deleted the shout-out to Holly before many people saw it, however. “It did not have the intended effect,” the hacker wrote. “Josh Holly was sleeping and unavailable for trolling.”

They replaced it with another one identifying “Ruxpin” as Cryptome’s hacker. It’s not known if Ruxpin is one of the hackers behind the hack, since the hackers acknowledged they initially intended to point blame for the hack at someone else. It’s also not known if Ruxpin is the real handle for the hacker who communicated with Wired.com.

In addition to the shout-outs, the hackers left a note for Young: “Dear John. Rest assured that the integrity of the data hosted here has not been altered. We like Cryptome and needed your site because it was popular. Sorry. Godspeed.”

Young was not amused and says he’s determined to hunt down the intruders.

“One of the things I’m interested in is how much prowling they did beyond Cryptome,” he said. “Any rummaging in our e-mail is different than rummaging in Cryptome. We’re going to burn his or her ass with that.”

See also

Voting System Pwned by Michigan Wolverines

It’s a win for the University of Michigan Wolverines, . . . if not for anyone else.

After election officials in Washington, D.C., egged on hackers to have a go at their new internet voting system, they did just that. The result was Michigan’s fight song “Hail to the Victors” played to voters after they cast their ballots.

Election officials were testing their new pilot voting system in advance of elections in November, but had to pull it down on Friday after the hackers seized it.

Officials initially cited “usability issues” that had been brought to their attention, but the election board’s chief technology officer later admitted to the Washington Post that “the integrity of the system had been violated.”

A Michigan professor apparently “unleashed his students” on the system to get the win for Michigan.

The system, which was paid for in part with a $300,000 federal grant, was supposed to allow about 900 military personnel and overseas voters the ability to cast absentee ballots. But officials now say the voters will only be able to download their ballots via the system and will then have to send them in separately — via post, e-mail or fax – to be counted.

Common Cause, computer scientists and others had warned election board officials that the system was a security risk, but officials had dismissed their concerns.