Example of the state of USGOV systems….
Anonymous gain access to FBI and Scotland Yard hacking call
BBC news, 3 February 2012
Hacking network Anonymous has released a recording of a conference call between the FBI and UK police in which they discuss efforts against hacking.
The call, said to have taken place last month, covers the tracking of Anonymous and similar groups, dates of planned arrests and evidence details.
Anonymous also published an email, apparently from the FBI, showing the email addresses of call participants.
The FBI confirmed the intercept and said it was hunting those responsible.
“The information was intended for law enforcement officers only and was illegally obtained. A criminal investigation is under way to identify and hold accountable those responsible,” it said in a statement.
London's Metropolitan Police's central e-crime unit said the matter was being investigated but that no operational risks had been identified.
A comment on one of the Twitter accounts linked to Anonymous, AnonymousIRC, said: “The FBI might be curious how we're able to continuously read their internal comms for some time now.”
Phi Beta Iota: This is too funny for words. Hackers and Phi Beta Iota have been very clear for over 20 years that most law enforcement systems are easy to hack into, especially now that they are all digital and controlled by a server where no one has had the brains to change the factory installed root password. What is really happening now is that government incomtence in security is being “outed.” CIA has worked overseas for decades, pretending to be clandestine when in fact all case officers have been known to local liaison. Similarly, government “security” is an oxymoron. On the one hand, it does not exist, and on the other we are spending tens of billions on the well-intentioned but ignorant threatics of the Transportation Security Agency (TSA) and the world's most expensive coffee klatch, the National Counter-Terrorism Center (NCTC). This is what you end up with when a government of arrogant “experts” and even more arrogant politicians refuse to listen to both insider iconoclasts and outsider “loyal opposition” minds that actually know what they are talking about and see these things 20 years before the “leaders” at the top, who are really nothing more than clerks fighting for budget share, without a strategic bone in their bodies.
1994 Sounding the Alarm on Cyber-Security
See Also:
2011 Cyber-Command or IO 21 + IO Roots
Cofer Black: Hackers Evil, Pay Me… + Hackers RECAP
Cyber-Virus Proliferation: USG as “Main Enemy”
DefDog: Is DHS Stupid, Dishonest, or Both? + RECAP
DefDog: US Army Blows Intelligence Computing (Again)…
FBI Wages Its Own Cyberwar on Zombie PCs
IMF: Cyber-Militia Flexing Its Muscles?
Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)
Journal: Cyber-Heist 2nd Generation
Journal: Information Security Seven Guiding Principles
Journal: Pentagon as VERY Slow Learner….
Journal: US Public Health InfoTech NOT….
Journal: Who Controls (and Secures) the Internet?
Mario Profaca: US Lacks Cyber-Intelligence + RECAP
Reference: Bruce Schneier on Cyber War & Cyber Crime
Reference: Empire of Lies & Secrecy
Reference: Joe Nye on Cyber-Power
Robert Steele: Ignored 1994, Ignored 2011–Deja Vu
Robert Steele: Secrecy, Self-Restraint, & Democracy Done in By Elites and “Experts”
Rules for Governing Cyber-Conflict
Search: Steele USMC C4I 1990′s
TDL-4 Rules–Industrial Era Governments Helpless
Undersea Cables: The Achilles Heel of our Economies
US Arms Industry Bleeding Secrets–This Is Not New