DefDog: Anonymous Intercepts FBI – Scotland Yard Conference Call On — Wait for It — Hacking… + Meta-RECAP

Computer/online security, Cultural Intelligence, IO Impotency, Law Enforcement

Example of the state of USGOV systems….

Anonymous gain access to FBI and Scotland Yard hacking call

BBC news, 3 February 2012

Hacking network Anonymous has released a recording of a conference call between the FBI and UK police in which they discuss efforts against hacking.

The call, said to have taken place last month, covers the tracking of Anonymous and similar groups, dates of planned arrests and evidence details.

Anonymous also published an email, apparently from the FBI, showing the email addresses of call participants.

The FBI confirmed the intercept and said it was hunting those responsible.

The loose collective Anonymous have targeted a number of big institutions in recent years

“The information was intended for law enforcement officers only and was illegally obtained. A criminal investigation is under way to identify and hold accountable those responsible,” it said in a statement.

London's Metropolitan Police's central e-crime unit said the matter was being investigated but that no operational risks had been identified.

A comment on one of the Twitter accounts linked to Anonymous, AnonymousIRC, said: “The FBI might be curious how we're able to continuously read their internal comms for some time now.”

Read full article.

Phi Beta Iota:  This is too funny for words.  Hackers and Phi Beta Iota have been very clear for over 20 years that most law enforcement systems are easy to hack into, especially now that they are all digital and controlled by a server where no one has had the brains to change the factory installed root password.  What is really happening now is that government incomtence in security is being “outed.”  CIA has worked overseas for decades, pretending to be clandestine when in fact all case officers have been known to local liaison.  Similarly, government “security” is an oxymoron.  On the one hand, it does not exist, and on the other we are spending tens of billions on the well-intentioned but ignorant threatics of the Transportation Security Agency (TSA) and the world's most expensive coffee klatch, the National Counter-Terrorism Center (NCTC).  This is what you end up with when a government of arrogant “experts” and even more arrogant politicians refuse to listen to both insider iconoclasts and outsider “loyal opposition” minds that actually know what they are talking about and see these things 20 years before the “leaders” at the top, who are really nothing more than clerks fighting for budget share, without a strategic bone in their bodies.

1994 Sounding the Alarm on Cyber-Security

See Also:

2011 Cyber-Command or IO 21 + IO Roots

Cofer Black: Hackers Evil, Pay Me… + Hackers RECAP

Cyber-Virus Proliferation: USG as “Main Enemy”

DefDog: Is DHS Stupid, Dishonest, or Both? + RECAP

DefDog: US Army Blows Intelligence Computing (Again)…

FBI Wages Its Own Cyberwar on Zombie PCs

IMF: Cyber-Militia Flexing Its Muscles?

Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Journal: Cyber-Heist 2nd Generation

Journal: Information Security Seven Guiding Principles

Journal: Pentagon as VERY Slow Learner….

Journal: US Public Health InfoTech NOT….

Journal: Who Controls (and Secures) the Internet?

Mario Profaca: US Lacks Cyber-Intelligence + RECAP

Reference: Bruce Schneier on Cyber War & Cyber Crime

Reference: Empire of Lies & Secrecy

Reference: Joe Nye on Cyber-Power

Robert Steele: Ignored 1994, Ignored 2011–Deja Vu

Robert Steele: Secrecy, Self-Restraint, & Democracy Done in By Elites and “Experts”

Rules for Governing Cyber-Conflict

Search: cybersecurity 1994

Search: Steele USMC C4I 1990′s

TDL-4 Rules–Industrial Era Governments Helpless

Undersea Cables: The Achilles Heel of our Economies

US Arms Industry Bleeding Secrets–This Is Not New

Financial Liberty at Risk-728x90