Jumaat, 23 Ogos 2013

The Malaysian Insider :: Features


Klik GAMBAR Dibawah Untuk Lebih Info
Sumber Asal Berita :-

The Malaysian Insider :: Features


Twelve years after 9/11, retiring FBI chief still sees threat

Posted: 22 Aug 2013 04:59 PM PDT

August 23, 2013
Latest Update: August 23, 2013 03:59 pm

He took the reins of the FBI a week before the attacks of September 11, 2001. Twelve years later, Robert Mueller is retiring, convinced that "the threat is still here."

Shortly before passing the baton to his successor James Comey on September 4 - a dozen years to the day since becoming director - Mueller spoke to several media outlets, including AFP.

Under his leadership, the US Federal Bureau of Investigation has evolved considerably, from an agency probing past attacks to one whose "number one priority" was to prevent them.

"When I came on board, I had been a prosecutor for a number of years, spending time on those kinds of cases - organized crime, narcotics cases, white-collar cases and the like," recalled the lanky 69-year-old.

"I had in my own mind some ideas where the Bureau needed to go - and a week later we had September 11."

"I did not expect that I'd be spending my time preventing terrorist attacks," he added.

During the upheaval of the US security apparatus that followed, the FBI saw its prime focus turn to anti-terrorism.

At the time, 2,000 out of 11,000 special agents were immediately transferred from fighting crime to combatting Al-Qaeda. Since then, the number of intelligence analysts at the FBI has more than tripled.

Over time, the danger posed by Al-Qaeda and its affiliates has evolved but, together with cyber threats, will remain "our number one priority for the foreseeable future."

While Al-Qaeda "was badly diminished, decimated," there was growth in other satellites after 2001 - including the Somali Islamist group Shebab and Al-Qaeda in the Arabian Peninsula (AQAP) in Yemen, Mueller said.

One of Mueller's many accomplishments was the foiling of an attack - planned by AQAP - on a commercial airliner bound for Detroit on Christmas Day 2009.

Mueller expressed concern about the "shifting landscape in terms of the countries involved in the Arab Spring - Tunisia, Libya, Mali, to a lesser extent Algeria, Syria and, quite obviously in the last two months, Egypt."

"Every one of these countries has individuals who you would put in the category of violent extremists that present threats down the road, not just to the US but to Americans overseas," he said.

Mueller also expressed concern about the threat posed by so-called "lone wolf" attackers who often become radicalized and learn how to make bombs online.

"Lone wolf or solo terrorists are much more difficult for us to identify and to disrupt for an attack to take place," he said.

"It's hard to quantify (the threat) because you have one metric and that is preventing all attacks. If there's one attack, you're unsuccessful."

In reference to the fatal shooting at the Fort Hood army base in 2009 and the Boston Marathon bombings on April 15, Mueller said: "It's part of a pattern we've seen recently but a pattern that probably will be replicated in the future."

Major Nidal Hasan, a US army psychiatrist, is on trial for the Fort Hood rampage and has confessed to shooting dead 13 people. The marathon bombing, meanwhile, is believed to have been carried out by two brothers of Chechen origin, Dzhokhar and Tamerlan Tsarnaev.

The existence of "lone wolves" is why telephone and Internet surveillance programs are "tremendously important," Mueller explained.

The National Security Agency charged with collecting such data has come under scrutiny in the wake of recent revelations by former NSA contractor Edward Snowden about the scope of collection programs.

"There have been occasions - very few, I might say - when there have had to be some adjustments," Mueller said.

"But I am fairly confident we are doing things the way the American people wants us to, with an appreciation on the potential impact on privacy and civil liberties."

In 2004, Mueller threatened to resign over a warrantless wiretapping program under the administration of George W. Bush.

In the end, he was in the top FBI post for the second longest period after J. Edgar Hoover, who held it for 48 years until his death. -  AFP, August 23, 2013.

Ex-Soviet hackers play outsized role in cyber crime world

Posted: 22 Aug 2013 03:52 PM PDT

August 23, 2013
Latest Update: August 23, 2013 07:51 am

the virus lab at the headquarters of Russian cyber security company Kaspersky Labs in Moscow. Reuters pic, August 22, 2013.the virus lab at the headquarters of Russian cyber security company Kaspersky Labs in Moscow. Reuters pic, August 22, 2013.If you want to hack a phone, order a cyber attack on a competitor's website or buy a Trojan programme to steal banking information, look no further than the former Soviet Union.

The breadth and sophistication of services sold on Russian-language websites such as Forum.zloy.bz or Forum.evil offer a small window onto a Russian criminal underground that is costing Western firms billions of dollars in credit card and online banking fraud as well as "phishing" attempts to lure people into downloading malware or disclosing passwords.

"If you look at the quantity of malware attacks, the leaders are China, Latin America and then Eastern Europe, but in terms of quality then Russia is probably the leader," said Vitaly Kamluk, a cyber security researcher in Moscow.

Two of the five most wanted men in the United States for cyber crime are Russian, and one is from Latvia, which used to be part of the Soviet Union.

Russians were also behind the biggest cyber crime case in US history. Federal prosecutors named four Russians and a Ukrainian in a banking card fraud spree that cost companies including J.C. Penney Co, JetBlue Airways Corp and French retailer Carrefour SA more than $300 million.

The risk of being prosecuted is so low it does little to dissuade highly educated and skilful but under-employed programmers from turning to illicit hacking for profit or fun.

In a country where wages are lower than in the West and life is expensive, and which has long produced some of the world's best mathematicians, the temptation to turn to crime is great, and the hackers are in general ahead of the people trying to catch them.

"People think: 'I've got no money, a strong education and law enforcement's weak. Why not earn a bit on the side?'" said Alexei Borodin, a 21-year-old hacker.

As long as these hackers target victims abroad, experts say, the Russian authorities are willing to sit back and let them develop tools to burrow into computer vulnerabilities, which they can in turn use for their own cyber espionage.

Two of the Russian suspects in the banking card fraud case were arrested while in the Netherlands, but two others – Alexander Kalinin, 26, and Roman Kotov, 32 - are still at large and thought to be in Russia, where experts doubt they will be caught.

Moscow's decision to harbour Edward Snowden, wanted in the United States for leaking details of government surveillance programmes on the phone and Internet, is likely to freeze already slow-moving cross-border police cooperation with Washington, they said.

"They have been doing this in Russia for many years now," said Misha Glenny, an expert and author on cyber crime.

"Russian law enforcement and the FSB (Federal Security Service) in particular have a very good idea of what is going on and they are monitoring it but as long as the fraud is restricted to other parts of the world they don't care."

Several email requests for comment and calls over three weeks to the special Interior Ministry unit tasked with policing the web – Department K – went unanswered.

The pool of talent churned out by top-tier institutes excelling in hard sciences across the former Soviet Union is indisputable.

A trio of students from the St Petersburg National Research University, for instance, won the oldest and most prestigious world programming competition, the ACM International Collegiate Programming Contest, four times in the last six years.

Three Russian teams, one from Belarus and one from Ukraine, were also among the top ten finalists this year in the contest, which featured teams from 2,322 universities in 91 countries.

But in a 2013 survey, only 51 percent of IT specialists in Russia polled by HeadHunter, a recruiting website, found jobs in the country's burgeoning IT sector. It said average salaries in Moscow for work in information security was 65,000 roubles ($2,000) a month, far less than Western counterparts would earn.

Hacking is not a crime in and of itself. So-called white-hat hackers, who access computers to bolster security defences, face off at the front lines of a virtual battleground with criminals, known as crackers or black-hat hackers, who break in with ill intent.

Hackers on both sides of that divide are mostly aged 22 to 30 and, in Russia, many may have been university classmates.

Borodin, who works on start-ups involved in Bitcoin, the virtual currency, describes web security as his hobby. Known as ZonD80, he began exploring computer vulnerabilities at the age of 12, and made waves last year by publishing a hack allowing iPhone users to avoid paying for in-App upgrades – a system loophole it took him about a week to find.

He says he has never broken the law.

"I hacked Apple and Google systems, but I've been working on the other side for ages... Now it's fun to design defences against all the hacks I used to do myself," he said in an interview via instant messenger.

"There aren't really any boundaries. Someone can go over to the bad side or suddenly become a protector. In any event, if you're caught, then you were in the wrong place at the wrong time."

At the Moscow headquarters of the Kaspersky Lab, a Russian rival to US security firms Symantec or McAfee, sweatshirt-clad youths sit silently tapping away in an ultra-sleek workspace.

"Stealing money from behind a screen is incomparably easier psychologically than attacking someone in the street," Kamluk, 29, said in a round, glass room known as the Virus Lab. Here client data on millions of suspicious programs is parsed by analysts sitting at a circle of screens that looks like a spaceship control room.

"Using technical means, you can fight cyber crime endlessly, but it is a non-stop weapons race: We make security systems and they find ways around it."

The soft-spoken Belarusian, who sports a Mohawk and a T-shirt printed with green-on-black computer code, was hired in 2005 and is now part of an elite team chosen by CEO Eugene Kaspersky to investigate new or exotic cyber threats.

The Global Research and Expert Analysis Team, or GREAT for short, discovered the Stuxnet cyber weapon, which is believed to have been used by the United States and Israel to attack Iran's nuclear programme a few years ago.

This year Kamluk and other GREAT prodigies uncovered a Russian-speaking cyber espionage gang, Red October, operating a complex data-hijacking system used to steal intelligence from government, military and diplomatic targets worldwide.

GREAT was not able to identify who was behind the gang. But the manpower and expense needed to wield such a network is believed by some experts to point to the involvement of a state intelligence agency, possibly Russian.

On the Blackhacker.ru forum, threads offer advice on what countries have the most crime-friendly laws and sell cyber tools such as bullet-proof hosting from which to launch attacks.

In a feeble nod to the law, some sellers post disclaimers, denying responsibility if their service is put to criminal use.

Such forums played a crucial role in the criminal baptism of a generation of programmers who emerged onto the job market in the 1990s when the Soviet Union was unravelling, and have served as hacker incubators popularising cyber crime in Russia.

"In 2008, you needed to buy a Botnet (network of infected computers) and set it up, it was quite sophisticated. Nowadays, every schoolboy can do this by... using forums and reading," said Maxim Goncharov, a researcher at security firm Trend Micro.

The amount of cash flowing to this underground industry is hard to quantify as many companies do not report losses. Moscow-based cyber forensics firm Group-IB estimated the Russian cyber crime market was worth $2.3 billion in 2011 and far more today.

Some of the cash, it says, goes to pay off corrupt police, who then tip off the criminals.

Andrey Komarov, head of international projects at Group-IB, said cyber criminals are winning in the war against the world's law enforcement agencies.

"It is like the battle between a fly and an elephant," said Komarov said. "Some cyber criminals have very close contacts with corrupted law enforcement agencies, and during our investigations some disappeared and were not arrested." - Reuters, August 22, 2013.

Kredit: http://www.themalaysianinsider.com

0 ulasan:

Catat Ulasan

 

Malaysia Insider Online

Copyright 2010 All Rights Reserved