Toggle light / dark theme

Want to take someone’s site down and need a cheap hacker; well the Dark Web has them.


In the lawless digital hinterlands of the dark web, hackers hire out their expertise for just £20, offering to cripple websites with an overload of data from ready-made “botnet” armies.

On hidden forums, accessible only by using encrypted technology, clients tout for their services, bidding to have cybercriminals perform all manner of illegal activities, such as compromising university systems to alter grades.

Daniel Smith, a former hacker working for the online security company Radware, gave The Times a tour of the sites and services available via encrypted browsers on the dark web.

It seems the dark web is now making it easier for disgruntled employees to take their revenge to the next level, we learn from the KrebsOnSecurity article, “Rise of Darknet Stokes Fear of the Insider.” The article cites Gartner analyst Avivah Litan; she reports a steep increase in calls from clients concerned about vindictive employees, current or former, who might expose sensitive information on the dark web. Not surprisingly, companies with a lot of intellectual property at stake are already working with law-enforcement or private security firms to guard against the threat.

How, exactly, is the dark web making worker retaliation easier than ever before? Writer Brian Krebs explains:

Noam Jolles, a senior intelligence expert at Diskin Advanced Technologies, studies darknet communities. I interviewed her last year in ‘Bidding for Breaches,’ a story about a secretive darknet forum called Enigma where members could be hired to launch targeted phishing attacks at companies. Some Enigma members routinely solicited bids regarding names of people at targeted corporations that could serve as insiders, as well as lists of people who might be susceptible to being recruited or extorted.

Read more

One of the distinct advantages of working in the IT industry for over 35 years is all of the direct and indirect experience that brings, as well as the hindsight that comes with that.

One of the more personally interesting experiences for me has been watching the growth and ultimate success of the Open Source Software (OSS) movement from a fringe effort (what business would ever run on OSS?) to what has now become a significant component behind the overall success of the Internet. I was initially reminded of the significance of the Open Source Software movement, and how long it’s actually been around when the technology press recognized the 25th anniversary of the Linux kernel. That, and the decision in January of 1998 by Netscape Communications Corp to release the complete source code for the Communicator web browser, are two of the top reasons for the Internet taking off. Well, the first specification for HTTP helped a little as well, I suppose.

There are, of course, many other examples of OSS software that power the Internet, from the numerous Apache Foundation projects, relational and other database management systems like Postgres, MySQL, MongoDB, and Cassandra. The list of markets and technologies for which there are OSS resources is essentially endless.

Read more

When you engage in international travel, you may one day find yourself face-to-face with border security that is polite, bilingual and responsive—and robotic.

The Automated Virtual Agent for Truth Assessments in Real Time (AVATAR) is currently being tested in conjunction with the Canadian Border Services Agency (CBSA) to help border security agents determine whether travelers coming into Canada may have undisclosed motives for entering the country.

“AVATAR is a , much like an airport check-in or grocery store self-checkout kiosk,” said San Diego State University management information systems professor Aaron Elkins. “However, this kiosk has a face on the screen that asks questions of travelers and can detect changes in physiology and behavior during the interview. The system can detect changes in the eyes, voice, gestures and posture to determine potential risk. It can even tell when you’re curling your toes.”

Read more

A version of this piece appears on the Sociological Imagination website

Twenty years ago Theodore Kaczynski, a Harvard-trained maths prodigy obsessed with technology’s destruction of nature, was given eight consecutive life sentences for sending letter bombs in the US post which killed three people and injured 23 others. Generally known as the ‘Unabomber’, he remains in a supermax prison in Colorado to this day.

It is perhaps easy to forget the sway that the Unabomber held on American society in the mid-1990s. Kaczynski managed to get a 35,000 word manifesto called ‘Industrial Society and Its Future’ published in both The New York Times and The Washington Post. It is arguably the most famous and influential statement of neo-Luddite philosophy and politics to this day. Now he is back with a new book, Anti-Tech Revolution: Why and How.

The fairest thing that can be said about Kaczynski’s writings, both during his Unabomber period and his subsequent imprisonment, is that his comprehensive critique of modern technological society is recognizable to anyone who follows the more apocalyptic strand of ‘dark green’ philosophy and politics. It points to an almost inevitable self-destruction of the world as we know it through systemic abuses of nature, which no one currently in power is motivated to stop, let alone reverse. Instead of making a comfortable living as a radical academic, fiddling while Rome burns, Kaczynski took matters into his own hands, first with letter bombs and now – in this book – with a strategy for stopping the global system from collapsing.

Does Kaczynski advocate the violent overthrow of that system? No; he offers a subtler approach that draws on Trotskyite entryism and capitalizes on the opportunities afforded by disruptions that the system in its normal operation is bound to throw up over time.

Kaczynski believes that political do-gooders are pretty useless in themselves. But this is not due to the content of what they say and do – namely, an endless stream of critique and foreboding about a dystopic future. All of this helps to destabilize the system. The problem is that these people and organizations are themselves so heavily invested in the system that when the worst scenarios that they portray happen, they are in no position to capitalize on them. Their big mistake is to assume that the people in power will somehow listen to them before it is too late.

Nevertheless, people inspired by Kaczynski’s neo-Luddite politics are advised to infiltrate such organizations because they provide legal cover for their activities and offer privileged access to the information flows needed to judge when the opportunity is ripe for intervention. He is clear that such people need to wear two hats at once. They have got to gain the confidence of the organization through hard work, while at the same time be ready to strike at the appropriate moment.

Kaczynski’s model is Lenin’s staging of the October Revolution in Russia, which was less violent than both the Soviets and the West usually portrayed it, due to the high level of infiltration by Bolsheviks into key discretionary positions when the opportunity arose to overthrow the system. Kaczynski follows Lenin in thinking that when the moment strikes, ordinary people will simply try to save their skins and spontaneously gravitate toward those who seem to provide a safe haven, at which point any prior political loyalties will simply evaporate.

However, crucially lacking from Kaczynski’s vision is a clear sense of which positions should be infiltrated, aside from mainstream environmental movements. The fact that he has been in prison for virtually the entire history of the web and smartphones is evident from these pages, though he has kept up in his own way. Kaczynski cleverly counters transhumanist Ray Kurzweil by arguing that even if computational power accelerates indefinitely, that simply means it is more likely to spin out of control. Yet he fails to provide any specific discussion of computer hacking, which one might have expected to figure prominently in the skillset of a neo-Luddite revolutionary. This is perhaps in keeping with Kaczynski’s avowed aim to stay within the law.

My guess is that people reading this book who wish to follow in Kaczynski’s footsteps would try to get hired by either private or public organizations associated with the production, distribution or regulation of energy. The point here would not necessarily be to arrest the rise in energy demand and use. Rather, one would be prepared to spring into action on the occasion of a major disturbance to the flow of energy, however it arises. In any case, such ‘normal accidents’ are bound to happen over time. Since this book is just the latest – but most articulate – installment of Kaczynski’s strategy, such people may already exist.

(None of the above should be understood as condoning in any way the crimes that Kaczynski committed twenty years ago. It is only to say that a rational mind is on display in this book.)

logo-header

There’s really no sector in the United States (or much of the world) that has been untouched by the development of advanced manufacturing technologies – and no one seems to be underestimating the importance of the further development of those technologies in order to keep the country competitive. To that end, in 2014 the government established the National Network for Manufacturing Innovation (NNMI), more commonly known as Manufacturing USA.

The program brought together the industrial, academic, nonprofit and governmental sectors to establish a network of advanced manufacturing institutes for the purpose of accelerating new manufacturing technologies. President Obama proposed that the network grow to 45 institutes over the course of 10 years, and as of today, 12 have been established. The 12th, which was just announced by the Department of Defense, will be the Advanced Tissue Biofabrication (ATB) Manufacturing USA Institute, and will be led by the Advanced Regenerative Manufacturing Institute (ARMI), based in Manchester, New Hampshire.

“The investments we are making in advanced manufacturing, including today’s announcement, will ensure that the innovations needed to develop, manufacture and commercialize cutting-edge processes and materials will happen right here, in America,” said Defense Secretary Ash Carter. “They will provide important benefits to our war fighters and will help strengthen the economy that is the bedrock of our national security.”

Read more

LONDON The attack on a Berlin Christmas market showed the devastation that can be wrought by the simple act of driving a truck into crowds, and the problems in preventing another massacre.

The attack in Germany on Monday, in which 11 people were killed by the truck in addition to the murder of the Polish driver, mirrored a militant raid in the French city of Nice in July that killed 86.

Hauliers increasingly track their vehicles in real time but security experts say the technology cannot be used to stop an attack if a lorry has been hijacked to be used as a weapon.

Read more

Your daily round-up of some of the other security stories in the news

Groupon grief – was it password reuse?

The Telegraph reports that crooks have hijacked a number of Groupon accounts and used them to purchase expensive items like games consoles, iPhones and holidays. Some victims have suffered thousands of pounds of losses.

Read more

RIP dear friend.


A giant in the worlds of both academia and policy, Drell died Wednesday, Dec. 21, at his home in Palo Alto. He was 90 years old.

“An accomplished physicist, his contributions to improve national and international security made our world a better place,” said Tom Gilligan, director of the Hoover Institution at Stanford in a statement. “We are especially grateful for Sid’s relentless dedication to eliminating the threat posed by nuclear weapons and know that his important work will continue to frame the issue.”

Dedicated to arms control.