Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Hackers claim 12 million Apple IDs from FBI
by Staff Writers
Washington (AFP) Sept 4, 2012


A hacker group has claimed to have obtained personal data from 12 million Apple iPhone and iPad users by breaching an FBI computer, raising concerns about government tracking, but the FBI said it never had the data.

The group called AntiSec, linked to the hacking collective known as Anonymous, posted one million Apple user identifiers on Monday purported to be part of a larger group of 12 million obtained from an FBI laptop.

The FBI initially had no comment on the reports, but later in the day issued a statement which cast doubt on the purported data breach, saying it never had the data in question.

"The FBI is aware of published reports alleging that an FBI laptop was compromised and private data regarding Apple UDIDs (unique device identifiers) was exposed," the US Federal Bureau of Investigation said in a statement.

"At this time, there is no evidence indicating that an FBI laptop was compromised or that the FBI either sought or obtained this data."

A tweet from the FBI press office said: "We never had info in question. Bottom Line: TOTALLY FALSE."

Peter Kruse, an e-crime specialist with CSIS Security Group in Denmark, said on Twitter that the leak "is real" and that he confirmed three of his own devices in the leaked data.

"Also notice that they claim to have fullname, addresses, phone numbers etc... Big ouch!" he tweeted.

Apple did not immediately respond to a request for comment.

The fact that some user data was breached prompted a flurry of comments, some suggesting that the government or Apple was implicated in a vast invasion of user privacy.

Aldo Cortesi, a security consultant living in New Zealand, called the incident "a privacy catastrophe."

"The vulnerabilities ranged from de-anonymization, to takeover of the user's gaming social network account, to the ability to completely take over the user's Facebook and Twitter accounts," he said on a blog posting.

One website set up a database to help users determine if their device was on the hacked list of Apple unique device IDs (UDIDs).

Johannes Ullrich of the SANS Internet Storm Center said it was difficult to verify the report.

"There is nothing else in the file that would implicate the FBI. So this data may very well come from another source. But it is not clear who would have a file like this," he told AFP.

Ullrich said it is unclear why the FBI, if the report were true, would have the data.

"The size of the file... would imply a widespread, not a targeted tracking operation, or the file was just kept in case any of the users in the file needs to be tracked," he said.

"The significance of this breach very much hinges on the source, which as far as I know, hasn't been authenticated yet. The data is, however, real based on some of the reports that people do find their own UDID in the file."

In the posting, AntiSec said the original file "contained around 12,000,000 devices" and that "we decided a million would be enough to release."

The group said it "trimmed out other personal data such as full names, cell numbers, addresses, zipcodes, etc."

It said it posted the information to draw attention to Apple's practices, which allow users to be tracked.

"We never liked the concept of UDIDs since the beginning indeed. Really bad decision from Apple," it said.

It added "we have learnt it seems quite clear nobody pays attention if you just come and say 'hey, FBI is using your device details...' FBI IS USING YOUR DEVICE INFO FOR A TRACKING PEOPLE PROJECT OR SOME S---."

The document posted on the website pastebin indicated that the data was obtained in March from the computer of an FBI Cyber Action supervisor through a "vulnerability" in the computer.

Eric Hemmendinger, a security expert with Tata Communications, said that if an FBI computer from a cybersecurity investigator was hacked, it would be "a pretty embarrassing scenario."

Hemmendinger said the FBI's possession of the data would be surprising, but that it should not be a surprise that Apple and its rivals would have detailed information on its users.

"This is yet another indicator that when you start to participate in social networking and applications that Apple and (Google's) Android have propagated, you are the asset that's being leveraged and monetized," he said.

"It's yet another reminder that when you join the social network world, your footprints are not private."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Taiwan to step up cyberwar capabilities: report
Taipei (AFP) Sept 2, 2012
Taiwan plans to beef up its cyberwar capabilities to counter a perceived threat from Chinese hackers targeting government and security websites, local media reported Sunday. Taiwan will expand its cyberwar units next year while scaling back military spending due to budget constraints, the Taipei-based Liberty Times reported, citing a 2013 budget plan submitted by the National Security Bureau ... read more


CYBER WARS
PAC-3 Missile Intercepts Tactical Ballistic Missile Target During Test

US looks at new early-warning radar for Japan: officials

Lockheed Martin Receives Contract To Produce THAAD Weapon System Equipment For The US Army

Israel wraps up national SMS missile alert test

CYBER WARS
Russia to create new ICBM by 2018

Boeing Winged JDAM Completes First Round of Tests

US-China missile race

India halts Barak I missile purchase

CYBER WARS
Apple shoots down drone strike tracking iPhone app

Drones, UAV: what is better?

Embraer awarded 1st phase of $6B cordon

Two Qaeda suspects killed in Yemen drone attack

CYBER WARS
Smartphone App Can Track Objects On the Battlefield as Well as On the Sports Field

Lockheed Martin Wins Role on Defense Information Systems Agency Program

Raytheon unveils cross domain strategy to securely access information via mobile devices

NATO Special Forces Taps Mutualink for Global Cross Coalition Communications

CYBER WARS
Northrop Grumman Welcomes UK Defence Minister to Unmanned Ground Vehicle Facility in Coventry

Study Explores Injury Risk in Military Humvee Crashes

New era in camouflage makeup: Shielding soldiers from searing heat of bomb blasts

Uganda investigates helicopter crashes

CYBER WARS
Thales in Australian, Indian ventures

U.S. arms sales hit record $66 billion

Turkey seeks increased arms exports

US arms sales nearly triple in 2011, researchers say

CYBER WARS
India, China defence ministers to meet Tuesday

India, China to resume joint military exercises

Ferrari crash reports bring fresh political scandal in China

Outside View: The anti-colonial dilemma

CYBER WARS
Researchers Develop New, Less Expensive Nanolithography Technique

Breakthrough in nanotechnology material science

Nano machine shop shapes nanowires, ultrathin films

New wave of technologies possible after ground-breaking analysis tool developed




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement