References, additional facts and
some speculation... What the "Australian"
newspaper had to say about, "Poo
Bum Dicky Wee Wee" Some of you may have heard of this
news item but most I have talked to have not. Australian mainstream
media is very kind to the government and these kinds of news
items tend to not have the front page status they (in my opinion)
deserve or would have if the opposition were the subject. The
UK paper the
"Telegraph" had more information. According to
them, the office of the PM also edited in some very right wing
religious drivel such as "Freemasonry is the work of Satan."
and "Jesus is God." This is important in that it exposes
the true workings and beliefs of the people involved as opposed
to the fictional image they so stridently try to project. The
denials of involvement by the PM seem absurd to TCP. This was
an orchestrated endeavour.
On the matter of Richard Neville and his
site www.johnhowardpm.org, this one nearly went
under the radar of the entire national media in spite of the
fact it exposed horrendous violations of rights to free speech,
free press and exposed melbourneIT as either a wimp or agent
of the government. I speculate the governerment and melbourenIT
may have a business relationship. This site by Australian Tim
Longhurst seems well organised. According to Tim's report
an agency called the "Australian High-tech Crime Centre"
were involved in this as well as the PM's office. TCP had never
heard of such an agency before this but it appears to be a case
of a so-called "crime" unit being nothing more than
a tax payer financed political hit and propaganda machine. While
mainstream media in Australia were largely silent on this important
issue, (Radio National an exception) overseas media were quite
interested. This quote from international media organisation
Reporters
Without Borders on the subject; " Reporters Without
Borders voiced shock today at the methods used by the office
of Australian Prime Minister John Howard to censor parody website
Johnhowardpm.org, on which political commentator Richard Neville
posted a spoof speech by Howard about the presence of Australian
troops in Iraq.
The prime ministers office had
the website closed down on 14 March by going to Melbourne IT,
the company that administers its domain name.
All the worlds leaders are
subject to parody and the Australian prime minister should learn
to live with it rather than banning it, Reporters Without
Borders said. And anyway, to close down a website, a court
order should be required, not just an administrative decision.
This type of censorship is unacceptable in democracy, in which
website managers have the same rights as those who run traditional
media.
TCP will continue to research these matters
and add information and references as they become available and
time is found to publish.
Update follows....
Lets go back to this
"Australian High-Tech Crime Centre", what is this
thing and what does it do? An examination of the web site reveals
very little activity. A couple of bland bits of consumer advise
posted, and media releases for the year total four items, one
with two different names but the same document and all but but
one copies of releases from a banking association (ABA). As a
regular computer user I can certainly find no evidence of it's
existence in practise. Criminal fraud attempts and solicitation
of illegal substances, software etc, come to my email daily.
According to the site that is their brief. I suggest then that
they have failed miserably. In one of the rare instances when
this organisation is mentioned on the web by other than it's
own invention, the former director answers the question of "...why
there haven't been any prosecutions to date, how come"?
Otherwise the only instance where this shadowy agency has made
news is in the case of the spectacular stuff up of the
loss of a memory devise that contained the unencrypted banking
details of some 3500 Australians. Not impressive.
Because of lack of transparency in this
organisation and apparent failure in it's stated mission it could
be fair to ask if that mission has been accurately described.
The capabilities and resources available are considerable. Is
this agency little more than a domestic spy agency? Before you
dismiss this query are paranoia consider the information above
and this little background as well. Remember the Tampa? Children
Overboard?
According to this report, the government used a "top
secret defence agency" to illegal monitor and record phone
calls from the crew of Tampa to Australians to "form a political
response to the crisis".
The facts of this are: the government closely
monitors web activity and employs large numbers of personnel
to edit or construct material on the web to flatter or obfuscate
as required to enhance the image and disguise the true nature
of the governments activities. Further, the government is willing
to pervert or even break the law to this end.
How far can this go? Using the web as a
sort of state sponsored terror devise is not knew. Even a whole
country can be attacked as in the case of Estonia. In
this report, the Russian government is alleged to have contracted
with "botnets"to attack the system in Estonia to the
point the entire country was crippled. What is a "botnet"?
Have you had virus or function problems with your computer lately?
Has it run very slow? Or crashed outright? It is very likely
that your computer has been invaded. The invaders will take information
from your computer but the main mission is to keep their software
installed in your computer to enable them to use it. By spreading
their virus among thousands, even millions of computers like
yours, they can accumulate the computing power of several of
the worlds largest mainframe units. Enough power that if directed
with malice, can wreck a targeted system.
This is a good place to insert another
portion of the editorial as printed in TCP # 27;
TCP web computers hacked but
to no avail!
|
A sophisticated attack
was launched on the web computers of TCP. The attack began by
disabling the firewall settings in the OS and changing other
security settings within Windows XP. That computer was then loaded
with an assortment of Malware, spyware and virus. The next computer
to be connected to the poison wire went down in minutes upon
connection. Registry settings within the operating system were
changed externally! This is not amateur stuff. The computer was
reloaded with Windows XP, wiping all stored data in the process.
Three times the newly restored computer would be connected and
then wrecked as we watched in fascination. Very impressive. Though
the anti-virus program ( I will point out that AVG is a respected
one), was helpless to remove the virus's, it did identify them.
A search of the hard drive then revealed the jpg images that
were embedded with the exe files. These images were not available
through any folder or document but hidden in the hard drive itself
and were absolutely unfamiliar. Soon after the above photo was
taken the anti-virus program was rendered inoperable.
TCP hasn't been alone! Though the persistence and toxicity of
the attacks on TCP computers seems unusual, reports are coming
in of many others with invasions of varying degrees. The common
factor may be this; Are Microsoft "Updates" toxic?
There does appear to be a connection. I have always had reservations
about privacy and these so called "updates" but I wouldn't
figure Microsoft to be this ham fisted though the attacking entity
may have had access to Microsoft source code and that is a small
group. TCP's computers were set up to maximise privacy and that
is the area of the system that was the focus of attack. Who was
responsible? Don't know. How about your computer? If you have
had similar problems lately (TCP's was mid August)please contact
TCP and share your experience. The more data the better. Pay
particular attention to the security settings on your PC. Can
you still access and change them?
TCP was prepared. Because TCP sometimes deals in sensitive information,
security and back up is high priority. Besides a temporary disruption
of browsing and mail, no serious damage done. Further information
will be posted to the web site as it becomes available.
Further notes on this
matter. Though
I have had numerous reports from other computer users in Australia
of sudden virus and spyware difficulties with their computers
last month, no report I have so far replicates the violence of
the attack on TCP's computers except one, our server! And how
did they do it? One possible answer is that if you have windows
EX PRO you have a default setting in your "services"section
that leaves your computer open to manipulation by someone on
the other side of the world. This feature does not exist on XP
home edition. For more information on this little bugger check
this site. It is
the best source of info on Windows I have found. This site dissects
the system, item by item to explain and advise. I speculate that
it may be possible that the attack on TCP was via a "botnet"
type enterprise, though obviously of much smaller scale than
Estonia. I think it is possible that the "Remote Registry"
setting and the lack of an external firewall made it easy to
do in our case.
An interesting note to
this is that the TCP web computers contain no valuable information,
bank details or what not. Usually attacks of this kind are related
to the gathering of information to sell. Ours was purely malicious.
TCP has made it policy for some time to isolate production computers
from those exposed to the web.
|