back to article Anonymous hackers leak Scotland Yard-FBI conference call

Members of Anonymous have released an intercept of a conference call between investigators at the FBI and Scotland Yard during which operations against hacktivist group were discussed. During the 17-minute call – which was released as an MP3 file and distributed on YouTube and elsewhere – investigators can be heard discussing …

COMMENTS

This topic is closed for new posts.

Page:

Pay IT staff ~20K

get monkeys and end up with security holes big enough to sail the titanic through.

30
0
Anonymous Coward

Pay it staff...

You mean the ones they use in India?

1
2
Anonymous Coward

Or someone that...

doesn't know how to use the rollcall function on a conference line.

Hint:

Change password for each con call.

Once all in, perform roll call.

Any annons, silences and unknowns, disconnect;. issue new details.

1
0
Anonymous Coward

rollcall fail

Not the only method to obtain the call recording.. Any one of the attendees could have been on a system with call recorder that could be insecure/exposed, or even the host service might have been recording the call so that attendees could d/l later. So at least n+1 systems that could be responsible...

0
0
Anonymous Coward

Please don't suggest this

Our internal hackers frequently listen in to senior management calls to find out what's going on. It's far more illuminating that the company intranet.

0
0
Anonymous Coward

I read somewhere

that the FBI didn't even have email until about a decade after every criminal was using it. I forget where I read that, probably some conspiracy site full of lies.

In times like this I like to reflect on an episode of the animated Dilbert series:

Dilbert: What are you doing?

Dogbert: I'm putting false information on the internet.

Dilbert: Why?

Dogbert: It's fun.

15
0

This post has been deleted by its author

Silver badge
Big Brother

Was that before or after the Clipper Chip Perversity proposed by President Klingon?

0
0

WRONG

http://www.uha1.com/15-mug.jpg

we know what the fbi had in 2000

and it was a sandbox

they don't put mission crit stuff on networks you can easily access which is why this is funny they don't know......

0
0
Silver badge

I LOVE IT....

:-) HEADLINE

FBI AND SCOTLAND YARD HAVE BEEN TANGO'D

How do you recover from this embarrassment?

Arrest and extradite the 12 year old hackers of course.

Respect to Anonymous.

28
2
Silver badge
Facepalm

RE: I LOVE IT....

This is a massive security breach, correct. But it also shows how stupid the Lultwitz and Anonyputzes are - you should NEVER give away the news that you have an inside source or access! What complete idiots! Professionals would keep schtum and mine the source for as long as possible, but the FBI and Met will now review security, check for leaks and plug any security holes, removing any advantage the tw@ivists might have had. So all this bragging does is reinforce the idea that these are just skiddiots playing at being big, bad haxors.

3
12
Silver badge
Thumb Down

Ohhh Matty...

> Complete Idiots and skiddiots

> Who have managed a massive security breach

Really, doublethink much?

9
1
Anonymous Coward

There is nothing there that says they haven't been mining the security hole for ages.

It could well have been that the compromised email address they had been using had its password changed in light of other hacks and so the anons with no further access went public.

3
0
Holmes

You're right. They're kids...

...just playful and boastful - and damaging.

But are there _real professionals_ even deeper into the FBI and Scotland Yard, and keeping quiet?

0
0
Anonymous Coward

@Matt

"[they] will now review security, check for leaks and plug any security holes, removing any advantage the tw@ivists might have had."

That's what sensible organisations would do (better late than never, a mistake is an improvement opportunity, etc).

We're talking about the FBI and the Met here.

What are the odds?

2
1

Or...

....they never had unfettered access in the first place, and all they ever had was a leaked email with the conference call sign-in details, presumably given to them by some sympathetic peon who happened to have them pass through his/her hands as part of their administrivia-based employment for either the Met, the FBI, or either of their comms providers.

3
0
Anonymous Coward

FBI and Met vs two factor authentication.

If anyone who really cared about security was setting up a con-call between two self-important over-rated security agencies of questionable competence, wouldn't they perhaps want some kind of two-factor security? Something the participant knows (the email details) and something the participant has (a challenge/response mechanism of some kind)?

Maybe someone will invent something like that one day.

0
0
Holmes

Correct me if I'm wrong

But I believe the stated goal of Antisec was to force the authorities to upgrade their security. After all, if Teh Terrists can listen in on given FBI conference call, then everyone's at risk - including Lulzsec.

1
0

this breach is months and months old its matter of time befor eit gets found or leaked

dont act foolish , go ahead fix it we/they/them/us/you will get back in

you cant stop freedom

0
0

Anyhting made by idiots is just idiotic

0
0

@Matt Bryant

Or this is smoke and mirrors.

They may never have had access, but claim to have had to distract the FBI from where this recording actually came from. For all we know, this could have been discovered on some retired bit of equipment they skip-dived. They might have been given it by someone inside one of the groups involved in the call. They might have ghosted the call and recorded it due to lax security.

Still, wonder how long it'll be before the FBI/Met go kicking some doors down and make some arrests.

0
0
Anonymous Coward

They have been infiltrated by an Undercover Secret Policeman

who's been shagging everyone like crazy and has since gone native.

5
0

Most people seem to have this idea that emails are secure, and only the sender and recipient can read them.

It's made worse by the "encrypt" button in email clients like Lotus Notes. People assume that only the recipient, in another company can magically decrypt it.

Too many people are ignorant, and think that owning lots of consumer electronics makes them technically competent.

2
0

tip for you

encrypt your message with two types a encryption before you use the email program and just attack it and hten encrypt again....

might help stuff like the carnivore and echelon and hte new program they use and those hundreds a pcs they have decrypting your messages get painfully slow when we all do it

SO after a decade of hackers is the net actually a bit safer? Have you learned to be safer and keep your data safer ? HAVE YOU?

2
0
Unhappy

good point

>Have you learned to be safer and keep your data safer ? HAVE YOU?

no :-(

and it makes me sad...

ttfn

0
0
Silver badge
Joke

Technically savvy former News of the World employees have been called in to consult with the cyber crimes division.

Their extensive backgrounds in phone hacking will be invaluable.

2
0

Dunno about anything else...

...but the occupants of sheffield are up in arms.

5
0
Bronze badge
Happy

Sheffield has more than a Macdonalds . .

. . . It also has a burger king.

1
1

No Burger King

It shut a couple of years ago. Although I think there are still some in the burbs

0
0
Anonymous Coward

Errrm..

Only the one by Castle Market was shut (KFC, Greggs & No 1 Chinese buffet offered cheaper food)

The one in the train station is thriving alongside M&S, Upper Crust and other high-end establishments..

Anon coz i stil have to live there for a year and everyone would be on my case 8 while 5!

0
1
Anonymous Coward

Shirley...

You meant to say "eight until five", as the words you accidentally chose did not make any sense?

0
0
Facepalm

"The agency has reportedly launched an investigation into the leak..."

They just don't know when to stop, do they?

10
0

Good tactics boys

Lets really motoivate the cops to put your asses behind bars...

2
6
Anonymous Coward

if you listen to the call

All their time is taken up investigating 15 year old kids for defacing their school websites. Honestly the call was so boring, I had to grip the arm rests because i fell into a coma multiple times and my head was banging on the desk.

8
0
Anonymous Coward

still

it's comforting to know that all this anti terror legislation is being used to fight terrorism and has nothing to do with extraditing kids and vulnerable adults for any minor non violent offense they can find in the Facebook dragnet... oh wait.

8
0

trust me when i say they will make someone a patzy but it again won't be the real deal.....

his name is robert poulson

0
1
Anonymous Coward

I can just imagine the call

1. Read email detailing time and dial-in number, along with passcode.

2. Use Skype to dial in.

3. beep "??? has joined the conference" (read this part in the sexy robo-operator lady voice)

4. Yeah, er random-law-enforcement-agency guy here"

5. Profit???

Conferencing hardware / software is so shabby and delicate. People are constantly getting disconnected. Law enforcement types not being the most technically adept bunch. I can easily imagine how one might just just slip right in.

5
0
Anonymous Coward

In my experience, just join first

You don't seem to get any kind of rundown of who's already connected when you join, hence the annoying start of every phone conference of "Who are we waiting for?", "Is everybody here?".

Thus if somebody connected say 20 min. before the meeting (or possibly only 2min given that these are Government) and kept their mic muted, I doubt anyone could know.

Though even if they did join late, it is rather unlikely they'd notice or remember.

On top of that, there's no way to eject people if you realise they shouldn't be there!

The thing that people tend to forget is that pretty much all these dial-in conference systems are just as secure as saying "We'll meet blindfolded in this cafe to discuss the secret things".

The pin is the name of the particular cafe, and there's a chime on the door so you can hear when people enter and leave, but you've no idea who is there already.

There are very few companies that would accept doing that.

2
1
Silver badge
Boffin

In your *missing* experience, you mean....

In most teleconference systems, the 'owner' of the channel needs to connect first, if you try to connect earlier, you are put on a waiting queue...

I like to be on time, as a matter of principle, so I often end up on that queue

0
0
Joke

So, Anonymous is rectuiting...

...News of the World employees now, eh?

0
0
Anonymous Coward

"Access code"?

Was it 0000# by any chance?

3
0
Facepalm

No, that's far to easy to guess. It must be something highly secure that no-one would guess, like 1234#...

4
0
Facepalm

No

It'll be whatever the manual for that conference call software says is the factory-set password. But 1234# is probably a good bet :-)

Unless they've got the "force strong password" option set - then it'll be 4321#

5
0
Silver badge
Holmes

If it was a Philips PBX, it MUST have been 0000# because there never was a way to change it.

2
0

Damint, now i have to change the combination on my suitcase

3
0
Bronze badge

Or

The conferance host always uses the same chairman and participant codes and publishes both in the eMail invite.

Which means anyone else he's used it with knows it, which leads to fun, I've been on calls where a participant dials in as the chairman forcing the chairman to dial in as a particpant, he never commented on it.

Other gems are that when someone leaves, they just transfer the numbers to someone else. When a senior sales person leaves, they don't change all the codes in the sales team so it is not unknown for sales people to dial into their old companies to see what's going on.

And usualy no one challenges blanck call identifiers.

0
0
Joke

Well...

...these guys can hack into anything!

0
0
Anonymous Coward

they hacked into my ploughmans

there was pickle left all over the work surfaces, a smashed window, and dog mess everywhere.

then afterwards someone snuck in and stole my ploughmans. I was really upset.

0
0
Anonymous Coward

More off to the slammer

Dumber than dumb but I'm sure they'll have fun in the slammer. Morons.

0
4
Anonymous Coward

Or ...

something even better

0999#

0911#

0
0

Page:

This topic is closed for new posts.

Forums