Freedom fighter Lars Kragh Andersen released the civil registration number of Nicolai Wammen, Danish Defence Minister, and Helle Thorning-Schmidt, the Danish Prime Minister. He did so in protest against the Danish governments »surveillance and control of citizens,« and for the »politicians to get a taste of their own medicine.«
Prior to the release, Aarhus Municipality shared 1.600 civil registration numbers in an error, so the Danish CPR-system (Danish version of the civil registration numbers) definitely have some kind of problems.
Lars Kragh Andersen also shared the method on how you could easily find any Danish citizens CPR-number. The how-to listed Tinglysning.dk, a part of the Danish court of justice’s systems, as the main road to access every CPR-number – including the names and addresses of civilians. His method involved zero hacking, and could be done in a matter of minutes.
Tinglysning.dk allegedly removed the vulnerability in their system, but Lars has already found a new way to get a hold of the CPR-numbers – also via Tinglysning.dk
The CPR-numbers can be subject to identity theft along with numerous other illegal actions.
Lars has acknowledged that he might be sentenced to jail time, but he is »prepared to take his punishment «, although he classifies his actions as »self defence.«
As we all know we live in an unfair world with hidden dictatorships by our own governments. We have to abide by the rules and we will be liable if we do not, but when it comes to the government itself; they do not know anything about it and they never want to!
The National Security Agency (NSA) and FBI are using spyware to access a suspect’s phone for, as they claim, the purpose of surveillance. This has been found by researchers from the Citizen Lab at the Munk School of Global Affairs at the University of Toronto and computer security firmKaspersky Lab.
For what can the malware be used?
The malware named RCS, Remote Control System, is developed by an Italian IT company known as “Hacking Team”. They sell the RCS to governments and law enforcements. The RCS can already be used for desktop computers, laptops and all kinds of jailbroken and non- jailbroken Smartphones, like Apple, Android, Windows, Symbian and Blackberry. The malware installs with the help of an Evasi0n jailbreaking tool.
Both researchers have recently presented their findings during an event in London. The outcomes were astonishing; the size of the command infrastructure supporting Hacking Team is increasing very fast with already 326 command-and-control (C&C) servers running in more than 40 countries.
“It was a well-known fact for quite some time that the HackingTeam products included malware for mobile phones. However, these were rarely seen,” said Kaspersky Lab experts on the blog post. “In particular, the Android and iOS Trojans have never been identified before and represented one of the remaining blank spots in the story.”
Worldwide usage of C&C servers
Researchers of Kaspersky Lab have scanned the entire IPv4-space by using a fingerprinting method to identify the IP addresses of RCS Command & Control servers around the world and they found the biggest host in United States with 64 C&C servers. The second country in the line was Kazakhstan with 49 servers, the third was Ecuador with 35, the UK with 32 was fourth and so on. All named and other countries summed up together, gives 326 Command & Control servers.
“The presence of these servers in a given country doesn’t mean to say they are used by that particular country’s law enforcement agencies,” said Sergey Golovanov, principal security researcher at Kaspersky Lab. “However, it makes sense for the users of RCS to deploy C&Cs in locations they control – where there are minimal risks of cross-border legal issues or server seizures.“
Working process of RCS
RCS can be physically or remotely installed. Physically goes through a USB or SD Card and remotely, it is done by spear phishing, exploit kits, drive-by downloads and network traffic injection.
Once it is installed on your Apple or Android device, it allows governments and law enforcement officers with larger capabilities to monitor victim devices and gives them the ability to:
–control phone networks
–steal data from their devices
–record voicemails
–intercept SMS and MMS messages
–obtain call history
–report on their location
–use the device’s microphone in real time
–intercept voice and SMS messages sent via applications such as Skype, WhatsApp, Viber and many more.
“Secretly activating the microphone and taking regular camera shots provides constant surveillance of the target—which is much more powerful than traditional cloak and dagger operations,” Golovanov wrote.
Although the Android module is protected by DexGuard, an optimizer which makes it extremely difficult to analyze the device, most of the abilities mentioned above are also available for Android, along with the support for hijacking applications such as Facebook, Google Talk, Tencent of China and many more.
Researchers said that the mobile modules are custom-built for each target.
At last, we have concluded from previous disclosures that RCS is currently being used to spy on political dissidents, journalists, human rights advocates and opposing political figures.
What can you do to protect your Smartphone, Tablet, PC & Laptop against Spying and Hackers?
-> You can use a VPN, for more information click here or on the link below:
Mr. Edward Snowden revealed last year the NSA’s Advanced Network Technology catalog, a list of the tools provided by the NSA to its agents for spying purposes. Now some hackers and security experts have used this leaked information to make similar tools using available junkyard electronics.
The leaked catalog was examined by Michael Ossmann and his team. And they found out that many of the items were very easy to recreate at a fairly low price. He has already build a Software-Defined-Radio (SDR) which can record and transmit data from a target PC using a Kickstarter project, and this can be bought for just $300. Ossmann has also recreated two more of NSA’s gadgets which function similar to the Ragemaster and Surlyspawn keystroke logger using just few transistors and pair of wires as an antenna. These devices are not as small as the NSA’s hardware but are at a fairly cheap cost.
Ossmann said, “Our goal isn’t to help hackers conduct their own spying operations, nor to make it easier for the government to get low-cost surveillance hardware. the goal of this project is to help the security industry understand the range of threats it should be protecting against.”
He has also set up a website named NSA Playset. Here he has given details on how they have reverse-engineered some of NSA’s hardware at a fairly cheap cost.
Facebook collects data from its 1.3 billion users which they claim is just of security and advertisement purposes. But now, CEO Mark Zuckerberg is going to watch your every move – even more closely! The social media giant has announced that they will use the web browsing history of its users to deliver “targeted ads”.
This will be the first time that a company will use the web browsing and app history of its users to serve advertisements. You can see the official announcement here.
Below is the amendment in Facebooks Terms of Service:
“We and our affiliates, third parties, and other partners (“partners”) use these technologies for security purposes and to deliver products, services and advertisements, as well as to understand how these products, services and advertisements are used. With these technologies, a website or application can store information on your browser or device and later read that information back.”
What is actually happening? Facebook will now track your every move on the web. It will keep an account of all the websites that you are visiting. They can’t track your online activity while visiting any website, but only those that have Facebook “LIKE”, “Recommend”, “Share” buttons.
How to Opt-Out?
Don’t want Mark to see your browsing history or any prying eyes? Opting-out is very easy, just visit Digital Advertising Alliance’s website. Click on “Companies Customizing Ads for Your Browser” button, to see a list of companies and marketers sharing your data (Turn of your browsers Adblock before this.)
Check on Facebook and hit the “Submit” button below.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptRead More
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.