Tag Archives: Federal Bureau of Investigation

FBI director reveals new evidence linking N. Korea to Sony hack, answers skeptics

FBI Director James Comey on Wednesday adamantly defended his bureau’s conclusion that North Korea was behind the cyber-attack against Sony Pictures Entertainment, revealing new evidence and claiming those questioning the North Korea connection “don’t have the facts that I have.”

The U.S. government for weeks has faced skepticism from private-sector cybersecurity analysts, many of whom say the attack may have been an inside job by a former Sony employee.

In what amounted to the U.S. government’s most detailed explanation to date of the evidence it has linking North Korea to the hack, Comey said he has “very high confidence” Pyongyang was behind it and disclosed new details.

via FBI director reveals new evidence linking N. Korea to Sony hack, answers skeptics.


this day in the yesteryear: Cubana Flight 455 Bombed (1976)

Cubana Flight 455 Bombed (1976)

The bombing of Cubana Flight 455 killed all 78 people on board, including several Cuban government officials. At that time, it constituted the most deadly act of airline terrorism ever carried out in the Western Hemisphere. An investigation uncovered evidence implicating anti-Castro Cuban exiles and members of the Venezuelan secret police in the plot. Four men were arrested: two received 20-year prison terms, one was acquitted, and another fled. How were the CIA and FBI linked to the attack? More… Discuss

this pressed: Tech giants slammed by FBI over encrypted smartphones – Telegraph

The FBI has warned that decisions by Apple and Google to encrypt their smartphones will make it more difficult to rescue kidnapping victims and foil terror plots.

A concept image of how the iPhone 6 might look

Apple and Google have both decided to add new encryption systems to their smartphones

The two Silicon Valley giants have both decided to add new encryption systems in the face of privacy concerns sparked by Edward Snowden‘s disclosure of mass government surveillance.

via Tech giants slammed by FBI over encrypted smartphones – Telegraph.

this pressed from USA Today: Audio may have captured Michael Brown shooting

Audio may have captured Michael Brown shooting.

Cryptolocker Unlocked

Cryptolocker Unlocked

Some half a million people were victimized by a criminal ring running a malicious program, called Cryptolocker, which encrypts files on Windows computers and demands a substantial sum be paid in order to regain access to the files. Only about 1.3 percent of the victims are believed to have paid the ransom, but it still netted the group an estimated $3 million. In a stroke of apparent luck, authorities gained access to the gang’s database of victims and encryption keys, and they are now offering victims free help unlocking their files. The alleged mastermind of this and at least one other major malware scheme, Russian Evgeniy Bogachev, is currently being sought by the FBI. More… Discuss

this day in history: John Dillinger Killed by the FBI (1934)

John Dillinger Killed by the FBI (1934)

During a nine-year stint in Indiana state prisons for a 1924 holdup, Dillinger learned the craft of bank robbery from his fellow inmates. After being paroled in 1933, he went on to commit five bank robberies in four months. Captured by police yet again, Dillinger escaped jail twice and was named “public enemy number one” by the Federal Bureau of Investigation (FBI). His run came to an end when FBI agents shot him to death outside a Chicago theater. Who lured Dillinger to the ambush site? More… Discuss

this pressed from ProPublica: No Warrant, No Problem: How the Government Can Get Your Digital Data – ProPublica

via No Warrant, No Problem: How the Government Can Get Your Digital Data – ProPublica.

US Authorities Rescue 168 Children in Sex Trafficking Sting

US Authorities Rescue 168 Children in Sex Trafficking Sting

A weeklong Federal Bureau of Investigation (FBI) sting operation spanning the US has led to the arrest of 281 pimps and the rescue of 168 children from sex traffickers. Approximately 400 law enforcement agencies in over 100 cities took part in Operation Cross Country VIII, part of the FBI’s Innocence Lost National Initiative, which, since its inception in 2003, has recovered approximately 3,600 children and gained 1,450 convictions against those exploiting them. More… Discuss

this day in the yesteryear: J. Edgar Hoover Appointed Director of FBI (1924)

J. Edgar Hoover Appointed Director of FBI (1924)

As FBI director from 1924 until his death in 1972, Hoover built a more efficient crime-fighting agency and established a centralized fingerprint file, a crime laboratory, and a training school for police. After World War II, he turned to the perceived threat of Communist subversion with a focus that his many critics considered obsessive. It has been verified that he orchestrated systematic harassment of political dissenters and activists, including what celebrated civil-rights leader? More… Discuss

Enhanced by Zemanta


“Teflon Don” Hit with Charges that Finally Stick (1992)

For years, John “the Teflon Don” Gotti, the dapper NYC boss of the Gambino crime family, got away with murder—literally. Criminal charges slid off him time after time thanks to his long reach, which extended to witnesses and jurors alike. But Gotti’s “luck” ran out in 1992. After a nearly two-month trial, he was convicted of racketeering and sentenced to life in prison without the possibility of parole. The FBI had finally gotten its man. How had prosecutors managed to get the charges to stick?More… Discuss

Enhanced by Zemanta


Silk Road 2 Hacked, $2.7 Million Worth of Bitcoins Stolen

Silk Road, an anonymous online marketplace where users paid in bitcoins and the goods were often illegal, was seized and shut down by the FBI in 2013. Shortly thereafter, Silk Road 2 came online and trade resumed. Last week, the site’s administrator announced that hackers had exploited a newly discovered vulnerability in Bitcoin protocol and emptied Silk Road 2’s coffers—withdrawing the equivalent of $2.7 million from customers’ accounts. Not everyone believes the administrator’s account of events; some speculate that he saw an opportunity when the vulnerability came to light and stole the money knowing he could blame the theft on hackers. More… Discuss


Enhanced by Zemanta

Wujing Zongyao

Chinese scholars completed the Wujing Zongyao in 1044 under orders from Emperor Renzong. A military compendium detailing techniques for warfare, it includes the earliest known gunpowder formulas. The Chinese initially used gunpowder to make firecrackers, but they soon took it onto the battlefield. The Wujing Zongyaogives instructions for creating a bomb that is launched from a catapult as well as for a poison-smoke bomb. It also describes a primitive version of what modern weapon? More… Discuss