<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-2518131517116494666</id><updated>2024-11-08T07:41:31.746-08:00</updated><category term="Hacking"/><category term="Anonymous"/><category term="Hacking News"/><category term="Tips n Tricks"/><category term="Google News"/><category term="Serial Keys"/><category term="Softwares"/><category term="Anonymous Photos"/><category term="Software+Cracks"/><category term="Virus Creation"/><title type='text'>Follow Anonymous</title><subtitle type='html'>We are Anonymous We are legion We do not forgive We do not forget Expect Us!&#xa;&#xa;Learn more hacking tips and tricks.&#xa;Latest Hacking news available here and on our fb page.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default?start-index=26&amp;max-results=25'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>52</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-5725827774548465131</id><published>2014-04-02T21:05:00.000-07:00</published><updated>2014-04-02T21:05:09.891-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips n Tricks"/><title type='text'>Attack by Kickasstor </title><content type='html'>&lt;h2&gt;
Attack by Kickasstor&amp;nbsp;&lt;/h2&gt;
&lt;h2&gt;
&amp;nbsp;&lt;/h2&gt;
&lt;h2&gt;
&amp;nbsp;&lt;/h2&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqnDCtR6dtG2IDO2iZEUqNkaA4asWx5JHscVKP1AB9IgWjOLf-aaNH3qgQMZ2q8BuSf3BH1LuzzgG7UjEmRkcm6CZTxV6OiEvXx_cGgSRlXyk1icvHbZLKQIcxFc2qoRE7DUhAoO37tDA/s1600/kickasstorrents500x500.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqnDCtR6dtG2IDO2iZEUqNkaA4asWx5JHscVKP1AB9IgWjOLf-aaNH3qgQMZ2q8BuSf3BH1LuzzgG7UjEmRkcm6CZTxV6OiEvXx_cGgSRlXyk1icvHbZLKQIcxFc2qoRE7DUhAoO37tDA/s1600/kickasstorrents500x500.jpg&quot; height=&quot;234&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h2&gt;
&amp;nbsp;&lt;/h2&gt;
&lt;h2&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Recently we have been doing an attack test on all websites and we found that kickasstor is attacking us using image virus.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h2&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h2&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;This is a warning to all internet users. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h2&gt;
&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;
&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;
&lt;br /&gt;&lt;/h2&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/5725827774548465131/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2014/04/attack-by-kickasstor.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/5725827774548465131'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/5725827774548465131'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2014/04/attack-by-kickasstor.html' title='Attack by Kickasstor '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqnDCtR6dtG2IDO2iZEUqNkaA4asWx5JHscVKP1AB9IgWjOLf-aaNH3qgQMZ2q8BuSf3BH1LuzzgG7UjEmRkcm6CZTxV6OiEvXx_cGgSRlXyk1icvHbZLKQIcxFc2qoRE7DUhAoO37tDA/s72-c/kickasstorrents500x500.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-3938054812052990578</id><published>2013-12-26T10:47:00.000-08:00</published><updated>2013-12-29T02:47:23.122-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>Asylum for whistleblower</title><content type='html'>&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&amp;nbsp; &amp;nbsp;Asylum for whistleblower&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJzfd100GfC7R2XJX13NWeLYMJsPhBeV1PQeMFoCm48nysTjM7VQIykjA7xVlHVfdSIbedEXMFZxNfhlMI-N2JnNQrZckcUybDQz_slbeOHNP6INj8lK4EwK5GtlJ49vkNP8ggpx0BiMg/s1600/Edward-Snowdens-lawyer-008.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJzfd100GfC7R2XJX13NWeLYMJsPhBeV1PQeMFoCm48nysTjM7VQIykjA7xVlHVfdSIbedEXMFZxNfhlMI-N2JnNQrZckcUybDQz_slbeOHNP6INj8lK4EwK5GtlJ49vkNP8ggpx0BiMg/s320/Edward-Snowdens-lawyer-008.jpg&quot; height=&quot;192&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; color: #666666; font-family: arial, sans-serif; font-size: 12px; line-height: 16px;&quot;&gt;Edward Snowden&#39;s lawyer Anatoly Kucherena shows a copy of a temporary document allowing the whistleblower to cross the border into Russia. Photograph: AP&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;The White House expressed anger and dismay on Thursday after&amp;nbsp;Russiagranted temporary asylum to the American whistleblower&amp;nbsp;Edward Snowden&amp;nbsp;and allowed him to leave the Moscow airport where he had been holed up for over a month.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;White House spokesman Jay Carney said the US was &quot;extremely disappointed&quot; by the decision, almost certainly taken personally by President&amp;nbsp;Vladimir Putin. He said Moscow should hand Snowden back and hinted that Barack Obama might now boycott a bilateral meeting with Putin in September, due to be held when the US president travels to Russia for a G20 summit.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Carney added that Snowden had arrived in both China and Russia carrying with him thousands of top secret US documents. He said: &quot;Simply the possession of that kind of highly sensitive classified information outside of secure areas is both a huge risk and a violation.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&quot;As we know he&#39;s been in Russia now for many weeks. There is a huge risk associated with … removing that information from secure areas. You shouldn&#39;t do it, you can&#39;t do it, it&#39;s wrong.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;With US-Russian relations now at a cold war-style low, Snowden slipped out of Sheremetyevo airport on Thursday afternoon. His lawyer, Anatoly Kucherena, said Russia&#39;s federal migration service had granted him temporary asylum for one year. Snowden had left the airport to stay at an undisclosed location with expatriate Americans, he added.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Putin made no immediate comment. But having weighed Russia&#39;s options for some weeks, he appears to have decided that Snowden&#39;s propaganda value outweighs any possible US repercussions. Obama&#39;s already floundering attempts to &quot;reset&quot;, or improve, relations with Moscow are in effect over.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;In a statement released by WikiLeaks, Snowden thanked the Russian authorities and accused the US of behaving illegally. He made no explicit mention of the trial of Bradley Manning, who this week was convicted of espionage and faces 136 years in jail.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Snowden said: &quot;Over the past eight weeks we have seen the&amp;nbsp;Obama administration&amp;nbsp;show no respect for international or domestic law, but in the end the law is winning.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;He added: &quot;I thank the Russian Federation for granting me asylum in accordance with its laws and international obligations.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Snowden has been given a temporary Russian travel document, with his name in Cyrillic and a fresh passport photo. &quot;This gave him the right to temporary asylum on the territory of the Russian Federation, Kucherena said, holding up a copy of the document. US authorities had cancelled his American passport.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Security officials said Snowden officially crossed the border into Russia from the airport&#39;s transit zone at about 3.30pm local time. Russia had apparently not informed the US of the move in advance. The state TV channel Rossiya 24 showed a photograph of Snowden&#39;s departure, as he clambered into a grey unmarked car.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Despite being pictured from behind Snowden was instantly recognisable wearing his trademark grey shirt and carrying a black backpack. Next to him was Sarah Harrison, the WikiLeaks representative who accompanied him last month on his flight from Hong Kong.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Kucherena declined to provide details on where Snowden was heading, citing safety concerns. &quot;Since he is the most hunted person in the world, he will address the question of security today,&quot; he told journalists.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;The former&amp;nbsp;&lt;a href=&quot;http://www.theguardian.com/world/nsa&quot; style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; margin: 0px; padding: 0px; text-decoration: none;&quot; title=&quot;More from the Guardian on NSA&quot;&gt;NSA&lt;/a&gt;&amp;nbsp;employee will himself choose his place of residence and forms of protection, he added. Previously, some speculated that the Russian government was keeping Snowden hidden, although the whistleblower and his lawyer have denied that, adding that he has had no contact with Russian security services.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;The whistleblower&#39;s father, Lon Snowden, had reportedly been planning to visit his son. Kucherena said on Wednesday that he was sending an invitation to Snowden&#39;s father so he could obtain a Russian visa. Kucherena told Rossiya 24 on Thursday that he would be speaking to the father later in the day to arrange his visit.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;US authorities have repeatedly called on Moscow to return the fugitive to face charges in America. Last week America&#39;s attorney general, Eric Holder, sent a letter to Russia&#39;s justice minister promising that Snowden would not be tortured and that he would not face the death penalty if handed over to the US.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Russian officials previously said they had no jurisdiction to return Snowden, as he was not officially located on Russian territory, and that the US had not filed an official extradition request.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;The Kremlin did not immediately comment on Snowden&#39;s temporary asylum. Putin has previously said repeatedly that to remain in Russia, Snowden must stop activities harming the&amp;nbsp;United States. His lawyer suggested that fresh revelations published by the Guardian on Wednesday and Thursday had come from documents that Snowden had already given the paper before Putin made his comments.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Russia&#39;s decision has emboldened hawkish critics of the White House, who have long dubbed Obama&#39;s attempts to improve relations with Putin as naive and inappropriate. In a statement on his website, Senator John McCain said: &quot;Russia&#39;s action today is a disgrace and a deliberate effort to embarrass the United States. It is a slap in the face of all Americans. Now is the time to fundamentally rethink our relationship with Putin&#39;s Russia.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;He proposed in response to expand the Magnitsky Act list of banned Russian officials, push for Georgia&#39;s acceptance into Nato and implement US missile defence programmes in&amp;nbsp;Europe.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;At the White House, Carney made it clear that President Obama was frustrated by the decision by Russia to allow Snowden to enter the country, and that a planned presidential summit was now in jeopardy.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Obama is scheduled to travel to Russia in September for at meeting of G20 leaders in St Petersburg. He also planned to meet Putin for a bilateral summit during the trip in what would have been a sign of improving relations between the two powers.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;That meeting is now under review. &quot;Obviously this is not a positive development,&quot; Carney said. &quot;We have a wide range of interests with the Russians. We are evaluating the utility of the summit.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Amnesty International called for the focus to switch from Snowden&#39;s asylum plight to the &quot;sweeping nature and unlawfulness&quot; of the US government&#39;s surveillance programmes.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Widney Brown, senior director for international law and policy at Amnesty, said in a statement: &quot;Now that Edward Snowden has left the airport and has protected status in Russia, the focus really needs to be on the US government&#39;s surveillance programs. Snowden would not have needed temporary asylum but for revealing the sweeping nature and unlawfulness of a massive system of domestic and international surveillance by the United States government.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;A survey showed that 43% of Russians supported granting Snowden asylum and 51% approved of his whistleblowing activities. Kucherena said he had received numerous letters from Russians offering Snowden lodging, protection and money, as well as from women interested in Snowden romantically.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-repeat: no-repeat no-repeat; border-collapse: collapse; font-family: arial,sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 13px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Pavel Durov, the founder of Russia&#39;s most popular social network, VKontakte, invited Snowden to come work as a programmer at the network, in a post on his VKontakte page on Thursday.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Source: The Guardian &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/3938054812052990578/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/12/asylum-for-whistleblower.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/3938054812052990578'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/3938054812052990578'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/12/asylum-for-whistleblower.html' title='Asylum for whistleblower'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJzfd100GfC7R2XJX13NWeLYMJsPhBeV1PQeMFoCm48nysTjM7VQIykjA7xVlHVfdSIbedEXMFZxNfhlMI-N2JnNQrZckcUybDQz_slbeOHNP6INj8lK4EwK5GtlJ49vkNP8ggpx0BiMg/s72-c/Edward-Snowdens-lawyer-008.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-4088025988802083994</id><published>2013-11-30T07:36:00.002-08:00</published><updated>2013-11-30T07:36:56.933-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>Anonymous hackers leak mafia and corruption documents from Italian Government</title><content type='html'>&lt;h3 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot; style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 22px; margin: 0px; position: relative;&quot;&gt;
Anonymous hackers leak mafia and corruption documents from Italian Government&lt;/h3&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzyzoLxpOkNNRyoPeBjXZ7fKQsS0smGrEa-uq0HG8wRmnWfs5CNIMqB7hRJkiSf4DNWG7n6N3rRRmNQJdW3IpmbFEfM87iQc1D57GRpSvubFyfx_qVnP6pjzaVOF3aCLK_iaaKCEFtOEg/s1600/Italia.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzyzoLxpOkNNRyoPeBjXZ7fKQsS0smGrEa-uq0HG8wRmnWfs5CNIMqB7hRJkiSf4DNWG7n6N3rRRmNQJdW3IpmbFEfM87iQc1D57GRpSvubFyfx_qVnP6pjzaVOF3aCLK_iaaKCEFtOEg/s1600/Italia.png&quot; height=&quot;298&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Anonymous hackers claim to have breached the personal computer and mobile devices of Giuseppe Scopelliti, an Italian politician and a member of The People of Freedom party, currently the elected president of Calabria. This is allegedly only the first in a series of leaks targeting Italian regional governments.&lt;/span&gt;&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;The leak is part of a campaign called Operation Italy. The approximately 1,000 documents leaked on this occasion are related to the mafia, drugs and corruption, according to the hackers. The files include emails allegedly belonging to Scopelliti and members of his staff.&amp;nbsp;&lt;/span&gt;&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Anonymous accuses Scopelliti of not doing anything to stop the mafia’s activities in Calabria.&amp;nbsp;&lt;/span&gt;&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;“This is just a beginning. People of Italia do have the right to know what the government is involved in, especially when it comes to mafia wars and corruption in the region,” the hacktivsts wrote on&lt;/span&gt;&lt;a href=&quot;https://www.cyberguerrilla.org/blog/?p=16368&quot; style=&quot;background-color: #141414; color: #444444; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;cyberguerilla.org&lt;/a&gt;&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;.&amp;nbsp;&lt;/span&gt;&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;The hackers say that the president of Calabria is only their first target. The leaders of regions such as Lombardia, Sicilia, Toscana, Campania and Puglia are next.&amp;nbsp;&lt;/span&gt;&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;“While we are not that happy with the politics of many governors, especially when it comes to protecting mafia, corruption and economic downfall, it has come to this – we managed to infect most of the personal computers in regional administrations, mainly presidents of Calabria, Lombardia, Sicilia, Toscana, Campania and Puglia,” the hacktivists stated.&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/4088025988802083994/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/anonymous-hackers-leak-mafia-and.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/4088025988802083994'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/4088025988802083994'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/anonymous-hackers-leak-mafia-and.html' title='Anonymous hackers leak mafia and corruption documents from Italian Government'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzyzoLxpOkNNRyoPeBjXZ7fKQsS0smGrEa-uq0HG8wRmnWfs5CNIMqB7hRJkiSf4DNWG7n6N3rRRmNQJdW3IpmbFEfM87iQc1D57GRpSvubFyfx_qVnP6pjzaVOF3aCLK_iaaKCEFtOEg/s72-c/Italia.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-3092934348187708307</id><published>2013-11-30T07:31:00.004-08:00</published><updated>2013-11-30T07:31:58.222-08:00</updated><title type='text'>#Anonymous Leaked Account Data for 4,000 Bank Executives on a Government Website</title><content type='html'>&lt;h3 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot; style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 22px; margin: 0px; position: relative;&quot;&gt;
#Anonymous Leaked Account Data for 4,000 Bank Executives on a Government Website&lt;/h3&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUUMKlNmmivcx3sY8zGgVMOtKDnUAOiUfWXkMHUIlJPaaAPWW1njvJ2VtSsXvTljMLwkj3YFQDR3IsI87bzojokSG6Ib1IvFYENU38dvCETpj9kxV10whiQdZvIEjFpfCNBIuDyCDtg-Q/s1600/original.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUUMKlNmmivcx3sY8zGgVMOtKDnUAOiUfWXkMHUIlJPaaAPWW1njvJ2VtSsXvTljMLwkj3YFQDR3IsI87bzojokSG6Ib1IvFYENU38dvCETpj9kxV10whiQdZvIEjFpfCNBIuDyCDtg-Q/s1600/original.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;After hacking up government websites last week, and the week before, Anonymous has pulled off another hack to push their agenda of reforming computer crime law in the wake of Aaron Swartz&#39;s suicide. This time, they&#39;ve leaked names, addresses, and other information about over 4,000 bank executives. And they did it all on a government site.&lt;/span&gt;&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;The leak which is still posted on the official Alabama Criminal Justice Information Center website as of this writing is another another arm of Operation Last Resort. Until now the project has involved plenty of threats but no actual leaks. The leaked info includes titles, addresses, phone numbers, emails, ID numbers, and hashed passwords of the affected bank executives, and while that may seem sort of tangentially related to computer crime reform, that&#39;s how Anonymous has been spinning it.&lt;/span&gt;&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;So far there&#39;s been no official response to the leak from the parties affected, but there&#39;s little reason to believe that all that information is fabricated. Anonymous has been on a pretty successful run of defacing government websites, and it looks like it isn&#39;t going to end any time soon. Sure, this hack isn&#39;t quite as happy-go-lucky as their last, but it&#39;s definitely a pretty serious accomplishment. And you can bet this isn&#39;t the end of it.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;From trusted source&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/3092934348187708307/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/anonymous-leaked-account-data-for-4000.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/3092934348187708307'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/3092934348187708307'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/anonymous-leaked-account-data-for-4000.html' title='#Anonymous Leaked Account Data for 4,000 Bank Executives on a Government Website'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUUMKlNmmivcx3sY8zGgVMOtKDnUAOiUfWXkMHUIlJPaaAPWW1njvJ2VtSsXvTljMLwkj3YFQDR3IsI87bzojokSG6Ib1IvFYENU38dvCETpj9kxV10whiQdZvIEjFpfCNBIuDyCDtg-Q/s72-c/original.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-7389989779649892726</id><published>2013-11-30T07:27:00.001-08:00</published><updated>2013-11-30T07:30:56.172-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>Leaked document of 5000 Israeli Officials - #Anonymous #OpIsrael</title><content type='html'>&lt;h3 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot; style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 22px; margin: 0px; position: relative;&quot;&gt;
Leaked document of 5000 Israeli Officials - #Anonymous #OpIsrael&lt;/h3&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8mLcFK4zjauzdxG3qSH1wDbFaa6o7DZ0QgLzcT4bG36SrVrGwXayjmhAJMW2fJs9F6FjRiz2VHtD89Gj5ssJkJGWtAUCZsd-SpFxNsmY5Am_CnIVy3o90OEN8-7_5ARlZKnZTfwDqqxQ/s1600/opisrael-anonymous.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8mLcFK4zjauzdxG3qSH1wDbFaa6o7DZ0QgLzcT4bG36SrVrGwXayjmhAJMW2fJs9F6FjRiz2VHtD89Gj5ssJkJGWtAUCZsd-SpFxNsmY5Am_CnIVy3o90OEN8-7_5ARlZKnZTfwDqqxQ/s1600/opisrael-anonymous.jpeg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Greetings Citizens of the world, This is Anonymous. It has come to our attention that the Israeli government has ignored repeated warnings about the abuse of human rights, shutting down the internet in Israel and mistreating its own citizens and those of its neighboring countries. November 2012 will be a month to remember for the Israeli defense forces and internet security forces. Israeli Gov. this is/will turn into a cyberwar.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;We are Anonymous&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;We are Legion&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;We will not forgive.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;We will not forget.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Israel, it is too late to expect us.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;#OpIsrael #Anonymous&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;
&lt;span style=&quot;background-color: #141414; color: red; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;More: Current Internet, telecommunication and death toll situation/status in #Gaza | #OpIsrael:&lt;/span&gt;&lt;a href=&quot;http://tmblr.co/ZNMTdvXOLg0b&quot; style=&quot;background-color: #141414; color: red; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot;&gt;http://tmblr.co/ZNMTdvXOLg0b&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #141414; color: red; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Livestream:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.ustream.tv/channel/operation-pillar-of-cloud&quot; style=&quot;background-color: #141414; color: red; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot;&gt;http://www.ustream.tv/channel/operation-pillar-of-cloud&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #141414; color: red; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Video:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://youtu.be/O6t9Kr2wWzE&quot; style=&quot;background-color: #141414; color: red; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot;&gt;http://youtu.be/O6t9Kr2wWzE&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #141414; color: red; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Arabic:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.anonpaste.me/anonpaste2/index.php?89452a7861b4af1d#hFCbUSaOGM+ZBIgJPGEOBwxEjxV0lNNnbdPQnx0uQRw=&quot; style=&quot;background-color: #141414; color: red; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot;&gt;http://www.anonpaste.me/anonpaste2/index.php?89452a7861b4af1d#hFCbUSaOGM+ZBIgJPGEOBwxEjxV0lNNnbdPQnx0uQRw=&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #141414; color: red; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Arabic v2.0:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.mediafire.com/?hpnne29xvx1ceuv&quot; style=&quot;background-color: #141414; color: red; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot;&gt;http://www.mediafire.com/?hpnne29xvx1ceuv&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #141414; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Care Package:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: #141414; color: red; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot;&gt;&lt;a href=&quot;http://bayfiles.com/file/rPjj/a7ehrr/Op_Israel_Care_Package_For_Gaza.zip&quot; style=&quot;background-color: #141414; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px; text-decoration: none;&quot;&gt;http://bayfiles.com/file/rPjj/a7ehrr/Op_Israel_Care_Package_For_Gaza.zip&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
From trusted source&amp;nbsp;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/7389989779649892726/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/leaked-document-of-5000-israeli.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/7389989779649892726'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/7389989779649892726'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/leaked-document-of-5000-israeli.html' title='Leaked document of 5000 Israeli Officials - #Anonymous #OpIsrael'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8mLcFK4zjauzdxG3qSH1wDbFaa6o7DZ0QgLzcT4bG36SrVrGwXayjmhAJMW2fJs9F6FjRiz2VHtD89Gj5ssJkJGWtAUCZsd-SpFxNsmY5Am_CnIVy3o90OEN8-7_5ARlZKnZTfwDqqxQ/s72-c/opisrael-anonymous.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-8952199666971168117</id><published>2013-11-30T07:25:00.001-08:00</published><updated>2013-11-30T07:30:33.687-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>#Anonymous hacker Christopher Weatherhead jailed for 18 months</title><content type='html'>&lt;h3 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot; style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 22px; margin: 0px; position: relative;&quot;&gt;
#Anonymous hacker Christopher Weatherhead jailed for 18 months&lt;/h3&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0feTU58Ua_7Zf7WX7z5bW-syZ_SGD4JovhXbabFhi7o1vAYTVOGEYwFLrTsLArDV4rWcbqFVtXvF5_OcCRfzcYL4QZVYoDlYep-uAA60F-7FsBUtArT_8lWKm5dejzHvbX9AemXVtDc/s1600/anonymous-fbi-riaa-megaupload.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0feTU58Ua_7Zf7WX7z5bW-syZ_SGD4JovhXbabFhi7o1vAYTVOGEYwFLrTsLArDV4rWcbqFVtXvF5_OcCRfzcYL4QZVYoDlYep-uAA60F-7FsBUtArT_8lWKm5dejzHvbX9AemXVtDc/s1600/anonymous-fbi-riaa-megaupload.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Anonymous hacker Christopher Weatherhead has been handed an 18-month jail sentence for carrying out a series of high-profile distributed denial of service (DDoS) attacks.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;The 22-year-old was previously convicted of hacking into the websites of Visa, Mastercard and PayPal, costing the latter an estimated £3.5 million, Sky News reports.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Fellow Anonymous members Ashley Rhodes and Peter Gibson were tried alongside Weatherhead at Southwark Crown Court, receiving seven months in jail and a six-month sentence, suspended for two years, respectively.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Rhodes, 28, was found guilty of conspiring with Weatherhead to impair the operations of the targeted businesses between 2010 and 2011, while 24-year-old Gibson was deemed to have played a lesser role, which he admitted to. Judge Peter Testar said: &quot;It is intolerable that when an individual or a group disagrees with a particular entity&#39;s activities they should be free to curtail that activity by means of attacks such as those which took place in this case.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;A fourth man, 18-year-old Jake Birchall, has also admitted to playing a part in the conspiracy and will be sentenced at a later date. DDoS attacks overload computer systems by hitting them with an impossible number of requests simultaneously.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot; /&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Victims of the Weatherhead-led attacks, referred to as Operation Payback, received the following message: &quot;You&#39;ve tried to bite the Anonymous hand. You angered the hive and now you are being stung.&quot; The ring leader is believed to have targeted Paypal after it refused to process transactions for the Wau Holland Foundation, a group attempting to raise funding for WikiLeaks.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;br /&gt;
From trusted source&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/8952199666971168117/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/anonymous-hacker-christopher.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/8952199666971168117'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/8952199666971168117'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/anonymous-hacker-christopher.html' title='#Anonymous hacker Christopher Weatherhead jailed for 18 months'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp0feTU58Ua_7Zf7WX7z5bW-syZ_SGD4JovhXbabFhi7o1vAYTVOGEYwFLrTsLArDV4rWcbqFVtXvF5_OcCRfzcYL4QZVYoDlYep-uAA60F-7FsBUtArT_8lWKm5dejzHvbX9AemXVtDc/s72-c/anonymous-fbi-riaa-megaupload.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-7137650533382339597</id><published>2013-11-30T07:13:00.000-08:00</published><updated>2013-11-30T07:30:39.140-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>#OpMaryville</title><content type='html'>&lt;h3 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot; style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 22px; margin: 0px; position: relative;&quot;&gt;
Greetings, citizens of the internet, we are Anonymous - #OpMaryville&lt;/h3&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn85NkzZdK7yALiJAJcV6BX7L2wXF2DvFOXpXs2ggSDuTcsA3_ejG5udtkfnWA4Ox6sI0FQ8KURbfj4AvY-zCJoYVi0zuiMy734iOSdldCoJhnwptl79AuhhC7CtFLZ6CgWhbaXHe-fg0/s1600/images.jpg&quot; height=&quot;112&quot; width=&quot;200&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;color: white;&quot;&gt;#O&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;#OpMaryville script,&lt;/span&gt;&lt;a href=&quot;http://pastebin.com/TDRraezx&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Click here to view&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&quot;On October 14, we demanded that Daisy&#39;s case be reopened and justice be brought to the boys. And even though our press release has been removed by YouTube for spam and other supposed &#39;community violations,&#39; fear us as the Hydra; cut off one head, and two more will rise up to take its place. Our demands will be met. It&#39;s time for the &#39;good old boys club&#39; to come to an end in Maryville.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: #141414; color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;Source: Anonymous member&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/7137650533382339597/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/opmaryville.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/7137650533382339597'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/7137650533382339597'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/opmaryville.html' title='#OpMaryville'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhn85NkzZdK7yALiJAJcV6BX7L2wXF2DvFOXpXs2ggSDuTcsA3_ejG5udtkfnWA4Ox6sI0FQ8KURbfj4AvY-zCJoYVi0zuiMy734iOSdldCoJhnwptl79AuhhC7CtFLZ6CgWhbaXHe-fg0/s72-c/images.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-5128013420304784706</id><published>2013-11-30T07:10:00.000-08:00</published><updated>2013-11-30T07:29:24.031-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>#OpNorthkorea</title><content type='html'>&lt;span style=&quot;font-size: x-large;&quot;&gt;#OpNorthKorea&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo7sAjTiSYDagN6ySloefXkrN4AP8tA2McPGO5xNGdoNIpJtGMWWWjdX4uyZXiWgLFePUxHeQAtQk0DBmK2DTfTfPwYY0VXtTNVJkg_UjgZ1yjf0U0BNp951psE2uxodxWWF2yKp_PpXk/s1600/Anonymous-Launches-OpNorthKorea-Several-Sites-Hacked.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo7sAjTiSYDagN6ySloefXkrN4AP8tA2McPGO5xNGdoNIpJtGMWWWjdX4uyZXiWgLFePUxHeQAtQk0DBmK2DTfTfPwYY0VXtTNVJkg_UjgZ1yjf0U0BNp951psE2uxodxWWF2yKp_PpXk/s1600/Anonymous-Launches-OpNorthKorea-Several-Sites-Hacked.png&quot; height=&quot;201&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;Anonymous Hackers started their #OpNorthKorea and websites are going down and after a recheck many of the websites still down and the major websites down, they are mostly related with the Media websites of Korea.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;http://country.zbjcy.gov.cn/index.html&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;chosonsinbo.com&amp;nbsp; (The&amp;nbsp;Choson Sinbo&amp;nbsp;(Chosun Shinbo) is a newspaper based in&amp;nbsp;Japan, published in both&amp;nbsp;Korean&amp;nbsp;and&amp;nbsp;Japanese)&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;http://ryomyong.com&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;http://ksf.com.kp&amp;nbsp;(&amp;nbsp;Korea Sports Fund)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;http://www.airkoryo.com.kp&amp;nbsp; (state-owned national&amp;nbsp;flag carrier&amp;nbsp;airline&amp;nbsp;of&amp;nbsp;North Korea) &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;http://www.kcna.kp (Korean Central News Agency)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;http://procp.tok2.com/&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;http://www.rodong.rep.kp (Digital edition of the&amp;nbsp;Rodong Sinmun&amp;nbsp;newspaper)&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;http://www.nosotek.com&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;http://www.store.zbjcy.gov.cn/index.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;http://www.pust.kr)&amp;nbsp;Pyongyang University of Science and Technology&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;http://korea-dpr.com&amp;nbsp;(The Democratic People’s Republic of&amp;nbsp;Korea)&lt;/span&gt;&lt;br /&gt;

&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://hypn0s1s.zbjcy.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.hblyw.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://dafuk-banget.zbjcy.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://country.zbjcy.gov.cn/home.html *http://dhdfsfh.zbjcy.gov.cn/home.html *http://yfmubik.zbjcy.gov.cn/home.html *http://jkggkgkf.zbjcy.gov.cn/home.html *http://fekiyynet7854.zbjcy.gov.cn/home.html *http://yiangzhoun.zbjcy.gov.cn/home.html *http://www.cn.academic.zbjcy.gov.cn/home.html *http://www.de.zbjcy.gov.cn/home.html *http://www.question.zbjcy.gov.cn/home.html *http://www.faqs.zbjcy.gov.cn/home.html *http://www.en.zbjcy.gov.cn/home.html *http://www.job.zbjcy.gov.cn/home.html *http://www.media.zbjcy.gov.cn/home.html *http://www.security.zbjcy.gov.cn/home.html *http://www.mobile.zbjcy.gov.cn/home.html *http://www.consult.zbjcy.gov.cn/home.html *http://www.store.zbjcy.gov.cn/home.html *http://www.admin.zbjcy.gov.cn/home.html *http://www.manager.zbjcy.gov.cn/home.html *http://www.host.zbjcy.gov.cn/home.html *http://www.medic.zbjcy.gov.cn/home.html *http://jgj.nc.gov.cn/home.html *http://21a.zbjcy.gov.cn/home.html *http://21a45.zbjcy.gov.cn/home.html *http://21a4.zbjcy.gov.cn/home.html *http://68a5.zbjcy.gov.cn/home.html *http://58a7.zbjcy.gov.cn/home.html *http://57a4.zbjcy.gov.cn/home.html *http://12a33.zbjcy.gov.cn/home.html *http://12a2.zbjcy.gov.cn/home.html *http://12a1.zbjcy.gov.cn/home.html *http://sasd.zbjcy.gov.cn/home.html *http://hafd.zbjcy.gov.cn/home.html *http://hafdsd.zbjcy.gov.cn/home.html *http://gath.zbjcy.gov.cn/home.html *http://cdad.zbjcy.gov.cn/home.html *http://22a4.zbjcy.gov.cn/home.html *http://noate.zbjcy.gov.cn/home.html *http://asae.zbjcy.gov.cn/home.html *http://iika11.zbjcy.gov.cn/home.html *http://naah2.zbjcy.gov.cn/home.html *http://bisaa.zbjcy.gov.cn/home.html *http://anaux.zbjcy.gov.cn/home.html *http://catr23.zbjcy.gov.cn/home.html *http://axyz.zbjcy.gov.cn/home.html *http://21.zbjcy.gov.cn/home.html *http://2145.zbjcy.gov.cn/home.html *http://214.zbjcy.gov.cn/home.html *http://587.zbjcy.gov.cn/home.html *http://574.zbjcy.gov.cn/home.html *http://1233.zbjcy.gov.cn/home.html *http://224.zbjcy.gov.cn/home.html *http://note.zbjcy.gov.cn/home.html *http://ase.zbjcy.gov.cn/home.html *http://iik11.zbjcy.gov.cn/home.html *http://nah2.zbjcy.gov.cn/home.html *http://bisa.zbjcy.gov.cn/home.html *http://anux.zbjcy.gov.cn/home.html *http://ctr23.zbjcy.gov.cn/home.html*http://www.data.zbjcy.gov.cn/home.html *http://www.invest.zbjcy.gov.cn/home.html *http://www.play.zbjcy.gov.cn/home.html *http://www.shop.zbjcy.gov.cn/home.html *http://www.headmaster.zbjcy.gov.cn/home.html *http://www.accounting.zbjcy.gov.cn/home.html *http://www.academic.zbjcy.gov.cn/home.html *http://www.secretary.zbjcy.gov.cn/home.html *http://www.agendas.zbjcy.gov.cn/home.html *http://www.news.zbjcy.gov.cn/home.html *http://www.zhc.zbjcy.gov.cn/home.html *http://www.zd.zbjcy.gov.cn/home.html *http://marikath2.zbjcy.gov.cn/home.html *http://sites52.zbjcy.gov.cn/home.html *http://www.lz.zbjcy.gov.cn/home.html *http://www.zc.zbjcy.gov.cn/home.html *http://woodborough.zbjcy.gov.cn/home.html *http://www.bs.zbjcy.gov.cn/home.html *http://edu.zbjcy.gov.cn/home.html *http://ballsport.zbjcy.gov.cn/home.html&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&amp;nbsp;*http://cd.whlib.gov.cn/home.html *http://antoonantoon.zbjcy.gov.cn/home.html *http://xzzf.cgjsw.gov.cn/home.html *http://ww2.zbjcy.gov.cn/home.html *http://www.xfj.suzhou.gov.cn/home.html *http://source.zbjcy.gov.cn/home.html *http://cia.zbjcy.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.zbjcy.gov.cn/home.html *http://www.yz110.gov.cn/home.html *http://www.hrbcb.gov.cn/home.html *http://arp.zbjcy.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://the.zbjcy.gov.cn/home.html *http://mr-x.zbjcy.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://ts11-c4.zbjcy.gov.cn/home.html *http://plntm.zbjcy.gov.cn/home.html *http://sm.zbjcy.gov.cn/home.html *http://v007.zbjcy.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://kirua.zbjcy.gov.cn/home.html *http://rbs.zbjcy.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://dasilva.zbjcy.gov.cn/home.html *http://kc.zbjcy.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://fenix.zbjcy.gov.cn/home.html&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://pk007.zbjcy.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://garuda.zbjcy.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://wen.zbjcy.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://cimy.zbjcy.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.qhdhb.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.kuiwen.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://msfw.yzx.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.tianzhushan.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://jcj.zhumadian.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://bmj.zhumadian.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://gsl.cznq.gov.cn/home.html&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&amp;nbsp;*http://kwzs.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://zw.zfxxgk.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.jmzjj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.pyfzw.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.yzland.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://rzdm.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://nvxingshouji.qdwater.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.fjnh.gov.cn/home.html&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&amp;nbsp;*http://www.baotou-epb.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.ydqcz.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.shangri-la.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://fg.zfxxgk.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.czmsgc.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.nxforestry.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://jgbz.shaoxing.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.tongcheng.jcy.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://ga.10.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.czkx.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://wjj.nc.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.pccm.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.qnczj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.tmlr.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.zgcz.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.sxjxga.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://gg.zigui.gov.cn/home.html&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&amp;nbsp;*http://www.dywater.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://wbxq.gov.cn/home.html&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&amp;nbsp;*http://zztjj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://fgj.zjjcl.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.hncz93.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://cyxh.anhua.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://lyj.anhua.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://wsj.anhua.gov.cn/home.html&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&amp;nbsp;*http://daj.anhua.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.ahrdxx.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://syjd.anhua.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://cl.anhua.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.ahzxw.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://ggfw.leiyang.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://nyp.aqny.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.wgjsj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.sxrsrc.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.fxrbj.gov.cn/home.html&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&amp;nbsp;*http://gzzw.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.ahstfl.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.czzdj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.dcjsw.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://rfb.kyqq.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://lgbj.kyqq.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://keqz.kyqq.gov.cn/home.html&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&amp;nbsp;*http://etz.kyqq.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://aldesm.kyqq.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://lszxc.kyqq.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://rencai.dongying.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.stjgbz.gov.cn/home.html&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&amp;nbsp;*http://kfq.tslr.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://xxb.leiyang.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://oa.nbxsws.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.hljms.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.jzgh.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.dt.smesx.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.xhgaj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.fxhuanbao.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.fxcz.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.tjztb.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.ahjzmz.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.newxns.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://old.hsrk.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://jsj.jinchuan.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.stzsj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.hnlyrd.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.scnc.lss.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.hblyw.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://scnc.lss.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.wenanga.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.qhdhb.gov.cn/home.html&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&amp;nbsp;*http://jgj.nc.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://zbjcy.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.yz110.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.jmzjj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://xzzf.cgjsw.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.wgjsj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.hncz93.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://xxb.leiyang.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.ftp.hbfgw.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.abcd.hbfgw.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.user.hbfgw.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.qygt.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://rencai.dongying.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://ggfw.leiyang.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.stzsj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.stjgbz.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.newxns.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://jsj.jinchuan.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://fgj.zjjcl.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.xcxjsj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.kuiwen.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://kwzs.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://msfw.yzx.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.tjztb.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://hxtyj.hx.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://scblh6.hx.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.fxhuanbao.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.xsxzfw.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://xj.dzgtj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://gsl.cznq.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://cps.dalang.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.pyfzw.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.rzguotu.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.yzland.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://rzdm.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://hxfda.hx.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://nvxingshouji.qdwater.gov.cn/home.html&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&amp;nbsp;*http://flyz.qzsfj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.fxrbj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://old.hsrk.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.fxcz.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.fjnh.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.baotou-epb.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.jxcgzf.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.nxforestry.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.mudu.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.tspop.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://glga.gao-ling.gov.cn/home.html&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&amp;nbsp;*http://www.dyjsw.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.dyls.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.dylk.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.dyzfw.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.dywjj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.dyxcb.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.xsjjkfq.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.dydzj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.dygxzs.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.dyjgswj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.dyfzb.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://www.dyfgw.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://eport.my.gov.cn/home.html&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&amp;nbsp;*http://zhc.zbjcy.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://zztjj.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://jgbz.shaoxing.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;*http://ga.10.gov.cn/home.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;LEAKS Disclosure of some uriminzokkiri charge members, Rest will be on Wiki-leaks:&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQKGz2D9OtgusNbcphgWBifzFTyTpevda3T1_ZD02inBp2bZIUrPUK3cC4fwKf8rMzbgIjWtY4xvxDvA0pmPlhTF8njX13_IV8McqBE3yv8GcJhZsxUdiGM5p4MX5w8-klknUgsseMKfg/s1600/20130625042928_315607_676_435.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQKGz2D9OtgusNbcphgWBifzFTyTpevda3T1_ZD02inBp2bZIUrPUK3cC4fwKf8rMzbgIjWtY4xvxDvA0pmPlhTF8njX13_IV8McqBE3yv8GcJhZsxUdiGM5p4MX5w8-klknUgsseMKfg/s1600/20130625042928_315607_676_435.jpg&quot; height=&quot;205&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px; list-style: none; outline: none; padding: 0px;&quot;&gt;
&lt;strong style=&quot;border: 0px none; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;UPDATE:&lt;/strong&gt;&lt;/div&gt;
&lt;ul style=&quot;background-color: white; border: 0px none; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px none; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;1 More Govt. website hacked by Joker Cracker -&amp;nbsp;&lt;a href=&quot;http://xzzf.cgjsw.gov.cn/index.htm&quot; style=&quot;-webkit-transition: all 0.2s ease-in-out; border: 0px none; color: #ff5100; list-style: none; margin: 0px; outline: none; padding: 0px; text-decoration: none; transition: all 0.2s ease-in-out;&quot;&gt;http://xzzf.cgjsw.gov.cn/index.htm&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background-color: white; border: 0px none; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px; list-style: none; outline: none; padding: 0px;&quot;&gt;
&lt;strong style=&quot;border: 0px none; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;UPDATE: 28-06-2013&lt;/strong&gt;&lt;/div&gt;
&lt;ul style=&quot;background-color: white; border: 0px none; color: #060505; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px none; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;Lanzhou Jiaotong University Website hacked by Joker Cracker -&amp;nbsp;&lt;a data-expanded-url=&quot;http://tmgcxy.lzjtu.edu.cn&quot; dir=&quot;ltr&quot; href=&quot;http://t.co/dgM3KtBWap&quot; rel=&quot;nofollow&quot; style=&quot;-webkit-transition: all 0.2s ease-in-out; border: 0px none; color: #ff5100; list-style: none; margin: 0px; outline: none; padding: 0px; text-decoration: none; transition: all 0.2s ease-in-out;&quot; target=&quot;_blank&quot; title=&quot;http://tmgcxy.lzjtu.edu.cn&quot;&gt;http://tmgcxy.lzjtu.edu.cn&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px none; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;1 More Education Website hacked by Joker Cracker -&amp;nbsp;&lt;a href=&quot;http://rsc.xupt.edu.cn/&quot; style=&quot;-webkit-transition: all 0.2s ease-in-out; border: 0px none; color: #ff5100; list-style: none; margin: 0px; outline: none; padding: 0px; text-decoration: none; transition: all 0.2s ease-in-out;&quot;&gt;http://rsc.xupt.edu.cn/&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px none; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;&lt;a href=&quot;http://gc.mau.edu.cn/&quot; style=&quot;-webkit-transition: all 0.2s ease-in-out; border: 0px none; color: #ff5100; list-style: none; margin: 0px; outline: none; padding: 0px; text-decoration: none; transition: all 0.2s ease-in-out;&quot;&gt;http://gc.mau.edu.cn/&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px none; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;&lt;a href=&quot;http://biolab.fjnu.edu.cn/&quot; style=&quot;-webkit-transition: all 0.2s ease-in-out; border: 0px none; color: #ff5100; list-style: none; margin: 0px; outline: none; padding: 0px; text-decoration: none; transition: all 0.2s ease-in-out;&quot;&gt;http://biolab.fjnu.edu.cn/&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px none; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;&lt;a href=&quot;http://law.zjgsu.edu.cn/&quot; style=&quot;-webkit-transition: all 0.2s ease-in-out; border: 0px none; color: #ff5100; list-style: none; margin: 0px; outline: none; padding: 0px; text-decoration: none; transition: all 0.2s ease-in-out;&quot;&gt;http://law.zjgsu.edu.cn/&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px none; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;&lt;a href=&quot;http://hljei.hrbcu.edu.cn/&quot; style=&quot;-webkit-transition: all 0.2s ease-in-out; border: 0px none; color: #ff5100; list-style: none; margin: 0px; outline: none; padding: 0px; text-decoration: none; transition: all 0.2s ease-in-out;&quot;&gt;http://hljei.hrbcu.edu.cn/&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px none; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;&lt;a href=&quot;http://www.ltx.cdut.edu.cn/index.html&quot; style=&quot;-webkit-transition: all 0.2s ease-in-out; border: 0px none; color: #ff5100; list-style: none; margin: 0px; outline: none; padding: 0px; text-decoration: none; transition: all 0.2s ease-in-out;&quot;&gt;http://www.ltx.cdut.edu.cn/index.html&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px; list-style: none; outline: none; padding: 0px;&quot;&gt;
&lt;strong style=&quot;background-color: red; border: 0px none; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;NOTE:&lt;/strong&gt;&lt;/div&gt;
&lt;ul style=&quot;border: 0px none; font-family: Tahoma, Arial, Verdana, sans-serif; font-size: 13px; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px none; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: red;&quot;&gt;Above websites may be recovered in the meantime&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/5128013420304784706/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/opnorthkorea_30.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/5128013420304784706'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/5128013420304784706'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/opnorthkorea_30.html' title='#OpNorthkorea'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo7sAjTiSYDagN6ySloefXkrN4AP8tA2McPGO5xNGdoNIpJtGMWWWjdX4uyZXiWgLFePUxHeQAtQk0DBmK2DTfTfPwYY0VXtTNVJkg_UjgZ1yjf0U0BNp951psE2uxodxWWF2yKp_PpXk/s72-c/Anonymous-Launches-OpNorthKorea-Several-Sites-Hacked.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-4539543755663863396</id><published>2013-11-27T09:10:00.003-08:00</published><updated>2013-11-27T09:10:36.696-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>&#39;Anonymous&#39; hacks Singapore Prime Minister&#39;s website</title><content type='html'>&lt;h1 class=&quot;story-header&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&#39;Anonymous&#39; hacks Singapore Prime Minister&#39;s website&lt;/span&gt;&lt;/h1&gt;
&lt;h1 class=&quot;story-header&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Singapore Prime Minister Lee Hsien Loong&#39;s official website has been 
hacked by people claiming to be members of the hacking group Anonymous.&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://news.bbcimg.co.uk/media/images/70840000/png/_70840300_image%282%29.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;A screen shot showing the hacker&#39;s message on Straits Times website&quot; border=&quot;0&quot; height=&quot;225&quot; src=&quot;http://news.bbcimg.co.uk/media/images/70840000/png/_70840300_image%282%29.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h1 class=&quot;story-header&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;h1 class=&quot;story-header&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
The attack comes a day after Mr Lee said he would track down the group.&lt;br /&gt;

        He made the comments after a person claiming to be part of 
the group posted an online video in which he threatened to hack 
government websites.&lt;br /&gt;
&lt;br /&gt;

        Singapore&#39;s internet and phone regulator said part of the website had been &quot;compromised&quot; late on Thursday.&lt;br /&gt;

        &quot;The PMO main website is still working, and we are working to
 restore the page that has been compromised,&quot; the Infocomm Development 
Authority said in a statement.  &lt;br /&gt;

        The hackers had posted an image of a Guy Fawkes mask - the 
symbol of the Anonymous group - on the PM&#39;s website with the words: 
&quot;It&#39;s great to be Singaporean today.&quot;&lt;br /&gt;

  &lt;span class=&quot;cross-head&quot;&gt;Media rules&lt;/span&gt;
       Under new rules, unveiled by the Media Development Authority 
earlier this year, sites &quot;that report regularly on issues relating to 
Singapore and have significant reach among readers&quot; require individual 
licences. &lt;br /&gt;

        The video, which was posted last month, had protested against the government&#39;s new rules for news websites.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

  &lt;div class=&quot;caption body-narrow-width&quot;&gt;
  

    &lt;span style=&quot;width: 304px;&quot;&gt;The website of Singapore&#39;s main paper was hacked earlier this month&lt;/span&gt;
  &lt;/div&gt;
Earlier this week, Mr Lee said his government would &quot;spare no effort to try and track down the culprits&quot;.&lt;br /&gt;

        &quot;If we can find him, we will bring him to justice and he will
 be dealt with severely. You may think you&#39;re anonymous but we will make
 that extra effort to find out who you are,&quot; he added.  &lt;br /&gt;

        Earlier this month, a hacker - dubbed The Messiah and 
claiming to be a part of Anonymous - hacked the website of Singapore&#39;s 
main paper, The Straits Times.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;

        He had left a message saying the paper&#39;s report on the video was misleading.&lt;br /&gt;

        According to reports, The Messiah also claimed responsibility
 for hacking the website of the Ang Mo Kio Town Council last week, the 
municipal branch of the prime minister&#39;s district. &lt;br /&gt;

        Hackers linked to Anonymous have defaced dozens of websites 
belonging to Australian businesses and Philippine government agencies 
during the past week.  &lt;br /&gt;
&lt;h1 class=&quot;story-header&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt; &lt;/span&gt;&lt;/h1&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/4539543755663863396/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/anonymous-hacks-singapore-prime.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/4539543755663863396'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/4539543755663863396'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/anonymous-hacks-singapore-prime.html' title='&#39;Anonymous&#39; hacks Singapore Prime Minister&#39;s website'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-2202866026820826693</id><published>2013-11-27T09:07:00.001-08:00</published><updated>2013-11-27T09:07:12.583-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>Anonymous Indonesia hacker claims to have shut down RBA, AFP websites</title><content type='html'>&lt;h1&gt;
&lt;b&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Anonymous Indonesia hacker claims to have shut down RBA, AFP websites&lt;/span&gt;&lt;/b&gt;&lt;/h1&gt;
&lt;h1&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;A member of hacking group Anonymous Indonesia has claimed responsibility
 for cyber attacks on the websites of the Australian Federal Police and 
the Reserve Bank.&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;h1&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvj8QKMpYFAm4L26dyDmAsLACKIrb0KO1Y-glRw01-sI7Ibr5xQLuc_uKUek9CXL2RPaiF7PGFE5Tnp-KDMfIifLHdP20xQBKgBhmkut65uMABLqNSgAZAxX4ySSitlEcsWpAfW2sV9mU/s1600/998553_162627827257816_7239370_n.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvj8QKMpYFAm4L26dyDmAsLACKIrb0KO1Y-glRw01-sI7Ibr5xQLuc_uKUek9CXL2RPaiF7PGFE5Tnp-KDMfIifLHdP20xQBKgBhmkut65uMABLqNSgAZAxX4ySSitlEcsWpAfW2sV9mU/s1600/998553_162627827257816_7239370_n.png&quot; height=&quot;236&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
The AFP and the Reserve Bank have confirmed their sites were attacked
 overnight, though both say the hacker did not gain access to any 
sensitive information.&lt;br /&gt;
The attack comes amid a diplomatic row 
between Australia and Indonesia, sparked by revelations spies tried to 
tap the phones of president Susilo Bambang Yudhoyono, his wife and inner
 circle.&lt;br /&gt;
The AFP website was still down about 10.30am AEDT but is 
now running again, and Commissioner Tony Negus says the agency is 
investigating the attack.&lt;br /&gt;
&quot;We have had an attack on the open 
source website, not connected to secret networks, but there has been an 
attempt on our website this morning which is being dealt with,&quot; he told 
reporters. &lt;br /&gt;
&quot;I am not sure who is the perpetrator but we are investigating that.&quot;&lt;br /&gt;
An
 AFP spokesperson had earlier told the ABC the agency takes any attack 
&quot;very seriously&quot; and warned hacking is a criminal activity, not 
&quot;harmless fun&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&quot;All information on the AFP website is publically 
available. No sensitive information is hosted on the AFP website,&quot; the 
spokesperson added.&lt;br /&gt;
The Reserve Bank has also confirmed its website was &quot;the subject of a denial of service attack&quot; about 2.00am.&lt;br /&gt;
&quot;There has been no outage, but the bank&#39;s website may have been slow for some users,&quot; a spokesman said.&lt;br /&gt;
The spokesman says protective measures were &quot;effectively deployed&quot; and that the bank&#39;s systems remain secure.&lt;br /&gt;
The hacker used a series of Twitter posts to claim the sites were successfully shut down, adding: &quot;I&#39;m ready for this war.&quot;&lt;br /&gt;
&lt;h1&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;Anonymous 
Indonesia has previously claimed to have hacked more than 150 Australian
 sites to protest against allegations that Australia used its Jakarta 
embassy as a spy base.&lt;/b&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;h1&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;h1&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt; &lt;/span&gt;&lt;/h1&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/2202866026820826693/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/anonymous-indonesia-hacker-claims-to_27.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/2202866026820826693'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/2202866026820826693'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/anonymous-indonesia-hacker-claims-to_27.html' title='Anonymous Indonesia hacker claims to have shut down RBA, AFP websites'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvj8QKMpYFAm4L26dyDmAsLACKIrb0KO1Y-glRw01-sI7Ibr5xQLuc_uKUek9CXL2RPaiF7PGFE5Tnp-KDMfIifLHdP20xQBKgBhmkut65uMABLqNSgAZAxX4ySSitlEcsWpAfW2sV9mU/s72-c/998553_162627827257816_7239370_n.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-1289377612422241483</id><published>2013-11-26T11:29:00.001-08:00</published><updated>2013-11-26T11:29:21.877-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>Microsoft rushes out fix to prevent attacks on Office PCs</title><content type='html'>
 





&lt;br /&gt;

 


&lt;h1&gt;
Microsoft rushes out fix to prevent attacks on Office PCs&lt;/h1&gt;
&lt;h1&gt;
&amp;nbsp;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKOiKCTdi5fHqtkV3pJCXxSBjdbf0KR4kFwq6tDoyrX2yf97WdnwGxV_GEPTJkT648b-AJ9SJxuRxdHo-N8ojaAtmVcydcUs3s3WfEIgLwCyYc4PJemMJwJAq88m6qblpQLreOU5kd74o/s1600/iop.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKOiKCTdi5fHqtkV3pJCXxSBjdbf0KR4kFwq6tDoyrX2yf97WdnwGxV_GEPTJkT648b-AJ9SJxuRxdHo-N8ojaAtmVcydcUs3s3WfEIgLwCyYc4PJemMJwJAq88m6qblpQLreOU5kd74o/s1600/iop.jpg&quot; height=&quot;213&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/h1&gt;
&lt;h1&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span id=&quot;articleText&quot;&gt;&lt;span class=&quot;focusParagraph&quot;&gt;&lt;span class=&quot;articleLocatio&amp;lt;/span&amp;gt;n&quot;&gt;(Reuters) - &lt;span class=&quot;mandelbrot_refrag&quot;&gt;Microsoft Corp&lt;/span&gt; released an emergency &lt;span class=&quot;mandelbrot_refrag&quot;&gt;software&lt;/span&gt;
 fix on Tuesday after it learned that hackers had exploited a previously
 undiscovered security flaw in its widely used Office software to infect
 the PCs of its customers with tainted Word documents.&lt;/span&gt;&lt;br /&gt;

&lt;/span&gt;&lt;span id=&quot;midArticle_1&quot;&gt;&lt;/span&gt;The &lt;span class=&quot;mandelbrot_refrag&quot;&gt;software&lt;/span&gt;
 maker said on its website that it had released the software, known as a
 &quot;Fix It,&quot; as a temporary measure until it provides an update that will 
automatically patch &lt;span class=&quot;mandelbrot_refrag&quot;&gt;computers&lt;/span&gt; to protect against the new threat.&lt;br /&gt;
&lt;span id=&quot;midArticle_2&quot;&gt;&lt;/span&gt;&lt;span class=&quot;mandelbrot_refrag&quot;&gt;Microsoft&lt;/span&gt;
 said that it had learned of a &quot;very limited&quot; number of attacks that 
exploited the newly discovered vulnerability, mainly in the Middle East 
and South Asia. The company did not identify the victims, who received 
emails asking them to open the tainted Word documents.&lt;br /&gt;
&lt;span id=&quot;midArticle_3&quot;&gt;&lt;/span&gt;The
 vulnerability affects customers using Office 2003 and Office 2007 as 
well as those running Office 2010 on Windows XP and Server 2003.&lt;br /&gt;
&lt;span id=&quot;midArticle_4&quot;&gt;&lt;/span&gt;The
 attacks took advantage of an undiscovered flaw, or &quot;zero day&quot; 
vulnerability in industry parlance, which is usually only used on a 
limited number of high-value targets in a bid to keep the flaws a 
secret.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span id=&quot;midArticle_5&quot;&gt;&lt;/span&gt;Typically, when makers of 
widely used software programs issue a warning about a zero-day bug, 
groups of hackers rush to reverse-engineer the Fix Its so they can build
 computer viruses that also exploit the same vulnerabilities.&lt;br /&gt;
&lt;span id=&quot;midArticle_6&quot;&gt;&lt;/span&gt;Stuart
 McClure, chief executive officer of the cybersecurity firm Cylance Inc,
 said that businesses using vulnerable versions of Office should install
 the Fix It to prevent attacks.&lt;br /&gt;
&lt;span id=&quot;midArticle_7&quot;&gt;&lt;/span&gt;&quot;I definitely think it is something that needs to be patched,&quot; he said.&lt;br /&gt;
&lt;span id=&quot;midArticle_8&quot;&gt;&lt;/span&gt;Fix
 Its are pieces of software for remediating security flaws that must be 
manually downloaded and installed on PCs. They are designed to protect 
customers while &lt;span class=&quot;mandelbrot_refrag&quot;&gt;Microsoft&lt;/span&gt; prepares official updates, automatically delivered via the Internet to be installed on &lt;span class=&quot;mandelbrot_refrag&quot;&gt;computers&lt;/span&gt;.&lt;br /&gt;
&lt;span id=&quot;midArticle_9&quot;&gt;&lt;/span&gt;The new Fix It is available at this link: &lt;a data-ls-seen=&quot;1&quot; href=&quot;https://support.microsoft.com/kb/2896666&quot;&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt; &lt;/span&gt;&lt;/h1&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/1289377612422241483/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/microsoft-rushes-out-fix-to-prevent.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/1289377612422241483'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/1289377612422241483'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/microsoft-rushes-out-fix-to-prevent.html' title='Microsoft rushes out fix to prevent attacks on Office PCs'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKOiKCTdi5fHqtkV3pJCXxSBjdbf0KR4kFwq6tDoyrX2yf97WdnwGxV_GEPTJkT648b-AJ9SJxuRxdHo-N8ojaAtmVcydcUs3s3WfEIgLwCyYc4PJemMJwJAq88m6qblpQLreOU5kd74o/s72-c/iop.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-5058885103416676799</id><published>2013-11-26T11:23:00.000-08:00</published><updated>2013-11-27T08:52:52.943-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'> Jailed Anonymous hacker Jeremy Hammond: &#39;My days of hacking are done&#39;</title><content type='html'>&lt;div class=&quot;flexible-content-body&quot; data-display-hint=&quot;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;Jailed Anonymous hacker Jeremy Hammond: &#39;My days of hacking are done&#39;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;Hammond calls his 10-year sentence a &#39;vengeful, spiteful act&#39; by US authorities eager to put a chill on&amp;nbsp;political hacking&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimZcEoUu94_Ip4YqjTnu883lGEsGovzOmR4RjUrM8Nh1RZ4qYVpSt5WGPKTT28Phm_eMDEgjzCDCt2bOSPYYKGs91HBr3ky5G4QGUu08iOLAwFbAVeFDEq-8Wfw5SKYmtkIV3IGsjgqV4/s1600/2c97abe1-4936-4ca4-b07f-126781329f1a-460x276.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimZcEoUu94_Ip4YqjTnu883lGEsGovzOmR4RjUrM8Nh1RZ4qYVpSt5WGPKTT28Phm_eMDEgjzCDCt2bOSPYYKGs91HBr3ky5G4QGUu08iOLAwFbAVeFDEq-8Wfw5SKYmtkIV3IGsjgqV4/s1600/2c97abe1-4936-4ca4-b07f-126781329f1a-460x276.jpeg&quot; height=&quot;192&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jeremy Hammond, the Anonymous hacktivist who released millions of 
emails relating to the private intelligence firm Stratfor, has denounced
 his prosecution and lengthy prison sentence as a “vengeful, spiteful 
act” designed to put a chill on politically-motivated hacking.&lt;br /&gt;
Hammond was sentenced on Friday at federal court in Manhattan to the 
maximum 10 years in jail, plus three years supervised release. He had 
pleaded guilty to one count under the Computer Fraud and Abuse Act 
(CFAA) flowing from his 2011 hack of Strategic Forecasting, Inc, known 
as Stratfor. In an interview with the Guardian in the Metropolitan 
Correction Center in New York, conducted on Thursday, he said he was 
resigned to a long prison term which he sees as a conscious attempt by 
the US authorities to put a chill on political hacking.&lt;br /&gt;
He had no doubt that his sentence would be long, describing it as a 
&quot;vengeful, spiteful act&quot;. He said of his prosecutors: &quot;They have made it
 clear they are trying to send a message to others who come after me. A 
lot of it is because they got slapped around, they were embarrassed by 
Anonymous and they feel that they need to save face.”&lt;br /&gt;
Most pointedly, Hammond suggested that the FBI may have manipulated 
him to carry out hacking attacks on “dozens” of foreign government 
websites. During his time with Anonymous, the loose collective of 
hackers working alongside WikiLeaks and other anti-secrecy groups, he 
was often directed by a individual known pseudonomously on the web as 
“Sabu”, the leader of the Anonymous-affiliated group Lulzsec, who turned out to be an FBI informant.&lt;br /&gt;
Hammond, who is under court orders restricting what he says in 
public, told the Guardian that Sabu presented him with a list of 
targets, including many foreign government sites, and encouraged him to 
break into their computer systems. He said he was not sure whether Sabu 
was in turn acting on behalf of the FBI or other US government agency, 
but it was even possible that the FBI was using Sabu’s internet handle 
directly as contact between the two hackers was always made through 
cyberspace, never face-to-face.&lt;br /&gt;
“It is kind of funny that here they are sentencing me for hacking 
Stratfor, but at the same time as I was doing that an FBI informant was 
suggesting to me foreign targets to hit. So you have to wonder how much 
they really care about protecting the security of websites.”&lt;br /&gt;
In the interview, conducted in a secure prison meeting room hours 
before the 28-year-old Chicagoan was sentenced, he was sanguine about 
his prospects. “I knew when I started out with Anonymous that being put 
in jail and having a lengthy sentence was a possibility. Given the 
nature of the targets I was going after I knew I would upset a lot of 
powerful people.”&lt;br /&gt;
Dressed in a brown prison jump suit, and with a long wispy goatee and
 moustache (he planned to shave both off before the sentencing hearing),
 Hammond was scathing about the way the CFAA was being twisted in his 
view for political ends. “They are widening the definition of what is 
covered by the Act and using it to target specifically political 
activists,” he said.&lt;br /&gt;
He invoked the memory of Aaron Swartz, the open-data crusader who killed himself in January while
 awaiting trial under the CFAA for releasing documents from behind the 
subscription-only paywall of an online research group. “The same beast 
bit us both,” Hammond said. “They went after Aaron because of his 
involvement in legitimate political causes – they railroaded charges 
against him, and look what happened.”&lt;br /&gt;
Hammond has been in custody since March 2012 having been arrested in 
Chicago on suspicion of the Stratfor leak of millions of emails that 
were eventually released by WikiLeaks
 as the Global Intelligence Files. His sentence is an indication of the 
aggression with which prosecutors have been pursuing political hackers 
in the US – other Anonymous members in Britain involved in the breach of
 Stratfor were sentenced to much shorter jail terms.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hammond stressed that he had not benefitted personally in any way 
from the Stratfor email release, that exposed surveillance by private 
security firms on activists including Anonymous members themselves, 
Occupy protesters and campaigners in Bhopal, India involved in the push 
for compensation for victims of the 1984 industrial catastrophe. “Our 
main purpose in carrying out the Stratfor hack was to find out what 
private security and intelligence companies were doing, though none of 
us had any idea of the scale of it.”&lt;br /&gt;
Paradoxically, Hammond insists that he would never have carried out 
the breach of Stratfor’s computer system had he not been led into doing 
it by Sabu – real name Hector Xavier Monsegur – the fellow hacker who is
 himself awaiting sentencing having pleaded guilty to 12 hacking-related
 criminal charges. “I had never heard of Stratfor until Sabu brought in 
another hacker who told me about it. Practically, I would never have 
done the Stratfor hack without Sabu’s involvement.”&lt;br /&gt;
Hammond discovered that Monsegur was an FBI informant the day after 
his own arrest. As he was reading the criminal complaint against him, he
 saw quotes marked CW for “co-operating witness” that contained details 
that could only have come from Sabu.&lt;br /&gt;
“I felt betrayed, obviously. Though I knew these things happen. What 
surprised me was that Sabu was involved in so much strategic targeting, 
in actually identifying targets. He gave me the information on targets.”&lt;br /&gt;
Part of Sabu’s interest in him, he now believes, was that Hammond had
 access to advanced tools including one known as PLESK that allowed him 
to break into web systems used by large numbers of foreign governments. 
“The FBI and NSA are clearly able to do their own hacking of other 
countries. But when a new vulnerability emerges in internet security, 
sometimes hackers have access to tools that are ahead of them that can 
be very valuable,” he said.&lt;br /&gt;
Looking back on his involvement with anonymous, the Chicagoan said 
that he had been drawn to work with Anonymous, because he saw it as “a 
model of resistance – it was decentralised, leaderless.” He grew 
increasingly political in his hacking focus, partly under the influence 
of the Occupy movement that began in Wall Street in September 2011 and 
spread across the country.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Chelsea Manning, the US soldier formerly known as Bradley who leaked a
 massive trove of state secrets to WikiLeaks now serving a 35-year 
sentence in military jail, was a major influence on him. Manning showed 
him that “powerful institutions – whether military or private security 
firms – are involved in unaccountable activities that the public is 
totally unaware of that can only be exposed by whistleblowers and 
hackers”.&lt;br /&gt;
Hammond has often described himself as an anarchist. He has a tattoo 
on his left shoulder of the anarchy symbol with the words: “Freedom, 
equality, anarchy”. Another tattoo on his left forearm shows the Chinese
 representation of “leader” or “army”, and a third tattoo on his right 
forearm is a glider signifying the hacking open-source movement that is 
drawn from the computer simulation Game of Life .&lt;br /&gt;
He says he plans to use his time in prison “reading, writing, working
 out and playing sports – training myself to become more disciplined so I
 can be more effective on my release”. As to that release, he says he 
cannot predict how he will be thinking when he emerges from jail, but 
doubts that he would go back to hacking. “I think my days of hacking are
 done. That’s a role for somebody else now,” he said.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/5058885103416676799/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/jeremy-hammond-anonymous-hacktivist-who.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/5058885103416676799'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/5058885103416676799'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/jeremy-hammond-anonymous-hacktivist-who.html' title=' Jailed Anonymous hacker Jeremy Hammond: &#39;My days of hacking are done&#39;'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimZcEoUu94_Ip4YqjTnu883lGEsGovzOmR4RjUrM8Nh1RZ4qYVpSt5WGPKTT28Phm_eMDEgjzCDCt2bOSPYYKGs91HBr3ky5G4QGUu08iOLAwFbAVeFDEq-8Wfw5SKYmtkIV3IGsjgqV4/s72-c/2c97abe1-4936-4ca4-b07f-126781329f1a-460x276.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-990729613040589735</id><published>2013-11-26T10:25:00.001-08:00</published><updated>2013-11-26T10:25:42.789-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>Indian Hackers attack Pakistan Wesite!!!</title><content type='html'>&lt;span style=&quot;font-size: large;&quot;&gt;Indian Hackers attack Pakistan Wesite!!!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmx04FdiS0AqHx72iZUcjUhfzUTkUal-pBOZOKHF_CwbjBHJ_kycEAvuSQCdoxFUw6hjuS8V62EtJtiULFshMp0FueFu54Yb5mljMN-sArQSk0f98hBRk0uVahmsqZ6Wnbc2MC2NHI-j8/s1600/BaBExFiCAAA8Rr1.png+large.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmx04FdiS0AqHx72iZUcjUhfzUTkUal-pBOZOKHF_CwbjBHJ_kycEAvuSQCdoxFUw6hjuS8V62EtJtiULFshMp0FueFu54Yb5mljMN-sArQSk0f98hBRk0uVahmsqZ6Wnbc2MC2NHI-j8/s1600/BaBExFiCAAA8Rr1.png+large.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/990729613040589735/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/indian-hackers-attack-pakistan-wesite.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/990729613040589735'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/990729613040589735'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/indian-hackers-attack-pakistan-wesite.html' title='Indian Hackers attack Pakistan Wesite!!!'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmx04FdiS0AqHx72iZUcjUhfzUTkUal-pBOZOKHF_CwbjBHJ_kycEAvuSQCdoxFUw6hjuS8V62EtJtiULFshMp0FueFu54Yb5mljMN-sArQSk0f98hBRk0uVahmsqZ6Wnbc2MC2NHI-j8/s72-c/BaBExFiCAAA8Rr1.png+large.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-8632189792188981600</id><published>2013-11-26T10:15:00.001-08:00</published><updated>2013-11-26T10:15:06.381-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>Cyber warrior shortage hits anti-hacker fightback</title><content type='html'>&lt;h1&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;Cyber warrior shortage hits anti-hacker fightback&lt;/span&gt;&lt;/h1&gt;
&lt;h1&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h1&gt;
&lt;div class=&quot;rolloverCaption&quot; id=&quot;captionContent&quot;&gt;
             &lt;div class=&quot;rolloverBg&quot;&gt;
                    &lt;div class=&quot;captionText&quot;&gt;
                        &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh03G9PawVq6vDrEM9H9GRMMqZsf6X5TdReR1b4eOCATeg-yjiAT4wKfc42Xl9YxXUIt5ibNXjIjfKn3mkjpwNwYW1zSukeMMkpqJb6_ibMHLmrI0k2CNiqPFPojPMSIriQVyvhpqh2O9g/s1600/ipo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh03G9PawVq6vDrEM9H9GRMMqZsf6X5TdReR1b4eOCATeg-yjiAT4wKfc42Xl9YxXUIt5ibNXjIjfKn3mkjpwNwYW1zSukeMMkpqJb6_ibMHLmrI0k2CNiqPFPojPMSIriQVyvhpqh2O9g/s1600/ipo.jpg&quot; height=&quot;209&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. &lt;br /&gt;

                        &lt;div class=&quot;credit&quot;&gt;
Credit: Reuters/Kacper Pempel/Files&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h1&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;h1&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span id=&quot;articleText&quot;&gt;&lt;span class=&quot;focusParagraph&quot;&gt;&lt;br /&gt;
(Reuters) - For 
the governments and corporations facing increasing computer attacks, the
 biggest challenge is finding the right cyber warriors to fight back.&lt;br /&gt;

&lt;/span&gt;&lt;span id=&quot;midArticle_1&quot;&gt;&lt;/span&gt;Hostile computer activity from 
spies, saboteurs, competitors and criminals has spawned a growing 
industry of corporate defenders who can attract the best talent from 
government cyber units.&lt;br /&gt;
&lt;span id=&quot;midArticle_2&quot;&gt;&lt;/span&gt;The U.S. 
military&#39;s Cyber Command is due to quadruple in size by 2015 with 4,000 
new personnel while Britain announced a new Joint Cyber Reserve last 
month. From Brazil to &lt;span class=&quot;mandelbrot_refrag&quot;&gt;Indonesia&lt;/span&gt;, similar forces have been set up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span id=&quot;midArticle_3&quot;&gt;&lt;/span&gt;But
 demand for specialists has far outpaced the number of those qualified 
to do the job, leading to a staffing crunch as talent is poached by 
competitors offering big salaries.&lt;br /&gt;
&lt;span id=&quot;midArticle_4&quot;&gt;&lt;/span&gt;&quot;As
 with anything, it really comes down to human capital and there simply 
isn&#39;t enough of it,&quot; says Chris Finan, White House director for cyber 
security from 2011-12, who is now a senior fellow at the Truman National
 Security Project and working for a start-up in Silicon Valley.&lt;br /&gt;
&lt;span id=&quot;midArticle_5&quot;&gt;&lt;/span&gt;&quot;They
 will choose where they work based on salary, lifestyle and the lack of 
an interfering bureaucracy and that makes it particularly hard to get 
them into government.&quot;&lt;br /&gt;
&lt;span id=&quot;midArticle_6&quot;&gt;&lt;/span&gt;Cyber 
attacks can be expensive: one unidentified London-listed company 
incurred losses of 800 million pounds ($1.29 billion) in a cyber attack 
several years ago, according to the British security services.&lt;br /&gt;
&lt;span id=&quot;midArticle_7&quot;&gt;&lt;/span&gt;Global
 losses are in the range of $80 billion to $400 billion a year, 
according to research by the Washington-based Center for Strategic and 
International Studies that was sponsored by Intel Corp&#39;s McAfee 
anti-virus division.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span id=&quot;midArticle_8&quot;&gt;&lt;/span&gt;There is a 
whole range of attacks. Some involve simply transferring money, but more
 often clients&#39; credit card details are stolen. There is also &lt;span class=&quot;mandelbrot_refrag&quot;&gt;&lt;a class=&quot;mandelbrot_refrag&quot; data-ls-seen=&quot;1&quot; href=&quot;http://www.reuters.com/subjects/top-100-global-innovators?lc=int_mb_1001&quot;&gt;intellectual property&lt;/a&gt;&lt;/span&gt; theft or theft of commercially sensitive information for &lt;span class=&quot;mandelbrot_refrag&quot;&gt;&lt;a class=&quot;mandelbrot_refrag&quot; data-ls-seen=&quot;1&quot; href=&quot;http://www.reuters.com/finance?lc=int_mb_1001&quot;&gt;business&lt;/a&gt;&lt;/span&gt; advantage.&lt;br /&gt;
&lt;span id=&quot;midArticle_9&quot;&gt;&lt;/span&gt;Victims
 can also suffer a &quot;hacktivist&quot; attack, such as a directed denial of 
service to bring a website down, which can cost a lot of money to fix.&lt;br /&gt;
&lt;span id=&quot;midArticle_10&quot;&gt;&lt;/span&gt;Quantifying the exact damage is almost impossible, especially when secrets and money are not the only targets.&lt;br /&gt;
&lt;span id=&quot;midArticle_11&quot;&gt;&lt;/span&gt;While
 no government has taken responsibility for the Stuxnet computer virus 
that destroyed centrifuges at Iran&#39;s Natanz uranium enrichment facility,
 it was widely reported to have been a U.S.-Israeli project.&lt;br /&gt;
&lt;span id=&quot;midArticle_12&quot;&gt;&lt;/span&gt;Britain
 says it blocked 400,000 advanced cyber threats to the government&#39;s 
secure intranet last year while a virus unleashed against Saudi Arabia&#39;s
 energy group Aramco, likely to be the world&#39;s most valuable company, 
destroyed data on thousands of &lt;span class=&quot;mandelbrot_refrag&quot;&gt;&lt;a class=&quot;mandelbrot_refrag&quot; data-ls-seen=&quot;1&quot; href=&quot;http://www.reuters.com/sectors/industries/overview?industryCode=104&amp;amp;lc=int_mb_1001&quot;&gt;computers&lt;/a&gt;&lt;/span&gt; and put an image of a burning American flag onto screens.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/8632189792188981600/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/cyber-warrior-shortage-hits-anti-hacker.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/8632189792188981600'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/8632189792188981600'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/cyber-warrior-shortage-hits-anti-hacker.html' title='Cyber warrior shortage hits anti-hacker fightback'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh03G9PawVq6vDrEM9H9GRMMqZsf6X5TdReR1b4eOCATeg-yjiAT4wKfc42Xl9YxXUIt5ibNXjIjfKn3mkjpwNwYW1zSukeMMkpqJb6_ibMHLmrI0k2CNiqPFPojPMSIriQVyvhpqh2O9g/s72-c/ipo.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-1408853948982317687</id><published>2013-11-26T10:11:00.001-08:00</published><updated>2013-11-26T10:11:36.649-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'> Adobe data breach more extensive than previously disclosed</title><content type='html'>
 


&lt;br /&gt;
&lt;h1&gt;
Adobe data breach more extensive than previously disclosed&lt;/h1&gt;
&lt;h1&gt;
&amp;nbsp;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEje1gAB6_hTeiORWSVBDanC2TAdHOaIEOQMotgTsMDCJFgNfOQMJAtCz9Fd8jr37K_dYaJNlREGfEFLtVNMJjEuTortGBRzI4ulmjgL5Kyty6vralGFvwPqE2KOCRDSut2VVcB8ybJhoE0/s1600/s1.reutersmedia.net.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEje1gAB6_hTeiORWSVBDanC2TAdHOaIEOQMotgTsMDCJFgNfOQMJAtCz9Fd8jr37K_dYaJNlREGfEFLtVNMJjEuTortGBRzI4ulmjgL5Kyty6vralGFvwPqE2KOCRDSut2VVcB8ybJhoE0/s1600/s1.reutersmedia.net.jpg&quot; height=&quot;208&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/h1&gt;
&lt;h1&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span id=&quot;articleText&quot;&gt;&lt;span class=&quot;focusParagraph&quot;&gt;(Reuters) - &lt;span class=&quot;mandelbrot_refrag&quot;&gt;Adobe Systems&lt;span id=&quot;goog_1929097504&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_1929097505&quot;&gt;&lt;/span&gt;&lt;/span&gt;
 Inc said on Tuesday that the scope of a cyber-security breach disclosed
 nearly a month ago was far bigger than initially reported, with 
attackers obtaining data on more than 38 million customer accounts.&lt;br /&gt;

&lt;/span&gt;&lt;span id=&quot;midArticle_1&quot;&gt;&lt;/span&gt;The &lt;span class=&quot;mandelbrot_refrag&quot;&gt;software&lt;/span&gt;
 maker also said that hackers had stolen part of the source code to 
Photoshop editing software that is widely used by professional 
photographers.&lt;br /&gt;
&lt;span id=&quot;midArticle_2&quot;&gt;&lt;/span&gt;The company 
disclosed the breach on October 3, saying attackers took credit card 
information and other data from nearly 3 million customers&#39; accounts.&lt;br /&gt;
&lt;span id=&quot;midArticle_3&quot;&gt;&lt;/span&gt;Adobe
 also said that the hackers accessed an undisclosed number of Adobe IDs 
and encrypted passwords that were stored in a separate database. On 
Tuesday, it revealed that about 38 million records from that database 
were stolen.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span id=&quot;midArticle_4&quot;&gt;&lt;/span&gt;On October 3, the 
company also reported that the attackers stole source code to three 
other products: Acrobat, ColdFusion and ColdFusion Builder.&lt;br /&gt;
&lt;span id=&quot;midArticle_5&quot;&gt;&lt;/span&gt;Adobe spokeswoman Heather Edell said the &lt;span class=&quot;mandelbrot_refrag&quot;&gt;software&lt;/span&gt;
 maker believes the attackers also obtained access to &quot;many invalid 
Adobe IDs, inactive Adobe IDs, Adobe IDs with invalid encrypted 
passwords and test account data.&quot;&lt;br /&gt;
&lt;span id=&quot;midArticle_6&quot;&gt;&lt;/span&gt;She
 said the company is still investigating to determine how much invalid 
account information was breached and is in the process of notifying 
affected users.&lt;br /&gt;
&lt;span id=&quot;midArticle_7&quot;&gt;&lt;/span&gt;Even though the 
company believes the stolen passwords were encrypted, the attackers may 
have been able to access them in plain text by one of several methods, 
including breaking the algorithm that Adobe used to scramble them, said 
Marcus Carey, a security researcher and expert on cyber attacks, who 
formerly worked as an investigator with the National Security Agency.&lt;br /&gt;
&lt;span id=&quot;midArticle_8&quot;&gt;&lt;/span&gt;They
 could likely use those passwords to break into other accounts because 
many people use the same passwords for multiple accounts, he said.&lt;br /&gt;
&lt;span id=&quot;midArticle_9&quot;&gt;&lt;/span&gt;&quot;This is a treasure trove for &lt;span class=&quot;itxtrst itxtrstspan itxtnowrap&quot; id=&quot;itxthook0p&quot;&gt;&lt;span class=&quot;itxtrst itxtrstspan itxtnowrap itxtnewhookspan&quot; id=&quot;itxthook0w&quot; style=&quot;background-color: transparent; border-color: transparent transparent rgb(0, 204, 0); border-style: none none solid; border-width: 0px 0px 1px; font-weight: normal; padding: 0px 0px 1px ! important; text-decoration: underline ! important;&quot;&gt;future&lt;/span&gt;&lt;/span&gt; attacks,&quot; Carey said.&lt;br /&gt;
&lt;span id=&quot;midArticle_10&quot;&gt;&lt;/span&gt;Adobe
 spokeswoman Heather Edell said that the company was not aware of any 
unauthorized activity on Adobe accounts as a result of the attack.&lt;br /&gt;
&lt;span id=&quot;midArticle_11&quot;&gt;&lt;/span&gt;Yet
 Edell said she could not say whether stolen credit cards or passwords 
had been used to launch follow-on attacks against Adobe customers or 
conduct other types of cyber crimes.&lt;br /&gt;
&lt;span id=&quot;midArticle_12&quot;&gt;&lt;/span&gt;&quot;Our investigation is still ongoing,&quot; she said. &quot;We anticipate the full investigation will take some time to complete.&quot;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt; &lt;/span&gt;&lt;/h1&gt;
&lt;h1&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h1&gt;
&lt;h1&gt;
&amp;nbsp;&lt;/h1&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/1408853948982317687/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/adobe-data-breach-more-extensive-than.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/1408853948982317687'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/1408853948982317687'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/adobe-data-breach-more-extensive-than.html' title=' Adobe data breach more extensive than previously disclosed'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEje1gAB6_hTeiORWSVBDanC2TAdHOaIEOQMotgTsMDCJFgNfOQMJAtCz9Fd8jr37K_dYaJNlREGfEFLtVNMJjEuTortGBRzI4ulmjgL5Kyty6vralGFvwPqE2KOCRDSut2VVcB8ybJhoE0/s72-c/s1.reutersmedia.net.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-8644975760223605625</id><published>2013-11-26T10:06:00.000-08:00</published><updated>2013-11-26T10:06:04.444-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'> Chicago hacker tied to Anonymous given 10 years in prison</title><content type='html'>
 


&lt;br /&gt;
&lt;h1&gt;
Chicago hacker tied to Anonymous given 10 years in prison&lt;/h1&gt;
&lt;h1&gt;
&amp;nbsp;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5bmoMnwMBWBw-8q747xPObmGYvchPqrNzKdksGKcFd4XvaLMMSyoll-TSIlOKoRhd5DOQ6U4kfmhhSVsFuN956VH_mLBdPBJK7Mac_mwz0BVSfHxjGft5S5tLqdPZ43BiirGJPHrDiHw/s1600/1379262_614848665233238_1045174157_n.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5bmoMnwMBWBw-8q747xPObmGYvchPqrNzKdksGKcFd4XvaLMMSyoll-TSIlOKoRhd5DOQ6U4kfmhhSVsFuN956VH_mLBdPBJK7Mac_mwz0BVSfHxjGft5S5tLqdPZ43BiirGJPHrDiHw/s1600/1379262_614848665233238_1045174157_n.jpg&quot; height=&quot;180&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;/h1&gt;
&lt;h1&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span id=&quot;articleText&quot;&gt;&lt;span class=&quot;focusParagraph&quot;&gt;(Reuters) - A 
Chicago computer hacker tied to the group known as Anonymous was 
sentenced on Friday to 10 years in prison for cyber attacks on various 
government agencies and businesses, including a global intelligence 
company.&lt;br /&gt;

&lt;/span&gt;&lt;span id=&quot;midArticle_1&quot;&gt;&lt;/span&gt;Jeremy Hammond, 28, was handed 
the maximum term for the December 2011 hacking of Strategic Forecasting 
Inc, an attack his lawyers contend was driven by concern about the role 
of private firms in gathering intelligence domestically and abroad.&lt;br /&gt;
&lt;span id=&quot;midArticle_2&quot;&gt;&lt;/span&gt;Prosecutors
 say the hack of Strategic Forecasting, or Stratfor, resulted in the 
theft of 60,000 credit card numbers and records for 860,000 clients, 
which were then uploaded online. Hammond admitted being behind it in 
May.&lt;br /&gt;
&lt;span id=&quot;midArticle_3&quot;&gt;&lt;/span&gt;He also admitted to hacking several law enforcement agencies and organizations, including the Arizona Department of Public &lt;u&gt;&lt;span class=&quot;itxtrst itxtrstspan itxtnowrap&quot; id=&quot;itxthook0p&quot;&gt;&lt;span class=&quot;itxtrst itxtrstspan itxtnowrap itxtnewhookspan&quot; id=&quot;itxthook0w&quot; style=&quot;background-color: transparent; border-color: transparent transparent rgb(0, 204, 0); border-style: none none solid; border-width: 0px 0px 1px; font-weight: normal; padding: 0px 0px 1px ! important;&quot;&gt;Sa&lt;/span&gt;&lt;span class=&quot;itxtrst itxtrstspan itxtnowrap itxtnewhookspan&quot; id=&quot;itxthook0w&quot; style=&quot;background-color: transparent; border-color: transparent transparent rgb(0, 204, 0); border-style: none none solid; border-width: 0px 0px 1px; font-weight: normal; padding: 0px 0px 1px ! important;&quot;&gt;fety&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;, releasing personal details of officers as part of an attack by the Anonymous-affiliated group LulzSec.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span id=&quot;midArticle_4&quot;&gt;&lt;/span&gt;Hammond&#39;s
 lawyers argued their client should be sentenced to only time he had 
already served since his March 2012 arrest, portraying him as a 
political activist and whistleblower.&lt;br /&gt;
&lt;span id=&quot;midArticle_5&quot;&gt;&lt;/span&gt;As part of the Stratfor attack, Hammond&#39;s lawyers said he turned over company emails to the anti-secrecy group &lt;span class=&quot;mandelbrot_refrag&quot;&gt;WikiLeaks&lt;/span&gt;, which has since selectively released documents revealing the firm&#39;s dealings with clients including &lt;span class=&quot;mandelbrot_refrag&quot;&gt;Goldman Sachs Group Inc&lt;/span&gt; and Coca-Cola Co.&lt;br /&gt;
&lt;span id=&quot;midArticle_6&quot;&gt;&lt;/span&gt;&quot;As
 a result of the Stratfor hack, some of the dangers of the unregulated 
private intelligence industry are now known,&quot; Hammond said in court.&lt;br /&gt;
&lt;span id=&quot;midArticle_7&quot;&gt;&lt;/span&gt;But
 Chief Judge Loretta Preska of the U.S. District Court in Manhattan 
imposed the 10-year term followed by three years of supervised release, 
citing his &quot;total lack of respect for the law.&quot;&lt;br /&gt;
&lt;span id=&quot;midArticle_8&quot;&gt;&lt;/span&gt;&quot;There was certainly nothing high-minded or public spirited about his hacking,&quot; Preska said.&lt;br /&gt;
&lt;span id=&quot;midArticle_9&quot;&gt;&lt;/span&gt;The
 sentence was the maximum allowed under the single charge of conspiracy 
to engage in computer hacking that Hammond pleaded guilty to in May.&lt;br /&gt;
&lt;span id=&quot;midArticle_10&quot;&gt;&lt;/span&gt;Hammond&#39;s
 sentencing drew more than 250 letters of support from family, friends 
and activists, including Daniel Ellsberg, the former U.S. military 
analyst who in 1971 released the Pentagon Papers, the top secret report 
on the United States&#39; role in the Vietnam War&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt; &lt;/span&gt;&lt;/h1&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/8644975760223605625/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/chicago-hacker-tied-to-anonymous-given.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/8644975760223605625'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/8644975760223605625'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/chicago-hacker-tied-to-anonymous-given.html' title=' Chicago hacker tied to Anonymous given 10 years in prison'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5bmoMnwMBWBw-8q747xPObmGYvchPqrNzKdksGKcFd4XvaLMMSyoll-TSIlOKoRhd5DOQ6U4kfmhhSVsFuN956VH_mLBdPBJK7Mac_mwz0BVSfHxjGft5S5tLqdPZ43BiirGJPHrDiHw/s72-c/1379262_614848665233238_1045174157_n.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-987823214277847545</id><published>2013-11-26T10:01:00.000-08:00</published><updated>2013-11-26T10:01:05.422-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'> Exclusive: FBI warns of U.S. government breaches by Anonymous hackers</title><content type='html'>&lt;span style=&quot;font-size: large;&quot;&gt;Exclusive: FBI warns of U.S. government breaches by Anonymous hackers&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7BN_hLm9NLOsxrkNOR2xRt_itEzF9tnlbd2e2S4zNHIsvze50yH4xIa7igTf8wzX6PbbG_GHN-zKLseKlgWPXaLML6CDuSJwDtZ_x1lWRCAR30hpIWhSSQJj8ovP3A9JTLubaIQ_nZkk/s1600/s1.reutersmedia.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7BN_hLm9NLOsxrkNOR2xRt_itEzF9tnlbd2e2S4zNHIsvze50yH4xIa7igTf8wzX6PbbG_GHN-zKLseKlgWPXaLML6CDuSJwDtZ_x1lWRCAR30hpIWhSSQJj8ovP3A9JTLubaIQ_nZkk/s1600/s1.reutersmedia.jpg&quot; height=&quot;266&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;rolloverCaption&quot; id=&quot;captionContent&quot;&gt;
             &lt;div class=&quot;rolloverBg&quot;&gt;
                    &lt;div class=&quot;captionText&quot;&gt;
                        &lt;span style=&quot;font-size: x-small;&quot;&gt;The word &#39;password&#39; is pictured on a computer screen in this picture illustration taken in Berlin May 21, 2013. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;
                        &lt;/span&gt;&lt;div class=&quot;credit&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;Credit: Reuters/Pawel Kopczynski&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;credit&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;credit&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;credit&quot;&gt;
&lt;span id=&quot;articleText&quot;&gt;&lt;span class=&quot;focusParagraph&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
(Reuters) - Activist hackers linked to the collective known as Anonymous have secretly accessed U.S. government &lt;span class=&quot;mandelbrot_refrag&quot;&gt;computers&lt;/span&gt; in multiple agencies and stolen sensitive information in a campaign that began almost a year ago, the FBI warned this week.&lt;br /&gt;

&lt;span id=&quot;midArticle_1&quot;&gt;&lt;/span&gt;The hackers exploited a flaw in &lt;span class=&quot;mandelbrot_refrag&quot;&gt;Adobe Systems&lt;/span&gt; Inc&#39;s &lt;span class=&quot;mandelbrot_refrag&quot;&gt;software&lt;/span&gt;
 to launch a rash of electronic break-ins that began last December, then
 left &quot;back doors&quot; to return to many of the machines as recently as last
 month, the Federal Bureau of Investigation said in a memo seen by 
Reuters.&lt;br /&gt;
&lt;span id=&quot;midArticle_2&quot;&gt;&lt;/span&gt;The memo, distributed on 
Thursday, described the attacks as &quot;a widespread problem that should be 
addressed.&quot; It said the breach affected the U.S. Army, Department of 
Energy, Department of Health and Human Services, and perhaps many more 
agencies.&lt;br /&gt;
&lt;span id=&quot;midArticle_3&quot;&gt;&lt;/span&gt;Investigators are still 
gathering information on the scope of the cyber campaign, which the 
authorities believe is continuing. The FBI document tells system 
administrators what to look for to determine if their systems are 
compromised.&lt;br /&gt;
&lt;span id=&quot;midArticle_4&quot;&gt;&lt;/span&gt;An FBI spokeswoman declined to elaborate.&lt;br /&gt;
&lt;span id=&quot;midArticle_5&quot;&gt;&lt;/span&gt;According
 to an internal email from Energy Secretary Ernest Moniz&#39; chief of 
staff, Kevin Knobloch, the stolen data included personal information on 
at least 104,000 employees, contractors, family members and others 
associated with the Department of Energy, along with information on 
almost 2,0000 bank accounts.&lt;br /&gt;
&lt;span id=&quot;midArticle_6&quot;&gt;&lt;/span&gt;The 
email, dated October 11, said officials were &quot;very concerned&quot; that loss 
of the banking information could lead to thieving attempts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span id=&quot;midArticle_7&quot;&gt;&lt;/span&gt;Officials
 said the hacking was linked to the case of Lauri Love, a British 
resident indicted on October 28 for allegedly hacking into &lt;span class=&quot;mandelbrot_refrag&quot;&gt;computers&lt;/span&gt; at the Department of Energy, Army, Department of Health and Human Services, the U.S. Sentencing Commission and elsewhere.&lt;br /&gt;
&lt;span id=&quot;midArticle_8&quot;&gt;&lt;/span&gt;Investigators believe the attacks began when Love and others took advantage of a security flaw in Adobe&#39;s ColdFusion &lt;span class=&quot;mandelbrot_refrag&quot;&gt;software&lt;/span&gt;, which is used to build websites.&lt;br /&gt;
&lt;span id=&quot;midArticle_9&quot;&gt;&lt;/span&gt;Adobe
 spokeswoman Heather Edell said she was not familiar with the FBI 
report. She added that the company has found that the majority of 
attacks involving its software have exploited programs that were not 
updated with the latest security patches.&lt;br /&gt;
&lt;span id=&quot;midArticle_10&quot;&gt;&lt;/span&gt;The
 Anonymous group is an amorphous collective that conducts multiple 
hacking campaigns at any time, some with a few participants and some 
with hundreds. In the past, its members have disrupted eBay&#39;s Inc PayPal
 after it stopped processing donations to the anti-secrecy site &lt;span class=&quot;mandelbrot_refrag&quot;&gt;Wikileaks&lt;/span&gt;. Anonymous has also launched technically more sophisticated attacks against Sony Corp and security firm HBGary Federal.&lt;br /&gt;
&lt;span id=&quot;midArticle_11&quot;&gt;&lt;/span&gt;Some
 of the breaches and pilfered data in the latest campaign had previously
 been publicized by people who identify with Anonymous, as part of what 
the group dubbed &quot;Operation Last Resort.&quot;&lt;br /&gt;
&lt;span id=&quot;midArticle_12&quot;&gt;&lt;/span&gt;Among
 other things, the campaigners said the operation was in retaliation for
 overzealous prosecution of hackers, including the lengthy penalties 
sought for Aaron Swartz, a well-known computer programmer and Internet 
activist who killed himself before a trial over charges that he 
illegally downloaded academic journal articles from a digital library 
known as JSTOR.&lt;br /&gt;
&lt;span id=&quot;midArticle_13&quot;&gt;&lt;/span&gt;Despite the 
earlier disclosures, &quot;the majority of the intrusions have not yet been 
made publicly known,&quot; the FBI wrote. &quot;It is unknown exactly how many 
systems have been compromised, but it is a widespread problem that 
should be addressed.&quot;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
                    &lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;  
                &lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
            &lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/987823214277847545/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/exclusive-fbi-warns-of-us-government.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/987823214277847545'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/987823214277847545'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/exclusive-fbi-warns-of-us-government.html' title=' Exclusive: FBI warns of U.S. government breaches by Anonymous hackers'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7BN_hLm9NLOsxrkNOR2xRt_itEzF9tnlbd2e2S4zNHIsvze50yH4xIa7igTf8wzX6PbbG_GHN-zKLseKlgWPXaLML6CDuSJwDtZ_x1lWRCAR30hpIWhSSQJj8ovP3A9JTLubaIQ_nZkk/s72-c/s1.reutersmedia.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-712644148047352894</id><published>2013-11-22T07:21:00.000-08:00</published><updated>2013-11-22T07:21:36.775-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Serial Keys"/><category scheme="http://www.blogger.com/atom/ns#" term="Software+Cracks"/><category scheme="http://www.blogger.com/atom/ns#" term="Softwares"/><title type='text'>PC Cleaner Pro 2013+Serial key</title><content type='html'>&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PC Cleaner Pro 2013+Serial key&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPgMehuLVAFdl-wbI2-NFWs1wCXWk0OXwnDlPgDgSxgMxrgP7kpWVMpez0pRD-0zHOkK-BL_xy6Mex-30DBnmjpdoNdfdNEa1wXcNKqm20gppOMRqb5hkUkfwHfoz_z5OkhevxMtwxpNo/s1600/0025d060_medium.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPgMehuLVAFdl-wbI2-NFWs1wCXWk0OXwnDlPgDgSxgMxrgP7kpWVMpez0pRD-0zHOkK-BL_xy6Mex-30DBnmjpdoNdfdNEa1wXcNKqm20gppOMRqb5hkUkfwHfoz_z5OkhevxMtwxpNo/s1600/0025d060_medium.png&quot; height=&quot;206&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://pastebin.com/ayBB9pct&quot; target=&quot;_blank&quot;&gt;Get the key here=====&amp;gt; Click me&lt;/a&gt; &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;(Click and you will be directed to a webpage and copy the serial key from there)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://download.cnet.com/PC-Cleaner-Pro-2013/3000-2094_4-75936388.html&quot; target=&quot;_blank&quot;&gt;Download from here&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;PC Optimizer Pro 2013 is an all in one program to maintain and 
optimize your windows based PC and it doesn&#39;t takes a guru to squeeze 
the maximum out of your system using PC Optimizer Pro 2013. If you are 
one of the people who use their PC on a regular basis then lots of 
system generated files keep gathering up in your PC that are no longer 
being used by your Windows or applications, it takes a single click to 
get rid of this unnecessary clutter. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt; One of the biggest issues 
faced by Windows users is that of system registry which keeps getting 
bulky due to obsolete program information, PC Optimizer Pro 2013 will 
scan your Windows registry and remove all incorrect or obsolete 
information. Also, just a single click will allow you to optimize your 
system settings so your PC is operating at its maximum capacity. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
 Malware can steal your confidential information and make your system 
unstable. PC Optimizer Pro 2013 can scan your system and remove all such
 malware. In short, PC Optimizer Pro 2013 is your one stop for all your 
PC maintenance and optimization needs.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/712644148047352894/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/pc-cleaner-pro-2013serial-key.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/712644148047352894'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/712644148047352894'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/pc-cleaner-pro-2013serial-key.html' title='PC Cleaner Pro 2013+Serial key'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPgMehuLVAFdl-wbI2-NFWs1wCXWk0OXwnDlPgDgSxgMxrgP7kpWVMpez0pRD-0zHOkK-BL_xy6Mex-30DBnmjpdoNdfdNEa1wXcNKqm20gppOMRqb5hkUkfwHfoz_z5OkhevxMtwxpNo/s72-c/0025d060_medium.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-8452096268952738044</id><published>2013-11-22T04:46:00.000-08:00</published><updated>2013-11-22T04:46:00.438-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Google News"/><title type='text'>Google building Spark, a Web-based development tool</title><content type='html'>&lt;h1&gt;
Google building Spark, a Web-based development tool&lt;/h1&gt;
&lt;h1&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;The online programming tool, still in its early stages, is for writing 
Web apps within a Web browser. The open-source tool itself is built with
 Google&#39;s new Dart language. &lt;/span&gt;&lt;/h1&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjdZoUmiQ1G04TNimu5gquhSgAIve2kAq9NBi-UGT1v2ko37hZQtsuD8-jDuZWUcr0NLSWV4nhoDzoCrsn3sWvP60AWDYZgWyzOYc6uRog7cX87XNzbX96bdd5vSHZQy0GcwqlvkpOg8w/s1600/Google-Spark-IDE_610x422.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjdZoUmiQ1G04TNimu5gquhSgAIve2kAq9NBi-UGT1v2ko37hZQtsuD8-jDuZWUcr0NLSWV4nhoDzoCrsn3sWvP60AWDYZgWyzOYc6uRog7cX87XNzbX96bdd5vSHZQy0GcwqlvkpOg8w/s1600/Google-Spark-IDE_610x422.jpg&quot; height=&quot;220&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;image-caption&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Spark is a Google developer tool for writing Web apps from within a Web browser.&lt;/div&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;span class=&quot;image-credit&quot;&gt;
(Credit:
Francois Beaufort)
&lt;/span&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjdZoUmiQ1G04TNimu5gquhSgAIve2kAq9NBi-UGT1v2ko37hZQtsuD8-jDuZWUcr0NLSWV4nhoDzoCrsn3sWvP60AWDYZgWyzOYc6uRog7cX87XNzbX96bdd5vSHZQy0GcwqlvkpOg8w/s1600/Google-Spark-IDE_610x422.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h1&gt;
&lt;br /&gt;&lt;/h1&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Google likes Web apps, but one area where native software remains dominant is programming tools. A &lt;a href=&quot;https://github.com/dart-lang/spark&quot;&gt;Google project called Spark&lt;/a&gt; that came to light Thursday could change that.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
Spark is a Web-based IDE (integrated development environment) that runs 
in a browser for developers writing Chrome apps, according to Google&#39;s &lt;a href=&quot;https://plus.google.com/+FrancoisBeaufort/posts/giSLiGvA4ye&quot;&gt;Francois Beaufort&lt;/a&gt;,
 who tracks Chrome developments closely. That means, among other things,
 that Chromebook coders would have a way to be productive without having
 to move to a Windows,
&lt;a href=&quot;http://www.cnet.com/apple-mac.html&quot;&gt; Mac&lt;/a&gt;, or Linux box.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
&quot;This is still the very beginning,&quot; Beaufort said on Google+. &quot;There&#39;s not much we can do for now.&quot;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
Intriguingly, Spark is built using Dart, Google&#39;s Web programming language that the company hopes will improve upon JavaScript. &lt;a href=&quot;http://news.cnet.com/8301-1023_3-57612080-93/dart-googles-controversial-web-language-turns-1.0/&quot;&gt;Google just released Dart 1.0&lt;/a&gt;
 and now faces the challenge of persuading other browser makers to 
support it, but Dart programmers can use a utility called dart2js to 
convert their software into JavaScript. That means Spark should run on 
any modern browser.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
What&#39;s a Chrome app? In short, it&#39;s a Web app that runs on Chrome. That 
means it can take advantage of Chrome abilities, such as Native Client, 
and be distributed through the Chrome Web Store. It&#39;s a concept that&#39;s 
somewhat antithetical to the cross-platform philosophy of the open Web, 
but it brings some order to a chaotic, fast-changing world.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
Spark isn&#39;t the first such effort. &lt;a href=&quot;http://news.cnet.com/8301-17939_109-10163516-2.html&quot;&gt;Mozilla toyed with a project called Bespin&lt;/a&gt;; other online IDEs include &lt;a href=&quot;https://shiftedit.net/&quot;&gt;Shiftedit&lt;/a&gt; and &lt;a href=&quot;https://c9.io/&quot;&gt;Cloud9&lt;/a&gt;.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/8452096268952738044/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/google-building-spark-web-based.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/8452096268952738044'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/8452096268952738044'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/google-building-spark-web-based.html' title='Google building Spark, a Web-based development tool'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjdZoUmiQ1G04TNimu5gquhSgAIve2kAq9NBi-UGT1v2ko37hZQtsuD8-jDuZWUcr0NLSWV4nhoDzoCrsn3sWvP60AWDYZgWyzOYc6uRog7cX87XNzbX96bdd5vSHZQy0GcwqlvkpOg8w/s72-c/Google-Spark-IDE_610x422.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-5267878365348619116</id><published>2013-11-22T04:01:00.001-08:00</published><updated>2013-11-22T04:03:25.773-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Google News"/><title type='text'>Chrome beta disses plug-ins, speeds tapping on Android</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWHCNetx8stM_Xi4U86da0CG7npOiWmsWW_W6yInkq1XIRzDPnku2et7u310S1hkk8RlyEwLQnW40Ym0nxrQnxmJczL8Uv6Vr8pUbg0K-nN_Xtsp1jVFg6mstH57rFJ_vuA9ENHUjJrYA/s1600/Chrome-logo-large_270x216.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h1&gt;
Chrome beta disses plug-ins, speeds tapping on Android&lt;/h1&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWHCNetx8stM_Xi4U86da0CG7npOiWmsWW_W6yInkq1XIRzDPnku2et7u310S1hkk8RlyEwLQnW40Ym0nxrQnxmJczL8Uv6Vr8pUbg0K-nN_Xtsp1jVFg6mstH57rFJ_vuA9ENHUjJrYA/s1600/Chrome-logo-large_270x216.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWHCNetx8stM_Xi4U86da0CG7npOiWmsWW_W6yInkq1XIRzDPnku2et7u310S1hkk8RlyEwLQnW40Ym0nxrQnxmJczL8Uv6Vr8pUbg0K-nN_Xtsp1jVFg6mstH57rFJ_vuA9ENHUjJrYA/s1600/Chrome-logo-large_270x216.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Google released a beta of Chrome 32 on Thursday, fulfilling a promise to
 block many plug-ins and speeding up some tap operations on Android.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;And Imgur fans will be eager to know that the new release also brings 
support for animated WebP images, a feature already added to Google&#39;s 
image format but that had to &lt;a href=&quot;http://news.cnet.com/8301-1023_3-57594084-93/blink-leaders-reject-animated-webp-images-in-chrome-for-now/&quot;&gt;overcome hurdles before finding a place in Chrome&lt;/a&gt;,
 too. Some advocated for a shift to plain old video, but animated GIFs 
have attained newfound popularity. Google promises smaller file sizes 
with animated WebP as an alternative, said Urvang Joshi, the Google 
programmer who championed animated WebP support for Chrome, in a &lt;a href=&quot;http://blog.chromium.org/2013/11/chrome-32-beta-animated-webp-images-and.html&quot;&gt;blog post Thursday&lt;/a&gt;.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;In September, &lt;a href=&quot;http://news.cnet.com/8301-1023_3-57604242-93/google-begins-barring-browser-plug-ins-from-chrome/&quot;&gt;Google announced that it will ban plug-ins&lt;/a&gt;
 that use the NPAPI technology for interfacing with the browser and 
giving it extra abilities. The ban doesn&#39;t affect Adobe Systems&#39; Flash 
Player, by far the most widely used plug-in, and will only affect 
several other widely used plug-ins after a more graceful phase-out 
period.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;On
&lt;a href=&quot;http://www.cnet.com/android-atlas/&quot;&gt; Android&lt;/a&gt;,
 the Chrome 32 beta ditches a 0.3-second delay that bogged down the 
process of tapping on a link. The delay was necessary to make sure 
people weren&#39;t double-tapping to reformat a Web page for a mobile 
device. The delay is disabled for Web pages that Chrome judges to be 
designed specifically for mobile screens -- another incentive for Web 
developers to adjust to the mobile market.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;The new browser also supports the &lt;a href=&quot;http://www.w3.org/TR/vibration/&quot;&gt;Vibration interface&lt;/a&gt;,
 which lets Web apps buzz your phone the way native apps already can. 
That&#39;s one small step of the laborious process of trying to bring Web 
apps up to parity with those written directly for Android and iOS apps.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;background-color: red;&quot;&gt;All the news published here are from trusted source. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/5267878365348619116/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/chrome-beta-disses-plug-ins-speeds.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/5267878365348619116'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/5267878365348619116'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/chrome-beta-disses-plug-ins-speeds.html' title='Chrome beta disses plug-ins, speeds tapping on Android'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWHCNetx8stM_Xi4U86da0CG7npOiWmsWW_W6yInkq1XIRzDPnku2et7u310S1hkk8RlyEwLQnW40Ym0nxrQnxmJczL8Uv6Vr8pUbg0K-nN_Xtsp1jVFg6mstH57rFJ_vuA9ENHUjJrYA/s72-c/Chrome-logo-large_270x216.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-9110077506074718469</id><published>2013-11-22T04:00:00.000-08:00</published><updated>2013-11-22T04:37:28.160-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Google News"/><title type='text'>Google finishes 2,048-bit security upgrade for Web privacy</title><content type='html'>&lt;h1&gt;
Google finishes 2,048-bit security upgrade for Web privacy&lt;/h1&gt;
&lt;h1&gt;
&amp;nbsp;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDoZ6rQZR39lDOx_IU34ejVXhvPffecrwMVD7wN2KQ3qtcdDERAQ1jO2NfZVvgMn3koeQi95_fYKZF0UKaG_5rbmfs59LVifkZnl8_TAfC-TCipn7B9DZjI5KTxGFuLKgfGa5YLdfABDE/s1600/2048RSA_610x210.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDoZ6rQZR39lDOx_IU34ejVXhvPffecrwMVD7wN2KQ3qtcdDERAQ1jO2NfZVvgMn3koeQi95_fYKZF0UKaG_5rbmfs59LVifkZnl8_TAfC-TCipn7B9DZjI5KTxGFuLKgfGa5YLdfABDE/s1600/2048RSA_610x210.png&quot; height=&quot;136&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/h1&gt;
&lt;h1&gt;
&amp;nbsp;&lt;/h1&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Never again are you going to get a Google Web site whose security 
certificate is protected with comparatively weak 1,024-bit encryption.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
The Net giant has secured all its certificates with &lt;a href=&quot;http://en.wikipedia.org/wiki/RSA_numbers#RSA-2048&quot;&gt;2,048-bit RSA encryption keys&lt;/a&gt; or better, Google security engineer &lt;a href=&quot;http://googleonlinesecurity.blogspot.fr/2013/11/out-with-old-stronger-certificates-with.html&quot;&gt;Dan Dulay said&lt;/a&gt; in a blog post Monday. Certificates are used to set up encrypted communications between a Web server and Web browser.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
That means two things. First, traffic will be harder to decrypt since 
1,024-bit keys aren&#39;t in use at Google anymore. Second, retiring the 
1,024-bit keys means the computing industry can retire the technology 
altogether by declaring such keys untrustworthy.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
Google has been aggressively moving to stronger encryption because of 
U.S. government surveillance by the National Security Agency. According 
to documents leaked by former NSA contractor Edward Snowden, the agency 
gathered bulk data off Internet taps, including unencrypted data sent 
between company data centers on its own network, and actively worked to 
undermine encryption.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
Google said it beat its internal end-of-year deadline for the 2,048-bit 
move. It&#39;s also moved to encrypt its internal data transfer between data
 centers, a move that &lt;a href=&quot;http://news.cnet.com/8301-10811_3-57612805/yahoo-plays-catchup-in-the-encryption-arms-race/&quot;&gt;Yahoo also is making&lt;/a&gt;.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
In other words, the Net&#39;s technology giants are working actively to make surveillance, authorized or not, significantly harder.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixdW7gi3XyD0O3DEexkmTCz1sT-MvZ5H49GWwDK_Fn9zwS1AhoGw8vTChMESL3MBErsnVid_TjE3dhf9fOtD-vj5JjtA6gZ8vbc-HTaELvV3R3R_A06vAVozwo707K6bzCtrNRQo258Os/s1600/Google-Web-encryption_270x216.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixdW7gi3XyD0O3DEexkmTCz1sT-MvZ5H49GWwDK_Fn9zwS1AhoGw8vTChMESL3MBErsnVid_TjE3dhf9fOtD-vj5JjtA6gZ8vbc-HTaELvV3R3R_A06vAVozwo707K6bzCtrNRQo258Os/s1600/Google-Web-encryption_270x216.png&quot; height=&quot;256&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&quot;Worry in Silicon Valley/Puget Sound: furor over NSA will cost billions 
cuz foreign customers fear US companies can&#39;t guarantee security,&quot; &lt;a href=&quot;https://twitter.com/strobetalbott/status/402591268422705152&quot;&gt;tweeted Strobe Talbott&lt;/a&gt;,
 president of analyst firm Brookings Institution, referring to the 
geographic regions where tech powers such as Google, Facebook, Yahoo, 
Microsoft, Twitter, Apple, LinkedIn, and Amazon are located.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
There&#39;s a lot of work to be done yet, though. &lt;a href=&quot;http://news.cnet.com/8301-13578_3-57591179-38/data-meet-spies-the-unfinished-state-of-web-crypto/&quot;&gt;Google also supports a standard called &quot;forward secrecy,&quot;&lt;/a&gt;
 which uses different keys for different sessions so that decrypting a 
single message doesn&#39;t mean previous messages can likewise be decrypted 
using the same key. But many other Net giants don&#39;t support forward 
secrecy -- though &lt;a href=&quot;http://news.cnet.com/8301-13578_3-57591179-38/data-meet-spies-the-unfinished-state-of-web-crypto/&quot;&gt;that&#39;s changing, too&lt;/a&gt;.
&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/9110077506074718469/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/google-finishes-2048-bit-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/9110077506074718469'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/9110077506074718469'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/google-finishes-2048-bit-security.html' title='Google finishes 2,048-bit security upgrade for Web privacy'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDoZ6rQZR39lDOx_IU34ejVXhvPffecrwMVD7wN2KQ3qtcdDERAQ1jO2NfZVvgMn3koeQi95_fYKZF0UKaG_5rbmfs59LVifkZnl8_TAfC-TCipn7B9DZjI5KTxGFuLKgfGa5YLdfABDE/s72-c/2048RSA_610x210.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-1412890004819548605</id><published>2013-11-22T03:50:00.001-08:00</published><updated>2013-11-22T04:37:40.097-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Google News"/><title type='text'>Google pays those who find Android security glitches</title><content type='html'>&lt;h1&gt;
Google pays those who find Android security glitches&lt;/h1&gt;
&lt;h1&gt;
&amp;nbsp;&lt;/h1&gt;
&lt;h1&gt;
&amp;nbsp;&lt;/h1&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTkJtICyvnoJ-ro8z_k1e_lJql2tyl8_cIkhI180cA3c4IoO6Sua0KA2VjxMMq133DTCD-q374Y8ieH-XSvIOMG1Dv5eYFFWsVWGSfwWtvG6mtv1Jrm7bdbb8OCL5i9s2FWqnuDqBsqeI/s1600/20111207_Android_art_001_610x359.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTkJtICyvnoJ-ro8z_k1e_lJql2tyl8_cIkhI180cA3c4IoO6Sua0KA2VjxMMq133DTCD-q374Y8ieH-XSvIOMG1Dv5eYFFWsVWGSfwWtvG6mtv1Jrm7bdbb8OCL5i9s2FWqnuDqBsqeI/s1600/20111207_Android_art_001_610x359.jpg&quot; height=&quot;235&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h1&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;Those who pinpoint vulnerabilities in Google&#39;s mobile operating system 
can earn cash rewards, similar to those paid out for identifying bugs in
 Chrome.&lt;/span&gt;&lt;/h1&gt;
&lt;h1&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h1&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Google has expanded its bug-bounty program to cover vulnerabilities uncovered in Android.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
The program began with Chrome and expanded to &lt;a href=&quot;http://news.cnet.com/8301-30685_3-20021436-264.html&quot;&gt;Google Web sites&lt;/a&gt; and &lt;a href=&quot;http://news.cnet.com/8301-1009_3-57606840-83/google-pays-coders-to-improve-open-source-security/&quot;&gt;other open-source software&lt;/a&gt;
 projects. Under the program, people who find security holes get paid 
bounties. That often equates to a few hundred dollars, but particularly 
skilled attacks can mean big money -- &lt;a href=&quot;http://googlechromereleases.blogspot.fr/2013/11/stable-channel-update_14.html&quot;&gt;$50,000 last week for one expert who goes by the name Pinkie Pie&lt;/a&gt;, for example.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
The broader expansion, called the Patch Reward Program, now includes
&lt;a href=&quot;http://www.cnet.com/android-atlas/&quot;&gt; Android&lt;/a&gt;, Google security team member Michal Zalewski said in a &lt;a href=&quot;http://googleonlinesecurity.blogspot.com/2013/11/even-more-patch-rewards.html&quot;&gt;blog post Monday&lt;/a&gt;.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
The program also includes three widely used Web server packages: Apache&#39;s http, Nginx, and Lighttpd, Zalewski said.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h1&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h1&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/1412890004819548605/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/google-pays-those-who-find-android.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/1412890004819548605'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/1412890004819548605'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/google-pays-those-who-find-android.html' title='Google pays those who find Android security glitches'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTkJtICyvnoJ-ro8z_k1e_lJql2tyl8_cIkhI180cA3c4IoO6Sua0KA2VjxMMq133DTCD-q374Y8ieH-XSvIOMG1Dv5eYFFWsVWGSfwWtvG6mtv1Jrm7bdbb8OCL5i9s2FWqnuDqBsqeI/s72-c/20111207_Android_art_001_610x359.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-400098653366005154</id><published>2013-11-22T03:45:00.001-08:00</published><updated>2013-11-22T03:46:08.691-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>Battle brews as tech companies attempt to fend off NSA hacking</title><content type='html'>&lt;h1&gt;
Battle brews as tech companies attempt to fend off NSA hacking&lt;/h1&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxRDJ9PcTOFEcfhIAgbwEiaHYaieSA4xgveECuu3nHugBJD661fcsJhIMkGetzl-aC_5vy-C99r4Cq_4xevsVqxvReRpCYKgv0ohcoIDfpVJNwFqU1PyI7O2idVUJZYVhbPzdMnRI-TOE/s1600/NSA_logo.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxRDJ9PcTOFEcfhIAgbwEiaHYaieSA4xgveECuu3nHugBJD661fcsJhIMkGetzl-aC_5vy-C99r4Cq_4xevsVqxvReRpCYKgv0ohcoIDfpVJNwFqU1PyI7O2idVUJZYVhbPzdMnRI-TOE/s1600/NSA_logo.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;The NSA allegedly&lt;a href=&quot;http://news.cnet.com/8301-1023_3-57610082-93/the-nsa-has-a-smiley-face-problem/&quot; title=&quot;The NSA has a smiley face problem -- Wednesday, Oct 30, 2013&quot;&gt; gathered millions of records from Google and Yahoo data centers&lt;/a&gt; around the world, but soon, the agency might have a much harder time trying to collect this type of data. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Google, Yahoo, Microsoft, Apple, and other prominent technology 
companies are investing heavily in stronger, 2048-bit encryption. Due to
 computing power constraints, it&#39;s expected to be more than a decade 
before this type of encryption can be easily overcome.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Google, one of the leaders in the effort, announced in May that it would &lt;a href=&quot;http://news.cnet.com/8301-13578_3-57591560-38/facebooks-outmoded-web-crypto-opens-door-to-nsa-spying/&quot; title=&quot;Facebook&#39;s outmoded Web crypto opens door to NSA spying -- Friday, Jun 28, 2013&quot;&gt;switch over to 2,048-bit encryption keys&lt;/a&gt; by the end of 2013. Yahoo recently &lt;a href=&quot;http://www.bloomberg.com/news/2013-11-15/silicon-valley-nerds-seek-revenge-on-nsa-spies-with-super-coding.html&quot;&gt;confirmed to Bloomberg&lt;/a&gt;,
 which spoke with several tech companies that are investing in new 
encryption, that it will make 2048-bit encryption standard by January 
2014 for all its Mail users. Facebook also plans to move to 2048-bit 
encryption, a spokeswoman told Bloomberg, and will roll out &quot;perfect 
forward secrecy,&quot; a feature that prevents snoopers from accessing user 
data even if they can access the company&#39;s security codes.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Microsoft and Apple are also reportedly ramping up their data-security efforts.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;The technology companies&#39; renewed interest in data security and encryption comes after several reports have suggested that the NSA has been accessing their data
 and using it for spying purposes. Those firms have gone on the record 
saying they comply with legal requests where appropriate, but are doing 
everything they can to keep user data safe. The investment in 2048-bit 
encryption is the next step in protecting the privacy of users. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Still, encryption is just one small piece of a broader puzzle the technology companies have yet to solve.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;The NSA has the ability to overcome a wide array of security 
protocols. Last month, in fact, James Clapper, the director of national 
intelligence, said that the US employs &quot;every intelligence tool 
available&quot; to cull data from national security threats, according to 
Bloomberg. Whether those efforts are applied to technology company 
servers has been debated, though leaks from former NSA contractor Edward
 Snowden and others suggest they are. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Even so, the improved encryption efforts could lengthen the time at 
which it takes the NSA and other spying agencies around the world to 
access user information. And that&#39;s at least something.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Source:Trusted Source. &lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/400098653366005154/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/battle-brews-as-tech-companies-attempt.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/400098653366005154'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/400098653366005154'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/battle-brews-as-tech-companies-attempt.html' title='Battle brews as tech companies attempt to fend off NSA hacking'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxRDJ9PcTOFEcfhIAgbwEiaHYaieSA4xgveECuu3nHugBJD661fcsJhIMkGetzl-aC_5vy-C99r4Cq_4xevsVqxvReRpCYKgv0ohcoIDfpVJNwFqU1PyI7O2idVUJZYVhbPzdMnRI-TOE/s72-c/NSA_logo.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-1092834439519687433</id><published>2013-11-22T03:41:00.004-08:00</published><updated>2013-11-22T03:41:53.515-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>Senators criticize NSA snooping as unnecessary to US security</title><content type='html'>&lt;h1&gt;
Senators criticize NSA snooping as unnecessary to US security&lt;/h1&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoXpp5ZSfnNVyh8eCkhlSER5MKj3vxEWRZkPASdpZFZZH1L60TYUDucJm7Mv45cJWslMmxB2RP6_8l4FZe6hCmEE-URDoztNd9sdmkJmDmOjSaskqtSeuuChauKviZ_gg-EZo29sVi4cw/s1600/national-security-agency-seal_610x407_610x407_3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoXpp5ZSfnNVyh8eCkhlSER5MKj3vxEWRZkPASdpZFZZH1L60TYUDucJm7Mv45cJWslMmxB2RP6_8l4FZe6hCmEE-URDoztNd9sdmkJmDmOjSaskqtSeuuChauKviZ_gg-EZo29sVi4cw/s1600/national-security-agency-seal_610x407_610x407_3.jpg&quot; height=&quot;266&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Three US senators with access to confidential NSA information don&#39;t 
see the agency&#39;s data-gathering methods as necessary to ensure US 
security.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;On Tuesday, Senators Mark Udall (D-Colorado), Ron Wyden (D-Oregon), and Martin Heinrich (D-New Mexico) filed an amicus brief
 on behalf of a lawsuit filed by several organizations that claims the 
National Security Agency&#39;s bulk records collection violated their 
constitutional rights. In the legal brief, the three senators expressed 
the opinion that the information gathered through the NSA could have 
been obtained through less-intrusive ways.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&quot;In recent years the balance between protecting our liberties and 
ensuring our security has become fundamentally broken,&quot; Udall said in a 
statement. &quot;The dragnet collection of millions of innocent Americans&#39; private phone records is a clear threat to our constitutional rights, yet we have seen no evidence that this exceedingly intrusive monitoring has provided any uniquely valuable intelligence.&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;The US has other &quot;authorities&quot; available through which it can access 
the phone records of suspected terrorists or people in contact with 
them, the senators said in the brief. Those other authorities could have
 been used to gather the same information that the government otherwise 
obtained for a few counterterrorism cases, they added.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;The senators also expressed concerns that the government&#39;s interpretation of Section 215 of the Foreign Intelligence Surveillance Act (FISA) could be extended to obtain other data on US citizens, including financial and medical records.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;&quot;Because the government&#39;s call-records program needlessly intrudes 
upon the privacy rights of hundreds of millions of Americans, [the 
senators] believe the bulk collection of these phone records should be 
ended,&quot; the brief said.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;The opinion of the three senators runs counter to the NSA&#39;s claim 
that its data-gathering methods are justified as the only way to protect
 the nation from terrorist attacks. Congressional members have been 
speaking out increasingly against the government&#39;s bulk records 
collection as a violation of US citizens&#39; privacy.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: white;&quot;&gt;Along with Richard Blumenthal (D-Connecticutt) and Rand Paul (R-Kentucky), Wyden and Udall have introduced a bill known as the Intelligence Oversight and Surveillance Reform Act that would amend certain sections of FISA to prohibit the bulk collection of Americans&#39; phone records.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/1092834439519687433/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/senators-criticize-nsa-snooping-as.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/1092834439519687433'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/1092834439519687433'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/senators-criticize-nsa-snooping-as.html' title='Senators criticize NSA snooping as unnecessary to US security'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoXpp5ZSfnNVyh8eCkhlSER5MKj3vxEWRZkPASdpZFZZH1L60TYUDucJm7Mv45cJWslMmxB2RP6_8l4FZe6hCmEE-URDoztNd9sdmkJmDmOjSaskqtSeuuChauKviZ_gg-EZo29sVi4cw/s72-c/national-security-agency-seal_610x407_610x407_3.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2518131517116494666.post-1360773629041961175</id><published>2013-11-22T03:30:00.000-08:00</published><updated>2013-11-22T03:51:12.529-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>FBI Agent: We&#39;ve Dismantled The Leaders Of Anonymous</title><content type='html'>&lt;br /&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;h1 class=&quot;title-news&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #111111; font-family: Arial, &#39;Helvetica Neue&#39;, Helvetica, sans-serif; font-size: 32px; line-height: 36px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
FBI Agent: We&#39;ve Dismantled The Leaders Of Anonymous&lt;/h1&gt;
&lt;h1 class=&quot;title-news&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #111111; font-family: Arial, &#39;Helvetica Neue&#39;, Helvetica, sans-serif; font-size: 32px; line-height: 36px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiB9zAseXQv3KkYWjbqvf0g9iU2Fce6fwhDl18QI7dPEonC7JaX-eFcfn1yyzdM66_SL1dWwf_6bgMen7TxObb6XcP_UHUehYT0zeCw4VW3MSnYLvtDfYSv9iaB4shWY4J2IHLJeuSV8ws/s1600/s-AUSTIN-BERGLAS-300x200.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiB9zAseXQv3KkYWjbqvf0g9iU2Fce6fwhDl18QI7dPEonC7JaX-eFcfn1yyzdM66_SL1dWwf_6bgMen7TxObb6XcP_UHUehYT0zeCw4VW3MSnYLvtDfYSv9iaB4shWY4J2IHLJeuSV8ws/s1600/s-AUSTIN-BERGLAS-300x200.jpg&quot; /&gt;&lt;/a&gt;
&amp;nbsp;&lt;/h1&gt;
&lt;div style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiB9zAseXQv3KkYWjbqvf0g9iU2Fce6fwhDl18QI7dPEonC7JaX-eFcfn1yyzdM66_SL1dWwf_6bgMen7TxObb6XcP_UHUehYT0zeCw4VW3MSnYLvtDfYSv9iaB4shWY4J2IHLJeuSV8ws/s1600/s-AUSTIN-BERGLAS-300x200.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;background-color: red;&quot;&gt;&lt;i&gt;Austin P. Berglas, FBI assistant special agent.&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;The hacker collective Anonymous has not produced as many high-profile cyber attacks as it once did, a drop-off that can be directly attributed to the arrests of the group&#39;s core members, an FBI official told The Huffington Post this week.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;Starting in late 2010, Anonymous captured worldwide attention through a series of attacks against U.S. companies and government agencies, stealing data and defacing or crashing websites.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;But&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://news.cnet.com/8301-13506_3-57391349-17/lulzsec-arrests-deal-blow-to-hacker-group/&quot; style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0088c3; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot; target=&quot;_hplink&quot;&gt;the arrests last year of five members of Lulz Security&lt;/a&gt;&lt;span style=&quot;background-color: white; color: #333333;&quot;&gt;, &lt;/span&gt;&lt;span style=&quot;background-color: black; color: white;&quot;&gt;an influential splinter group of hackers, had a &quot;huge deterrent effect&quot; on Anonymous by creating an &quot;added layer of distrust&quot; within the hacking group, according to Austin P. Berglas, assistant special agent in charge of the FBI&#39;s cyber division in New York.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;“All of these guys [arrested] were major players in the Anonymous movement, and a lot of people looked to them just because of what they did,” Berglas said in an interview with HuffPost.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;The 2012 arrests relied on the help of a key informant, Hector Monsegur, aka &quot;Sabu,&quot; who was caught and then cooperated with the FBI. The fear that one of their own could turn them in has sowed distrust within the hacking collective, according to Berglas.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;&quot;The movement is still there, and they&#39;re still yacking on Twitter and posting things, but you don&#39;t hear about these guys coming forward with those large breaches,&quot; he said. &quot;It&#39;s just not happening, and that&#39;s because of the dismantlement of the largest players.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;Gabriella Coleman, a professor at McGill University who studies Anonymous, said there was &quot;no doubt&quot; the arrests dealt a major blow to &quot;a central node of activity&quot; within the group. But Anonymous is still very much alive, she said.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;&quot;They could easily emerge again as a force to contend with,&quot; she told HuffPost in an email.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;The arrests of members of Anonymous last year were among several highlights to come out of the FBI&#39;s cyber division in New York. (The five core members of Lulz Security have pleaded guilty.) In another case, the FBI in New York led an investigation that resulted in the arrests earlier this year of&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.huffingtonpost.com/2013/01/23/gozi-virus-fbi_n_2535282.html&quot; style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0088c3; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot; target=&quot;_hplink&quot;&gt;three alleged operators of the Gozi virus&lt;/a&gt;&lt;span style=&quot;background-color: black; color: white;&quot;&gt;, which infected at least 1 million computers and stole millions of dollars from banks around the world.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;A former Army captain, 41-year-old Berglas leads the FBI&#39;s cyber division in New York, one of the busiest of the FBI&#39;s 56 field offices. His office overlooks the skyline of lower Manhattan, the center of the financial world and a frequent target of hackers. Last month, a Russian man was&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://dealbook.nytimes.com/2013/07/25/wall-streets-exposure-to-hacking-laid-bare/&quot; style=&quot;background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0088c3; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot; target=&quot;_hplink&quot;&gt;charged with breaking into the servers of the Nasdaq stock exchange&lt;/a&gt;&lt;span style=&quot;background-color: white; color: #333333;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: black; color: white;&quot;&gt;and deleting, changing and stealing data.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;The cyber division in New York is divided into five teams of investigators. One unit is tasked with getting digital evidence off cell phones, cameras, computers and tablets to support investigations into a wide range cases, from organized crime to computer hacking to child pornography. Berglas said the investigators for the Computer Analysis Response Team have become increasingly adept at breaking encryption methods used by suspects to conceal the contents of computer files.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;The other four teams divide their attention to cybercrime based on the hackers&#39; country of origin. Since most hackers attack U.S. computers from overseas, the FBI often works with law enforcement in other countries, Berglas said. Sometimes, investigators find evidence of hackers from several different countries inside the network of a single U.S. company.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;&quot;We call it the dirty pond environment,&quot; he said. &quot;You think it might just be one actor responsible for the intrusion, and once you get in and start looking at the company there&#39;s remnants of a whole host of actors -- from week-old activity to multiple years they&#39;ve been inside some companies and they just don’t know about it.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;Cybercriminals have a variety of motives, but their methods are often the same. Most break into computer systems by tricking people to click on malicious links in emails that appear to come from trusted sources, a technique known as &quot;spear phishing,&quot; Berglas said.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;&quot;It’s the number one most common intrusion vector we see in any type of attack,” Berglas said. &quot;Major financial companies spend millions and millions of dollars on security, and all [hackers] have to do is get someone with credentials to click on a spear-phishing site and that’s how they get in.”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;Cybercriminals have become adept at hiding their IP addresses -- the string of numbers assigned to individual computers -- to disguise their locations from law enforcement. But eventually, even the most skilled hackers get sloppy, Berglas said.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;Hector Monsegur, aka &quot;Sabu,&quot; the FBI informant whose cooperation led to the arrests of LulzSec last year, left his IP address exposed. The error allowed investigators to track his location to an apartment in Manhattan&#39;s Lower East Side and eventually led to his arrest.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;It&#39;s that type of misstep that the FBI is looking for.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;span style=&quot;background-color: black; color: white;&quot;&gt;&quot;It’s easy to sit behind a computer and think you&#39;re anonymous and do these illegal types of activity, whether it’s hacking into a company or trading child pornography or buying and selling stolen identities,&quot; he said. &quot;But it’s just a matter of time before these criminals make mistakes and we capture them. All it takes is just one time.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;!-- Blogger automated replacement: &quot;https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2F3.bp.blogspot.com%2F-9AIyt24CyBU%2FUo8_4fHnP2I%2FAAAAAAAAAOI%2FjZVxd_DFfds%2Fs1600%2Fs-AUSTIN-BERGLAS-300x200.jpg&amp;amp;container=blogger&amp;amp;gadget=a&amp;amp;rewriteMime=image%2F*&quot; with &quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiB9zAseXQv3KkYWjbqvf0g9iU2Fce6fwhDl18QI7dPEonC7JaX-eFcfn1yyzdM66_SL1dWwf_6bgMen7TxObb6XcP_UHUehYT0zeCw4VW3MSnYLvtDfYSv9iaB4shWY4J2IHLJeuSV8ws/s1600/s-AUSTIN-BERGLAS-300x200.jpg&quot; --&gt;</content><link rel='replies' type='application/atom+xml' href='http://followanony.blogspot.com/feeds/1360773629041961175/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://followanony.blogspot.com/2013/11/fbi-agent-weve-dismantled-leaders-of.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/1360773629041961175'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2518131517116494666/posts/default/1360773629041961175'/><link rel='alternate' type='text/html' href='http://followanony.blogspot.com/2013/11/fbi-agent-weve-dismantled-leaders-of.html' title='FBI Agent: We&#39;ve Dismantled The Leaders Of Anonymous'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/14051387477932949870</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiB9zAseXQv3KkYWjbqvf0g9iU2Fce6fwhDl18QI7dPEonC7JaX-eFcfn1yyzdM66_SL1dWwf_6bgMen7TxObb6XcP_UHUehYT0zeCw4VW3MSnYLvtDfYSv9iaB4shWY4J2IHLJeuSV8ws/s72-c/s-AUSTIN-BERGLAS-300x200.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>