This is default featured post 1 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.
This is default featured post 2 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.
This is default featured post 3 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.
This is default featured post 4 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.
This is default featured post 5 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.
Tuesday, May 31, 2011
Facebook vs. Twitter
I’m not at all thinking about quitting Twitter or stopping to recommend it. Twitter is a valuable social media tool that I wouldn’t want to be without. There are, however, many reasons I prefer Facebook over Twitter, and have switched my primary social media site from Twitter to Facebook.
Easier for Group Discussion - Facebook discussions and neatly threaded and hashtags are unnecessary.
Rich Functionality - Facebook supports applications, events and instant messaging. Facebook also enables photo, video, link, page and event sharing.
More Powerful Lists - Create as many Facebook lists as you like and use them to manage both communication and privacy.
Better Private Messaging - No automated direct messaging on Facebook. Therefore, your private messages and updates are more manageable.
Less Spam Abuse - Facebook fights spam more effectively than Twitter.
News Feed Optimized for Relevance - Facebook uses edgerank to prioritize our Top News feeds. Optionally, we can choose to view Twitter-like Most Recent News, as well.
True Networking Site - We can create deep online connections with our friends, and we also discover friends-of-friends. Facebook messaging is a good alternative to email, too.
Website Traffic - In 2009 when I focused on Twitter, I received 7,834 visits from Twitter with average time on site of 2:10 minutes. Not bad. However, in 2010 when I turned my focus to Facebook, I received 5,134 visits with average time on site of 3:07 minutes and a larger number of blog comments. Facebook visitors tend to engage more than do Twitter visitors. That’s better website traffic.
Less Incentivization - Twitter has become very much about follower counts. People typically follow with the expectation of being followed back and unfollow if that doesn’t happen. Fans and friends on Facebook are much more authentic.
Real People - Facebook is mostly used by real people, while Twitter is mostly operated by robotic software called bots.
No 140 Limit - Facebook allows more than 140 characters per status update, more than a 160 per bio, and more than one website link per account.
Much Greater Membership - I’m more able to find the people with whom I want to connect on Facebook than on Twitter.
Members Visit More Often - Facebook members are said to log into Facebook more often than Twitter members into Twitter.
Easily Manage Multiple Business Accounts - I can manage multiple Facebook business pages without logging out and back in, and without using third-party desktop clients.
Business Pages are Mini-Websites - Facebook business pages are mini-websites with a landing page and additional pages.
Off-site Integration - Like buttons and like boxes extend the reach of Facebook to blogs and other websites outside the Facebook domain.
Source : http://online-social-networking.com/tag/facebook
Facebook vs. Twitter
Here are 16 reasons I like Facebook more than I like Twitter:Source : http://online-social-networking.com/tag/facebook
FACEBOOK FOR BUSINESS TIP: Migrate your ‘friends’ into ‘likes’
I often get asked how to grow numbers – fans and ‘likes’ – on your Facebook Page. There are a slew of techniques you should use on an ongoing basis (for example, well-placed social media icons on your website/blog, in your email signature, and on your marketing materials, to name a few), but one that stands out to me the most is growing your numbers through your personal profile first. Use your personal Facebook profile as a bridge to your Facebook Page.
I hear a lot of people talk about their hesitation to open up their personal accounts to people they don’t know. Listen, if you’re on Facebook to do business, it’s important to understand that your target market does not want to be approached for business first. In fact, I dare say that no one wants to be approached for business first.
People aren’t coming to Facebook to meet their accountant. They’re coming to Facebook to connect, reconnect, and engage with others. They might meet a person who happens to be an accountant and then decide to do business with them, but most likely, potential clients that find business connections have done so because they connected on a personal level first.
This is the crux of social media – the ability to connect and relate to one another first and foremost. Those similarities and interests bring us together and business leads are developed through this organic process.
There are no shortcuts or ways around it. You can’t automate your presence and drive business leads to your site. You either get it or you don’t, but one of the main reason most corporate brands don’t do well using social media is because they don’t have a personality.
My suggestion: clean up your personal profile. Get rid of anything that you think is too much information: pictures of your kids (if you deem this too much information), negative personal details about your life (going through a divorce, you hate your ex-husband’s new girlfriend, etc.) and include bits and pieces of the real you (not the “you” with your skirt over your head drunk in Barcelona), but the essence of who you are: male or female, books and movies you like, and music you listen to – for starters.
Add people as friends to your personal account first. Get to know them, compliment them on their site, and ask them a question about themselves. Then, once a month send out a blanket invitation to all of your friends to invite them to your Page. Don’t pounce on them when they first become your friends. Give it time. Be patient.
When I’m working with a new client, I explain this slow process to the clients so they understand I am not a fairy godmother with a magic wand. This process takes time.
Before Pages existed, I built up my personal profile to include pictures, videos, and descriptions of my interests and activities – my garden, my dog, my kids, my love of beer, my neighborhood. It’s easy to get a sense of who I am when you take a look at my personal profile.
I make it a point to wish people a happy birthday and comment back when people post to my Wall. This is what I mean by engagement. Social media is not the new fangled way to make money, but rather, a new fangled way to meet people.
When Pages became available and after I created my own, I sent out an invitation to my friends list through my Facebook profile and had 400 fans in one day. That happened because I established a relationship with them first – built up some trust before asking for their click.
Asking people to skip over your personal profile and proceed straight to your Page doesn’t work as well. I’ve seen many folks send out return messages after I’ve sent them a friend request telling me that they have too many friends and can’t take on anymore, but to join them over on their Page.
Uh… I don’t think so.
I want to get to know you as a person before I join you over on your Page. I don’t necessarily want to know about your latest business venture but I would like to know basic personal details about you if I’m friending you on Facebook.
And I realize Facebook has a 5,000 friend limit for personal accounts. The notion is that anything over 5000 should naturally migrate over to your Page. And yet, it doesn’t always work that way. The numbers don’t add up as well when people skip over your personal profile before being introduced to the “business you”.
I’m not suggesting opening up the flood gates and letting any ol’ person in – rather, develop a criterion, a standard of who you want to friend. If you’re a brick and mortar business in New Jersey, find your city’s Facebook Page. Assuming they have one, friend those people on that Page. Most likely, they are New Jersey residents and/or have ties to the community. You can’t add them directly to your Page, but you can request their friendship and add them on through your personal profile. Eventually you can migrate them over to your Page.
Use your personal profile to grow your Page. Look at your personal profile as an addendum to your professional Page. Infuse your online presence with your personality and business leads will be generated through these efforts.
Remember, automation cannot do this for you. There are no shortcuts in social media. Take your time. Social media is a 401k plan and not a lottery ticket.
For more ways to grow your numbers on your Facebook Page check out: http://www.socialmediaexaminer.com/10-ways-to-grow-your-facebook-page-following/.
I hear a lot of people talk about their hesitation to open up their personal accounts to people they don’t know. Listen, if you’re on Facebook to do business, it’s important to understand that your target market does not want to be approached for business first. In fact, I dare say that no one wants to be approached for business first.
People aren’t coming to Facebook to meet their accountant. They’re coming to Facebook to connect, reconnect, and engage with others. They might meet a person who happens to be an accountant and then decide to do business with them, but most likely, potential clients that find business connections have done so because they connected on a personal level first.
This is the crux of social media – the ability to connect and relate to one another first and foremost. Those similarities and interests bring us together and business leads are developed through this organic process.
There are no shortcuts or ways around it. You can’t automate your presence and drive business leads to your site. You either get it or you don’t, but one of the main reason most corporate brands don’t do well using social media is because they don’t have a personality.
My suggestion: clean up your personal profile. Get rid of anything that you think is too much information: pictures of your kids (if you deem this too much information), negative personal details about your life (going through a divorce, you hate your ex-husband’s new girlfriend, etc.) and include bits and pieces of the real you (not the “you” with your skirt over your head drunk in Barcelona), but the essence of who you are: male or female, books and movies you like, and music you listen to – for starters.
Add people as friends to your personal account first. Get to know them, compliment them on their site, and ask them a question about themselves. Then, once a month send out a blanket invitation to all of your friends to invite them to your Page. Don’t pounce on them when they first become your friends. Give it time. Be patient.
When I’m working with a new client, I explain this slow process to the clients so they understand I am not a fairy godmother with a magic wand. This process takes time.
Before Pages existed, I built up my personal profile to include pictures, videos, and descriptions of my interests and activities – my garden, my dog, my kids, my love of beer, my neighborhood. It’s easy to get a sense of who I am when you take a look at my personal profile.
I make it a point to wish people a happy birthday and comment back when people post to my Wall. This is what I mean by engagement. Social media is not the new fangled way to make money, but rather, a new fangled way to meet people.
When Pages became available and after I created my own, I sent out an invitation to my friends list through my Facebook profile and had 400 fans in one day. That happened because I established a relationship with them first – built up some trust before asking for their click.
Asking people to skip over your personal profile and proceed straight to your Page doesn’t work as well. I’ve seen many folks send out return messages after I’ve sent them a friend request telling me that they have too many friends and can’t take on anymore, but to join them over on their Page.
Uh… I don’t think so.
I want to get to know you as a person before I join you over on your Page. I don’t necessarily want to know about your latest business venture but I would like to know basic personal details about you if I’m friending you on Facebook.
And I realize Facebook has a 5,000 friend limit for personal accounts. The notion is that anything over 5000 should naturally migrate over to your Page. And yet, it doesn’t always work that way. The numbers don’t add up as well when people skip over your personal profile before being introduced to the “business you”.
I’m not suggesting opening up the flood gates and letting any ol’ person in – rather, develop a criterion, a standard of who you want to friend. If you’re a brick and mortar business in New Jersey, find your city’s Facebook Page. Assuming they have one, friend those people on that Page. Most likely, they are New Jersey residents and/or have ties to the community. You can’t add them directly to your Page, but you can request their friendship and add them on through your personal profile. Eventually you can migrate them over to your Page.
Use your personal profile to grow your Page. Look at your personal profile as an addendum to your professional Page. Infuse your online presence with your personality and business leads will be generated through these efforts.
Remember, automation cannot do this for you. There are no shortcuts in social media. Take your time. Social media is a 401k plan and not a lottery ticket.
For more ways to grow your numbers on your Facebook Page check out: http://www.socialmediaexaminer.com/10-ways-to-grow-your-facebook-page-following/.
Facebook Friends - 5 Easy Steps to Grow Your Friends List on Facebook
Social media is effective, it works and does not cost anything. So, definitely worth investing some time and efforts into it. The most popular site on the whole world wide web is Facebook.
People on a Facebook are dealing with people - so its worth knowing that simple ways of communication, like rumours, fun, photos, links, etc. work very well. There are a few simple steps on how to grow your Facebook friends list in a simple and fast way.
STEP ONE: create a personal profile of who you want your Facebook friends to see - a lawyer, consultant, property professional or simply a joyful and positive person. If you want to be seen as a professional, from time to time provide your Facebook friends with quality information, show them how they would benefit from dealing with you.
You might want to post pictures of family, to tell everyone what a fantastic weekend away you had. People will identify with you and will want to know more. Be nice, consistent, proactive and responsive, comment on your Facebook friends pictures, on their posts, links and photos.
STEP TWO: Identify Your target market or niche and join different pages and groups within that target market or group - it might be geographical, might be gender oriented, etc. Search for groups that have specific words in them: interior, website, model agency, etc.
As I live in Ireland, I will give a few examples: Ashford castle fans page, Dramoland castle fan page - those people most likely visited place at least once and guess what - those are expensive places to stay, so visitors might have money for your product or service as well. Blackrock town near Dublin has even 2 groups created. There are some fun groups, like "I'm from Ireland, but more importantly I am from Dublin" - most of people in this group are from Dublin - 32.000 members and growing - what a fantastic place to get new Facebook friends and followers that live in the neighbourhood.
STEP THREE: leave posts on those groups and pages walls. Do not advertise, write something interesting and catchy, then people will get interested in you, will go to your profile and will add you as their Facebook friend, also they will look through your profile, will visit your website - this is a free traffic for your business.
STEP FOUR: Join as many groups as you can. You can be a member of 300 groups and 300 pages on Facebook. Alternatively you can also visit your target groups and pages, look through people's profiles and add them as a friend. That is effective, but more time consuming.
STEP FIVE: Interact with your new friends. Add a personal welcome message once they join you as your new Facebook friend on the site. Send an email telling them what your interests are. Look through their profile and wall and make comments on their posts or links.
Facebook is currently No.1 website on the internet in most countries with Google being the most popular search engine. So, best of luck with growing your Facebook friends list - a great potential in promoting your business through this powerful social media site. Have fun and enjoy!
People on a Facebook are dealing with people - so its worth knowing that simple ways of communication, like rumours, fun, photos, links, etc. work very well. There are a few simple steps on how to grow your Facebook friends list in a simple and fast way.
STEP ONE: create a personal profile of who you want your Facebook friends to see - a lawyer, consultant, property professional or simply a joyful and positive person. If you want to be seen as a professional, from time to time provide your Facebook friends with quality information, show them how they would benefit from dealing with you.
You might want to post pictures of family, to tell everyone what a fantastic weekend away you had. People will identify with you and will want to know more. Be nice, consistent, proactive and responsive, comment on your Facebook friends pictures, on their posts, links and photos.
STEP TWO: Identify Your target market or niche and join different pages and groups within that target market or group - it might be geographical, might be gender oriented, etc. Search for groups that have specific words in them: interior, website, model agency, etc.
As I live in Ireland, I will give a few examples: Ashford castle fans page, Dramoland castle fan page - those people most likely visited place at least once and guess what - those are expensive places to stay, so visitors might have money for your product or service as well. Blackrock town near Dublin has even 2 groups created. There are some fun groups, like "I'm from Ireland, but more importantly I am from Dublin" - most of people in this group are from Dublin - 32.000 members and growing - what a fantastic place to get new Facebook friends and followers that live in the neighbourhood.
STEP THREE: leave posts on those groups and pages walls. Do not advertise, write something interesting and catchy, then people will get interested in you, will go to your profile and will add you as their Facebook friend, also they will look through your profile, will visit your website - this is a free traffic for your business.
STEP FOUR: Join as many groups as you can. You can be a member of 300 groups and 300 pages on Facebook. Alternatively you can also visit your target groups and pages, look through people's profiles and add them as a friend. That is effective, but more time consuming.
STEP FIVE: Interact with your new friends. Add a personal welcome message once they join you as your new Facebook friend on the site. Send an email telling them what your interests are. Look through their profile and wall and make comments on their posts or links.
Facebook is currently No.1 website on the internet in most countries with Google being the most popular search engine. So, best of luck with growing your Facebook friends list - a great potential in promoting your business through this powerful social media site. Have fun and enjoy!
Article Source: http://EzineArticles.com/3923932
Transparent Clear Snap On Crystal Hard Cover Case for Apple Ipod Touch 2nd 3rd GEN 2G/3G 8GB, 16GB, 32GB, 64GB
- Brand new non-OEM. Durable clear hard plastic material.
- Custom made to fit your iPod perfectly. Easy access to all buttons and features.
- Plug your charger, cable or headset without removing the case.
- Easy installation, just snap on your ipod without any tools.
- Prevents damage to your iPod from objects in your pockets or purse. iPod not included. Does not fit
Source : http://www.amazon.com/Transparent-Clear-Crystal-Cover-Apple/dp/B00302IK2K%3FSubscriptionId%3DAKIAIWLKATVOKF2A6B2A%26tag%3Ddigitalcam0f6-20%26linkCode%3Dxm2%26camp%3D2025%26creative%3D165953%26creativeASIN%3DB00302IK2K
Sunday, May 29, 2011
Fujitsu did not want to lose
Johannesburg - The market for computer games andmultimedia segments in Indonesia is growing. A row of big players in this segment is fromDell's Alienware, Asus ROG, or the Toshiba Qosmio. But the Japanese vendors Fujitsu did not want to lose.
After some time did not bring gaming and multimedia laptop, this year they tried to attackthis market in Indonesia. This product was named Fujitsu NH751.
Indeed this is the only type of Fujitsu laptop gaming and multimedia this year. Apparentlythey were a bit unrealistic in the laptop market to pick up the ball game, which grow only inhigh end segment.
"For gamers would prefer a desktop than a laptop to satisfy their hobby. But in Indonesia,the gaming market is growing, and we are very confident to go in it," said Edmund Lim,Product Marketing Manager for Fujitsu, as the Media Clinic on Thursday (05/26/2011) atPacific Place.
Such as gaming and other multimedia laptops, NH751 has a screen size 17 inch screencapable of displaying full HD. Laptop screen is equipped with LED backlit technology, with300nits brightness very comfortable in the eye.
This product is already available in the market at a price of USD 1898. Here are some otherexcellent features:
The Intel Core i7,
Middle-class graphics with Nvidia Optimus
HD entertainment, blu-ray RW with HDMI out
Audio DTS 5.1 audio solution
Support for dual hard drives
Source : http://infomartion4u.blogspot.com/2011/05/fujitsu-did-not-want-to-lose.html
After some time did not bring gaming and multimedia laptop, this year they tried to attackthis market in Indonesia. This product was named Fujitsu NH751.
Indeed this is the only type of Fujitsu laptop gaming and multimedia this year. Apparentlythey were a bit unrealistic in the laptop market to pick up the ball game, which grow only inhigh end segment.
"For gamers would prefer a desktop than a laptop to satisfy their hobby. But in Indonesia,the gaming market is growing, and we are very confident to go in it," said Edmund Lim,Product Marketing Manager for Fujitsu, as the Media Clinic on Thursday (05/26/2011) atPacific Place.
Such as gaming and other multimedia laptops, NH751 has a screen size 17 inch screencapable of displaying full HD. Laptop screen is equipped with LED backlit technology, with300nits brightness very comfortable in the eye.
This product is already available in the market at a price of USD 1898. Here are some otherexcellent features:
The Intel Core i7,
Middle-class graphics with Nvidia Optimus
HD entertainment, blu-ray RW with HDMI out
Audio DTS 5.1 audio solution
Support for dual hard drives
Source : http://infomartion4u.blogspot.com/2011/05/fujitsu-did-not-want-to-lose.html
This is a true incident and the Indian is none other than
An Indian man walks into the New York City bank and asks for the loan officer.
He tells the Loan Officer that he was going to India for some business for 2 weeks and needs to borrow $5,000.
The Loan Officer tells him that the bank will need
Some form of security for the loan.
So the Indian man hands over the keys and the documents of the new Ferrari car parked on the street in front of the bank.
The loan officer consults the president of the bank,
Produces all the required items and everything check out to be OK.
The loan officer agrees to accept the car as a security for the loan.
The bank president and the Loan Officer had a good laugh at the Indian
For keeping a $750,000 Ferrari as a security and taking only $5,000 has a loan.
An employee of the bank then drives the Ferrari
Into the banks underground garage and parks it there.
Two weeks later the Indian returns and pays $5000 and the interest which comes to it $15.41.
Seeing this, loan officer says,
“Sir, we are very happy to have your business
And this transaction has worked out very nicely, but we are a little puzzled.
While you are away, we checked you out and
Found out that you were a multi millionaire.
What puzzled us was why would you bother to borrow $5000?”
The Indian replies
"Where else in the New York City can I park my car for 2 weeks and
For only $15.41 and expect it to be there when I return".
This is a true incident and the
Indian is none other than
Friday, May 27, 2011
Intel Capital Invests $24.5 Million Across the Compute Continuum
NEW YORK, May 23, 2011 – Intel Capital, Intel Corporation's global investment organization, today announced four U.S. investments to drive continued innovation across the entire continuum of computing.
About Intel Capital
Intel Capital, Intel's global investment organization, makes equity investments in innovative technology start-ups and companies worldwide. Intel Capital invests in a broad range of companies offering hardware, software, and services targeting enterprise, home, mobility, health, consumer Internet, semiconductor manufacturing and cleantech. Since 1991, Intel Capital has invested more than US$10 billion in over 1,140 companies in 49 countries. In that timeframe, 191 portfolio companies have gone public on various exchanges around the world and 268 were acquired or participated in a merger. In 2010, Intel Capital invested US$327 million in 119 investments with approximately 44 percent of funds invested outside the United States and Canada
Intel is a trademark of Intel Corporation in the United States and other countries.
Source : http://newsroom.intel.com/community/intel_newsroom/blog/2011/05/23/intel-capital-invests-245-million-across-the-compute-continuum
Intel Creates AppUp Small Business Service on Hybrid Cloud
SANTA CLARA, Calif., May 24, 2011 – Intel® Corporation today launched the Intel AppUpSM Small Business Service, an innovative service running on the Intel® Hybrid Cloud platform that enables server manufacturers, software vendors, and service providers to offer small businesses key advantages of cloud computing with applications and data running on their own premises.
Source : http://newsroom.intel.com/community/intel_newsroom/blog/2011/05/24/intel-creates-appup-small-business-service-on-hybrid-cloud
Intel Reinvents Transistors Using New 3-D Structure
SANTA CLARA, Calif., May 4, 2011 – Intel Corporation today announced a significant breakthrough in the evolution of the transistor, the microscopic building block of modern electronics. For the first time since the invention of silicon transistors over 50 years ago, transistors using a three-dimensional structure will be put into high-volume manufacturing. Intel will introduce a revolutionary 3-D transistor design called Tri-Gate, first disclosed by Intel in 2002, into high-volume manufacturing at the 22-nanometer (nm) node in an Intel chip codenamed "Ivy Bridge." A nanometer is one-billionth of a meter.
Intel's 3-D Tri-Gate transistors enable chips to operate at lower voltage with lower leakage, providing an unprecedented combination of improved performance and energy efficiency compared to previous state-of-the-art transistors. The capabilities give chip designers the flexibility to choose transistors targeted for low power or high performance, depending on the application.
Transistors continue to get smaller, cheaper and more energy efficient in accordance with Moore's Law – named for Intel co-founder Gordon Moore. Because of this, Intel has been able to innovate and integrate, adding more features and computing cores to each chip, increasing performance, and decreasing manufacturing cost per transistor.
The 3-D Tri-Gate transistor will be implemented in the company's upcoming manufacturing process, called the 22nm node, in reference to the size of individual transistor features. More than 6 million 22nm Tri-Gate transistors could fit in the period at the end of this sentence.
Source : http://newsroom.intel.com/community/intel_newsroom/blog/2011/05/04/intel-reinvents-transistors-using-new-3-d-structure
Thursday, May 26, 2011
China, US vie for mantle of world's biggest hacking victim
China and the US have been battling lately to portray themselves as the more pathetic victim of cyberattacks.
The US has lamented its own lack of preparedness for a major Internet hack attack and focused on the 30+ companies affected by the recent China-based hack that set Google off on its recent anti-censorship kick. But it is Beijing that has been most at pains to claim the mantle of "victim."
The accusations of Chinese hacking come as China tries to deflect the Google story, saying that it's a business dispute (and thus the US government should stay away), that the government had nothing to do with the hacking, and that Chinese people "fully enjoy the freedom of speech and have immediate access to adequate information in accordance with law, which is one of the important reasons that they firmly follow the path of socialism with Chinese characteristics."
"According to law" is important in this formulation, because it allows the Chinese to have a consistent focus on following the law. Google must censor search results in China because it is the law; China isn't behind hack attacks that break the law; let's all work together to make cybersecurity an international issue (according to law).
The spokesperson's last comments came on February 1 in response to questions about a meeting between China and US Secretary of State Clinton that came on the sidelines of an Afghan donor conference. The response is telling, because it fits into the emerging Chinese narrative about cyberattacks: "hey, we're huge victims!"
The US intelligence community remains skeptical of China's interest in stopping international cyberattacks of a certain kind: state-backed attacks trolling for data, corporate secrets, or infrastructure weaknesses.
In a report (PDF) submitted to Congress yesterday, Dennis Blair, the Director of National Intelligence, placed cyberattacks at the very top of the document. And, while China wasn't called out by name, Blair's single example was telling.
"The recent intrusions reported by Google are a stark reminder of the importance of these cyber assets, and a wake-up call to those who have not taken this problem seriously," he wrote.
How bad is the problem? Well, the US sees itself as a major victim of cyberattacks, too. "Sensitive information is stolen daily from both government and private sector networks," wrote Blair. "We often find persistent, unauthorized, and at times, unattributable presences on exploited networks, the hallmark of an unknown adversary intending to do far more than merely demonstrate skill or mock a vulnerability."
In the section on China, Blair noted four key areas of concern; one was "China’s aggressive cyber activities." (The US maintains such capabilities too, of course, and Blair called on Congress to deliver more funding.)
Source : http://arstechnica.com/tech-policy/news/2010/02/china-us-vie-for-mantle-of-worlds-biggest-hacking-victim.ars
The US has lamented its own lack of preparedness for a major Internet hack attack and focused on the 30+ companies affected by the recent China-based hack that set Google off on its recent anti-censorship kick. But it is Beijing that has been most at pains to claim the mantle of "victim."
We're number 1!
"As one of the major victims of hacking in the world," said a Foreign Ministry spokesperson, "China advocates stronger international cooperation in combating hacking to protect citizens' privacy and safeguard cyber security according to law."The accusations of Chinese hacking come as China tries to deflect the Google story, saying that it's a business dispute (and thus the US government should stay away), that the government had nothing to do with the hacking, and that Chinese people "fully enjoy the freedom of speech and have immediate access to adequate information in accordance with law, which is one of the important reasons that they firmly follow the path of socialism with Chinese characteristics."
"According to law" is important in this formulation, because it allows the Chinese to have a consistent focus on following the law. Google must censor search results in China because it is the law; China isn't behind hack attacks that break the law; let's all work together to make cybersecurity an international issue (according to law).
The spokesperson's last comments came on February 1 in response to questions about a meeting between China and US Secretary of State Clinton that came on the sidelines of an Afghan donor conference. The response is telling, because it fits into the emerging Chinese narrative about cyberattacks: "hey, we're huge victims!"
China has stressed its own victimization ever since it recovered from its initial confusion and began responding to the Google narrative. Back on January 19, the Foreign Ministry was stressing the "we're victims too" theme, saying that cyberattacks from abroad increased 148 percent in 2008. (Also: China's Internet "was open and managed in accordance with the law.")
On January 22, in the wake of Hillary Clinton's major speech on Internet freedom, the Foreign Ministry stressed that it was "a major victim of hacking in the world," asked for international cooperation, and claimed that China "supervises Internet according to law."
We're victims, too!The US intelligence community remains skeptical of China's interest in stopping international cyberattacks of a certain kind: state-backed attacks trolling for data, corporate secrets, or infrastructure weaknesses.
In a report (PDF) submitted to Congress yesterday, Dennis Blair, the Director of National Intelligence, placed cyberattacks at the very top of the document. And, while China wasn't called out by name, Blair's single example was telling.
"The recent intrusions reported by Google are a stark reminder of the importance of these cyber assets, and a wake-up call to those who have not taken this problem seriously," he wrote.
How bad is the problem? Well, the US sees itself as a major victim of cyberattacks, too. "Sensitive information is stolen daily from both government and private sector networks," wrote Blair. "We often find persistent, unauthorized, and at times, unattributable presences on exploited networks, the hallmark of an unknown adversary intending to do far more than merely demonstrate skill or mock a vulnerability."
In the section on China, Blair noted four key areas of concern; one was "China’s aggressive cyber activities." (The US maintains such capabilities too, of course, and Blair called on Congress to deliver more funding.)
Source : http://arstechnica.com/tech-policy/news/2010/02/china-us-vie-for-mantle-of-worlds-biggest-hacking-victim.ars
Major Israeli websites hacked
Unprecedented number of Israeli websites hacked: Hundreds of websites were damaged by hackers in recent hours, following IDF activity in the Gaza Strip. The hackers are members of the Moroccan “Team Evil” group, responsible for most of the website damage in Israel in the past year. This is the largest, most concentrated attack on Israeli websites in recent years.
A Ynet investigation revealed that more than 750 Israeli websites, on a number of different domains, were hacked into and damaged in recent days. Prominent among them were the Soldier’s Treasury Bank, Bank Hapoalim (not the main page), Rambam Hospital, the Society for Culture and Housing, BMW Israel, Subaru Israel, Jump Fashion, non-profit organization “Yedid,” Kadima’s youth website, and the Globus Group ticket center. Many of these sites have not yet returned to normal.
Hackers left the message: You’re killing Palestinians, we’re killing servers.
Early on Wednesday, the IDF began operation “Summer Rains” in Gaza: Forces entered the southern end of the strip, adjacent to the
point of Cpl. Gilad Shavit’s kidnap. The air force attacked a power station and blacked out areas of Gaza. Three bridges were bombed in central Gaza, in order to prevent movement of the kidnapped soldier. Many Israeli websites are hacked every day – most of these are small sites, with inadequate information security. It is significantly different when the sites are ones of large companies, who have adequate defenses from this sort of attack.
Past success of Team Evil
In the past, Team Evil succeeded in hacking into several sites of medium-sized but recognized Israeli companies. In April, they hit tens of sites, including those of the “Shilav” children’s store, “The Blue Square” supermarket and McDonald’s.
The group’s spokesman previously told Ynet that “we are a group of Moroccan hackers that hack into sites as part of the resistance in the war with Israel. We attack Israeli sites every day. This is our duty…hacking is not a crime.”
Added another group member: “We want Israel to stop fighting. Stop killing children and we’ll stop hacking.” According to the spokesman, the group’s members are all Moroccan youths, under the age of 20.
The increase in hacking of websites following military operations is a well-known phenomenon, in Israel and in the rest of the world. A similar increase was seen in attacks on both Israeli and Arab websites in the first days of the second intifada, pursuant to military operations that took place in Gaza, Judea and Samaria at that time.
A Ynet investigation revealed that more than 750 Israeli websites, on a number of different domains, were hacked into and damaged in recent days. Prominent among them were the Soldier’s Treasury Bank, Bank Hapoalim (not the main page), Rambam Hospital, the Society for Culture and Housing, BMW Israel, Subaru Israel, Jump Fashion, non-profit organization “Yedid,” Kadima’s youth website, and the Globus Group ticket center. Many of these sites have not yet returned to normal.
Hackers left the message: You’re killing Palestinians, we’re killing servers.
Early on Wednesday, the IDF began operation “Summer Rains” in Gaza: Forces entered the southern end of the strip, adjacent to the
Past success of Team Evil
In the past, Team Evil succeeded in hacking into several sites of medium-sized but recognized Israeli companies. In April, they hit tens of sites, including those of the “Shilav” children’s store, “The Blue Square” supermarket and McDonald’s.
The group’s spokesman previously told Ynet that “we are a group of Moroccan hackers that hack into sites as part of the resistance in the war with Israel. We attack Israeli sites every day. This is our duty…hacking is not a crime.”
Added another group member: “We want Israel to stop fighting. Stop killing children and we’ll stop hacking.” According to the spokesman, the group’s members are all Moroccan youths, under the age of 20.
The increase in hacking of websites following military operations is a well-known phenomenon, in Israel and in the rest of the world. A similar increase was seen in attacks on both Israeli and Arab websites in the first days of the second intifada, pursuant to military operations that took place in Gaza, Judea and Samaria at that time.
World's biggest hacker held
A London man described as the "world's biggest computer hacker" has been arrested.
Gary McKinnon, 39, was seized by the Met's extradition unit at his Wood Green home.
The unemployed former computer engineer is accused of causing the US government $1billion of damage by breaking into its most secure computers at the Pentagon and Nasa. He is likely to be extradited to America to face eight counts of computer crime in 14 states and could be jailed for 70 years.
The former Highgate Wood comprehensive-pupil was granted bail today at Bow Street Magistrates' Court.
Most of the alleged hacking took place in 2001 and 2002. At one stage the US thought it was the work of the al Qaeda terror network.
Friends said that he broke into the networks from his home computer to try to prove his theory that the US was covering up the existence of UFOs.
He is accused of a series of hacking offences including deleting "critical" files from military computers. The US authorities said the cost of tracking him down and correcting the alleged problems was more than £570,000. The offences could also see him fined up to £950,000 if found guilty on all charges.
He was arrested yesterday evening but the US first issued an indictment against him in November 2002.
Prosecutor Paul McNulty alleged that McKinnon, known online as "Solo," had perpetrated "the biggest hack of military computers ever". He was named as the chief suspect after a series of electronic break-ins occurred over 12 months at 92 separate US military and Nasa networks.
McKinnon was also accused of hacking into the networks of six private companies and organisations.
It is alleged that he used software available on the internet to scan tens of thousands of computers on US military networks from his home PC, looking for machines that might be exposed due to flaws in the Windows operating system.
Many of the computers he broke into were protected by easy-to-guess passwords, investigators said. In some cases, McKinnon allegedly shut down the computer systems he invaded.
The charge sheet alleges that he hacked into an army computer at Fort Myer, Virginia, where he obtained codes, information and commands before deleting about 1,300 user accounts.
Other systems he hacked into included the Pentagon's network and US army, navy and air force computers.
Reports when he was first indicted said that McKinnon found his career as a computer engineer tedious.
One message updating old schoolfriends on a website read simply: "Computers (Yawn)".
Friends said he was desperate to prove that the Americans had mounted a huge cover-up to deny his belief that aliens had visited earth.
Andrew Edwards, who has known McKinnon since their days together at Highgate Wood comprehensive, said in 2002: "Gary told me all he was doing was looking for proof of a cover-up over UFOs.
"He's been interested in UFOs for some time and believes the Americans are holding back information - although he didn't find any proof."
Outside court, his solicitor Karen Todner said he was disappointed it had taken the authorities this long to bring him to court.
She said: "This decision for extradition is driven by the American government. Mr McKinnon intends to contest this case most vigorously.
"Of particular concern to him is the treatment of other British nationals under the American judicial system which inspires little confidence.
"We believe that as a British national, he should be tried here in our courts by a British jury and not in the US."
Source : http://www.thisislondon.co.uk/news/article-19164714-worlds-biggest-hacker-held.do
Gary McKinnon, 39, was seized by the Met's extradition unit at his Wood Green home.
The unemployed former computer engineer is accused of causing the US government $1billion of damage by breaking into its most secure computers at the Pentagon and Nasa. He is likely to be extradited to America to face eight counts of computer crime in 14 states and could be jailed for 70 years.
The former Highgate Wood comprehensive-pupil was granted bail today at Bow Street Magistrates' Court.
Most of the alleged hacking took place in 2001 and 2002. At one stage the US thought it was the work of the al Qaeda terror network.
Friends said that he broke into the networks from his home computer to try to prove his theory that the US was covering up the existence of UFOs.
He is accused of a series of hacking offences including deleting "critical" files from military computers. The US authorities said the cost of tracking him down and correcting the alleged problems was more than £570,000. The offences could also see him fined up to £950,000 if found guilty on all charges.
He was arrested yesterday evening but the US first issued an indictment against him in November 2002.
Prosecutor Paul McNulty alleged that McKinnon, known online as "Solo," had perpetrated "the biggest hack of military computers ever". He was named as the chief suspect after a series of electronic break-ins occurred over 12 months at 92 separate US military and Nasa networks.
McKinnon was also accused of hacking into the networks of six private companies and organisations.
It is alleged that he used software available on the internet to scan tens of thousands of computers on US military networks from his home PC, looking for machines that might be exposed due to flaws in the Windows operating system.
Many of the computers he broke into were protected by easy-to-guess passwords, investigators said. In some cases, McKinnon allegedly shut down the computer systems he invaded.
The charge sheet alleges that he hacked into an army computer at Fort Myer, Virginia, where he obtained codes, information and commands before deleting about 1,300 user accounts.
Other systems he hacked into included the Pentagon's network and US army, navy and air force computers.
Reports when he was first indicted said that McKinnon found his career as a computer engineer tedious.
One message updating old schoolfriends on a website read simply: "Computers (Yawn)".
Friends said he was desperate to prove that the Americans had mounted a huge cover-up to deny his belief that aliens had visited earth.
Andrew Edwards, who has known McKinnon since their days together at Highgate Wood comprehensive, said in 2002: "Gary told me all he was doing was looking for proof of a cover-up over UFOs.
"He's been interested in UFOs for some time and believes the Americans are holding back information - although he didn't find any proof."
Outside court, his solicitor Karen Todner said he was disappointed it had taken the authorities this long to bring him to court.
She said: "This decision for extradition is driven by the American government. Mr McKinnon intends to contest this case most vigorously.
"Of particular concern to him is the treatment of other British nationals under the American judicial system which inspires little confidence.
"We believe that as a British national, he should be tried here in our courts by a British jury and not in the US."
Source : http://www.thisislondon.co.uk/news/article-19164714-worlds-biggest-hacker-held.do
Wednesday, May 25, 2011
How to Earn Money From Facebook
Facebook has become a social networking phenomenon that started just with college students but now has expanded to all types of social groups. Much of Facebook users are so addicted to this website, they spend hours exploring and using different kinds of social applications. Like the television, people are spending more and more time in front of their computers - surfing the web or trying out new applications on Facebook.
Like with more popular media like the television, radio or print advertisements, Facebook also generates advertisements that go with their applications. You can apply the same concept - make a product and sell it. So, how do you do this with Facebook? Here are ways to get your profits running.
Sell your product.
If you already have a product, you can sell it on Facebook - most especially if your service or product caters to the 18 to 35 year old group. For example, if you own a twenty-four hour pizza place, you can put up your page with your company profile and your products. Some college students that go online during the wee hours of the night might actually crave for pizza.
Or if you have a bookstore, you can put up a page asking people if they want to order a book online for a significantly lower price compared to other online bookstores. Know your consumers and find ways on how to get in touch with them. Join groups or causes so your presence would be more visible.
Make your Facebook page interesting.
A lot of people also browse Facebook looking for interesting content like causes to support, funny stuff or photos that are worth taking a look at. You can start thinking of ways on how to make your page interesting, so a lot of readers would go to your profile page.
You just have to put an advertising space on your profile page. Then, find advertisers that would be interested in putting up their ad banners on your site. If your page is about books, maybe you'd like to get in touch with Amazon. It would be logical, of course, to get advertisers that are related with your actual content.
You don't actually have to sell anything on your Facebook page, you just have to put up advertising spaces once you get the traffic rolling.
Create applications.
Facebook is so popular because of the various third-party applications it offers. First of, you should know what the market demands. What applications do Facebook users want? Most users are between the ages of 18 and 35 so it is understandable that most Facebook applications would be mashups between music, video, applications that are just for fun or their profiles. Applications would range from free gifts, to horoscopes, to trivia games, personality tests or graffiti walls on their profile pages. These applications are viral - meaning it can spread in a matter of minutes! So, a lot of people can be using your application minutes after it has been launched. That would mean that you can sell advertising spaces on your application.
If you don't have the means or the money to get your application up and running, you can sell your idea to companies like Bay Partners or get developers to help you with it.
Copyright (c) Althea Marie Tan. If you are interested to know more about how to use Facebook and to earn money from it, visit Facebook Social Ads [http://facebook-social-ads.net]
Article Source: http://EzineArticles.com/?expert=Thea_Tan
Tuesday, May 24, 2011
PSN & SONY hack - Recent Hacking Case
In April 2011, Hacker stole 77 million PSN customers personal information--including names, addresses, billing history.The some days later another massive breach at Sony was 100 million user's personal info hacked in Japan . Just yesterday Sony PlayStation Network hacked again, user passwords compromised. The Hacker News investigate about this Biggest Hacking case of Year and Finally we Release our 1st Report on Sony's 3rd Attack Issue on 8th May 2011. In our Report we prove that How hackers get the list Customers info just using simple Google Searches.
Further a Hacking Group named " PH4N70M Hacking Team" Claiming to Hack the PSN Network. We (THN) try to talk with these hackers and try to collect some info about this Breach. The Statement by Founder of PH4N70M Hacking Team -- "The PSN was comprised of multiple forwarding servers. When my team went in, we found an authorization server (Codenamed auth.sony). This server had no encryption, no DDoS protection was in place. No load balancing. This is how the PSN network was taken down. I thought I’d pass that along to you due to the confusion people are having. This gateway was not load balanced and not secured operating through the default port 80. This server, during early operations back in February (when the operation was initiated in a vote in Operation Payback) was also thought to control login to sonys stores and shop networks. (Marketplace) I cannot confirm this. The original planned attack was going to be a LOIC + Slowloris attack. I also heard before I left of a bufferoverflow attack.The key players in PH4N70M (Phantom) include an exploiter (TH0R), Xik, and several others including the operation payback collaborator named Wolfy. The rest of the team will remain hidden for now.The credit card concerns were all because the data was never encrypted when sent"
Source : http://www.thehackernews.com/2011/05/role-of-hacking-in-stealing-and-selling.html
Further a Hacking Group named " PH4N70M Hacking Team" Claiming to Hack the PSN Network. We (THN) try to talk with these hackers and try to collect some info about this Breach. The Statement by Founder of PH4N70M Hacking Team -- "The PSN was comprised of multiple forwarding servers. When my team went in, we found an authorization server (Codenamed auth.sony). This server had no encryption, no DDoS protection was in place. No load balancing. This is how the PSN network was taken down. I thought I’d pass that along to you due to the confusion people are having. This gateway was not load balanced and not secured operating through the default port 80. This server, during early operations back in February (when the operation was initiated in a vote in Operation Payback) was also thought to control login to sonys stores and shop networks. (Marketplace) I cannot confirm this. The original planned attack was going to be a LOIC + Slowloris attack. I also heard before I left of a bufferoverflow attack.The key players in PH4N70M (Phantom) include an exploiter (TH0R), Xik, and several others including the operation payback collaborator named Wolfy. The rest of the team will remain hidden for now.The credit card concerns were all because the data was never encrypted when sent"
Source : http://www.thehackernews.com/2011/05/role-of-hacking-in-stealing-and-selling.html
Role of Hacking in Stealing and Selling Credit Cards !
People use the Internet in their everyday lives. With technology advancing as fast as it is, most modern day homes have gone online, turning to the Internet to save time with busy days, performing simple tasks like online banking, purchasing items on eBay or Amazon, even taking college classes online. Internet Banking , Credit Cards are become the mode of Payments.
Its 2011, Hacker have Eye on your Bank Balance, Credit Card details and Logins. These online Criminals get you Credit Card details and sell them to other customers. Credit card numbers can be purchased for a dollar or less if you buy in bulk And so-called full profiles, including a Social Security number and mother’s maiden name, are available for just $80. ATM pin numbers and platinum cards cost extra.
Computer hackers have been found stealing and selling other people's credit card information in masses. Hacking happens just like any other crime, having both low level attacks like a single person stealing and using your online email accounts, to a more organized structure like a group of hackers attacking a corporate mainframe for large amounts of personal information.
Source : http://www.thehackernews.com/2011/05/role-of-hacking-in-stealing-and-selling.html
Its 2011, Hacker have Eye on your Bank Balance, Credit Card details and Logins. These online Criminals get you Credit Card details and sell them to other customers. Credit card numbers can be purchased for a dollar or less if you buy in bulk And so-called full profiles, including a Social Security number and mother’s maiden name, are available for just $80. ATM pin numbers and platinum cards cost extra.
Computer hackers have been found stealing and selling other people's credit card information in masses. Hacking happens just like any other crime, having both low level attacks like a single person stealing and using your online email accounts, to a more organized structure like a group of hackers attacking a corporate mainframe for large amounts of personal information.
Source : http://www.thehackernews.com/2011/05/role-of-hacking-in-stealing-and-selling.html
Students arrested in Nye country computer haking case
A dozen students were arrested by the Nye County Sheriff's Department for allegedly changing their grades in the school computer system.
Police say Tyler Coyner is suspected of stealing the password to the grade system at Pahrump Valley High School and then selling the password to others. The alleged crime went on for two semesters.
Police say Coyner even went as far as changing his own grades, making himself the salutatorian at graduation.
Coyner and another suspect, Matthew Miller, are also accused of stealing a television from Wal-mart and possessing fake ID's. They are facing charges of altering computer data, conspiracy to commit a crime, burglary and grand larceny.
Ten other un-named students, all under the age of 18, have also been charged in the incident.
Source : http://www.thehackernews.com/2011/03/students-arrested-in-nye-county.html
Source : http://www.thehackernews.com/2011/03/students-arrested-in-nye-county.html
Build Safety Into the Very Beginning of the Computer System
ScienceDaily (May 11, 2011) — A new publication from the National Institute of Standards and Technology (NIST) provides guidelines to secure the earliest stages of the computer boot process. Commonly known as the Basic Input/Output System (BIOS), this fundamental system firmware -- computer code built into hardware -- initializes the hardware when you switch on the computer before starting the operating system. BIOS security is a new area of focus for NIST computer security scientists.
"By building security into the firmware, you establish the foundation for a secure system," said Andrew Regenscheid, one of the authors of BIOS Protection Guidelines (NIST Special Publication 800-147). Without appropriate protections, attackers could disable systems or hide malicious software by modifying the BIOS. This guide is focused on reducing the risk of unauthorized changes to the BIOS.
Designed to assist computer manufacturers writing BIOS code, SP 800-147 provides guidelines for building features into the BIOS that help protect it from being modified or corrupted by attackers. Manufacturers routinely update system firmware to fix bugs, patch vulnerabilities and support new hardware. SP 800-147 calls for using cryptographic "digital signatures" to authenticate the BIOS updates before installation based on NIST's current cryptographic guidelines. The publication is available just as computer manufacturers are beginning to deploy a new generation of BIOS firmware. "We believe computer manufacturers are ready to implement these guidelines and we hope to see them in products soon," said Regenscheid.
The publication also suggests management best practices that are tightly coupled with the security guidelines for manufacturers. These practices will help computer administrators take advantage of the BIOS protection features as they become available.
BIOS Protection Guidelines, NIST SP 800-147, is available at http://csrc.nist.gov/publications/nistpubs/800-147/NIST-SP800-147-April2011.pdf.
Source : http://www.sciencedaily.com/releases/2011/05/110511162533.htm
"By building security into the firmware, you establish the foundation for a secure system," said Andrew Regenscheid, one of the authors of BIOS Protection Guidelines (NIST Special Publication 800-147). Without appropriate protections, attackers could disable systems or hide malicious software by modifying the BIOS. This guide is focused on reducing the risk of unauthorized changes to the BIOS.
Designed to assist computer manufacturers writing BIOS code, SP 800-147 provides guidelines for building features into the BIOS that help protect it from being modified or corrupted by attackers. Manufacturers routinely update system firmware to fix bugs, patch vulnerabilities and support new hardware. SP 800-147 calls for using cryptographic "digital signatures" to authenticate the BIOS updates before installation based on NIST's current cryptographic guidelines. The publication is available just as computer manufacturers are beginning to deploy a new generation of BIOS firmware. "We believe computer manufacturers are ready to implement these guidelines and we hope to see them in products soon," said Regenscheid.
The publication also suggests management best practices that are tightly coupled with the security guidelines for manufacturers. These practices will help computer administrators take advantage of the BIOS protection features as they become available.
BIOS Protection Guidelines, NIST SP 800-147, is available at http://csrc.nist.gov/publications/nistpubs/800-147/NIST-SP800-147-April2011.pdf.
Source : http://www.sciencedaily.com/releases/2011/05/110511162533.htm
Hacker penetrates T-Mobile systems
A sophisticated computer hacker had access to servers at wireless giant T-Mobile for at least a year, which he used to monitor U.S. Secret Service e-mail, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities, SecurityFocus has learned.
Twenty-one year-old Nicolas Jacobsen was quietly charged with the intrusions last October, after a Secret Service informant helped investigators link him to sensitive agency documents that were circulating in underground IRC chat rooms. The informant also produced evidence that Jacobsen was behind an offer to provide T-Mobile customers' personal information to identity thieves through an Internet bulletin board, according to court records.
Jacobsen could access information on any of the Bellevue, Washington-based company's 16.3 million customers, including many customers' Social Security numbers and dates of birth, according to government filings in the case. He could also obtain voicemail PINs, and the passwords providing customers with Web access to their T-Mobile e-mail accounts. He did not have access to credit card numbers.
The case arose as part of the Secret Service's "Operation Firewall" crackdown on Internet fraud rings last October, in which 19 men were indicted for trafficking in stolen identity information and documents, and stolen credit and debit card numbers. But Jacobsen was not charged with the others. Instead he faces two felony counts of computer intrusion and unauthorized impairment of a protected computer in a separate, unheralded federal case in Los Angeles, currently set for a February 14th status conference.
The government is handling the case well away from the spotlight. The U.S. Secret Service, which played the dual role of investigator and victim in the drama, said Tuesday it couldn't comment on Jacobsen because the agency doesn't discuss ongoing cases-- a claim that's perhaps undermined by the 19 other Operation Firewall defendants discussed in a Secret Service press release last fall. Jacobsen's prosecutor, assistant U.S. attorney Wesley Hsu, also declined to comment. "I can't talk about it," Hsu said simply. Jacobsen's lawyer didn't return a phone call.
T-Mobile, which apparently knew of the intrusions by July of last year, has not issued any public warning. Under California's anti-identity theft law "SB1386," the company is obliged to notify any California customers of a security breach in which their personally identifiable information is "reasonably believed to have been" compromised. That notification must be made in "the most expedient time possible and without unreasonable delay," but may be postponed if a law enforcement agency determines that the disclosure would compromise an investigation.
Company spokesman Peter Dobrow said Tuesday that nobody at T-Mobile was available to comment on the matter.
Source : http://www.securityfocus.com/news/10271
Twenty-one year-old Nicolas Jacobsen was quietly charged with the intrusions last October, after a Secret Service informant helped investigators link him to sensitive agency documents that were circulating in underground IRC chat rooms. The informant also produced evidence that Jacobsen was behind an offer to provide T-Mobile customers' personal information to identity thieves through an Internet bulletin board, according to court records.
Jacobsen could access information on any of the Bellevue, Washington-based company's 16.3 million customers, including many customers' Social Security numbers and dates of birth, according to government filings in the case. He could also obtain voicemail PINs, and the passwords providing customers with Web access to their T-Mobile e-mail accounts. He did not have access to credit card numbers.
The case arose as part of the Secret Service's "Operation Firewall" crackdown on Internet fraud rings last October, in which 19 men were indicted for trafficking in stolen identity information and documents, and stolen credit and debit card numbers. But Jacobsen was not charged with the others. Instead he faces two felony counts of computer intrusion and unauthorized impairment of a protected computer in a separate, unheralded federal case in Los Angeles, currently set for a February 14th status conference.
The government is handling the case well away from the spotlight. The U.S. Secret Service, which played the dual role of investigator and victim in the drama, said Tuesday it couldn't comment on Jacobsen because the agency doesn't discuss ongoing cases-- a claim that's perhaps undermined by the 19 other Operation Firewall defendants discussed in a Secret Service press release last fall. Jacobsen's prosecutor, assistant U.S. attorney Wesley Hsu, also declined to comment. "I can't talk about it," Hsu said simply. Jacobsen's lawyer didn't return a phone call.
T-Mobile, which apparently knew of the intrusions by July of last year, has not issued any public warning. Under California's anti-identity theft law "SB1386," the company is obliged to notify any California customers of a security breach in which their personally identifiable information is "reasonably believed to have been" compromised. That notification must be made in "the most expedient time possible and without unreasonable delay," but may be postponed if a law enforcement agency determines that the disclosure would compromise an investigation.
Company spokesman Peter Dobrow said Tuesday that nobody at T-Mobile was available to comment on the matter.
Source : http://www.securityfocus.com/news/10271