Posts tagged Cyber Security
Computer Security Expert Claims he Hacked the ObamaCare Website in 4 Minutes
The hits just keep on coming for ObamaCare. It was less than two weeks ago that I highlighted the potential premium rate death spiral that ObamaCare faces due to the fact that only old and sick people are signing up for the program. Now it seems there are further security related concerns plaguing the site, as cyber-security expert David Kennedy recently claimed that “gaining access to 70,000 personal records of Obamacare enrollees via HealthCare.gov took about 4 minutes.”
It’s actually hard to be this incompetent if you tried. More from the Washington Times:
The man who appeared before Congress last week to explain the security pitfalls of HealthCare.gov took to Fox News on Sunday to explain just how easy it was to penetrate the website.
Hacking expert David Kennedy told Fox’s Chris Wallace that gaining access to 70,000 personal records of Obamacare enrollees via HealthCare.gov took about 4 minutes and required nothing more than a standard browser, the Daily Caller reported.
“And 70,000 was just one of the numbers that I was able to go up to and I stopped after that,” he said. “You know, I’m sure it’s hundreds of thousands, if not more, and it was done within about a 4 minute timeframe. So, it’s just wide open.”
“You can literally just open up your browser, go to this, and extract all this information without actually having to hack the website itself,” he said.
For some context on this very important issue, check out the video below:
Image added to Mike’s original post.
Ron Paul’s Pod Cast Nation #19 ~ Hypocrisy
Posted by RonPaulCC2012
By James Corbett
29 January, 2012
When legislators in the US abandoned their support of SOPA and PIPA in the wake of mass popular protest earlier this month, many of those who had been mobilized by the legislation–which would have granted the US government almost total power to block access to foreign websites accused of so much as linking to copyrighted material–did not have long to enjoy their “victory.” The very next day the New Zealand police swooped in to the million-dollar estate of MegaUpload.com founder Kim Dotcom, arresting him and three others at the US government’s request for alleged racketeering, copyright infringement and money laundering. The Department of Justice is now seeking the MegaUpload CEO’s extradition to the US.
Some amongst those who had been campaigning against SOPA and PIPA did not know that the US government already had the authority to shut down entire websites and in fact has exercised that authority on numerous occasions. What many are now learning is that, far from some potential future threat, internet censorship already exists in a variety of legislation that is already on the books in the United States and in nations around the world.
Although most commonly associated with China, which has implemented strict internet filters that prevent its citizens from finding politically sensitive material, various internet censorship programs have already been implemented by countries around the globe.
In 2010, Japan passed amendments to its copyright law making it illegal to download copyrighted material. The move has yet to curtail file-sharing in the country, so the Japanese government recently announced that they are going to begin putting fake copies of popular tv dramas on file-sharing websites that, when opened, remind users that it is illegal to download such material.
In July of 2010, the US Immigration and Customs Enforcement seized the domains of 8 websites that it accused of hosting illegal copies of copyrighted material as part of an investigation dubbed Operation In Our Sites. The seizures came before any trial took place, and six of the websites did not actually host any of the copyrighted material in question, only linking to it. That November, ICE acted once again, this time seizing 82 domains. In December of 2011, over one year later, the agency returned one of the domains, Dajaz1.com, to its owner, after admitting that it had not in fact breached any laws.
In May of last year, the US Justice Department began seeking the extradition of one of the website’s operators, Richard O’Dwyer, from the UK. O’Dwyer is a British citizen who established TVShack.net in December of 2007. The DOJ is hoping to bring O’Dwyer to the US under the Extradition Act of 2003 to face charges of copyright infringement in the Southern District of New York.
Late last year, a number of nations signed a new global copyright agreement known as the Anti-Counterfeiting Trade Agreement or ACTA. Signatories include the United States, Canada, Japan, Australia, South Korea, and, as of this past week, 22 member states of the European Union.
Purported to be a treaty against counterfeit goods, generic drugs and copyright, it threatens to fundamentally alter the internet as it has so far existed.
When the Polish government announced its intention to sign earlier this month, protests sprang up around the country.
By Nancy Houser
“We are not talking about a national ID card. We are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy, and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities,” Commerce Secretary Gary Locke said at an event Friday at the Stanford Institute for Economic Policy Research, according to Fox News.
With an early version of the Internet proposalgoing public on June 25, 2010, the Internet ID card for Americans is being supported by privacy and civil-liberties groups who are concerned over dual roles being played by intelligence agencies and the police departments, in addition to a mounting lack of privacy and online safety. Others feel it is an infringement on personal privacy and their rights, which doesn’t seem to affect invading hackers, insecure connections or security threats. A quick scope of the draft “focuses on ways to establish and maintain ‘trusted digital identities,’ a key aspect for improving the security of online transactions.” The transactions involved represent the private sector, individuals and governments—while addressing their international nature if applicable.