Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Businesses United States

Feds Thwart Extortion Plot Against Best Buy 942

hiero writes "From an article in the Star Tribune: 'Federal authorities said Tuesday they thwarted an extortion plot against Best Buy Co. Inc. by a man who sent the company an e-mail threatening to expose what he claimed were weaknesses in the retailer's computer system unless he was paid $2.5 million.' What's really interesting to me, though, is this paragraph further on in the article: 'The federal search warrant was obtained the morning of Oct. 24 and allowed the FBI, with Best Buy's cooperation, to use an Internet device known as an Internet Protocol Address Verifier. It contained a program that automatically sent back a response to Best Buy after the company sent a message to the e-mail address. The response allowed investigators to identify Ray as the sender of the e-mail threats, according to the government.' Internet Protocol Address Verifier? Is this Carnivore in action?"
This discussion has been archived. No new comments can be posted.

Feds Thwart Extortion Plot Against Best Buy

Comments Filter:
  • Hmmmm... (Score:4, Insightful)

    by graveyardduckx ( 735761 ) on Wednesday January 07, 2004 @07:39AM (#7901734)
    and this is where he's going to say his computer was hi-jacked, right? Even Carnibore has its limitations.
  • by PoitNarf ( 160194 ) on Wednesday January 07, 2004 @07:41AM (#7901744)
    I think that it would only work if you were able to obtain an email address that a spammer actually checked, and we all know how hard those are to come by.
  • Re:I think... (Score:5, Insightful)

    by 1u3hr ( 530656 ) on Wednesday January 07, 2004 @07:43AM (#7901753)
    Sorry but no is doesn't, I use outlook at work and i have to allow mine to return a reciept, if i cancel the request nothing is returned to the sender

    But if you reeive an HTML message that includes an IMG link to the senders' site, when Outlook displays the image (even if it's an invisble 1 pixel one) they have your IP. There are ways to block this, but it's on by default. Spammers use this to verify your address.

  • Re:I think... (Score:3, Insightful)

    by Kirill Lokshin ( 727524 ) * on Wednesday January 07, 2004 @07:43AM (#7901754)
    There's an option to automatically send them back, though. I think this may have been turned on by default in some older versions of Outlook Express, so it's quite possible for someone unaware of that to send out receipts without knowing.
  • by etymxris ( 121288 ) on Wednesday January 07, 2004 @07:44AM (#7901759)
    Is it when he offered a "business relation" in exchange for fixing the problem? Or was it when he threatened to disclose the flaw? Or was it merely because he wanted money in return?

    Had he just disclosed the flaw, would he more or less a criminal, ethically and legally speaking? It seems that worse would have come if he had simply published the flaw right away.

    Was he justified in asking for compensation for his findings? If not, this seems to obligate us to "work for free" when discovering such a security problem.

    What do others here think?
  • suit talk (Score:5, Insightful)

    by broothal ( 186066 ) <christian@fabel.dk> on Wednesday January 07, 2004 @07:45AM (#7901762) Homepage Journal
    This is just a case of bad journalism. Of course, there are many methods of getting the IP of the receiver of an email The most common is a webbug (a link to an image on a server you control), but that requires for the culprit to use a mail client that renders HTML.

    "Internet Protocol Address Verifyer" sounds like something you'd find in a Movie OS. Of course, like all other buzz words, the name is not related to the alledged function.

    They either used a webbug, og checked the IP in the header of the mail he sent with his claim.
  • by ComaVN ( 325750 ) on Wednesday January 07, 2004 @07:47AM (#7901767)
    They tracked mail sent to the address, not received from it.
  • by bwalling ( 195998 ) on Wednesday January 07, 2004 @07:48AM (#7901770) Homepage
    They got a warrant BEFORE they used the program. Whatever the program did - read information from his PC or just return IP address - it was a valid, legal search. We should be considering this a victory for our rights. The only way I can see anyone complaining about this is if the warrant was improperly obtained, but it seems entirely reasonable to "search" the email address that has been attempting blackmail.
  • by Bruce J L ( 693697 ) on Wednesday January 07, 2004 @07:51AM (#7901781)
    They probably just read the mail headers as soon as he replied to the letter they sent him. From this and the time the email was sent they probably had no trouble asking his isp for the user information. Criminals are not always the smartest apples and he probably didnt even have a way to crack the website.

    If he wasnt clueless he would have used a dummy email account and checked it via rental computer or at the very least a dial up account using *69 ( which can still leave your number ) and a prepaid credit card / gift card.

    This guy reminds me of the old irc script kiddies who would do things from their house and wonder how they were tracked down. While anonomyzers are available it makes me wonder if he,

    a. used one
    b. had used a computer before

    As to the FBI ip verifier i find it hard to believe they have anything more advanced then the current jscript / asp / log parsers to pull ip information.

    AFIK the absolute most a email address can yeild is the ip of the server. However with the email headers im sure you can get a ip without too much trouble with a warrant.
  • by SomethingOrOther ( 521702 ) on Wednesday January 07, 2004 @07:53AM (#7901792) Homepage

    Internet Protocol Address Verifier? Is this Carnivore in action?"

    That'll be a tiny 1x1 pixel gif embeded in a HTML e-mail called from the feds server.(AKA web bug... You cant turn off HTML in M$ LookOut and this dude dosent sound very clued up)

    Presto, the feds know who opend the mail how long they looked at it etc etc etc.

    A top tip (tm) is to embed a web bug in a job aplication e-mail. Its interseting to watch your aplication being pushed around various departments and see who actually reads it.

  • Webmail (Score:1, Insightful)

    by WestieDog ( 592175 ) * on Wednesday January 07, 2004 @07:58AM (#7901811) Homepage
    I guess the lesson we can learn here is that if you are going to extort, use a webmail service like yahoo. (unless it really was carnivore in action, then who knows if it would help)
  • by UnknowingFool ( 672806 ) on Wednesday January 07, 2004 @08:00AM (#7901823)
    When legitimate security people point out bugs and holes, they get treated like scum and are threatened with law suits. So whats the best thing to to? Threaten the companies with money. Even if 0.1% of the companies gave in, it still is a way of making money

    Although the article is not very detailed in this aspect, his actions do not speak of someone trying to help BestBuy. Some of the info is not released due to security concerns and pending litigation but this seems more like a black mail scheme more than anything else. If he was serious about helping BestBuy, asking for money ($2.5 million) sent the wrong message because the mafia also used terms like "business relationship" and "offer they can't refuse" when shaking down people as well. Until we know more, all we know is that he said enough in his emails that BestBuy and government thought he was threatening.

  • by Anonymous Coward on Wednesday January 07, 2004 @08:01AM (#7901828)
    You aren't being paid to find their bugs and holes. What right do you have to demand money for it? Its one thing to be a nice guy and point something out, its another to be a criminal and you don't seem to understand the difference.

    Hint: Extortion/blackmail is criminal activity which should be and is punishable under the law.
  • by mumblestheclown ( 569987 ) on Wednesday January 07, 2004 @08:06AM (#7901845)
    When legitimate security people point out bugs and holes, they get treated like scum and are threatened with law suits. So whats the best thing to to?

    Do nothing and MYOB. If companies lose substantial amounts of money because of lax security, then they will do one of two things:

    • improve their security / invest more in security
    • go out of business and/or be less competitive.
    in either case, the consumer wins (as in case 2, more competitive companies will spring up to take their place).

    If, as it turns out, that external security consultants are the way to go, then such companies will engage in a business relationship with one of dozens if not hundreds of world class security firms.

    What we don't need is whiny "independent security researchers" doing what amounts to unprofessonal blackmail attempts ("let's establish a 'business relationship' or I spill the beans.) Computer tresspass is computer tresspass. We don't need to revise trespass laws to improve security - we need companies to go to legitimate security firms and use their tiger team services and so on.

  • by orthogonal ( 588627 ) on Wednesday January 07, 2004 @08:06AM (#7901848) Journal
    Somehow, this power accumulation and surveilance (sic) reminds me of Senator Palpatine. I just hope I'm wrong.

    Huh. It reminded me of Stalin and Beria and the NKVD, but you're right, better we should take our lessons from space opera than from history.

    George Lucas's fertile imagination is so much more convincing than those ponderous, dusty history books. And you can't eat popcorn and jujubes while reading books, it gets the pages too sticky.
  • by DrSkwid ( 118965 ) on Wednesday January 07, 2004 @08:20AM (#7901889) Journal
    >if this is the case then this simply re-enforces my belief that criminals are some of the stupidest on the planet.

    clever criminals don't get caught so you don't hear about them

    FBI Files and COPS tend not to show you cases where the perpetrator outwitted the victims *and* the police *and* the FBI.

  • by revmf ( 653007 ) on Wednesday January 07, 2004 @08:31AM (#7901934)
    Yeah but since PATRIOT, everything is a valid search...
  • by jellomizer ( 103300 ) on Wednesday January 07, 2004 @08:37AM (#7901961)
    Exactly, Everyone goes into a big sniff when the FBI is using Carnivore or whatever else. But as I see it the Bad Guys have the same type of tools just under many different names. Your phones can be tapped, there could always be an agent listing into you conversation out in the street, you home can be bugged, and now they monitor your internet connection. This is not a change in our privacy, basically by law when ever the government get a warrant (A warrant is issued when their is probable cause) the officials can invade our privacy. Now the FBI neither has the Manpower or the money to monitor everyone on earth or even the USA or Even New York. So they go after who they expect are the trouble makers. Now the Bad Guys who have their collection of smaller tools who can do the same thing will be targeting after the common folk because they don't care what damage is done, Plus they are a lot more of them then the FBI.
    So who would you rather have spying on you. The FBI who has to deal with Tons of paper work to even start spying on you then needs to make a strong case that you are a criminal, worthy of prosecution. Or some random Hacker/Cracker guy who just randomly found your IP address and spies on you. Then is willing blackmail you into whatever morally questionable thing you do on the internet (say your job is a minister and you have been viewing adult porn sites (Which is legal but you don't want it to be public)).
    I much rather have FBI spying on me and then realizing well he is not doing anything illegal. Compared to a random hacker going, Ohh I bet he doesn't want people to know that he does that.
  • by kmeson ( 165278 ) on Wednesday January 07, 2004 @08:38AM (#7901963)
    We are to believe that this guy is savvy enough to spoof his email headers so that his email address can't be traced, but not smart enough to turn off receipt verification and HTML rendering in his email program.

    You have to realize that we are getting our information about this incident from a NEWSPAPER, which the very least reliable source for technical topics. Remember this [slashdot.org] clueless newspaper article?

    I'd say we know little about what actually happened here.

  • His Email Address (Score:2, Insightful)

    by Anonymous Coward on Wednesday January 07, 2004 @08:42AM (#7901984)
    You guys are forgetting that for Best Buy to be able to contact him, he'd almost certainly need to leave an email address. Unless he did so with an address hosted in a foreign country, they could have just searched his email provider's server logs and gotten his IP address that way.
  • Re:Webmail (Score:5, Insightful)

    by tunah ( 530328 ) <sam AT krayup DOT com> on Wednesday January 07, 2004 @08:51AM (#7902011) Homepage
    Uh, the likelihood is that it was a web bug, in which case webmail won't help - the request comes from your browser, and thus IP. In fact, webmail makes it worse, because a lot of email software can disable web bugs or can't display them to begin with, web browsers don't tend to disable loading remote images ;-)
  • by reallocate ( 142797 ) on Wednesday January 07, 2004 @08:53AM (#7902020)
    This is not surveillance. This is just identifying the IP address of the recipient of email. Seems to me that's rather similar to using ping or whois. IP addresses and domain registrations are public, not private.

    It's also rather similar to your local mail carrier knowing where you live. Is that surveillance, too, or are you simply paranoid?

    If Best Buy had received the same threat via snail mail, and the FBI looked at the return address on the envelope, would you be screaming about surveillance?

    The Internet is not some mystical land that exists apart from reality and the law, contrary to the constant stream of silly /. posts that sxeem to believe otherwise. Get over it. The Internet is not special and people don't get a free pass because they use it for criminal behavior.

    Next time, please think bekore exposing yourself as a paranoid llon, OK?

  • by Sycraft-fu ( 314770 ) on Wednesday January 07, 2004 @09:03AM (#7902056)
    without their permissions you are a criminal, both legally and morally. My stuff is my stuff and I'll thanky ou to keep your hands off it. If you wish to audit anyhting I have, physical or virtual, you'd better ask my permission first, or you'll face consequences.

    This seems perfectly reasonable and there is plenty of precident in the physical world:

    My house has many known security flaws. The largest would be the windows. They are easily broken with just a rock, allowing access. My door would also be a flaw, it's solid, but nothing a battering ram in experienced hands couldn't break down in a few minutes. My lock is aslo a flaw. IT's better than most, a high security lock that is much harder to pick than normal, but it still is pickable.

    So, if someone breaks into my house and demands money to fix it, should I honour that? No, I'd by perfectly jsutified in holding them at gun point and calling the police to have them punished. Regardless of thier intent, it's MY house and you'd better not enter it without my permission.

    It is similar for computer systems. If I pay you to hack my stuff and report on it, great. YOu are providing a valuable service and I thank you. IF you break into my stuff without my permission, you are a criminal pure and simple.

    Also, demanding money ex post facto is something else we have a law against, it's called balckmail and is illegal.

    Look, if you want to find flaws in stuff, do it legally. Contact the owner and ask if you may hack them. If they say no, move on. IT is not your duty or right ot mess with their stuff without permission.
  • by Sycraft-fu ( 314770 ) on Wednesday January 07, 2004 @09:10AM (#7902074)
    Look, if you have a peice of software and you hack it on your own systems and/or network, that it leagal. You then publish teh exploit, also legal. However if you come and hack MY network without my permission, that's NOT legal.

    People who illegally break into systems deserve no more respect or consideration than people who illegally break into houses. You have no right at all to enter or use other people's property without their permission. Don't pretend like because it is a computer system that makes it any better.

    IT's like lock picking. IF you want to learn to pick a lock and find out its venurabilities, go right ahead. But do it on a lock you own. But the lock in question and play with it. To go to someone else's house and try on their lock without permission is illegal and immoral. You've no right to mess with their property.

    So if you get asked/hired to test someone's security (physical or virtual), great. Do what you can and give them a report. If you have something you own (physical or virtual) and you discover a security flaw, great, make it known so a fix can be developed. But do NOT presume you have the right to invade the property of others. It doesn't matter if it is venurable or not, it's not yours so you keep out.
  • wont last long (Score:4, Insightful)

    by gad_zuki! ( 70830 ) on Wednesday January 07, 2004 @09:10AM (#7902077)
    The #1 tech support issue after Office 2003 comes out:

    "Where the heck are my images? Please make it act like the old Outlook."

    Its good MS is doing this by default, but most users couldn't care less about security/privacy especially when it inteferes with "purty pictures."
  • by Wolfrider ( 856 ) <kingneutron@NOsPAm.gmail.com> on Wednesday January 07, 2004 @09:16AM (#7902097) Homepage Journal
    --You know, if this had happened to Joe Private Citizen, the police / FBI would likely have done... Absolutely Nothing. Or at least, not in time to meet the extortion deadline. Maybe they'd send a guy around and get to it in a month... or six... or maybe not.

    --But since it's Best Buy (big corporation) the Issue gets Handled.

    --Respond, don't mod pls.
  • Re: Hmmmm... (Score:5, Insightful)

    by dipipanone ( 570849 ) on Wednesday January 07, 2004 @09:20AM (#7902115)
    However, a friend in a position to know tells me that the typical criminal is incredibly stupid.

    I presume that your friend is referring to the typical criminal who is regularly apprehended? Unless he's actively involved with successful criminals, how would he know how stupid or otherwise they actually are?

    This is one of the things that makes me laugh about law enforcement. When you hear them being interviewed on Cops or some such rubbish, they're always going on about how dumb these losers are -- not realizing that it's only that group who are dumber than they are able to catch. Epidemiologists refer to it as the clinician's bias. Because doctors only see sick people, they assume everyone is sick.

    When they want more resources or additional powers though, they go on at great length about how cunning and sophisticated modern criminal organizations are, and how these new measures are essential to capture them and make the world safe for mom and apple pie.

    The truth is that criminals are just like the regular population. Some are smart, some are dumb and some are just average.
  • by jglazko ( 56166 ) on Wednesday January 07, 2004 @09:27AM (#7902145)
    Ummm.... Regarding the six items listed above, how do we know that's not *exactly* what happened here? It seems like it would be very easy for somebody to have wardriven/proxied their way into some poor schlep's system and used that. Not saying that it did happen, but something to consider.

    German law used to require actually catching the perpetrator in the act (see Cliff Stoll's "The Cuckoo's Egg"). When I see cases like this, I start to understand that reasoning more. Not that I condone breaking down doors, or that it is even necessary, in order to catch black hats!

    I'm sure there's more than meets the eye to what we're hearing here in the masses (and hopefully more than just a GIF bug!). Hopefully more will become public knowledge.
  • Obviously you have never lived in a country that kills its OWN citizens. Obviously you haven't heard of the totalitarian regimes in Germany, USSR, and USA's close friends Saudi Arabia and Egypt. Obviously you haven't heard of the damage done to civil rights activists in the 60's by the FBI and the CIA. Obviously you have never been targetted by the police. Obviously you are not a minority man (particularly black) living in some parts of USA. Obviously you haven't heard of the infiltration of the FBI by organized criminals (particularly the Italian mafia in the 60's and 70's). Obviously you haven't heard of police fabricating information and jailing people. Obviously you haven't heard of the government cooking up bogus charges and jailing people. Obviously McCarthyism is not part of your collective mind. Obviously you haven't heard of John Ashcroft's recent decree to spy on antiwar activists. Obviously you believe the legal system represent justice....Obviously you underestimate the power of the goverment.

    So to answer your question, I would rather have some guy off the street spying on me than the goverment ANY DAY OF THE WEEK! There is something that you don't understand about the government--any government. Governments are far more powerful than 1000 people put together! They have immense power. The illusion of a legal system--which IS an illusion--does not change any of this. One just needs to look through the history of the government that you live under to see what I mean (I picked USA but you can pick any govt).

    Sivaram Velauthapillai
  • by fruey ( 563914 ) on Wednesday January 07, 2004 @09:37AM (#7902188) Homepage Journal
    This works though (IP Address Verifier [google.com]).

    Dumb journalist converting IP to Internet Protocol to make it look like he's technosavvy

  • by reallocate ( 142797 ) on Wednesday January 07, 2004 @09:41AM (#7902211)
    Similar extortion threats to individuals have been reported and are being "handled" by the authorities. You've no grounds for your post; it's based solely on your own preconceptions and prejudices.
  • Double Standard (Score:5, Insightful)

    by delcielo ( 217760 ) on Wednesday January 07, 2004 @09:42AM (#7902213) Journal
    We applaud the hackers who so cleverly get around protections on technology. We had our "Free Kevin Mitnick" and "Free Dmitry" campaigns.

    Here is a nice hack done for a good reason by the same law enforcement that is supposed to investigate and stop such crimes as extortion. And how do we react? Government spying! Conspiracy!

    Really. That's just not very reasonable on our part.

  • by silverbax ( 452214 ) on Wednesday January 07, 2004 @09:47AM (#7902238)
    I've actually run into this issue a few times. The action I've taken in the past pretty much directly relates to the severity of the security flaw. For example, I've seen URL hacks which allow you to grab another customer's credit card information, and then some which allow only address information.

    My rule of thumb is that if a piece of information can be obtained and tracked to a specific individual, it's dangerous. That's the rule I use in my work as well.

    When I decide the situation warrants it, I send a professional, formal email to the company ( also the web admin if there is one ), stating what I found, screenshots and leave it at that. Sometimes I will point out that I intended to place an order, but halted when I saw the issue. I also let the company know they may contact me if more information is needed.

    This is what has happened in the past following these emails:

    1. Almost all companies send me an email thanking me and letting me know the problem has been corrected, and it has been. Case closed.

    2. I get a nasty email from the company ( usually this is with SMALL operations) telling me to take my business elsewhere. At first I would attempt to politely explain the risk, but soon realized that some sites have no intention of listening to me, and gave up. In that case, I may notify the BBB or other organization just to get someone else on their tail. I don't have time to chase down other people's security holes, so the best I can hope for is to let others know.

    In any case, I always use the Enron rule: What if I later had to explain my actions to a grand jury?
  • by petard ( 117521 ) on Wednesday January 07, 2004 @09:47AM (#7902240) Homepage
    The problem with an embedded image bug is that if the recipient views the source of the email -- and presumably this alleged extorter is a techie -- it's easy to spot such a bug, and so there's a real risk that including a bug would tip him off to the investigation.

    Only when you're doing mass mailings. If it's targeted, it is indistinguishable from a standard image... e.g.

    http://corporate.bestbuy.com/images/corporatelog o. jpg

    could be a web bug if you only send that URL to one person. The reason it's more obvious in mass mailings is because they require a unique identifier to have something to map back to the email address such that they can verify the address as live.
  • by pummer ( 637413 ) <spam&pumm,org> on Wednesday January 07, 2004 @09:54AM (#7902283) Homepage Journal
    Joe Private Citizen doesn't have other people's credit card numbers and information stored on his website.
  • by jallen02 ( 124384 ) on Wednesday January 07, 2004 @09:55AM (#7902284) Homepage Journal
    He did say webmail, implying a webmail application, not a local mail app :)

    Jeremy
  • by BenBenBen ( 249969 ) on Wednesday January 07, 2004 @09:55AM (#7902291)
    Outlook 2003 has the option to both disable HTML and to disable loading of images, specifically aiming at web-bugs. Stop basing all of your opinions on 1997 era Outlook Express.

    Obviously I just defended MS against outdated and uninformed /.ers, so this will be marked as trolling.

    I think you'll find this was carnivore's "chain of evidence" feature in operation, and guessing at how they verified the recipient IP won't do you much good. Remember that NSA still measure computing power in acres.
  • by ryanvm ( 247662 ) on Wednesday January 07, 2004 @10:03AM (#7902316)
    I have a better idea. Wardrive for 15 minutes downtown until you have a 100% anonymous IP address. Good luck tracking that down.
  • by Glamdrlng ( 654792 ) on Wednesday January 07, 2004 @10:05AM (#7902325)
    I think the behavior of the alleged hacker speaks volumes. Consider the following snippets:

    According to the indictment, Ray made the e-mail demands to Best Buy under the name and Internet address of "Jamie Weathersby, IPC Corp." According to an FBI search warrant, the first e-mail demand came on Oct. 16. It said there was a flaw in Best Buy's Web site that would allow the sender to "review all customer accounts and assume complete ownership of www.bestbuy.com by moving it to another register or server."

    OK so right off the bat we're not talking about a security hole in Best Buy's systems; rather, someone's threatening to hijack their DNS registration.

    The search warrant, which had been kept under court seal until this week, said a Best Buy employee attempted to respond to gain more information from the sender but could not locate any firm called IPC Corp.

    Yah, contacting a company and requesting 2.5 mil in exchange for fixing a nonesistent security hole while claiming to be affiliated with a nonexistent company is always sound business.

    A second e-mail came the next day offering "a step-by-step summary of how we were able to penetrate your Web site" for $2.5 million. If Best Buy did not agree to the deal, the e-mailer said he would list all of Best Buy's customers and their credit card numbers on BestBuy.com.

    And now the story changes. This isn't a whitehat trying to get compensated for their assistance. This is extortion and dishonesty at its finest, and this tool is such a disgrace he makes script kiddies look good. Shame on any of us who feel sympathy for this guy.

  • Re:I think... (Score:4, Insightful)

    by schon ( 31600 ) on Wednesday January 07, 2004 @10:13AM (#7902365)
    What if his ISP uses a webcache or webproxy? The feds wouldn't get much info out of that.?

    Why not?

    They'd get just as much information from the IP address of his ISP's web server as they would from his actual IP address. (Hint: Your IP address does _not_ typically broadcast who you you are, it announces who your ISP is.)

    Even with the IP address of the user, they'd still have to subpoena the ISP to get the user account information - which the ISP would have to look up in their logs. If they got the IP address of the ISP's proxy, the ISP would simply look in the proxy logs first.

    Now, if the user was uing an off-shore open proxy (say in Asia somewhere) then they might have a problem.

    all new versions of outlook (including XP SP2d versions) will not serve up remote assets in HTML emails unless specifically instructed to do so.

    Well I guess that he wasn't using a new version of Outlook then.
  • by the_mad_poster ( 640772 ) <shattoc@adelphia.com> on Wednesday January 07, 2004 @10:15AM (#7902375) Homepage Journal

    Computer trespass is computer trespass.

    I'm so sick of this crap, I don't even know where to begin.

    Best Buy is NOT the entire Internet. Best Buy's security problems could potentially be used to inconvenience or incapacitate innocent sites nearby or, even, innocent sites with no connection to Best Buy whatsoever. Best Buy has a responsibility to fix their security problems when they're made known. If Best Buy's lumbering managerial morons see fit to ignore contacts and help offers, there is nothing wrong with exposing Best Buy's problems to force their hand (blackmailing them is a totally different story).

    This ridiculous attitude with these clueless businesses is tantamount to politely telling someone their fly is unzipped and getting your nose punched in gratitude (as the person continues to wander around with the fly unzipped, punching people who are trying to help them). If you find a security problem, you let them know about it. If they ignore you, you let everyone else know about it to force their hand. It's not like if someone who's looking to cause trouble right off the bat is going to give a warning shot over the bough and let them prepare. Hmmm... say I'm poking around a form on a popular retailer's website and accidentally type in a "funny character" and submit it. What's this? SQL error? Oh? I guess I should just keep my mouth shut, right? I shouldn't bother to try and report this glaring vulnerability? After all, I have no obligation to their customers, and, since I have no moral compass at all, I shouldn't even think of those poor, trusting fools, right? Give me a break...

    ...we need companies to go to legitimate security firms and use their tiger team services and so on.

    You're a real riot. Are you on one of these "tiger teams", perchance? Mad because all your training doesn't amount to a hill of beans more than someone with a lot of book reading and practice and they're stealing your business by giving out free advice? Or do you just not know what you're talking about? I assume that you believe these "tiger teams" are infallible and could never make a mistake? I guess that once someone goes to a security firm, there's no possible way someone could miss something or something could change after the audit and review? I guess the "tiger team" couldn't possibly have someone on it that has, for some reason, not been acutely focused on the task at hand due to illness, fatigue, personal issues, etc.? I guess this "tiger team" has experienced every possible security problem there will ever be and has taken steps to eliminate all of them forever and there's no possible way a hole will ever be found that they didn't already psychically perceive and patch?

    in either case, the consumer wins

    I guess the consumer wins when their credit card number, name, and address get stolen too, right? I know that last time MY credit card number got stolen thanks to an utterly stupid retailer, I was REAL pleased about it. In fact, give me your address, I'll mail you all my credit cards and photo id because it's so great when people get them that shouldn't have them.

    Here's your passport, sir. Welcome to the real world. Please do try to fit in in some capacity. A good step would be to stop suggesting that knocking the lock off someone's door and walking into an unprotected computer system are the same thing. People who actively break secured systems without invitation are one thing, people reporting obvious flaws or a total lack of security in general are another. Stop lumping them altogther as "computer trespass".

  • Re:Double Standard (Score:2, Insightful)

    by Rostin ( 691447 ) on Wednesday January 07, 2004 @10:16AM (#7902379)
    Yes, but since when has reason been the hallmark of the Slashdot community? It's News for Nerds (when we're lucky). Even though most nerds pride themselves on their intelligence above all else, the smarts are frustratingly limited to technical topics in many cases. If it had been MY $2.5M, you can believe that I wouldn't say to the FBI that I forbid them to use their l337 skills because of my philosophical conviction that the government has too much ability to snoop. I think the same is probably true for most people, regardless of how loudly they whine.
  • by spiritgreywolf ( 683532 ) on Wednesday January 07, 2004 @10:35AM (#7902493) Homepage Journal
    This is another reason I like reading /. You guys give me a good whack on the side of the head on nearly a daily basis.

    I read this and was foolishly thinking (probably like many do) that "oh, if I don't download an attachment and execute it there really is no danger. I mean really, if I don't "run" anything, how would anyone know?"

    Silly wabbit is right. It's another case myself of not being able to see the forest for the trees.

    I guess ANY HTML email can be malicious in a sense that it can snarf info if it actually interprets and points you to ANY website when you read it in its rendered state.

    Talk about eye opening. I'll bet 90% of the general public don't actually realize this can easily be done for targeting purposes. With this in mind it's probably not hard (and don't flame me for not knowing this guys) but targeted spam in order to verify addresses could point to "specially coded" .gif files where a server-side plugin can compare the requested .gif to a known email and verify "yep - that addy is active" - even when most people ignore the unsubscribe links.

    "The aspects of things that are most important to us are hidden because of their simplicity and familiarity" - Ludwig Wittgenstein
  • Your attack gets cc info from one store. This guy claims he could get it for everyone using the website. Which is the bigger problem?

    Interestingly, the article does not mention if there was an actual security flaw or if they fixed it. I would guess that in the process of arresting this idiot they confiscated his computer and can see what tools he was using. If he was very "professional" about his demands he might have had the document describing the exploit all ready to go, so he could send it to them as soon as the $2.5 million showed up in his bank account.

    So was there an exploit? This is some pretty shoddy reporting if they are going to simply trumpet what the FBI did without investigating whether this guy posed a serious threat or not.

  • by rearl ( 262579 ) * on Wednesday January 07, 2004 @10:55AM (#7902599)
    Of course, this only works for people crazy enough to open emails in a program that accesses the web for content. Text-based email readers are obviously the way to go when sending threats _and_ opening email!
  • by cayenne8 ( 626475 ) on Wednesday January 07, 2004 @11:10AM (#7902703) Homepage Journal
    Geez...what a pin head. Why didn't he just set up a nym account. Email bounces around the world a few times, with headers stripped on every bounce. Virtually untraceable. Heck, at the end, he doesn't even have to recieve the email back. Just have the last encrypted message posted to a USENET group for anonymous messages....pretty much impossible to ferret out, and only he could decrypt it.

    The guy was smart enough to try to break the site, and he couldn't figure how to get/send email without being traced??? And why would he use anything but plain text email either? And probably using Outlook? He was asking for it...

  • Re:I think... (Score:3, Insightful)

    by jrockway ( 229604 ) <jon-nospam@jrock.us> on Wednesday January 07, 2004 @11:14AM (#7902720) Homepage Journal
    Don't worry, morons will turn it on after their daily pr0n/e-cards don't work anymore.
  • by ratboy666 ( 104074 ) <fred_weigel@[ ]mail.com ['hot' in gap]> on Wednesday January 07, 2004 @11:26AM (#7902802) Journal
    WTF?!?

    -- You need to think about what "property" is --

    *You* put resources on the Internet. Obviously, for *some* reason.

    Normally, the reason you would do that is to provide some service to users. Usually anonymous, given that this is the Internet, and not your private Intranet. If you want it private, don't put it on the Internet.

    And, in putting in on the Internet, the resource is available for use.

    What you *haven't* done is contracted with *me* as to how to use the service or resource.

    Let's put this in simpler terms -- if you have a 20 dollar bill in your pocket, it's yours. If someone takes it that's probably theft.

    If you put the same bill out in a public place (say, on a public sidewalk) and then go away, and someone takes, it's probably NOT theft.

    When does a resource stop being the "property" of someone? The simplest answer is when they have no control on that resource. Another /may/ be when the police do not need a warrant.

    Currently, legislation is trying to make a distrinction between "authorized" and "unauthorized" use of such a service or resource. "unathorized" if the provider of the resource doesn't like the way its used. [Of course, that's very slippery slope.]

    Ratboy.
  • by dclydew ( 14163 ) <dclydew@gmail.com> on Wednesday January 07, 2004 @11:29AM (#7902826)
    He was smart enough to claim he could break the site. This isn't the only corporation that "Jamie Weathersby" threatened... yet, I don't know of a single threat that was sucessfully carried out.

    Do a Google on Jamie Weathersby and you find he was also involved in some rather nasty cybersquatting attempts.

    Dumb, Dumb and Really Dumb
  • by Mandomania ( 151423 ) <mondo@mando.org> on Wednesday January 07, 2004 @11:46AM (#7902964) Homepage
    Close, but no cigar.

    A business website isn't like a personal residence. It's a store. Let's think of it like one.

    Imagine a brick-and-mortar store that you frequent, say, Best Buy down the road. And let's say that one day, after spending some hard-earned cash at Best Buy you decide to drive around the back of the store as a shortcut out of the parking lot.

    On your way out, you see a filing cabinet sitting outside the Back door of Best Buy. The top drawer is pulled out and there are papers spilling out.

    Now, you're not a nosy person. And under normal circumstances, an open filing cabinet would not be an invitation for you to start rifling through things that aren't yours. But this time it's different. It's sitting out in the open, for anyone (that happens to drive around back) to see and/or steal.

    Maybe the papers are trash, but maybe not. Maybe they're HR papers. Maybe they're customer records. Who knows? What do you do?

    This contrived case is pretty black and white, but it proves the point that businesses are different than personal residences and should be held to a different standard.

    I'm not saying that this Ray guy isn't a blackmailing idiot; I'm saying that if I went to BestBuy.com and typed "select * from cc_info" in a comment box and got back 10,000 rows of credit card info I'd be morally obligated to tell them about it. You can Costanza my actions all day long ("Was that wrong? Should I have not done that?), but the truth of the matter is that something that should be secure ISN'T and it needs to be fixed.

    --
    Mando
  • by insensitive claude ( 645770 ) on Wednesday January 07, 2004 @11:48AM (#7902980) Journal
    This isn't the only corporation that "Jamie Weathersby" threatened... yet, I don't know of a single threat that was sucessfully carried out.

    Uh, yeah... The ones who do pay off blackmailers (and it does happen) don't generally advertise it. When a corporation is successfully extorted, it tends to stop there, unless the bastards ask for a second ransom.

  • by Quantum-Sci ( 732727 ) on Wednesday January 07, 2004 @11:58AM (#7903069) Homepage
    Didn't you notice the new subpoenaless powers just given to federal authorities in December?

    Do you have any idea how much power has been taken away from the Judiciary in the past three years, and been given to the Executive branch?

    Have you not noticed the new redistricting, combining Dem districts, and splitting Repub districts? Greatly reducing Dem numbers in Congress? The normal 10-year (agreed) redistricting was re-redistricted after elections that gave Repubs control -- it's a Tom DeLay program. One redistricted precinct in PA was actually shaped like a finger pointing at the home of a Dem congressman. Regardless of your views, do you think a monopoly is the best system? Depending on one source for your food/car/job/news/govt/etc? Because that's where we're going now at breakneck speed, Bucko.

    Are you not aware that Gen. Tommy Franks recently said that in the case of another major attack, the Constitution may have to be suspended [workingforchange.com]. So who decides? Hasn't America been through some pretty tough times without suspending the Constitution? Do you have any idea what all of this really means?! Surely you haven't actually thought this through.

    There has recently been historic undermining of the US Constitution, intentionally promulgated by the ruling Party, which is bringing us to dictatorship.

    You can't cover this up with charges of "paranoia".
  • Me Too. (Score:3, Insightful)

    by battjt ( 9342 ) on Wednesday January 07, 2004 @12:09PM (#7903165) Homepage
    I've found crimes that I could commit that would result in a couple million dollars payout, but would result in me leaving the country and being on the run. I think I could do it, but I also think that the life style would be uncomfortable at best. (I have a wife, kids, close family, friends, and toys that I'd have to leave behind.)

    I am well on my way to making the couple million I would have stolen (spending along the way, so I will miss the one time big pile 'o money) with a comfortable, respectable life style not on the run from authorities.

    I see in the paper guys going to jail for robbing a video store. Is jail worth a couple hundred bucks?! The risk/reward is lousy for theft. I don't understand what they ar thinking.

    Joe
  • Re: Hmmmm... (Score:3, Insightful)

    by TheLink ( 130905 ) on Wednesday January 07, 2004 @12:17PM (#7903238) Journal
    A number of the smart ones probably realize that with their brains and amorality, there are plenty of legitimate ways of getting the same amount of money for a lot less risk.

    Many of the smart ones who still prefer criminal means may indeed be smart, but after a while they get lazy, sloppy, greedy or overconfident and then they risk getting caught. After all, planning the perfect crime can often be quite hard work.
  • by fubar1971 ( 641721 ) on Wednesday January 07, 2004 @12:18PM (#7903243)
    The FBI who has to deal with Tons of paper work to even start spying on you then needs to make a strong case that you are a criminal, worthy of prosecution....

    This is not necisarilly true. If the FBI wants, they can use the Patriot Act (where applicable, which is almost everywhere), to spy on you with out obtaining a warrant.

    Now the FBI neither has the Manpower or the money to monitor everyone on earth or even the USA or Even New York.

    This is of course why the Patriot Act gives the Feds there new powers. Of course the counter to that argument, is...

    Now the FBI neither has the Manpower or the money to monitor everyone on earth or even the USA or Even New York.

    Oh well, at least that caught a scum bag :)
  • by jeko ( 179919 ) on Wednesday January 07, 2004 @12:21PM (#7903275)
    *sigh*

    Yet another geek who thought History class wasn't worth his time...

    Do yourself a favor. Google "J. Edgar Hoover" and then "Nixon." Read about it for awhile. If you still think the FBI is staffed entirely by Mulder, Scully and Starling, Google, oh pulling one notorious name out of the air, "Pinkerton," and pay close attention to how they often co-opted law enforcement.

    The Short Version: The Founding Fathers gave law enforcement very limited powers for extremely good reason.

  • by steve_l ( 109732 ) on Wednesday January 07, 2004 @12:34PM (#7903383) Homepage
    Its not as good as you think. For example, all java apps are mapped to javax.exe and java.exe; no control of the app within. Similarly, the technique of codeinjection exists to run your malicious code in the process space of IE, just to bypass those firewalls.

    But I suppose the combination of real OS and per-app firewalls could make sense...
  • by ad0gg ( 594412 ) on Wednesday January 07, 2004 @12:40PM (#7903423)
    Ads say someone could steal your identity and you'll have no idea they did unless you pay $60 for their credit alert system that notifies you of changes on your credit report. Thats real extortion, credit agencies sell your info which then in turn used against you but the only way to protect yourself is buy service from them. Seriously what did this guy really do? He claimed to find a bug in bestbuy's system. And asked for money otherwise he would make it public. Is that so wrong? Hell to get off DMA mailing list I have to pay, either online with $ payment or by mail cost of the stamp and envelope and my time. They'll keep filling up your mailbox with their junk till you pay. Or phone companies that sell you antitelemarketer service, they are ones selling your phone number to the telemarketers. Or new cars now adays that have check engine light and annoying beep that comes on when you need to change your oil, if you change it yourself, the light still comes on, you need to take it to the dealer for them to reset the ECU.
  • by silverbax ( 452214 ) on Wednesday January 07, 2004 @12:46PM (#7903465)
    I think I need to add something here. I have already done this several times without fear of prosecution. Prosecution? Please. There are buildings full of attorneys that would LOVE to get my case if somebody came after me for making a legitmate consumer complaint. Me, a small customer, tries to place an order on Big Company's website and, being a computer professional, notice it's insecure; I notify the company and they would try to prosecute me? That's not only silly, it's incredibly bad business. That just takes a non-issue and puts it on CNN or 60 Minutes. This isn't like cracking the encryption on a DVD or hacking through a firewall. This is a legitimate consumer complaint. Believing that Big Company is going to try and pin me as a cracker would take more resources ( and more problems when people actually DO get hacked ) than trying to extinguish me. I'm much more concerned they'll just ignore the problem.

    The reason I have no fear is documentation. I have full records of everything I've done and did not do. I have every email I've sent. Other organizations also have records. I've told them ( the company) how to contact me if needed. What kind of 'cracker' prosecution is going to hold up against that? I've worked in corporate management before, and documentation is the most difficult thing to combat. Look at the case with SCO. If SCO can't produce evidence against IBM, their case is done. Period. That's documentation in action ( or lack of it in action, more than likely. )

    Don't give me a bunch of case histories about companies crushing the individual. It happens, but I'm pretty confident that those individuals were fighting the company in some form. I'm not, and as I said, I turn the information over to other organizations ( FBI, SBI, whatever. ). You can toss out paranoid ideas all you want. I'm speaking from experience. I've done this at least a dozen times.

    Most companies are aware there are "white hats" as well as "black hats", because most companies have tech people on their own staffs. What terrifies big companies is NOT that someone is going to blackmail them. Anyone who tries that WILL GET CAUGHT. What actually scares the heck out of big companies is that someone will start stealing identities and credit card numbers from their warehouse AND IT WILL MAKE THE NEWS. That's their motivation, not crushing me for complaining. When you return something to Best Buy, is it their policy to hit you with a baseball bat and yell at you with a megaphone until you leave?
  • by DavidBrown ( 177261 ) on Wednesday January 07, 2004 @12:47PM (#7903470) Journal
    If you put the same bill out in a public place (say, on a public sidewalk) and then go away, and someone takes, it's probably NOT theft.


    Technically, it's either larceny or embezzlement. The money is not yours. If you pick it up intending to keep it for yourself, it's theft. If you pick it up intending to follow the law and report the missing property to the police, you have acquired possession lawfully. If you change your mind once the money is in your pocket, it's not larceny, but it is embezzlement.

    Of course, that's under old common law. These days, it's simply theft. The law requires that lost or abandoned property be delivered to the authorities. If it's not claimed by its rightful owners, then you'll get the property back from the cops.

    Realistically, however, no one is going to report a $20 bill to the cops, and no one is going to care. But a sack of money? Keep it and you're committing a felony.

    When does a resource stop being the "property" of someone? The simplest answer is when they have no control on that resource. Another /may/ be when the police do not need a warrant.

    "Finders Keepers" is not the law. Also, the law related to the fourth amendment protections against unreasonable searches and seizures (the root of the requirement to obtain search warrants in some cases) has absolutely nothing to do with the definition of property rights, and when those rights end.

    Going back to the Internet and theft: Theft usually requires the taking and carrying away of the tangible personal property of another - so you can't really "steal" a web page. But you do need to drop the illusion that it's OK to play around with other people's stuff (homes, web pages, etc.) just because their security can be easily circumvented. I could break into most homes simply by throwing a brick through the window. This "exploit" doesn't give me the right to root around in my neighbor's homes, just because they're too stupid to have their vulnerable windows bricked over. I can photocopy a book I borrow from the library. The fact that the publisher failed to provide adequate security by printing books that can be photocopied does not make my actions legal.

  • Re:alone? (Score:2, Insightful)

    by tom's a-cold ( 253195 ) on Wednesday January 07, 2004 @02:04PM (#7904277) Homepage
    Sometimes the government has to spy on innocent people.


    No, they don't.


    If they're going to do surveillance at all, yes they do. Go back to a basic statistics book and read about false negatives and false positives, and what happens in cases where the event you're trying to detect is unlikely compared to the false-positive rate of your test. For a test sensitive enough to find a handful of terrorists in a large population, the false-positive rate WILL be high. This implies that, not only will they inevitably spy on innocent people, but will falsely accuse a number of them. If their criteria for determining if you're a terrorist give lots of false positives, tens or hundreds of innocents will fall into the net along with each terrorist. This is also why trials on secret evidence are such a great injustice: there are scenarios in which the government could be acting in good faith, using statistically valid techniques, and still lock up far more innocents than bad guys. An independent body needs to review that evidence, since there's no incentive for the government to admit that (say) 95% of the people they accuse are innocent. And based on what I've seen so far, I have little confidence in the good faith of this government-- that only makes the situation even worse.

    It's naive to assume that any simple rule (say, spy only on Arab men aged 20-35) is going to significantly improve your rate of success. Too easy to anticipate and circumvent. It's about as misguided as putting massive resources into preventing another 9/11 attack. Successful terrorists are always changing their tactics. Whatever the next one is, you can be assured that it will be different than the last one. They can only succced by hitting us where we're NOT looking, and by forcing us to expend our resources looking for them where they're not.

    Note further that the high false positive rate, and the government's refusal to be accountable for it, will lead to a situation where innocent citizens rightly mistrust the government. This will compromise their ability to gather worthwhile information, and will make us all less secure.

    These observations do not assume malign intent on the part of the government. Merely the everyday venality of politicians. I, for one, mistrust the Bush administration's motives as well as their methodology. None of this would encourage a rational, well-meaning person to risk their own personal freedom to provide the government with information of unknown quality that might thwart an attack. Odds are it's irrelevant, and even stronger odds say that you'd be putting yourself at risk of continuing harassment and possibly indefinite incarceration by contacting them. Conclusion: police-state tactics can never improve security. They just make life more threatening for innocent people.

    We won't get anywhere until we realize that the tradeoff is not freedom versus security, it's justice versus security. And that tradeoff only applies if the government is behaving honestly. Otherwise, both justice and security are lost.

Suggest you just sit there and wait till life gets easier.

Working...