Espionage In Icelandic Parliament 274
bumburumbi writes "An unauthorised computer, apparently running encrypted software, was found hidden inside an unoccupied office in the Icelandic Parliament, Althingi, connected to the internal network. According to the Reykjavik Grapevine article, serial numbers had been removed and no fingerprints were found. The office had been used by substitute MPs from the Independence Party and The Movement, the Parliamentary group of Birgitta Jonsdottir, whose Twiiter account was recently subpoenaed by US authorities. The Icelandic daily Morgunbladid, under the editorship of Mr David Oddsson, former Prime Minister and Central Bank chief, has suggested that this might be an operation run by Wikileaks. The reporter for the Reykjavik Grapevine, Mr Paul Nikolov is a former substitute MP, having taken seat in Parliament in 2007 and 2008."
Rogue servers (Score:3, Interesting)
I love reading the stories posted by the readership about all of the odd systems found stuck in closets and under desks which nobody knows what are doing.
Specifically... does anyone have any about Wall Street or Congress?
Re:Rogue servers (Score:5, Insightful)
does anyone have any about Wall Street or Congress?
Why bother? They steal openly now.
Re:Rogue servers (Score:5, Funny)
I love reading the stories posted by the readership about all of the odd systems found stuck in closets and under desks which nobody knows what are doing.
Well, with regard to Congress, there are roughly 535 of them at any given time.
Re:Rogue servers (Score:5, Funny)
I love reading the stories posted by the readership about all of the odd systems found stuck in closets and under desks which nobody knows what are doing.
Well, with regard to Congress, there are roughly 535 of them at any given time.
Actually, it's the interns that are under the desks.
But lots of CongressCritters still in the closet, I trow.
Re: (Score:3)
> was found hidden inside an unoccupied office in the Icelandic
>Parliament, Althingi, connected to the internal network
It was Al's thingy wasn't it?
Re:Rogue servers (Score:5, Funny)
My favorite is the opposite. It was a unix server at a university that none knew where was physically, but that was happily doing its thing for the network. Eventually they found it by following the network cabling and knocking down a drywall.
Re: (Score:3, Funny)
Re: (Score:2)
The one I remember was a Novell server (not unix).
http://slashdot.org/article.pl?sid=01/04/10/1846258 [slashdot.org]
http://arstechnica.com/civis/viewtopic.php?f=2&t=1824 [arstechnica.com]
Original techweb article now gone, but I'm sure you can find other references.
Run by wikileaks ? (Score:4, Insightful)
can anyone provide any actual logic for this proposition ?
Re: (Score:2)
Because the US government would just have said "bend over" and Jonsdottir would have gladly said "yes master".
So it has to be someone who doesn't have the same easy access to her privates... I mean private information.
Re: (Score:2)
Maybe because the bullying was too obvious. IIRC it even got out before the vote on the law.
I guess it would have been political suicide for the ruling party if they bent over in such plain view. I mean, would you vote for a party that is a puppet of a foreign regime? And you may rest assured that the opposition would have rubbed it in 'til the next election and beyond.
Re: (Score:2)
Davið Oddson is, to put it objectively, a colorful and polarizing figure. If Iceland had a Fox News, he'd probably be employed there.
Re: (Score:2)
can anyone provide any actual logic for this proposition ?
Julian Assange had unprotected sex with a woman. Q.E.D.
Re:Run by wikileaks ? (Score:5, Insightful)
"They" are trying to turn wikileaks into the new imaginary Al Qaeda boogeyman.
Re:Run by wikileaks ? (Score:4, Interesting)
I'm trying to think of some government that is less likely than Iceland's to have interesting fodder for WikiLeaks.
Maybe I'm naive and Iceland is really a hotbed of corruption and intrigue, but somehow it seems unlikely that there's anything to leak, aside from political maneuvers and backbiting that would seem tame in almost any other country. The Icelandic financial institution scandal is pretty long in the tooth at this point. Bugging Iceland would probably be a sign of really poor judgment on the part of any aspiring scandal-monger.
Of course, every society probably has its quota of twits who are interested in eavesdropping on their colleagues. But with the new interest in Iceland evidenced by the US gummint, you do gotta wonder.
Re: (Score:2)
I tend to agree. I doubt Iceland was the target.
It would be a haven, more than a target.
Having a machine on a network beyond the reach of any interested government that you could remotely access would be useful.
Just as likely to be a spammer or a bot net controller, or a disgruntled employee as a wikileaks plant if you ask me.
Re:so ? (Score:5, Insightful)
Certainly possible.
But but planting a computer on someone's network is pretty much amateur hour don't you think? Unless it was done for "once you find this you will stop looking" purposes.
Re:Run by wikileaks ? (Score:4, Insightful)
But what of their friends, assistants, and political hangers-on?
Re: (Score:3)
True, it can be done easily, but the expert didn't say it couldn't be done. The expert said it wouldn't be done. If you store the key in RAM and there's a power failure, your bug will never work again until someone physically goes in and rebuilds the system from scratch. Determining the difference between an actual detection incident and a harmless condition like a blackout is a nontrivial exercise. And if you have regular access to the area, there's probably no good reason to plant a bug there. You ge
Hang on a second... (Score:5, Insightful)
Re: (Score:3, Informative)
Re: (Score:3)
Now if our fine government agents could only manage to be half as competent as Maxwell Smart...
Re: (Score:2)
No, Wikileaks would be KAOS or THRUSH...
Wikileaks == scapegoat (Score:5, Insightful)
The Icelandic daily Morgunbladid, under the editorship of Mr David Oddsson, former Prime Minister and Central Bank chief, has suggested that this might be an operation run by Wikileaks.
If nothing else, wikileaks will be valuable to governments as a convenient scapegoat.
--
pass
Re: (Score:2)
Yup. It could just as easily have been left there by the former third assistant clerk to the Finance Minister, who got sacked when Iceland's banking system collapsed, and who was too polite to take his severance pay in used hardware.
Re:Wikileaks == scapegoat (Score:5, Informative)
When, exactly, has Wikileaks actively gathered evidence? Oh, never. Wikileaks just waits for others to the gathering, they just do the publishing. Next, they will be blaming global warming on Wikileaks.
Re: (Score:2)
Haven't you noticed all the hot air Wikileaks has been causing?
Re: (Score:2)
You'll recall that the guy who says he was chatting with Manning (of the quarter million stolen US State Department documents) said that Wikileaks actually made special arrangements for Manning. Worked actively with Manning to collect and stash all of that stuff. Whether, or to what degree, that's true is one of the things they (the DoD prosecutors) are still digging through.
Re: (Score:3)
That's the part that is NOT clear, still. Manning didn't have anyplace to put the stuff
Re: (Score:2)
Next, they will be blaming global warming on Wikileaks.
Well, they ARE wasting a lot of energy with all of these spy servers they leave on around the clock in parliament buildings.
Re:Wikileaks == scapegoat (Score:5, Interesting)
http://www.newyorker.com/reporting/2010/06/07/100607fa_fact_khatchadourian?currentPage=all#ixzz0pWdlAepe [newyorker.com]
There has also been reporting as recently as today that Wikileaks actively gathered data from peer-to-peer file sharing networks:
http://www.bloomberg.com/news/2011-01-20/wikileaks-may-have-exploited-music-photo-networks-to-get-classified-data.html [bloomberg.com]
Re: (Score:3)
I'm not sure if running a Tor server or gathering via p2p would be "active" in the same sense I would normally consider "active". This is still on the back side, taking what has already been taken. This is different than doing the initial taking. To do that, you have to be on the inside.
I get what you are saying, but to be clear, when I say "active", I am referring to the initial step of getting the info. Going from "secure" to "no longer secure". After that point, it is mainly courier duty.
Just as on
Re: (Score:3)
Except that global warming doesn't exist!
I don't actually believe that, but it wouldn't be a proper Slashdot discussion without somebody saying it.
Re: (Score:2)
Don't forget the taking-all-the-credit part, that takes effort.
Re: (Score:2)
They've no evidence whatsoever :
TFA: "The computer was disconnected and taken to the police" and "it is possible police bungled the operation and did not clone the hard drive before disconnecting it"
They might have at least sniffed the network to see what, if anything, the machine was sending and where it was sending it to.
Re: (Score:2)
Can you show me on the doll where Wikileaks touched you?
HEX
Re:Wikileaks == scapegoat (Score:5, Insightful)
former Prime Minister and Central Bank chief, has suggested that this might be an operation run by Wikileaks.
This, brought to you by the mind that collapsed Iceland's economy.
Re: (Score:2)
Is Wikileaks trying to obtain the lyrics to the next Bjork single? I mean, what does one spy on in Iceland? Geothermal vents in compromising positions?
Re: (Score:2)
Wouldn't be surprised (Score:2)
if it was just an old sysadmin's personal download machine. Given that most computers do not have serial numbers but the ones procurement gives them, it could have been a system that was decommissioned and the sticker peeled off. I've got a couple of those myself although they're not hooked up to my companies' gigabit internet service.
Re: (Score:2)
Given that most computers do not have serial numbers but the ones procurement gives them, it could have been a system that was decommissioned and the sticker peeled off.
I haven't seen a single computer without a factory serial number except for the ones I built myself.
Re: (Score:3, Informative)
Really? Does 30 years count?
I've also worked for a computer manufacturer.
They all go out the door with serial numbers.
Re: (Score:2)
You find me one Dell computer without a serial number.
(Hint: They are required by FCC regulation).
Re: (Score:2)
(Hint: They are required by FCC regulation).
I think that you will find that the FCC's jurisdiction doesn't cover Iceland.
Re: (Score:2)
Buying a computer from a small, local shop does not mean for a second that it is illegal or uses pirated software. I think that this is another cultural difference (like your comment about the FCC requirements when talking about computers from another country). In my country, the small, local computer shops are everywhere and account for a sizable proportion of computer sales (I don't know the exact breakdown). It is not uncommon to find computers branded with a company of which you have never heard. They s
Re: (Score:2)
Its probably not illegal for you to buy it, but I assure you it is illegal for them to sell it.
State and Federal laws require that these things be certified by the FCC for radio emissions, and by UL/CSA for electrical safety (OSHA). And, no, its not sufficient that the components were individually certified.
This pertains to USA and probably Canada has similar regs. In Icelant? Who knows.
Re: (Score:2)
FCC certified?
OSHA (UL/CSA) certified?
No?
Illegal. Read the law son.
Re: (Score:2)
You can still hand-build computers and have a system that passes FCC Class A tests (even Class B). Barebone computers are all FCC certified and can be modified without issues. Same goes for UL certification, as long as your components are UL certified (which I believe is necessary for them to be sold in the US) you can build just about anything you want.
It also doesn't make them illegal if they're not being certified. It's only an FCC regulation that you'll overstep in the very rare case they do not meet sp
Re: (Score:3)
Since you gave a cite, but I knew that in the late 20th and early 21th century in the US, you were really out of step with my reality, I googled around at the regs. I just looked at the Lqbor department stuff.
You have the problem of never having eaten chinese food, if you get the old programming reference.
I figure your employer is a little like this:
He builds pretty much standardized boxes and sells them wherever.
So I might have bought some little odd toy computer for my kid and later laptops and netbooks
Running encrypted software? (Score:2)
An unauthorized computer, apparently running encrypted software, ...
Well, object code is cryptic but it's not encrypted.
Re: (Score:2)
Re: (Score:2)
If it's actually related to Wikileaks, as opposed to a US-or-Euro-government spook job, it's more likely to be a Tor node. For that matter, even if it is a CIA plant, it could well be a Tor node, and similarly, if it's a fake scapegoat machine that the former bank minister is using to cover his tracks, a Tor node would be a good choice.
Re: (Score:3)
I prefer placebo encryption. I tell people its encrypted and any methods they try to decrypt it wont work.
Re:Running encrypted software? (Score:5, Funny)
I prefer placebo encryption. I tell people its encrypted and any methods they try to decrypt it wont work.
It looks like donkey porn, but I can't decrypt it into the military secrets I know it must be!
Recovery Fairy Tales again (Score:5, Insightful)
Stephen Christian, a computer expert at Oxymap ehf, told the Grapevine that ... "Information written to disk can be recovered by experts even after being overwritten several times unless you let the computer run for a few hours constantly 'covering up' its information. Computer hackers know this."
I laugh whenever I see comments like this. Lest we forget that nobody ever accepted The Great Zero Challenge [hostjury.com], let alone beat it.
Re: (Score:2)
Re: (Score:2)
Free money is never stupid.
Re: (Score:2, Insightful)
Re: (Score:2, Informative)
I laugh whenever I see comments like this. Lest we forget that nobody ever accepted The Great Zero Challenge [hostjury.com], let alone beat it.
Hahaha, probably because the challenge only offers a reward of $40 USD and they won't let you disassemble the drive, which is a requirement for any of the wiped-data-recovery papers/theories floating around.
Re: (Score:2)
Apparently, they will allow a properly incorporated company in data recovery or intelligence agency to disassemble the drive, and hold it for 30 days.
However, as you noted, the challenge is only worth $40, you pay postage to have it delivered, and there is a $60 deposit...
It rather sounds like a really bad scam... but then, it's too stupid to even be logically possible as a scam, so it obviously can't be a scam.
Re: (Score:2)
Does unplugging the drive cables from the circuit board count as disassembly? Because you don't really need to have physical access to the inside of the drive, but merely access to the raw analog output of the drive heads on a given track (and, ideally, fractional tracks, which you should be able to fudge by rapidly stepping the drive heads one way and then the other).
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
The Great Zero Challenge rules specifically exclude disassembly of the drive; all the bit-recovery mechanisms discussed in the literature require you to disassemble the drive and use custom heads to scan the surface magnetism map.
I.e., the contest is totally missing the point on what data recovery pros (i.e., the NSA and so forth) said they'd do if they had to scan disks to recover overwritten data.
It's hard to think of a less useful contest.
Re:Recovery Fairy Tales again (Score:5, Informative)
There are four problems with the Great Zero Challenge that I could identify at a glance:
1. No incentive. The prize is $40. Data recovery companies charge tens of thousands to recover a drive. (Depending on how hard it is.)
2. No disassembly. Any technique that "reads residual magnetism" is going to require custom read heads and access to the platters.
3. No longer running. The challenge ended in January 2009 and only ran for one year. That blog post is from September 2008.
4. Full disclosure. This is a show-stopper. Data recovery companies guard their secret methods very closely. Those secrets are their only competitive advantage. Telling everyone how they did it for $40 ? I don't think so.
In contrast, the James Randi Paranormal Challenge has a $1,000,000 prize, only has rules that disallow cheating, has been running since 1964 and is still running. The fact that no one has passed the preliminary stage of that challenge means something
Re: (Score:2)
Disassembly was specifically permitted to incorporated businesses, and intelligence agencies.
However, the rest of your argument is not any more weak because they suddenly started permitted disassembly. In fact, the entire point of "can't disassemble the drive" is practically moot compared to the other reasons.
Re: (Score:2)
Well, I bothered to read the post, so:
1. No incentive. The prize is $40. Data recovery companies charge tens of thousands to recover a drive. (Depending on how hard it is.)
The amount of gained business for a successful recovery would be worth considerably more than $40. It's stupid to even offer the $40.
2. No disassembly. Any technique that "reads residual magnetism" is going to require custom read heads and access to the platters.
It says right there that if you're a qualified data recovery company or a sp
Re:James Randi is a fraud (Score:5, Informative)
Many people have accomplished what they've claimed, but then Randi came up with extra tests, until they failed.
Randi very clearly lays out of the bounds of any tests beforehand, and what is considered proof.
If anyone had actually passed that test, they would, you know, sue him, because they were promised payment of a million dollars if they did that. There is an actual contract with actual winning conditions.
But since you've made that claim, you should be able to demonstrate that Randi has, at least once, laid out a test and winning conditions, and then backpeddled once someone actually won.
Or you are a liar and a slanderer who has accused someone of criminal fraud.
He's not interested in "statistics", but demands "undisputable show of magic", but without magic tricks.
Yeah, you moron, because that's what he's testing.
If he let people win by 'statistics', he'd have a constant stream of people claiming they could predict a coin toss 75% of the time....and eventually one of them would happen to do that. Because that's how statistics work.
Re: (Score:3)
Professor Michael Prescott found that James Randi’s million dollar challenge is very much an illusion that have fooled people for decades: http://torbjornsassersson.wordpress.com/2010/05/02/james-randi-and-his-one-million-dollar-challenge-fraud/ [wordpress.com]
I VERY STRONGLY urge everyone to read that article, (The first I randomly clicked) to actually see what sort of utter nonsense this poster is sprouting.
In short, apparently you can dismiss Randi because the article hypothesizes that Randi randomly turns aw
Re: (Score:2)
"I laugh whenever I see comments like this. Lest we forget that nobody ever accepted The Great Zero Challenge [hostjury.com], let alone beat it."
While the statement itself is incorrect if taken as if it was accurate, traditionally when you delete a file on a partition table it does not delete the file only deletes the first bit of the filename from the file allocation table.
This is what allowed old DOS utilities like undelete or norton undelete to function. Some days I do miss the old days since it seems n
Re: (Score:3)
"I laugh whenever I see comments like this. Lest we forget that nobody ever accepted The Great Zero Challenge [hostjury.com], let alone beat it."
While the statement itself is incorrect if taken as if it was accurate, traditionally when you delete a file on a partition table it does not delete the file only deletes the first bit of the filename from the file allocation table.
This is what allowed old DOS utilities like undelete or norton undelete to function. Some days I do miss the old days since it seems no one develops quality tools anymore for win XP +.
You're messing up terms. The "partition table" is in the master boot sector (and yes, there's an additional one at the start of an extended partition table, I know.) The partition table is irrelevant to the way in which files are stored.
What deleting files in DOS and on disks all the way up to FAT32 did was change the first byte of the filename to a known value, which represented a "deleted file". This filename was actually stored directly in the directory listing, not in the file allocation table. The
Re: (Score:2)
I understand what you are saying but quality tools do matter.
I've been annoyed at the crap level of tools for XP and onward for a long time. While Fat was crap disk defragmenting tools for NTFS are still horrid and tedious.
To say that quality tools don't matter is moronic. You as always do the nerd thing and focus on just what I said not rather what was implied in the general sense.
Re: (Score:2)
I've been annoyed at the crap level of tools for XP and onward for a long time. While Fat was crap disk defragmenting tools for NTFS are still horrid and tedious.
That's because NTFS does not have the same fragmentation problems that FAT does, and in particular only has fragmentation problems in a very small set of circumstances that average users will not come across.
To say that quality tools don't matter is moronic. You as always do the nerd thing and focus on just what I said not rather what was implied in the general sense.
And you're doing the idiot thing of not actually reading what I actually wrote. I am not against quality tools, rather "undelete" was never a quality tool.
It's like you're calling for a return to sticks and rocks because you can't find a good stick and/or rock. We don't need that shit anymore.
So, agai
Re:Recovery Fairy Tales again (Score:5, Insightful)
If the NSA really wanted the data on that drive they may be able to do it.
The point is this is all a nonsense urban legend that actually started on an entirely different type of drive entirely, an MFM drive, with much fuzzier bits, and someone hypothesized that data recover might theoretically be possible even after an overwrite, and you might want to do it with different patterns.
This hypothetical 'might' on much older drives has somehow become the actual literal truth, resulting in people running multiple wipe operations and even physically destroying drives, despite no one ever demonstrating recovery of a once-wiped file in the entire history of computers. Ever. At all. It has never once happened, no actual data recovery firm claims they can do.
In fact, the hypothetical recovery concept is near nonsense anyway. Even if we imagine that hard drives bits are something like ________ wide, and sometimes they write __++++++ and sometimes ------__, resulting in ------++, you can't actually recover from that. You don't know when that ++ got there. For all you know, that was a piece let over from two years ago, and the bit before the wipe was 0. Hell, for all you know, the bit started as +++++++ when the drive was made, and the first low-level format and every single write afterward just wrote to the last 6/8th of the bit, so you don't even know it ever was actually a one at all.
It's the equivalent of asserting that you can look at a dartboard and claim you can find the score of the last game. Uh, no, you can't. You might can see, with a microscope, every single dart that ever hit the board...but that tells you fuck all about the previous score, or who won, or what order they were thrown in.
For data to be recovered from 'before the wipe', you have to imagine that somehow the wipe was fundamentally different than every other write operation that happened before. That all other write operations helpfully left no traces of the previous state behind, but the 0 wipe did.
Before you say 'Well, a lot of places are only written once', I have to point out that a) It's exactly the changing places, the data, that is important. You know, the new stuff that got put over that file you deleted the other day. Recovering a Windows system file that got written to the disk at install and hasn't been written to again is not very useful. And b) all places on a hard drive are written to start with, it's called a low-level format. Before that they hold random 'data', which means there's nice, utterly random 'data' sitting there in the parts of the drive that don't get written to. How you can tell that from parts of the drive that did get written to at some point but somehow not written to in the wipe is a very very very interesting question...
Oh, and it's even worse than that. Because of how hard drives encode data, if you guess on one bit, you'll blow up the entire rest of the byte. If you don't know the value of bit 2, you can't know 3-8 either.
The entire thing is preposterous. The shame is that the only people who've ever called the urban legend what it is were so poorly funded. Someone should set up a Randi Foundation open-donation thing for that...I might kick in $10.
And talking about what the NSA 'might' do is insane. There's all sorts of magical tech the NSA might have, but, as I said, even pretending that hard drives actually had incredibly crappy wandering-all-over-the-drive tracks, which they do not, this would not actually let you put together an actual stream of any particular point in time. All you know is that every bit on the drive was zero at one point (because it was wiped) and not zero at one point (Because it was random before low-level format.). Good job figuring that out.
Who stands to gain? (Score:2, Insightful)
Governments, large financial institutions, covert military operations, corrupt diplomats, racketeers... Who among such entities does not have the necessary resources to set up such a smear?
Meanwhile, this "encrypted" system sure sounds like a load of bollocks. It's all, like, secret. Wow. Yet how convenient, considering that it was "hidden", that it showed up exactly where and when it did.
More like the Kennedy assassination (Score:2)
It's more like the Kennedy assassination - who wouldn't gain by smearing Wikileaks here? Even Wikileaks themselves* might have planted it as a diversion as opposed to surreptitiously leaving it behind. Or maybe it's a Murder on the Orient Express plot, where either a whole bunch of players conspired together to do it, or else some stranger walked in the door, planted it, and walked out unseen.
*Yes, I do reject any of the conspiracy suggestions that say Kennedy himself was behind it, except the one on Red
Wikileaks must have hired the CIA to do it (Score:5, Insightful)
Let's see, there are two possibilities that come to mind since this was done in the proximity of the female Icelandic MP with connection to wikileaks:
Obviously we can throw out #1 because it does not at all fit with wikileaks modus operandi and cannot be carried out by their infrastructure. They're set up to anonymously accept documents and disseminate them, they're not spies. Moreover the icelandic MP in question would be risking much to do this only to access documents she probably already has access to.
So #2 becomes the most obvious culprit.
Re:Wikileaks must have hired the CIA to do it (Score:5, Interesting)
Well, the other possibility is that this is a backup Wikileaks server, running from within the Icelandic parliament.
Re: (Score:2)
Re: (Score:3)
Let's see, there are two possibilities that come to mind since this was done in the proximity of the female Icelandic MP with connection to wikileaks:
Obviously we can throw out #1 because it does not at all fit with wikileaks modus operandi and cannot be carried out by their infrastructure. They're set up to anonymously accept documents and disseminate them, they're not spies. Moreover the icelandic MP in question would be risking much to do this only to access documents she probably already has access to.
So #2 becomes the most obvious culprit.
In this case, the most obvious culprit is the fallacy of your argument’s logic.
Re:Wikileaks must have hired the CIA to do it (Score:5, Insightful)
So #2 becomes the most obvious culprit.
Fallacy of the false dichotomy. There are more than just two possibilities here.
Re: (Score:2)
Let's see, there are two possibilities that come to mind since this was done in the proximity of the female Icelandic MP with connection to wikileaks:
Obviously we can throw out #1 because it does not at all fit with wikileaks modus operandi and cannot be carried out by their infrastructure. They're set up to anonymously accept documents and disseminate them, they're not spies. Moreover the icelandic MP in question would be risking much to do this only to access documents she probably already has access to.
So #2 becomes the most obvious culprit.
Or, of course, agents of any country that stands to gain from espionage conducted this in order to spy on someone in Iceland.
OH NO! (Score:2)
TrueCrypt (Score:4, Informative)
Re: (Score:3, Interesting)
There's also the chance that authorities moved the computer without powering it down. [wiebetech.com]
Re:TrueCrypt (Score:5, Interesting)
I am now officially setting up a background program for my two master servers to ping each other, and should the ping ever fail, they will auto shutdown...
$paranoia++
Re: (Score:3)
That seems easy enough to subvert if you know it exists. Just watch for the unplugging of a keyboard, mouse, monitor, or network, throw up a screen demanding a password, and shut down if it's not given.
It's a neat trick, but if Full Disk Encryption products can't deal with this soon, they're pretty stupid.
Question everything (Score:2)
*laugh* Wikileaks spying... (Score:2)
This reveals more about David Oddsson than Wikileaks. I bet Mr. Oddsson has some friends who were very deservedly burned by the Icelandic banking scandal that Wikileaks broke the story on. And, of course, that means Wikileaks must be at fault for anything else wrong involving spying or information leakage. It can't possibly be because Mr. Oddsson's friends are nasty people who deserve long jail sentences, no...
It's like a domestic abuse case where the abused refuses to implicate the abuser in anything th
What a tangled web we weave (Score:4, Insightful)
So a strange computer was found in a government office...
... which may have been used by someone affliated with an org that discloses government secrets...
... as insinuated by a newspaper edited by the former head of said government...
... as reported by someone who may also have had access to this office previously, as a government official.
Is this representative of the kind of media bias Iceland has to deal with? Don't get me wrong, it's not like any country has it better, but is it always so blatantly obvious?
"Running encrypted software"? (Score:2)
Call the MAFIAA, they've been searching for that for ages! If that's true, the money worries of Iceland are at an end, they'll happily pay big bucks for such a technology!
Snideness aside, I guess I needn't mention that no computer on this planet is able to run "encrypted software". The OS has to be able to load the executable, hence it has to conform to standard. CPUs are only able to run instructions that match their instruction set, so that has to conform to that standard. It may be runtime encrypted, but
Floating license server? (Score:2)
It would be funny if it turned out that this is just some licensing server.
Interesting (Score:2)
As a side note a spokesman from CCP hf announced today that the EVE Online Tranquility server has gone offline unexpectedly and they are working on the problem...
(PS: Yes I know EVE is hosted from London, but I couldn't resist!)
It's not encrypted software (Score:2)
It's just perl!
Why subpoena a Twitter account? (Score:2)
I don't use it, but wouldn't one just "follow" someone on Twitter to see everything they "tweet"?
Re: (Score:2)
Finally. Terrorists and pedos really got stale after a while. But I guess "think of the children" isn't gonna work as a catchphrase anymore, we gotta find a new one.
Re: (Score:2)
Think of the politicians?
Re: (Score:2)
Well, unlike children, politicians are not generally liked by the majority of the population. Quite the opposite, especially recently. "Think of the politicians" could easily be misunderstood a prompt for ... well, for reference see Tunisia.
Re:Serial numbers removed? (Score:4, Informative)
Other than the hard drive, none of those serial numbers are tracked by computer vendors. Serials are tracked by manufacturers only for parts likely to fail, and only for parts which the vendor has a RMA agreement with the supplier.
Even mac addresses are usually not on record for any longer than it takes to print the required label.
If that information isn't on the order and shipping documents, chances are very good that the manufacturer has no clue what MAC is in what Computer, and the best you get is that it was in a particular batch of 300 computers which were sold to the Reykjavik Radio Shack.
Re: (Score:2)
Its probably gone thru three sets of hands since purchased.