Brief Offers Insight into USG Theory of Internet Security

The most recent Audit of the Federal Bureau of Investigation’s Implementation of Its Next Generation Cyber Initiative by Office of the Inspector General of the U.S. Department of Justice, dated July 2015, (archived) features several thought-provoking insights into the inner workings of the USG and the headwinds faced by the bureaucratic beast. In no particular order :

1. The protection of the United States against "cyber-based attacks" and "high-technology crimes" is ranked as the third-highest priority behind counterterrorism and counterintelligence. Continue reading

OS X Flaw in the Wild Abuses Error Logging Function to Edit sudoers

Malwarebytes reports (archived) that a vulnerability in Apple's latest version of OS X which was reported to exist last month on Stefan Esser's blog (archived) is now appearing on malware in the wild. The flaw came into being through a new feature introduced into the OS X dynamic linker dyld. The new feature allows the linker to log error output to any file on the system without the safety or sanity checks implemented in even "hobbyist" developed Unix systems. Malwarebytes only noticed the flaw being actively exploited because a particular piece of adware had edited the sudoers file on a testing environment while examining the malware. The severity of the flaw though is such that when triggered it can edit any file on the affected machine including executable system files. Esser originally reported this flaw on July 7th, 2015 and Apple has yet to release a patch. On the other hand Esser has published a source code patch on his own which lessens this flaw though it is hard to determine how this patch will interact with possible future updates from Apple.

UK's Cameron Threatens Online Porn Shutdown Unless Online ID Scheme Implemented

Last week United Kingdom prime minister David Cameron issued an ultimatum (archived) directed at internet porn sites demanding they voluntarily produce an "effective" regime for restricting access based on age or he would act legislatively to either force such a scheme or shut them down. Of course "effective" age filters would necessarily mean the creation of a larger online identity regime. The United Kingdom already forces Internet Service Providers to filter internet connections to block pornography unless service subscribers explicitly opt out of the filtering. Further the United Kingdom late last year restricted the kinds of sex acts which may be included in pornography produced in the United Kingdom for online Video on Demand consumption. Continue reading

Australian Faces 88 Charges Related To Darknet Child Pornography Sites

Australian newspaper the Herald Sun reports (archive) that 22 year old Melbourne man Matthew David Graham appeared in court last week to face 88 charges related to the operation of 12 darknet child pornography sites. Graham is also accused of providing instruction on the abduction, rape and murder of a five year old girl in Russia.1 Continue reading


  1. I am unable to find a newspaper article reporting such an event took place. Perhaps the discussion was mere fantasy or reporting of the case remains suppressed as was the case with this one. 

Scottish Bank, Police & Court Harass Bitcoin Trader, Conspire To Steal His Cash

The Herald Scotland reports (archive) that a bitcoin trader recently had £5,500 seized by Scottish police under the Proceeds of Crime Act 2002 after his bank closed his account and requested he attend the branch to collect his cash. Having collected his cash as requested, Max Flores left the bank branch only to be greeted by police who absconded with the money despite not placing him under arrest. This act of theft was further supported by a court which allowed the thieves to keep Flores' cash for a period of three months while an investigation was carried out to established whether or not Flores was involved in money laundering. Continue reading

New Per Block Transaction Highs Wedge Some Nodes: Patch Available

In the past several hours there have been at least two blocks with a sufficient number of transactions per block to leave bitcoin nodes relying on Berkeley Database for block handling to wedge when set to the post March 2013 limit of 40,000 database locks and objects. For a few hours doubling that amount to 80,000 sufficed until a still more complex block arrived. A patch has recently been published which should remedy this issue until such a time the universe undergoes heat death. The patch works by raising the maximums Berkeley Database is configured with in order to handle any number of transactions that can fit into a Bitcoin block. On some platforms like OpenBSD which aggressively allocate memory in advance for safety reasons Bitcoin's RAM usage is increased noticeably with this patch. If your system enforces low per-process memory limits you may have to edit you system's settings.