Dear Visitor,

Our system has found that you are using an ad-blocking browser add-on.

We just wanted to let you know that our site content is, of course, available to you absolutely free of charge.

Our ads are the only way we have to be able to bring you the latest high-quality content, which is written by professional journalists, with the help of editors, graphic designers, and our site production and I.T. staff, as well as many other talented people who work around the clock for this site.

So, we ask you to add this site to your Ad Blocker’s "white list" or to simply disable your Ad Blocker while visiting this site.

Continue on this site freely
You are here: Home / Data Security / AntiSec Releases Stolen Police Docs
AntiSec Releases Stolen Law-Enforcement Documents
AntiSec Releases Stolen Law-Enforcement Documents
By Mark Long / CRM Daily Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
The hacker group AntiSec has released a 1GB cache of stolen documents from two organizations with ties to U.S. law-enforcement agencies. Vanguard Defense Industries manufactures an unmanned aerial system called ShadowHawk for law enforcement and security in the private sector, while InfraGard is a partnership between the FBI, businesses, academic institutions, and law-enforcement agencies.

The e-mails posted by hacktivists on Friday reportedly belong to Vanguard Senior Vice President Richard Garcia, who AntiSec said previously worked for the FBI and Shell Oil, according to the group's Pastebin posting.

"Richard T. Garcia is also an executive board member of InfraGard, a sinister alliance of law enforcement, military and private security contractors dedicated to protecting the infrastructure of the very systems we aim to destroy," AntiSec wrote. "It is our pleasure to make a mockery of InfraGard for the third time, once again dumping their internal meeting notes, membership rosters, and other private business matters."

Violating Corporate Policy

Vanguard has been working with the FBI on this security breach since Monday, when AntiSec initially claimed to have hacked into the company's servers, noted Vanguard CEO Michael Buscher in a telephone interview on Friday.

"Obviously we took the claim seriously [when AntiSec] claimed to have taken sensitive data from our web site, which the hackers said they would post today," Buscher said. "Working with the FBI and Europe's cybercrime center, we had forensics done on our terminal."

The forensics determined that "it was Mr. Garcia's personal Gmail account that had been breached, not the VDI servers," Buscher explained. Though Garcia had forwarded some documents from VDI to his personal Gmail account, most of the materials released by AntiSec primarily pertain to the work Garcia does for InfraGard, he added.

"Employees are prohibited from placing any materials related to VDI on e-mail or social-networking sites," Buscher said. "As he is one of our employees, we talked to Mr. Garcia about this."

A Simple Password Vulnerability

Buscher confirmed the AntiSec report that several of the company's ShadowHawk drones are patrolling waters off the coast of East Africa to thwart maritime piracy on behalf of a client from the oil and gas exploration industry. Before the end of 2011, Buscher said, the company's unmanned drones will be "conducting antipiracy activities all the way from the tip of the Horn of Africa to southern Mozambique."

Buscher also confirmed AntiSec's claim that at least one ShadowHawk is destined for deployment within the United States. Montgomery County, Texas, received a Department of Homeland Security grant in April to purchase a ShadowHawk for local law enforcement.

One of that drone's activities will be to conduct anti-narcotics surveillance, Buscher noted. However, an even more important use will be to aid search-and-rescue efforts in the area, since the drones have thermal detectors and can find someone who is lost and report their location coordinates, he said.

The cache released by AntiSec reportedly includes internal meeting notes and contracts, schematics, nondisclosure agreements, personal information about other VDI employees, and several dozen counterterrorism documents classified as "law enforcement sensitive" and "for official use only." However, all this material appears to have come from Garcia's personal account.

"Mr. Garcia did not bother to change any of his many passwords found in his spool at the time of this release," AntiSec said.

Tell Us What You Think


Like Us on FacebookFollow Us on Twitter

Over the past decade, hospitals have been busy upgrading their systems from paper to electronic health records. Unfortunately, spending so much on EHR may have left insufficient funds for security.
The British government officially blamed Russia for waging the so-called NotPetya cyberattack that infected computers across Ukraine before spreading to systems in the U.S. and beyond.
© Copyright 2018 NewsFactor Network. All rights reserved. Member of Accuserve Ad Network.