It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
""Also, before you deny too much: Remember we’re sitting on 3TB additional data. We have not even started,"
Originally posted by lunchmanstan
Okay if anyone can clue me in what is the importance of the UDID stuff?
I tried to learn up on MD5's and SLA,s but Iam totaly lost to what it all means.
Do people use this to hack into systems or does this just identify who the data came from?
Just trying to figure out the importance of this whole thing thats all.
Originally posted by Tazkven
reply to post by lunchmanstan
Most "official" reports I have read claim that the UDIDs cannot be used maliciously but there are claims of a program that can "De-anonymize Apple UDIDs" and "misuse UDIDs in a way that allowed you to link a UDID to a user's identity, geolocation and Facebook and Twitter accounts""
Only god knows what else can be done but I will not link to that program ...
CNET talked to a few people whose devices were on the list and whose names and numbers were included in their "Device Name Field.' CNET also was able to use the data, which had been mostly scrubbed by the hackers of personally identifiable information, to find names and phone numbers by cross referencing it with publicly-available third-party databases. People on the list could be targets for phishing attacks based on the information on the list and even more at risk if someone did a little bit of digging.
"The FBI has not requested this information from Apple, nor have we provided it to the FBI or any organization. Additionally, with iOS 6 we introduced a new set of APIs meant to replace the use of the UDID and will soon be banning the use of UDID,"
Next week expected iPhone 5 release. I know what people will be talking about, and it's probably not a new phone.
Originally posted by Tazkven
...And Apple responds,
"The FBI has not requested this information from Apple, nor have we provided it to the FBI or any organization. Additionally, with iOS 6 we introduced a new set of APIs meant to replace the use of the UDID and will soon be banning the use of UDID,"
allthingsd.com
Source via Twitter AnonymousIRC
next: release coming, tribute to a good friend whos now jailed.
I wonder why no-one picked this up. It´s definitely related, and it would be really disturbing if this data originally came from the NCFTA, as the filename at least suggests.
From their "About the NCFTA" section:
The NCFTA, a non-profit corporation, evolved from one of the nation’s first High Tech Task Forces and, since 1997, has established an expansive alliance between subject matter experts (SMEs) in the public and private sectors (more than 500 worldwide) with the goal of addressing complex and often internationally-spawned cyber crimes. These SMEs, from industry, academia and government, each bring specific talents and experiences to the partnership. Through a steady cycling of such cross-sector national and international resources, both embedded at the NCFTA and through initiative-specific intelligence channels, the NCFTA is well positioned to adapt and regularly reinvent itself to better address today’s evolving threat landscape.
Reading through the veil of corporate buzzwords it comes down to a non-profit organisation, specialising in providing services related to solving/tracking cyber-related crime; an alliance of worldwide experts from the private and public sectors, as well as governments.
The primary objectives of this public/private alliance are to:
•Identify, mitigate, and neutralize cyber crime threats
•Rapidly build intelligence to the actionable level so that the threat can be: ◦Further located/identified (who all are involved and where they are located)
◦Mitigated through timely enhancement of security practices/procedures
◦Effectively neutralized through:
■Proactive law enforcement engagement (domestically & internationally)
− This can/may include both criminal and civil avenues in coordination with appropriate authorities
■Implementation of interim technology solutions (i.e. null-routing of botnet traffic or similar interdiction action via TLD’s or ICANN)
(Emphasis added by me)
From this I conclude that they do work with law enforcement agencies such as the FBI and it may very well be that they are the ones who provided the data in cvs format to the agent.
It´s no surprise to me really, but we are being spied on massively!
The Wall Street Journal
A legal battle is brewing between technology companies and the U.S. government over whether law-enforcement agents have the right to obtain passwords to crack into smartphones of suspects. Google Inc. earlier this year refused to unlock an alleged pimp's cellphone powered by its Android software—even after the Federal Bureau of Investigation obtained a search warrant.