FBI Investigating iPad E-Mail Leaks 209
CWmike writes "The Federal Bureau of Investigation has opened an investigation into the leak of an estimated 114,000 Apple iPad user e-mail addresses. Hackers belonging to a group called Goatse obtained the e-mail addresses after uncovering a web application on AT&T's website that returned an iPad user's e-mail address when it was sent specially written queries. After writing an automated script to repeatedly query the site, they downloaded the addresses, and then handed them over to Gawker.com. Now the FBI is trying to figure out whether this was a crime. US law prohibits the unauthorized accessing of computers, but it is unclear whether the script that the Goatse group used violated the law, said Jennifer Granick, civil liberties director with the Electronic Frontier Foundation. 'The question is, when you do an automated test like this, [are you] getting any type of unauthorized access or not,' she said. If it turns out the data in question was not misused, it is unlikely that federal prosecutors will press charges, she added."
Reegulatiooon Ree gulatiioon of noo retuuurnn (Score:2)
No relation (Score:4, Funny)
"The FBI is aware of these possible computer intrusions and has opened an investigation into addressing the potential cyberthreat," said Lindsay Godwin
Fucking Nazis.
Re: (Score:2, Interesting)
There is a problem with that l
Re: (Score:3, Interesting)
Uhm..
They aren't arguing that the script may not be unauthorized access because it was automatic and that only the first attempt would be illegal because they did it in person.
They where rather arguing that visiting that page once and get an e-mail address may be something you just happen to do, but writing a script which fetches lots of e-mail address would be abusing the system / doing something you shouldn't do.
Personally I think "they should know they are not entitled to" is very weak juridical term/cla
Re:No relation (Score:4, Interesting)
I dont entirely disagree with you, but I think at the end of the day, whether it could be considered cracking or not depends on the intent of the owners of the site.
You could argue that the web pages were not ever intended to be accessed in the way that they were, because firstly the site's owner does not provide direct orindirect links to those pages, and secondly, the URL's used to get to the page are obviously being used as an extraordinarily weak form of secority (ie. through obscurity).
Now that is just plan stupid on behalf of AT&T, but so is having your email password set to "12345", yet if someone accessed your email or other system you owned through by going to the login screen and guessing your password, or writng a script to try obvious passwords, it would certainly be considered hacking - because that person has not been authorized to have access to that system.
At the end of the day, it is the courts and possibly a jury that will determine whether this is considered a hack (in the system cracking sense). Since the goatse security guys obviously do not actually have a legitimate reason to access any of those pages of info, and they are using a script to do the accessing in a way that is a litle similar to how password guessing programs work, I would say that this will eventually be considered a hack, by the court system.
If the justice system court can convict a someone of murder even without an actual murder weapon, witness or definitive motive (Not thinking of a particular case, but I am sure there are plenty) , I am pretty sure it wont have too much trouble nailing these guys for hacking if it so wishes.
Re: (Score:2)
If you can say that about looking behind a curtain then sure, the site has been cracked.
But the whistle-blowing far outweighs the "crime". There was a weakness, now there will be one less weakness. Had this not been caught there could have been an actual security breach.
Since the goatse security guys obviously do not actually have a legitimate reason to access any of those pages of info
But the owners of iPads have a legitimate interest in the knowledge they gained.
I am pretty sure it wont have too much trouble nailing these guys for hacking if it so wishes.
Yeah, shoot the messenger and allow the pathetic AT&T to quietly remain so.
That's a good use of court resources.
Re: (Score:2)
Re: (Score:3, Insightful)
There were plenty of much more responsible ways to get that vulnerability fixed. That was clearly not the intent of the people involved, since they chose this course of action rather than a responsible one.
Re: (Score:2)
I think at the end of the day, whether it could be considered cracking or not depends on the intent of the owners of the site.
Do you really want to live in a world where the legality of your actions depends on the goodwill of a company such as AT&T?
Re: (Score:2)
Do you really want to live in a world where the legality of your actions depends on the goodwill of a company such as AT&T?
Too late; we're already living in just such a world.
If we weren't, we'd be reading about how the Goatse guys are being commended for their actions that benefit the general welfare.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
``The convoluted wording of legalisms grew up around the necessity to hide from ourselves the violence we intend toward each other. Between depriving a man of one hour from his life and depriving him of his life there exists only a difference of degree. You have done violence to him, consumed his energy. Elaborate euphemisms may conceal your intent to kill, but behind any use
Re: (Score:2)
An unclear law is the first step towards totalitarianism. Who decides what is something bad? I don't find what they did to be bad. Obviously you do. Who gets to choose whether they're convicted?
A fair justice system (mandatory condition for democracy) requires clear laws.
And by the way, "juri" isn't who decides if what you did was bad. It decides whether you did that bad thing that's written in the law. It's very different.
Re: (Score:2)
Also, look at the quote in my post above, it expresses some of my ideas more clearly.
Re: (Score:2)
But you said "Anything that harms other people should be illegal."
For many people, this does harm them - not physically, of course, but as you very well referred, it'll increase spam and that can be seen as "harm".
I want laws to say explicitly what I am or not allowed to do, not "do no harm".
Re: (Score:2)
Our lawyers will get back to the FBI some time
Equal protection and due process for all
Re:No relation (Score:5, Funny)
The rarely seen and difficult to pull off Reverse Godwin?
Re: (Score:2)
Do you mean this FBI [imageshack.us]?
sheesh (Score:5, Funny)
Re:sheesh (Score:5, Funny)
Re: (Score:2)
Re:sheesh (Score:4, Funny)
Well given the name of the hacker group, one figures that with a hole that large no ipad will be big enough to prevent leakage
Re: (Score:2)
I had an iPad back in 2006, for one day. It was after my iSurgery.
Ha ha, I love the genius of the hackers' name (Score:5, Funny)
My heart goes out to the poor journalists heading out to the great google in order to get their big scoop on goatse.
Re:Ha ha, I love the genius of the hackers' name (Score:5, Funny)
My heart goes out to the poor journalists heading out to the great google in order to get their big scoop on goatse.
I'm just trying to imagine what the first story to try to describe the origin of the name will say...
Re:Ha ha, I love the genius of the hackers' name (Score:5, Funny)
My heart goes out to the poor journalists heading out to the great google in order to get their big scoop on goatse.
I'm just trying to imagine what the first story to try to describe the origin of the name will say...
Like a giant gaping security flaw...
Re:Ha ha, I love the genius of the hackers' name (Score:5, Funny)
There are black hat hackers, there are white hat hackers and now there are brown hat hackers.
Re: (Score:2)
There are black hat hackers, there are white hat hackers and now there are brown hat hackers.
Do you really think they bother with condoms if they skip the enema?
Re: (Score:2)
Re:Ha ha, I love the genius of the hackers' name (Score:5, Insightful)
I don't know if I would call them journalists:
Title: Apple's Worst Security Breach
"Apple has suffered another embarrassment. A security breach has exposed iPad owners including dozens of CEOs, military officials, and top politicians. They—and every other buyer of the cellular-enabled tablet—could be vulnerable to spam marketing and malicious hacking."
This is squarely AT&T's fault, yet the first paragraph implies it was "Apple Worst Security Breach". I also like how they imply that a spammer getting your e-mail address is the be-all-end-all of hacking. Really? These folks have never seen spam before? How will they venture out onto the internet without feeling exposed and dirty? Oh wait. They get a new e-mail address. *sigh*
Re:Ha ha, I love the genius of the hackers' name (Score:4, Interesting)
If it was any other company I'd agree with you, however this is Apple, and the fact that they tightly control who sells their product and how, I would expect some kind of oversight. You think if Vodafone got a bunch of iPads and was selling them at $1 on a 5 year plan that apple wouldn't shit itself?
They got themselves into their own self policed walled garden, now they have to deal with it. It was a security breach at a carrier inside the walled garden... deal with it.
And yes, email addresses are valuable information. Sure, not as bad as SSNs, but would you post your email address on a billboard? Why do you think websites, companies etc keep their customer emails under lock and key? because it's a valuable information
Re: (Score:3, Insightful)
You think if Vodafone got a bunch of iPads and was selling them at $1 on a 5 year plan that apple wouldn't shit itself?
As long as Vodafone paid Apple what they agreed upon, I doubt Apple would care. Why would they?
The security breach was with AT&T, because it was on their servers and only affected their customers.
Re: (Score:2)
As long as Vodafone paid Apple what they agreed upon, I doubt Apple would care. Why would they?
Because it lowers the perceived worth of the product. People in general don't tend to think "OK, so it's X up front then Y/month for Z years, that makes it a total of X+(Y*Z)...". They see the up-front cost as being what the device costs. Sure, most will try to balance the two ("If I spend a little more now, it'll cost less per month...") but I don't think they join the dots in quite the same way.
Re: (Score:2)
I also fail to see how what the "Goatse" guys did is a crime. If I send a legitimate request to a website and it returns someone's email address, is it m
Re: (Score:2)
I'm of two minds about the Goatse folks being accountable. You could argue that they knew they were exploiting a weakness each time they sent this script the device ID's, but in their defense, it's rational to ask what kind of brain dead person would drop a script into the public domain knowing the information it could return while not securing said script?
I think I would have to take the 'open garage door' approach. Although someone may leave their garage door open, it is not an open invitation to walk in
Re: (Score:2)
The owner of that garage has the responsibility to keep the door closed, and prevent the information from being so easily seen.
Re: (Score:2)
I don't think that's a valid comparison. We all know what data theft is. These e-mail addresses were not sitting in some text file on the server in plain sight. The Goatse folks specifically had to send formatted data to an undocumented script to get it to return an address. I don't equate that with 'the address was written in big letters on the door'.
Re: (Score:2)
I'm not so sure about that. Apple *requires* customers provide their email address in order to activate their iPad, then they turn the email address over to AT&T.
Under the circumstances, Apple is morally (although probably not legally) responsible for ensuring that AT&T only use that information for appropriate purposes and take reasonable security precautions with it.
Apple has a very simple recourse if it doesn't want to do that. It could provide every iPad with its own email address. Users coul
Re: (Score:2)
Apple doesn't really matter in the equation at all. AT&T has a responsibility to secure users personal information due to privacy laws. It really doesn't matter who gave them that information, they are legally bound to secure it. When users purchased a 3G contract WITH AT&T, they signed the agreement with AT&T as to what was allowed. I know the Apple haters are all excited, but they always gloss over that point. Apple doesn't sell 3G access. AT&T does, and the user goes into the contract dir
Re: (Score:2)
Apple is tying its products to another vendor. It can't stand behind its products without policing the actions of its partner as far as customers for Apple products are concerned.
It'd be different if it were just AT&T being sloppy with its email users, and *some* iPad users used AT&T mail. That'd be AT&T's problem. But the deal Apple is offering is "use AT&T's network services or don't use an iPad."
It'd be different if Apple gave you a choice of providers, and you chose wrong.
Like it or no
Re: (Score:2)
My heart goes out to the poor journalists heading out to the great google in order to get their big scoop on goatse.
Well, according the the story about the leak yesterday, the official description is 'the group is steeped in off-the-wall, 4chan-style internet culture—its name is a reference to a famous gross-out Web picture' [gawker.com] I don't see many people looking it on Google... unless your only reading /.'s summery.... I personally preferred the one description of 'a picture of a man stretching his anus to 'olympic' proportions'. Just calling it 'olympic' proportions is a bad mental image enough.
Re: (Score:2, Insightful)
I like how they seem to think it's amazing to get some of those e-mail addresses, I mean, come on, just look at it:
http://cache.gawkerassets.com/assets/images/7/2010/06/500x_ileakinside3.jpg [gawkerassets.com]
Do you think Les Hintons e-mail address may be les.hinton@dowjones.com ?!
Top secret!
Re: (Score:2)
I personally preferred the one description of 'a picture of a man stretching his anus to 'olympic' proportions'. Just calling it 'olympic' proportions is a bad mental image enough.
Brings a new meaning to the Olympic rings [wikipedia.org], definitely.
New sport for the Olympics? (Score:2)
I personally preferred the one description of 'a picture of a man stretching his anus to 'olympic' proportions'. Just calling it 'olympic' proportions is a bad mental image enough.
Now I know why I avoid watching the Olympics...
I'm just hoping we capture the event ... (Score:2)
Stay classy, Reuters (Score:5, Funny)
Dare I say Reuters has figured it out, with this story image [reuters.com].
Re: (Score:2)
Re: (Score:2)
I applaud this hacker group (Score:5, Funny)
No, not for revealing a potentially dangerous flaw in AT&T security. What-evs.
I heard and read the word Goatse more today in the mainstream media than all points of my life added together, and I can only imagine how many lives were ruined by the ensuring Google searches! Hahahahahah!!!!!!!
Re: (Score:2)
Yeah, typical. AT&T are the victims of brutal cyberweapons [blogspot.com].
Re:I applaud this hacker group (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
As if ten million souls cried out in unison "MY EYES! MY EYES!"
Not you too, Slashdot (Score:4, Informative)
Here, I've done your homework. Was it that hard?
http://security.goatse.fr/blog/
>>
"Anyways, there was no illegal activity or unauthorized access, this was not a shady backroom hookers and blow deal with Nick Denton as revenge for the iPhone raid (though that would be totally sweet), we did not sell your data to spammers (on the contrary, we destroyed it after Ryan used it; it had served its purpose to us) and we did not try to hack your iPads. Your iPads are safer now because of us."
>>
Re:Not you too, Slashdot (Score:5, Insightful)
These guys aren't hackers. They are security advisors. They are the good guys. I suppose the editors didn't bother, you know, clicking a few links? Here, I've done your homework. Was it that hard?
I'm sorry, but googling 'goatse' was not on the list of activities I had planned for the night. I mean, seriously? This said, you have my admiration for your fortitude and thanks for the sacrifices for the cause.
Also, really, with a name like 'goatse' most people aren't going to automatically leap to the idea of it being a white-hat group.
Re: (Score:2, Funny)
Re: (Score:2)
I think it's more of a cherry red.
Re:Not you too, Slashdot (Score:5, Insightful)
Hacker is not a term that means you are the bad guy although it conjures the fear in the ignorant (i.e. the general public). It just meant someone who hacks.
This was a hack.
http://en.wikipedia.org/wiki/Hack_(technology) [wikipedia.org]
Re:Not you too, Slashdot (Score:4, Informative)
Re: (Score:3, Insightful)
Language evolves, whether we like it or not. I used to be a gay hacker untill they changed the meaning of "gay" and "hacker", now I'm just a happy nerd.
Changing the meaning of "hacker" only affects us, but when they changed "gay" it affected hundreds of years of song and poetry -- "Deck the Halls" for example. I have an MP3 I ripped from an old 78 with lyrics "gay as a New Year's party"; it has a completely different meaning today than it did in my dad's youth, because the meaning of the word has changed.
We
Re: (Score:3, Insightful)
I have to admit, I had to ignore years of experience with Internet forums to follow a link to "goatse.fr."
Re: (Score:3, Informative)
They may have discovered it, but they didn't report it to AT&T. From TFA:
"The person or group who discovered this gap did not contact AT&T."
Not that 'good' in my opinion.
Someone is lying, who do you think it is? (Score:5, Interesting)
...According to AT&T. Someone is lying. From TFA [gawker.com]:
Then later in the article:
Personally, I think that AT&T is a sack of douchebags that doesn't know their ass from a hole in the ground, and when choosing who to believe between AT&T and just about anyone else, I'm inclined to believe anyone else. I'd bet dollars to doughnuts that someone did indeed notify AT&T, but now they're trying to cover their ass and make it sound like they somehow proactively found the hole themselves.
Re:Someone is lying, who do you think it is? (Score:5, Informative)
From their 'goatse security' homepage (before they edited it)
Hurm, what's this CUSSE?
Huuuuurm?
Yup, they sound perfectly professional and believable.
Re: (Score:2, Informative)
Re: (Score:2)
Goatse: "Hello, AT&T customer service? I found a hole in your website that gives me access to iPad user email addresses."
AT&T drone:"Huh?"
Re: (Score:2)
Personally, I think that AT&T is a sack of douchebags that doesn't know their ass from a hole in the ground
I've hel the same opinion since they bought out Cingular and my phone bill skyrocketed. I'm a happy Boost Mobile user now.
Re: (Score:2)
They may have discovered it, but they didn't report it to AT&T. From TFA:
"The person or group who discovered this gap did not contact AT&T."
Not that 'good' in my opinion.
"Good" is a relative thing.
Companies would rather have you never disclose their flaws to the public.
OTOH, the public is at least as well served by publicly embarrassing them.
There merits of full vs responsible/non- disclosure have been debated since the 1800s
and if the totality of your contribution is "Not that 'good' in my opinion,"
then you really haven't added much to the discussion.
Think of the iPad e-mail leak as an oil spill.
It's 'big', it's public, and it'll definitely cause changes in security to be
Re: (Score:3, Insightful)
These guys aren't hackers. They are security advisors. They are the good guys.
So, if you were one of the people who had their personal email leaked, would you be thanking the good guys right now for doing it? It's sort of like if a security consultant pushed somebody through a broken railing to "demonstrate" the flaw in security. Couldn't they have just called AT&T and pointed it out? Or would that not have been rad enough?
Re: (Score:2)
Then you wouldn't know about it, so you wouldn't learn that if you want to keep your email address private, you don't give it to AT&T.
Re: (Score:2)
Dude, I know what's on goatse.fr [goatse.fr] - you're not going to trick me by adding a sub-domain and a directory name!
ole (Score:4, Funny)
AT&T needs to fix this wide, gaping hole that has been stretched open on their website before more iPad email addresses are exposed.
Re: (Score:2)
The situation will not be rectified until the ass responsible for this is wiped out.
assholes (Score:5, Insightful)
FUCKED! UP!
Re: (Score:3, Interesting)
Re: (Score:2)
Re: (Score:2)
Well, the sentiment is alright, but isn't entering somebody's unlocked house and taking the stuff you are not supposed to take still "breaking and entering"?
Or, better, imagine you have entered somebody's house for a party. You are assumed to enjoy food and drinks, but you are not supposed to take objects of art from the walls, are you? You are not supposed to take somebody's diary notebook from the top of the desk or somebody's addressbook...
Depends on how are the rules written. What are the rules of using
Re: (Score:2)
Well, the sentiment is alright, but isn't entering somebody's unlocked house and taking the stuff you are not supposed to take still "breaking and entering"?
No, it is not. In order to have breaking and entering, the house must be locked. Otherwise it's just trespassing, and in California you're not trespassing until you've been told to leave, dunno about other states. "posted keep out" signs don't mean shit unless you can't possibly fail to see one on your way onto some property.
Depends on how are the rules written. What are the rules of using that particular website? How well are they exposed to the average user?
Accessing accidentally exposed information is not illegal. Web-site EULAs do not trump law.
The situation is not as black and white as many /.ers would like to see it.
No, it's green and white. Although we do still use some black ink on our money.
Re: (Score:2)
Someone pulls it from their site and they get hunted down like a witch.
AT&T paid good money for their legislators and regulators. They're entitled, in return, for some "protection service", aren't they?
Re: (Score:2)
Hey, someone puts a useless "bomb" that wouldn't have killed anyone in Times Square, and in less than a week, they've got the guy and he'll never see the light of day again.
BP on the other hand, kills 11 people, and wipes out the entire gulf coast, and so far, the only thing that has happened is that their stock price has dropped a bit. If you're moaning because there's no justice in the world, all I gotta say is wake up and smell the coffee.
As I've been saying for a long time now, Corporations have *more*
Re: (Score:2, Insightful)
Re: (Score:2)
I think the interpretation of the law is wrong in that case because there are many situations where it is appropriate to append ../../ to a URL. How is the person browsing the site expected to know the difference?
Re: (Score:2)
And that we tolerate them cracking down on reasonable things means we're partly the ones to blame when frustrated hackers - now labeled black-hats by the system for URL rewriting - melt our cell-phone (well, flash them to uselessness) as part of their next demonstration.
I mean, if we blow every little thing up into jail-time they'll blow every quiet security notification up into a hilarious media scandal. Right? Nobody else seeing this?
The real reason AT&T is mad (Score:2)
Basically - they couldn't find a way to charge for each downloaded e-mail address.
Why is this "news"? (Score:2, Insightful)
It's not a hack, it's only indirectly related to Apple (despite Gawker's attempts to paint it otherwise), and the government email addresses that were "exposed" are public anyway. It's not difficult for me to send email to Rahm Emanuel. Goatse's brute force script isn't that interesting (see http://praetorianprefect.com/archives/2010/06/114000-ipad-owners-the-script-that-harvested-their-e-mail-addresses/ [praetorianprefect.com]) so why are we wasting so much time on this non-story?
Re: (Score:2)
How complex, encrypted and expensive does a backend have to be before the FBI and US law spins up?
From Google to a UFO hunter to a telco database, it seems the US wants very flexible laws.
Enter a mil MS network with a script its a hack, collect packets from wifi networks without permission, its a mistake, run a brute force script on a telco and its a
Most parts of the world sorted their cyber crime law
Wide Hole (Score:2, Redundant)
Goatse finds a "hole" wide enough to drive a truck through, oh the irony!
Downloading 114k users != white hat (Score:3, Insightful)
A white hat would see the hole, download a few to verify, write a script as a proof of concept and verify that the script worked, and then report the hole to AT&T. Downloading over 100,000 email addresses and sending them to the press is NOT what responsible security researchers do.
Re: (Score:2)
This isn't so simple (Score:4, Interesting)
Sensible l (Score:2, Insightful)
Humor flame, please disregard; (Score:2)
It always irritates me when someone refers to "goatse.cx" as "goatse". It's like they missed the whole point of the joke.
more than 2GB of data??? (Score:2)
So now, if you get spammed, because AT&T gave out your email address for any script that asks for it, does that count against your draconian "unlimited" 2GB data-plan? How can they ALLOW you to get spammed, all the while charging you for every packet you get. Pretty double-faced of them, eh?
First the local police, now the FBI (Score:2)
What's next? INTERPOL?
So THAT'S why it's stretched so wide... (Score:2)
I now know where Apple's been hiding their top secret stuff when they aren't out getting drunk and losing them.
And it's a place most people would NEVER go to steal something.
Think "Christopher Walker" "Pulp Fiction" and "Watch".
Excuse me, I need to go scrub my head out with a sandblaster now.
Re: (Score:2)
Re: (Score:2)
there fixed that for you
Re: (Score:2)
Re: (Score:2)