Registration was successful!
Please follow the link from the email sent to

Hackers Who Targeted CIA Director Turn Attacks on FBI, US Cops

Subscribe
The hacktivist group who previously set their sights on CIA Director John Brennan in protest of the Israeli occupation of Palestine have now set their sights set on United States police forces, as well as the FBI.

The group, which goes by the name “Crackas With Attitude,” first gained access to the law enforcement systems that allow police to share information in real time. A screenshot of the database was shared on one of the member’s Twitter accounts.

The screenshot shows the Joint Automated Booking System, or JABS, a federal arrest system used by both local and federal law enforcement departments that features a real-time chat and file transfer service for officers.

FBI headquarters in Washington, DC - Sputnik International
Hackers Breach FBI Website, E-Mail Account of Bureau’s Deputy Director

Unlike the previous breach of CIA Director Brennan’s email, which the hacking group claims they obtained through social engineering his service providers into giving him information, for the FBI database they claim to have exploited a flow in the system.

Another account tweeted a screenshot of activist-turned-political-prisoner Jeremy Hammond’s arrest records, including the names and phone numbers of the agents involved in his railroading.

On Thursday, coinciding with the Million Mask March protests, the group also posted a link to personal information for over 2,200 members of law enforcement and federal agents. They claim to have personal data on 34,000 government employees and military personnel.

Thomas Herring, 39, of Lackawanna, NY, was convicted of obstruction of justice and sentenced to two years in prison on Friday after purchasing crack-cocaine for the FBI from the wrong dealer. The arrest sheds light on US law enforcement’s problematic - and often deadly - use of informants in their operations. - Sputnik International
FBI Snitch Sentenced to Prison for Buying Drugs From Wrong Dealer
The group claims that by infiltrating JABS, they now have access to a long list of programs and resources, including the Enterprise File Transfer Service, Cyber Shield Alliance, DFS Test, eGuardian Training, IC3, IDEAFX, Intelink, Intelink IM, and Justice Enterprise File Sharing, Special Interest Group, Virtual Command Center, National Data Exchange, National Gang Intelligence Center, Repository for Individuals of Special Concern, RISSNET, ViCAP Web National Crime Database, Active Shooter Resources Page, Malware Investigator, Homeland Security Information Network, and eGuardian.

It is currently unclear how much data they have access to or how much damage could be done by the breach — or what damage has already been perpetrated.

Newsfeed
0
To participate in the discussion
log in or register
loader
Chats
Заголовок открываемого материала