Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
 

cali

(114,904 posts)
Wed Sep 5, 2012, 11:37 AM Sep 2012

Anonymous group allegedly hacked Romney tax records via Franklin firm

Here's the deal though, the article goes on to say that the supposed hackers published a blackmail letter demanding 1 million dollars in return for not releasing the info.

Tuesday, September 4, 2012 at 9:33pm
By Ken Whitehouse


An anonymous individual or group is alleging that they have gained "all available 1040 tax forms" of GOP presidential candidate Mitt Romney by accessing computers in the Franklin office of the professional services firm PricewaterhouseCoopers.

<snip>

"Romney's 1040 tax returns were taken from the PWC office 8/25/2012 by gaining access to the third floor via a gentleman working on the 3rd floor of the building. Once on the 3rd floor, the team moved down the stairs to the 2nd floor and setup shop in an empty office room. During the night, suite 260 was entered, and all available 1040 tax forms for Romney were copied. A package was sent to the PWC on suite 260 with a flash drive containing a copy of the 1040 files, plus copies were sent to the Democratic office in the county and copies were sent to the GOP office in the county at the beginning of the week also containing flash drives with copies of Romney's tax returns before 2010. A scanned signature image for Mitt Romney from the 1040 forms were scanned and included with the packages, taken from earlier 1040 tax forms gathered and stored on the flash drives.



<snip>

A follow up letter was also posted that states:



The deal is quite simple. Convert $1,000,000 USD to Bitcoins (Google if if you need a lesson on what Bitcoin is) using the various markets available out in the world for buying. Transfer the Bitcoins gathered to the Bitcoin address listed below. It does not matter if small amounts or one large amount is transferred, as long as the final value of the Bitcoins is equal to $1,000,000 USD at the time when it is finished. The keys to unlock the data will be purged and what ever is inside the documents will remain a secret forever.

http://nashvillecitypaper.com/content/city-news/anonymous-group-allegedly-hacked-romney-tax-records-franklin-firm

149 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Anonymous group allegedly hacked Romney tax records via Franklin firm (Original Post) cali Sep 2012 OP
Release the tax forms Panasonic Sep 2012 #1
I wish it were true, but it's bullshit... cynatnite Sep 2012 #2
I don't see how the publication of a faux story on a satire site cali Sep 2012 #3
Copies were sent to the DNC...so what's the reason for the million dollar blackmail? cynatnite Sep 2012 #11
Where does it say they were sent to the DNC? drm604 Sep 2012 #13
Thanks for the correction... cynatnite Sep 2012 #15
You think that modern encryption is something that can be easily defeated? EOTE Sep 2012 #24
More like 100%. drm604 Sep 2012 #29
AES doesn't have quite a 100% track record. EOTE Sep 2012 #36
As far as I know drm604 Sep 2012 #37
Crackable is, I guess, a subjective term here. EOTE Sep 2012 #39
But social engineering Aerows Sep 2012 #50
Certainly drm604 Sep 2012 #72
Do you work in internet security? Aerows Sep 2012 #90
No, I don't drm604 Sep 2012 #92
You keep using that word. I do not think it means what you think it means. jeff47 Sep 2012 #61
GPU calculations per seconds Aerows Sep 2012 #65
Some, for sure. EOTE Sep 2012 #70
Well, it's never been done. EOTE Sep 2012 #69
Are you operating under the illusion that the NSA announces such things publicly? jeff47 Sep 2012 #127
Of course they wouldn't announce it, but they're still limited to the rules of math. EOTE Sep 2012 #131
So you still ignore the parellelism jeff47 Sep 2012 #146
You REALLY need to think a bit harder about this. EOTE Sep 2012 #148
Is that word impossible? EOTE Sep 2012 #71
Intelligent algorithims Aerows Sep 2012 #73
It doesn't matter how intelligent an algorithm is if it requires billions or trillions of computer EOTE Sep 2012 #77
Okay Aerows Sep 2012 #89
Are we even on the same thread? EOTE Sep 2012 #91
The point is Aerows Sep 2012 #94
Once again, AES256 has never been cracked. EOTE Sep 2012 #98
I see after that response, you didn't have anything to say Aerows Sep 2012 #97
What on earth are you going on about? EOTE Sep 2012 #99
I have 22+ years in the industry Aerows Sep 2012 #101
But I'm afraid you've got some serious comprehension problems. EOTE Sep 2012 #103
I illustrated for you Aerows Sep 2012 #105
Sure, it's not impenetrable if you've got a few thousand years at your disposal. EOTE Sep 2012 #107
If you believe that there is nothing of substance here Aerows Sep 2012 #108
So once again, you offer nothing. EOTE Sep 2012 #110
I offer nothing Aerows Sep 2012 #112
Now you're offering kindness? EOTE Sep 2012 #114
You bet, sweetheart :) Aerows Sep 2012 #116
You're damned right. I tend to deal with facts. EOTE Sep 2012 #118
So you know things MS Research and Bruce Schneier don't? sir pball Sep 2012 #140
And by the way, who's being the braggart now? EOTE Sep 2012 #104
I illustrated my competence Aerows Sep 2012 #106
No, you've just repeated buzzwords over and over again. EOTE Sep 2012 #109
Buzzwords? Aerows Sep 2012 #111
They're buzzwords in that you're repeating them incessantly. EOTE Sep 2012 #113
I honestly believe Aerows Sep 2012 #115
Christ, this is very simple. LISTEN CLOSELY. EOTE Sep 2012 #117
It's already in the mainstream Aerows Sep 2012 #119
What a freaking joke. Now you've proven how little you know of this. EOTE Sep 2012 #120
You know Aerows Sep 2012 #121
You're welcome to provide any information to the contrary. EOTE Sep 2012 #122
I'll bet you have had enough Aerows Sep 2012 #123
Let me explain this as simply as possible. EOTE Sep 2012 #132
You should probably read this too snooper2 Sep 2012 #136
You should really read this- snooper2 Sep 2012 #134
Yes, I have no idea what you're talking about because you're talking out of your ass. EOTE Sep 2012 #145
FYI, number of years doesn't really mean as much as people think- snooper2 Sep 2012 #133
But surely 22 years of experience gives one the power to change the known laws of the universe. EOTE Sep 2012 #137
I could crack it in a couple hours snooper2 Sep 2012 #138
For sufficiently large values of "time".. sir pball Sep 2012 #139
I think there are plenty of people just as smart as Anonymous. n/t cynatnite Sep 2012 #32
You've entirely missed the point. EOTE Sep 2012 #35
Key words..."damned near". cynatnite Sep 2012 #38
Well, so far there haven't been any serious threats against AES 256. EOTE Sep 2012 #40
It depends on what you regard Aerows Sep 2012 #74
You portend to have such knowledge? EOTE Sep 2012 #80
And if you thought to threaten me because I understand AES256 Aerows Sep 2012 #84
What on earth are you talking about? EOTE Sep 2012 #88
Not that anyone Aerows Sep 2012 #76
Now you're just throwing random cryptography words together sir pball Sep 2012 #141
Where does it say this was Anonymous? They do not ask for ransom ever. Anyone sabrina 1 Sep 2012 #59
It wasn't as far as I can tell Aerows Sep 2012 #86
I'm going to post this before I go read the story. bemildred Sep 2012 #143
Unbreakable encryption is very easy these days. drm604 Sep 2012 #27
I don't have a degree in Computer Science Aerows Sep 2012 #100
If AES256 is breakable in the real world in reasonable amounts of time drm604 Sep 2012 #130
I have serious doubts about this drm604 Sep 2012 #6
That is a totally different story - not even the same thing FreeState Sep 2012 #7
Sounds like a scam wrapped in blackmail behind a pretend robbery. leveymg Sep 2012 #4
As I understand it drm604 Sep 2012 #9
Wow. I'm living in a bad SciFi novel. drm604 Sep 2012 #5
The possibility of blackmail is a big issue gollygee Sep 2012 #8
Extremely scary Aerows Sep 2012 #10
yes...that is why candidates show their taxes...so they can't be blackmailed DonRedwood Sep 2012 #102
this sounds like a sympathy ploy flamingdem Sep 2012 #12
Only $1 million? Hutzpa Sep 2012 #14
Check out the pastebin link I just posted Aerows Sep 2012 #17
Only 1 million? Spirochete Sep 2012 #144
This looks like the complete contents Aerows Sep 2012 #16
Nashville City Paper seems to have information that isn't in that pastebin document. drm604 Sep 2012 #25
Gonna have to show me some proof or else it's just the wind blowing..... nc4bo Sep 2012 #18
Would love to know if any police/security reports were made of a possible break-in? nc4bo Sep 2012 #19
I don't think there was any break in Hutzpa Sep 2012 #28
You'd think something would have been disturbed. nc4bo Sep 2012 #33
Ummm... probably not so much cthulu2016 Sep 2012 #20
One thing's for sure... stories like this will keep Mitt awake at night! reformist2 Sep 2012 #21
If the story were true, why demand only $1M? HooptieWagon Sep 2012 #22
Obviously done by an Austin Powers fan cthulu2016 Sep 2012 #23
Throw me a frickin bone here! DefenseLawyer Sep 2012 #49
I mean...100 BILLION DOLLARS!!! bullwinkle428 Sep 2012 #128
Hahaha haha!!!!!!!! Major Hogwash Sep 2012 #149
The blackmailers must not be Republicans. nt valerief Sep 2012 #26
I don't know much about BitCoins drm604 Sep 2012 #30
I don't know if there's more than a million dollars of bitcoin out there... nebenaube Sep 2012 #31
There is a hard limit of the number of Bitcoins in circulation Aerows Sep 2012 #44
That some people actually believe this nonsense could be true shows how gullible people are. former9thward Sep 2012 #34
If Wonkette says it's so... cynatnite Sep 2012 #41
Wonkette says it's probably fake. drm604 Sep 2012 #81
I don't believe or disbelieve it but I don't think cali Sep 2012 #43
Social engineering Aerows Sep 2012 #45
You never know Aerows Sep 2012 #48
If it were true, the hackers would have released a non-damaging part of the return. berni_mccoy Sep 2012 #42
According to what they say Aerows Sep 2012 #46
Anyone catch a whiff of Rove around this event? Skidmore Sep 2012 #47
What would be the gain? Aerows Sep 2012 #51
It wouldn't be the first time Rove set up a dirty trick to try to make it look as if the other side Skidmore Sep 2012 #55
Oh, that's a great list! Lone_Star_Dem Sep 2012 #58
First let me point out it's physical theft, not hacking. Lone_Star_Dem Sep 2012 #56
Of course it is theft Aerows Sep 2012 #60
Having just looked up the "Bitcoins" Lone_Star_Dem Sep 2012 #66
For what it's worth, Franklin is in Williamson County TN, Lars39 Sep 2012 #126
Proves that as long as Romney has secrets to hide (his tax forms), then he's blackmail-able. Lex Sep 2012 #52
So very true. nc4bo Sep 2012 #53
I think it's a Rove or Koch ploy to grab the front pages from the DEM convention woodsprite Sep 2012 #54
Except Aerows Sep 2012 #63
What original post? drm604 Sep 2012 #75
Here Aerows Sep 2012 #79
That's burglary, not hacking. silverweb Sep 2012 #57
Nice try KKKarl Rove. BeHereNow Sep 2012 #62
Rove was the second one Aerows Sep 2012 #64
Wow...this is really cool. Hope it's true. I have often thought how easy it might be for someone Laura PourMeADrink Sep 2012 #67
You do realize, don't you, that both the seller and the newspaper would be committing a felony. former9thward Sep 2012 #83
I don't believe this for one second.... NotThisTime Sep 2012 #68
This is not outside the realm of possibility drm604 Sep 2012 #78
Bitcoin runs Aerows Sep 2012 #82
Who said that I think it's any different? drm604 Sep 2012 #85
I didn't think you did Aerows Sep 2012 #93
Nashville City Paper is now reporting that drives have been received. drm604 Sep 2012 #87
Interesting. Aerows Sep 2012 #95
ABC is now reporting it. drm604 Sep 2012 #96
They got thumb drives Aerows Sep 2012 #125
I wouldn't go anywhere near it. NYC Liberal Sep 2012 #124
Someone may break the cipher and find a Walt Disney clip Coyotl Sep 2012 #129
I'd be applauding the hackers if they weren't trying to profit from this. Comrade_McKenzie Sep 2012 #135
They should just release one page at a time until the Romney campaign agrees to release them. cbdo2007 Sep 2012 #142
I've written more credible fiction with more details and suspense. Sorry, ain't buying it. freshwest Sep 2012 #147
 

cali

(114,904 posts)
3. I don't see how the publication of a faux story on a satire site
Wed Sep 5, 2012, 11:51 AM
Sep 2012

disproves this story. I have my doubts too and even if true these people are true sleazeballs, but it seems possible if not probable.

cynatnite

(31,011 posts)
11. Copies were sent to the DNC...so what's the reason for the million dollar blackmail?
Wed Sep 5, 2012, 12:10 PM
Sep 2012

We'd also see the networks going insane over this if it were true, too.

It just screams BS to me.

drm604

(16,230 posts)
13. Where does it say they were sent to the DNC?
Wed Sep 5, 2012, 12:16 PM
Sep 2012

It says they were sent to the Democratic county office. And they were encrypted.

I think it's very likely BS but the story holds up.

cynatnite

(31,011 posts)
15. Thanks for the correction...
Wed Sep 5, 2012, 12:23 PM
Sep 2012

I still don't buy the story. The variation that appeared on that satirical site I posted is also why I doubt it. Plus I think the media would be scrambling over this.

Also, do you think that the media or political parties can't decrypt it? Do you think they can't get their own hackers just as smart as anonymous? 1 million dollar blackmail? Seriously?

Sorry, I just don't buy this for one second. I'd love for it to be true, but I don't think it is.

If I'm wrong, I will declare it happily and loudly.

EOTE

(13,409 posts)
24. You think that modern encryption is something that can be easily defeated?
Wed Sep 5, 2012, 12:32 PM
Sep 2012

AES is rock solid and there have been extremely few successful attempts to crack it. Do I think they can't get their own hackers just as smart as anonymous? Well, even if they could, it's entirely a moot point. It's far, far, far easier to encrypt data than it is to decrypt it. I'm only moderately educated on decryption/encryption standards, yet I could encrypt data so that 99.999% of the world's most elite hackers couldn't touch it even given several years time.

EOTE

(13,409 posts)
36. AES doesn't have quite a 100% track record.
Wed Sep 5, 2012, 12:53 PM
Sep 2012

The vulnerabilities are such that it still requires a great amount of computing time and power, but it's not 100% fail safe as of now.

http://en.wikipedia.org/wiki/Advanced_Encryption_Standard#Known_attacks

drm604

(16,230 posts)
37. As far as I know
Wed Sep 5, 2012, 01:08 PM
Sep 2012

the techniques discussed in that "known attacks" section are simply ways to reduce the needed brute force. They would still take a ridiculous amount of time and resources.

I don't think the side channel attacks are relevant here.

Not that I think there's anything to this story, but I don't know of any show-stopping objections other than the sheer hollywood caper flavor of the whole thing coupled with the total lack of evidence so far.

EOTE

(13,409 posts)
39. Crackable is, I guess, a subjective term here.
Wed Sep 5, 2012, 01:18 PM
Sep 2012

As it is, using brute force to crack AES 256 is simply impossible. The computing power and time simply isn't there, even using massive parallel computing. However, using some of these vulnerabilities. the cracking of lesser versions, such as AES 128 are technically feasible given massive amounts of time and resources.

 

Aerows

(39,961 posts)
50. But social engineering
Wed Sep 5, 2012, 02:24 PM
Sep 2012

And being granted access to a local resource? By far the easiest method.

drm604

(16,230 posts)
72. Certainly
Wed Sep 5, 2012, 04:13 PM
Sep 2012

but I doubt that anyone's going to able to talk the key out of whoever did this (in the unlikely case they did actually do it).

 

Aerows

(39,961 posts)
90. Do you work in internet security?
Wed Sep 5, 2012, 05:19 PM
Sep 2012

I do. I've seen worse happen. I'd be pleased to privately offer my credentials via PM if you will.

drm604

(16,230 posts)
92. No, I don't
Wed Sep 5, 2012, 05:28 PM
Sep 2012

but I don't get your point. Are you saying that someone could use social engineering to decrypt these files (assuming they exist)?

jeff47

(26,549 posts)
61. You keep using that word. I do not think it means what you think it means.
Wed Sep 5, 2012, 02:56 PM
Sep 2012
As it is, using brute force to crack AES 256 is simply impossible

False.

Brute forcing AES256 is very time-consuming. But not impossible. It's also an almost infinitely-parallelizable problem, so the limitation is the number of machines you use to brute-force it. Also, it's a problem that special hardware can solve much, much faster than a general purpose computer.

For everything you and I could encrypt, nobody's going to bother with the effort. For much more valuable stuff, it's time to break out the soldering irons. It is rumored that the NSA has done so and can now routinely brute-force AES-256 encrypted data. It's obviously difficult to find out if this is actually true or paranoia. But it is within the realm of the possible.

The only unbreakable encryption is one-time pad. Everything else can be broken with enough time and computation.
 

Aerows

(39,961 posts)
65. GPU calculations per seconds
Wed Sep 5, 2012, 03:02 PM
Sep 2012

or TFlops has rendered brute forcing of some encryption methods trivial. AES-256? No, but with the ability of teraflops of calculations with the parallel processing capabilities of modern graphics cards, not out of reach at all.

EOTE

(13,409 posts)
70. Some, for sure.
Wed Sep 5, 2012, 03:34 PM
Sep 2012

Encryption could be anything from incredibly simple character substitution to AES-256 and beyond. But it's not like AES-256 encryption is terribly difficult to obtain. I think it's going to be quite some time before we see any chinks in its armor. I don't care how powerful these GPUs are, unless you have about 2^30 of them, it's not going to touch AES-256.

EOTE

(13,409 posts)
69. Well, it's never been done.
Wed Sep 5, 2012, 03:28 PM
Sep 2012

And considering the operations to recover AES-256 encryption is around 2^250+, I don't see that being done anytime in the near future, no matter how much hardware is simultaneously running it. As for the NSA claim, I'd need to see that to believe it. As it is right now, I don't believe we have anywhere near the brute force capability to do such a thing.

jeff47

(26,549 posts)
127. Are you operating under the illusion that the NSA announces such things publicly?
Wed Sep 5, 2012, 11:16 PM
Sep 2012

As for rumors, here's one site discussing them - he's skeptical, but doesn't think it's impossible. Feel free to google.

But keep in mind we're not talking about CPU cycles, or even GPU cycles.

We're talking about custom-built chips resembling FPGAs that are built to do the brute force attack a few million times faster than a general purpose CPU. Such devices are theoretical in our world, but people with lots of cash could build them.

It's mathematically possible with a whole lot of such devices to brute force AES-256 in a reasonable time (months if you don't get lucky).

EOTE

(13,409 posts)
131. Of course they wouldn't announce it, but they're still limited to the rules of math.
Thu Sep 6, 2012, 10:05 AM
Sep 2012

And a few million times faster wouldn't cut it at all. It would need to be a few trillion, trillion, trillion, trillion times faster if it were to make a dent in AES256. I don't think you understand the absolutely mind boggling numbers we're talking about here. We're talking 2^250 here. That's nothing like the 64^16 or so that's the max that hardware based solutions can run through now. That's many, many, MANY magnitudes of order more. In case you're having a hard time imagining 2^250, imagine a 2 followed by 75 zeros. That's the numbers we're talking about here. That's NOTHING like the toy like encryption that most websites use. It is, for all intents and purposes, uncrackable.

jeff47

(26,549 posts)
146. So you still ignore the parellelism
Thu Sep 6, 2012, 02:59 PM
Sep 2012

You're still thinking of this as a single process running on a single desktop computer.

That chip I describe is one chip. You put a few hundred in box. You then get a shitload of those boxes. You use other sources and techniques to reduce the key space. Ta-da! It's now doable.

That's NOTHING like the toy like encryption that most websites use.

You'll find that most SSL connections these days use AES for the symmetric encryption.

It is, for all intents and purposes, uncrackable.

So your version of the math says it can be done in a very long time, then you declare it impossible.

Pick one.

EOTE

(13,409 posts)
148. You REALLY need to think a bit harder about this.
Thu Sep 6, 2012, 03:18 PM
Sep 2012

Fuck a few hundred, let's have billions of the world fastest supercomputers (the IBM Sequoia) running in parallel. If that were the case, it would only take about a billion years to crack AES256 rather than thousands of trillions of years. Do you understand what type of numbers we're talking about here? I said that for all intents and purposes, it's uncrackable. That is an undeniable truth. It's not impossible, it would just take literally billions of billions of years. Is that clear enough for you? Do you understand how insanely large 2^250 is?

EOTE

(13,409 posts)
71. Is that word impossible?
Wed Sep 5, 2012, 03:35 PM
Sep 2012

I suppose nothing is truly impossible. But given current technology, the likelihood of AES256 being broken by brute force is far less likely than monkeys flying out of my ass.

 

Aerows

(39,961 posts)
73. Intelligent algorithims
Wed Sep 5, 2012, 04:31 PM
Sep 2012

significantly reduces such time. Just saying.

Not to mention that even if you use a salt, you have to pass it through said algorithm. Do you really think that router authorization devices have been around for 16+ years, and the salt hasn't been partially cracked? Rainbow tables, my friend.

EOTE

(13,409 posts)
77. It doesn't matter how intelligent an algorithm is if it requires billions or trillions of computer
Wed Sep 5, 2012, 04:56 PM
Sep 2012

hours to work properly. I have seen absolutely zero evidence that AES256 has come close to being cracked. I've heard tons of rumors that NSA can do it almost on the fly, but I don't buy that for one second. Until I see at least a smidgen of evidence, I won't believe differently.

 

Aerows

(39,961 posts)
89. Okay
Wed Sep 5, 2012, 05:17 PM
Sep 2012

And I will assume that you believe 100% that this is an operation to discredit Democrats by making them believe something that they already know to be true due to experience in said industry.

"You are lying, you Democrat, because I fooled you into believing that you are lying" isn't a particularly compelling defense. It smells.

EOTE

(13,409 posts)
91. Are we even on the same thread?
Wed Sep 5, 2012, 05:20 PM
Sep 2012

Because you seem to be reading words that I haven't even come close to writing.

I have no idea whether this is genuine or not, that's not even what I commented on. My initial entering of this OP was to correct some naive notion that if Anonymous was able to encrypt this data that surely there are plenty of people who could decrypt it. That's simply not the case and that's what I was responding to. I'm not exactly sure what it is you're accusing me of, but it's certainly nothing that I've said.

 

Aerows

(39,961 posts)
94. The point is
Wed Sep 5, 2012, 05:59 PM
Sep 2012

That this isn't necessarily "Anonymous" the group, and is just a bunch of anonymous people. That was my point.

"My initial entering of this OP was to correct some naive notion that if Anonymous was able to encrypt this data that surely there are plenty of people who could decrypt it. That's simply not the case"

I think you need to wait a few days and see if that is the case or not, because you may be proven wrong.

EOTE

(13,409 posts)
98. Once again, AES256 has never been cracked.
Wed Sep 5, 2012, 06:24 PM
Sep 2012

I never said who this group was or what their motivation is. I simply said that it's VERY easy for people with a modicum of knowledge to encrypt data so that it's effectively uncrackable. Certainly nothing is impossible, but the resources required to crack high level encryption without a key makes it pretty much so.

 

Aerows

(39,961 posts)
97. I see after that response, you didn't have anything to say
Wed Sep 5, 2012, 06:15 PM
Sep 2012

Not that you would. Braggadocio has no place in the security field, but some seem to think it is their meat and drink.

EOTE

(13,409 posts)
99. What on earth are you going on about?
Wed Sep 5, 2012, 06:26 PM
Sep 2012

This is your first response to me since you accused me of threatening you. Now you're accusing me of being a braggart? I suggest either laying off on cybercrime novels or perhaps reading a bit more thoroughly before responding in the future.

 

Aerows

(39,961 posts)
101. I have 22+ years in the industry
Wed Sep 5, 2012, 06:29 PM
Sep 2012

I await your magnificent credentials and wide variety of experience with hardware and software to discredit my statements, EOTE.

You are from Maryland, and I assume an Obama supporter, which I respect. But don't assume that with nothing more than insults I will cave on my assessments and experience.

EOTE

(13,409 posts)
103. But I'm afraid you've got some serious comprehension problems.
Wed Sep 5, 2012, 06:40 PM
Sep 2012

You accuse me of threatening you when I've done absolutely nothing of the sort.

I've got 17 years in the industry, but that's only because I couldn't start my first real IT job until I turned 16. I guarantee you that I know of which I speak. I said that with today's technology, AES256 is for all intents and purposes impenetrable. That is a fact. You disagreed with that and I asked to hear what made you disagree with my statement. That's when you went on a fairly unbalanced tangent accusing me of threatening you. If that's what you got out of my comment, then you probably need meds. If you DO have anything to contribute that would suggest that what I say is incorrect, please provide it. Otherwise, it just seems like you're posting one paranoid rant after another.

 

Aerows

(39,961 posts)
105. I illustrated for you
Wed Sep 5, 2012, 06:55 PM
Sep 2012

how it was not impenetrable, particularly using parallel processing GPU's and intelligent algorithms.

That is also fact, and the fact that you evade such usage of technology to paint a picture of incompetence proves that you truly are out of your depth.

In the end, though, this is neither here nor there. Let's wait a few days and see if the hackers got anything of worth before we get egos in an uproar and sling insults like you are doing.

EOTE

(13,409 posts)
107. Sure, it's not impenetrable if you've got a few thousand years at your disposal.
Wed Sep 5, 2012, 07:00 PM
Sep 2012

And several thousand computers running in parallel.

What you're describing is like using a bucket to empty out an ocean rather than a teaspoon. It will save you lots of time, won't it? Sure, you'll empty out the ocean in a few million years rather than a few billion.

What you've presented is not a fact, it's just fairly random information. Do you not think that people have access to all the things that you've mentioned? Do you still not realize that AES256 STILL hasn't been cracked? Do you think that NSA is saying to themselves "Damn, if we'd only thought of that!". You've illustrated nothing of substance.

 

Aerows

(39,961 posts)
108. If you believe that there is nothing of substance here
Wed Sep 5, 2012, 07:02 PM
Sep 2012

Then you are less educated on current hardware and protocols to make use of said hardware.

EOTE

(13,409 posts)
110. So once again, you offer nothing.
Wed Sep 5, 2012, 07:05 PM
Sep 2012

All I'm asking you is to provide one little shred of evidence that AES256 has been compromised. You said I was wrong when I said that it hadn't been, so surely you'd be able to provide some information to that extent. But I'm certain that won't happen. Rather, you're going to throw out some buzz terms that you know very little of and say that proves your case. To say you're making an irrational argument would be kind.

 

Aerows

(39,961 posts)
112. I offer nothing
Wed Sep 5, 2012, 07:07 PM
Sep 2012

to you, because at this point, you have proven to know nothing of the subject you are attempting to discuss and arguing with you is pointless. I say this with kindness.

EOTE

(13,409 posts)
114. Now you're offering kindness?
Wed Sep 5, 2012, 07:11 PM
Sep 2012

That's somewhat laughable after accusing me of threatening you for asking a simple question.

So now you say you're offering me nothing because I've proven I know nothing of the subject? OK, let's go with that for one minute. So what was your reason for offering me nothing the previous 6 times I asked? Did I know too much then? Listen, I know egos can be fragile things, but honesty is always the best policy. Yeah, you're not offering me anything because I won't understand it. Gotcha chief.

 

Aerows

(39,961 posts)
116. You bet, sweetheart :)
Wed Sep 5, 2012, 07:14 PM
Sep 2012

Let's end this here and now, because it isn't going anywhere good other than bumping this thread. You and I disagree.

EOTE

(13,409 posts)
118. You're damned right. I tend to deal with facts.
Wed Sep 5, 2012, 07:18 PM
Sep 2012

You seem to deal only with your very active imagination. I think the sky is blue, you think it's green, yet you seem utterly incapable of providing even so much as a link (from even the most disreputable source) that says the sky is green. So I'll continue to believe it's blue, thanks.

sir pball

(4,760 posts)
140. So you know things MS Research and Bruce Schneier don't?
Thu Sep 6, 2012, 12:33 PM
Sep 2012

As of last year the best public attacks on standard AES were about three orders of magnitude less than brute force. (PDF from MS Research) Still on the order of billion-billions of years on Sequoia for 128, let alone 256. I know that GPUs are insanely fast at embarrassingly parallel jobs like key searches but I haven't heard anything about a 16+ petaflop GPU network anywhere. Not saying a secret machine might not exist, but even so it wouldn't be practically any more useful than the NNSA/ASCP systems - even if it were quite literally a million times faster.

As for these super-duper "intelligent algorithms" you claim knowledge of, you should really give the NSA a call - sounds like something you could make a VERY good living dealing with them on.

EOTE

(13,409 posts)
104. And by the way, who's being the braggart now?
Wed Sep 5, 2012, 06:48 PM
Sep 2012

I could provide you my CV, but internet credentials are meaningless anyway. I prefer to deal with actual substance, something that you've been avoiding this conversation. If you have any actual information to suggest that AES256 has even come close to being compromised, you should be able to provide it easily. If you don't, then you're simply being contrary to be contrary.

 

Aerows

(39,961 posts)
106. I illustrated my competence
Wed Sep 5, 2012, 06:58 PM
Sep 2012

by offering scenarios that prove I know my subject. I'm sure you would delight in some pissing match where the junior league engages the senior and somehow proves them wrong, but I don't have time for that, and if you were a true professional, neither would you.

EOTE

(13,409 posts)
109. No, you've just repeated buzzwords over and over again.
Wed Sep 5, 2012, 07:03 PM
Sep 2012

While providing nothing of substance. Once again I'll ask you, do you have ANY information that suggests that AES256 has even come close to being compromised? If you don't (and it's quite clear that you don't by now), then you're offering up nothing but being contrary for the sake of being contrary. I think what you're demonstrating here is that a little knowledge can be a dangerous thing.

EOTE

(13,409 posts)
113. They're buzzwords in that you're repeating them incessantly.
Wed Sep 5, 2012, 07:09 PM
Sep 2012

While having very little idea as to what they mean. If you did know what they mean, you'd know that they offer some assistance in doing what is for now an impossible task. Yes, those things will hasten the ability to decrypt AES256, in that they'd take a job requiring perhaps trillions of computer hours and lessen that to mere hundreds of billions. Either way, it's simply not happening. That you don't recognize that shows how little you know of the subject.

 

Aerows

(39,961 posts)
115. I honestly believe
Wed Sep 5, 2012, 07:12 PM
Sep 2012

You have no idea what I am talking about, and that's why you call them "buzzwords" as opposed to fundamental concepts of internet security. If you can teach what you have learned you know it.

EOTE

(13,409 posts)
117. Christ, this is very simple. LISTEN CLOSELY.
Wed Sep 5, 2012, 07:16 PM
Sep 2012

You said I was wrong when I called AES256 uncrackable with current technology. I asked you to provide at least a shred of evidence to support your position. You have been utterly unable to do that. Mentioning current tools used to hasten decryption says absolutely nothing to the fact that AES256 has never been cracked. That's like me saying "It's impossible for anything to travel faster than the speed of light" and you responding "No it's not, rocket boosters!". You see, you need to mention more than simply tools used to accomplish something, you'd need to provide an actual practical application that's been used. If you believe that AES256 has been cracked, surely you should be able to provide some evidence of such. Anyone who could successfully crack AES256 would be hailed as a hero of all heroes amongst the hacking community. BUT IT HAS NEVER HAPPENED. Are you really so dense as to not understand that?

 

Aerows

(39,961 posts)
119. It's already in the mainstream
Wed Sep 5, 2012, 07:24 PM
Sep 2012
http://www.tomshardware.com/reviews/password-recovery-gpu,2945.html

And I have two of those in my box. Tell me how secure AES256 really is if someone has a much more sophisticated pair of video cards, like 680's or even three of them. Mine is child's play compared to the amount of calculations they can push and they don't use brute force alone but intelligent algorithms that cut the time by x10?

EOTE

(13,409 posts)
120. What a freaking joke. Now you've proven how little you know of this.
Wed Sep 5, 2012, 07:29 PM
Sep 2012

Do you think these GPU powered password recovery tools could even come close to cracking AES256? Really? So you're able to churn out a few hundred thousand combos per second and you've only got 2^250 to deal with. Awesome!! If you have a few billion years that method is absolutely perfect! You really can't be serious, are you?

On edit: Sorry, make that a few quadrillion years.

 

Aerows

(39,961 posts)
121. You know
Wed Sep 5, 2012, 07:31 PM
Sep 2012

If it makes you happy to think AES256 is that solid and secure, you go with it. You win. It is completely solid and cannot be cracked.

And it certainly cannot be cracked under Linux.

Some of us are completely capable of writing and compiling our own, but we bow to this cannot be done instead of wondering, gee, what can I do?

EOTE

(13,409 posts)
122. You're welcome to provide any information to the contrary.
Wed Sep 5, 2012, 07:39 PM
Sep 2012

You could do so with a simple link. Rather, I'm guessing you're more likely to say:

Band saw, sledge hammer, pick axe. See, I told you AES256 can be cracked.


The one link you've provided utterly proves my point for me. Using typical GPGPU decryption to even crack something as simple as 8 character ASCII would take more than a thousand years and AES256 is MANY magnitudes of order more complex. What about this don't you understand?

Sorry, I've had enough of banging my head against the wall for one night.

 

Aerows

(39,961 posts)
123. I'll bet you have had enough
Wed Sep 5, 2012, 07:43 PM
Sep 2012

of banging your head against the wall trying to convince a person that knows better that they don't.

I don't think you particularly understand low level programming, particularly low level GPU programming as well as you think you do. Visit www.beyond3d.com You will find people that excel at hardware programming as well as utilizing software at an abstraction layer, but mostly, you will learn that when you can program at a hardware level, things are extremely efficient.

http://forum.beyond3d.com/showthread.php?t=62286

EOTE

(13,409 posts)
132. Let me explain this as simply as possible.
Thu Sep 6, 2012, 10:28 AM
Sep 2012

It will require some high school math, so pay attention.

First of all, thanks for providing that link because it just reenforces what I've been saying from the get go, which is that cracking AES256 is utterly impossible using current technology.

Now, if you had read your own article that you so thoughtfully provided, you'd see that the type of passwords they're cracking there are typically 8 characters with about 64 (6 bit) unique possible characters per slot. 8 characters might be on the low side for this hardware/software, so let's take the absolute most rosy scenario that this article provides and let's say that 16 character passwords are routinely cracked by this (it's not at all, but let's pretend). So, that would mean that in order to crack such a password, you'd need to go through around 64^16 (or 2^96) possible permutations. Now, that's a staggeringly high number indeed, but it's insanely, microscopically tiny compared to the amount of permutations required to crack an AES256 key. AES256 on the other hand has ~2^250 permutations required to crack. Do you know how much larger the second number is compared to the first? It's around a trillion, trillion, trillion, trillion times larger. That's a very big number, isn't it? To better illustrate this, take a look at the chart that you so kindly provided in your article:



This is what's called the "exponential wall of brute force cracking". Do you see how ungodly steep those curves are? Do you see how even using the Amazon EC2 with the combined power of 1000 powerful GPUs that after 8 characters the time involved becomes astronomically high? Now, you can only see a small fraction of the time curve because it becomes unwieldy very quickly. After 14 characters, you're talking years if not more, even using the EC2. After that, we're talking decades, centuries and millenia. AES256 encryption uses the equivalent of around 32 8-bit characters. Even assuming that these characters are words that are typically used, things like rainbow tables and massively parallel GPU computing would only make a tiny, tiny dent in the amount of time required to crack such a thing. You need to not only familiarize yourself with what's going on with the hardware and software here, but you really need to familiarize yourself with the scope of the numbers we're dealing with. AES256 is nothing like the toy-like encryption these websites use, NOTHING. Until you're able to even have the slightest grasp of the numbers we're dealing with, you're not going to understand why this is impossible. Now go on and explain to me how REAL modern technology is several trillion, trillion, trillion times more powerful than the article you provided says.

 

snooper2

(30,151 posts)
136. You should probably read this too
Thu Sep 6, 2012, 11:06 AM
Sep 2012

Some engineers at Microsoft figured out a theoretical way to crack AES 3 to 5 times faster, but it would still take a couple billion years

IDG News Service - Researchers from Microsoft and Belgian Katholieke Universiteit Leuven have discovered a way to break the widely used Advanced Encryption Standard (AES), the encryption algorithm used to secure most all online transactions and wireless communications.

Their attack can recover an AES secret key from three to five times faster than previously thought possible, reported the Katholieke Universiteit Leuven, a research university based in Belgium.

The researchers caution that the attack is complex is nature, and so can not be easily carried out using existing technologies. In practice, the methodology used by the researchers would take billions of years of computer time to break the AES algorithm, they noted.

But the work, the result of a long-term cryptanalysis project, could be the first chink in the armor of the AES standard, previously considered unbreakable. When an encryption standard is evaluated for vital jobs such as securing financial transactions, security experts judge the algorithm's ability to withstand even the most extreme attacks. Today's seemingly secure encryption method could be more easily broken by tomorrow's faster computers, or by new techniques in number crunching.

http://www.computerworld.com/s/article/9219297/AES_proved_vulnerable_by_Microsoft_researchers

 

snooper2

(30,151 posts)
134. You should really read this-
Thu Sep 6, 2012, 10:55 AM
Sep 2012
http://www.eetimes.com/design/embedded-internet-design/4372428/How-secure-is-AES-against-brute-force-attacks-

How secure is AES against brute force attacks?
Mohit Arora, Sr. Systems Engineer & Security Architect, Freescale Semiconductor
5/7/2012 1:29 PM EDT
In the world of embedded and computer security, one of the often debated topics is whether 128-bit symmetric key, used for AES (Advanced Encryption Standard) is computationally secure against brute-force attack. Governments and businesses place a great deal of faith in the belief that AES is so secure that its security key can never be broken, despite some of the inherent flaws in AES.

This article describes the strength of the cryptographic system against brute force attacks with different key sizes and the time it takes to successfully mount a brute force attack factoring future advancements in processing speeds.

Any cryptographic algorithm requires multi-bit key to encrypt the data as shown in Figure 1.







As shown, it will take a maximum 16 rounds to check every possible key combination starting with "0000." Given sufficient time, a brute force attack is capable of cracking any known algorithm.

The following table just shows the possible number of key combinations with respect to key size:






Figure 4: Time to crack Cryptographic Key versus Key size



Faster supercomputer (as per Wikipedia): 10.51 Pentaflops = 10.51 x 1015 Flops [Flops = Floating point operations per second]

No. of Flops required per combination check: 1000 (very optimistic but just assume for now)

No. of combination checks per second = (10.51 x 1015) / 1000 = 10.51 x 1012

No. of seconds in one Year = 365 x 24 x 60 x 60 = 31536000

No. of Years to crack AES with 128-bit Key = (3.4 x 1038) / [(10.51 x 1012) x 31536000]
= (0.323 x 1026)/31536000
= 1.02 x 1018
= 1 billion billion years


As shown above, even with a supercomputer, it would take 1 billion billion years to crack the 128-bit AES key using brute force attack. This is more than the age of the universe (13.75 billion years). If one were to assume that a computing system existed that could recover a DES key in a second, it would still take that same machine approximately 149 trillion years to crack a 128-bit AES key.

EOTE

(13,409 posts)
145. Yes, I have no idea what you're talking about because you're talking out of your ass.
Thu Sep 6, 2012, 01:38 PM
Sep 2012

Please tell me more about your efficient algorithms which are trillions upon trillions of times more efficient than ones currently known. You're really going to disparage my knowledge? Really? I was willing to believe that you were truly qualified before this conversation began (if extremely misinformed on this subject). But you've proven how extremely little you know about this subject. You belong nowhere near anything security related.

 

snooper2

(30,151 posts)
133. FYI, number of years doesn't really mean as much as people think-
Thu Sep 6, 2012, 10:39 AM
Sep 2012

There's an "engineer" at my work across the street in telecom for 30+ years and he is still a fucking idiot LOL


My question is how come all these big customers ask about TLS all the time with one of our VoIP products but never actually order it

EOTE

(13,409 posts)
137. But surely 22 years of experience gives one the power to change the known laws of the universe.
Thu Sep 6, 2012, 11:25 AM
Sep 2012

Sequoia simply isn't trying hard enough if it can't crack AES256 in less than a trillion years. I think if it was really trying and had the proper motivation, it could do it in a few hours. You're simply not thinking like someone with more than two decades in the business.

 

snooper2

(30,151 posts)
138. I could crack it in a couple hours
Thu Sep 6, 2012, 11:48 AM
Sep 2012

but that would involve waterboarding and some other actions I can't mention here to the person who actually knew the passcode

sir pball

(4,760 posts)
139. For sufficiently large values of "time"..
Thu Sep 6, 2012, 12:10 PM
Sep 2012

AES *has* been "broken"...but "[f]or cryptographers, a cryptographic "break" is anything faster than a brute force—performing one trial decryption for each key (see Cryptanalysis)." - teh wikiz

The best known attack against the weakest version of standard-compliant 128-bit AES (there are faster attacks, but they're against ciphers with below-specified rounds) has a computational complexity of 2^126.1 (1) - using 100% of the capacity of the world's fastest supercomputer, at a ridiculously optimistic 1000 operations per check, would take 3.6 TRILLION years. Just for poops and giggles, the best AES-256 (which AFAIK is pretty much the only version utilities use anymore) attack is 2^254.4, for a runtime of....wait for it...37.6 billion trillion years!

Incidentally, those numbers are what makes me kind of think this might NOT be a hoax - the public at large would believe that records can be "hacked" off of the IRS or PwC's systems, but I'd wager a year's pay all that data is quite well encrypted; barring a leak of the keys, there's zero chance of getting the data off the servers. Physical access to paper records is far far more plausible in the real world.

EOTE

(13,409 posts)
35. You've entirely missed the point.
Wed Sep 5, 2012, 12:50 PM
Sep 2012

A person with a 60 IQ could use a number of modern encryption formats and have their data be damned near 100% safe if the decrypters lack the decryption key. This has nothing to do with how smart the people are.

cynatnite

(31,011 posts)
38. Key words..."damned near".
Wed Sep 5, 2012, 01:12 PM
Sep 2012

I don't believe anything is impenetrable.

As I said earlier, if this story turns out to be true I will happily and loudly apologize.

EOTE

(13,409 posts)
40. Well, so far there haven't been any serious threats against AES 256.
Wed Sep 5, 2012, 01:21 PM
Sep 2012

And that's with most likely millions of man hours attempting to crack it. So yeah, I don't think that anyone has anything to worry about if they've encrypted using a modern encryption standard. Sure, AES 256 isn't impenetrable, just impenetrable given the technology that we'll have for the next several decades.

 

Aerows

(39,961 posts)
74. It depends on what you regard
Wed Sep 5, 2012, 04:39 PM
Sep 2012

as a serious threat. Not that I am a hacker, just stating reality.

EOTE

(13,409 posts)
80. You portend to have such knowledge?
Wed Sep 5, 2012, 04:58 PM
Sep 2012

I assume you can tell me of AES256 being compromised in an even semi-effective manner? Go ahead, I'm listening. I don't buy it for a second now, but my mind is opened if you happen to have any evidence to sway me.

 

Aerows

(39,961 posts)
84. And if you thought to threaten me because I understand AES256
Wed Sep 5, 2012, 05:05 PM
Sep 2012

And thought to voice it...

Go fuck yourself. There are plenty of people that understand security and work in security and are not intimidated by some person coming along saying "Oh, you must be a traitor if you understand this technology".

EOTE

(13,409 posts)
88. What on earth are you talking about?
Wed Sep 5, 2012, 05:16 PM
Sep 2012

I threatened you? Just how exactly? I asked if you could tell me specifically why you believe that AES256 had been compromised. If you took that as a threat, that's your problem, not mine. Go fuck myself? Because I asked a question? I think you need some help.

I understand security fine, thanks. That's part of my job.

sir pball

(4,760 posts)
141. Now you're just throwing random cryptography words together
Thu Sep 6, 2012, 12:41 PM
Sep 2012

Salt is specifically a defense against rainbow tables. Your statement is completely nonsensical; thirty seconds with Google and teh Wiki would have at least given you the information to say "Not that anyone ever discovered the salt and then used a rainbow table".

http://en.wikipedia.org/wiki/Salt_(cryptography)
http://en.wikipedia.org/wiki/Rainbow_table
http://www.codinghorror.com/blog/2007/09/rainbow-hash-cracking.html
http://www.healthypasswords.com/content.What_are_hashes_and_Rainbow_Tables.html

sabrina 1

(62,325 posts)
59. Where does it say this was Anonymous? They do not ask for ransom ever. Anyone
Wed Sep 5, 2012, 02:48 PM
Sep 2012

asking for ransom for material like this are criminals. Sounds like extortion to me, rather than providing the public with information. If anyone were to pay them for that info, they would be engaging in a crime also. Sounds like a weak attempt to entrap Democrats into engaging in criminal activity. I am sure they are smarter than that.

This is not the MO of Anonymous.

 

Aerows

(39,961 posts)
86. It wasn't as far as I can tell
Wed Sep 5, 2012, 05:11 PM
Sep 2012

Some people socially engineered getting Romney's tax returns, said they were going to release them on Sept. 28, and let the firestorm ensue. Anonymous MO

The second post was that they demanded money, but no one so far has come forward demanding money except for post No. 2, which wants Bitcoins regulated (reportedly). Not Anonymous MO.

Republicans are pissing in their pants at this point.

bemildred

(90,061 posts)
143. I'm going to post this before I go read the story.
Thu Sep 6, 2012, 01:07 PM
Sep 2012

I can over here from Meta for the geek war.
I have degrees in Math (BA) and Computer Science (MS) and encryption was one of my hobbies.
I think you have the right of it, with the exception (theoretically) of 100%.
Anybody that does crypto professionally, feel free to correct me as needed.

The only theoretically uncrackable code is the one-time pad, last time I heard. All the mathematical encryption methods are all based on computations that are "easy" with the key (one or more of the terms of the computation) and infeasible without it. "Infeasible" means theoretically possible with known and usually "easy" algorithms, but of very high computational order, i.e. you will never finish unless the problem is very small. The usual thing is based on factorization of very large composite integers.

AES is considered "weak" and is out of fashion, though I quite agree it is good enough for most purposes, and yet I would not bet on it being invulnerable to the spooks. But the various free encryption packages out there now I would expect could be made good enough even for that, I don't know that, but that is how I would bet.

In ALL of the mathematical methods, it is EASY to make the problem bigger, if AES256 is cracked, you can go to AES512 or AES1024 and so on, so while it is theoretically feasible to crack these methods (not 100% uncrackable) it is also theoreticaly very easy to make the problem much much harder when that happens, if you care to.

There are about a gazillion encryption methods out there now, it's a very active field.

Edit: nothing more to add.

drm604

(16,230 posts)
27. Unbreakable encryption is very easy these days.
Wed Sep 5, 2012, 12:40 PM
Sep 2012

I think this story is likely BS, but unbreakable encryption DOES exist and anyone, you and I included, can make use of it with freely downloadable software. My degree is in computer science and I know what I'm talking about. Breaking it is not a matter of hacking. Reality is not like the movies.

 

Aerows

(39,961 posts)
100. I don't have a degree in Computer Science
Wed Sep 5, 2012, 06:26 PM
Sep 2012

But I have 22+ years experience. Algorithms, salts and parallel processing.

drm604

(16,230 posts)
130. If AES256 is breakable in the real world in reasonable amounts of time
Thu Sep 6, 2012, 03:50 AM
Sep 2012

then our financial system would have collapsed by now due to all of the successful attacks against electronic money transfers. That doesn't seem to have happened.

drm604

(16,230 posts)
6. I have serious doubts about this
Wed Sep 5, 2012, 11:55 AM
Sep 2012

but that satire story is completely different from the one in the OP.

FreeState

(10,584 posts)
7. That is a totally different story - not even the same thing
Wed Sep 5, 2012, 11:55 AM
Sep 2012

In one we have them getting the tax records from the accounting firm and the other they broke into the IRS. Not the same story.

leveymg

(36,418 posts)
4. Sounds like a scam wrapped in blackmail behind a pretend robbery.
Wed Sep 5, 2012, 11:51 AM
Sep 2012

I wouldn't give much credence to this - if you're going to blackmail, why send it to the Democrats without anyone even paying for it first?

The sulphurous smell of the ghost of Rove is still in the room.

drm604

(16,230 posts)
9. As I understand it
Wed Sep 5, 2012, 11:58 AM
Sep 2012

the drives they've sent out are encrypted and they're threatening to release the key if they're not paid (or if they are paid by Romney's opposition). Presumably the one sent to PWC is unencrypted as proof that they actually have the data (since they stole if from PWC to start with, sending it to them reveals nothing).

I'm skeptical of the story, but I guess we'll see how it plays out.

drm604

(16,230 posts)
5. Wow. I'm living in a bad SciFi novel.
Wed Sep 5, 2012, 11:54 AM
Sep 2012

Actually, I'm skeptical. It'll be interesting to see how this plays out.

They could easily be full of crap but hoping that someone will pay anyway. I assume, if this is for real, that the drive they sent to PWC is unencrypted so that this can be verified. The Romney campaign is probably already in contact with PWC to see if there's any truth to this.

gollygee

(22,336 posts)
8. The possibility of blackmail is a big issue
Wed Sep 5, 2012, 11:57 AM
Sep 2012

even if it isn't true. The idea that we could have a president so open to blackmail is a bit scary.

 

Aerows

(39,961 posts)
10. Extremely scary
Wed Sep 5, 2012, 12:07 PM
Sep 2012

But first, we have to find out if this is real or not. I hope PWC got an unencrypted version to verify that it is true.

 

Aerows

(39,961 posts)
17. Check out the pastebin link I just posted
Wed Sep 5, 2012, 12:25 PM
Sep 2012

They are claiming to have references that only PWC would have so that they would know it isn't a fake.

 

Aerows

(39,961 posts)
16. This looks like the complete contents
Wed Sep 5, 2012, 12:24 PM
Sep 2012
http://pastebin.com/1j1yzQ9S

Notice at the bottom it says "References to avoid fakes that only you would have."

So, this could be true if they actually included some things that only PWC would know!

drm604

(16,230 posts)
25. Nashville City Paper seems to have information that isn't in that pastebin document.
Wed Sep 5, 2012, 12:33 PM
Sep 2012

The article says that a copy was sent to PWC but I don't see any mention of that in the actual document.

I wonder what their source is?

nc4bo

(17,651 posts)
18. Gonna have to show me some proof or else it's just the wind blowing.....
Wed Sep 5, 2012, 12:25 PM
Sep 2012

On a sidenote: Just the idea that something like this may (but probably did not) happen is absolutely delicious.

nc4bo

(17,651 posts)
19. Would love to know if any police/security reports were made of a possible break-in?
Wed Sep 5, 2012, 12:28 PM
Sep 2012

Now if such reports were indeed made?.............oh dear.

Hutzpa

(11,461 posts)
28. I don't think there was any break in
Wed Sep 5, 2012, 12:41 PM
Sep 2012

according to the article, they gained access from the third floor by asking a fine gentleman to let them in and then
proceed to the second floor where the company is located, unless I'm mistaken, but that's from the article.

nc4bo

(17,651 posts)
33. You'd think something would have been disturbed.
Wed Sep 5, 2012, 12:45 PM
Sep 2012

Unless these people were so careful that they left everything exactly the way they found it.

Correcting because they mentioned the flash drives..............there will be a digital record on whatever machine they used to access the records. I'm positive of that.



cthulu2016

(10,960 posts)
20. Ummm... probably not so much
Wed Sep 5, 2012, 12:28 PM
Sep 2012

"the Democratic office in the county"

Written by someone with a poor sense of American politics... tonally reminiscent of Nigerian Treasury Minister email scams.

A distasteful hoax.

reformist2

(9,841 posts)
21. One thing's for sure... stories like this will keep Mitt awake at night!
Wed Sep 5, 2012, 12:30 PM
Sep 2012

Or at least give him nightmares. LOL
 

HooptieWagon

(17,064 posts)
22. If the story were true, why demand only $1M?
Wed Sep 5, 2012, 12:31 PM
Sep 2012

I would think Romney would pay far more to prevent his returns being released. Makes me think the story is a hoax.

 

nebenaube

(3,496 posts)
31. I don't know if there's more than a million dollars of bitcoin out there...
Wed Sep 5, 2012, 12:43 PM
Sep 2012

Plus, bitcoin addresses are disposable and fairly anonymous. It could be a scam to drive the value of bitcoins up but that's due to happen soon anyway.

 

Aerows

(39,961 posts)
44. There is a hard limit of the number of Bitcoins in circulation
Wed Sep 5, 2012, 02:17 PM
Sep 2012

There's a hard limit of no more than 21 million Bitcoins to prevent devaluation.

http://en.wikipedia.org/wiki/Bitcoin

 

Aerows

(39,961 posts)
45. Social engineering
Wed Sep 5, 2012, 02:19 PM
Sep 2012

"The nice gentleman that let us in" is the most effective hack security has. Whether that includes hacks, manipulation, or just plain smooth-talking, it has always been easier than trying to crack security.

 

Aerows

(39,961 posts)
48. You never know
Wed Sep 5, 2012, 02:22 PM
Sep 2012

Social engineering is by far more effective in obtaining information than "hacking". Look at HB Gary - they got the passwords they needed for the whole outfit by a young woman calling on the phone. And the fact that the dude was so stupid he used his own first initial and last name as a login. LOL.

 

berni_mccoy

(23,018 posts)
42. If it were true, the hackers would have released a non-damaging part of the return.
Wed Sep 5, 2012, 01:37 PM
Sep 2012

It's that simple. They need to prove you have the goods without causing the damage they threaten.

 

Aerows

(39,961 posts)
46. According to what they say
Wed Sep 5, 2012, 02:20 PM
Sep 2012

They have provided references to distinguish what they have from fakes.

Skidmore

(37,364 posts)
55. It wouldn't be the first time Rove set up a dirty trick to try to make it look as if the other side
Wed Sep 5, 2012, 02:37 PM
Sep 2012

were responsible for somehow injuring his candidate. Rove is a filthy little critter without any sense of ethics whatsoever. Here's a tick list for your reference.

http://www.seattlepi.com/local/opinion/article/Rove-s-dirty-tricks-Let-us-count-the-ways-1246665.php

Lone_Star_Dem

(28,158 posts)
56. First let me point out it's physical theft, not hacking.
Wed Sep 5, 2012, 02:39 PM
Sep 2012

Note how they say they got "all available 1040's"

Linking the theft to the Dem party in people's minds = bad for the Democrats.

The returns they stole having no controversial information in them = good for the the Republicans.

Also, Rove's pulled stunts like this before.

1986 William Clements, Jr. gubernatorial campaign

In 1986, Rove helped Clements become governor a second time. In a strategy memo Rove wrote for his client prior to the race, now among Clements's papers in the Texas A&M University library, Rove quoted Napoleon: "The whole art of war consists in a well-reasoned and extremely circumspect defensive, followed by rapid and audacious attack."

In 1986, just before a crucial debate in campaign, Rove claimed that his office had been bugged by Democrats. The police and FBI investigated and discovered that the bug's battery was so small that it needed to be changed every few hours, and the investigation was dropped. Critics, including other Republican operatives, suspected Rove had bugged his own office to garner sympathy votes in the close governor's race.
http://en.wikipedia.org/wiki/Karl_Rove


I'm smelling GOP lies and distraction, too.



 

Aerows

(39,961 posts)
60. Of course it is theft
Wed Sep 5, 2012, 02:53 PM
Sep 2012

Just pointing out that social engineering is the most useful tool in a hackers box. It's one Karl Rove, uses, too. We won't know until something more happens with this story.

Lone_Star_Dem

(28,158 posts)
66. Having just looked up the "Bitcoins"
Wed Sep 5, 2012, 03:04 PM
Sep 2012

I'm thinking wacky (Paulite?) hoax now. Not that they claim to have done it, I'm sure someone is making such a claim. I'm kind of doubting they have anything though.


Lars39

(26,116 posts)
126. For what it's worth, Franklin is in Williamson County TN,
Wed Sep 5, 2012, 08:34 PM
Sep 2012

It's the 17th richest county in the US and is hardcore red.

Lex

(34,108 posts)
52. Proves that as long as Romney has secrets to hide (his tax forms), then he's blackmail-able.
Wed Sep 5, 2012, 02:31 PM
Sep 2012

It's a weakness.

woodsprite

(11,926 posts)
54. I think it's a Rove or Koch ploy to grab the front pages from the DEM convention
Wed Sep 5, 2012, 02:33 PM
Sep 2012

They probably thought asking for a mil would be less likely to smell like an orchestrated stunt.

 

Aerows

(39,961 posts)
63. Except
Wed Sep 5, 2012, 02:57 PM
Sep 2012

in the original posting they didn't ask for money. They just said it was going to be release on 9/28. I think the second post is the one Rove cooked up to discredit that maybe, just maybe, they are running scared and actually do have information. They did say that they had references.

 

Aerows

(39,961 posts)
79. Here
Wed Sep 5, 2012, 04:57 PM
Sep 2012

"PWC Office @ 830 Crescent Centre Drive, Suite 260, Franklin, TN 37067
Telephone: [1] (615) 503-2860

Romney's 1040 tax returns were taken from the PWC office 8/25/2012 by gaining access to the third floor via a gentleman working on the 3rd floor of the building. Once on the 3rd floor, the team moved down the stairs to the 2nd floor and setup shop in an empty office room. During the night, suite 260 was entered, and all available 1040 tax forms for Romney were copied. A package was sent to the PWC on suite 260 with a flash drive containing a copy of the 1040 files, plus copies were sent to the Democratic office in the county and copies were sent to the GOP office in the county at the beginning of the week also containing flash drives with copies of Romney's tax returns before 2010. A scanned signature image for Mitt Romney from the 1040 forms were scanned and included with the packages, taken from earlier 1040 tax forms gathered and stored on the flash drives.

The group will release all available files to the public on the 28 of September, 2012


This line is on all the package letters for authenticity of the email being sent.

all these considerations did not deter me from the path of duty"

here is the post:
http://pastebin.com/zdU1TK40

Take it for what it is worth.

silverweb

(16,402 posts)
57. That's burglary, not hacking.
Wed Sep 5, 2012, 02:41 PM
Sep 2012

[font color="green" face="Verdana"]They physically gained access, photocopied and scanned the paperwork, and stored it on flashdrives. That's not "hacking" in any sense and the "anonymous group" is NOT Anonymous.

If it even happened at all, regarding which I have my doubts.

BeHereNow

(17,162 posts)
62. Nice try KKKarl Rove.
Wed Sep 5, 2012, 02:57 PM
Sep 2012

We are so on to your malicious machinations.
You really need to come up with some new tricks.

BHN

 

Aerows

(39,961 posts)
64. Rove was the second one
Wed Sep 5, 2012, 02:59 PM
Sep 2012

There were two. The first didn't demand money. I just outlined that they were going to release them. The second is a bid for sympathy by making Romney look like a victim.

 

Laura PourMeADrink

(42,770 posts)
67. Wow...this is really cool. Hope it's true. I have often thought how easy it might be for someone
Wed Sep 5, 2012, 03:06 PM
Sep 2012

to get their hands on some of this and make a chunk...but I was thinking more on the lines of
selling it to a newspaper/TV channel

former9thward

(32,082 posts)
83. You do realize, don't you, that both the seller and the newspaper would be committing a felony.
Wed Sep 5, 2012, 05:04 PM
Sep 2012

This is a silly internet hoax.

drm604

(16,230 posts)
78. This is not outside the realm of possibility
Wed Sep 5, 2012, 04:57 PM
Sep 2012

but I would think that we would have heard something from one of the major news outlets they supposedly sent encrypted disks to, unless they haven't sent them yet.

BitCoins doesn't seem like the best way to launder that much money. Yes, there is a cash market for buying and selling, but I'd think that it would be difficult to buy that much at once without driving the price up. Selling that much would also seem to be difficult and would drive the price down.

Maybe this is an attempt to manipulate the Bitcoin market.

 

Aerows

(39,961 posts)
82. Bitcoin runs
Wed Sep 5, 2012, 05:01 PM
Sep 2012

guns and drugs. So it isn't outside of the realm to have it happen to drive up the value of Bitcoin currency.

I would think that this is a hit piece on Bitcoin so that they can be treated like money launderers.

I admit that, but I wonder why you think that this is any different than anyone else that ever established a currency standard, including PayPal. PayPal was accused of this very thing.

drm604

(16,230 posts)
85. Who said that I think it's any different?
Wed Sep 5, 2012, 05:07 PM
Sep 2012

I don't really have any opinion on Bitcoin at all. I just think this may be a stunt to manipulate the Bitcoin market.

Hell, maybe they posted those two Bitcoin account numbers hoping that a bunch of stupid Romney and Obama supporters would flood them with Bitcoins.

NYC Liberal

(20,136 posts)
124. I wouldn't go anywhere near it.
Wed Sep 5, 2012, 07:45 PM
Sep 2012

It's either stolen or it's fake and possibly a setup. Nothing good could come out of it.

 

Coyotl

(15,262 posts)
129. Someone may break the cipher and find a Walt Disney clip
Thu Sep 6, 2012, 12:00 AM
Sep 2012

This could be a rogue pretending to be a criminal because you usually don't splash your crime all over the media

 

Comrade_McKenzie

(2,526 posts)
135. I'd be applauding the hackers if they weren't trying to profit from this.
Thu Sep 6, 2012, 11:02 AM
Sep 2012

Just release the damn information and enjoy the fallout.

freshwest

(53,661 posts)
147. I've written more credible fiction with more details and suspense. Sorry, ain't buying it.
Thu Sep 6, 2012, 03:00 PM
Sep 2012
It sounds exactly like something wingnuts would write, it's that poorly done. As far as it being reported anywhere, remember it's legal to lie in American media/propaganda:

“Court Ruled That Media Can Legally Lie” - The Steve Wilson/Jane Akre case v. Fox


http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=389x6621412

As much as I'd like to smite Mittens, this would never hold up in a court of law, much less in the court of public opinion.

If the Democrats don't denounce it, this will be painted as our own Watergate break-in. That ball and chain belongs to our opposition, not us.

Latest Discussions»General Discussion»Anonymous group allegedly...