http://www.defenseone.com/ideas/2016/09/just-wait-until-data
-thieves-start-releasing-altered-or-fake-emails/131589/?
oref=defenseone_today_nl

*Just Wait Until Data Thieves Start Releasing Altered and Fake Emails*

[image: Description: Sooner or later, the hackers who steal an
organization's data are going to make changes in them before they release
them.]

*In the past few years*, the devastating effects of hackers breaking into
an organization’s network, stealing confidential data, and publishing
everything have been made clear. It happened to the Democratic National
Committee, to *Sony*
<http://www.forbes.com/sites/josephsteinberg/2014/12/11/massive-security-breach-at-sony-heres-what-you-need-to-know/>,
to the National Security Agency, to the cyber-arms weapons
manufacturer *Hacking
Team*
<http://arstechnica.co.uk/security/2015/07/massive-leak-reveals-hacking-teams-most-private-moments-in-messy-detail/>,
to the online adultery site *Ashley Madison*
<http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/the-ashley-madison-hack-a-timeline/>,
and to the Panamanian tax-evasion law firm *Mossack Fonseca*
<http://www.nytimes.com/2016/04/04/us/politics/leaked-documents-offshore-accounts-putin.html>
.

This style of attack is known as *organizational doxing*
<https://www.schneier.com/blog/archives/2015/07/organizational_.html>. The
hackers, in some cases individuals and in others nation-states, are out to
make political points by revealing proprietary, secret, and sometimes
incriminating information. And the documents they leak do that, airing the
organizations’ embarrassments for everyone to see.

In all of these instances, the documents were real: the email
conversations, still-secret product details, strategy documents, salary
information, and everything else. But what if hackers were to alter
documents before releasing them? This is the next step in organizational
doxing—and the effects can be much worse.

It’s one thing to have all of your dirty laundry aired in public for
everyone to see. It’s another thing entirely for someone to throw in a few
choice items that aren’t real.

Recently, Russia has started *using forged documents*
<http://www.nytimes.com/2016/08/29/world/europe/russia-sweden-disinformation.html>
as
part of broader disinformation campaigns, particularly in relation to
Sweden’s entering of a military partnership with NATO, and Russia’s
invasion of Ukraine.

Forging thousands—or more—documents is difficult to pull off, but slipping
a single forgery in an actual cache is much easier. The attack could be
something subtle. Maybe a country that anonymously publishes another
country’s diplomatic cables wants to influence yet a third country, so adds
some particularly egregious conversations about that third country. Or the
next hacker who steals and publishes email *from climate change researchers*
<https://www.wired.com/2009/11/climate-hack/> invents a bunch of
over-the-top messages to make his political point even stronger. Or it
could be personal: someone dumping email from thousands of users making
changes in those by a friend, relative, or lover.

Imagine trying to explain to the press, eager to publish the worst of the
details in the documents, that everything is accurate except this
particular email. Or that particular memo. That the salary document is
correct except that one entry. Or that the secret customer list posted up
on WikiLeaks is correct except that there’s one inaccurate addition. It
would be impossible. Who would believe you? No one. And you couldn’t
prove it.

It has long been easy to forge documents on the internet. It’s easy to
create new ones, and modify old ones. It’s easy to change things like a
document’s creation date, or a photograph’s location information. With a
little more work, pdf files and images can be altered. These changes will
be undetectable. In many ways, it’s surprising that this kind of
manipulation hasn’t been seen before. My guess is that hackers who leak
documents don’t have the secondary motives to make the data dumps worse
than they already are, and nation-states have just gotten into the document
leaking business.

Major newspapers do their best to verify the authenticity of leaked
documents they receive from sources. They only publish the ones they know
are authentic. The newspapers consult experts, and pay attention to
forensics. They have tense conversations with governments, trying to get
them to verify secret documents they’re not actually allowed to admit even
exist. This is only possible because the news outlets have ongoing
relationships with the governments, and they care that they get it right.
There are lots of instances where neither of these two things are true, and
lots of ways to leak documents without any independent verification at all.

No one is talking about this, but everyone needs to be alert to the
possibility. Sooner or later, the hackers who steal an organization’s data
are going to make changes in them before they release them. If these
forgeries aren’t questioned, the situations of those being hacked could be
made worse, or erroneous conclusions could be drawn from the documents.
When someone says that a document they have been accused of writing is
forged, their arguments at least should be heard.[image: Description:
mailbox://C:/Users/Bruce/AppData/Roaming/Thunderbird/Profiles/3t97kvn3.default/Mail/pop.erols.com/Inbox?number=728730096&part=1.2.3&filename=article-end.png]




------------------------------
[image: Avast logo] <https://www.avast.com/antivirus>

This email has been checked for viruses by Avast antivirus software.
www.avast.com <https://www.avast.com/antivirus>



__._,_.___
------------------------------
Posted by: "Beowulf" <beow...@westerndefense.net>
------------------------------


Visit Your Group
<https://groups.yahoo.com/neo/groups/grendelreport/info;_ylc=X3oDMTJmNHRnbTdnBF9TAzk3MzU5NzE0BGdycElkAzIwMTk0ODA2BGdycHNwSWQDMTcwNTMyMzY2NwRzZWMDdnRsBHNsawN2Z2hwBHN0aW1lAzE0NzQwNTIwMzY->


[image: Yahoo! Groups]
<https://groups.yahoo.com/neo;_ylc=X3oDMTJlcHZpM3ExBF9TAzk3NDc2NTkwBGdycElkAzIwMTk0ODA2BGdycHNwSWQDMTcwNTMyMzY2NwRzZWMDZnRyBHNsawNnZnAEc3RpbWUDMTQ3NDA1MjAzNg-->
• Privacy <https://info.yahoo.com/privacy/us/yahoo/groups/details.html> •
Unsubscribe <grendelreport-unsubscr...@yahoogroups.com?subject=Unsubscribe>
• Terms of Use <https://info.yahoo.com/legal/us/yahoo/utos/terms/>

__,_._,___

-- 
-- 
Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see http://groups.google.com/group/PoliticalForum

* Visit our other community at http://www.PoliticalForum.com/  
* It's active and moderated. Register and vote in our polls. 
* Read the latest breaking news, and more.

--- 
You received this message because you are subscribed to the Google Groups 
"PoliticalForum" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to politicalforum+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to