NOTHING YOU OWN IS SAFE FROM THE REVENGE HACKERS!!
GEORGE BUSH PUT BACKDOORS IN EVERY ELECTRONIC DEVICE ON EARTH AND NOW KIDS HAVE THE KEYS TO EVERY BACKDOOR!
By Tom Michael
A BRIT teen hacker posed as a CIA boss to access secret military files – and sent lewd rape threats to a Homeland Security chief, a court has heard.
Kane Gamble, 18, hacked into intelligence head John Brennan's email account, made hoax calls to his family home and even took control of his wife's iPad, judges were told.
The hacks were carried out as part of a campaign of harassment against top US officials motivated by his political views, a court heard.
Gamble was just 15 when he posed as a telecoms worker and Brennan himself to gain information including passwords, contacts lists and sensitive documents about operations in Afghanistan and Iraq.
He then taunted the CIA on Twitter about his successes as a leading member of a collective called “Crackas With Attitude”, which supported the Free Palestine movement.
Prosecutor John Lloyd-Jones QC told the Old Bailey Gamble started the group.
Gamble told a journalist: “It all started by me getting more and more annoyed at how corrupt and cold-blooded the US Government is so I decided to do something about it.”
The court heard Gamble “felt particularly strongly” about US-backed Israeli violence against Palestinians, the shooting of black people by US police, racist violence by the KKK and the bombing of civilians in Iraq and Syria.
After Brennan, Gamble went on to carry out a series of similar attacks on other top security figures from his bedroom in Leics.
His victims included the secretary of Homeland Security Jeh Johnson, to whom he sent a photo of his daughter and said he would “f*** her”, the court heard.
He also targeted the ex-deputy director of the FBI Mark Giuliano and James Clapper, director of national intelligence under Obama, as well as their families.
He boasted about carrying out “the best breach ever” after accessing an FBI database to get the names of 1,000 staff and details of the officer responsible for the notorious shooting of Michael Brown in Ferguson, Missouri.
The information Gamble gathered was later used to carry out a “swatting” attack on John Holdren, a science and technology adviser to US President Barack Obama, resulting in armed officers being sent to Mr Holdren's family home.
A similar prank carried out by another hoaxer in the US resulted in the victim being shot dead by gun cops who raided his house.
Gamble was arrested in February 2016 at his council home in Coalville, near Leicester, at the request of the FBI after he hacked into the Department of Justice network.
The teen, who claims he did not realise the seriousness of what he was doing because of his autism, will be sentenced at a later date.
Gamble was allowed to sit next to his mother behind his barrister rather than the dock when he appeared at the Old Bailey.
The teen, of Coalville, Leicester, admitted eight counts of performing a function with intent to secure unauthorised access and two counts of unauthorised modification of computer material.
The hearing continues.
Can you hear me now?: NSA can find & track people with ‘voice-matching technology’
© Alex Milan Tracy / Global Look Press
Declassified documents reveal the National Security Agency has been using secret “speaker recognition” technology to identify people by their unique “voiceprint” for more than a decade.
The NSA has been recording and gathering private phone calls for years, but it used to be difficult for the agency to identify unknown speakers. In the past, signals intelligence (SIGINT) transcribers worked on the same targets for years before they became familiar enough with a speaker’s unique voice to be able to verify their identity.
Now, the NSA is using more advanced computational systems developed by the Massachusetts Institute of Technology (MIT) in order to catch spies and terrorists, according to a declassified NSA document obtained by media outlet the Intercept.
The document describes how the NSA used the technology during Operation Iraqi Freedom to match an audio recording to former leader Saddam Hussein’s “voiceprint.” The NSA also used the technology to compare the voice of a captured suspect with previous audio recordings from terrorist Abu Hakim to confirm that the suspect was not a match.
In order to test their technology, analysts at the NSA compared old intercepts and audio files relating to Ron Pelton, a former NSA analyst who sold details about several secret US programs to the Soviet Union. At the time, the agency failed to identify Pelton through human voice identification. However, in 2006, the agency was able to automatically match Pelton’s voice using the technology.
“Had such technologies been available twenty years ago, early detection and apprehension could have been possible, reducing the considerable damage Pelton did to national security,” the document states.
Remember that scene in The Dark Knight where Batman makes a hyberbolic crazy surveillance system that uses all phones to find the Joker based on his voice? That could actually happen 5/10 pic.twitter.com/JSQMmzEQO6—