home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   az.general      What goes on in exciting Arizona...      2,973 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 2,068 of 2,973   
   Lolololol! to All   
   Cities probe worker emails linked to Ash   
   26 Aug 15 09:07:22   
   
   XPost: wi.general, alt.fashion, can.motss   
   XPost: rec.arts.tv.news.oreilly-factor   
   From: lololol@divorces.com   
      
   Cities across the USA, including ones in Ohio, North Carolina,   
   South Carolina and Texas, are investigating email domains listed   
   among the millions registered to popular spouse-cheating website   
   AshleyMadison.com.   
      
   At least four North Texas cities are looking into whether their   
   employees used municipal email accounts to sign up and three   
   city of Cincinnati email domains were listed, according to The   
   Cincinnati Enquirer and WFAA-TV.   
      
   "We are going to pursue it," City Manager Harry Black told the   
   Enquirer on Wednesday night. "We have some information, but not   
   enough. I don't know if it would be a fireable offense, but we   
   will look at our Internet-use policy."   
      
   The email domains were part of a massive data breach by hackers   
   of the Ashley Madison website, which claims to have 39 million   
   members and boasts about being a matchmaker for cheating spouses.   
      
   The hackers on Wednesday released millions of email addresses   
   registered to the website, saying in a posted message they   
   exposed the information because Ashley Madison's Toronto-based   
   owner refused to comply with their demands to shut down the   
   website.   
      
   Black does not have a timetable for his investigation. Even once   
   he finds out who the email domains are linked to, it's possible   
   those employees did not register on the adultery site. The   
   website does not require email addresses to be verified so   
   members could use another person's email address to sign up and   
   log onto Ashley Madison.   
      
   Black says the city has a "very stringent" Internet policy, and   
   city-issued computers have a monitoring system that blocks   
   access to several websites.   
      
   "All we can do is look at our protocols and programming of   
   software and make sure it is as all-encompassing as possible,"   
   Black said. "But nothing is going to be fail-safe in 2015."   
      
   Many other government-issued email domains from across Ohio were   
   listed in the data breach, according to an Enquirer analysis.   
   The City of Columbus had five email domains on the list. The   
   cities of Akron, Toledo, Troy and Tiffin also had email domains   
   listed.   
      
   In Texas, Fort Worth is one of the cities linked to an Ashley   
   Madison account.   
      
   The hacker data indicates that 15,000 addresses ending with a   
   ".gov" designation were listed as an Ashley Madison customer,   
   including DeSoto, Frisco, Garland, Fort Worth and Arlington,   
   Texas.   
      
   However, "jumping to conclusions about the origination of that   
   IP or email address could be dangerous," civil attorney Tim Hoch   
   told WFAA-TV.   
      
   Nevertheless, the City of Plano has launched an investigation.   
   "We find it unfortunate that an employee of the City of Plano   
   allegedly elected to use an official work e-mail account for an   
   inappropriate personal purpose such as this," an official   
   statement said.   
      
   The City of DeSoto blocks access to Ashley Madison on most of   
   its computers, except for a small number used for law   
   enforcement. DeSoto officials said if someone is found to have   
   violated computer policy, he or should would be disciplined.   
      
   "What if someone was doing an online impersonation?" attorney   
   Hoch asked. "We see that quite a bit in our practice ...   
   especially the divorce side, folks who impersonate others   
   online."   
      
   Using a government email address to register for an adultery   
   website may seem foolish, but CybelAngel Vice President of   
   Operations Damien Damuseau said there was a certain logic to it.   
   Using a professional address, he said, keeps the messages out of   
   personal accounts "where their partner might see them."   
      
   "It's not that dumb," Damuseau said.   
      
   A blog by Salted Hash-Top Security News published a list, along   
   with disclaimers, since some of the names are fake. Among the   
   accounts on the list were three tied to South Carolina state   
   agencies and five tied to local ones.   
      
   The domains in the list included sc.gov, dhec.sc.gov, ed.sc.gov,   
   charleston-sc.gov, greenwoodsc.gov, jaspercountysc.gov and   
   blumenau.sc.gov.   
      
   And one CharlotteNC.gov address was released in the data dump   
   Wednesday, along with one from Iredell County and two from the   
   City of Salisbury in North Carolina.   
      
   WCNC-TV reached out to each of the municipalities for comment.   
      
   Traci Ethridge, assistant director of corporate communications   
   for the City of Charlotte told WCNC-TV, "From the information   
   provided to us, it is unclear if the extension is from a city of   
   Charlotte server or from an email address of an employee. We   
   have had no data breaches relative to the city of Charlotte   
   server."   
      
   Ashley Madison's owner, Avid Life Media Inc., has previously   
   acknowledged suffering an electronic break-in and said in a   
   statement Tuesday it was investigating the hackers' claim. U.S.   
   and Canadian law enforcement are involved in the probe, the   
   company said.   
      
   The AP wasn't immediately able to determine the authenticity of   
   the leaked files, although many analysts who have scanned the   
   data believe it is genuine.   
      
   TrustedSec Chief Executive Dave Kennedy said the information   
   dump included full names, passwords, street addresses, credit   
   card information and "an extensive amount of internal data." In   
   a separate blog, Errata Security Chief Executive Rob Graham said   
   the information released included details such as users' height,   
   weight and GPS coordinates. He said men outnumbered women on the   
   service five-to-one.   
      
   http://www.usatoday.com/story/news/nation-now/2015/08/20/ashley-   
   madison-ohio-texas-probe/32042771/   
      
        
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca