Security guard charged in Pokemon Go shooting death in court
1. Police say Chen was sitting in his minivan in a parking lot when he was shot by the security guard after an altercation . Chen’s family has said the man was playing Pokemon Go. In April, Cromwell’s attorney asked to be removed from the case2, citing a deteriorating level of trust and a lack of communication .
The judge granted the request, and Cromwell was assigned a court-appointed attorney.
Cromwell has remained in jail since his arrest.
The UK s National Cyber Security Centre says it is aware of a cyber attack spreading around the world amid fears of disruption to infrastructure including banking and transport.
We re aware of the global ransomware incident and are monitoring the situation closely, a spokesperson told The Independent, advising members of the public and businesses to check its website for guidance on keeping their systems secure. British advertising firm WPP said IT systems in several of its companies were affected by the attack, as Maersk employees were sent home from its offices in Berkshire.
The first reports came from Ukraine1, where state infrastructure including government-owned banks, energy firms, transportation and ministers computers were hit by the ransomware. Russian oil giant Rosneft, the world s largest shipping company Maersk and firms in India and Norway were among those affected.
Infected computers display a message demanding a payment of $300 ( 235) in Bitcoin to re-gain access to encrypted files. The Swiss government s Reporting and Analysis Centre said the Petya virus 2was believed to be responsible and was spreading by exploiting the SMB (Server Message Block) vulnerability . A message demanding money is seen on a monitor of a payment terminal at a branch of Ukraine’s state-owned bank Oschadbank after a wave of cyber attacks, in Kiev, Ukraine, June 27, 2017. (Reuters)
Petya was previously blamed for disrupting systems in 2016 and works similarly to the WannaCry ransomware that infected more than 230,000 computers in 150 countries last month.
Maersk said its IT systems were down across multiple sites and businesses due to a cyber attack that could affect its global operations. Employees at Maersk s main UK office in Maidenhead said all staff had been locked out of their computers and sent home for the day. The Danish business congolmerate is the largest container shipping company in the world and also operates in the oil and gas sectors.
Seventeen shipping container terminals run by Maersk subsidiary APM Terminals have also been hacked, including two in Rotterdam and 15 in other parts of the world, according to Dutch television. Norway s national security agency said the ransomware was affecting an unnamed international company in the country. Rosneft, a Russian government-owned oil firm, said it was also targeted by a massive hacker attack on its servers, as was steel maker Evraz.
Ukraine s national bank, state power company and largest airport were among the targets first reported targets on Tuesday. The website of Boryspil International Airport during a cyber attack targeting Ukrainian infrastructure on 27 June 2017
Rozenko Pavlo, the deputy Prime Minister, said he and other members of the government were unable to access their computers. Ukrainian state-run aircraft manufacturer Antonov was among the companies hit, along with state power distributor Ukrenergo, which said the attack did not affect power supplies.
The National Bank of Ukraine said an unknown virus was to blame, saying several unnamed Ukrainian banks were affected along with financial firms.
As a result of cyber attacks, these banks have difficulties with customer service and banking operations, a statement said.
The National Bank bank is confident that the banking infrastructure’s defence against cyber fraud is properly set up and attempted cyber attacks on banks’ IT systems will be neutralised. Computers and departure boards for Boryspil International Airport in Kiev the largest in Ukraine were also down. The Ukrposhta state postal service, television stations and transport were affected by the attack, which left Kiev metro passengers unable to pay using bank cards.
Many ATMs were disabled, displaying the message left by hackers, as were tills in supermarkets. Emails hit as Parliament targeted by cyber security attack
Ukraine has blamed Russia for repeated cyber attacks targeting crucial infrastructure during the past three years, including one on its power grid that left part of western Ukraine temporarily without electricity in December 2015. Russia has denied involvement and the orchestrators of Tuesday s attack were not known, although onlookers estimated they could make billions of dollars from the hack.
The UK s Houses of Parliament were targeted in a separate attack 3on Friday that compromised up to 90 accounts as part of efforts to access the accounts of MPs, peers and their staff by searching for weak passwords.
Guillaume Poupard, director general of the National Cybersecurity Agency of France (ANSSI) said intensifying attacks were coming from unspecified states, as well as criminal and extremist groups.
We must work collectively, not just with two or three Western countries, but on a global scale, he added, saying attacks could aim at espionage, fraud, sabotage or destruction.
We are getting closer, clearly, to a state of war – a state of war that could be more complicated, probably, than those we’ve known until now.
Cyber attacks are the virtual reality that has just got real . On Friday, hackers suspected of being Russian broke into parliament, in a sustained and determined attack that compromised the network. Using software that reportedly used brute force to overwhelm and guess passwords, only 90 email accounts were breached before the attack was rebuffed, but the UK s defences are looking flimsy against a rising tide of online attacks . Last month, the NHS-crippling WannaCry1 virus crippled dozens of health trusts as computers were frozen . University College London was hit by a major ransomware attack this month that shut down its shared systems.
The devastating nature of such attacks lies in simplicity as much as state-of-the-art technology: it just takes one employee to open or respond to the wrong email . Barclays chief executive Jes Staley was left red-faced last month when he fell for a hoax email purporting to be from Barclays chairman John McFarlane. London, though, is leading a fightback . In February, the Queen opened the National Cyber Security Centre, part of GCHQ in Victoria, which worked around the clock to shut down Friday s attack . The booming fintech sector is a magnet for private-sector cyber security companies such as DynaRisk and CybSafe looking to service them . And so the best and the brightest talent are making their way to the capital . This group of ethical hackers and security experts are the new first line of defence.
The parliament attack was pretty unsophisticated the cyber equivalent of a criminal trying a door to see if it s locked properly, says Oliver Rees, 26, CEO of Southwark company Trustlight, whose job is to make sure cyber back doors stay locked .
He s part of London s fightback against cyber crime in the UK . The new normal is the everyday hackers trying to break into our phones, TVs and anything else that s connected . The good news is that with a few simple steps, we can protect against 99.9 per cent of the attacks. CyLon (Cyber London), Europe s first dedicated cyber security start-up accelerator, is based in Hammersmith and pumps 15,000 each into fledgling cyber security companies with bright ideas but bare pockets . It s a three-month programme where entrepreneurial teams with innovative and disruptive business ideas are provided with access to expert training and guidance from an accomplished network of mentors and investors.
The capital is, therefore, a cyber petri dish, where we scoop out virus cultures and stick them under the microscope, then work on an inoculation . But who are they recruiting?
The AI cyber sentry
Emily Orton, Darktrace
(Daniel Hambury/Stella Pictures)
Every year hackers are getting better, says Emily Orton, 33, co-founder and director of Darktrace, the 400million-valued London-based cyber security firm, shortlisted for this year s Evening Standard Business Awards, which claims to have beaten the WannaCry hack . There s been an industrialisation of the threat landscape she says, as hackers become better funded and better equipped via the Dark Web.
We re seeing a move towards more automated threats, cleverer cyber weapons, and attacks towards trust in data, where people are in a network for longer, undermining its integrity . The response ? Their machine learning AI which stops emerging threats as they happen . Orton uses the analogy of the human body, with the skin being rudimentary firewall systems that keep out elementary threats .
We re the immune system that works to continually identify anything that gets through, adapting to any internal threat that shouldn t be there, she says . It s an AI that builds an understanding of what s normal for the organisation, so it can spot when a device or person in organisation acts strangely and flag that in real time.
The web s guardian angels
Aleks Koha, Titan Grid
Hackers never sleep, so neither do we, says Estonian Koha, 23, CEO of Titan Grid, one of CyLon s latest incubators . They find the most annoying time to hit you, like a Friday, or a weekend, when the lights are on but nobody s around to defend themselves . Koha works round the clock with his five-man team in Hammersmith, to the extent that his girlfriend is always glaring because my laptop s on in bed late at night .
Titan Grid specialises in cyber counterintelligence it sweeps up and erase clients home addresses, emails, and phone numbers from the internet using automated tools . These are the most basic lockpicks a hacker looks for, with over 60 online identities stolen per second.
It s dangerous, because the information we collect is useful to hackers too, says Koha . We have targets on our backs . Koha practices MMA and jujitsu in his spare time, which helps him develop resistance to high pressure situations . We can t stop 100 per cent of attacks happening in the first place, but we can give you a better lock than your neighbour, he says.
The identity cloaker
Irra Ariella Khi, VChain
I m much more comfortable working with my brain rather than my face, nowadays, says Khi, 33, a former model, an Oxford history and politics grad, and two-time e-commerce founder, who is fluent in nine languages . Her London start-up, Vchain, wants to make your identity unhackable , pitching to replace passports with blockchain technology, a digital ID key that no one can clone, which has so far been chiefly associated with Bitcoin transfers . Data is stored very poorly right now, says Khi .
You trade data for services you need, but have no quality control over how it s captured. International Airlines Group, British Airways s parent company, has already invested megabucks in Vchain which she runs with co-founder Alexander Gorelik after she won the pitch as the only woman on stage . I find that competence wins out, whatever your gender, she says . If in a room full of boys, the girl puts her hand up, chances are you ll be addressed not first or second, perhaps, but you ll be heard . A single mother, she lives in Fulham with her five-year-old daughter.
The e-psychology gurus
Oliver Rees and Alexander Walker, Trustlight
We re new here, says Oliver Rees, 26, CEO of Trustlight, another Cylon incubator that uses both technology and psychology to stop email fraud . He s not just talking about the company . We ve had 200,000 years of human evolution to learn to sense when there s a physical threat behind a bush, he says, but only 20 years to learn to sense threats online.
It s the people who most often accidentally give up the secrets, rather than the machines, agrees CTO Alexander Walker, 29 . Ninety per cent of attacks start with someone receiving an email that isn t genuine, he says . Trustlight, with the permission of companies, crafted fake emails in their testing stage to see who would take what bait.
Invite anyone to be the keynote speaker at an event and they ll click on the link every time, says Walker . Not all hackers are the enemy, though . A Jordanian contacted them to highlight a security flaw, asking for a bug bounty ; Rees replied that they couldn t pay the money, but sent him a T-shirt instead . He sent us a selfie, wearing it, and the happy ending is that now we work together.
The cybersecurity credit raters
Andrew Martin, Dynarisk
Born in Toronto, Canada, Martin, now 35, was a typical hacker in his teens, a near high school dropout, terrible at every subject apart from IT . Having enjoyed the adrenaline rush of breaking into systems , he realised the risks if he actually stole anything , so he stopped, and started working for a bank to stop people like me breaking in . (With his skills, getting a job when he moved to the UK in 2012 was easy.) His best trick was reverse engineering viruses , allowing him to find out where they were talking back to . According to Martin, he uncovered state-sponsored hacking, criminal groups in Eastern Europe, Asian and Central America , handing intelligence to the police . He s now left the fun stuff behind: his own company, Dynarisk, assesses an individual s risk to see how likely they are to be hacked, giving them a credit score and a tailored action plan of the things they need to do to protect themselves.
It also scans devices for vulnerabilities, check to see if emails were breached (his own has been five times), send safe, probing phishing emails and scan home browsers to see if can be accessed via the internet . He and his wife, Yasmin live in south London . They met in cyber security, so you see, you can find love in this line of work too .
The university of hacks
Oz Alashe, CybSafe
Oz Alashe, 40, is the daddy of all cyber security experts . As a father of two, a boy, five, and a girl, 19 weeks old, he worries about the online safety of his kids as much as the work of his GCHQ-accredited Canary Wharf firm CybSafe . He s also served in the UK s special forces, so he knows how to keep us safe . He s therefore all about education: CybSafe is a cloud-based educational tool allowing companies and their staff to learn how to look after their own.
Originally, we worked with cyber security experts, including ethical hackers, to learn the tools of cyber hackers: we then built a platform and modules that address what we learnt . They then assess to see if staff behaviour is changed by simulating attacks, via phishing emails, corrupted SMS text messages or USB stick drops (they work with both government and commercial entities) . You d be amazed at how many people pick up a USB stick with the word bonuses written on it and plug it straight in, says Alashe.
Pedro Ribeiro, Immersive Labs
If you re going to protect against hackers, you need to know how to hack, says Pedro Ribeiro, 33, CTO of Immersive Labs, another CyLon incubator, which teaches companies staff how to be hackers themselves . It s like playing a game of chess, and if you don t have all the pieces, you don t stand a chance .
Ribeiro s been a legal ethical hacker for eight years, exposing companies flaws on their payroll, earning between 500 and 2,500 a day .
The problem is, there s a severe skills shortage, which means we re expensive, he says . To bring the costs down and with increasing demand for hack-literate employees Immersive Labs shows them how to do it, teaching them to pull source code, manipulate sites to their advantage, spot problems with programmes and exploit them . Ribeiro is a devoted martial arts disciple . These days you have two types of hacker: the old-school doesn t see the daylight type, and the opposite . It s good for the body and the mind, and it fits with the hacking mind-set: you re fighting something big, always going against the current.