Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
GET RECOGNIZED.
Let an ISACA® certification
elevate your career.

Register today and save
Network Security
Is your endpoint data protected?
Average Rating:
Rate this article:  
Journalist Charged with Assisting Hack on L.A. Times

Journalist Charged with Assisting Hack on L.A. Times
By Barry Levine

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

Matthew Keys had been a producer at the Web site of KTXL-TV, owned by the Tribune Co. as well as the Los Angeles Times, and he was let go during the company's bankruptcy proceedings. Keys reportedly had revealed the login information in a chat room frequented by hackers. The login then was allegedly used to deface a story on the Times' Web site.
 


A journalist with the Reuters news service was charged Thursday by federal authorities with assisting the Anonymous hackers group in their successful effort to deface a story on the Los Angeles Times' Web site. The incident took place in December 2010, and Reuters has suspended the employee with pay.

According to the indictment in Sacramento, Calif., Matthew Keys was a "terminated employee" of the Tribune Co., and he provided the credentials needed to log in to the company's system. The Times is owned by the Tribune Co. The indictment is for conspiracy to transmit information to damage a protected computer, as well as transmitting and attempting to transmit the information. A conviction on all counts could result in up to 25 years in jail and a $500,000 fine.

The episode resulted in the headline of a Times story being modified on December 14 and 15, 2010, to read "Pressure building in House to elect CHIPPY 1337." Chippy 1337 is a hacking group that has said it was responsible for an attack on the Web site of a video game publisher in 2011. The Times story was related to taxes.

Sharpie, AESCracked

Per the indictment, the attack was undertaken by a hacker ID'd only as Sharpie.

The indictment said that Sharpie wrote to Keys after the hacking incident that there "was such a buzz having my edit on the LA Times." The authorities said Keys, using a virtual private network and the alias of AESCracked, replied "nice." The Times reportedly had to spend more than $5,000 to clean up after the attack.

Keys had been a producer at the Web site of KTXL-TV in Sacramento, also owned by the Tribune, and he was let go during the company's bankruptcy proceedings. Now 26, he reportedly had revealed the login information in a chat room frequently visited by hackers. Last year, Keys became a deputy editor for social media at the Reuters. In March of last year, Keys authored a story for Reuters about his "infiltrating" that hackers chat room.

'Business as Usual'

Keys posted Thursday on Twitter that he was "fine," and added that "I found out the same way most of you did," on Twitter. He said he was going to take a break, and then "business as usual."

The indictment includes a reference to the arrest of a hacker known as Sabu, but it does not indicate what the connection to Keys might be. In June 2011, the FBI arrested Hector Xavier Monsegur, whom they identified as an Anonymous hacker named Sabu. Following the arrest, Monsegur worked as a federal informant, and he helped the authorities arrest five other hackers on March 6 of last year. On March 7, Keys' story about infiltrating the chat room appeared on Reuters.

Attacks on publications' Web sites and internal systems are becoming more common. Last month, for instance, both The New York Times and The Wall Street Journal reported that their systems had been compromised by hackers based in China. In those cases, the attacks were considered to have targeted internal information about those newspapers' coverage of events in China.
 

Tell Us What You Think
Comment:

Name:



Get Powerful App Acceleration with Cisco. In a world where time is money, you need to accelerate the speed at which data moves through your data center. Cisco UCS Invicta delivers powerful, easy-to-manage application acceleration for data-intensive workloads. So you can make decisions faster and outpace the competition. Learn More.


 Network Security
1.   Target Data Breach Cost: $148 Million
2.   Aruba Handles Black Hat with Aplomb
3.   Chinese Hackers Steal Patient Data
4.   FBI Cybersquad To Add Agents
5.   Apple Opens China iCloud Data Center


advertisement
Target Data Breach Cost: $148 Million
Better customer data protection needed.
Average Rating:
Aruba Handles Black Hat with Aplomb
Network firm sees 2,376 DoS attacks.
Average Rating:
FBI Cybersquad To Add Agents
Rewarded for recent security successes.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Cost of Target Data Breach: $148 Million Plus Loss of Trust
The now infamous Target data breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 
Chinese Hackers Nab Info on Millions of U.S. Patients
A group of Chinese hackers has stolen the personal information, including names and Social Security numbers, of about 4.5 million patients at hospitals operated by Community Health Systems.
 

Enterprise Hardware Spotlight
Three New Lenovo PCs Aimed at Business Users
Businesses everywhere want computing solutions that do more for less money, and Lenovo has unveiled three new desktop PCs that offer solid computing at a budget-minded price.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 
Compression, Deduplication Come to Violin Concerto 2200
Violin Memory has announced that data deduplication and compression capabilities are now available on its Concerto 2200 solution. Typically, users will experience deduplication rates between 6:1 and 10:1.
 

Mobile Technology Spotlight
Apple Stock Soars Ahead of iPhone 6 Launch
The imminent release of the iPhone 6 -- and maybe even an iWatch -- has sent Apple's stock soaring to new heights. Considering what else the firm could have up its sleeve -- the stratosphere may be the limit.
 
HTC Debuts Windows Phone Version of One M8 Smartphone
HTC is bringing the Windows Phone mobile OS to its flagship One M8 device -- the first time any mainstream flagship smartphone has been offered with a choice of operating systems.
 
Verizon Earns Top Rating in Mobile Network Comparison
A new report says Verizon Wireless was the top-performing U.S. cellphone service provider in the first half of 2014, on a nationwide and state-by-state basis, as well as in metro areas.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.