Japan police offer first-ever reward for wanted hacker
Japan's National Police Agency has posted a US$36,000 reward for a case in which it wrongly arrested men with hacked PCs
IDG News Service - Japanese police are looking for an individual who can code in C#, uses a "Syberian Post Office" to make anonymous posts online, and knows how to surf the web without leaving any digital tracks -- and they're willing to pay.
It is the first time that Japan's National Police Agency has offered a monetary reward for a wanted hacker, or put so much technical detail into one of its wanted postings. The NPA will pay up to 3 million yen (US$36,000), the maximum allowed under its reward system.
The case is an embarrassing one for the police, in which earlier this year four individuals were wrongly arrested after their PCs were hacked and used to post messages on public bulletin boards. The messages included warnings of plans for mass killings at an elementary school posted to a city website.
"Up until now this type of reward was reserved for cases involving crimes like murder and arson, but the policy has recently been changed to include more types of crimes," an agency spokeswoman said on Thursday.
The reward poster, posted online on Wednesday, includes detailed technical descriptions of the wanted hacker's probable skills. These include the ability to use programming languages like C# to create a virus called "iesys.exe" and using an anonymous posting method called a "Syberian Post Office" to post messages to popular Japanese bulletin board 2channel. The agency also explains how a cross-site request forgery, an exploit that can allow hackers to making online postings via innocent users, was used in the case.
The police posting is a far cry from the traditional Japanese variety, which usually include sketches of wanted criminals, plus detailed pictures and descriptions of what they were wearing when crimes were committed.
The NPA changed its official reward policy on Dec. 7. It now has more leeway to use rewards in investigations, and is not limited by the type of crime. The maximum reward is set at 3 million yen, which can be increased up to 10 million yen in extreme cases.
Japan's National Police Agency is similar to organizations like the FBI, but its role is more focused on working with and organizing local police forces than independent investigations.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts