Archiv: data networks / databases


13.02.2019 - 18:19 [ Financial Times ]

Huawei accuses US of ‘political’ campaign against telecoms group

Please use the sharing tools found via the share button at the top or side of articles. Copying articles to share with others is a breach of FT.com T&Cs and Copyright Policy. Email licensing@ft.com to buy additional rights. Subscribers may share up to 10 or 20 articles per month using the gift article service. More information can be found at https://www.ft.com/tour.
https://www.ft.com/content/4cf0a902-2f6b-11e9-ba00-0251022932c8

“Some say that because these countries are using Huawei equipment, it makes it harder for US agencies to obtain these countries’ data,” he added.

Mr Xu also revealed that Huawei would spend more than $2bn to restructure the code used in its telecoms services worldwide after a series of “confrontational” meetings with Britain’s cyber security agency over the issue.

13.02.2019 - 18:01 [ sdxcentral.com ]

Huawei Works With Arm, Not Intel, on New CPU

(7.1.2019) William Xu, director of the board and chief strategy marketing officer of Huawei, noted that Huawei had worked extensively with Intel. But he said a diversity of applications and data is driving varied computing requirements. “Huawei has long partnered with Intel to make great achievements,” said Xu in a statement. “Together we have contributed to the development of the ICT industry. Huawei and Intel will continue our long-term strategic partnerships and continue to innovate together.”

13.02.2019 - 17:56 [ theVerge.com ]

Don’t use Huawei phones, say heads of FBI, CIA, and NSA

During his testimony, FBI Director Chris Wray said the government was “deeply concerned about the risks of allowing any company or entity that is beholden to foreign governments that don’t share our values to gain positions of power inside our telecommunications networks.” He added that this would provide “the capacity to maliciously modify or steal information. And it provides the capacity to conduct undetected espionage.”

13.02.2019 - 12:44 [ Wim van Eck / radio-utopie.de ]

Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?

(1985) In February, 1985, we carried out an eavesdropping experiment in London, in cooperation with the British Broadcasting Corporation. Part of the results were shown in the programme „Tomorrow’s World.“ A small van was equipped with a 10 metre high pump mast to which a VHF band III antenna was clamped (10 dB gain). The received signal was fed through an antenna, amplified (18 dB) and displayed on a television screen inside the van.

For obvious reasons we cannot give information on the data picked up during the experiment. The results can be
summarized as follows:

• It is possible to eavesdrop on the video display units or terminals in buildings from a large distance, using a car fitted up for the purpose.

• Although the experiment was carried out in broad daylight and many people watched us, nobody asked what we were doing.

13.02.2019 - 12:38 [ Universität Tel Aviv ]

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation

(April 2015) Q1: What information is leaked by the electromagnetic emanations from computers?

This depends on the specific computer hardware. We have tested numerous laptop computers, and found the following:
In almost all machines, it is possible to tell, with sub-millisecond precision, whether the computer is idle or performing operations.
On many machines, it is moreover possible to distinguish different patterns of CPU operations and different programs.
Using GnuPG as our study case, we can, on some machines:
distinguish between the spectral signatures of different RSA secret keys (signing or decryption), and fully extract decryption keys, by measuring the laptop’s electromagnetic emanations during decryption of a chosen ciphertext.

13.02.2019 - 12:23 [ Wikipedia ]

Out-of-order execution

The high logical complexity of the out-of-order technique is the reason that it did not reach mainstream machines until the mid-1990s. Many low-end processors meant for cost-sensitive markets still do not use this paradigm due to the large silicon area required for its implementation. Low power usage is another design goal that is harder to achieve with an out-of-order execution (OoOE) design.

A vulnerability in some microprocessor manufacturers‘ implementations of the out-of-order execution mechanism was reported to the manufacturers on June 1, 2017, but which was not publicized until January 2018, …

13.02.2019 - 12:03 [ zdnet.com ]

New Spectre attack variant can pry secrets from Intel’s SGX protected enclaves

(2.3.2018) The so-called SgxPectre side-channel attack affects programs with sensitive components protected by Intel’s SGX or Software Guard Extensions enclaves.

SGX is available in newer Intel Core chips and allows developers to selectively isolate sensitive application code and data to run in their own execution environment.

13.02.2019 - 11:59 [ Jennifer Fernick ‏/ Twitter ]

From “FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution”: Leaky chip, side channel leakage, and hostile OS = decrypting ~100% of the data, ~100% of the time. #realworldcrypto

(10.1.2019)

13.02.2019 - 11:55 [ Arxiv.org ]

Practical Enclave Malware with Intel SGX

(8.2.2019) Modern CPU architectures offer strong isolation guarantees towards user applications in the form of enclaves. For instance, Intel’s threat model for SGX assumes fully trusted enclaves, yet there is an ongoing debate on whether this threat model is realistic. In particular, it is unclear to what extent enclave malware could harm a system. In this work, we practically demonstrate the first enclave malware which fully and stealthily impersonates its host application. Together with poorly-deployed application isolation on personal computers, such malware can not only steal or encrypt documents for extortion, but also act on the user’s behalf, e.g., sending phishing emails or mounting denial-of-service attacks.

08.02.2019 - 09:25 [ Benjamin Carr / Twitter ]

#Japan to hack 200million devices to prepare for #Olympics2020 #NICT received legal permission to hack Japanese citizens’ devices in Nov, citing need to ramp up #cybersecurity for 2020 #Tokyo #SummerOlympics & #Paralympics. Plan is to attack some 200m #IoT

(28.1.2019)

07.02.2019 - 09:11 [ US State Department ]

Statement by Ministers of the Global Coalition To Defeat ISIS/DAESH

9. In 2019, the Coalition expects to concentrate on implementing the Working Group action plans. With the conventional military effort against ISIS in Syria nearing culmination and shifting to a supporting rather than a central role, the Coalition members will open a discussion to plan the next phase of the campaign. This could involve an effort to counter ISIS’s reversion to insurgency in Syria and Iraq. It could also include, addressing ISIS’s trans-border networks, branches, and affiliates, which continue to present a significant, and in some cases, growing threat to the members of our Coalition as highlighted by the June 2018 Coalition meeting of Political Directors with a focus on Africa held in Skhirate, Morocco. In particular, the Coalition should remain united in its efforts to undermine ISIS’s brand by rolling back its access to the information space as a tool to spread its toxic ideology and propaganda. The Coalition is determined to increase the pressure to disrupt ISIS’s trans-regional network through increased information sharing and complementary efforts in counter-finance, strategic communication, law enforcement, the justice sector, and security for our homelands. Coalition Working Groups and members will strive to ensure that our goals are met across the broader diplomatic and counterterrorism ecosystem, and does not seek to duplicate existing mechanisms and lines of effort. The Coalition has gathered unique experience and information while fighting ISIS in Iraq and Syria that can be of value to other international organizations and groupings combating terrorism.

10. We are gratified by the momentum collectively generated by the Coalition and its partners and once again express our determination to deliver ISIS an enduring defeat. Our joint engagement in Iraq and Syria will continue. We recognize the need for sustained coordination and consultation of the Coalition across all its lines of efforts and especially in the Core. The four Working Groups of the Coalition – Foreign Terrorist Fighters, Counter-ISIS Financing, Communications, and Stabilization – are essential, and we remain dedicated to their continued progress. With this in mind, we look forward to the Political Directors’ meeting in late spring and the regular meeting of the Coalition Working Groups in the year ahead.

26.01.2019 - 09:16 [ Facebook ]

Facebook and the Technical University of Munich Announce New Independent TUM Institute for Ethics in Artificial Intelligence

The Technical University of Munich is one of the top-ranked universities worldwide in the field of artificial intelligence, with work extending from fundamental research, to applications in fields like robotics and machine intelligence, to the study of the social implications of AI. The Institute for Ethics in Artificial Intelligence will leverage the TUM’s outstanding academic expertise, resources and global network to pursue rigorous ethical research into the questions evolving technologies raise.

The Institute will also benefit from Germany’s position at the forefront of the conversation surrounding ethical frameworks for AI — including the creation of government-led ethical guidelines on autonomous driving — and its work with European institutions on these issues.

25.01.2019 - 19:20 [ Spectator ]

The internet was never intended to spy on us

Fortunately, I know one of the people who helped develop the ARPANET, Professor Peter Kirstein. For more than a decade, starting in 1973, Kirstein ran the UK’s connection to ARPANET out of his office at University College, London (where he remains a professor of computer communications). So I phoned him, and he told me:

„Unless everyone’s been lying to me for 40 years, the ARPANET was not intended as, or used as, a surveillance system. The 1966 concept could never include more than 64 locations, with four computers in each location. It took the invention of the Internet Protocols a decade later to envisage a capacity of millions of locations and billions of devices.“

17.01.2019 - 22:31 [ /notesdeseguretat.blog.gencat.cat ]

Artificial security and defence intelligence of the European Union

(16.1.2019) According to the study published by the European Union Institute for Security Studies, in the coming years artificial intelligence (AI) will be present in almost all areas of daily life: communication, healthcare and even security and defence.

06.01.2019 - 13:45 [ PrivacyInternational.org ]

Secret Global Surveillance Networks: Intelligence Sharing Between Governments and the Need for Safeguards

(April 2018) In the past few decades, methods of communication have dramatically changed. The development of new technology, especially the birth of the internet, has transformed the way individuals communicate with each other and increased the amount of information that can be collected by several orders of magnitude. In particular, communications – emails, instant messages, calls, social media posts, web searches, requests to visit a website – may transit multiple countries before reaching their destination. The dispersion of communications across the internet vastly increases the opportunities for communications and data to be intercepted by foreign governments, who may then share them with other governments.

As methods of communications have dramatically changed, so too has intelligence gathering. Intelligence agencies have developed increasingly advanced ways of accessing, acquiring, storing, analysing and disseminating information. In particular, they have developed methods for acquiring communications and data traveling the internet. The costs of storing this information have decreased dramatically and continue to do so. At the same time, technology now permits revelatory analyses of types and amounts of data that were previously considered meaningless or incoherent. Finally, the internet has facilitated remote access to information, meaning the sharing of communications and data no longer requires physical transfer from sender to recipient.

The new scope and scale of intelligence gathering has given rise to a new scope and scale of the sharing of that intelligence between governments, particularly in response to threats to national security. Despite these dramatic changes, in many countries around the world, the public remains in the dark regarding state surveillance powers and capabilities, and whether those powers and capabilities are subject to the necessary safeguards pursuant to domestic and international law.

06.01.2019 - 12:57 [ New York Times ]

Fight Against Last Vestige of ISIS in Syria Stalls, to Dismay of U.S.

(6.11.2018) In Jordan, state intelligence officials said they had worked closely with the C.I.A. to thwart more than a dozen terrorist plots in the past several months in the Middle East and Europe.

A classified American military program in Jordan, called Operation Gallant Phoenix, is scooping up data collected in commando raids in Syria and Iraq and funneling it to law enforcement agencies in Europe and Southeast Asia, according to United States military and intelligence officials who described details of the initiative on condition of anonymity because of its secretive nature.

06.01.2019 - 12:54 [ Olivier Guitta ‏/ Twitter ]

A classified #US military program in #Jordan, called Operation Gallant Phoenix, is scooping up data collected in commando raids in #Syria and #Iraq and funneling it to law enforcement agencies in #Europe and Southeast #Asia.

(8.11.2018)

04.01.2019 - 11:03 [ legalinsurrection.com ]

Israel Helped 30 Countries Foil Terror Attacks in 2017, Says Economy Minister

(28.2.2018) Israeli military’s intelligence branch, known as “Unit 8200,” told the Australian authorities about a hidden explosive device destined for an Etihad Airways flight leaving Sydney for Abu Dhabi last July.

Earlier this month, the German weekly Der Spiegel reported on Israel’s role in helping Germany and European countries in combating Islamist terror. It revealed that Israel is part of a covert multinational counter-terrorism operation named “Gallant Phoenix” that gathers intelligence on Islamic State war criminals returning from the Middle East to Europe.

04.01.2019 - 10:46 [ Jerusalem Post ]

Israel working with Germany to combat ISIS terrorism in Europe

(5.2.2018) Israel is part of a secret counter- terrorism coalition that gathers intelligence on Islamic State combatants returning from the Syrian war to Europe, according to a Sunday report in Der Spiegel magazine.

The intelligence collection and anti-terror campaign is named “Gallant Phoenix” and includes a total of 21 states. Germany, the US and Jordan are part of the coalition that is based in Jordan at the US Joint Special Operations Command.

13.12.2018 - 22:59 [ Trend.az ]

Lenovo supplying data storage systems for Azintelecom

Lenovo has started supplying data storage systems to Azintelecom LLC of the Ministry of Transport, Communications and High Technologies of Azerbaijan, Director General of Lenovo Global Technology Russia and the CIS Dmitry Parshin said at a conference dedicated to the launch of the first corporate blockchain platform Dec. 13, Trend reports.

13.12.2018 - 22:39 [ Trend.az ]

Afghanistan sends its cargo to Azerbaijan via Turkmenistan

A test motorcade carrying cargo has been sent from Afghanistan’s western province of Herat, to be delivered by land through Turkmenistan and the Caspian Sea to Azerbaijan, Trend reports citing a source close to the transport industry of Turkmenistan.

President of Afghanistan Mohammad Ashraf Ghani took part in the launching ceremony of a transport corridor allowing Afghanistan to enter global markets bypassing the traditional Pakistani direction.

01.12.2018 - 14:06 [ Kroll Inc. ]

Starwood Guest Reservation Database Security Incident – Marriott International

Marriott values our guests and understands the importance of protecting personal information. We have taken measures to investigate and address a data security incident involving the Starwood guest reservation database. The investigation has determined that there was unauthorized access to the database, which contained guest information relating to reservations at Starwood properties on or before September 10, 2018. This notice explains what happened, measures we have taken, and some steps you can take in response.

On September 8, 2018, Marriott received an alert from an internal security tool regarding an attempt to access the Starwood guest reservation database. Marriott quickly engaged leading security experts to help determine what occurred. Marriott learned during the investigation that there had been unauthorized access to the Starwood network since 2014. Marriott recently discovered that an unauthorized party had copied and encrypted information, and took steps towards removing it.

01.12.2018 - 13:47 [ New York Times ]

Marriott Hacking Exposes Data of Up to 500 Million Guests

Marriott International revealed that hackers had breached its Starwood reservation system and had stolen the personal data of up to 500 million guests.

The assault started as far back as 2014, and was one of the largest known thefts of personal records, second only to a 2013 breach of Yahoo that affected three billion user accounts and larger than a 2017 episode involving the credit bureau Equifax.

05.11.2018 - 08:33 [ NBC News ]

‚Unprecedented‘ interest in midterms from U.S. voters living abroad

An unprecedented number of Americans living outside the U.S. have requested ballots, up seven times over the last midterm election in 2014, according to data from the non-partisan U.S. Vote Foundation, which registers a large portion of overseas voters. The group declined to disclose the number who had requested ballots.

05.11.2018 - 08:14 [ New York Times ]

Did You Vote? Now Your Friends May Know (and Nag You)

Whom Americans vote for is private. But other information in their state voter files is public information; depending on the state, it can include details like their name, address, phone number and party affiliation and when they voted. The apps try to match the people in a smartphone’s contacts to their voter files, then display some of those details.

14.10.2018 - 10:02 [ New York Times ]

You Are a Suspect

(14. November 2002) Every purchase you make with a credit card, every magazine subscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend — all these transactions and communications will go into what the Defense Department describes as “a virtual, centralized grand database.“

To this computerized dossier on your private life from commercial sources, add every piece of information that government has about you — passport application, driver’s license and bridge toll records, judicial and divorce records, complaints from nosy neighbors to the F.B.I., your lifetime paper trail plus the latest hidden camera surveillance — and you have the supersnoop’s dream: a “Total Information Awareness“ about every U.S. citizen.

14.10.2018 - 10:00 [ Wired.com ]

How the Tech Giants Created What Darpa Couldn’t

(29.5.2018) The William Safire column, „You Are a Suspect,” was published in the Times in 2002—two years before Facebook was created. And Safire isn’t talking about social networks or digital advertising—he’s discussing Total Information Awareness, a US Defense Advanced Research Projects Agency (Darpa) program that proposed mining vast amounts of Americans’ data to identify potential national security threats. The virtual grand database was to belong to the Department of Defense, which would use it to identify behavior patterns that would help to predict emerging terrorist threats.

13.08.2018 - 06:21 [ CNN ]

Democrats want Facebook to tell them who has seen disinformation

The proposal from Raffi Krikorian, the Democratic National Committee’s chief technology officer and a former Uber executive, would allow Democrats and Republicans alike to combat misinformation by serving those people accurate information.

26.07.2018 - 15:29 [ Privacy International ]

Secret Global Surveillance Networks: Intelligence Sharing Between Governments and the Need for Safeguards

(April 2018) In the past few decades, methods of communication have dramatically changed. The development of new technology, especially the birth of the internet, has transformed the way individuals communicate with each other and increased the amount of information that can be collected by several orders of magnitude. In particular, communications – emails, instant messages, calls, social media posts, web searches, requests to visit a website – may transit multiple countries before reaching their destination. The dispersion of communications across the internet vastly increases the opportunities for communications and data to be intercepted by foreign governments, who may then share them with other governments.

As methods of communications have dramatically changed, so too has intelligence gathering. Intelligence agencies have developed increasingly advanced ways of accessing, acquiring, storing, analysing and disseminating information. In particular, they have developed methods for acquiring communications and data traveling the internet.

21.07.2018 - 11:48 [ New York Times ]

‘Big Red Flag’: Automakers’ Trade Secrets Exposed in Data Leak

He’s a rarity in the industry: a security sleuth who doesn’t hack. Instead, he searches communication ports and the internet’s hive of connected devices to find information inadvertently made public. His discoveries have included medical records, airport security files, hotel bookings, a terrorist screening database and 87 million Mexican voter registration records. Once the sensitive information has been secured, he publicly discloses that the data had been revealed.

Mr. Vickery found Level One’s data through an exposed backup server.

08.07.2018 - 22:23 [ Hackaday ]

Tiny Websites have no Server

(7.Juli) A big trend in web services right now is the so-called serverless computing, such as Amazon’s Lambda service. The idea is you don’t have a dedicated server waiting for requests for a specific purpose. Instead, you have one server (such as Amazon’s) listening for lots of requests and on demand, you spin up an environment to process that request. Conceptually, it lets you run a bit of Javascript or some other language “in the cloud” with no dedicated server. A new concept — https://itty.bitty.site — takes this one step farther. The site creates self-contained websites where the content is encoded in the URL itself.

28.06.2018 - 02:39 [ South China Morning Post ]

Peking University installs facial recognition system for students and staff on campus gate

Anyone going through the southwestern gate of prestigious Peking University can now have their face scanned by a camera instead of showing their ID card to security guards under a trial run of the system that started on Wednesday.
Many of the top universities in China restrict – and even ban – members of the public from visiting their campuses, and students and staff are often required to produce proof of identity before they can enter.

25.06.2018 - 09:14 [ Japan Times ]

Japan considers crime prediction system using big data and AI

Street crime prediction “has already achieved results in Europe and the United States,” said Mami Kajita, who established the data-analysis company Singular Perturbations Inc. last year in hopes of developing a Japanese version of the methods used in the United States.

18.06.2018 - 22:56 [ GIZMODO ]

Australia Scraps Plans for National Biometric Crime Database

The Australian government is ending its plans for a national biometric database meant to help police departments track suspects and other persons of interest, the Australian Criminal Intelligence Commission announced Friday. Surveillance and security company NEC was awarded the contract in 2016, but after a third-party audit found the project had nearly doubled its budget, ACIC terminated the contact.

02.06.2018 - 17:17 [ New York Times ]

F.B.I. and States Vastly Expand DNA Databases

(18.4.2009) starting this month, the Federal Bureau of Investigation will join 15 states that collect DNA samples from those awaiting trial and will collect DNA from detained immigrants — the vanguard of a growing class of genetic registrants.

The F.B.I., with a DNA database of 6.7 million profiles, expects to accelerate its growth rate from 80,000 new entries a year to 1.2 million by 2012

02.06.2018 - 17:06 [ Washington Post ]

The ingenious and ‘dystopian’ DNA technique police used to hunt the ‘Golden State Killer’ suspect

(28.4.2018) They tracked their suspect through his family tree.

Police said they checked the crime scene DNA against one of the genealogy sites that have lately become popular — databases filled with the profiles of people who have volunteered their genetic codes in the hope of discovering their relatives and ancestors. GEDmatch, a free service, confirmed that police used it to identify DeAngelo.

20.05.2018 - 15:13 [ Netzpoltik.org ]

„Weltraumdatenautobahn“ beschleunigt die Kommunikation mit Satelliten und Drohnen auf nahezu Echtzeit

Für die „Weltraumdatenautobahn“ werden drei Satelliten des europäischen Datenrelaissystems (European Data Relay Satellite System, EDRS) in einer geostationären Umlaufbahn in 36.000 Kilometer Höhe installiert. Sie können über Distanzen von 80.000 Kilometern per Laser eine Verbindung zwischen tiefer fliegenden Beobachtungssatelliten oder Drohnen und einer Bodenstation herstellen. Damit können Informationen in nahezu Echtzeit an jeden Ort auf der Erde übermittelt werden.

16.05.2018 - 11:02 [ South China Morning Post ]

‘Forget the Facebook leak’: China is mining data directly from workers’ brains on an industrial scale

The company said it could increase the overall efficiency of the workers by manipulating the frequency and length of break times to reduce mental stress.

Hangzhou Zhongheng Electric is just one example of the large-scale application of brain surveillance devices to monitor people’s emotions and other mental activities in the workplace, according to scientists and companies involved in the government-backed projects.

15.04.2018 - 00:07 [ NME ]

Police used facial recognition technology to locate and arrest a man at a pop concert

The suspect, identified only as Mr Ao, was one of 60,000 attendees at a show for pop star Jacky Cheung in Nanchang city.
Thanks to the recognition tech, he was identified by cameras at the concert’s ticket entrance, and later arrested by police after he had sat down with other concert goers.(…)
Police officer Li Jin told state news agency Xinhua that “the suspect looked completely caught by surprise when we took him away.

04.04.2018 - 21:35 [ The Guardian ]

Richard Stallman: A radical proposal to keep your personal data safe

To restore privacy, we must stop surveillance before it even asks for consent.

Finally, don’t forget the software in your own computer. If it is the non-free software of Apple, Google or Microsoft, it spies on you regularly. That’s because it is controlled by a company that won’t hesitate to spy on you. Companies tend to lose their scruples when that is profitable. By contrast, free (libre) software is controlled by its users. That user community keeps the software honest.