Archiv: data – procurement / theft / storage / banks / analysis / transfer / trade / networks


19.01.2021 - 17:52 [ DailyMail.co.uk ]

388 people aged under 60 with ‚NO underlying health conditions‘ have died of Covid in England’s hospitals

(27.12.2020)

Just 388 people aged under 60 with no underlying health conditions have died of Covid-19 in England’s hospitals since the start of the pandemic, NHS data has showed.

The figures show that 1,979 previously healthy people died in hospitals in England after testing positive for Covid-19 between April 2 and December 23.

18.01.2021 - 16:09 [ addictivetips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

18.01.2021 - 16:00 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

18.01.2021 - 15:50 [ DNSprivacy.org ]

DoT servers

Oct 2020: The list below has been updated to retain only those servers that appear to still be actively maintained

18.01.2021 - 15:47 [ securitymagazine.com ]

Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

(06.02.2020)

Obviously, time will tell if DoT continues to prevail or whether DoH will start to gain ground. As mentioned at the beginning of the article there is a hot debate going on right now about the direction the Internet industry should take. Suffice to say that even nation state authorities are involved in the debate, which speaks to the level and importance of the discussion.

18.01.2021 - 15:41 [ ZDNET.com ]

NSA warns against using DoH inside enterprise networks

The NSA urges companies to host their own DoH resolvers and avoid sending DNS traffic to third-parties.

18.01.2021 - 15:40 [ National Security Agency / Pentagon ]

Adopting Encrypted DNS in Enterprise Environments

Use of the Internet relies on translating domain names (like “nsa.gov”) to Internet Protocoladdresses. This is the job of the Domain Name System (DNS). In the past, DNS lookups were generally unencrypted, since they have to be handled by the network to direct traffic to the right locations. DNSover Hypertext Transfer Protocol over Transport Layer Security (HTTPS), often referred to as DNS over HTTPS (DoH), encrypts DNS requests by using HTTPS to provide privacy, integrity, and “last mile” source authenticationwith a client’s DNS resolver. Itis useful to prevent eavesdropping and manipulationof DNStraffic.While DoH can help protectthe privacy of DNS requests and the integrity of responses, enterprises that use DoH will lose some of the control needed to govern DNS usage within their networksunless they allow only their chosen DoH resolver to be used.Enterprise DNS controlscan prevent numerous threat techniques used by cyber threat actors for initial access, command and control, and exfiltration.

16.01.2021 - 13:54 [ Fool.com ]

Why Palantir Stock Is Up Today

On the one hand, nothing’s really changed about Palantir’s business except that one market participant (albeit a very influential one) expressed a change in opinion on the stock.

12.01.2021 - 11:43 [ World Association for Christian Communication ]

COVID-19 pandemic and biopolitics in Latin America

(17. AUgust 2020)

At the time of this writing [June 3, 2020], Latin America has become the new epicenter of the pandemic with growing number of reported cases of infections and deaths. Various governments in Latin America (Peru, Argentina, Bolivia, Chile, Ecuador, Mexico, Colombia and Brazil) and the Inter-American Development Bank have deployed digital technologies to control the transmission of the virus and to support testing and tracing. They have collaborated with private companies and universities in setting up mobile applications for geolocalizing and contact-tracing possibly infected people. Expectedly, these actions have raised concerns about the negative impact of massive surveillance.

However, while we recognize the legitimacy of these concerns, the problem in Latin America takes different dimensions than in Europe, North America, and East Asia. For the moment, the governments in the region have significant problems to launch and maintain massive digital surveillance apparatuses.

12.01.2021 - 11:41 [ waccglobal / Twitter ]

Does the #COVID-19 pandemic mark the birth of a new form of #biopolitics? The Latin American case shows important departures from Europe and the U.S., both in the adoption of surveillance technologies and in the types of biopolitical control

11.01.2021 - 20:08 [ Dr Naomi Wolf / Twitter ]

Chart from @nytimes is based on absolute complete b-it. @COVID19Tracking uses unnamed „volunteers‘ to upload data, built by a magazine owned by @Bloomberg , and uses data from a hedge fund information service. 100% corrupted, a way to legally insider trade.

11.01.2021 - 19:44 [ Telegraph.co.uk ]

People with common colds testing positive for Covid-19 may simply be asymptomatic cases, experts reveal

Trademark symptoms of seasonal flu could be mistaken for symptoms of Covid-19 if the individual tests positive for the virus, it is claimed.

More than eight in ten people who test positive for coronavirus show none of the main symptoms at the time they are tested, a major study by UCL previously revealed.

However, those who test positive when they have cold symptoms may mistake them as being a part of the virus – adding to fears that it is taking a new guise as fresh strains emerge.

10.01.2021 - 15:27 [ DailyMail.co.uk ]

No10 is examining plans to keep bars closed for FIVE MONTHS with full lockdown until late March as Covid death toll passes 80,000

Prof Whitty commended the public for their efforts to stop the spread of Covid-19 and noted the hope offered by various vaccines, but he echoed other experts in saying it would be some weeks before the jabs start to reduce the number of people taken to hospital.

10.01.2021 - 14:42 [ Neil Clark, journalist & broadcaster / Twitter ]

(1) How do we know we’re not bring told the truth? There’s c 1600-1700 deaths a day at this time of the year. Yet we are told that ´1300 are dying from Covid’. But with no excess deaths that means just 3-400 from pneumonia, flu, heart disease, cancers? That is clearly absurd.

(09.01.2021)

(2) Clearly what is happening is a reclassification of deaths. Non-Covid deaths are being reclassified as ´Covid deaths’ by means of ramped up PCR testing. Which begs the question: why are they doing this, if not to justify lockdowns and other restrictions?

10.01.2021 - 14:23 [ theCanary.co ]

Coronavirus data contractors engaged in dirty tricks and disinformation campaigns

(10.05.2020)

Palantir was co-founded in 2004 by Paypal owner and billionaire Peter Thiel. What the blog doesn’t reveal is that Palantir’s client list has included amomgst others, the CIA, the FBI, the NSA, the Centre for Disease Control, the Marine Corps, the Air Force, Special Operations Command, West Point and the IRS.

Furthermore, in 2016, it was revealed Palantir had a $34.6m contract with US Immigration and Customs Enforcement (ICE) and helped the Customs and Border Protection Agency create the Analytical Framework for Intelligence (AFI) system to track immigrants.

Nor does the blog mention that Palantir worked for UK intelligence and was awarded contracts to handle vast data sets on UK citizens for British spy agency GCHQ.

10.01.2021 - 14:15 [ theRegister.com ]

UK govt publishes contracts granting Amazon, Microsoft, Google and AI firms access to COVID-19 health data

(05.06.2020)

UK government has published the contracts it holds with private tech firms and the NHS for the creation of a COVID-19 data store, just days after campaigners fired legal shots over a lack of transparency.

Available on the openDemocracy website, the contracts describe how the arrangements between the NHS and Amazon, Microsoft, Google, and AI firms Faculty and Palantir (which subcontracts to AWS) will operate.

10.01.2021 - 13:25 [ Fedscoop.com ]

Inside Palantir’s work with the CDC, HHS to synthesize COVID-19 data

(02.04.2020)

Palantir said it is not involved in the harvesting or storage of health data but is working with the CDC and HHS to provide its Foundry suite of tools to analyze the agencies’ COVID-19 data. The set of data tools has the power to “clean” and “harmonize” the information flowing in from local hospitals, states and other sources related to the virus, according to a source with knowledge of the arrangement between the company and the government.

10.01.2021 - 13:13 [ Washington Post ]

Why are we trusting a company with ties to ICE and intelligence agencies to collect our health information?

(21.05.2020)

Last month, the Department of Health and Human Services (HHS) awarded the contract for this platform to Palantir Technologies, a secretive data-mining firm known for its work with the Pentagon, intelligence agencies and law enforcement during the so-called global war on terrorism. The HHS Protect Now platform will aggregate data from at least 187 different sources, including the federal government, state and local governments, hospitals, and the private sector.

10.01.2021 - 09:41 [ NewStatesman.com ]

How Palantir is quietly extending its reach through the British state

As Palantir’s executives were preparing over the summer to release shares publicly for the first time, they faced a challenge: how do you convince investors to buy into a 17-year-old company that has never turned a profit?

08.01.2021 - 23:04 [ .infosecurity-magazine.com ]

SAD Reality for DNS

The researchers determined that 35% of open resolvers are open to the attack, as well as four of six home routers made by well-known brands.

They also found that 12 of 14 popular public resolvers (now 11—Cloudflare says they’ve corrected their systems) are susceptible. Even a patched DNS server could be made vulnerable by an unpatched or misconfigured NAT gateway.

Their 19-page paper on the exploit includes lists of devices and services tested. They have since set up a SAD DNS website featuring a Q&A and a tool that anyone can use to determine whether their DNS is vulnerable.

The flaw is being tracked as CVE-2020-25705, and affects Linux 3.18 – 5.10, Windows Server 2019 version 1809 and newer, macOS 10.15 and newer, and FreeBSD 12.1.0 and newer. The researchers did not test earlier versions of the listed operating system.

07.01.2021 - 18:32 [ theGrayzone.com ]

UK judge justifies CIA spying on Assange citing debunked CNN report based on… CIA spying

In one of the most brazenly political sections in her December 4 legal judgment, Westminster district judge Vanessa Baraitser cited a suspect report by CNN that accused Assange of conspiring with Russians to turn Ecuador’s embassy in London, where he was trapped in refuge for roughly seven years, “into a command post for election meddling.”

Baraitser twice pointed to this dubious CNN article in order to justify a 24/7 CIA spying operation that targeted not only Assange, but Ecuador’s embassy and its sovereign operations and internal affairs as well.

What the British judge failed to mention is that the CNN story she relied on was itself based entirely on untrustworthy intelligence reports drafted by a Spanish security firm called UC Global, which secretly worked with the CIA to spy on the WikiLeaks publisher and Ecuadorian embassy staff.

06.01.2021 - 08:09 [ El Pais ]

New leads suggest CIA spied on Assange to secure his extradition to the US

The Spanish High Court’s investigation is currently stalled. Six months after Judge De la Mata requested judicial cooperation from US authorities, asking them for identifying information about the IPs that accessed UC Global’s servers, the US justice system has yet to respond. US prosecutors demanded to know the judge’s sources, and De la Mata sent additional information, but no reply has been forthcoming.

Meanwhile, the United Kingdom has also failed to comply with De la Mata’s request to take statements from the lawyers who were spied on while working with Assange.

03.01.2021 - 18:07 [ ChildrensHealthDefense.org ]

Did Top Medical Journal Help Cover Up Origins of SARS-CoV-2?

(11.09.2020)

– According to Alina Chan, a molecular biologist at the Broad Institute of Harvard and MIT, SARS-CoV-2 did not evolve in a manner you’d expect, had it jumped from an animal to a human. It sprang into action fully evolved for human transmission
– It appears Nature, a top medical journal, has allowed authors to secretly alter data sets in their papers without publishing notices of correction
– Chan’s investigation reveals authors have renamed samples, failed to attribute them properly, and produced a genomic profile that doesn’t match the samples in their paper. Others are missing data
– RaTG13 — the coronavirus that most resembles SARS-CoV-2, being 96% identical — is actually btCoV-4991, a virus found in samples collected in 2013 and published in 2016
– If SARS-CoV-2, the virus responsible for COVID-19 and the subsequent response to it, came from a lab, then we need to reassess the future of gain-of-function research that allows for the weaponization of viruses

03.01.2021 - 17:53 [ Alina Chan / Twitter / threadreaderapp.com ]

Get ready. This is going to be an important thread. Election season will be over soon and hopefully more people will devote some attention to this… I’m going to walk through a timeline of SARS2-related virus data published in the months after the outbreak. (1/30)

(25 Oct 20)

Since the outbreak in late 2019, events have been unfolding at such a fast pace that it is difficult to keep track of what happened and in what order.

I use visualizations of the timeline to follow key events relating to the search for the animal host of SARS2. (2/30)

Even today, I still hear people saying that SARS-CoV-2 came from pangolins and a Seafood market in Wuhan. I hope this analysis will help to clear things up. It will refresh us on significant early pandemic events and major publications discussing the origins of the virus (3/30).

03.01.2021 - 17:36 [ Annette Gartland / changingtimes.media ]

SARS-CoV-2: lab-origin hypothesis gains traction

(October 12, 2020)

– Researchers say there’s evidence within the SARS-CoV-2 spike protein that suggests the virus is a product of genetic manipulation.
– Exiled Chinese scientist Li-Meng Yan says SARS-CoV-2 is an “unrestricted bioweapon” and there’s been “large-scale, organised scientific fraud”.
– Six miners in Yunnan, who were removing bat faeces from a cave, suffered a severe pneumonia-like illness in 2012 and three of them died. They had a high fever, dry cough, sore limbs, and headaches – all symptoms associated with Covid-19.
– A database containing information about the sequencing of samples collected from the Yunnan mine by researchers from the Wuhan Institute of Virology has been taken offline.
– There are said to be sequences of HIV-1 in the SARS-CoV-2 genome.
American and Chinese scientists have collaborated for decades on gain-of-function research.
– There have been numerous ‘leaks’ of viruses from laboratories, including during the SARS outbreak in 2003–2004.

28.12.2020 - 11:47 [ Cyberscoop.com ]

ACLU sues FBI for information about its encryption-cracking skills

The FBI must be more transparent about its ability to break into people’s mobile devices, the American Civil Liberties Union says, and the group is suing for information about what the feds have in their toolkit.

The ACLU says the bureau should come clean about what its Electronic Device Analysis Unit (EDAU) is using “to unlock and decrypt information that is otherwise securely stored on cell phones.”

28.12.2020 - 11:45 [ theIntercept.com ]

Powerful Mobile Phone Surveillance Tool Operates in Obscurity Across the Country

(22.12.2020)

Until now, the Bartonville, Texas, company Hawk Analytics and its product CellHawk have largely escaped public scrutiny. CellHawk has been in wide use by law enforcement, helping police departments, the FBI, and private investigators around the United States convert information collected by cellular providers into maps of people’s locations, movements, and relationships. Police records obtained by The Intercept reveal a troublingly powerful surveillance tool operated in obscurity, with scant oversight.

19.12.2020 - 21:22 [ CNBC ]

Trump contradicts Pompeo, plays down alleged Russian role in cyberattack

Trump’s comments in the form of Twitter posts on Saturday went against comments his secretary of state made less than 24 hours earlier.
SolarWinds, the company at the center of the attack, has not yet blamed any one country.

19.12.2020 - 12:27 [ federalnewsnetwork.com ]

SolarWinds breach raises stakes for NDAA Trump still threatens to veto

Sen. Angus King (I-Maine) said the breach makes a clear case for the work of the Cyberspace Solarium Commission and the cyber provisions that made it into the annual defense policy bill passed by the House and Senate.

“This is the most important bill on cyber ever passed by Congress, and that’s why I’m really hoping that the president will either sign the bill or let it become law without a signature, because there is so much critically important material in the bill,” King said during an annual summit hosted by Defense One.

19.12.2020 - 12:24 [ Cyberspace Solarium Commission ]

Cyberspace Solarium Commission

The Cyberspace Solarium Commission (CSC) was established in the John S. McCain National Defense Authorization Act for Fiscal Year 2019 to „develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.“ The finished report was presented to the public on March 11, 2020.

Our Report

The Cyberspace Solarium Commission’s proposes a strategy of layered cyber deterrence. Our report consists of over 80 recommendations to implement the strategy. These recommendations are organized into 6 pillars:

– Reform the U.S. Government’s Structure and Organization for Cyberspace.

– Strengthen Norms and Non-Military Tools.

– Promote National Resilience.

Reshape the Cyber Ecosystem.

Operationalize Cybersecurity Collaboration with the Private Sector.

– Preserve and Employ the Military Instrument of National Power.

19.12.2020 - 10:35 [ CNN ]

Congressional backers cite cybersecurity provisions as they push Trump to sign defense bill

The massive defense bill that President Donald Trump is threatening to veto contains provisions for increased cybersecurity, which has taken on significantly more importance in the wake of a massive cyberattack on federal agencies at the hands of suspected Russian hackers.

The National Defense Authorization Act includes pay raises for America’s soldiers, modernizations for equipment and provisions to require more scrutiny before troops are withdrawn from Germany or Afghanistan.

19.12.2020 - 09:24 [ Fox News ]

After government hack, media mum on ex-cybersecurity chief highlighted for contradicting Trump’s fraud claims

„As I said in a news briefing, Election Day was ‘just another Tuesday on the Internet,’“ he wrote. „Normal sorts of scanning and probing were happening, but we did not see any successful attacks or damaging disruptions.“

Yet hackers were arms deep in a slew of federal agencies. The infiltration, believed to have been conducted by the Russians, appears to have compromised the Departments of Energy, State, Defense, Homeland Security, Treasury and Commerce. His name did not appear in CNN’s story about CISA and the hack published Thursday.

18.12.2020 - 21:38 [ geekwire.com ]

Microsoft unleashes ‘Death Star’ on SolarWinds hackers in extraordinary response to breach

In the end, this all reminds us how much power Microsoft has at its disposal. Between its control of the Windows operating system, its robust legal team, and its position in the industry, it has the power to change the world nearly overnight if it wants to. And when it chooses to train that power on an adversary, it really is the equivalent of the Death Star: able to completely destroy a planet in a single blast.

18.12.2020 - 21:36 [ domainnamewire.com ]

Domain name sinkholes and those funky domain registrations

(September 2018)

A sinkhole redirects or blocks traffic meant for a destination. They are used by the security community to stop botnet traffic, phishing and other bad activity.

There are many ways to create a sinkhole. An ISP can simply divert traffic from the IP address nameserver you see in Whois to another. A company (or the government) can also go through the courts to get control of a domain name and then change its nameservers.

18.12.2020 - 21:28 [ ZDNet.com ]

Microsoft and industry partners seize key domain used in SolarWinds hack

(15.12.2020)

According to analysis from security firm FireEye, the C&C domain would reply with a DNS response that contained a CNAME field with information on another domain from where the SUNBURST malware would obtain further instructions and additional payloads to execute on an infected company’s network.

18.12.2020 - 19:33 [ bleepingcomputer.com ]

FBI, CISA officially confirm US govt hacks after SolarWinds breach

(17.12.2020)

The compromise of multiple US federal networks following the SolarWinds breach was officially confirmed for the first time in a joint statement released earlier today by the FBI, DHS-CISA, and the Office of the Director of National Intelligence (ODNI).

„Over the course of the past several days, the FBI, CISA, and ODNI have become aware of a significant and ongoing cybersecurity campaign,“ the US intelligence agencies said …

18.12.2020 - 19:18 [ Forbes ]

DHS, DOJ And DOD Are All Customers Of SolarWinds Orion, The Source Of The Huge US Government Hack

Though it’s not clear whether it uses the Orion tool, the DHS’s own Cybersecurity and Infrastructure Security Agency (CISA) is a SolarWinds customer too, buying $45,000-worth of licenses in 2019. The U.S. Cyber Command also spent over $12,000 on SolarWinds tools in the same year.

SolarWinds, a publicly-listed Austin, Texas-based company with a value of over $6 billion, has its own customer list, though it doesn’t break down which products clients use. That list includes more than 425 of the Fortune 500, all major US telecoms providers, the top five U.S. accounting firms, hundreds of global universities, the NSA and the White House.

18.12.2020 - 19:09 [ SolarWinds.com ]

FAQ: Security Advisory

(18.12.2020)

In this case, it appears that the code was intended to be used in a targeted way as its exploitation requires manual intervention. We’ve been advised that the nature of this attack indicates that it may have been conducted by an outside nation state, but SolarWinds has not verified the identity of the attacker.

18.12.2020 - 18:43 [ theHill.com ]

Lawmakers ask whether massive hack amounted to act of war

Hackers believed to be part of a nation state have had access to federal networks since March after exploiting a vulnerability in updates to IT group SolarWinds’s Orion software. The hack has compromised the Treasury, State and Homeland Security departments and branches of the Pentagon, though it is expected to get worse. SolarWinds counts many more federal agencies as customers, along with the majority of U.S. Fortune 500 companies.

18.12.2020 - 11:06 [ theGuardian.com ]

Israeli spy firm suspected of accessing global telecoms via Channel Islands

Invoices seen by the Guardian and the Bureau of Investigative Journalism suggest Rayzone, a corporate spy agency that provides its government clients with “geolocation tools”, used an intermediary in 2018 to lease an access point into the telecoms network via Sure Guernsey, a mobile operator in the Channel Islands.

Such access points, known in the telecoms industry as “global titles”, provide a route into a decades-old global messaging system known as SS7, which allows mobile operators to connect users around the world. It is not uncommon for mobile companies to lease out such access.

18.12.2020 - 10:58 [ Bureau of Investigative Journalism ]

Spy companies using Channel Islands to track phones around the world

The investigation has found that private intelligence companies are able to rent access from mobile phone operators and this can then be exploited to allow the tracking of the physical location of users across the world. They are also potentially able to intercept calls and other private data, including bank accounts and emails.

These intrusions, which are very widely exploited, rely on commands designed to help phone operators track their customers’ whereabouts. Such commands, known as “signals”, are sent via a kind of global switchboard for the telecoms industry called SS7.

14.12.2020 - 09:38 [ Mairav Zonszein מרב זונשיין / Twitter ]

“This system allows tracking of every citizen or resident of Israel. It can also follow intentions or motivations, and not just specific people. It can track everyone who visited the website of anti-Netanyahu protest movement and block the website.“

14.12.2020 - 06:40 [ avi scharf / Twitter ]

Police spying on Israelis online via secret backdoor. Israeli police have for years required internet providers to allow them to track users or websites through a special system

14.12.2020 - 06:09 [ Omer Benjakob / Twitter ]

This is CRAZY Israel’s police have a secret backdoor that allows them to follow any Israeli online or track anyone who visits a certain website: “We say China’s a technological dystopia, but here we live in one too and just don’t know it“

13.12.2020 - 19:46 [ Haaretz ]

Police Spying on Israelis Online via Secret Backdoor

“This system allows authorities to follow everything someone does online, and even permits them to manipulate the website these users visit,” said ethical hacker Noam Rotem, from the CyberCyber podcast. “This system allows tracking of each and every citizen or resident of Israel. But it’s not just that; the system is built in such a way that it can also follow intentions or motivations, and not just specific people. For example, it can track everyone who visited the website of the protest movement against Prime Minister Benjamin Netanyahu, and can even block the real website and change what people are seeing,” Rotem said.

12.12.2020 - 20:01 [ NBC News ]

Scientist behind Oxford vaccine urges FDA not to delay data review

Professor Adrian Hill, part of the team behind the Oxford-AstraZeneca Covid-19 vaccine, says he hopes the FDA will review the available data in January, because waiting for the trial’s end next year would be “too late.”

07.12.2020 - 20:19 [ Haaretz ]

The Cartel Project | Leading Mexican Journalist Targeted by Israeli NSO’s Spyware, Global Investigation Reveals

Israeli technologies in particular have a good reputation with Mexican officials. „In Mexico, it’s typical for the security and intelligence community to think that Israel has the most advanced technologies and the best techniques for civilian and military training,“ said Paloma Mendoza Cortés, analyst and consultant on national security issues.

07.12.2020 - 04:00 [ theGrayzone.com ]

How Israel deployed an intelligence deception to justify killing scientist Mohsen Fakhrizadeh

The CIA never revealed who spirited the documents out of Iran or how. However, former senior German Foreign Office official Karsten Voigt explained to this reporter in 2013 that the German intelligence agency, the BND, had been furnished with the collection by an occasional source whom the intel chiefs considered less than credible.

And who was this source? According to Voigt, he belonged to the Mujahedeen e-Khalq (MEK), the exile Iranian cult which had fought for Saddam’s Iraqi forces against Iran during the eight-year war and by the early 1990s was passing information and propaganda that Mossad did not want to have attributed to itself.

05.12.2020 - 15:15 [ Telegraph.co.uk ]

Of all the reporters Moscow’s spies could have chosen, why did they pretend to be me?

Somebody had decided to impersonate me. It would be two and a half years before I would learn that my identity had been stolen for a very sinister purpose, most likely by a Russian military intelligence officer and cyber criminal called Anatoliy Sergeyevich Kovalev (but we’ll get to him later).

05.12.2020 - 15:10 [ theGuardian.com ]

Chinese official’s ‚repugnant‘ tweet of Australia soldier likely amplified by fake accounts, experts say

Cyabra, an Israeli cybersecurity firm, said it was highly probable that an orchestrated campaign had promoted Zhao’s tweet.

Cyabra said it had found 57.5% of accounts that engaged with Zhao’s tweet were fake, and “evidence of a largely orchestrated disinformation campaign” to amplify its message. The firm did not give any details about who was behind the campaign.

Cyabra said it analysed 1,344 profiles and found a large number were created in November and used once, to retweet Zhao’s tweet.

04.12.2020 - 21:50 [ CNN ]

Vaccination cards will be issued to everyone getting Covid-19 vaccine, health officials say

(02.12.2020)

„Everyone will be issued a written card that they can put in their wallet that will tell them what they had and when their next dose is due,“ Moore said. „Let’s do the simple, easy thing first. Everyone’s going to get that.“

04.12.2020 - 21:47 [ Zero Hedge ]

‚Immunity Cards‘ To Be Issued To All Americans; Enable CDC To Track COVID-19 Vaxx Status In Database

On Wednesday the Department of Defense released the first images of a COVID-19 vaccination record card as well as vaccination kits, according to CNN.

„Everyone will be issued a written card that they can put in their wallet that will tell them what they had and when their next dose is due,“ says Dr. Kelly Moore, associate director of the Immunization Action Coalition.

03.12.2020 - 19:32 [ DailyMail.co.uk ]

Revealed: Up to a QUARTER of official Covid-19 ‚admissions‘ may be patients who caught the virus IN HOSPITAL, data shows

– Government data shows there were 1,230 coronavirus patients needing NHS treatment every day in England
– But only 938 of these were from ‚the community‘, meaning they definitely caught the virus in day-to-day life

30.11.2020 - 10:11 [ PrivacyIsNotACrime / Twitter ]

According to leaked documents from the @ORF , secret services from the so called „five eyes“ are initiators of the EU Resolution in the #encryptionban. For them this would be a very easy way to monitor all our messages and data, without the possibility to hide them.

27.11.2020 - 17:47 [ Internet Corporation for Assigned Names and Numbers (ICANN) ]

DNSSEC – What Is It and Why Is It Important?

DNS data for a domain is called a zone. Some organizations operate their own name servers to publish their zones, but usually organizations outsource this function to third parties. There are different types of organizations that host DNS zones on behalf of others, including registrars, registries, web hosting companies, network server providers, just to name a few.

DNS by itself is not secure

DNS was designed in the 1980s when the Internet was much smaller, and security was not a primary consideration in its design. As a result, when a recursive resolver sends a query to an authoritative name server, the resolver has no way to verify the authenticity of the response.

27.11.2020 - 16:36 [ ZDNetcom ]

DNS-over-HTTPS causes more problems than it solves, experts say

(06.09.2020)

The response to DoH’s anointment as a major privacy-preserving solution has been downright acid, in some cases. Critics have taken a jab at the protocol on different plains, which we’ll try to organize and categorize below:

– DoH doesn’t actually prevent ISPs user tracking
– DoH creates havoc in the enterprise sector
– DoH weakens cyber-security
– DoH helps criminals
– DoH shouldn’t be recommended to dissidents
– DoH centralizes DNS traffic at a few DoH resolvers

27.11.2020 - 16:35 [ ZDNet.com ]

Mozilla enables DOH by default for all Firefox users in the US

(25.02.2020)

Circa 2015, engineers at Cloudflare and Mozilla joined forces to create DNS-over-HTTPS, as a way to hide DNS queries using encryption.

27.11.2020 - 16:28 [ securitymagazine.com ]

Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

(06.02.2020)

Obviously, time will tell if DoT continues to prevail or whether DoH will start to gain ground. As mentioned at the beginning of the article there is a hot debate going on right now about the direction the Internet industry should take. Suffice to say that even nation state authorities are involved in the debate, which speaks to the level and importance of the discussion.

27.11.2020 - 14:49 [ DNSprivacy.org ]

DoT servers

Oct 2020: The list below has been updated to retain only those servers that appear to still be actively maintained

27.11.2020 - 14:38 [ public-dns.info ]

Public DNS Servers by country

Download valid nameservers as CSV | Plaintext

27.11.2020 - 14:25 [ dnsleaktest.com ]

DNS leak test

Hello (…)

from (…)

27.11.2020 - 13:59 [ addons.mozilla.org ]

Disable WebRTC

WebRTC leaks your actual IP addresses from behind your VPN, by default.

27.11.2020 - 13:58 [ Browserleaks.com ]

WebRTC Leak Test

To disable RTCPeerConnection and protect IP addresses leakage, go to about:config and toggle media.peerconnection.enabled to false.

To disable Media Devices, toggle media.navigator.enabled as well as media.peerconnection.enabled both to false.

27.11.2020 - 13:55 [ SpyOff.com ]

Turn off WebRtc and surf anonymously

(20.12.2017)

This little practical test proves that a simple script on a web page is sufficient to find out the actual IP address of a user.

27.11.2020 - 13:48 [ addons.mozilla.org ]

uBlock Origin

Finally, an efficient wide-spectrum content blocker. Easy on CPU and memory.

27.11.2020 - 13:37 [ HowToGeek.com ]

How to See (and Disable) the Telemetry Data Firefox Collects About You

Type about:config into the address bar and then hit the Enter key. The page loads with a warning about the impacts of changing these preferences and the effect it can have on Firefox. Click the “Accept the risk and continue” button.

In the search bar, type each of the following preferences and then set them to the value provided to the right:

devtools.onboarding.telemetry.logged = false
toolkit.telemetry.updatePing.enabled = false
browser.newtabpage.activity-stream.feeds.telemetry = false
browser.newtabpage.activity-stream.telemetry = false
browser.ping-centre.telemetry = false
toolkit.telemetry.bhrPing.enabled = false
toolkit.telemetry.enabled = false
toolkit.telemetry.firstShutdownPing.enabled = false
toolkit.telemetry.hybridContent.enabled = false
toolkit.telemetry.newProfilePing.enabled = false
toolkit.telemetry.reportingpolicy.firstRun = false
toolkit.telemetry.shutdownPingSender.enabled = false
toolkit.telemetry.unified = false
toolkit.telemetry.updatePing.enabled = false
toolkit.telemetry.reportingpolicy.firstRun = false
toolkit.telemetry.unified = false
toolkit.telemetry.archive.enabled = false
devtools.onboarding.telemetry.logged = false
toolkit.telemetry.bhrPing.enabled = false
datareporting.healthreport.uploadEnabled = false
datareporting.policy.dataSubmissionEnabled = false
datareporting.sessions.current.clean = true
datareporting.healthreport.uploadEnabled = false
datareporting.policy.dataSubmissionEnabled = false
datareporting.sessions.current.clean = true

17.11.2020 - 20:34 [ International Network of Civil Liberties Organizations ]

INCLO CALLS ON STATES TO DEFEND END-TO-END ENCRYPTION

Fourteen members of INCLO express grave concerns regarding recent moves by various groups to breakencryption. We note with alarm calls from the ​Council of the European Union​, the ​EuropeanCommission​, and the ​Department of Justice in the US​, with support from Australia, Canada, New Zealand, India, Japan and the UK, to allow police authorities intercept encrypted communications.

17.11.2020 - 20:29 [ europa.eu ]

Joint statement by the EU home affairs ministers on the recent terrorist attacks in Europe

(13.11.2020)

We will also examine with interest the Commission’s announced proposal to designate hate speech and hate crime and incitement as criminal offences that are provided for and regulated under European Union law.

In the same vein, the Council must consider the matter of data encryption so that digital evidence can be lawfully collected and used by the competent authorities while maintaining the trustworthiness of the products and services based on encryption technology.

16.11.2020 - 11:14 [ NLTimes.nl ]

U.S spied on allies, including Netherlands, through Denmark

According to the Danish broadcaster, the NSA and Danish military service FE signed an agreement in 2008, which stated that the Americans would help Denmark tap internet cables in the European country. In return, the NSA gained access to internet cables to Eastern Europe. Together they processed the data in a data center near Copenhagen Airport, which was built for that purpose.

But the United States also used that internet access to spy on Denmark itself, and surrounding countries including the Netherlands, Germany and Sweden, the whistleblower, a former employee of the FE, said to DR.

16.11.2020 - 11:11 [ privateinternetaccess.com ]

The head of Denmark’s spy program has been fired for snooping on citizens and lying about it

(26.08.2020)

The government in Denmark has fired 3 top officials from the country’s foreign intelligence agency, the Forsvarets Efterretningstjeneste (FE), following revelations from a whistleblower. The officials, including the head of the agency, Lars Finden, have been “relieved of duty for the time being” following the release of a trove of documents. The documents detailed that the FE has been illegally spying on Danish citizens in the last six years and were released by an unnamed whistleblower to the independent regulator of Danish security services which is known as Tilsynet med Efterretningstjenesterne (TET).

14.11.2020 - 13:47 [ Latika M Bourke / Twitter ]

„Mr Johnson showed the aides text messages that had been forwarded to Ms Symonds, who opposed Mr Cain’s appointment as chief of staff, to show they had briefed against her. He told them to get out and never return.“

14.11.2020 - 13:37 [ DailyMail.co.uk ]

How ‚Princess Nut Nuts‘ gave coup de grace to Cummings: PM’s adviser is booted out of No 10 for good ‚following showdown with Boris where PM confronted him with less than flattering texts that fell into hands of fiancée Carrie Symonds‘

Dominic Cummings arrived home with bottles of alcohol last night after he was kicked out of Number 10 for good – following a dramatic was confrontation with Boris Johnson who showed him texts allegedly proving he briefed against his fiancee, Carrie Symonds.

In a tense 45-minute meeting, the Prime Minister is said to have ordered his most senior adviser to leave having shown incriminating text messages which had been forwarded to his partner. The explosive claims were denied by No10.

13.11.2020 - 20:43 [ Ron / Twitter ]

Having election voting data as an open standard makes it easy to develop programs that can input election data and output election data. With knowledge of these data types, you could theoretically make black box programs that could modify election data.

Something to look for is whether the Image Cast Central (ICC) system stores this JSON data as plaintext or in an encrypted form.
If this json is stored as plain text, then modifying election data before it is turned into the custody of the county is trivial.

13.11.2020 - 20:36 [ National Institute of Standards and Technology (NIST) ]

NIST Special Publication 1500-100: Election Results Common Data Format Specification

(December 2019)

1.1 Why this specification is needed The purpose of this specification is to provide a comprehensive, flexible, and interoperable pre-election setup and post-election results reporting XML and JSON format for manufacturers to integrate into their voting equipment and for election offices, the media, and other groups to use in their own software. Some advantages of using this specification are that:

• election results can be reported directly from election offices in this format regardless of voting system manufacturer, thus enabling interoperability;

• the need for custom software and custom reporting formats is greatly reduced;

• jurisdictions that use multiple versions of EMSs and tabulators can more easily combine and transfer information between systems

13.11.2020 - 20:33 [ Ron / Twitter ]

It seems election votes are tallied then stored as a DOUBLE in JSON. „can include a factional [sic] component in special cases“

If it is proven that Dominion uses this standard in their machines, then that is proof that votes are stored ultimately as double length floating point numbers.

13.11.2020 - 15:44 [ arstechnica.com ]

Crooks have acquired proprietary Diebold software to “jackpot” ATMs

(20.07.2020)

In previous jackpotting attacks, the attached devices, known in the industry as black boxes, usually invoked programming interfaces contained in the ATM operating system to funnel commands that ultimately reached the hardware component that dispenses cash. More recently, Diebold Nixdorf has observed a spate of black box attacks that incorporated parts of the company’s proprietary software.

13.11.2020 - 12:14 [ justthenews.com ]

Michigan county flips back to Trump, following repair of voting software glitch

(November 6, 2020)

Addressing the alleged software glitch, Michigan GOP Chairwoman Laura Cox said Friday during a press conference that „47 counties [in Michigan] use this same software in the same capacity.“

13.11.2020 - 12:12 [ apnews.com ]

Officials: Clerk error behind county results favoring Biden

The Department of State said Antrim and many other counties in Michigan use the Dominion Voting Systems election management system and ballot tabulators. The tabulators are programmed to scan hand-marked paper ballots.

13.11.2020 - 11:40 [ Politico.com ]

Cause of Election Day glitch in Georgia counties still unexplained

(11/04/2020 01:55 PM EST
Updated: 11/12/2020 10:28 PM EST)

The supervisor, Marcia Ridley of the Spalding County Board of Elections, had initially attributed the problem to a vendor’s 11th-hour update to the equipment. But log files for the devices — electronic poll books that poll workers use to sign in voters at precincts — show that no such update occurred to the devices the night before Election Day, Ridley said in a statement to POLITICO on Thursday. However, she said she stands by her previous statements last week that a representative for the election technology vendor, Dominion Voting Systems, told her office that it had uploaded some kind of update the night before the election and that this had created the glitch.

10.11.2020 - 18:15 [ University of Oxford ]

Science reveals secrets behind the success of Game of Thrones

In other words, Martin keeps his characters’ networks within the limits that his readers’ human minds were designed by evolution to cope with.

09.11.2020 - 09:50 [ .euractiv.com ]

‘Five Eyes’ alliance demands ways to access encrypted apps

(12.10.2020)

The top justice officials of the United States, Britain, Australia, Canada and New Zealand said in a statement that the growth of end-to-end encrypted apps that make official oversight impossible – like Signal, Telegram, FaceBook Messenger and WhatsApp – “pose significant challenges to public safety.”

“There is increasing consensus across governments and international institutions that action must be taken,” they said.

09.11.2020 - 09:39 [ Geheimdienste-Allianz Five Eyes / US Justizministerium ]

International Statement: End-To-End Encryption and Public Safety

(11.10.2020)

We urge industry to address our serious concerns where encryption is applied in a way that wholly precludes any legal access to content. We call on technology companies to work with governments to take the following steps, focused on reasonable, technically feasible solutions:

– Embed the safety of the public in system designs, thereby enabling companies to act against illegal content and activity effectively with no reduction to safety, and facilitating the investigation and prosecution of offences and safeguarding the vulnerable;
– Enable law enforcement access to content in a readable and usable format where an authorisation is lawfully issued, is necessary and proportionate, and is subject to strong safeguards and oversight; and
– Engage in consultation with governments and other stakeholders to facilitate legal access in a way that is substantive and genuinely influences design decisions.

09.11.2020 - 09:30 [ Electronic Frontier Foundation ]

Orders from the Top: The EU’s Timetable for Dismantling End-to-End Encryption

(06.10.2020)

The last few months have seen a steady stream of proposals, encouraged by the advocacy of the FBI and Department of Justice, to provide “lawful access” to end-to-end encrypted services in the United States. Now lobbying has moved from the U.S., where Congress has been largely paralyzed by the nation’s polarization problems, to the European Union—where advocates for anti-encryption laws hope to have a smoother ride. A series of leaked documents from the EU’s highest institutions show a blueprint for how they intend to make that happen, with the apparent intention of presenting anti-encryption law to the European Parliament within the next year.

09.11.2020 - 09:22 [ tech.newstatesman.com ]

The EU is set to declare war on encryption

(20.09.2020)

The EU is set to declare war on encryption with plans to allow law enforcement officials “targeted lawful access” to protected communications, according to a European Commission internal note seen by the Financial Times.

The note outlines the commission’s aim to “stimulate a discussion” among EU member states “on the issues posed by end-to-end encryption” for the purpose of tackling child abuse and other organised crime networks.

09.11.2020 - 09:16 [ Telegraph.co.uk ]

Five governments line up legal challenge to Facebook’s ‚dangerous‘ encryption of messages between terrorists, paedophiles and criminals

(15.05.2020)

The “Five Eyes” intelligence network of nations is preparing a legal challenge to Facebook’s plan for end-to-end encryption amid fears the platform will become a haven for terrorists and paedophiles.

Ministers from the UK, US, Canada, Australia and New Zealand are due to meet next week to consider legal measures to hold Facebook and other social media platforms liable for messages that could lead to serious criminality.

06.11.2020 - 18:15 [ DailyMail.co.uk ]

Downing Street REJECTS calls to end lockdown despite four more sets of real-world data showing second wave of Covid was dropping and R rate was stable BEFORE crippling restrictions based on flawed projections

Downing Street today refused calls for England’s second lockdown to be cut short and insisted it will run until December 2, despite four more sets of real-world data that show the second wave was already shrinking before the Government pushed the panic button on a drastic month-long shutdown.

Promising figures published today by the Office for National Statistics (ONS) – which runs a massive government surveillance scheme that randomly swabs tens of thousands of people to track the size of the outbreak – suggest that the country’s coronavirus outbreak has shrunk.

06.11.2020 - 13:35 [ Telegraph.co.uk ]

Exclusive: ‚Covid graphs were wrong in suggesting daily deaths would soon surpass first wave‘

Official projections which pushed the country into a second lockdown have been quietly revised to no longer suggest deaths could soon overtake those at the peak of the first wave, The Telegraph has learned.

17.10.2020 - 13:10 [ Alex Scherer / Twitter ]

What if the laptop was stolen from Hunter Biden (not a claim I have heard though). What would that mean from a legal perspective?

17.10.2020 - 13:01 [ Judd Legum / Twitter ]

6. Then things get very weird. The shop owner says, before turning over the computer to the feds, they made a copy of the contents of the computer and gave them to Rudy Giuliani’s lawyer

Mmmmhmmmm

17.10.2020 - 12:58 [ Fox News ]

Hunter Biden email story: Computer repair store owner describes handing over laptop to FBI

The man, John Paul Mac Isaac, said he ‚can’t be 100% sure‘ it was Hunter Biden who dropped off the computer for repair.

16.10.2020 - 21:01 [ Haaretz ]

Netanyahu’s Henchmen Prove Once Again They’re Soldiers in a Criminal Organization

It’s just like in the Mafia: The boss is surrounded by soldiers. By made men.

They’re the ones he sends into the streets to kneecap his enemies. They don’t ask questions. They carry out orders. Sorry, instructions. An explicit utterance isn’t always needed. A look or nod can suffice. They understand.

16.10.2020 - 21:00 [ Haaretz ]

Netanyahu’s Whip Threatens AG: Drop Bibi Indictments, or More Tapes Will Come Out

(14.10.2020)

Saying that there are incriminating tapes from a previous court case against Avichai Mendelblit that will be released, Miki Zohar demanded the attorney general drop Netanyahu’s charges and resign

15.10.2020 - 04:10 [ Jimmy Dore / Twitter ]

Facebook & Twitter are extensions of the Surveillance State & the Intelligence Community. This is straight up 100% censorship and as always , will come back to be used against the left, i mean, it already is being used against the left, you all just don’t notice or care.

15.10.2020 - 03:38 [ NPR.org ]

Facebook And Twitter Limit Sharing New York Post Story About Joe Biden

The New York Post published a series of stories on Wednesday citing emails, purportedly sent by Biden’s son Hunter, that the news outlet says it got from Trump’s private lawyer, Rudy Giuliani, and former Trump adviser Steve Bannon.

14.10.2020 - 12:37 [ ukcolumn.org ]

Covid-19: The Data Exposing the Deception

Without a functioning mainstream media, and with government scientific advisors seemingly bought and paid for by pharmaceutical corporations, it has been left to independent journalists and researchers to question the Covid-19 narrative that we are all supposed to accept without hesitation. Few have worked harder than Mark Oakford.

Mark has sent 1,392 freedom of information requests to local authorities, Clinical Commissioning Groups, NHS trusts, Police Forces, Education Authorities, Ministerial departments and more.

While a few requests remain unanswered, he has gathered data on more than 1.6 million public sector workers across the UK…

(…)

We are told that lockdowns are essential to avert a so-called second wave. Yet Mark found, for public sector workers who regularly interact with the public in the community, such as police officers, fire officers, park attendants and so forth, mortality was zero.

Our entire way of life is being irrevocably changed because of the claims made about Covid-19. We should insists that those claims be rigorously scrutinised.

13.10.2020 - 15:19 [ BournemouthEcho.co.uk ]

LIVE: updates after new three-tier Covid system is announced

– A new three-tier strategy of local lockdown measures for England has been announced by Boris Johnson in efforts to curb rising Covid-19 rates
– Different areas of England will be split up into medium, high and very high alert levels
– These areas will be subject to the same national measures which currently apply across the country including a 10pm curfew for pubs and restaurants and the ‚rule of six‘

13.10.2020 - 15:16 [ theGuardian.com ]

Three-tier Covid plan for England: what it means and how it may work

Any details of the plan are based solely on leaks to the media over the last week, including a document dated 30 September that was seen by the Guardian.

The draft traffic-light-style plan is designed to simplify the current patchwork of localised restrictions, which apply to about a quarter of the UK.

24.09.2020 - 11:30 [ Vice.com ]

Cellebrite Sold Phone Hacking Tech to Repressive Regimes, Data Suggests

A Motherboard investigation found that US state police agencies had collectively spent millions of dollars on Cellebrite products. US federal agencies, such as the FBI and Secret Service, are also Cellebrite customers.

24.09.2020 - 11:21 [ Haaretz.com ]

Putin Investigators Targeting LGBTQs, Navalny, Use Israeli Phone-hacking Tech

Carmil resents a comparison with the NSO Group. “I know the people at NSO and appreciate their know-how, but Cellebrite works in the legitimate world of the police force, whose abilities are closely controlled, unlike the world of NSO customers and others who engage in illegal and concealed activity. Cellebrite is totally on the good side, where court orders are used. We do not make tools for breaking into private entities or espionage organizations.”

23.09.2020 - 04:38 [ International Telecommunication Union ]

The ITU 2020 Global CyberDrill, September-November 2020

The main objectives of this CyberDrill are as follows:

– Provide situational awareness to key public and private sector participants who lead their firms, organizations, or jurisdictions during a cyber disruption;- Bring the CERT/CIRT/CSIRT community together in a unified exercise to build global response and recovery capabilities;
– Test operational resiliency key concepts across CSIRT/CIRT/CERT community;
– Identify, exercise, and foster the improvement of processes, procedures, interactions and information sharing mechanisms that exist or should exist among CERTs/CSIRTs, SOCs, agencies, public bodies, and across regional organizations responsible for crisis management and regulatory bodies;
– Exercise coordination mechanisms, information sharing efforts, the development of shared situation awareness, and decision-making procedures of the cybersecurity community during cyber events; and,
– Raise awareness of other cyber exercise initiatives.​

23.09.2020 - 04:30 [ Nigerian Army Resource Centre / Twitter ]

Happening now at the Nigerian Army Resource Centre is CYBER drill by Organization Of Islamic Conference and Computer Emergency Response Team ( OIC CERT) . The Drill is aimed at intimating the ICT Department of the Center on the need to be Cyber security conscious.

23.09.2020 - 04:30 [ Oman News Center / Youtube ]

The Sultanate hosts the 8th Arab Regional & OIC-CERT Cyber Drill

The Sultanate hosts the 8th Arab Regional & OIC-CERT Cyber Drill
Report: Saleh bin Khalfan Al RahbiThe Sultanate hosts the 8th Arab Regional & OIC-CERT Cyber Drill
´

23.09.2020 - 04:16 [ mcit.gov.eg ]

Egypt Partakes in ITU 2020 Global CyberDrill- Arab Regional Dialogue

Egypt, represented by the Egyptian Computer Emergency Response Team (EG-CERT), is participating in the “CyberDrill 2020 – Arab Region Regional Dialogue: CIRTs and lessons learned from COVID-19 crisis,” organized by the International Telecommunication Union (ITU), online, on September 22.

The Global CyberDrill is a capacity building event which aims to enhance the communication and incident response capabilities of participating teams and promote collective efforts by national Computer Incident Response Teams (CIRTs) and Computer Security Incident Response Teams (CSIRTs).

16.09.2020 - 14:52 [ Electronic Frontier Foundation (EFF) ]

Things to Know Before Your Neighborhood Installs an Automated License Plate Reader

Local groups often turn to license plate readers thinking that they will protect their community from crime. But the truth is, these cameras—which record every license plate coming in and out of the neighborhood—may create more problems than they solve.

14.09.2020 - 17:04 [ Electronic Frontier Foundation ]

Technology Can’t Predict Crime, It Can Only Weaponize Proximity to Policing

There is a reason why the use of predictive policing continues to expand despite its dubious foundations: it makes money. Many companies have developed tools for data-driven policing; some of the biggest are PredPol, HunchLab, CivicScape, and Palantir. Academic institutions have also developed predictive policing technologies, such as Rutgers University’s RTM Diagnostics or Carnegie Mellon University’s CrimeScan, which is used in Pittsburgh. Some departments have built such tools with private companies and academic institutions. For example, in 2010, the Memphis Police Department built its own tool, in partnership with the University of Memphis Department of Criminology and Criminal Justice, using IBM SPSS predictive analytics.

24.08.2020 - 13:11 [ Phys.org ]

Dwarf planet Ceres is an ocean world: study

(10.08.2020)

Using infrared imaging, one team discovered the presence of the compound hydrohalite—a material common in sea ice but which until now had never been observed off of Earth.

23.08.2020 - 11:18 [ Bloomberg ]

Europe’s Virus Surge Is Looking Less Deadly Than Initial Wave

A number of countries have also changed how deaths are calculated in recent weeks. The U.K. toll fell by more than 5,000 earlier this month after the government said a fatality would only be classed as Covid-related if the person died within 28 days of a positive test.

23.08.2020 - 06:36 [ Electronic Frontier Foundation ]

No to Expanded HHS Surveillance of COVID-19 Patients

August 17, 2020 New data collection. The SORNs would allow collection of personal information about physical and psychological health history, drug and alcohol use, diet, employment, and more. Data collected would also include “geospatial records,” which countless research has shown is difficult to de-identify. Data would be collected not just about people who test positive, but also about their family members, as well as people who test negative, and perhaps people who have not tested at all. Data would be collected from countless different sources, including federal, state, and local governments, their contractors, the healthcare industry, and patients’ family members.

19.08.2020 - 09:20 [ GIZMODO ]

Secret Service Paid to Get Americans‘ Location Data Without a Warrant, Documents Show

Babel Street is a shadowy organization that offers a product called Locate X that is reportedly used to gather anonymized location data from a host of popular apps that users have unwittingly installed on their phones. When we say “unwittingly,” we mean that not everyone is aware that random innocuous apps are often bundling and anonymizing their data to be sold off to the highest bidder.

29.07.2020 - 11:49 [ CNN ]

Coronavirus new case counts are falling nationwide, but some states still seeing record numbers

According to data provided by Johns Hopkins University, cases are at least 10% higher in 22 states over the previous week.
Dr. Anthony Fauci on Tuesday warned several states including Tennessee, Ohio, Indiana and Kentucky to get a handle on rising coronavirus cases, saying the nation couldn’t afford the kinds of surges seen further south and west.

29.07.2020 - 11:48 [ theHill.com ]

Total US COVID-19 cases show signs of slowing

(27.07.2020)

U.S. coronavirus cases rose by about 55,000 on Sunday, a terribly high number but the lowest daily total since July 6, The Wall Street Journal reported.

29.07.2020 - 11:46 [ Newschannel10.com ]

Hospital coronavirus data to go to HHS before CDC, HHS confirms

(15.07.2020)

Hospital data on coronavirus patients will no longer be sent straight to the Centers for Disease Control and Prevention. Instead, it will go to the Department of Health and Human Services.

HHS, which is the parent agency of the CDC, confirmed the news Tuesday. It was first reported by the New York Times.

HHS says the CDC’s database is inadequate to store and process the necessary information.

16.07.2020 - 10:49 [ theHill.com ]

Twitter accounts of Obama, Biden, Musk and others compromised

The attack is likely the largest ever on Twitter’s security system and may have already cost users ten of thousands of dollars.

The accounts – which included other tech CEO’s including Amazon’s Jeff Bezos, celebrities such as Kanye West, and other political figures like former New York City Mayor Michael Bloomberg – posted similar messages offering to double bitcoin payments sent to an address during a set period of time.

14.07.2020 - 16:37 [ New York Times ]

U.K. Bans Huawei From 5G Network, Raising Tensions With China

Banning the use of the Chinese tech giant’s equipment in high-speed wireless infrastructure is a major reversal by Prime Minister Boris Johnson — and a big victory for the Trump administration.

02.07.2020 - 16:41 [ DailyMail..co.uk ]

Is there a secret Covid tracker on your phone? Android and iPhone users say new feature has suddenly appeared on their handsets – without anyone installing it

Proponents are hailing the arrival of the system as a step towards stamping out the virus and ending lockdown.

The function is automatically disabled in countries without contact-tracing apps, such as Britain and the US.

20.06.2020 - 17:47 [ ReclaimTheNet.org ]

Germany’s hate speech law gets stricter, raises privacy concerns

Despite already having some of the strictest laws in the world surrounding “hate speech,” Germany is looking to tighten the leash further where it comes to social media. The new provision, when passed, will require online platforms to directly report to the federal police when any criminal activity is reported by users on these platforms.

19.06.2020 - 10:09 [ DailyMail.co.uk ]

Facebook monitors the offline behaviour of users to determine if they should be categorised as a ‚Hate Agent‘ and banned

(14.06.2020)

The company also confirmed that their robust decision-making process involves checking their users‘ activity on other social media sites.

18.06.2020 - 18:00 [ BBC ]

UK virus-tracing app switches to Google-Apple model

The UK follows Germany, Italy and Denmark among others in switching from a so-called „centralised“ approach to a „decentralised“ one.

The government is expected to confirm the news shortly.

18.06.2020 - 13:59 [ New York Times ]

A Bitter Election. Accusations of Fraud. And Now Second Thoughts.

A close look at Bolivian election data suggests an initial analysis by the O.A.S. that raised questions of vote-rigging — and helped force out a president — was flawed.

18.06.2020 - 13:51 [ Organization of American States (OAS) ]

Press Release on Disinformation Campaign Regarding the Role of the OAS in the Bolivian Elections

In other words, the statistical study conducted by the OAS did not seek to validate or challenge the results, but rather to identify abnormal or suspicious behavior in the trends, in order to guide the work of the other audit teams, which found incontrovertible evidence of manipulation of the election: secret computer servers with the capacity to modify the results, and adulterated tally sheets. Therefore, the General Secretariat of the OAS continues to stand behind the statistical analysis carried out, understanding that its usefulness was only of an instrumental nature within the overall review of the elections.

18.06.2020 - 13:33 [ theIntercept.com ]

The New York Times Admits Key Falsehoods That Drove Last Year’s Coup in Bolivia: Falsehoods Peddled by the U.S., Its Media, and the Times

Once he fled, Bolivia’s first-ever president from the country’s Indigenous population was replaced by a little-known, white, far-right senator, Jeanine Áñez, from the country’s minority European-descendent, Christian, wealthy region. Her new, unelected government promptly massacred dozens of Indigenous protesters and then vested the responsible soldiers with immunity. Seven months later, Áñez predictably continues to rule Bolivia as “interim president” despite never having run for president, let alone having been democratically elected.

10.06.2020 - 13:23 [ Cracked.com ]

5 Realities About The World’s Scariest Police Department

(19.06.2017)

5. The NYPD Now Has Offices All Over The World

Through the International Liaison Program, NYPD detectives are now stationed in 13 cities around the globe, from Paris to Amman to Sydney. If you’re surprised that New York City would have flatfoots permanently operating on the majority of Earth’s continents, you aren’t alone. When bombs went off in Bali in 2005, Indonesian police were understandably „astonished and irritated that the NYPD showed up.“

10.06.2020 - 12:39 [ Salon.com ]

Nine terrifying facts about America’s biggest police force

(28.09.2012)

When asked for details at a press conference, Mayor Bloomberg basically told reporters to fuck off, saying, „The NYPD has lots of capabilities that you don’t know about and you won’t know about.“

The New York Times has reported that the department’s Harbor unit has 6 submarine drones; four cost $75,000 and the two others cost $120,000, according to the Times. They are developing a portable radar that can see under clothes in order to search for weapons. Militaristic „Hercules teams,“ are deployed to random parts of the city armed with automatic weapons and body armor. Their explicitly stated role is to terrify people.

10.06.2020 - 11:49 [ NYPD - nyc.gov ]

NYPD: Intelligence and Counterterrorism

The Deputy Commissioner oversees both the Intelligence Bureau, which is responsible for intelligence collection and analysis; and the NYPD’s Counterterrorism Bureau operations, including the partnership with the FBI/NYPD Joint Terrorism Task Force, the first and largest of its kind in the nation.

New York City is home to more than 8 million people and hosts over 58 million visitors from all over the world annually. The Intelligence and Counterterrorism Bureaus provide some of the most highly trained and best equipped officers to patrol the city, collect and analyze data, and collaborate with partner agencies.

10.06.2020 - 11:41 [ NYPD - nyc.gov ]

NYPD: Counterterrorism

The CT Bureau reviews possible terrorist targets and develops innovative, forward-thinking policies and procedures to guard against attacks, training first responders and specialized units and developing intelligence capabilities for detecting and preventing terrorist attacks. The bureau coordinates with federal, state, and other law enforcement agencies in intelligence gathering and sharing, and plays an integral role in the FBI’s Joint Terrorist Task Force.

Critical Response Command (CRC) is one of the Department’s first lines of defense against a terrorist-related attack. A permanent cadre of hand-selected police officers devoted to counterterrorism, CRC members are trained to respond swiftly, with sufficient expertise and force, to the most highly organized and heavily armed attacks. All CRC team members are trained in special weapons and long-range guns, explosive trace detection, radiological and nuclear awareness, biological and chemical weapons awareness, and are equipped with the skills to detect an impending attack and utilize the best possible response to an emerging situation. The team conducts daily counterterrorism deployments to critical infrastructure sites throughout New York City, saturating strategic locations with a uniform presence to disrupt and deter terrorist planning and hostile surveillance operations.

(…)

Domain Awareness System (DAS) is a powerful counterterrorism and policing tool jointly developed and built by the NYPD and Microsoft. As a central platform, DAS is used to aggregate data from internal and external closed-circuit television cameras, license plate readers, and environmental sensors, as well as 911 calls and other NYPD databases. DAS uses an interactive dashboard interface to display real-time alerts whenever a 911 call is received or a sensor is triggered.

10.06.2020 - 11:22 [ NYPD - nyc.gov ]

NYPD: Information Technology

The Information Technology Bureau (ITB) plays an integral role in establishing the NYPD as one of the leading counterterrorism and crime-fighting forces in the nation, developing and implementing cutting-edge technology to support strategies, programs, and procedures that promote safety, efficiency, and effectiveness.

The bureau provides the department with state-of-the-art technological support, building a leading IT and telecommunications infrastructure. ITB comprises six divisions, each with its own specialized directive, which report directly to the Deputy Commissioner, Information Technology. The six divisions are:

19.05.2020 - 19:16 [ Medium.com ]

Open Letter, May 18, 2020, London: Dear Matt Hancock, we are civil society organisations, privacy advocates and academic researchers writing to express concerns about the NHS’s plans to build a COVID-19 datastore.

We share the common goal of preserving public confidence in systems that can help make us all safer. Therefore, before the NHS continues its plans, we urge you to provide the public with more information and take appropriate measures to reduce risk of data sharing and keep the aggregated data under democratic control.

In March, the NHS announced a new plan to build a datastore that aggregates COVID-19 health data. Microsoft, Google, Palantir, Faculty and Amazon will assist in the development of the datastore and the processing of the data.

19.05.2020 - 19:10 [ Computerweekly.com ]

Privacy advocates demand clarity over Covid-19 datastore

(yesterday)

In an open letter directly addressed to the health secretary, civil society organisations, privacy advocates and academic researchers urged Hancock to give the public more information about the datastore and take appropriate measures to reduce data-sharing risks and keep it under democratic control.

19.05.2020 - 18:45 [ OpenDemocracy.net ]

DemocracyWatch: COVID-19 ushers in a new era of surveillance apps

Last week, Palantir got the US government contract to run a new system for tracking the spread of COVID-19.

It’s not just the US that is boosting surveillance in the pandemic. In tiny Liechtenstein, the government has launched biometric tracker bracelets that automatically collect key medical information. The statelet plans for all citizens to wear them by autumn, while Germany, Turkey and France are also among the 23 countries that have looked at high-tech surveillance measures in response to the crisis.

19.05.2020 - 18:39 [ theVerge.com ]

Peter Thiel’s controversial Palantir is helping build a coronavirus tracking tool for the Trump admin

(21.04.2020)

It is unclear what exactly this data is, where it comes from, or how it’s being used. It’s also unclear if Palantir is the sole technology provider of the tool, or if other partners are involved.

Reports earlier this month first surfaced Palantir’s involvement with the US Centers for Disease Control and Prevention and the UK’s National Health Service regarding coronavirus tracking software and other assistance in combating the global pandemic.

19.05.2020 - 18:15 [ Forbes ]

Facebook: Here’s Proof Israeli WhatsApp Hackers Ran Cyberweapons In America

(24.04.2020)

The tech giant’s counsel filed a response to NSO’s move for dismissal that included two IP addresses and a handful of websites it claims were used by NSO Group to attack WhatsApp users in spring 2019. One was hosted by Amazon Web Services in the U.S., the others by Californian company QuadraNet and a German provider.

19.05.2020 - 18:12 [ theGuardian.com ]

WhatsApp: Israeli firm ‚deeply involved‘ in hacking our users

(29.04.2020)

According to WhatsApp’s filing, NSO gained “unauthorised access” to its servers by reverse-engineering the messaging app and then evading the company’s security features that prevent manipulation of the company’s call features. One WhatsApp engineer who investigated the hacks said in a sworn statement submitted to the court that in 720 instances, the IP address of a remote server was included in the malicious code used in the attacks. The remote server, the engineer said, was based in Los Angeles and owned by a company whose data centre was used by NSO.

17.05.2020 - 06:31 [ Cnet.com ]

COVID-19 could set a new norm for surveillance and privacy

The outbreak has also brought new privacy issues, as companies beef up surveillance with tech like thermal cameras and facial recognition in preparation for when people return to their everyday lives.

Surveillance technology has slowly integrated into our daily lives, with facial recognition getting added as a „convenience“ feature for casinos and ordering food. The coronavirus has sped up that process, in the name of public health.

11.05.2020 - 21:20 [ ec.europa.eu ]

ROADMAP FOR THE IMPLEMENTATION OF ACTIONS BY THE EUROPEAN COMMISSION BASED ON THE COMMISSION COMMUNICATION AND THE COUNCIL RECOMMENDATION ON STRENGTHENING COOPERATION AGAINST VACCINE PREVENTABLE DISEASE

(March 2019)

Examine the feasibility of developing a common vaccination card/passport for EU citizens (that takes into account potentially different national vaccination schedules and), that is compatible with electronic immunisation information systems and recognised for use across borders, without duplicating work at nati

08.05.2020 - 19:46 [ northsidesun.com ]

It’s all about the data

With the current COVID-19 pandemic, we have all been reminded of the importance of data. We see the daily number of diagnosed cases, the numbers of hospital beds, the number of ventilators and most of all — the number of deaths from the virus. We are getting a little of the pain that our parents and grandparents must have suffered when they received reports from the battlefields of Europe and the Pacific during World War II. They worried daily about their loved ones in the midst of so many dying.

07.05.2020 - 15:35 [ Stanford University School of Medicine, Stanford CA / Medrxiv.org ]

COVID-19 Antibody Seroprevalence in Santa Clara County, California

(11.04.2020)

A hundred deaths out of 48,000-81,000 infections corresponds to an infection fatality rate of 0.12-0.2%. If antibodies take longer than 3 days to appear, if the average duration from case identification to death is less than 3 weeks, or if the epidemic wave haspeaked and growth in deaths is less than 6% daily, then the infection fatality rate would be lower.

07.05.2020 - 15:34 [ the Hill ]

The data is in — stop the panic and end the total isolation

Five key facts are being ignored by those calling for continuing the near-total lockdown.

Fact 1: The overwhelming majority of people do not have any significant risk of dying from COVID-19.

The recent Stanford University antibody study now estimates that the fatality rate if infected is likely 0.1 to 0.2 percent, a risk far lower than previous World Health Organization estimates that were 20 to 30 times higher and that motivated isolation policies.

02.05.2020 - 02:35 [ Rob Woodward / Global Research ]

Surveillance System and Privacy: Britain’s NHS Ordered to Hand Over Security Keys of NHS Data to UK Intel and Security Authority GCHQ

Access to this data now gives the state extraordinary power over all of our lives. This is the last battleground of information access and they’ve used a crisis to accomplish it.

30.04.2020 - 17:27 [ ScientificAmerican.com ]

Will Americans Be Willing to Install COVID-19 Tracking Apps?

Citing an infringement of constitutional rights and freedoms, leaders in the United States have so far been hesitant to adopt such technological approaches, but that may be about to change.

30.04.2020 - 17:20 [ Haaretz ]

Israelis Visiting Malls, Markets Will Have to Download Mandatory Coronavirus Tracking App

(29.04.2020)

Shopping malls and markets across Israel, shut due to the coronavirus outbreak, will only be allowed to reopen after the development of a tracking system that would monitor all visitors, Health Ministry Director General Moshe Bar Siman Tov said at a Monday meeting.

All customers will be required to install a tracking app on their phone to enter shopping malls and markets, once these reopen.

30.04.2020 - 17:17 [ Indianexpress.com ]

1.5 million Israelis using voluntary coronavirus monitoring app

(01.04.2020)

Around 1.5 million Israelis have downloaded a mobile app in the past week that alerts users who have crossed paths with a coronavirus patient, according to the Health Ministry, helping to improve tracking of the pandemic.T he app “HaMagen” – Hebrew for The Shield – is sparking interest from abroad with approaches from Germany, Italy, Britain, Australia and Chile so far, ministry deputy director general Morris Dorfman said Wednesday.

30.04.2020 - 17:13 [ Time ]

Italy Says App Tracing Contacts of People Infected With COVID-19 Will Be Anonymous

Premier Giuseppe Conte’s Cabinet, at a meeting that ended early Thursday, approved a law, in the form of the decree, that guarantees that those who decide not to use the app won’t suffer limits on their movement or other rights.

30.04.2020 - 15:56 [ the Hill ]

Americans begin to move amid growing frustrations with social distancing

Americans who have endured a month or more of state-ordered lockdowns related to the spread of the coronavirus in recent days have been venturing out of their homes more as they grow frustrated after spending so much time away from their normal lives.

Cellphone data collected by the University of Maryland’s Maryland Transportation Institute shows the percentage of people staying at home in most states peaked around April 14, the Tuesday after Easter.

29.04.2020 - 17:27 [ Wall Street Journal ]

Do Lockdowns Save Many Lives? In Most Places, the Data Say No

(26.04.2020)

We set out to quantify how many deaths were caused by delayed shutdown orders on a state-by-state basis. To normalize for an unambiguous comparison of deaths between states at the midpoint of an epidemic, we counted deaths per million population for a fixed 21-day period, measured from when the death rate first hit 1 per million—e.g.,‒three deaths in Iowa or 19 in New York state.

29.04.2020 - 13:25 [ Haaretz ]

Facebook Alleges Israeli Spyware Firm NSO Ran Attack Servers on U.S. Soil

(26.04.2020)

NSO also claimed that it and Q Cyber are entitled to immunity because they operate in the service of foreign countries. Facebook claims that the Israeli companies are not entitled to such immunity under U.S. law.

26.04.2020 - 21:29 [ Spiked ]

There is no empirical evidence for these lockdowns

Comparing US states shows there is no relationship between lockdowns and lower Covid-19 deaths.

16.04.2020 - 14:18 [ Haaretz ]

With No Checks on Power, Israel Also Wants Shin Bet to Map Coronavirus Hot Spots

Haaretz has learned that this deep, dark secret amounts to the addition of another layer of analysis to the information that’s already being collected about us, with the aim of mapping areas where restrictions could, or could not, be lifted. That accompanies the army’s proposal to divide the country into color-coded zones based on the incidence of COVID-19 in each.

14.04.2020 - 21:18 [ Ron Paul / ]

A Healthcare PATRIOT Act?

Federally mandated healthcare IDs and databases will weaken healthcare. Patients must provide details regarding their personal lives and habits so their physicians can make diagnoses. How comfortable would people be sharing this information if they knew it would be stored in a federal “health tracking” database?

07.04.2020 - 18:54 [ USA Today ]

New data on New York coronavirus deaths: Most had these underlying illnesses; 61% were men

And 4,089 of those who died had at least one other chronic disease, the records showed:

– The leading underlying illness was hypertension, which showed up in 55% of the deaths.
– Next was diabetes, which was diagnosed in 1,755 deaths, or about 37% of the cases.
– Other top illnesses found in those who died from coronavirus were hyperlipidemia; coronary artery disease; renal disease and dementia.

07.04.2020 - 18:51 [ USA Today / Twitter ]

New York released new data on the state’s coronavirus deaths, showing 86% of those who died had underlying illnesses.

06.04.2020 - 16:50 [ DemocratAndChronicle.com ]

Coronavirus: New York releases new data on deaths. What it shows

(today)

The data showed 64% of 4,159 deaths in New York were those over 70 years old — with the most among those aged 70 and 79 followed closely by those aged 80 and 89.

The figures were not surprising. State and national leaders have long warned that the virus was most deadly among the elderly and those with preexisting health issues.

06.04.2020 - 16:48 [ DemocratAndChronicle.com ]

Coronavirus in NY: There’s important data that’s missing from Gov. Andrew Cuomo’s daily slide shows

(03.ß4.2020)

Providing those details is critical so people can learn about the virus and the risk factors, experts said.

“That information is really vital for the public to understand that no age group is immune, and no gender is immune and that all racial and ethnic groups are at risk,” said Summer McGee, dean of the School of Health Science at the University of New Haven in Connecticut.

04.04.2020 - 18:27 [ Electronic Frontier Foundation ]

How EFF Evaluates Government Demands for New Surveillance Powers

Even in the midst of a crisis, the public must carefully evaluate such government demands, because surveillance invades privacy, deters free speech, and unfairly burdens vulnerable groups. It also metastasizes behind closed doors. And new surveillance powers tend to stick around. For example, nearly two decades after the 9/11 attacks, the NSA is still conducting dragnet Internet surveillance.

Thus, when governments demand new surveillance powers—especially now, in the midst of a crisis like the ongoing COVID-19 outbreak—EFF has three questions:

– First, has the government shown its surveillance would be effective at solving the problem?
– Second, if the government shows efficacy, we ask: Would the surveillance do too much harm to our freedoms?
– Third, if the government shows efficacy, and the harm to our freedoms is not excessive, we ask: Are there sufficient guardrails around the surveillance?

24.03.2020 - 09:52 [ Axios.com ]

Location data likely to play limited role in fighting coronavirus

As COVID-19 worsens, though, expect to see a greater willingness to trade privacy for effective health surveillance, just as 9/11 led to a tightening of security around airports and other public spaces.

„A situation like the pandemic creates a fundamental shift in how people react to technology. This is the direction we are going to be moving in.“

— Labhesh Patel, chief technology officer at Jumio, an ID verification company

The bottom line: We’ve already given up so much in the fight against COVID-19. Some elements of personal privacy may be the next to go — and don’t expect the surveillance to end when the pandemic does.

24.03.2020 - 09:44 [ Forbes ]

Coronavirus, Surveillance And The Redefinition Of The Social Contract

We should listen to somebody who grew up in a society where there were no civil rights, Angela Merkel, talk about how the current situation justifies restricting our movements. And matters will not stop there: people might have been shocked when they saw China use apps and geolocation to control the movements of its population during the spread of the infection, but we now see Hong Kong, South Korea and Taiwan following suit: their success is being used to justify population control measures that would be completely unacceptable under normal circumstances.

08.03.2020 - 23:20 [ The United States Department of Justice ]

Department of Justice to Publish Final Rule to Comply Fully with DNA Fingerprint Act of 2005

The FBI will provide DHS with the DNA collection kits, analyze the samples, and ensure that law enforcement agencies use the results in accordance with the FBI’s stringent CODIS privacy requirements.

08.03.2020 - 23:07 [ The United States Department of Justice ]

Former Acting Inspector General for the U.S. Department of Homeland Security Indicted on Theft of Government Property and Scheme to Defraud the United States Government

Although Edwards had left DHS-OIG in December 2013, he continued to leverage his relationship with Venkata and other DHS-OIG employees to steal the software and the sensitive government databases.

22.02.2020 - 19:12 [ theIntercept.com ]

Leaked Reports Show EU Police Are Planning a Pan-European Network of Facial Recognition Databases

According to leaked internal European Union documents, the EU could soon be creating a network of national police facial recognition databases. A report drawn up by the national police forces of 10 EU member states, led by Austria, calls for the introduction of EU legislation to introduce and interconnect such databases in every member state. The report, which The Intercept obtained from a European official who is concerned about the network’s development, was circulated among EU and national officials in November 2019. If previous data-sharing arrangements are a guide, the new facial recognition network will likely be connected to similar databases in the U.S., creating what privacy researchers are calling a massive transatlantic consolidation of biometric data.

14.02.2020 - 12:10 [ New York Times ]

Centrists Are the Most Hostile to Democracy, Not Extremists

(23.05.2018)

Respondents who put themselves at the center of the political spectrum are the least supportive of democracy, according to several survey measures. These include views of democracy as the “best political system,” and a more general rating of democratic politics. In both, those in the center have the most critical views of democracy.

Some of the most striking data reflect respondents’ views of elections. Support for “free and fair” elections drops at the center for every single country in the sample. The size of the centrist gap is striking. In the case of the United States, fewer than half of people in the political center view elections as essential.

25.01.2020 - 11:50 [ New York Times ]

You Are Now Remotely Controlled

Surveillance capitalists control the science and the scientists, the secrets and the truth.

24.01.2020 - 10:09 [ New York Times ]

DNA Collection at the Border Threatens the Privacy of All Americans

What if the United States government took the DNA of vast numbers of Americans for use without their consent? The Trump administration has just brought us one step closer to that dystopia.

23.01.2020 - 23:43 [ The Hill ]

Twitter tells facial-recognition app maker to stop collecting its data

The cease and desist letter reportedly calls on Clearview AI to stop taking data from Twitter “for any reason” and delete any that was previously collected.

10.01.2020 - 15:36 [ LA Times ]

Iran denies missile hit plane, calls on West to share data

“What is obvious for us, and what we can say with certainty, is that no missile hit the plane,” Ali Abedzadeh, head of Iran’s national aviation department, told a press conference.

“If they are really sure, they should come and show their findings to the world” in accordance with international standards, he added.

08.01.2020 - 01:22 [ Electronic Frontier Foundation ]

No Digital Surveillance of Iranians at the U.S. Border—Or Within the U.S.

Surveillance Self-Defense

Now, more than ever, it’s important to know your rights and understand what precautions you can take to protect yourself from digital surveillance by our government. EFF’s guides for Surveillance Self-Defense offer advice on how to protect your digital privacy in a number of situations, including online communications and at protests. If you plan to travel internationally, EFF has a guide on protecting your digital data at the border, as well as a printable pocket guide on border searches.

24.12.2019 - 14:39 [ New York Times ]

It Seemed Like a Popular Chat App. It’s Secretly a Spy Tool.

A technical analysis and interviews with computer security experts showed that the firm behind ToTok, Breej Holding, is most likely a front company affiliated with DarkMatter, an Abu Dhabi-based cyberintelligence and hacking firm where Emirati intelligence officials, former National Security Agency employees and former Israeli military intelligence operatives work. DarkMatter is under F.B.I. investigation, according to former employees and law enforcement officials, for possible cybercrimes. The American intelligence assessment and the technical analysis also linked ToTok to Pax AI, an Abu Dhabi-based data mining firm that appears to be tied to DarkMatter.

24.12.2019 - 14:35 [ New York Times ]

Where Even the Children Are Being Tracked

As they go about their daily lives, many Pasadena residents we spoke with, like the rest of us, frequent locations whose populations for one reason or another could be vulnerable — because they attend mosques or synagogues or work at secure facilities, like NASA’s Jet Propulsion Laboratory. We plucked one scientist at the lab out of the data, and when we tracked him down in real life and explained how we did it, he was alarmed. “Somebody who might want to get some information from [the lab] for instance, they might target me,” the scientist told us. “This will be a treasure trove for any spying agency, I would presume.” He asked that we preserve his anonymity in this story.

23.12.2019 - 09:44 [ New York Times ]

Total Surveillance Is Not What America Signed Up For

The largest such file known to have been examined by journalists, it reveals more than 50 billion location pings from the phones of more than 12 million Americans across several major cities.

By analyzing these pings, our journalists were able to track the movements of President Trump’s Secret Service guards and of senior Pentagon officials. They could follow protesters to their homes and stalk high-school students across Los Angeles. In most cases, it was child’s play for them to connect a supposedly anonymous data trail to a name and an address — to a real live human being.

14.12.2019 - 11:33 [ Vice.com ]

How Hackers Are Breaking Into Ring Cameras

In a video obtained by WMC5 courtesy of the family, you can see what the hacker would have seen: A viewpoint that looms over the entire room from where the camera is installed in a far corner, looking down on their beds and dressers while they play. The hacker is heard playing the song „Tiptoe Through the Tulips“ through the device’s speakers, and when one of the daughters, who is eight years old, stops and asks who’s there, the hacker says, „It’s Santa. It’s your best friend.“

14.12.2019 - 11:26 [ ABC News ]

Ring security camera hacks see homeowners subjected to racial abuse, ransom demands

Multiple U.S. families have reported incidents of Ring camera systems being hacked in recent days, raising questions as to whether the systems are allowing hackers access to people’s homes, without ever having to set foot inside.

Owners of Ring security cameras in Mississippi, Georgia, Florida and Texas have reported incidents where hackers tormented families with racial slurs, encouraged children into destructive behavior and demanded a ransom in Bitcoin.

12.12.2019 - 15:41 [ Electronic Frontier Foundation ]

Victory: San Diego to Suspend Face Recognition Program, Limits ICE Access To Criminal Justice Data

The end of San Diego’s program marks a major victory in the nationwide battle against face surveillance. But it doesn’t stop here. Join our campaign to end face surveillance on the local level across the country.

02.12.2019 - 19:42 [ CryingWolf57 / Youtube ]

Jeremy Scahill on Democracy Now! – Dirty Wars: The World Is a Battlefield [Both parts in one]

23/04/2013 & 24/04/2013 | http://dirtywars.org/ | Jeremy Scahill, author of the new book, „Dirty Wars: The World Is a Battlefield,“ charts the expanding covert wars operated by the CIA and JSOC, the Joint Special Operations Command. The book is based on years of reporting on U.S. secret operations in Yemen, Somalia, Pakistan and Afghanistan. The Obama administration’s assassination of two U.S. citizens in 2011, Anwar al-Awlaki and his 16-year-old Denver-born son Abdulrahman, is a central part of Scahill’s book. While the Obama administration has defended the killing of Anwar, it has never publicly explained why Abdulrahman was targeted in a separate drone strike two weeks later.

02.12.2019 - 19:30 [ El Pais ]

WAR IN SYRIA: Spain helping US identify European jihadists in Syria

(04.03.2019)

Spanish agents in Syria are cooperating with Operation Gallant Phoenix, a U.S.-led effort to identify fighters from Western nations who have joined Islamic State (ISIS) and Al Qaeda-affiliated groups in the region, counter-terrorism sources told EL PAÍS.

02.12.2019 - 19:27 [ Scoop.co.nz ]

NZ confirms ongoing part in Operation Gallant Phoenix

(10.06.2019)

“New Zealand began participating in Operation Gallant Phoenix in late 2014 in support of our efforts to uncover information relating to the location of a New Zealander taken hostage by ISIS,” Jacinda Ardern said.

02.12.2019 - 19:24 [ GIASP ‏/ Twitter ]

#Breaking #Israel is taking part in a multi-national #intelligence force: Operation Gallant Phoenix, based in the #Jordan capital, alongside Arab powers #SaudiArabia #Egypt and #UAE in order to quash #ISIS #Daesh working alongside #US #UK #France #Italy

(10.06.2019)

25.11.2019 - 19:31 [ CNN ]

He invented the web. Now he’s warning of a looming ‚digital dystopia‘

Ahead of a conference in Berlin Monday, Berners-Lee tweeted a warning of the risks faced.
He wrote: „If we fail to defend the free and open web, we risk a digital dystopia of entrenched inequality and abuse of rights.“
In an earlier statement on his foundation’s website, he called the web „one of the defining opportunities of our time,“ adding that collaborative action must be taken „to prevent the web being misused by those who want to exploit, divide and undermine.“

25.11.2019 - 19:27 [ kiwifarms.net ]

Research paper claims Google has achieved ‚quantum supremacy‘ – a milestone in computing after their quantum processor performed a ‚calculation in three minutes and 20 seconds that would take a state-of-the-art supercomputer 10,000 years‘

(22.09.2019)

The technology carries major national security implications because quantum computers potentially could break traditional internet security programs or other codes.

Developing viable quantum computers has proved to be hugely challenging because they rely on superconductivity that can only be achieved in temperatures close to absolute zero.
Any instability in the qubits, for example from vibrations, can lead to ‘noise’ that causes calculation errors and undermines a quantum computer’s power to solve problems.

Earlier this month, IBM announced it was joining forces with a German research institute to explore the potential of quantum computing, backed by a government plan to invest $717million over two years in wider research in the field.

25.11.2019 - 19:23 [ Freeman LaFleur / Twitter ]

A claim by Google researchers that they performed the first quantum computation was briefly posted on a NASA website before being removed.

(21.09.2019)

12.11.2019 - 16:59 [ Techdirt ]

Mozilla: ISPs Are Lying About Encrypted DNS, Should Have Privacy Practices Investigated

The effort would effectively let Chrome and Mozilla users opt in to DNS encryption — making your browser data more secure from spying and monetization — assuming your DNS provider supports it. Needless to day, telecom giants that have made billions of dollars monetizing your every online behavior for decades now (and routinely lying about it) don’t much like that.

As a result, Comcast, AT&T, and others have been trying to demonize the Google and Mozilla efforts any way they can,

12.11.2019 - 16:48 [ Washington Post ]

Soldiers with top-secret clearances say they were forced to use an app that could endanger them

“Just being in intelligence, we are trained to be extremely paranoid of everything,” the soldier said. “This is serious operational security not being considered.”

The worst-case scenario, he said, was “our cover might be blown.” While the app said permissions could be disabled, the soldiers said there was a failure of confidence it was secure. Senior leaders checked the phones of subordinates to ensure they had the app installed, soldiers in the unit said.

03.11.2019 - 12:09 [ Consortium News ]

More Holes in Russia-gate Narrative

(20.09.2017)

How can we be so confident? Because NSA alumni now active in Veteran Intelligence Professionals for Sanity (VIPS) are intimately familiar with NSA’s capabilities and practice with respect to bulk capture and storage of fiber-optic communications. Two of us actually devised the systems still in use, and Edward Snowden’s revelations filled in remaining gaps. Today’s NSA is in position to clear up any and all questions about intrusions into the DNC.

(…)

The FBI could still redeem itself by doing what it should have done as soon as the DNC claimed to have been “hacked.” For reasons best known to former FBI Director James Comey, the Bureau failed to get whatever warrant was needed to confiscate the DNC servers and computers to properly examine them.

03.11.2019 - 11:25 [ Ray McGovern / Consortium News ]

RAY McGOVERN: A Non-Hack That Raised Hillary’s Hackles

(22.07.2019)

Independent forensic investigations demonstrated two years ago that the DNC emails were not hacked over the Internet, but had been copied onto an external storage device — probably a thumb drive. Additional work over recent months has yielded more evidence that the intrusion into the DNC computers was a copy, not a hack, and that it took place on May 23 and 25, 2016.

The DNC almost certainly knew what had happened — not only that someone with physical access to DNC computers had copied thousands of emails, but also which ones they had copied, and thus how prejudicial to the Clinton campaign they would be when they saw the light of day.

And so, candidate Clinton, the DNC, and the mainstream media (forever quoting anonymous “current and former intelligence officials”) appear to have colluded, deciding the best defense would be a good offense.

03.11.2019 - 09:40 [ Observer.com ]

Scariest Takeaways on the Current State of Smartphone Surveillance From Edward Snowden

(28.10.2019)

Snowden’s point: you better not have done anything you’ve regretted in your digital past; you better not have put an unsavory term in a Google Search bar—because there will be a permanent record of that, which can be found and used against you if need be.

Snowden also pointed out that the term for this is “bulk collection,” a euphemism the government uses for mass surveillance work.

“They simply collect it all in advance and hope that one day it will become useful,” he said.

19.10.2019 - 10:25 [ Daily Mail ]

Pentagon DELETES files about Osama bin Laden raid after transferring them to CIA where they can’t be made public

(08.07.2013)

– Military files about the Navy SEAL raid on Osama bin Laden’s hideout have been purged from Pentagon computers
– Associated Press requested information on the raid some 20 times in 2011 but requests were rejected
– A line in an inspector general’s draft report states the files were purged from the defense department to another government department to prevent certain information about the raid being made public
– The sentence was removed from the final report released weeks ago

04.10.2019 - 09:51 [ Shannon Vavra, Reporter @CyberScoopNews covering NSA, Cyber Command, cyberwarfare / Twitter ]

The US, UK, and Australia (3 Five Eyes) are asking @facebook to delay message encryption. They’re using child sex exploitation as a way to highlight concerns encrypted comms can hamper law enforcement.

Details on latest encryption battle w @CyberScoopNews

04.10.2019 - 09:18 [ BuzzFeed ]

Attorney General Bill Barr Will Ask Zuckerberg To Halt Plans For End-To-End Encryption Across Facebook’s Apps

Attorney General Bill Barr, along with officials from the United Kingdom and Australia, is set to publish an open letter to Facebook CEO Mark Zuckerberg asking the company to delay plans for end-to-end encryption across its messaging services until it can guarantee the added privacy does not reduce public safety.

A draft of the letter, dated Oct. 4, is set to be released alongside the announcement of a new data-sharing agreement between law enforcement in the US and the UK; it was obtained by BuzzFeed News ahead of its publication.

04.10.2019 - 08:52 [ theGuardian.com ]

Calls for backdoor access to WhatsApp as Five Eyes nations meet

(30.09.2019)

British, American and other intelligence agencies from English-speaking countries have concluded a two-day meeting in London amid calls for spies and police officers to be given special, backdoor access to WhatsApp and other encrypted communications.

The meeting of the “Five Eyes” nations – the UK, US, Australia, Canada and New Zealand – was hosted by new home secretary, Priti Patel, in an effort to coordinate efforts to combat terrorism and child abuse.

21.09.2019 - 18:32 [ New York Times ]

Secret F.B.I. Subpoenas Scoop Up Personal Data From Scores of Companies

Now, records show how far beyond Silicon Valley the practice extends — encompassing scores of banks, credit agencies, cellphone carriers and even universities.

The demands can scoop up a variety of information, including usernames, locations, IP addresses and records of purchases. They don’t require a judge’s approval and usually come with a gag order, leaving them shrouded in secrecy. Fewer than 20 entities, most of them tech companies, have ever revealed that they’ve received the subpoenas, known as national security letters.

01.09.2019 - 09:20 [ Donald J. Trump, President of the United States / Twitter ]

Being scolded by failed former “Intelligence” officials, like James Clapper, on my condolences to Iran on their failed Rocket launch. Sadly for the United States, guys like him, Comey, and the even dumber John Brennan, don’t have a clue. They really set our Country back,….

01.09.2019 - 09:18 [ theHill.com ]

Trump lashes out at former intel officials for criticism of Iran tweet

It wasn’t immediately clear what criticism the president was referring to, as the officials had not issued public statements on Trump’s tweet or his decision to release an image taken by U.S. forces of a damaged Iranian rocket facility. Trump has faced criticism from some Democrats for releasing the image due to its high resolution and concerns over whether it should have remained classified.

31.08.2019 - 08:38 [ Project Zero team at Google ]

Implant Teardown

The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage. We can see here screenshots of the apps on the left, and on the right the contents of the database files stolen by the implant which contain the unencrypted, plain-text of the messages sent and received using the apps:

(…)

There’s something thus far which is conspicuous only by its absence: is any of this encrypted? The short answer is no: they really do POST everything via HTTP (not HTTPS) and there is no asymmetric (or even symmetric) encryption applied to the data which is uploaded. Everything is in the clear. If you’re connected to an unencrypted WiFi network this information is being broadcast to everyone around you, to your network operator and any intermediate network hops to the command and control server.

This means that not only is the end-point of the end-to-end encryption offered by messaging apps compromised; the attackers then send all the contents of the end-to-end encrypted messages in plain text over the network to their server.

31.08.2019 - 08:26 [ Project Zero team at Google ]

A very deep dive into iOS Exploit chains found in the wild

I recommend that these posts are read in the following order:

31.08.2019 - 08:20 [ Gizmodo ]

Google Hackers Reveal Websites Hacked Thousands of iPhone Users Silently for Years

“To be targeted might mean simply being born in a certain geographic region or being part of a certain ethnic group,” he said. “All that users can do is be conscious of the fact that mass exploitation still exists and behave accordingly; treating their mobile devices as both integral to their modern lives, yet also as devices which when compromised, can upload their every action into a database to potentially be used against them.”

16.08.2019 - 06:44 [ New York Times ]

N.Y.P.D. Detectives Gave a Boy, 12, a Soda. He Landed in a DNA Database.

According to a 2013 survey, 30 states and the federal government permitted the analysis of DNA samples collected from individuals who are arrested or charged, but not convicted, of certain crimes. These databases generally did not include low-level offenders.

New York State law requires a conviction before someone’s DNA can be included in the state-operated DNA databank. But databases built by local authorities are not subject to the state rules.

10.08.2019 - 23:30 [ New York Times ]

FBI wants to monitor Facebook and Instagram for domestic threats in real time

This is not the first time the FBI has sought access to a wide array of social media data. In 2016, the agency announced it had hired the social media analysis company Dataminr to allow law enforcement to „search the complete Twitter firehose, in near real-time, using customizable filters.“ Dataminr, which looks at open source information only, is also contracted by media outlets including CNN.

09.08.2019 - 04:38 [ Electronic Frontier Foundation ]

Amazon’s Ring Is a Perfect Storm of Privacy Threats

Doors across the United States are now fitted with Amazon’s Ring, a combination doorbell-security camera that records and transmits video straight to users’ phones, to Amazon’s cloud—and often to the local police department. By sending photos and alerts every time the camera detects motion or someone rings the doorbell, the app can create an illusion of a household under siege. It turns what seems like a perfectly safe neighborhood into a source of anxiety and fear. This raises the question: do you really need Ring, or have Amazon and the police misled you into thinking that you do?

07.08.2019 - 17:30 [ NewStatesman.com ]

The computer will see you now

“We started 20 years back. I didn’t even know we were doing AI then. It was only three or four years ago when someone said: ‘That’s whatyou’re doing.’”

03.08.2019 - 11:55 [ Jerusalem Post ]

California festival shooter claimed to be of Iranian and Italian descent

(30.07.2019)

On Instagram, Legan had previously threatened the event, the Gilroy Garlic Festival. He had also posted antisemitic, racist and misogynous comments. Among others, he invited people to read „Might Is Right,“ an 1890 book advocating for Social Darwinism and claiming that Anglo-Saxons are a „superior race.“

26.07.2019 - 17:38 [ Cnet.com ]

Facial recognition may be banned from public housing thanks to proposed law

It’s the first time federal legislation has addressed limits on technology and tenants.