Some companies may misrepresent things, or try to play down stories, but outright fabrication is not at all common (and the consequences of a company doing it would be severe). And here, both Amazon and Apple’s denials were so clear, so specific and so adamant that it raised serious questions about the reporting.
The UK government is still polishing its porn filtering law. The latest updates to the law show there’s been some effort put forth to make the law less stupid, but even these additions don’t make the law (or its implementation) much better.
It’s no secret that the Vietnamese government is no fan of the open internet. All the way back in 2002 we wrote about the government requiring people to register just to create a website. That same year we were writing about people being arrested for posting criticism of the government. In 2008, we wrote about the Vietnamese government banning „subversive“ blogs as well. With the rise of social media, Vietnam has shifted its focus there. In 2013, it banned news reporting on social media, saying it should be for personal use only. In 2014, we wrote about how the government was abusing Facebook’s own reporting tools to shut down dissenters from using the site. And at the beginning of this year, we wrote about how the government now employed around 10,000 people whose only job was to monitor the internet for dissent.
And now it’s going to get even worse — to a degree that might even lead some of the big internet companies to leave Vietnam entirely. And we have the NSA (partially) to blame.
(14. November 2002) Every purchase you make with a credit card, every magazine subscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend — all these transactions and communications will go into what the Defense Department describes as “a virtual, centralized grand database.“
To this computerized dossier on your private life from commercial sources, add every piece of information that government has about you — passport application, driver’s license and bridge toll records, judicial and divorce records, complaints from nosy neighbors to the F.B.I., your lifetime paper trail plus the latest hidden camera surveillance — and you have the supersnoop’s dream: a “Total Information Awareness“ about every U.S. citizen.
(29.5.2018) The William Safire column, „You Are a Suspect,” was published in the Times in 2002—two years before Facebook was created. And Safire isn’t talking about social networks or digital advertising—he’s discussing Total Information Awareness, a US Defense Advanced Research Projects Agency (Darpa) program that proposed mining vast amounts of Americans’ data to identify potential national security threats. The virtual grand database was to belong to the Department of Defense, which would use it to identify behavior patterns that would help to predict emerging terrorist threats.
(8.10.2018) Developed by Israeli cyber company NSO Group, Pegasus sends „exploit links“ to operators‘ targets, who can then access virtually all the phone’s data and can even use the phone’s camera to spy on conversations.
(2.10.201) Agents apparently linked to the Saudi regime used spy technology from Israeli firm NSO Group Technologies to eavesdrop on a Saudi dissident in Canada, according to a report on Monday.
The Citizen Lab research group said it had “high confidence” that NSO’s Pegasus software had been used this summer to eavesdrop on a 27-year-old Saudi exile, Omar Abdulaziz.
The campaign official, Rick Gates, was ultimately not interested in the company’s work, a person with knowledge of the discussions told the Times.
Special counsel Robert Mueller and his team, who are investigating Russian interference and possible coordination with the Trump campaign in the 2016 presidential election, have obtained copies of the proposals and questioned Psy-Group employees, according to people familiar with those interviews, the Times reports.
According to the report, Special Counsel Robert Mueller, who is investigating foreign interference in the 2016 election, is closely examining these contacts. His office, the report said, has interviewed workers from Psy-Group and collected documents from the company’s headquarters in Israel.
A third proposal by the company, Psy-Group, which is staffed by former Israeli intelligence operatives, sketched out a monthslong plan to help Mr. Trump by using social media to help expose or amplify division among rival campaigns and factions. The proposals, part of what Psy-Group called “Project Rome,” used code names to identify the players — Mr. Trump was “Lion” and Mrs. Clinton was “Forest.” Mr. Cruz, who Trump campaign officials feared might lead a revolt over the Republican presidential nomination, was “Bear.”
Psy-Group has also alleged to have been involved in Israel’s efforts against the Boycott, Divestment and Sanctions (BDS) movement. The Times of Israel reported that these revelations, which came to light in a separate investigation, showed that Psy-Group registered the website outlawbds.com. The site was believed to contain a “blacklist” with photos and email addresses of individuals believed to support BDS, but outlawbds.com has since disappeared from the internet.
The Republican Chairman of the Judiciary Committee Bob Goodlatte asked Rod Rosenstein for a meeting to discuss a report that the deputy attorney general said he was willing to secretly record President Donald Trump.
The report The New York Times published on September 21 cited sources who said Rosenstein wanted to expose the chaos in the White House and potentially build a case for invoking the 25th Amendment to remove Trump from office.
Rob Rosenstein, the Deputy Attorney General whose job hangs in the balance, had been expected to learn his fate Monday, but NBC News reports the meeting with President Trump has been postponed until Thursday when the President returns to Washington, D.C..
CNN’s Wolf Blitzer discusses the statement released by Deputy Attorney General Rod Rosenstein after the New York Times reported that he discussed secretly recording President Trump in 2017 and discussed plans to use the 25th Amendment to remove the president from office.
The deputy attorney general, Rod J. Rosenstein, suggested last year that he secretly record President Trump in the White House to expose the chaos consuming the administration, and he discussed recruiting cabinet members to invoke the 25th Amendment to remove Mr. Trump from office for being unfit.
Technological developments are obliging espionage agencies to adopt diverse methods of operation: not only to dispatch agents to enemy countries and to recruit local sources for intelligence, but also to dupe people into serving as agents without their knowledge, to use mercenaries and to rely on new capabilities, such as cyberattacks. To avoid biometric identification, as well as to evade security cameras, espionage organizations are being compelled to make increasing use of unwitting local agents.
If you missed the OpenSSL update released in May, go back and get it: a Georgia Tech team recovered a 2048-bit RSA key from OpenSSL using smartphone processor radio emissions, in a single pass.
The proposal from Raffi Krikorian, the Democratic National Committee’s chief technology officer and a former Uber executive, would allow Democrats and Republicans alike to combat misinformation by serving those people accurate information.
The data was exposed via rsync, a common file transfer protocol used to mirror or backup large data sets. The rsync server was not restricted by IP or user, and the data set was downloadable to any rsync client that connected to the rsync port.
He’s a rarity in the industry: a security sleuth who doesn’t hack. Instead, he searches communication ports and the internet’s hive of connected devices to find information inadvertently made public. His discoveries have included medical records, airport security files, hotel bookings, a terrorist screening database and 87 million Mexican voter registration records. Once the sensitive information has been secured, he publicly discloses that the data had been revealed.
Mr. Vickery found Level One’s data through an exposed backup server.
(12.September 2014) We take advantage of the capabilities that we have over these people in order to put ourselves at ease. We take advantage of the impact that we have on their lives. Sometimes it involves truly harming a person’s life, or their soul. I mean extortion whereby they must hide things from people around them. It can really screw up their lives. It made me feel omnipotent.
The men, according to Anadolu, were nabbed in 2015 in an army operation in the city of Ghardaia, 600 kilometers south of Algiers. They were arrested in possession of documents and communications equipment related to espionage for Israel.