Google is removing Fediverse apps from the Play Store because they can be used to access hate speech
A growing number of mobile apps meant to access the Fediverse are being removed from the Google Play Store. According to user reports, recently removed apps include Husky, Subway Tooter, and Fedilab. In a nutshell, a Fediverse is any combination of interconnected servers that can be used for web publishing and can manifest in something like Mastodon. Apps like Subway Tooter allow users to access Mastodon content which is hosted on individual servers in the Fediverse. The operators of the servers in the Fediverse (and often in the Internet at large) are responsible for moderating hate speech, not the operators of the apps used to access said servers.
Despite this established web browser model, The official reason given by Google for the removal of Fediverse apps is that these apps can be used to access servers which have microblogs or other content which are dedicated to hate speech. Newsflash: Mobile apps like Google Chrome can be used to access the exact same hate speech. That is the web browser model. Even out of the browser world that can take you to servers located in unknown corners of the world, such speech can be found on other front and center social media platforms such as Twitter and Facebook.
π ππΌ https://www.privateinternetaccess.com/blog/google-is-removing-fediverse-apps-from-the-play-store-because-they-can-be-used-to-access-hate-speech/
#google #DeleteGoogle #fediverse #hatespeech
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
A growing number of mobile apps meant to access the Fediverse are being removed from the Google Play Store. According to user reports, recently removed apps include Husky, Subway Tooter, and Fedilab. In a nutshell, a Fediverse is any combination of interconnected servers that can be used for web publishing and can manifest in something like Mastodon. Apps like Subway Tooter allow users to access Mastodon content which is hosted on individual servers in the Fediverse. The operators of the servers in the Fediverse (and often in the Internet at large) are responsible for moderating hate speech, not the operators of the apps used to access said servers.
Despite this established web browser model, The official reason given by Google for the removal of Fediverse apps is that these apps can be used to access servers which have microblogs or other content which are dedicated to hate speech. Newsflash: Mobile apps like Google Chrome can be used to access the exact same hate speech. That is the web browser model. Even out of the browser world that can take you to servers located in unknown corners of the world, such speech can be found on other front and center social media platforms such as Twitter and Facebook.
π ππΌ https://www.privateinternetaccess.com/blog/google-is-removing-fediverse-apps-from-the-play-store-because-they-can-be-used-to-access-hate-speech/
#google #DeleteGoogle #fediverse #hatespeech
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
PIA VPN Blog
Google is removing Fediverse apps from the Play Store because they can be used to access hate speech
A growing number of mobile apps meant to access the Fediverse are facing removal from the Google Play Store. According to user reports, recently notified
Surprise! Even Google's engineers don't understand its privacy controls
From their very inception, tech companies haven't been keen on privacy. They've also not been keen on making privacy controls easy. As court documents just revealed.
It's an empty feeling.
You discover that something you've always suspected to be true -- even when denied by a tech company -- turns out to be, oh, true.
In some way, you almost feel guilty. You want to beat yourself about the head muttering "I knew it. I just knew it."
So here we are finally seeing that Google's own engineers don't even understand the company's privacy controls.
In court documents unsealed last week in Arizona, a (sadly unnamed) Google engineer offers this 2018 email about the company's location tracking controls: "Location off should mean location off, not 'except for this case or that case.' The current UI feels like it is designed to make things possible, yet difficult enough that people won't figure it out."
Who would ever believe a company that flouted privacy more enthusiastically and more often than a flasher could make privacy controls so impenetrable that even the company's own large brains couldn't figure them out?
Those tech companies were run by such wily young people in days of yore. Ever since Facebook CEO Mark Zuckerberg insisted in 2010 that people didn't want privacy, you had a feeling that you were never going to get any.
π ππΌ https://www.zdnet.com/article/surprise-even-googles-engineers-dont-understand-its-privacy-controls/
#google #DeleteGoogle #privacy #controls #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
From their very inception, tech companies haven't been keen on privacy. They've also not been keen on making privacy controls easy. As court documents just revealed.
It's an empty feeling.
You discover that something you've always suspected to be true -- even when denied by a tech company -- turns out to be, oh, true.
In some way, you almost feel guilty. You want to beat yourself about the head muttering "I knew it. I just knew it."
So here we are finally seeing that Google's own engineers don't even understand the company's privacy controls.
In court documents unsealed last week in Arizona, a (sadly unnamed) Google engineer offers this 2018 email about the company's location tracking controls: "Location off should mean location off, not 'except for this case or that case.' The current UI feels like it is designed to make things possible, yet difficult enough that people won't figure it out."
Who would ever believe a company that flouted privacy more enthusiastically and more often than a flasher could make privacy controls so impenetrable that even the company's own large brains couldn't figure them out?
Those tech companies were run by such wily young people in days of yore. Ever since Facebook CEO Mark Zuckerberg insisted in 2010 that people didn't want privacy, you had a feeling that you were never going to get any.
π ππΌ https://www.zdnet.com/article/surprise-even-googles-engineers-dont-understand-its-privacy-controls/
#google #DeleteGoogle #privacy #controls #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
ZDNet
Surprise! Even Google's engineers don't understand its privacy controls
From their very inception, tech companies haven't been keen on privacy. They've also not been keen on making privacy controls easy. As court documents just revealed.
aria2 - The ultra fast download utility
aria2 is a utility for downloading files. The supported protocols are HTTP(S), FTP, SFTP, BitTorrent, and Metalink. aria2 can download a file from multiple sources/protocols and tries to utilize your maximum download bandwidth.
It supports downloading a file from HTTP(S)/FTP/SFTP and BitTorrent at the same time, while the data downloaded from HTTP(S)/FTP/SFTP is uploaded to the BitTorrent swarm. Using Metalink's chunk checksums, aria2 automatically validates chunks of data while downloading a file like BitTorrent.
π‘ Features:
ππΌ Multi-Connection Download. aria2 can download a file from multiple sources/protocols and tries to utilize your maximum download bandwidth. Really speeds up your download experience.
ππΌ Lightweight. aria2 doesnβt require much memory and CPU time. When disk cache is off, the physical memory usage is typically 4MiB (normal HTTP/FTP downloads) to 9MiB (BitTorrent downloads). CPU usage in BitTorrent with download speed of 2.8MiB/sec is around 6%.
ππΌ Fully Featured BitTorrent Client. All features you want in BitTorrent client are available: DHT, PEX, Encryption, Magnet URI, Web-Seeding, Selective Downloads, Local Peer Discovery and UDP tracker.
ππΌ Metalink Enabled. aria2 supports The Metalink Download Description Format (aka Metalink v4), Metalink version 3 and Metalink/HTTP. Metalink offers the file verification, HTTP/FTP/SFTP/BitTorrent integration and the various configurations for language, location, OS, etc.
ππΌ Remote Control. aria2 supports RPC interface to control the aria2 process. The supported interfaces are JSON-RPC (over HTTP and WebSocket) and XML-RPC.
ππΌ π The project page is located at:
https://aria2.github.io/
#aria2 #download #tool #utility #linux #windows
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
aria2 is a utility for downloading files. The supported protocols are HTTP(S), FTP, SFTP, BitTorrent, and Metalink. aria2 can download a file from multiple sources/protocols and tries to utilize your maximum download bandwidth.
It supports downloading a file from HTTP(S)/FTP/SFTP and BitTorrent at the same time, while the data downloaded from HTTP(S)/FTP/SFTP is uploaded to the BitTorrent swarm. Using Metalink's chunk checksums, aria2 automatically validates chunks of data while downloading a file like BitTorrent.
π‘ Features:
ππΌ Multi-Connection Download. aria2 can download a file from multiple sources/protocols and tries to utilize your maximum download bandwidth. Really speeds up your download experience.
ππΌ Lightweight. aria2 doesnβt require much memory and CPU time. When disk cache is off, the physical memory usage is typically 4MiB (normal HTTP/FTP downloads) to 9MiB (BitTorrent downloads). CPU usage in BitTorrent with download speed of 2.8MiB/sec is around 6%.
ππΌ Fully Featured BitTorrent Client. All features you want in BitTorrent client are available: DHT, PEX, Encryption, Magnet URI, Web-Seeding, Selective Downloads, Local Peer Discovery and UDP tracker.
ππΌ Metalink Enabled. aria2 supports The Metalink Download Description Format (aka Metalink v4), Metalink version 3 and Metalink/HTTP. Metalink offers the file verification, HTTP/FTP/SFTP/BitTorrent integration and the various configurations for language, location, OS, etc.
ππΌ Remote Control. aria2 supports RPC interface to control the aria2 process. The supported interfaces are JSON-RPC (over HTTP and WebSocket) and XML-RPC.
ππΌ π The project page is located at:
https://aria2.github.io/
#aria2 #download #tool #utility #linux #windows
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
aria2.github.io
aria2 is a lightweight multi-protocol & multi-source command-line
download utility. It supports HTTP/HTTPS, FTP, SFTP,
BitTorrent and Metalink. β¦
download utility. It supports HTTP/HTTPS, FTP, SFTP,
BitTorrent and Metalink. β¦
Episode 17: Determining Lies by Body Language with Traci Brown
The AnglerPhish Podcast - Determining Lies by Body Language with Traci Brown (Episode 17)
Top Body Language Expert Traci Brown visits AnglerPhish to discuss the science of reading body language to determine if someone is lying or committing fraud. Traci has spoken and trained on this subject for over 20 years. She also discusses how these lessons translate to an online environment as well. Not to be missed!
π§ ππΌ The #AnglerPhish #truecrime #podcast (Episode 17)
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Top Body Language Expert Traci Brown visits AnglerPhish to discuss the science of reading body language to determine if someone is lying or committing fraud. Traci has spoken and trained on this subject for over 20 years. She also discusses how these lessons translate to an online environment as well. Not to be missed!
π§ ππΌ The #AnglerPhish #truecrime #podcast (Episode 17)
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Predictions on Empire Market User Migration After $30 Million Exit Scam
Experts have predicted that White House, Versus, and Icarus Markets stand to be the most probable candidates to absorb victims of the $30 million Empire Market exit scam
Like weather, the dark web is defined by clear cycles that denote the natural stages of darknet markets and how they respond to law enforcement, DDoS attacks and several other so-called βenemiesβ.
Being fuelled by illicit operations, dark web markets have continuously failed to provide the much-needed user protection to shield buyers and vendors from losses resulting from law enforcement seizures and exit scams.
Nonetheless, the widespread uncertainty has not prevented the dark web ecosystem from wielding unmatched dynamism, which is evidenced by emergence of new markets and migration of users to adjust to the already-mentioned enemies of the darknet.
π ππΌ https://tapeucwutvne7l5o.onion/predictions-on-empire-market-user-migration-after-30-million-exit-scam
π ππΌ https://www.vice.com/en_in/article/z3e533/online-drug-market-empire-disappears-with-dollar30-million-of-users-money
π ππΌ https://cryptoslate.com/darknet-marketplace-empire-exit-scams-with-30-million-in-bitcoin/
#empire #exitscam #darknet #predictions #migration
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Experts have predicted that White House, Versus, and Icarus Markets stand to be the most probable candidates to absorb victims of the $30 million Empire Market exit scam
Like weather, the dark web is defined by clear cycles that denote the natural stages of darknet markets and how they respond to law enforcement, DDoS attacks and several other so-called βenemiesβ.
Being fuelled by illicit operations, dark web markets have continuously failed to provide the much-needed user protection to shield buyers and vendors from losses resulting from law enforcement seizures and exit scams.
Nonetheless, the widespread uncertainty has not prevented the dark web ecosystem from wielding unmatched dynamism, which is evidenced by emergence of new markets and migration of users to adjust to the already-mentioned enemies of the darknet.
π ππΌ https://tapeucwutvne7l5o.onion/predictions-on-empire-market-user-migration-after-30-million-exit-scam
π ππΌ https://www.vice.com/en_in/article/z3e533/online-drug-market-empire-disappears-with-dollar30-million-of-users-money
π ππΌ https://cryptoslate.com/darknet-marketplace-empire-exit-scams-with-30-million-in-bitcoin/
#empire #exitscam #darknet #predictions #migration
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Vice
Online Drug Market Empire Disappears, with $30 Million of Users' Money
A site admin has claimed Empire was paying a hacker $15,000 a week to leave them alone, before shutting up shop and fleeing with user funds.
Visual Threat Intelligence
The most comprehensive database of detected deepfakes with actionable insights
π ππΌ https://sensity.ai/
#deepfake #threat #detection #deeptrace
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
The most comprehensive database of detected deepfakes with actionable insights
π ππΌ https://sensity.ai/
#deepfake #threat #detection #deeptrace
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Sensity
Sensity AI: Best Deepfake Detection Software in 2026
Sensity AI all-in-one, forensic-grade, deepfake detection solution guarantees the best results in the marketplace for analyzing synthetic media.
Forwarded from NoGoolag
π± t.iss.one/qd_invitations
Groups about:
_______________
Chromium [ungoogled] | CHAT
https://t.iss.one/joinchat/TiTqiBWT8rxC47ykrK2rCg
Chromium [ungoogled] | CHANNEL
https://t.iss.one/joinchat/AAAAAFlST2c_v9iorWhtIQ
_______________
dnscrypt-proxy-android | CHAT
https://t.iss.one/joinchat/TiTqiA2laARw651mYHwKcg
dnscrypt-proxy-android | CHANNEL
https://t.iss.one/dnscrypt_proxy
_______________
MiXplorer | UPDATES
https://t.iss.one/MiXplorer_updates
_______________
βοΈ GROUPS ARE PROTECTED WITH CAPTCHA VERIFICATION
#groups #qd
Groups about:
_______________
Chromium [ungoogled] | CHAT
https://t.iss.one/joinchat/TiTqiBWT8rxC47ykrK2rCg
Chromium [ungoogled] | CHANNEL
https://t.iss.one/joinchat/AAAAAFlST2c_v9iorWhtIQ
_______________
dnscrypt-proxy-android | CHAT
https://t.iss.one/joinchat/TiTqiA2laARw651mYHwKcg
dnscrypt-proxy-android | CHANNEL
https://t.iss.one/dnscrypt_proxy
_______________
MiXplorer | UPDATES
https://t.iss.one/MiXplorer_updates
_______________
βοΈ GROUPS ARE PROTECTED WITH CAPTCHA VERIFICATION
#groups #qd
Russian internet trolls hired U.S. journalists to push their news website, Facebook says
Facebook said the website is run by people affiliated with the Internet Research Agency, which inflamed political tensions in the 2016 election through social media.
Some of Russiaβs most notorious internet trolls have launched a news website that hired real-life journalism freelancers β including Americans β to contribute, Facebook said Tuesday.
The site, called Peace Data, launched this year with coverage focused largely on the environment and corporate and political corruption. Facebook learned through a tip from the FBI that people formerly associated with the Russian Internet Research Agency, which created a number of influential Twitter and Facebook personas to inflame political tensions in the 2016 election, ran Peace Data and has taken down its known affiliated accounts. It had yet to gain a serious following, said Nathaniel Gleicher, the companyβs head of cybersecurity policy.
βIt confirms what I think weβve all thought: Russian actors are trying to target the 2020 elections and public debate in the U.S., and theyβre trying to be creative about it,β Gleicher said.
βBut the second thing that it confirms is, itβs not really working,β he said. βYou can run a loud, noisy influence campaign like the one we saw in 2016, and you get caught very quickly. Or you can try to run a much more subtle campaign, which is what this looks like. And A, you still get caught, and B, when you run a subtle influence campaign, youβre sort of working at cross-purposes with yourself. You donβt get a lot of attention for it.β
π ππΌ https://www.nbcnews.com/tech/tech-news/russian-internet-trolls-hired-u-s-journalists-push-their-news-n1239000
#usa #influencing #facebook #DeleteFacebook #elections #russia #trolls #journalists
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Facebook said the website is run by people affiliated with the Internet Research Agency, which inflamed political tensions in the 2016 election through social media.
Some of Russiaβs most notorious internet trolls have launched a news website that hired real-life journalism freelancers β including Americans β to contribute, Facebook said Tuesday.
The site, called Peace Data, launched this year with coverage focused largely on the environment and corporate and political corruption. Facebook learned through a tip from the FBI that people formerly associated with the Russian Internet Research Agency, which created a number of influential Twitter and Facebook personas to inflame political tensions in the 2016 election, ran Peace Data and has taken down its known affiliated accounts. It had yet to gain a serious following, said Nathaniel Gleicher, the companyβs head of cybersecurity policy.
βIt confirms what I think weβve all thought: Russian actors are trying to target the 2020 elections and public debate in the U.S., and theyβre trying to be creative about it,β Gleicher said.
βBut the second thing that it confirms is, itβs not really working,β he said. βYou can run a loud, noisy influence campaign like the one we saw in 2016, and you get caught very quickly. Or you can try to run a much more subtle campaign, which is what this looks like. And A, you still get caught, and B, when you run a subtle influence campaign, youβre sort of working at cross-purposes with yourself. You donβt get a lot of attention for it.β
π ππΌ https://www.nbcnews.com/tech/tech-news/russian-internet-trolls-hired-u-s-journalists-push-their-news-n1239000
#usa #influencing #facebook #DeleteFacebook #elections #russia #trolls #journalists
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
NBC News
Russian internet trolls hired U.S. journalists to push their news website, Facebook says
Facebook said the website is run by people affiliated with the Internet Research Agency, which inflamed political tensions in the 2016 election through social media.
Russia spreads fake news to disrupt elections in the USA
As it was to be expected, Russia is also trying to disrupt these elections in the USA. The following example shows how easy it is to fall for fake news.
βΌοΈ ... Fake News:
https://www.themoscowtimes.com/2020/09/01/millions-of-us-voters-details-leak-to-russias-dark-web-kommersant-a71307
π ππΌ michiganvoters.info - voterrecords.com
So be attentive, and don't let yourself be led up the slippery slope ;)
#fakenews #russia #usa #elections
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
As it was to be expected, Russia is also trying to disrupt these elections in the USA. The following example shows how easy it is to fall for fake news.
βΌοΈ ... Fake News:
https://www.themoscowtimes.com/2020/09/01/millions-of-us-voters-details-leak-to-russias-dark-web-kommersant-a71307
π ππΌ michiganvoters.info - voterrecords.com
So be attentive, and don't let yourself be led up the slippery slope ;)
#fakenews #russia #usa #elections
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
US Authorities Can Now Track the Privacy-Focused Monero Cryptocurrency
The leading crypto intelligence firm CipherTrace has developed a toolset to assist U.S. law enforcement to track the privacy-centric Monero cryptocurrency.
The cryptocurrency analytics firm CipherTrace has made the announcement that they have created a toolset designed to help trace transactions made using the privacy-centric Monero virtual currency β stating that they did so under contract with the U.S. Department of Homeland Security (DHS).
βΌοΈ Monero Can Now Be Tracked
A press release by CipherTrace stated that the goal behind development of the tracing tools was harnessed from the U.S. law enforcement need to track the transactions made across criminal networks using the Monero cryptocurrency.
The firm reflected on the fact that Monero has since grown to become the second most popular digital coin in the dark web β with estimate figures indicating that about 45 percent of dark web platforms have adopted Monero integration.
It is for the above reason that law enforcement interest has developed around the digital currency as the facilitator of darknet-backed cybercriminal enterprises. As mentioned already, Monero offers far better features than Bitcoin, including the ring signature mechanism to ensure user anonymity.
Ring signatures work to mix transactions so that when third party actors try to figure out the source of funds sent in Monero, it will appear as though multiple users participated in the transaction. The feature makes it virtually impossible for law enforcement agencies to identify the true sources of such funds.
π ππΌ https://tapeucwutvne7l5o.onion/us-authorities-can-now-track-the-privacy-focused-monero-cryptocurrency
π ππΌ https://ciphertrace.com/ciphertrace-announces-worlds-first-monero-tracing-capabilities/
#monero #cryptocurrency #ciphertrace #usa #authorities #tracing #Privacy #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
The leading crypto intelligence firm CipherTrace has developed a toolset to assist U.S. law enforcement to track the privacy-centric Monero cryptocurrency.
The cryptocurrency analytics firm CipherTrace has made the announcement that they have created a toolset designed to help trace transactions made using the privacy-centric Monero virtual currency β stating that they did so under contract with the U.S. Department of Homeland Security (DHS).
βΌοΈ Monero Can Now Be Tracked
A press release by CipherTrace stated that the goal behind development of the tracing tools was harnessed from the U.S. law enforcement need to track the transactions made across criminal networks using the Monero cryptocurrency.
The firm reflected on the fact that Monero has since grown to become the second most popular digital coin in the dark web β with estimate figures indicating that about 45 percent of dark web platforms have adopted Monero integration.
It is for the above reason that law enforcement interest has developed around the digital currency as the facilitator of darknet-backed cybercriminal enterprises. As mentioned already, Monero offers far better features than Bitcoin, including the ring signature mechanism to ensure user anonymity.
Ring signatures work to mix transactions so that when third party actors try to figure out the source of funds sent in Monero, it will appear as though multiple users participated in the transaction. The feature makes it virtually impossible for law enforcement agencies to identify the true sources of such funds.
π ππΌ https://tapeucwutvne7l5o.onion/us-authorities-can-now-track-the-privacy-focused-monero-cryptocurrency
π ππΌ https://ciphertrace.com/ciphertrace-announces-worlds-first-monero-tracing-capabilities/
#monero #cryptocurrency #ciphertrace #usa #authorities #tracing #Privacy #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Mastercard
Crypto Services & Payment Solutions by Mastercard
With the rise in the adoption of digital currencies, Mastercard provides crypto services that are designed to enhance trust & security when people shop & pay.
Norway: E-mail accounts of members of parliament hacked
Emails of some members of the Norwegian parliament have apparently been hacked. The exact extent of the data outflow is still unclear.
The Norwegian Parliament announced on Tuesday that data had leaked from the e-mail accounts of some members and staff. The parliamentary administration had reported the incident to the police and was working closely with the relevant security authorities, the press release said. The incident had apparently already been noticed last week.
π ππΌ https://www.stortinget.no/no/Hva-skjer-pa-Stortinget/Nyhetsarkiv/Pressemeldingsarkiv/2019-2020/it-angrep-mot-stortinget/
π ππΌ π©πͺ https://www.golem.de/news/norwegen-e-mail-accounts-von-abgeordneten-gehackt-2009-150627.html
#norway #hacker #hacked #representatives
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Emails of some members of the Norwegian parliament have apparently been hacked. The exact extent of the data outflow is still unclear.
The Norwegian Parliament announced on Tuesday that data had leaked from the e-mail accounts of some members and staff. The parliamentary administration had reported the incident to the police and was working closely with the relevant security authorities, the press release said. The incident had apparently already been noticed last week.
π ππΌ https://www.stortinget.no/no/Hva-skjer-pa-Stortinget/Nyhetsarkiv/Pressemeldingsarkiv/2019-2020/it-angrep-mot-stortinget/
π ππΌ π©πͺ https://www.golem.de/news/norwegen-e-mail-accounts-von-abgeordneten-gehackt-2009-150627.html
#norway #hacker #hacked #representatives
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Stortinget
IT-angrep mot Stortinget
Stortinget har den siste tiden vΓ¦rt utsatt for et omfattende IT-angrep. Det er registrert innbrudd pΓ₯ epost-kontoene hos et mindre antall stortingsrepresentanter og ansatte. VΓ₯re analyser viser at det er lastet ned ulike mengder data.
53: Shadow Brokers
Darknetdiaries - EP 53: Shadow Brokers
The NSA has some pretty advanced, super secret, hacking tools. What if these secret hacking tools were to end up in the wrong personβs hands? Well, that happened.
π§ ππΌ Darknetdiaries - EP 53: Shadow Brokers
https://darknetdiaries.com/episode/53/
#darknetdiaries #truecrime #podcast
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
The NSA has some pretty advanced, super secret, hacking tools. What if these secret hacking tools were to end up in the wrong personβs hands? Well, that happened.
π§ ππΌ Darknetdiaries - EP 53: Shadow Brokers
https://darknetdiaries.com/episode/53/
#darknetdiaries #truecrime #podcast
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
73: WannaCry
Darknetdiaries - EP 73: WannaCry
π‘ It is recommend to listen to episodes 53 βShadow Brokersβ, 71 βFDFFβ, and 72 βBangladesh Bank Heistβ before listening to this one.
In May 2017 the world fell victim to a major ransomware attack known as WannaCry. One of the victims was UKβs national health service. Security researchers scrambled to try to figure out how to stop it and who was behind it.
π§ ππΌ https://darknetdiaries.com/episode/73/
#darknetdiaries #truecrime #podcast
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
π‘ It is recommend to listen to episodes 53 βShadow Brokersβ, 71 βFDFFβ, and 72 βBangladesh Bank Heistβ before listening to this one.
In May 2017 the world fell victim to a major ransomware attack known as WannaCry. One of the victims was UKβs national health service. Security researchers scrambled to try to figure out how to stop it and who was behind it.
π§ ππΌ https://darknetdiaries.com/episode/73/
#darknetdiaries #truecrime #podcast
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Threema Goes Open Source, Welcomes New Partner
Strengthened Through Partnership
After an intense startup phase, Threema lays the foundation for continuity, further growth, and an acceleration of the product development thanks to the entry of the German-Swiss investment company Afinum Management AG.
Afinum fully shares our values regarding security and privacy protection. The additional resources gained through this partnership enable Threema to grow beyond the German-speaking part of Europe, and we can use our energy for visionary new ideas and projects. That said, Threemaβs founders β Manuel Kasper, Silvan Engeler, and Martin Blatter, all software developers β will continue to lead the company and still retain a significant ownership interest.
Open Source and Multi Device
Security and privacy protection are deeply ingrained in Threemaβs DNA, which is why our code gets reviewed externally on a regular basis. Within the next months, the Threema apps will become fully open source, supporting reproducible builds. This is to say that anyone will be able to independently review Threemaβs security and verify that the published source code corresponds to the downloaded app.
In the future, it will be possible to use multiple devices in parallel thanks to an innovative multi-device solution. In contrast to other approaches, no trace of personal data will be left behind on a server. Thanks to this technology, Threema can be used on a PC without a smartphone.
In conclusion, Threema will become even more trustworthy and even more convenient to use.
π ππΌ https://threema.ch/en/blog/posts/open-source-and-new-partner
#threema #opensource #afinum #swiss #germany
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Strengthened Through Partnership
After an intense startup phase, Threema lays the foundation for continuity, further growth, and an acceleration of the product development thanks to the entry of the German-Swiss investment company Afinum Management AG.
Afinum fully shares our values regarding security and privacy protection. The additional resources gained through this partnership enable Threema to grow beyond the German-speaking part of Europe, and we can use our energy for visionary new ideas and projects. That said, Threemaβs founders β Manuel Kasper, Silvan Engeler, and Martin Blatter, all software developers β will continue to lead the company and still retain a significant ownership interest.
Open Source and Multi Device
Security and privacy protection are deeply ingrained in Threemaβs DNA, which is why our code gets reviewed externally on a regular basis. Within the next months, the Threema apps will become fully open source, supporting reproducible builds. This is to say that anyone will be able to independently review Threemaβs security and verify that the published source code corresponds to the downloaded app.
In the future, it will be possible to use multiple devices in parallel thanks to an innovative multi-device solution. In contrast to other approaches, no trace of personal data will be left behind on a server. Thanks to this technology, Threema can be used on a PC without a smartphone.
In conclusion, Threema will become even more trustworthy and even more convenient to use.
π ππΌ https://threema.ch/en/blog/posts/open-source-and-new-partner
#threema #opensource #afinum #swiss #germany
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
threema.ch
Threema Goes Open Source, Welcomes New Partner
To Surveil and Predict - A Human Rights Analysis of Algorithmic Policing in Canada
This publication is the result of an investigation by the Citizen Lab at the Munk School of Global Affairs & Public Policy and the University of Torontoβs International Human Rights Program (IHRP) at the Faculty of Law. Read the full report and our explanatory guide that provides a summary of research findings as well as questions and answers from the research team.
π ππΌ Read the full report (PDF)
https://citizenlab.ca/wp-content/uploads/2020/09/To-Surveil-and-Predict.pdf
π ππΌ Algorithmic Policing in Canada Explained
https://citizenlab.ca/2020/09/algorithmic-policing-in-canada-explained/
π ππΌ https://citizenlab.ca/2020/09/to-surveil-and-predict-a-human-rights-analysis-of-algorithmic-policing-in-canada/
#algorithmic #policing #canada #study #analysis #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
This publication is the result of an investigation by the Citizen Lab at the Munk School of Global Affairs & Public Policy and the University of Torontoβs International Human Rights Program (IHRP) at the Faculty of Law. Read the full report and our explanatory guide that provides a summary of research findings as well as questions and answers from the research team.
π ππΌ Read the full report (PDF)
https://citizenlab.ca/wp-content/uploads/2020/09/To-Surveil-and-Predict.pdf
π ππΌ Algorithmic Policing in Canada Explained
https://citizenlab.ca/2020/09/algorithmic-policing-in-canada-explained/
π ππΌ https://citizenlab.ca/2020/09/to-surveil-and-predict-a-human-rights-analysis-of-algorithmic-policing-in-canada/
#algorithmic #policing #canada #study #analysis #pdf
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Warner Music Group finds hackers compromised its online stores
NOTICE OF DATA BREACH
On August 5, 2020, we learned that an unauthorized third party had compromised a number of US-based e-commerce
websites WMG operates but that are hosted and supported by an external service provider. This allowed the unauthorized third party to potentially acquire a copy of the personal information you entered into one or more of the affected website(s) between April 25, 2020 and August 5, 2020.
While we cannot definitively confirm that your personal information was affected, it is possible that it might have been
as your transaction(s) occurred during the period of compromise. If it was, this might have exposed you to a risk of
fraudulent transactions being carried out using your details.
π ππΌ https://assets.documentcloud.org/documents/7201631/Warner-Music-Group-Breach-Letter-BC.txt
π ππΌ (PDF)
https://assets.documentcloud.org/documents/7201631/Warner-Music-Group-Breach-Letter-BC.pdf
π ππΌ https://www.bleepingcomputer.com/news/security/warner-music-group-finds-hackers-compromised-its-online-stores/
#warner #music #breach #hackers
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
NOTICE OF DATA BREACH
On August 5, 2020, we learned that an unauthorized third party had compromised a number of US-based e-commerce
websites WMG operates but that are hosted and supported by an external service provider. This allowed the unauthorized third party to potentially acquire a copy of the personal information you entered into one or more of the affected website(s) between April 25, 2020 and August 5, 2020.
While we cannot definitively confirm that your personal information was affected, it is possible that it might have been
as your transaction(s) occurred during the period of compromise. If it was, this might have exposed you to a risk of
fraudulent transactions being carried out using your details.
π ππΌ https://assets.documentcloud.org/documents/7201631/Warner-Music-Group-Breach-Letter-BC.txt
π ππΌ (PDF)
https://assets.documentcloud.org/documents/7201631/Warner-Music-Group-Breach-Letter-BC.pdf
π ππΌ https://www.bleepingcomputer.com/news/security/warner-music-group-finds-hackers-compromised-its-online-stores/
#warner #music #breach #hackers
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
rC3 β remote Chaos Experience
This year, CCC hosts the Remote Chaos Experience (rC3) instead of an on-site event in Leipzig.
π‘ This endeavor requires creativity, joy of experimentation and active support.
A face-to-face event with 17,000 people will be neither responsible nor legally feasible this year. But after this tedious and painful 2020, we really deserve a nice finale!
This is why the rC3 β Remote Chaos Experience will be held.
As much as virtually possible, we want to convey the joy, content, togetherness and wonderful madness that make up a Chaos Communication Congress.
Hackers are used to remote work and online meetings. This makes our annual face-to-face meetings all the more important. Of course, it will be difficult to re-enact online all the things that make Congress what it is for us.
But then someone said it would be impossible. Our ambition was aroused.
Just like every year, we want to see the concentrated energy and creativity of hackers with dedication.
π ππΌ https://events.ccc.de/2020/09/04/rc3-remote-chaos-experience/#english
#rC3 #CCC #RemoteChaosExperience
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
This year, CCC hosts the Remote Chaos Experience (rC3) instead of an on-site event in Leipzig.
π‘ This endeavor requires creativity, joy of experimentation and active support.
A face-to-face event with 17,000 people will be neither responsible nor legally feasible this year. But after this tedious and painful 2020, we really deserve a nice finale!
This is why the rC3 β Remote Chaos Experience will be held.
As much as virtually possible, we want to convey the joy, content, togetherness and wonderful madness that make up a Chaos Communication Congress.
Hackers are used to remote work and online meetings. This makes our annual face-to-face meetings all the more important. Of course, it will be difficult to re-enact online all the things that make Congress what it is for us.
But then someone said it would be impossible. Our ambition was aroused.
Just like every year, we want to see the concentrated energy and creativity of hackers with dedication.
π ππΌ https://events.ccc.de/2020/09/04/rc3-remote-chaos-experience/#english
#rC3 #CCC #RemoteChaosExperience
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
AlphaBay Darknet Market Moderator Handed 11-Year Prison Sentence
A former AlphaBay market moderator has been sentenced to 11 years in prison
A Colorado man who served as moderator for the now-defunct AlphaBay dark web market is set to spend 11 years of his life in prison.
Through a press statement by the U.S. Department of Justice (DOJ), authorities announced that the 26-year-old Bryan Connor Herrell has been sentenced by the U.S. District Court Judge Dale Drozd to 11 years behind bars.
The convict had initially faced charges in June 2019 for the part he played in enabling the sale of illicit goods and services via the AlphaBay market. The court session took place in the Eastern District of California, with the defendant pleading guilty in January 2020.
Reportedly, the DOJ had planned to set a hearing date for the manβs sentencing in May, but took place just recently owing to the government-sanctioned restrictions related to the current global COVID-19 crisis.
π ππΌ https://tapeucwutvne7l5o.onion/alphabay-darknet-market-moderator-handed-11-year-prison-sentence
π ππΌ https://www.justice.gov/opa/pr/colorado-man-sentenced-11-years-prison-moderating-disputes-darknet-marketplace-alphabay
#alphabay #marketplace #darknet #moderator #prison
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
A former AlphaBay market moderator has been sentenced to 11 years in prison
A Colorado man who served as moderator for the now-defunct AlphaBay dark web market is set to spend 11 years of his life in prison.
Through a press statement by the U.S. Department of Justice (DOJ), authorities announced that the 26-year-old Bryan Connor Herrell has been sentenced by the U.S. District Court Judge Dale Drozd to 11 years behind bars.
The convict had initially faced charges in June 2019 for the part he played in enabling the sale of illicit goods and services via the AlphaBay market. The court session took place in the Eastern District of California, with the defendant pleading guilty in January 2020.
Reportedly, the DOJ had planned to set a hearing date for the manβs sentencing in May, but took place just recently owing to the government-sanctioned restrictions related to the current global COVID-19 crisis.
π ππΌ https://tapeucwutvne7l5o.onion/alphabay-darknet-market-moderator-handed-11-year-prison-sentence
π ππΌ https://www.justice.gov/opa/pr/colorado-man-sentenced-11-years-prison-moderating-disputes-darknet-marketplace-alphabay
#alphabay #marketplace #darknet #moderator #prison
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
www.justice.gov
Colorado Man Sentenced to 11 Years in Prison for Moderating Disputes
A Colorado man was sentenced today by U.S. District Court Judge Dale A. Drozd to 11 years in prison.
Maltrail
Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g.
π‘Architecture
Maltrail is based on the Traffic -> Sensor <-> Server <-> Client architecture. Sensor(s) is a standalone component running on the monitoring node (e.g. Linux platform connected passively to the SPAN/mirroring port or transparently inline on a Linux bridge) or at the standalone machine (e.g. Honeypot) where it "monitors" the passing Traffic for blacklisted items/trails (i.e. domain names, URLs and/or IPs). In case of a positive match, it sends the event details to the (central) Server where they are being stored inside the appropriate logging directory (i.e. LOG_DIR described in the Configuration section). If Sensor is being run on the same machine as Server (default configuration), logs are stored directly into the local logging directory. Otherwise, they are being sent via UDP messages to the remote server (i.e. LOG_SERVER described in the Configuration section).
π ππΌ https://github.com/stamparm/maltrail#introduction
π ππΌ ipsum:
https://github.com/stamparm/ipsum
#stamparm #maltrail #ipsum #tool #malicious #detection #blacklist
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g.
zvpprsensinaix.com for Banjori malware), URL (e.g. hXXp://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic mechanisms that can help in discovery of unknown threats (e.g. new malware).π‘Architecture
Maltrail is based on the Traffic -> Sensor <-> Server <-> Client architecture. Sensor(s) is a standalone component running on the monitoring node (e.g. Linux platform connected passively to the SPAN/mirroring port or transparently inline on a Linux bridge) or at the standalone machine (e.g. Honeypot) where it "monitors" the passing Traffic for blacklisted items/trails (i.e. domain names, URLs and/or IPs). In case of a positive match, it sends the event details to the (central) Server where they are being stored inside the appropriate logging directory (i.e. LOG_DIR described in the Configuration section). If Sensor is being run on the same machine as Server (default configuration), logs are stored directly into the local logging directory. Otherwise, they are being sent via UDP messages to the remote server (i.e. LOG_SERVER described in the Configuration section).
π ππΌ https://github.com/stamparm/maltrail#introduction
π ππΌ ipsum:
https://github.com/stamparm/ipsum
#stamparm #maltrail #ipsum #tool #malicious #detection #blacklist
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
GitHub
GitHub - stamparm/maltrail: Malicious traffic detection system
Malicious traffic detection system. Contribute to stamparm/maltrail development by creating an account on GitHub.
Florida congressman wants Edward Snowden pardoned
TALLAHASSE, Fla. (CBS12) β U.S. Rep. Matt Gaetz (FL-1) wants Edward Snowden, the National Security Agency whistleblower, pardoned.
Gaetz simply issued a one-word tweet with Snowden tagged on Thursday.
Snowden, 31, is a former CIA subcontractor who exposed the NSA's mass surveillance programs and capabilities in 2013. Snowden was charged with violating the Espionage Act and could face up to 30 years in prison. Because the US is pursuing his extradition, Snowden is now exiled in Russia.
On Wednesday, Snowden re-tweeted the ACLU, which reported that a U.S. federal court ruled that the NSA's bulk collection of Americans' phone records was illegal, saying "seven years ago, as the news declared I was being charged as a criminal for speaking the truth, I never imagined that I would live to see our courts condemn the NSA's activities as unlawful."
π ππΌ https://cbs12.com/news/local/florida-congressman-wants-edward-snowden-pardoned
#snowden #whistleblower #usa #congressman
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
TALLAHASSE, Fla. (CBS12) β U.S. Rep. Matt Gaetz (FL-1) wants Edward Snowden, the National Security Agency whistleblower, pardoned.
Gaetz simply issued a one-word tweet with Snowden tagged on Thursday.
Snowden, 31, is a former CIA subcontractor who exposed the NSA's mass surveillance programs and capabilities in 2013. Snowden was charged with violating the Espionage Act and could face up to 30 years in prison. Because the US is pursuing his extradition, Snowden is now exiled in Russia.
On Wednesday, Snowden re-tweeted the ACLU, which reported that a U.S. federal court ruled that the NSA's bulk collection of Americans' phone records was illegal, saying "seven years ago, as the news declared I was being charged as a criminal for speaking the truth, I never imagined that I would live to see our courts condemn the NSA's activities as unlawful."
π ππΌ https://cbs12.com/news/local/florida-congressman-wants-edward-snowden-pardoned
#snowden #whistleblower #usa #congressman
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
WPEC
Florida congressman wants Edward Snowden pardoned
U. S. Rep. Matt Gaetz (FL-1) wants Edward Snowden, the National Security Agency whistleblower, pardoned. Gaetz simply issued a one-word tweet with Snowden tagged on Thursday. Snowden, 31, is a former CIA subcontractor who exposed the NSA's mass surveillanceβ¦
Itβs Time to Dismantle the DEA
For nearly 50 years, the Drug Enforcement Administration (DEA) has fueled mass incarceration, wasted taxpayer money, abused its authority and blocked scientific research.
Itβs time for change.
By Every Measure the DEA and its Drug War Have Failed
The DEA was established in 1973 ostensibly to consolidate drug enforcement activities into a βsuperagencyβ that would bring together federal drug enforcement resources. In the last 50 years, itβs been a tremendous waste of resources and left a wake of devastation in the United States and abroad.
DEA personnel have repeatedly engaged in unlawful operations, spent lavishly, ignored civil rights, packed federal prisons, and still failed to make a significant impact on drug supply. Meanwhile, Congress has engaged in little scrutiny of the agency, its actions or its budget.
WASTING TAXPAYER FUNDS
The DEA is the central player in the failed war on drugs. When the DEA was created in 1973, it started with less than $75 million. In fiscal year 2020 U.S. taxpayers spent more than $3.1 billion on the DEA. President Trump asked for even more for fiscal year 2021 - a staggering $3.5 billion, with more than $520 million specifically for its international programs.
What has it done with all that money?
It has facilitated the growth of paramilitary forces on U.S. soil, expanded surveillance, and embedded itself in communities throughout the U.S. and abroad. It has directly participated in domestic enforcement at the local level and even conducted its own research and public propaganda campaigns.
Ten percent of its Special Agent and Intelligence Analysts are permanently stationed overseas conducting drug interdiction, including undercover operations, surveillance, money laundering, paying informants, and facilitating arrests. Internationally, the DEA-led drug war has contributed to increased violence in many countries, as well as political and economic instability.
π ππΌ https://www.drugpolicy.org/DEA
#dea #timeforchange #drugpolicy #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
For nearly 50 years, the Drug Enforcement Administration (DEA) has fueled mass incarceration, wasted taxpayer money, abused its authority and blocked scientific research.
Itβs time for change.
By Every Measure the DEA and its Drug War Have Failed
The DEA was established in 1973 ostensibly to consolidate drug enforcement activities into a βsuperagencyβ that would bring together federal drug enforcement resources. In the last 50 years, itβs been a tremendous waste of resources and left a wake of devastation in the United States and abroad.
DEA personnel have repeatedly engaged in unlawful operations, spent lavishly, ignored civil rights, packed federal prisons, and still failed to make a significant impact on drug supply. Meanwhile, Congress has engaged in little scrutiny of the agency, its actions or its budget.
WASTING TAXPAYER FUNDS
The DEA is the central player in the failed war on drugs. When the DEA was created in 1973, it started with less than $75 million. In fiscal year 2020 U.S. taxpayers spent more than $3.1 billion on the DEA. President Trump asked for even more for fiscal year 2021 - a staggering $3.5 billion, with more than $520 million specifically for its international programs.
What has it done with all that money?
It has facilitated the growth of paramilitary forces on U.S. soil, expanded surveillance, and embedded itself in communities throughout the U.S. and abroad. It has directly participated in domestic enforcement at the local level and even conducted its own research and public propaganda campaigns.
Ten percent of its Special Agent and Intelligence Analysts are permanently stationed overseas conducting drug interdiction, including undercover operations, surveillance, money laundering, paying informants, and facilitating arrests. Internationally, the DEA-led drug war has contributed to increased violence in many countries, as well as political and economic instability.
π ππΌ https://www.drugpolicy.org/DEA
#dea #timeforchange #drugpolicy #thinkabout
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Drug Policy Alliance
DEA - Drug Policy Alliance