Exclusive: Government officials around the globe targeted for hacking through WhatsApp
WASHINGTON (Reuters) - Senior government officials in multiple U.S.-allied countries were targeted earlier this year with hacking software that used Facebook Inc's (FB.O) WhatsApp to take over users' phones, according to people familiar with the messaging company's investigation.
Sources familiar with WhatsApp’s internal investigation into the breach said a “significant” portion of the known victims are high-profile government and military officials spread across at least 20 countries on five continents. Many of the nations are U.S. allies, they said.
The hacking of a wider group of top government officials' smartphones than previously reported suggests the WhatsApp cyber intrusion could have broad political and diplomatic consequences.
WhatsApp filed a lawsuit on Tuesday against Israeli hacking tool developer NSO Group. The Facebook-owned software giant alleges that NSO Group built and sold a hacking platform that exploited a flaw in WhatsApp-owned servers to help clients hack into the cellphones of at least 1,400 users between April 29, 2019, and May 10, 2019.
The total number of WhatsApp users hacked could be even higher. A London-based human rights lawyer, who was among the targets, sent Reuters photographs showing attempts to break into his phone dating back to April 1.
While it is not clear who used the software to hack officials' phones, NSO has said it sells its spyware exclusively to government customers.
👉🏼 Read more:
https://uk.mobile.reuters.com/article/amp/idUKKBN1XA27N
#WhatsApp #Hack #government #military
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
WASHINGTON (Reuters) - Senior government officials in multiple U.S.-allied countries were targeted earlier this year with hacking software that used Facebook Inc's (FB.O) WhatsApp to take over users' phones, according to people familiar with the messaging company's investigation.
Sources familiar with WhatsApp’s internal investigation into the breach said a “significant” portion of the known victims are high-profile government and military officials spread across at least 20 countries on five continents. Many of the nations are U.S. allies, they said.
The hacking of a wider group of top government officials' smartphones than previously reported suggests the WhatsApp cyber intrusion could have broad political and diplomatic consequences.
WhatsApp filed a lawsuit on Tuesday against Israeli hacking tool developer NSO Group. The Facebook-owned software giant alleges that NSO Group built and sold a hacking platform that exploited a flaw in WhatsApp-owned servers to help clients hack into the cellphones of at least 1,400 users between April 29, 2019, and May 10, 2019.
The total number of WhatsApp users hacked could be even higher. A London-based human rights lawyer, who was among the targets, sent Reuters photographs showing attempts to break into his phone dating back to April 1.
While it is not clear who used the software to hack officials' phones, NSO has said it sells its spyware exclusively to government customers.
👉🏼 Read more:
https://uk.mobile.reuters.com/article/amp/idUKKBN1XA27N
#WhatsApp #Hack #government #military
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Emails about Russia’s 2018 World Cup bid appear to be for sale online
Anonymous Telegram account indicates emails for sale after reports emerge of dossier on how to bribe Fifa officials
An anonymously run Telegram account has indicated that it wants to sell a tranche of emails relating to Russia’s 2018 World Cup bid, after reports that they contain a dossier compiled by Russian officials on how to bribe Fifa executive council members.
The existence of the emails was first reported by the investigative website the Insider. According to the Insider, an aide to the former footballer Franz Beckenbauer promised to deliver his vote in exchange for “generous compensation for his consulting services”, later specified as at least €3m.
A Cypriot Fifa executive’s vote could be bought for €1.5m, and the former Fifa vice-president Jack Warner would vote for “whoever offers him the most”, the Insider report says.
The dossier also reportedly contains extensive background information about the council members, and even includes psychological profiles. It reportedly said the British football executive Geoff Thompson could be swayed through “diplomatic channels [and] expensive gifts to his wife, who has a strong influence on him”.
There is no suggestion that the Russian officials acted on the dossier, nor of any wrongdoing by those named. Thompson, who was at the time the head of England’s rival World Cup bid, has denied his wife was offered any gifts.
Warner has been banned for life by Fifa’s ethics committee, and Sepp Blatter and the former France captain Michel Platini, who are both profiled in the dossier, each received an eight-year ban from football in 2011.
The emails purportedly come from the account of Sergei Kapkov, a Russian politician and former head of the country’s national football academy, and are in the possession of an anonymously run Telegram channel called BlackMirror.
👉🏼 Read more:
https://www.theguardian.com/world/2019/nov/01/emails-about-russia-2018-world-cup-bid-being-offered-online
#BlackMirror #emails #russia #worldcup #fifa
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Anonymous Telegram account indicates emails for sale after reports emerge of dossier on how to bribe Fifa officials
An anonymously run Telegram account has indicated that it wants to sell a tranche of emails relating to Russia’s 2018 World Cup bid, after reports that they contain a dossier compiled by Russian officials on how to bribe Fifa executive council members.
The existence of the emails was first reported by the investigative website the Insider. According to the Insider, an aide to the former footballer Franz Beckenbauer promised to deliver his vote in exchange for “generous compensation for his consulting services”, later specified as at least €3m.
A Cypriot Fifa executive’s vote could be bought for €1.5m, and the former Fifa vice-president Jack Warner would vote for “whoever offers him the most”, the Insider report says.
The dossier also reportedly contains extensive background information about the council members, and even includes psychological profiles. It reportedly said the British football executive Geoff Thompson could be swayed through “diplomatic channels [and] expensive gifts to his wife, who has a strong influence on him”.
There is no suggestion that the Russian officials acted on the dossier, nor of any wrongdoing by those named. Thompson, who was at the time the head of England’s rival World Cup bid, has denied his wife was offered any gifts.
Warner has been banned for life by Fifa’s ethics committee, and Sepp Blatter and the former France captain Michel Platini, who are both profiled in the dossier, each received an eight-year ban from football in 2011.
The emails purportedly come from the account of Sergei Kapkov, a Russian politician and former head of the country’s national football academy, and are in the possession of an anonymously run Telegram channel called BlackMirror.
👉🏼 Read more:
https://www.theguardian.com/world/2019/nov/01/emails-about-russia-2018-world-cup-bid-being-offered-online
#BlackMirror #emails #russia #worldcup #fifa
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
LEOPOLD-BUZZFEED-NEWS-FBI-Mueller-302s-FOIA.pdf
78 MB
The Mueller Report’s Secret Memos
BuzzFeed News sued the US government to see all the work that Mueller’s team kept secret. We have published the first installment, with revelations about the Ukraine conspiracy theory
👀 PDF:
https://assets.documentcloud.org/documents/6537542/LEOPOLD-BUZZFEED-NEWS-FBI-Mueller-302s-FOIA.pdf
👉🏼 Read more:
https://www.buzzfeednews.com/article/jasonleopold/mueller-report-secret-memos-1
#FBI #Mueller #report #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
BuzzFeed News sued the US government to see all the work that Mueller’s team kept secret. We have published the first installment, with revelations about the Ukraine conspiracy theory
👀 PDF:
https://assets.documentcloud.org/documents/6537542/LEOPOLD-BUZZFEED-NEWS-FBI-Mueller-302s-FOIA.pdf
👉🏼 Read more:
https://www.buzzfeednews.com/article/jasonleopold/mueller-report-secret-memos-1
#FBI #Mueller #report #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
A network of ‘camgirl’ sites exposed millions of users and sex workers
A number of popular “camgirl” sites have exposed millions of sex workers and users after the company running the sites left the back-end database unprotected.
The sites, run by Barcelona-based VTS Media, include amateur.tv, webcampornoxxx.net, and placercams.com. Most of the sites’ users are based in Spain and Europe, but we found evidence of users across the world, including the United States.
According to Alexa traffic rankings, amateur.tv is one of the most popular in Spain.
The database, containing months-worth of daily logs of the site activities, was left without a password for weeks. Those logs included detailed records of when users logged in — including usernames and sometimes their user-agents and IP addresses, which can be used to identify users. The logs also included users’ private chat messages with other users, as well as promotional emails they were receiving from the various sites. The logs even included failed login attempts, storing usernames and passwords in plaintext. We did not test the credentials as doing so would be unlawful.
The exposed data also revealed which videos users were watching and renting, exposing kinks and private sexual preferences.
In all, the logs were detailed enough to see which users were logging in, from where, and often their email addresses or other identifiable information — which in some cases we could match to real-world identities.
Not only were users affected, the “camgirls” — who broadcast sexual content to viewers — also had some of their account information exposed.
The database was shut off last week, allowing us to publish our findings.
👉🏼 Read more:
https://techcrunch.com/2019/11/03/camgirl-network-exposed-millions-users
#leak #spain #sexcam #network #exposed
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
A number of popular “camgirl” sites have exposed millions of sex workers and users after the company running the sites left the back-end database unprotected.
The sites, run by Barcelona-based VTS Media, include amateur.tv, webcampornoxxx.net, and placercams.com. Most of the sites’ users are based in Spain and Europe, but we found evidence of users across the world, including the United States.
According to Alexa traffic rankings, amateur.tv is one of the most popular in Spain.
The database, containing months-worth of daily logs of the site activities, was left without a password for weeks. Those logs included detailed records of when users logged in — including usernames and sometimes their user-agents and IP addresses, which can be used to identify users. The logs also included users’ private chat messages with other users, as well as promotional emails they were receiving from the various sites. The logs even included failed login attempts, storing usernames and passwords in plaintext. We did not test the credentials as doing so would be unlawful.
The exposed data also revealed which videos users were watching and renting, exposing kinks and private sexual preferences.
In all, the logs were detailed enough to see which users were logging in, from where, and often their email addresses or other identifiable information — which in some cases we could match to real-world identities.
Not only were users affected, the “camgirls” — who broadcast sexual content to viewers — also had some of their account information exposed.
The database was shut off last week, allowing us to publish our findings.
👉🏼 Read more:
https://techcrunch.com/2019/11/03/camgirl-network-exposed-millions-users
#leak #spain #sexcam #network #exposed
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Nebulo – DNS over HTTPS/TLS: Our Interview with the Developer
Nebulo – DNS over HTTPS/TLS is a small but neat Android app to make the internet a little bit safer for us. But for users who just want less advertising on their devices, Nebulo is an interesting option. Many interesting questions have come together thanks to the help of our readers.
Nebulo – DNS over HTTPS/TLS 👀
As mentioned before, Nebulo comes with a few features that can be quite practical for us in everyday life.
💡 one-time configuration at the beginning, after that you don’t have to worry about anything anymore
💡 the provider promises: no advertising and no tracking!
💡 own servers can be specified
💡 comparatively low battery consumption, which is important for smartphone users
💡 also works without root.
If you like, you have the possibility to participate actively in the Nebulo Telegram support group. In the support group, you can always find the latest app version to download, or of course you can report bugs and make suggestions. Nebulo can also be found in the Google Play Store, on F-Droid or in the Aurora Droid as well as on GitLab.
Daniel Wolf and the Nebulo DNS App: our interview with the developer
Tarnkappe.info: Daniel, why do you concentrate on Android? Because it’s the better mobile OS? Or because it was easier to develop the DNS changer app for it, or get it approved by the app store operator?
Daniel Wolf: That’s a quick question to answer. Before I made Android apps, I programmed with Java. I also had an Android mobile phone, so the choice was obvious.
DNS Changer itself was created because I needed it myself.
👉🏼 Read more:
https://tarnkappe.info/nebulo-dns-over-https-tls-our-interview-with-the-developer/
#Nebulo #App #DNS #changer #interview
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Nebulo – DNS over HTTPS/TLS is a small but neat Android app to make the internet a little bit safer for us. But for users who just want less advertising on their devices, Nebulo is an interesting option. Many interesting questions have come together thanks to the help of our readers.
Nebulo – DNS over HTTPS/TLS 👀
As mentioned before, Nebulo comes with a few features that can be quite practical for us in everyday life.
💡 one-time configuration at the beginning, after that you don’t have to worry about anything anymore
💡 the provider promises: no advertising and no tracking!
💡 own servers can be specified
💡 comparatively low battery consumption, which is important for smartphone users
💡 also works without root.
If you like, you have the possibility to participate actively in the Nebulo Telegram support group. In the support group, you can always find the latest app version to download, or of course you can report bugs and make suggestions. Nebulo can also be found in the Google Play Store, on F-Droid or in the Aurora Droid as well as on GitLab.
Daniel Wolf and the Nebulo DNS App: our interview with the developer
Tarnkappe.info: Daniel, why do you concentrate on Android? Because it’s the better mobile OS? Or because it was easier to develop the DNS changer app for it, or get it approved by the app store operator?
Daniel Wolf: That’s a quick question to answer. Before I made Android apps, I programmed with Java. I also had an Android mobile phone, so the choice was obvious.
DNS Changer itself was created because I needed it myself.
👉🏼 Read more:
https://tarnkappe.info/nebulo-dns-over-https-tls-our-interview-with-the-developer/
#Nebulo #App #DNS #changer #interview
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Social media as a gateway for manipulation
Freedom on the Internet has fallen for the ninth consecutive year, a new Freedom House report notes. Unregulated social media are particularly well suited to distorting debates and manipulating elections.
https://www.freedomonthenet.org/report/freedom-on-the-net/2019/the-crisis-of-social-media
#socialmedia #manipulation #report #FreedomHouse #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Freedom on the Internet has fallen for the ninth consecutive year, a new Freedom House report notes. Unregulated social media are particularly well suited to distorting debates and manipulating elections.
https://www.freedomonthenet.org/report/freedom-on-the-net/2019/the-crisis-of-social-media
#socialmedia #manipulation #report #FreedomHouse #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
facebook-sealed-exhibits.pdf
627.5 MB
Facebook fought to keep a trove of thousands of explosive internal documents and emails secret. They were just published online in full.
Thousands of pages of internal Facebook documents were published on Wednesday, shedding new light on how the company profited from user data and grappled with rivals.
👉🏼 Read more:
https://www.businessinsider.nl/facebook-internal-documents-executive-emails-published-six4three-court-leak-2019-11
#DeleteFacebook #documents #secret #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Thousands of pages of internal Facebook documents were published on Wednesday, shedding new light on how the company profited from user data and grappled with rivals.
👉🏼 Read more:
https://www.businessinsider.nl/facebook-internal-documents-executive-emails-published-six4three-court-leak-2019-11
#DeleteFacebook #documents #secret #pdf
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Your DNA Profile is Private? A Florida Judge Just Said Otherwise
Privacy experts say a warrant granted in Florida could set a precedent, opening up all consumer DNA sites to law enforcement agencies across the country.
For police officers around the country, the genetic profiles that 20 million people have uploaded to consumer DNA sites represent a tantalizing resource that could be used to solve cases both new and cold. But for years, the vast majority of the data have been off limits to investigators. The two largest sites, Ancestry.com and 23andMe, have long pledged to keep their users’ genetic information private, and a smaller one, GEDmatch, severely restricted police access to its records this year.
Last week, however, a Florida detective announced at a police convention that he had obtained a warrant to penetrate GEDmatch and search its full database of nearly one million users. Legal experts said that this appeared to be the first time a judge had approved such a warrant, and that the development could have profound implications for genetic privacy.
“That’s a huge game-changer,” said Erin Murphy, a law professor at New York University. “The company made a decision to keep law enforcement out, and that’s been overridden by a court. It’s a signal that no genetic information can be safe.”
DNA policy experts said the development was likely to encourage other agencies to request similar search warrants from 23andMe, which has 10 million users, and Ancestry.com, which has 15 million. If that comes to pass, the Florida judge’s decision will affect not only the users of these sites but huge swaths of the population, including those who have never taken a DNA test. That’s because this emerging forensic technique makes it possible to identify a DNA profile even through distant family relationships.
👉🏼 Read more:
https://www.nytimes.com/2019/11/05/business/dna-database-search-warrant.html
#DNA #profile #law #enforcement #database #forensic #search #warrant
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Privacy experts say a warrant granted in Florida could set a precedent, opening up all consumer DNA sites to law enforcement agencies across the country.
For police officers around the country, the genetic profiles that 20 million people have uploaded to consumer DNA sites represent a tantalizing resource that could be used to solve cases both new and cold. But for years, the vast majority of the data have been off limits to investigators. The two largest sites, Ancestry.com and 23andMe, have long pledged to keep their users’ genetic information private, and a smaller one, GEDmatch, severely restricted police access to its records this year.
Last week, however, a Florida detective announced at a police convention that he had obtained a warrant to penetrate GEDmatch and search its full database of nearly one million users. Legal experts said that this appeared to be the first time a judge had approved such a warrant, and that the development could have profound implications for genetic privacy.
“That’s a huge game-changer,” said Erin Murphy, a law professor at New York University. “The company made a decision to keep law enforcement out, and that’s been overridden by a court. It’s a signal that no genetic information can be safe.”
DNA policy experts said the development was likely to encourage other agencies to request similar search warrants from 23andMe, which has 10 million users, and Ancestry.com, which has 15 million. If that comes to pass, the Florida judge’s decision will affect not only the users of these sites but huge swaths of the population, including those who have never taken a DNA test. That’s because this emerging forensic technique makes it possible to identify a DNA profile even through distant family relationships.
👉🏼 Read more:
https://www.nytimes.com/2019/11/05/business/dna-database-search-warrant.html
#DNA #profile #law #enforcement #database #forensic #search #warrant
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
An Infamous Neo-Nazi Forum Just Got Doxxed
A cache of data exposes the logins, emails, and IP addresses of users on IronMarch, a defunct neo-Nazi forum considered the birthplace of several militant organizations.
It’s no secret that neo-Nazis freely post anonymously all over the internet, every single day. But a recent leak shows that white nationalists online can’t always protect their identities.
The metadata of a now-defunct neo-Nazi message board that is considered the birthplace of several militant organizations—among them the U.S.-based terror group Atomwaffen Division—was dumped onto the internet by what appears to be anti-fascist activists.
The site, IronMarch, is widely associated with the rise of the new wave of white supremacist accelerationst groups advocating for armed insurgency against society. The site ran from 2011 to 2017 and garnered more than 150,000 posts while active. The dump of its inner workings includes the login names of its former members and their associated emails and IP addresses.
Although Motherboard could not verify all the contents of the dump, early record searches match names and details of white nationalist militants tracked by Motherboard over the course of a two-year investigation into neo-Nazi terrorism. The dump also matched internal IronMarch data that Motherboard already accessed.
The identity of whoever originally obtained the data isn’t known, but the dump was uploaded to the Internet Archive by a user named “antifa-data” on November 6.
👉🏼 Read more:
https://www.vice.com/en_us/article/a359q8/an-infamous-neo-nazi-forum-just-got-doxxed
💡 https://www.bellingcat.com/resources/how-tos/2019/11/06/massive-white-supremacist-message-board-leak-how-to-access-and-interpret-the-data/
💾 Leaked Data (Torrent):
https://www.bthub.me/hash/1d0554862068bfaba9bd2fc6f75cb69fa420c834
#doxxed #nazi #forum #IronMarch #AtomwaffenDivision #leak #breach
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
A cache of data exposes the logins, emails, and IP addresses of users on IronMarch, a defunct neo-Nazi forum considered the birthplace of several militant organizations.
It’s no secret that neo-Nazis freely post anonymously all over the internet, every single day. But a recent leak shows that white nationalists online can’t always protect their identities.
The metadata of a now-defunct neo-Nazi message board that is considered the birthplace of several militant organizations—among them the U.S.-based terror group Atomwaffen Division—was dumped onto the internet by what appears to be anti-fascist activists.
The site, IronMarch, is widely associated with the rise of the new wave of white supremacist accelerationst groups advocating for armed insurgency against society. The site ran from 2011 to 2017 and garnered more than 150,000 posts while active. The dump of its inner workings includes the login names of its former members and their associated emails and IP addresses.
Although Motherboard could not verify all the contents of the dump, early record searches match names and details of white nationalist militants tracked by Motherboard over the course of a two-year investigation into neo-Nazi terrorism. The dump also matched internal IronMarch data that Motherboard already accessed.
The identity of whoever originally obtained the data isn’t known, but the dump was uploaded to the Internet Archive by a user named “antifa-data” on November 6.
👉🏼 Read more:
https://www.vice.com/en_us/article/a359q8/an-infamous-neo-nazi-forum-just-got-doxxed
💡 https://www.bellingcat.com/resources/how-tos/2019/11/06/massive-white-supremacist-message-board-leak-how-to-access-and-interpret-the-data/
💾 Leaked Data (Torrent):
https://www.bthub.me/hash/1d0554862068bfaba9bd2fc6f75cb69fa420c834
#doxxed #nazi #forum #IronMarch #AtomwaffenDivision #leak #breach
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Gaggle Knows Everything About Teens And Kids In School
Gaggle monitors the work and communications of almost 5 million students in the US, and schools are paying big money for its services. Hundreds of company documents unveil a sprawling surveillance industrial complex that targets kids who can’t opt out.
For the 1,300 students of Santa Fe High School, participating in school life means producing a digital trail — homework assignments, essays, emails, pictures, creative writing, songs they've written, and chats with friends and classmates.
All of it is monitored by student surveillance service Gaggle, which promises to keep Santa Fe High School kids free from harm.
Santa Fe High, located in Santa Fe, Texas, is one of more than 1,400 schools that have taken Gaggle up on its promise to “stop tragedies with real-time content analysis." It's understandable why Santa Fe's leaders might want such a service. In 2018, a shooter killed eight students and two teachers at the school. Its student body is now part of the 4.8 million US students that the for-profit "safety management" service monitors.
A college student whose middle school used Gaggle told BuzzFeed News that the tool taught them that they would always be watched. “I feel like now I’m very desensitized to the threat of my information being looked at by people,” they said.
Using a combination of in-house artificial intelligence and human content moderators paid about $10 an hour, Gaggle polices schools for suspicious or harmful content and images, which it says can help prevent gun violence and student suicides. It plugs into two of the biggest software suites around, Google’s G Suite and Microsoft 365, and tracks everything, including notifications that may float in from Twitter, Facebook, and Instagram accounts linked to a school email address.
Gaggle touts itself as a tantalizingly simple solution to a diverse set of horrors. It claims to have saved hundreds of lives from suicide during the 2018–19 school year. The company, which is based in Bloomington, Illinois, also markets itself as a tool that can detect threats of violence.
👉🏼 Read more:
https://www.buzzfeednews.com/article/carolinehaskins1/gaggle-school-surveillance-technology-education
#surveillance #school #kids #gaggle #USA #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Gaggle monitors the work and communications of almost 5 million students in the US, and schools are paying big money for its services. Hundreds of company documents unveil a sprawling surveillance industrial complex that targets kids who can’t opt out.
For the 1,300 students of Santa Fe High School, participating in school life means producing a digital trail — homework assignments, essays, emails, pictures, creative writing, songs they've written, and chats with friends and classmates.
All of it is monitored by student surveillance service Gaggle, which promises to keep Santa Fe High School kids free from harm.
Santa Fe High, located in Santa Fe, Texas, is one of more than 1,400 schools that have taken Gaggle up on its promise to “stop tragedies with real-time content analysis." It's understandable why Santa Fe's leaders might want such a service. In 2018, a shooter killed eight students and two teachers at the school. Its student body is now part of the 4.8 million US students that the for-profit "safety management" service monitors.
A college student whose middle school used Gaggle told BuzzFeed News that the tool taught them that they would always be watched. “I feel like now I’m very desensitized to the threat of my information being looked at by people,” they said.
Using a combination of in-house artificial intelligence and human content moderators paid about $10 an hour, Gaggle polices schools for suspicious or harmful content and images, which it says can help prevent gun violence and student suicides. It plugs into two of the biggest software suites around, Google’s G Suite and Microsoft 365, and tracks everything, including notifications that may float in from Twitter, Facebook, and Instagram accounts linked to a school email address.
Gaggle touts itself as a tantalizingly simple solution to a diverse set of horrors. It claims to have saved hundreds of lives from suicide during the 2018–19 school year. The company, which is based in Bloomington, Illinois, also markets itself as a tool that can detect threats of violence.
👉🏼 Read more:
https://www.buzzfeednews.com/article/carolinehaskins1/gaggle-school-surveillance-technology-education
#surveillance #school #kids #gaggle #USA #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The Politics of Datafication : The influence of lobbyists on the EU’s data protection reform and its consequences for the legitimacy of the General Data Protection Regulation
This study explores how one of the most talked about regulations in the internet policy domain was drafted. The General Data Protection Regulation (GDPR) has been widely regarded as one of the most lobbied pieces of legislation in the history of the European Union (EU). This raises two questions: What policy alternatives were put forth by the EU institutions in the course of the GDPR’s legislative process, and how did they correspond to the ideas, issues and frames promoted by interest representatives?
What does the influence of organized interests and stakeholders in GDPR decision-making reveal about the democratic legitimacy of the process? Drawing on new institutionalism, this research traces the evolution of the GDPR, comparing the different EU institutions’ iterations of the new law with the positions of interest representatives, and simultaneously situating the GDPR in the history of data protection policy.
The results reveal that business groups dominated the public consultations prior to the Commission’s draft proposal, but the Commission’s approach was more closely aligned with the positions of civil society. Members of the European Parliament were, on the contrary, highly susceptible to the influence of business interests, until public salience of information privacy increased owing to Edward Snowden’s revelations of governmental mass surveillance by the National Security Agency. These revelations made it possible for policy entrepreneurs to push for stronger rules on data protection.
👉🏼 Read more:
https://helda.helsinki.fi/handle/10138/305981
#lobby #influencer #EU #DataProtection #datafication #GDPR #regulation #surveillance #Snowden #NSA
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
This study explores how one of the most talked about regulations in the internet policy domain was drafted. The General Data Protection Regulation (GDPR) has been widely regarded as one of the most lobbied pieces of legislation in the history of the European Union (EU). This raises two questions: What policy alternatives were put forth by the EU institutions in the course of the GDPR’s legislative process, and how did they correspond to the ideas, issues and frames promoted by interest representatives?
What does the influence of organized interests and stakeholders in GDPR decision-making reveal about the democratic legitimacy of the process? Drawing on new institutionalism, this research traces the evolution of the GDPR, comparing the different EU institutions’ iterations of the new law with the positions of interest representatives, and simultaneously situating the GDPR in the history of data protection policy.
The results reveal that business groups dominated the public consultations prior to the Commission’s draft proposal, but the Commission’s approach was more closely aligned with the positions of civil society. Members of the European Parliament were, on the contrary, highly susceptible to the influence of business interests, until public salience of information privacy increased owing to Edward Snowden’s revelations of governmental mass surveillance by the National Security Agency. These revelations made it possible for policy entrepreneurs to push for stronger rules on data protection.
👉🏼 Read more:
https://helda.helsinki.fi/handle/10138/305981
#lobby #influencer #EU #DataProtection #datafication #GDPR #regulation #surveillance #Snowden #NSA
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Nestle and Unilever ‘linked to Indonesian forest fires engulfing southeast Asia in noxious haze’
Analysis of supply chain disclosures shows global consumer giants purchasing from producers under investigation for roles in blaze
Household brands such as #Nestle, #Unilever and P&G are buying palm oil from suppliers deemed partly responsible for forest fires currently ravaging #Indonesia and blanketing swathes of southeast #Asia in noxious #haze, according to new research from #Greenpeace.
👉🏼 Read more:
https://www.independent.co.uk/environment/indonesia-forest-fires-palm-oil-nestle-unilever-pg-desforestation-slash-burn-a9195716.html
#Nestle #DeleteNestle #Unilever #Indonesia #forest #fires #palmoil #video #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Analysis of supply chain disclosures shows global consumer giants purchasing from producers under investigation for roles in blaze
Household brands such as #Nestle, #Unilever and P&G are buying palm oil from suppliers deemed partly responsible for forest fires currently ravaging #Indonesia and blanketing swathes of southeast #Asia in noxious #haze, according to new research from #Greenpeace.
👉🏼 Read more:
https://www.independent.co.uk/environment/indonesia-forest-fires-palm-oil-nestle-unilever-pg-desforestation-slash-burn-a9195716.html
#Nestle #DeleteNestle #Unilever #Indonesia #forest #fires #palmoil #video #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Meet Emma - Your Work Colleague of the Future
Say hello to #Emma, a life-sized representation of how we could look in 20 years’ time if we continue working with poor posture and inadequately set-up workstations.
📺 https://www.youtube.com/watch?v=fL5SuzGkUPw
#Emma #future #thinkabout #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Say hello to #Emma, a life-sized representation of how we could look in 20 years’ time if we continue working with poor posture and inadequately set-up workstations.
📺 https://www.youtube.com/watch?v=fL5SuzGkUPw
#Emma #future #thinkabout #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Warehouses Watching Every Move Workers Make
Warehouses Watching Every Move Workers Make
#Warehouse #workers suffer from an unusually high rate of injury. Now, at some facilities, workers can wear a #sensor on their chest, which buzzes when they’re at risk of getting hurt. But this #tracking #device also gathers detailed #information about the employee’s movements – and sends this data to their employer. This week on #Decrypted, Bloomberg Technology’s Joshua Brustein looks at a new technology, whose proponents say will make workplaces safer, but also inspires concern about workplace #surveillance.
📻 https://www.bloomberg.com/news/audio/2019-11-04/warehouses-watching-every-move-workers-make-podcast
#podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
#Warehouse #workers suffer from an unusually high rate of injury. Now, at some facilities, workers can wear a #sensor on their chest, which buzzes when they’re at risk of getting hurt. But this #tracking #device also gathers detailed #information about the employee’s movements – and sends this data to their employer. This week on #Decrypted, Bloomberg Technology’s Joshua Brustein looks at a new technology, whose proponents say will make workplaces safer, but also inspires concern about workplace #surveillance.
📻 https://www.bloomberg.com/news/audio/2019-11-04/warehouses-watching-every-move-workers-make-podcast
#podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Hackers Breach ZoneAlarm's Forum Site — Outdated vBulletin to Blame
ZoneAlarm, an internet security software company owned by Israeli cybersecurity firm Check Point Technologies, has suffered a data breach exposing data of its discussion forum users, the company confirmed The Hacker News.
With nearly 100 million downloads, ZoneAlarm offers antivirus software, firewall, and additional virus protection solutions to home PC users, small businesses, and mobile phones worldwide.
Though neither ZoneAlarm or its parent company Check Point has yet publicly disclosed the security incident, the company quietly sent an alert via email to all affected users over this weekend, The Hacker News learned.
The email-based breach notification advised ZoneAlarm forum users to immediately change their forum account passwords, informing them hackers have unauthorizedly gained access to their names, email addresses, hashed passwords, and date of births.
Moreover, the company has also clarified that the security incident only affects users registered with the "forums.zonealarm.com" domain, which has a small number of subscribers, nearly 4,500.
"This [forum] is a separate website from any other website we have and used only by a small number of subscribers who registered to this specific forum," the email notification reads.
"The website became inactive in order to fix the problem and will resume as soon as it is fixed. You will be requested to reset your password once joining the forum."
👉🏼 Read more:
https://thehackernews.com/2019/11/zonealarm-forum-data-breach.html
#zonealarm #forum #databreach #breach #leak #hacker
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
ZoneAlarm, an internet security software company owned by Israeli cybersecurity firm Check Point Technologies, has suffered a data breach exposing data of its discussion forum users, the company confirmed The Hacker News.
With nearly 100 million downloads, ZoneAlarm offers antivirus software, firewall, and additional virus protection solutions to home PC users, small businesses, and mobile phones worldwide.
Though neither ZoneAlarm or its parent company Check Point has yet publicly disclosed the security incident, the company quietly sent an alert via email to all affected users over this weekend, The Hacker News learned.
The email-based breach notification advised ZoneAlarm forum users to immediately change their forum account passwords, informing them hackers have unauthorizedly gained access to their names, email addresses, hashed passwords, and date of births.
Moreover, the company has also clarified that the security incident only affects users registered with the "forums.zonealarm.com" domain, which has a small number of subscribers, nearly 4,500.
"This [forum] is a separate website from any other website we have and used only by a small number of subscribers who registered to this specific forum," the email notification reads.
"The website became inactive in order to fix the problem and will resume as soon as it is fixed. You will be requested to reset your password once joining the forum."
👉🏼 Read more:
https://thehackernews.com/2019/11/zonealarm-forum-data-breach.html
#zonealarm #forum #databreach #breach #leak #hacker
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Here’s a list of 200+ smartphones that can run Linux distributions
A Linux kernel is a core element of Android but despite this, Android cannot be called a Linux distribution because it lacks a GNU interface typical of a Linux distro. Android and Linux apps are not exchangeable because of different runtime systems and libraries. But with the efforts of some brilliant developers, you can actually run a legit Linux distribution on your smartphone which traditionally runs Android. The steps are as simple as installing a custom ROM and this is especially helpful if you have an aging smartphone that isn’t likely to get much – or even worse any – support.
If you’re looking to experience something other than Android – more specifically, Linux – on a smartphone, there are several touch-based Linux distros like Ubuntu Touch, postmarketOS, and Maemo Leste. You can head over to Can My Phone Run Linux, a database set up by TuxPhones and type your phone’s name in the search bar to find a list of Linux distributions that are supported by your phone.
👉🏼 Can My Phone Run Linux?
Type in the name of your smartphone, smartwatch or tablet, and see by what Linux distributions it is supported.
https://many.tuxphones.com/
#linux #smartphone #smartwatch #tablet #support
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
A Linux kernel is a core element of Android but despite this, Android cannot be called a Linux distribution because it lacks a GNU interface typical of a Linux distro. Android and Linux apps are not exchangeable because of different runtime systems and libraries. But with the efforts of some brilliant developers, you can actually run a legit Linux distribution on your smartphone which traditionally runs Android. The steps are as simple as installing a custom ROM and this is especially helpful if you have an aging smartphone that isn’t likely to get much – or even worse any – support.
If you’re looking to experience something other than Android – more specifically, Linux – on a smartphone, there are several touch-based Linux distros like Ubuntu Touch, postmarketOS, and Maemo Leste. You can head over to Can My Phone Run Linux, a database set up by TuxPhones and type your phone’s name in the search bar to find a list of Linux distributions that are supported by your phone.
👉🏼 Can My Phone Run Linux?
Type in the name of your smartphone, smartwatch or tablet, and see by what Linux distributions it is supported.
https://many.tuxphones.com/
#linux #smartphone #smartwatch #tablet #support
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Cyber attack on oil company Pemex - Ransom demanded
Mexico City (AP) - Following a cyber attack on the Mexican oil company Pemex, the company faces a blackmail attempt. Pemex is a serious company and therefore will not pay, according to the Ministry of Energy. According to the media, a hacker had demanded a ransom of 565 Bitcoin, or around 4.5 million euros, to decrypt data encrypted in last Sunday's cyberattack. According to Pemex, cyber attacks had been "neutralized". The operation continues to run normally and the gasoline inventory is secured.
https://www.tellerreport.com/news/2019-11-14---oil--cyber-%E2%80%8B%E2%80%8Battack-on-oil-company-pemex---ransom-demanded-.BJmMZnz9sr.html
https://www.elfinanciero.com.mx/economia/pemex-no-pagara-rescate-pedido-por-hackers-rocio-nalhe
#Pemex #ransomware #attack #hacker #hacked
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Mexico City (AP) - Following a cyber attack on the Mexican oil company Pemex, the company faces a blackmail attempt. Pemex is a serious company and therefore will not pay, according to the Ministry of Energy. According to the media, a hacker had demanded a ransom of 565 Bitcoin, or around 4.5 million euros, to decrypt data encrypted in last Sunday's cyberattack. According to Pemex, cyber attacks had been "neutralized". The operation continues to run normally and the gasoline inventory is secured.
https://www.tellerreport.com/news/2019-11-14---oil--cyber-%E2%80%8B%E2%80%8Battack-on-oil-company-pemex---ransom-demanded-.BJmMZnz9sr.html
https://www.elfinanciero.com.mx/economia/pemex-no-pagara-rescate-pedido-por-hackers-rocio-nalhe
#Pemex #ransomware #attack #hacker #hacked
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
DJI makes app to identify drones and find pilots
Drone maker DJI has demonstrated a way to quickly identify a nearby drone, and pinpoint the location of its pilot, via a smartphone.
The technique makes use of a protocol called “Wi-Fi Aware”, with which the drone essentially broadcasts information about itself.
The company said it would help prevent security threats and disruption, and give members of the public peace of mind.
But experts believe sophisticated criminals would still be able to circumvent detection.
“It’s going to be very useful against rogue drones,” said Elrike Franke, a policy fellow at the European Council on Foreign Relations, who studies the impacts of the drone industry.
“But it's not going to be enough to fight people with real bad intentions, because these are going to be the first people to hack this system."
DJI told the BBC it could add the functionality to drones already on the market via a software update.
The firm explained: "Using a simple app, anyone within radio range of the drone can receive that signal and learn the location, altitude, speed and direction of the drone, as well as an identification number for the drone and the location of the pilot."
👉🏼 Read more:
https://www.bbc.com/news/technology-50414108
👉🏼 Read more:
https://www.reuters.com/article/us-aviation-drones/amid-privacy-backlash-chinas-dji-unveils-drone-to-phone-tracking-idUSKBN1XN2JR
#DJI #app #identify #drones #pilots #pinpoint
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Drone maker DJI has demonstrated a way to quickly identify a nearby drone, and pinpoint the location of its pilot, via a smartphone.
The technique makes use of a protocol called “Wi-Fi Aware”, with which the drone essentially broadcasts information about itself.
The company said it would help prevent security threats and disruption, and give members of the public peace of mind.
But experts believe sophisticated criminals would still be able to circumvent detection.
“It’s going to be very useful against rogue drones,” said Elrike Franke, a policy fellow at the European Council on Foreign Relations, who studies the impacts of the drone industry.
“But it's not going to be enough to fight people with real bad intentions, because these are going to be the first people to hack this system."
DJI told the BBC it could add the functionality to drones already on the market via a software update.
The firm explained: "Using a simple app, anyone within radio range of the drone can receive that signal and learn the location, altitude, speed and direction of the drone, as well as an identification number for the drone and the location of the pilot."
👉🏼 Read more:
https://www.bbc.com/news/technology-50414108
👉🏼 Read more:
https://www.reuters.com/article/us-aviation-drones/amid-privacy-backlash-chinas-dji-unveils-drone-to-phone-tracking-idUSKBN1XN2JR
#DJI #app #identify #drones #pilots #pinpoint
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Free internet access should be a basic human right
Free internet access must be considered as a human right, as people unable to get online – particularly in developing countries – lack meaningful ways to influence the global players shaping their everyday lives, according to a new study.
As political engagement increasingly takes place online, basic freedoms that many take for granted including free expression, freedom of information and freedom of assembly are undermined if some citizens have access to the internet and others do not.
New research reveals that the internet could be a key way of protecting other basic human rights such as life, liberty, and freedom from torture – a means of enabling billions of people to lead ‘minimally decent lives’.
Dr. Merten Reglitz, Lecturer in Global Ethics at the University of Birmingham, has published his findings – the first study of its kind – in the Journal of Applied Philosophy.
“Internet access is no luxury, but instead a moral human right and everyone should have unmonitored and uncensored access to this global medium - provided free of charge for those unable to afford it,” commented Dr Reglitz.
“Without such access, many people lack a meaningful way to influence and hold accountable supranational rule-makers and institutions. These individuals simply don’t have a say in the making of the rules they must obey and which shape their life chances.”
He added that exercising free speech and obtaining information was now heavily dependent on having internet access. Much of today’s political debate took place online and politically relevant information is shared on the internet - meaning the relative value these freedoms held for people ‘offline’ had decreased.
👉🏼 Read more:
https://www.birmingham.ac.uk/news/latest/2019/11/Free-internet-access-should-be-a-basic-human-right-study.aspx
#humenrights #internet #study
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Free internet access must be considered as a human right, as people unable to get online – particularly in developing countries – lack meaningful ways to influence the global players shaping their everyday lives, according to a new study.
As political engagement increasingly takes place online, basic freedoms that many take for granted including free expression, freedom of information and freedom of assembly are undermined if some citizens have access to the internet and others do not.
New research reveals that the internet could be a key way of protecting other basic human rights such as life, liberty, and freedom from torture – a means of enabling billions of people to lead ‘minimally decent lives’.
Dr. Merten Reglitz, Lecturer in Global Ethics at the University of Birmingham, has published his findings – the first study of its kind – in the Journal of Applied Philosophy.
“Internet access is no luxury, but instead a moral human right and everyone should have unmonitored and uncensored access to this global medium - provided free of charge for those unable to afford it,” commented Dr Reglitz.
“Without such access, many people lack a meaningful way to influence and hold accountable supranational rule-makers and institutions. These individuals simply don’t have a say in the making of the rules they must obey and which shape their life chances.”
He added that exercising free speech and obtaining information was now heavily dependent on having internet access. Much of today’s political debate took place online and politically relevant information is shared on the internet - meaning the relative value these freedoms held for people ‘offline’ had decreased.
👉🏼 Read more:
https://www.birmingham.ac.uk/news/latest/2019/11/Free-internet-access-should-be-a-basic-human-right-study.aspx
#humenrights #internet #study
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The Xinjiang Papers
‘Absolutely No Mercy’: Leaked Files Expose How China Organized Mass Detentions of Muslims
More than 400 pages of internal Chinese documents provide an unprecedented inside look at the crackdown on ethnic minorities in the Xinjiang region.
HONG KONG — The students booked their tickets home at the end of the semester, hoping for a relaxing break after exams and a summer of happy reunions with family in China’s far west.
Instead, they would soon be told that their parents were gone, relatives had vanished and neighbors were missing — all of them locked up in an expanding network of detention camps built to hold Muslim ethnic minorities.
The authorities in the Xinjiang region worried the situation was a powder keg. And so they prepared.
The leadership distributed a classified directive advising local officials to corner returning students as soon as they arrived and keep them quiet. It included a chillingly bureaucratic guide for how to handle their anguished questions, beginning with the most obvious: Where is my family?
👉🏼 Document: What Chinese Officials Told Children Whose Families Were Put in Camps
https://www.nytimes.com/interactive/2019/11/16/world/asia/china-detention-directive.html
👉🏼 Read more:
https://www.nytimes.com/interactive/2019/11/16/world/asia/china-xinjiang-documents.html
#Xinjiang #China #leaked #papers
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
‘Absolutely No Mercy’: Leaked Files Expose How China Organized Mass Detentions of Muslims
More than 400 pages of internal Chinese documents provide an unprecedented inside look at the crackdown on ethnic minorities in the Xinjiang region.
HONG KONG — The students booked their tickets home at the end of the semester, hoping for a relaxing break after exams and a summer of happy reunions with family in China’s far west.
Instead, they would soon be told that their parents were gone, relatives had vanished and neighbors were missing — all of them locked up in an expanding network of detention camps built to hold Muslim ethnic minorities.
The authorities in the Xinjiang region worried the situation was a powder keg. And so they prepared.
The leadership distributed a classified directive advising local officials to corner returning students as soon as they arrived and keep them quiet. It included a chillingly bureaucratic guide for how to handle their anguished questions, beginning with the most obvious: Where is my family?
👉🏼 Document: What Chinese Officials Told Children Whose Families Were Put in Camps
https://www.nytimes.com/interactive/2019/11/16/world/asia/china-detention-directive.html
👉🏼 Read more:
https://www.nytimes.com/interactive/2019/11/16/world/asia/china-xinjiang-documents.html
#Xinjiang #China #leaked #papers
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Massive Hack Strikes Offshore Cayman National Bank and Trust
Isle of Man, UK – A blast of sunshine has hit a secretive banking network used by global ultra-wealthy figures following a massive hack by “Phineas Fisher“, a notorious self-described “hacktivist”, of Cayman National Bank and Trust, which serves nearly 1,500 accounts in Isle of Man. Transparency collective Distributed Denial of Secrets has began publishing copies of the bank’s servers, a cache of documents as well as communications among bankers and others. Journalists around the world are investigating and have begun releasing stories.
Following the hack, a manifesto was uploaded to the Internet addressing the motivation for hacking financial services companies. Unicorn Riot has embedded the manifesto below which includes previously unpublished code which the author claims was used to break into “Hacking Team” an Italian surveillance company. Hacking Team was an elite corporation that specialized in developing malware until Phineas Fisher hacked them and published their code online. The malware developed by Hacking Team was often used to attack journalists and activists on behalf of repressive governments .
Unicorn Riot has obtained the small HackBack announcement text released exclusively in Spanish, described as “Desde las montañas del Sureste Cibernético” (‘From the mountains of the Cyber Southeast’). It bills itself as a “HackBack” DIY guide for “Una guía DIY para robar bancos” (‘A DIY guide for robbing banks.’) The announcement begins with a tongue-in-cheek dedication to “Subcowmandante Marcos” with an ASCII text-styled pipe-smoking cow referring to former Zapatista spokesperson Subcomandante Marcos.
Also included in the announcement were introductions to common information security tools such as Metasploit and observations about previous major bank hacks, suspicious activities on SWIFT (an international financial network), and art such as a skeleton saying “Be Gay, Do Crimes” in Spanish.
👉🏼 Read more:
https://unicornriot.ninja/2019/massive-hack-strikes-offshore-cayman-national-bank-and-trust/
https://unicornriot.ninja/wp-content/uploads/2019/11/hackback-announce-text.txt
#hacker #PhineasFisher #hacked #hackback #offshore #bank
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Isle of Man, UK – A blast of sunshine has hit a secretive banking network used by global ultra-wealthy figures following a massive hack by “Phineas Fisher“, a notorious self-described “hacktivist”, of Cayman National Bank and Trust, which serves nearly 1,500 accounts in Isle of Man. Transparency collective Distributed Denial of Secrets has began publishing copies of the bank’s servers, a cache of documents as well as communications among bankers and others. Journalists around the world are investigating and have begun releasing stories.
Following the hack, a manifesto was uploaded to the Internet addressing the motivation for hacking financial services companies. Unicorn Riot has embedded the manifesto below which includes previously unpublished code which the author claims was used to break into “Hacking Team” an Italian surveillance company. Hacking Team was an elite corporation that specialized in developing malware until Phineas Fisher hacked them and published their code online. The malware developed by Hacking Team was often used to attack journalists and activists on behalf of repressive governments .
Unicorn Riot has obtained the small HackBack announcement text released exclusively in Spanish, described as “Desde las montañas del Sureste Cibernético” (‘From the mountains of the Cyber Southeast’). It bills itself as a “HackBack” DIY guide for “Una guía DIY para robar bancos” (‘A DIY guide for robbing banks.’) The announcement begins with a tongue-in-cheek dedication to “Subcowmandante Marcos” with an ASCII text-styled pipe-smoking cow referring to former Zapatista spokesperson Subcomandante Marcos.
Also included in the announcement were introductions to common information security tools such as Metasploit and observations about previous major bank hacks, suspicious activities on SWIFT (an international financial network), and art such as a skeleton saying “Be Gay, Do Crimes” in Spanish.
👉🏼 Read more:
https://unicornriot.ninja/2019/massive-hack-strikes-offshore-cayman-national-bank-and-trust/
https://unicornriot.ninja/wp-content/uploads/2019/11/hackback-announce-text.txt
#hacker #PhineasFisher #hacked #hackback #offshore #bank
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN