Gaggle Knows Everything About Teens And Kids In School
Gaggle monitors the work and communications of almost 5 million students in the US, and schools are paying big money for its services. Hundreds of company documents unveil a sprawling surveillance industrial complex that targets kids who can’t opt out.
For the 1,300 students of Santa Fe High School, participating in school life means producing a digital trail — homework assignments, essays, emails, pictures, creative writing, songs they've written, and chats with friends and classmates.
All of it is monitored by student surveillance service Gaggle, which promises to keep Santa Fe High School kids free from harm.
Santa Fe High, located in Santa Fe, Texas, is one of more than 1,400 schools that have taken Gaggle up on its promise to “stop tragedies with real-time content analysis." It's understandable why Santa Fe's leaders might want such a service. In 2018, a shooter killed eight students and two teachers at the school. Its student body is now part of the 4.8 million US students that the for-profit "safety management" service monitors.
A college student whose middle school used Gaggle told BuzzFeed News that the tool taught them that they would always be watched. “I feel like now I’m very desensitized to the threat of my information being looked at by people,” they said.
Using a combination of in-house artificial intelligence and human content moderators paid about $10 an hour, Gaggle polices schools for suspicious or harmful content and images, which it says can help prevent gun violence and student suicides. It plugs into two of the biggest software suites around, Google’s G Suite and Microsoft 365, and tracks everything, including notifications that may float in from Twitter, Facebook, and Instagram accounts linked to a school email address.
Gaggle touts itself as a tantalizingly simple solution to a diverse set of horrors. It claims to have saved hundreds of lives from suicide during the 2018–19 school year. The company, which is based in Bloomington, Illinois, also markets itself as a tool that can detect threats of violence.
👉🏼 Read more:
https://www.buzzfeednews.com/article/carolinehaskins1/gaggle-school-surveillance-technology-education
#surveillance #school #kids #gaggle #USA #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Gaggle monitors the work and communications of almost 5 million students in the US, and schools are paying big money for its services. Hundreds of company documents unveil a sprawling surveillance industrial complex that targets kids who can’t opt out.
For the 1,300 students of Santa Fe High School, participating in school life means producing a digital trail — homework assignments, essays, emails, pictures, creative writing, songs they've written, and chats with friends and classmates.
All of it is monitored by student surveillance service Gaggle, which promises to keep Santa Fe High School kids free from harm.
Santa Fe High, located in Santa Fe, Texas, is one of more than 1,400 schools that have taken Gaggle up on its promise to “stop tragedies with real-time content analysis." It's understandable why Santa Fe's leaders might want such a service. In 2018, a shooter killed eight students and two teachers at the school. Its student body is now part of the 4.8 million US students that the for-profit "safety management" service monitors.
A college student whose middle school used Gaggle told BuzzFeed News that the tool taught them that they would always be watched. “I feel like now I’m very desensitized to the threat of my information being looked at by people,” they said.
Using a combination of in-house artificial intelligence and human content moderators paid about $10 an hour, Gaggle polices schools for suspicious or harmful content and images, which it says can help prevent gun violence and student suicides. It plugs into two of the biggest software suites around, Google’s G Suite and Microsoft 365, and tracks everything, including notifications that may float in from Twitter, Facebook, and Instagram accounts linked to a school email address.
Gaggle touts itself as a tantalizingly simple solution to a diverse set of horrors. It claims to have saved hundreds of lives from suicide during the 2018–19 school year. The company, which is based in Bloomington, Illinois, also markets itself as a tool that can detect threats of violence.
👉🏼 Read more:
https://www.buzzfeednews.com/article/carolinehaskins1/gaggle-school-surveillance-technology-education
#surveillance #school #kids #gaggle #USA #why
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The Politics of Datafication : The influence of lobbyists on the EU’s data protection reform and its consequences for the legitimacy of the General Data Protection Regulation
This study explores how one of the most talked about regulations in the internet policy domain was drafted. The General Data Protection Regulation (GDPR) has been widely regarded as one of the most lobbied pieces of legislation in the history of the European Union (EU). This raises two questions: What policy alternatives were put forth by the EU institutions in the course of the GDPR’s legislative process, and how did they correspond to the ideas, issues and frames promoted by interest representatives?
What does the influence of organized interests and stakeholders in GDPR decision-making reveal about the democratic legitimacy of the process? Drawing on new institutionalism, this research traces the evolution of the GDPR, comparing the different EU institutions’ iterations of the new law with the positions of interest representatives, and simultaneously situating the GDPR in the history of data protection policy.
The results reveal that business groups dominated the public consultations prior to the Commission’s draft proposal, but the Commission’s approach was more closely aligned with the positions of civil society. Members of the European Parliament were, on the contrary, highly susceptible to the influence of business interests, until public salience of information privacy increased owing to Edward Snowden’s revelations of governmental mass surveillance by the National Security Agency. These revelations made it possible for policy entrepreneurs to push for stronger rules on data protection.
👉🏼 Read more:
https://helda.helsinki.fi/handle/10138/305981
#lobby #influencer #EU #DataProtection #datafication #GDPR #regulation #surveillance #Snowden #NSA
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
This study explores how one of the most talked about regulations in the internet policy domain was drafted. The General Data Protection Regulation (GDPR) has been widely regarded as one of the most lobbied pieces of legislation in the history of the European Union (EU). This raises two questions: What policy alternatives were put forth by the EU institutions in the course of the GDPR’s legislative process, and how did they correspond to the ideas, issues and frames promoted by interest representatives?
What does the influence of organized interests and stakeholders in GDPR decision-making reveal about the democratic legitimacy of the process? Drawing on new institutionalism, this research traces the evolution of the GDPR, comparing the different EU institutions’ iterations of the new law with the positions of interest representatives, and simultaneously situating the GDPR in the history of data protection policy.
The results reveal that business groups dominated the public consultations prior to the Commission’s draft proposal, but the Commission’s approach was more closely aligned with the positions of civil society. Members of the European Parliament were, on the contrary, highly susceptible to the influence of business interests, until public salience of information privacy increased owing to Edward Snowden’s revelations of governmental mass surveillance by the National Security Agency. These revelations made it possible for policy entrepreneurs to push for stronger rules on data protection.
👉🏼 Read more:
https://helda.helsinki.fi/handle/10138/305981
#lobby #influencer #EU #DataProtection #datafication #GDPR #regulation #surveillance #Snowden #NSA
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Nestle and Unilever ‘linked to Indonesian forest fires engulfing southeast Asia in noxious haze’
Analysis of supply chain disclosures shows global consumer giants purchasing from producers under investigation for roles in blaze
Household brands such as #Nestle, #Unilever and P&G are buying palm oil from suppliers deemed partly responsible for forest fires currently ravaging #Indonesia and blanketing swathes of southeast #Asia in noxious #haze, according to new research from #Greenpeace.
👉🏼 Read more:
https://www.independent.co.uk/environment/indonesia-forest-fires-palm-oil-nestle-unilever-pg-desforestation-slash-burn-a9195716.html
#Nestle #DeleteNestle #Unilever #Indonesia #forest #fires #palmoil #video #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Analysis of supply chain disclosures shows global consumer giants purchasing from producers under investigation for roles in blaze
Household brands such as #Nestle, #Unilever and P&G are buying palm oil from suppliers deemed partly responsible for forest fires currently ravaging #Indonesia and blanketing swathes of southeast #Asia in noxious #haze, according to new research from #Greenpeace.
👉🏼 Read more:
https://www.independent.co.uk/environment/indonesia-forest-fires-palm-oil-nestle-unilever-pg-desforestation-slash-burn-a9195716.html
#Nestle #DeleteNestle #Unilever #Indonesia #forest #fires #palmoil #video #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Meet Emma - Your Work Colleague of the Future
Say hello to #Emma, a life-sized representation of how we could look in 20 years’ time if we continue working with poor posture and inadequately set-up workstations.
📺 https://www.youtube.com/watch?v=fL5SuzGkUPw
#Emma #future #thinkabout #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Say hello to #Emma, a life-sized representation of how we could look in 20 years’ time if we continue working with poor posture and inadequately set-up workstations.
📺 https://www.youtube.com/watch?v=fL5SuzGkUPw
#Emma #future #thinkabout #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Warehouses Watching Every Move Workers Make
Warehouses Watching Every Move Workers Make
#Warehouse #workers suffer from an unusually high rate of injury. Now, at some facilities, workers can wear a #sensor on their chest, which buzzes when they’re at risk of getting hurt. But this #tracking #device also gathers detailed #information about the employee’s movements – and sends this data to their employer. This week on #Decrypted, Bloomberg Technology’s Joshua Brustein looks at a new technology, whose proponents say will make workplaces safer, but also inspires concern about workplace #surveillance.
📻 https://www.bloomberg.com/news/audio/2019-11-04/warehouses-watching-every-move-workers-make-podcast
#podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
#Warehouse #workers suffer from an unusually high rate of injury. Now, at some facilities, workers can wear a #sensor on their chest, which buzzes when they’re at risk of getting hurt. But this #tracking #device also gathers detailed #information about the employee’s movements – and sends this data to their employer. This week on #Decrypted, Bloomberg Technology’s Joshua Brustein looks at a new technology, whose proponents say will make workplaces safer, but also inspires concern about workplace #surveillance.
📻 https://www.bloomberg.com/news/audio/2019-11-04/warehouses-watching-every-move-workers-make-podcast
#podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Hackers Breach ZoneAlarm's Forum Site — Outdated vBulletin to Blame
ZoneAlarm, an internet security software company owned by Israeli cybersecurity firm Check Point Technologies, has suffered a data breach exposing data of its discussion forum users, the company confirmed The Hacker News.
With nearly 100 million downloads, ZoneAlarm offers antivirus software, firewall, and additional virus protection solutions to home PC users, small businesses, and mobile phones worldwide.
Though neither ZoneAlarm or its parent company Check Point has yet publicly disclosed the security incident, the company quietly sent an alert via email to all affected users over this weekend, The Hacker News learned.
The email-based breach notification advised ZoneAlarm forum users to immediately change their forum account passwords, informing them hackers have unauthorizedly gained access to their names, email addresses, hashed passwords, and date of births.
Moreover, the company has also clarified that the security incident only affects users registered with the "forums.zonealarm.com" domain, which has a small number of subscribers, nearly 4,500.
"This [forum] is a separate website from any other website we have and used only by a small number of subscribers who registered to this specific forum," the email notification reads.
"The website became inactive in order to fix the problem and will resume as soon as it is fixed. You will be requested to reset your password once joining the forum."
👉🏼 Read more:
https://thehackernews.com/2019/11/zonealarm-forum-data-breach.html
#zonealarm #forum #databreach #breach #leak #hacker
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
ZoneAlarm, an internet security software company owned by Israeli cybersecurity firm Check Point Technologies, has suffered a data breach exposing data of its discussion forum users, the company confirmed The Hacker News.
With nearly 100 million downloads, ZoneAlarm offers antivirus software, firewall, and additional virus protection solutions to home PC users, small businesses, and mobile phones worldwide.
Though neither ZoneAlarm or its parent company Check Point has yet publicly disclosed the security incident, the company quietly sent an alert via email to all affected users over this weekend, The Hacker News learned.
The email-based breach notification advised ZoneAlarm forum users to immediately change their forum account passwords, informing them hackers have unauthorizedly gained access to their names, email addresses, hashed passwords, and date of births.
Moreover, the company has also clarified that the security incident only affects users registered with the "forums.zonealarm.com" domain, which has a small number of subscribers, nearly 4,500.
"This [forum] is a separate website from any other website we have and used only by a small number of subscribers who registered to this specific forum," the email notification reads.
"The website became inactive in order to fix the problem and will resume as soon as it is fixed. You will be requested to reset your password once joining the forum."
👉🏼 Read more:
https://thehackernews.com/2019/11/zonealarm-forum-data-breach.html
#zonealarm #forum #databreach #breach #leak #hacker
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Here’s a list of 200+ smartphones that can run Linux distributions
A Linux kernel is a core element of Android but despite this, Android cannot be called a Linux distribution because it lacks a GNU interface typical of a Linux distro. Android and Linux apps are not exchangeable because of different runtime systems and libraries. But with the efforts of some brilliant developers, you can actually run a legit Linux distribution on your smartphone which traditionally runs Android. The steps are as simple as installing a custom ROM and this is especially helpful if you have an aging smartphone that isn’t likely to get much – or even worse any – support.
If you’re looking to experience something other than Android – more specifically, Linux – on a smartphone, there are several touch-based Linux distros like Ubuntu Touch, postmarketOS, and Maemo Leste. You can head over to Can My Phone Run Linux, a database set up by TuxPhones and type your phone’s name in the search bar to find a list of Linux distributions that are supported by your phone.
👉🏼 Can My Phone Run Linux?
Type in the name of your smartphone, smartwatch or tablet, and see by what Linux distributions it is supported.
https://many.tuxphones.com/
#linux #smartphone #smartwatch #tablet #support
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
A Linux kernel is a core element of Android but despite this, Android cannot be called a Linux distribution because it lacks a GNU interface typical of a Linux distro. Android and Linux apps are not exchangeable because of different runtime systems and libraries. But with the efforts of some brilliant developers, you can actually run a legit Linux distribution on your smartphone which traditionally runs Android. The steps are as simple as installing a custom ROM and this is especially helpful if you have an aging smartphone that isn’t likely to get much – or even worse any – support.
If you’re looking to experience something other than Android – more specifically, Linux – on a smartphone, there are several touch-based Linux distros like Ubuntu Touch, postmarketOS, and Maemo Leste. You can head over to Can My Phone Run Linux, a database set up by TuxPhones and type your phone’s name in the search bar to find a list of Linux distributions that are supported by your phone.
👉🏼 Can My Phone Run Linux?
Type in the name of your smartphone, smartwatch or tablet, and see by what Linux distributions it is supported.
https://many.tuxphones.com/
#linux #smartphone #smartwatch #tablet #support
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Cyber attack on oil company Pemex - Ransom demanded
Mexico City (AP) - Following a cyber attack on the Mexican oil company Pemex, the company faces a blackmail attempt. Pemex is a serious company and therefore will not pay, according to the Ministry of Energy. According to the media, a hacker had demanded a ransom of 565 Bitcoin, or around 4.5 million euros, to decrypt data encrypted in last Sunday's cyberattack. According to Pemex, cyber attacks had been "neutralized". The operation continues to run normally and the gasoline inventory is secured.
https://www.tellerreport.com/news/2019-11-14---oil--cyber-%E2%80%8B%E2%80%8Battack-on-oil-company-pemex---ransom-demanded-.BJmMZnz9sr.html
https://www.elfinanciero.com.mx/economia/pemex-no-pagara-rescate-pedido-por-hackers-rocio-nalhe
#Pemex #ransomware #attack #hacker #hacked
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Mexico City (AP) - Following a cyber attack on the Mexican oil company Pemex, the company faces a blackmail attempt. Pemex is a serious company and therefore will not pay, according to the Ministry of Energy. According to the media, a hacker had demanded a ransom of 565 Bitcoin, or around 4.5 million euros, to decrypt data encrypted in last Sunday's cyberattack. According to Pemex, cyber attacks had been "neutralized". The operation continues to run normally and the gasoline inventory is secured.
https://www.tellerreport.com/news/2019-11-14---oil--cyber-%E2%80%8B%E2%80%8Battack-on-oil-company-pemex---ransom-demanded-.BJmMZnz9sr.html
https://www.elfinanciero.com.mx/economia/pemex-no-pagara-rescate-pedido-por-hackers-rocio-nalhe
#Pemex #ransomware #attack #hacker #hacked
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
DJI makes app to identify drones and find pilots
Drone maker DJI has demonstrated a way to quickly identify a nearby drone, and pinpoint the location of its pilot, via a smartphone.
The technique makes use of a protocol called “Wi-Fi Aware”, with which the drone essentially broadcasts information about itself.
The company said it would help prevent security threats and disruption, and give members of the public peace of mind.
But experts believe sophisticated criminals would still be able to circumvent detection.
“It’s going to be very useful against rogue drones,” said Elrike Franke, a policy fellow at the European Council on Foreign Relations, who studies the impacts of the drone industry.
“But it's not going to be enough to fight people with real bad intentions, because these are going to be the first people to hack this system."
DJI told the BBC it could add the functionality to drones already on the market via a software update.
The firm explained: "Using a simple app, anyone within radio range of the drone can receive that signal and learn the location, altitude, speed and direction of the drone, as well as an identification number for the drone and the location of the pilot."
👉🏼 Read more:
https://www.bbc.com/news/technology-50414108
👉🏼 Read more:
https://www.reuters.com/article/us-aviation-drones/amid-privacy-backlash-chinas-dji-unveils-drone-to-phone-tracking-idUSKBN1XN2JR
#DJI #app #identify #drones #pilots #pinpoint
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Drone maker DJI has demonstrated a way to quickly identify a nearby drone, and pinpoint the location of its pilot, via a smartphone.
The technique makes use of a protocol called “Wi-Fi Aware”, with which the drone essentially broadcasts information about itself.
The company said it would help prevent security threats and disruption, and give members of the public peace of mind.
But experts believe sophisticated criminals would still be able to circumvent detection.
“It’s going to be very useful against rogue drones,” said Elrike Franke, a policy fellow at the European Council on Foreign Relations, who studies the impacts of the drone industry.
“But it's not going to be enough to fight people with real bad intentions, because these are going to be the first people to hack this system."
DJI told the BBC it could add the functionality to drones already on the market via a software update.
The firm explained: "Using a simple app, anyone within radio range of the drone can receive that signal and learn the location, altitude, speed and direction of the drone, as well as an identification number for the drone and the location of the pilot."
👉🏼 Read more:
https://www.bbc.com/news/technology-50414108
👉🏼 Read more:
https://www.reuters.com/article/us-aviation-drones/amid-privacy-backlash-chinas-dji-unveils-drone-to-phone-tracking-idUSKBN1XN2JR
#DJI #app #identify #drones #pilots #pinpoint
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Free internet access should be a basic human right
Free internet access must be considered as a human right, as people unable to get online – particularly in developing countries – lack meaningful ways to influence the global players shaping their everyday lives, according to a new study.
As political engagement increasingly takes place online, basic freedoms that many take for granted including free expression, freedom of information and freedom of assembly are undermined if some citizens have access to the internet and others do not.
New research reveals that the internet could be a key way of protecting other basic human rights such as life, liberty, and freedom from torture – a means of enabling billions of people to lead ‘minimally decent lives’.
Dr. Merten Reglitz, Lecturer in Global Ethics at the University of Birmingham, has published his findings – the first study of its kind – in the Journal of Applied Philosophy.
“Internet access is no luxury, but instead a moral human right and everyone should have unmonitored and uncensored access to this global medium - provided free of charge for those unable to afford it,” commented Dr Reglitz.
“Without such access, many people lack a meaningful way to influence and hold accountable supranational rule-makers and institutions. These individuals simply don’t have a say in the making of the rules they must obey and which shape their life chances.”
He added that exercising free speech and obtaining information was now heavily dependent on having internet access. Much of today’s political debate took place online and politically relevant information is shared on the internet - meaning the relative value these freedoms held for people ‘offline’ had decreased.
👉🏼 Read more:
https://www.birmingham.ac.uk/news/latest/2019/11/Free-internet-access-should-be-a-basic-human-right-study.aspx
#humenrights #internet #study
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Free internet access must be considered as a human right, as people unable to get online – particularly in developing countries – lack meaningful ways to influence the global players shaping their everyday lives, according to a new study.
As political engagement increasingly takes place online, basic freedoms that many take for granted including free expression, freedom of information and freedom of assembly are undermined if some citizens have access to the internet and others do not.
New research reveals that the internet could be a key way of protecting other basic human rights such as life, liberty, and freedom from torture – a means of enabling billions of people to lead ‘minimally decent lives’.
Dr. Merten Reglitz, Lecturer in Global Ethics at the University of Birmingham, has published his findings – the first study of its kind – in the Journal of Applied Philosophy.
“Internet access is no luxury, but instead a moral human right and everyone should have unmonitored and uncensored access to this global medium - provided free of charge for those unable to afford it,” commented Dr Reglitz.
“Without such access, many people lack a meaningful way to influence and hold accountable supranational rule-makers and institutions. These individuals simply don’t have a say in the making of the rules they must obey and which shape their life chances.”
He added that exercising free speech and obtaining information was now heavily dependent on having internet access. Much of today’s political debate took place online and politically relevant information is shared on the internet - meaning the relative value these freedoms held for people ‘offline’ had decreased.
👉🏼 Read more:
https://www.birmingham.ac.uk/news/latest/2019/11/Free-internet-access-should-be-a-basic-human-right-study.aspx
#humenrights #internet #study
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The Xinjiang Papers
‘Absolutely No Mercy’: Leaked Files Expose How China Organized Mass Detentions of Muslims
More than 400 pages of internal Chinese documents provide an unprecedented inside look at the crackdown on ethnic minorities in the Xinjiang region.
HONG KONG — The students booked their tickets home at the end of the semester, hoping for a relaxing break after exams and a summer of happy reunions with family in China’s far west.
Instead, they would soon be told that their parents were gone, relatives had vanished and neighbors were missing — all of them locked up in an expanding network of detention camps built to hold Muslim ethnic minorities.
The authorities in the Xinjiang region worried the situation was a powder keg. And so they prepared.
The leadership distributed a classified directive advising local officials to corner returning students as soon as they arrived and keep them quiet. It included a chillingly bureaucratic guide for how to handle their anguished questions, beginning with the most obvious: Where is my family?
👉🏼 Document: What Chinese Officials Told Children Whose Families Were Put in Camps
https://www.nytimes.com/interactive/2019/11/16/world/asia/china-detention-directive.html
👉🏼 Read more:
https://www.nytimes.com/interactive/2019/11/16/world/asia/china-xinjiang-documents.html
#Xinjiang #China #leaked #papers
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
‘Absolutely No Mercy’: Leaked Files Expose How China Organized Mass Detentions of Muslims
More than 400 pages of internal Chinese documents provide an unprecedented inside look at the crackdown on ethnic minorities in the Xinjiang region.
HONG KONG — The students booked their tickets home at the end of the semester, hoping for a relaxing break after exams and a summer of happy reunions with family in China’s far west.
Instead, they would soon be told that their parents were gone, relatives had vanished and neighbors were missing — all of them locked up in an expanding network of detention camps built to hold Muslim ethnic minorities.
The authorities in the Xinjiang region worried the situation was a powder keg. And so they prepared.
The leadership distributed a classified directive advising local officials to corner returning students as soon as they arrived and keep them quiet. It included a chillingly bureaucratic guide for how to handle their anguished questions, beginning with the most obvious: Where is my family?
👉🏼 Document: What Chinese Officials Told Children Whose Families Were Put in Camps
https://www.nytimes.com/interactive/2019/11/16/world/asia/china-detention-directive.html
👉🏼 Read more:
https://www.nytimes.com/interactive/2019/11/16/world/asia/china-xinjiang-documents.html
#Xinjiang #China #leaked #papers
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Massive Hack Strikes Offshore Cayman National Bank and Trust
Isle of Man, UK – A blast of sunshine has hit a secretive banking network used by global ultra-wealthy figures following a massive hack by “Phineas Fisher“, a notorious self-described “hacktivist”, of Cayman National Bank and Trust, which serves nearly 1,500 accounts in Isle of Man. Transparency collective Distributed Denial of Secrets has began publishing copies of the bank’s servers, a cache of documents as well as communications among bankers and others. Journalists around the world are investigating and have begun releasing stories.
Following the hack, a manifesto was uploaded to the Internet addressing the motivation for hacking financial services companies. Unicorn Riot has embedded the manifesto below which includes previously unpublished code which the author claims was used to break into “Hacking Team” an Italian surveillance company. Hacking Team was an elite corporation that specialized in developing malware until Phineas Fisher hacked them and published their code online. The malware developed by Hacking Team was often used to attack journalists and activists on behalf of repressive governments .
Unicorn Riot has obtained the small HackBack announcement text released exclusively in Spanish, described as “Desde las montañas del Sureste Cibernético” (‘From the mountains of the Cyber Southeast’). It bills itself as a “HackBack” DIY guide for “Una guía DIY para robar bancos” (‘A DIY guide for robbing banks.’) The announcement begins with a tongue-in-cheek dedication to “Subcowmandante Marcos” with an ASCII text-styled pipe-smoking cow referring to former Zapatista spokesperson Subcomandante Marcos.
Also included in the announcement were introductions to common information security tools such as Metasploit and observations about previous major bank hacks, suspicious activities on SWIFT (an international financial network), and art such as a skeleton saying “Be Gay, Do Crimes” in Spanish.
👉🏼 Read more:
https://unicornriot.ninja/2019/massive-hack-strikes-offshore-cayman-national-bank-and-trust/
https://unicornriot.ninja/wp-content/uploads/2019/11/hackback-announce-text.txt
#hacker #PhineasFisher #hacked #hackback #offshore #bank
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Isle of Man, UK – A blast of sunshine has hit a secretive banking network used by global ultra-wealthy figures following a massive hack by “Phineas Fisher“, a notorious self-described “hacktivist”, of Cayman National Bank and Trust, which serves nearly 1,500 accounts in Isle of Man. Transparency collective Distributed Denial of Secrets has began publishing copies of the bank’s servers, a cache of documents as well as communications among bankers and others. Journalists around the world are investigating and have begun releasing stories.
Following the hack, a manifesto was uploaded to the Internet addressing the motivation for hacking financial services companies. Unicorn Riot has embedded the manifesto below which includes previously unpublished code which the author claims was used to break into “Hacking Team” an Italian surveillance company. Hacking Team was an elite corporation that specialized in developing malware until Phineas Fisher hacked them and published their code online. The malware developed by Hacking Team was often used to attack journalists and activists on behalf of repressive governments .
Unicorn Riot has obtained the small HackBack announcement text released exclusively in Spanish, described as “Desde las montañas del Sureste Cibernético” (‘From the mountains of the Cyber Southeast’). It bills itself as a “HackBack” DIY guide for “Una guía DIY para robar bancos” (‘A DIY guide for robbing banks.’) The announcement begins with a tongue-in-cheek dedication to “Subcowmandante Marcos” with an ASCII text-styled pipe-smoking cow referring to former Zapatista spokesperson Subcomandante Marcos.
Also included in the announcement were introductions to common information security tools such as Metasploit and observations about previous major bank hacks, suspicious activities on SWIFT (an international financial network), and art such as a skeleton saying “Be Gay, Do Crimes” in Spanish.
👉🏼 Read more:
https://unicornriot.ninja/2019/massive-hack-strikes-offshore-cayman-national-bank-and-trust/
https://unicornriot.ninja/wp-content/uploads/2019/11/hackback-announce-text.txt
#hacker #PhineasFisher #hacked #hackback #offshore #bank
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
How Google Interferes With Its Search Algorithms and Changes Your Results
The internet giant uses blacklists, algorithm tweaks and an army of contractors to shape what you see
👀 More than 100 interviews and the Journal’s own testing of Google’s search results reveal:
‼️ Google made algorithmic changes to its search results that favor big businesses over smaller ones, and in at least one case made changes on behalf of a major advertiser, eBay Inc., contrary to its public position that it never takes that type of action. The company also boosts some major websites, such as Amazon.com Inc. and Facebook Inc., according to people familiar with the matter.
‼️ Google engineers regularly make behind-the-scenes adjustments to other information the company is increasingly layering on top of its basic search results. These features include auto-complete suggestions, boxes called “knowledge panels” and “featured snippets,” and news results, which aren’t subject to the same company policies limiting what engineers can remove or change.
‼️ Despite publicly denying doing so, Google keeps blacklists to remove certain sites or prevent others from surfacing in certain types of results. These moves are separate from those that block sites as required by U.S. or foreign law, such as those featuring child abuse or with copyright infringement, and from changes designed to demote spam sites, which attempt to game the system to appear higher in results.
‼️ In auto-complete, the feature that predicts search terms as the user types a query, Google’s engineers have created algorithms and blacklists to weed out more-incendiary suggestions for controversial subjects, such as abortion or immigration, in effect filtering out inflammatory results on high-profile topics.
‼️ Google employees and executives, including co-founders Larry Page and Sergey Brin, have disagreed on how much to intervene on search results and to what extent. Employees can push for revisions in specific search results, including on topics such as vaccinations and autism.
‼️ To evaluate its search results, Google employs thousands of low-paid contractors whose purpose the company says is to assess the quality of the algorithms’ rankings. Even so, contractors said Google gave feedback to these workers to convey what it considered to be the correct ranking of results, and they revised their assessments accordingly, according to contractors interviewed by the Journal. The contractors’ collective evaluations are then used to adjust algorithms.
👉🏼 Read more (paywall):
https://www.wsj.com/articles/how-google-interferes-with-its-search-algorithms-and-changes-your-results-11573823753
👉🏼 Read more (german/no paywall):
https://netzpolitik.org/2019/der-selbstgebaute-algorithmus/
#DeleteGoogle #manipulation #search #algorithms #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The internet giant uses blacklists, algorithm tweaks and an army of contractors to shape what you see
👀 More than 100 interviews and the Journal’s own testing of Google’s search results reveal:
‼️ Google made algorithmic changes to its search results that favor big businesses over smaller ones, and in at least one case made changes on behalf of a major advertiser, eBay Inc., contrary to its public position that it never takes that type of action. The company also boosts some major websites, such as Amazon.com Inc. and Facebook Inc., according to people familiar with the matter.
‼️ Google engineers regularly make behind-the-scenes adjustments to other information the company is increasingly layering on top of its basic search results. These features include auto-complete suggestions, boxes called “knowledge panels” and “featured snippets,” and news results, which aren’t subject to the same company policies limiting what engineers can remove or change.
‼️ Despite publicly denying doing so, Google keeps blacklists to remove certain sites or prevent others from surfacing in certain types of results. These moves are separate from those that block sites as required by U.S. or foreign law, such as those featuring child abuse or with copyright infringement, and from changes designed to demote spam sites, which attempt to game the system to appear higher in results.
‼️ In auto-complete, the feature that predicts search terms as the user types a query, Google’s engineers have created algorithms and blacklists to weed out more-incendiary suggestions for controversial subjects, such as abortion or immigration, in effect filtering out inflammatory results on high-profile topics.
‼️ Google employees and executives, including co-founders Larry Page and Sergey Brin, have disagreed on how much to intervene on search results and to what extent. Employees can push for revisions in specific search results, including on topics such as vaccinations and autism.
‼️ To evaluate its search results, Google employs thousands of low-paid contractors whose purpose the company says is to assess the quality of the algorithms’ rankings. Even so, contractors said Google gave feedback to these workers to convey what it considered to be the correct ranking of results, and they revised their assessments accordingly, according to contractors interviewed by the Journal. The contractors’ collective evaluations are then used to adjust algorithms.
👉🏼 Read more (paywall):
https://www.wsj.com/articles/how-google-interferes-with-its-search-algorithms-and-changes-your-results-11573823753
👉🏼 Read more (german/no paywall):
https://netzpolitik.org/2019/der-selbstgebaute-algorithmus/
#DeleteGoogle #manipulation #search #algorithms #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
HackBack! - Talking with Phineas Fisher
Hacking as Direct Action against the Surveillance State
We spoke with the world-famous hacker persona and self-proclaimed anarchist revolutionary Phineas Fisher about the politics behind their attacks on the surveillance industry, the ruling party in Turkey, and the Catalan police. Here follows a retrospective on the exploits of Phineas Fisher, followed by their remarks to us.
Hacking is often depicted as something technical, a simple matter of attack and defense. Yet motivations are everything. The same technique that builds oppressive tools can be used as a weapon for emancipation. Hacking, in its purest form, is not about engineering: it is about leveraging power dynamics by short-circuiting technology. It is direct action for the new digital world we all live in.
In the shadows of the techno-empire, the hacking scene became a target for cooptation and infiltration. But the underground cannot be eradicated: from time to time, a new action breaks through the surface. Some of the hackers we admire are coders who produce tools for online privacy and anonymity. Other crews create and distribute alternative media. And then there are those who hack back.
The Lost Hacker Circles
It is no secret, for anyone paying attention, that for a long time the hacker underground was also taking sides in the ongoing war. Yet the effervescence that characterized the underground DIY scene of the past few decades has died down, or at least receded to less visible places.
Pessimists mourned the death of hacker communities in a proliferation of individual desertions. It is true that the techno-military complex succeeded in swelling the ranks of the mercenaries: there is a price at which a particular mindset can be bought, whether with money, success, the feeling of power, or the excitement of playing with fancy toys while chasing what state propaganda labels “the enemy.”
👉🏼 Read more:
https://crimethinc.com/2018/06/05/hackback-talking-with-phineas-fisher-hacking-as-direct-action-against-the-surveillance-state
👉🏼 Regarding: Massive Hack Strikes Offshore Cayman National Bank and Trust
https://t.iss.one/BlackBox_Archiv/716
#PhineasFisher #hacker #HackBack #Interview
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Hacking as Direct Action against the Surveillance State
We spoke with the world-famous hacker persona and self-proclaimed anarchist revolutionary Phineas Fisher about the politics behind their attacks on the surveillance industry, the ruling party in Turkey, and the Catalan police. Here follows a retrospective on the exploits of Phineas Fisher, followed by their remarks to us.
Hacking is often depicted as something technical, a simple matter of attack and defense. Yet motivations are everything. The same technique that builds oppressive tools can be used as a weapon for emancipation. Hacking, in its purest form, is not about engineering: it is about leveraging power dynamics by short-circuiting technology. It is direct action for the new digital world we all live in.
In the shadows of the techno-empire, the hacking scene became a target for cooptation and infiltration. But the underground cannot be eradicated: from time to time, a new action breaks through the surface. Some of the hackers we admire are coders who produce tools for online privacy and anonymity. Other crews create and distribute alternative media. And then there are those who hack back.
The Lost Hacker Circles
It is no secret, for anyone paying attention, that for a long time the hacker underground was also taking sides in the ongoing war. Yet the effervescence that characterized the underground DIY scene of the past few decades has died down, or at least receded to less visible places.
Pessimists mourned the death of hacker communities in a proliferation of individual desertions. It is true that the techno-military complex succeeded in swelling the ranks of the mercenaries: there is a price at which a particular mindset can be bought, whether with money, success, the feeling of power, or the excitement of playing with fancy toys while chasing what state propaganda labels “the enemy.”
👉🏼 Read more:
https://crimethinc.com/2018/06/05/hackback-talking-with-phineas-fisher-hacking-as-direct-action-against-the-surveillance-state
👉🏼 Regarding: Massive Hack Strikes Offshore Cayman National Bank and Trust
https://t.iss.one/BlackBox_Archiv/716
#PhineasFisher #hacker #HackBack #Interview
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Ransomware Bites 400 Veterinary Hospitals
National Veterinary Associates (NVA), a California company that owns more than 700 animal care facilities around the globe, is still working to recover from a ransomware attack late last month that affected more than half of those properties, separating many veterinary practices from their patient records, payment systems and practice management software. NVA says it expects to have all facilities fully back up and running normally within the next week.
Agoura Hills, Calif.-based NVA bills itself as is the largest private owner of freestanding veterinary hospitals in the United States. The company’s Web site says it currently owns roughly 700 veterinary hospitals and animal boarding facilities in the United States, Canada, Australia and New Zealand.
NVA said it discovered the ransomware outbreak on the morning of Sunday, Oct. 27, and soon after hired two outside security firms to investigate and remediate the attack. A source close to the investigation told KrebsOnSecurity that NVA was hit with Ryuk, a ransomware strain first spotted in August 2018 that targets mostly large organizations for a high-ransom return.
NVA declined to answer questions about the malware, or whether the NVA paid the ransom demand.
“It was ransomware, but we’ve been referring to it as a malware incident,” said Laura Koester, NVA’s chief marketing officer.
Koester said because every NVA hospital runs their IT operations as they see fit, not all were affected. More importantly, she said, all of the NVA’s hospitals have remained open and able to see clients (animals in need of care), and access to patient records has been fully restored to all affected hospitals.
👉🏼 Read more:
https://krebsonsecurity.com/
#ransomware #hacker #hacked #veterinary #hospitals
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
National Veterinary Associates (NVA), a California company that owns more than 700 animal care facilities around the globe, is still working to recover from a ransomware attack late last month that affected more than half of those properties, separating many veterinary practices from their patient records, payment systems and practice management software. NVA says it expects to have all facilities fully back up and running normally within the next week.
Agoura Hills, Calif.-based NVA bills itself as is the largest private owner of freestanding veterinary hospitals in the United States. The company’s Web site says it currently owns roughly 700 veterinary hospitals and animal boarding facilities in the United States, Canada, Australia and New Zealand.
NVA said it discovered the ransomware outbreak on the morning of Sunday, Oct. 27, and soon after hired two outside security firms to investigate and remediate the attack. A source close to the investigation told KrebsOnSecurity that NVA was hit with Ryuk, a ransomware strain first spotted in August 2018 that targets mostly large organizations for a high-ransom return.
NVA declined to answer questions about the malware, or whether the NVA paid the ransom demand.
“It was ransomware, but we’ve been referring to it as a malware incident,” said Laura Koester, NVA’s chief marketing officer.
Koester said because every NVA hospital runs their IT operations as they see fit, not all were affected. More importantly, she said, all of the NVA’s hospitals have remained open and able to see clients (animals in need of care), and access to patient records has been fully restored to all affected hospitals.
👉🏼 Read more:
https://krebsonsecurity.com/
#ransomware #hacker #hacked #veterinary #hospitals
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Cutting the Wire
It has recently come to the attention of the PrivacyTools team that Wire, the popular end-to-end encryption messaging platform had been sold or moved to a US company. After a week of questioning, Wire finally confirmed they had changed holding companies and would now be a US based company in a move they called “simple and pragmatic,” as they worked to expand their foothold in the enterprise market. This also came alongside the news that Wire had accepted more than $8 million in Venture Capital (VC) funding from Morpheus Ventures, as well as other investors.
Morpheus Ventures holds a portfolio including companies in healthcare, voice AI, life insurance, and retail customer data analytics: All sectors that have historically used invasive data collection methods to survive. Why would a VC with a portfolio centered on consumer data want to invest in a company whose mission claims to protect that very same information?
Earlier this year, Wire announced they had entered a partnership with FedResults, in a move that would bring Wire's secure messaging platform to US federal agencies. This raised a few eyebrows, but did not alarm the privacy community as Wire remained Swiss based and beholden to Switzerland's strict privacy laws. Today however, while much of Wire's business will continue to be run out of their Swiss offices, with new US-based ownership it is not entirely clear how much jurisdiction the United States will have over Wire data.
This is alarming because it is well known that Wire stores unencrypted metadata for every user.
👉🏼 Read more:
https://blog.privacytools.io/delisting-wire/
#privacytools #delisting #wire #FedResults #messenger #swiss #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
It has recently come to the attention of the PrivacyTools team that Wire, the popular end-to-end encryption messaging platform had been sold or moved to a US company. After a week of questioning, Wire finally confirmed they had changed holding companies and would now be a US based company in a move they called “simple and pragmatic,” as they worked to expand their foothold in the enterprise market. This also came alongside the news that Wire had accepted more than $8 million in Venture Capital (VC) funding from Morpheus Ventures, as well as other investors.
Morpheus Ventures holds a portfolio including companies in healthcare, voice AI, life insurance, and retail customer data analytics: All sectors that have historically used invasive data collection methods to survive. Why would a VC with a portfolio centered on consumer data want to invest in a company whose mission claims to protect that very same information?
Earlier this year, Wire announced they had entered a partnership with FedResults, in a move that would bring Wire's secure messaging platform to US federal agencies. This raised a few eyebrows, but did not alarm the privacy community as Wire remained Swiss based and beholden to Switzerland's strict privacy laws. Today however, while much of Wire's business will continue to be run out of their Swiss offices, with new US-based ownership it is not entirely clear how much jurisdiction the United States will have over Wire data.
This is alarming because it is well known that Wire stores unencrypted metadata for every user.
👉🏼 Read more:
https://blog.privacytools.io/delisting-wire/
#privacytools #delisting #wire #FedResults #messenger #swiss #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
GitHub Archive Program
Preserving open source software for future generations
It is a hidden cornerstone of modern civilization, and the shared heritage of all humanity. The mission of the GitHub Archive Program is to preserve open source software for future generations.
GitHub is partnering with the Long Now Foundation, the Internet Archive, the Software Heritage Foundation, Arctic World Archive, Microsoft Research, the Bodleian Library, and Stanford Libraries to ensure the long-term preservation of the world's open source software. We will protect this priceless knowledge by storing multiple copies, on an ongoing basis, across various data formats and locations, including a very-long-term archive designed to last at least 1,000 years.
👉🏼 Read more:
https://archiveprogram.github.com/
#GitHub #archiveprogram #repo #arctic #norway
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Preserving open source software for future generations
It is a hidden cornerstone of modern civilization, and the shared heritage of all humanity. The mission of the GitHub Archive Program is to preserve open source software for future generations.
GitHub is partnering with the Long Now Foundation, the Internet Archive, the Software Heritage Foundation, Arctic World Archive, Microsoft Research, the Bodleian Library, and Stanford Libraries to ensure the long-term preservation of the world's open source software. We will protect this priceless knowledge by storing multiple copies, on an ongoing basis, across various data formats and locations, including a very-long-term archive designed to last at least 1,000 years.
👉🏼 Read more:
https://archiveprogram.github.com/
#GitHub #archiveprogram #repo #arctic #norway
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Senator Markey Investigation into Amazon Ring Doorbell Reveals Egregiously Lax Privacy Policies and Civil Rights Protections
Lawmaker found Ring has no evidentiary standards for law enforcement to request video footage, no compliance mechanisms to ensure footage of children isn’t collected
Washington (November 19, 2019) – Senator Edward J. Markey (D-Mass.), a member of the Commerce, Science and Transportation Committee and leading champion on Congress on strengthening online privacy, today released alarming findings from his investigation of Amazon doorbell company Ring that reveal little to no privacy policies or civil rights protections for video collected by the technology. Senator Markey began his investigation in September of the internet-connected doorbell company Ring, which Amazon owns, and Ring’s partnership with over 400 police departments. Reports indicate that the partnerships offered law enforcement officials access to video footage captured by Ring’s products. New information also showed that Ring uses targeted language to encourage users to grant the police access to doorbell video footage, proactively courts law enforcement partners, and urges the police to take steps that will increase rates of video sharing. After two inquiries to the company, Senator Markey found an alarming disregard for basic privacy protections for consumers, as well as a lack of codified rules or policies to protect consumers from invasive or even discriminatory information-gathering practices.
“Connected doorbells are well on their way to becoming a mainstay of American households, and the lack of privacy and civil rights protections for innocent residents is nothing short of chilling,” said Senator Markey. “Amazon Ring’s policies are an open door for privacy and civil liberty violations. If you’re an adult walking your dog or a child playing on the sidewalk, you shouldn’t have to worry that Ring’s products are amassing footage of you and that law enforcement may hold that footage indefinitely or share that footage with any third parties. Amazon’s Ring is marketed to help keep families safe, but privacy rights are in real danger as a result of company policies. Amazon is not doing enough to ensure that its products and practices do not run afoul of our civil liberties.”
👉🏼 Read more:
https://www.markey.senate.gov/news/press-releases/senator-markey-investigation-into-amazon-ring-doorbell-reveals-egregiously-lax-privacy-policies-and-civil-rights-protections
#DeleteAmazon #Amazon #ring #surveillance #DataProtection #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Lawmaker found Ring has no evidentiary standards for law enforcement to request video footage, no compliance mechanisms to ensure footage of children isn’t collected
Washington (November 19, 2019) – Senator Edward J. Markey (D-Mass.), a member of the Commerce, Science and Transportation Committee and leading champion on Congress on strengthening online privacy, today released alarming findings from his investigation of Amazon doorbell company Ring that reveal little to no privacy policies or civil rights protections for video collected by the technology. Senator Markey began his investigation in September of the internet-connected doorbell company Ring, which Amazon owns, and Ring’s partnership with over 400 police departments. Reports indicate that the partnerships offered law enforcement officials access to video footage captured by Ring’s products. New information also showed that Ring uses targeted language to encourage users to grant the police access to doorbell video footage, proactively courts law enforcement partners, and urges the police to take steps that will increase rates of video sharing. After two inquiries to the company, Senator Markey found an alarming disregard for basic privacy protections for consumers, as well as a lack of codified rules or policies to protect consumers from invasive or even discriminatory information-gathering practices.
“Connected doorbells are well on their way to becoming a mainstay of American households, and the lack of privacy and civil rights protections for innocent residents is nothing short of chilling,” said Senator Markey. “Amazon Ring’s policies are an open door for privacy and civil liberty violations. If you’re an adult walking your dog or a child playing on the sidewalk, you shouldn’t have to worry that Ring’s products are amassing footage of you and that law enforcement may hold that footage indefinitely or share that footage with any third parties. Amazon’s Ring is marketed to help keep families safe, but privacy rights are in real danger as a result of company policies. Amazon is not doing enough to ensure that its products and practices do not run afoul of our civil liberties.”
👉🏼 Read more:
https://www.markey.senate.gov/news/press-releases/senator-markey-investigation-into-amazon-ring-doorbell-reveals-egregiously-lax-privacy-policies-and-civil-rights-protections
#DeleteAmazon #Amazon #ring #surveillance #DataProtection #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Biggest Data Breaches Of The 21st Century
Did you know it takes an average of 191 days for a company to realize there’s been a data breach? That’s according to a high-profile study conducted by the Ponemon Institute for IBM Security. This slow response is detrimental to business. It especially puts small businesses in a vulnerable position as many of them do not have the resources to deal with cyber attacks.
👉🏼 Infographic:
https://technofaq.org/posts/2019/02/biggest-data-breaches-of-the-21st-century-infographic/
#biggest #data #breaches #infographic
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Did you know it takes an average of 191 days for a company to realize there’s been a data breach? That’s according to a high-profile study conducted by the Ponemon Institute for IBM Security. This slow response is detrimental to business. It especially puts small businesses in a vulnerable position as many of them do not have the resources to deal with cyber attacks.
👉🏼 Infographic:
https://technofaq.org/posts/2019/02/biggest-data-breaches-of-the-21st-century-infographic/
#biggest #data #breaches #infographic
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Amnesty: Facebook and Google violate fundamental human rights
In a report on the "surveillance giants", the human rights organisation sounds the alarm: users would be forced into a "devil's pact".
Facebook and Google have created a private surveillance regime that is largely beyond independent public control: Amnesty International concludes in a report on the "Surveillance Giants" of the Internet published on Thursday. The two US corporations would have gained unprecedented power over the most personal data of millions of people, the human rights organization criticizes, stressing that "privacy abuse is at the heart" of Facebook's and Google's surveillance-based business models.
PDF:
https://cloud.amnesty.de/s/z9koZ4rHZ8NPB5c#pdfviewer
#amnesty #report #surveillance #DeleteFacebook #DeleteGoogle #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
In a report on the "surveillance giants", the human rights organisation sounds the alarm: users would be forced into a "devil's pact".
Facebook and Google have created a private surveillance regime that is largely beyond independent public control: Amnesty International concludes in a report on the "Surveillance Giants" of the Internet published on Thursday. The two US corporations would have gained unprecedented power over the most personal data of millions of people, the human rights organization criticizes, stressing that "privacy abuse is at the heart" of Facebook's and Google's surveillance-based business models.
PDF:
https://cloud.amnesty.de/s/z9koZ4rHZ8NPB5c#pdfviewer
#amnesty #report #surveillance #DeleteFacebook #DeleteGoogle #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Servers of Cock.li searched again
The authorities have again searched the servers of the e-mail and hosting provider Cock.li. Since a few minutes everything is running again. The service was already once before one and before four years in the focus of the authorities. The cause of the latest seizure has not yet been clarified.
https://status.cock.li/
#Cockli #email #authorities #raid #police
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The authorities have again searched the servers of the e-mail and hosting provider Cock.li. Since a few minutes everything is running again. The service was already once before one and before four years in the focus of the authorities. The cause of the latest seizure has not yet been clarified.
https://status.cock.li/
#Cockli #email #authorities #raid #police
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
👎1