T-Mobile, Apple, Blackberry are disgusting surveillance tools

Philip Agre predicted the dark side of the Internet 30 years ago. Why did no one listen?

Philip Agre, a computer scientist turned humanities professor, was prescient about many of the ways technology would impact the world https://www.washingtonpost.com/technology/2021/08/12/philip-agre-ai-disappeared/

1996

Early 90’s Philip Agre reviewed my site, giving it a thumbs up and encouraged my work. This was published on the Educational CyberPlayGround, Inc. http://www.edu-cyberpg.com

Phil Agre: How to Help Someone Use A Computer. 1996
https://edu-cyberpg.com/Technology/Agre.html

THE DARK SIDE

#T-Mobile, #Apple, #Blackberry are disgusting surveillance tools

Engadget: T-Mobile confirms data breach affects over 47 million people.

As part of its ongoing data breach investigation, T-Mobile has confirmed the enormity of the stolen information. Roughly 47.8 million current and former or prospective customers have been affected by the cyberattack on its systems, the carrier confirmed on Wednesday. Of that number, about 7.8 million are current T-Mobile postpaid accounts and the rest are prior or potential users who had applied for credit, the company added in a press release.
https://www.engadget.com/t-mobile-data-breach-affected-people-103104868.html

T-Mobile Investigating Claims of Massive Customer Data Breach
Hackers selling the data are claiming it affects 100 million users.
https://www.vice.com/en/article/akg8wg/tmobile-investigating-customer-data-breach-100-million

The T-Mobile Data Breach Is One You Can’t Ignore
Hackers claim to have obtained the data of 100 million people—including sensitive personal information.
https://www.wired.com/story/t-mobile-hack-data-phishing/

INCEL

Nazi, Proud Boy, Oath Keepers, Boogaloo, Trump, KKK, Hate

The main social networks, the ‘incel’ community remains as influential as it was in 2014, when an English 22-year-old killed seven people on the streets of Isla Vista, California, motivated by his hatred of women.”
https://www.theguardian.com/media/2021/aug/16/social-networks-struggle-to-crack-down-on-incel-movement

AI

Researchers fooled AI into ignoring stop signs using a cheap projector. “A trio of researchers at Purdue today published pre-print research demonstrating a novel adversarial attack against computer vision systems that can make an AI see – or not see – whatever the attacker wants.
https://thenextweb.com/news/researchers-tricked-ai-ignoring-stop-signs-using-cheap-projector

How GrayShift Keeps its iPhone Unlocking Tech Secret
Copies of non-disclosure and other agreements obtained by Motherboard show the kind of information that iPhone unlocker Grayshift tells police to keep secret. https://www.vice.com/en/article/m7e498/how-grayshift-keeps-its-iphone-unlocking-tech-secret

APPLE IS NOW A DISGUSTING PHONE

Is Apple’s NeuralMatch searching for abuse, or for people?

Apple stunned the tech industry on Thursday by announcing that the next version of iOS and macOS will contain a neural network to scan photos for sex abuse. Each photo will get an encrypted ‘safety voucher’ saying whether or not it’s suspect, and if more than about ten suspect photos are backed up to iCloud, then a clever cryptographic scheme will unlock the keys used to encrypt them. Apple staff or contractors can then look at the suspect photos and report them.

Apple’s child protection features spark concern within its own ranks

Apple’s device surveillance plan is a threat to user privacy — and press freedom
https://freedom.press/news/apples-device-surveillance-plan-is-a-threat-to-user-privacy-and-press-freedom/

Apple is now scanning your phone before anything gets to their server. It does not matter if you put it in the Icloud they also do this without internet using meshnet.

iPhone Neural Hash –  SHOCKING AI Tech

We built a system like Apple’s to flag child sexual abuse material — and concluded the tech was dangerous

An employee reconditions an iPhone in Sainte-Luce-sur-Loire, France, on Jan. 26. (Loic Venance/AFP/Getty Images)
Earlier this month, Apple unveiled <https://www.washingtonpost.com/business/apple-to-scan-us-phones-for-images-of-child-abuse/2021/08/05/e6c968ac-f61f-11eb-a636-18cac59a98dc_story.html?itid=lk_inline_manual_4> a system that would scan iPhone and iPad photos for child sexual abuse material (CSAM). The announcement sparked a civil liberties <https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life> firestorm <https://cdt.org/insights/international-coalition-calls-on-apple-to-abandon-plan-to-build-surveillance-capabilities-into-iphones-ipads-and-other-products/>, and Apple’s own employees have been expressing alarm <https://www.reuters.com/technology/exclusive-apples-child-protection-features-spark-concern-within-its-own-ranks-2021-08-12/>. The company insists reservations about the system are rooted in “misunderstandings <https://9to5mac.com/2021/08/06/apple-internal-memo-icloud-photo-scanning-concerns/>.” We disagree.

We wrote the only peer-reviewed publication on how to build a system like Apple’s <https://www.washingtonpost.com/opinions/2021/08/13/apple-csam-child-safety-tool-hashing-privacy/?itid=lk_inline_manual_5> — and we concluded the technology was dangerous. We’re not concerned because we misunderstand how Apple’s system works. The problem is, we understand exactly how it works.

Our research project <https://www.usenix.org/conference/usenixsecurity21/presentation/kulshrestha> began two years ago, as an experimental system to identify CSAM in end-to-end-encrypted online services. As security researchers, we know the value of end-to-end encryption, which protects data from third-party access. But we’re also horrified that CSAM is proliferating on encrypted platforms. And we worry online services are reluctant to use encryption without additional tools to combat CSAM.

We sought to explore a possible middle ground, where online services could identify harmful content while otherwise preserving end-to-end encryption. The concept was straightforward: If someone shared material that matched a database of known harmful content, the service would be alerted. If a person shared innocent content, the service would learn nothing. People couldn’t read the database or learn whether content matched, since that information could reveal law enforcement methods and help criminals evade detection.

Knowledgeable observers argued a system like ours was far <https://blog.cryptographyengineering.com/2019/12/08/on-client-side-media-scanning/> from feasible <https://www.eff.org/deeplinks/2019/11/why-adding-client-side-scanning-breaks-end-end-encryption>. After many false starts, we built a working prototype. But we encountered a glaring problem.

Our system could be easily repurposed for surveillance and censorship. The design wasn’t restricted to a specific category of content; a service could simply swap in any content-matching database, and the person using that service would be none the wiser.

A foreign government could, for example, compel a service to out people sharing disfavored political speech. That’s no hypothetical: WeChat, the popular Chinese messaging app, already uses content matching to identify dissident material <https://citizenlab.ca/2018/08/cant-picture-this-an-analysis-of-image-filtering-on-wechat-moments/>. India enacted rules this year <https://www.eff.org/deeplinks/2021/07/indias-draconian-rules-internet-platforms-threaten-user-privacy-and-undermine> that could require pre-screening content critical of government policy. Russia recently fined Google <https://www.reuters.com/technology/russia-fines-google-4-mln-roubles-failing-delete-content-tass-2021-05-25/>, Facebook <https://apnews.com/article/europe-russia-technology-government-and-politics-cea2b0203f13a2e6e17951f2eb570a31> and Twitter <https://apnews.com/article/media-moscow-social-media-europe-russia-cc0f314ee9e77811a81d15095c2dce18> for not removing pro-democracy protest materials.

We spotted other shortcomings. The content-matching process could have false positives, and malicious users could game the system to subject innocent users to scrutiny.

We were so disturbed that we took a step we hadn’t seen before in computer science literature: We warned against our own system design, urging further research on how to mitigate the serious downsides. We’d planned to discuss paths forward at an academic conference this month.

That dialogue never happened. The week before our presentation, Apple announced <https://www.apple.com/child-safety/> it would deploy its nearly identical system on iCloud Photos, which exists on more than 1.5 billion devices <https://financialpost.com/technology/apple-tops-wall-street-expectations-on-record-iphone-revenue-china-sales-surge>. Apple’s motivation, like ours, was to protect children. And its system was technically more efficient and capable than ours. But we were baffled to see that Apple had few answers for the hard questions we’d surfaced.

China is Apple’s second-largest market <https://www.theverge.com/2015/4/27/8505063/china-is-now-apples-second-biggest-market>, with probably hundreds of millions of devices. What stops the Chinese government from demanding Apple scan those devices for pro-democracy materials? Absolutely nothing, except Apple’s solemn promise. This is the same Apple that blocked <https://www.washingtonpost.com/news/the-switch/wp/2017/07/31/apple-is-pulling-vpns-from-the-chinese-app-store-heres-what-that-means/?itid=lk_inline_manual_20> Chinese citizens from apps that allow access to censored material <https://www.washingtonpost.com/world/asia_pacific/holes-close-in-chinas-great-firewall-as-apple-amazon-snub-apps-to-bypass-censors/2017/08/02/77750f38-7766-11e7-803f-a6c989606ac7_story.html>, that acceded to China’s demand to store user data in state-owned data centers <https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html> and whose chief executive infamously declared <https://www.washingtonpost.com/world/asia_pacific/holes-close-in-chinas-great-firewall-as-apple-amazon-snub-apps-to-bypass-censors/2017/08/02/77750f38-7766-11e7-803f-a6c989606ac7_story.html>, “We follow the law wherever we do business.”

Apple’s muted response about possible misuse is especially puzzling because it’s a high-profile flip-flop. After the 2015 terrorist attack <https://www.washingtonpost.com/news/post-nation/wp/2015/12/05/fbi-investigating-san-bernardino-shooting-as-an-act-of-terrorism/> in San Bernardino, Calif., the Justice Department tried to compel <https://www.washingtonpost.com/news/post-nation/wp/2016/12/02/one-year-after-san-bernardino-police-offer-a-possible-motive-as-questions-still-linger/> Apple to facilitate access to a perpetrator’s encrypted iPhone. Apple refused, swearing in court filings that if it were to build such a capability once, all bets were off about how that capability might be used in future.

“It’s something we believe is too dangerous to do,” Apple explained <https://www.apple.com/customer-letter/answers/>. “The only way to guarantee that such a powerful tool isn’t abused … is to never create it.” That worry is just as applicable to Apple’s new system.

Apple has also dodged on the problems of false positives and malicious gaming, sharing few details about how its content matching works.

The company’s latest defense <https://www.wsj.com/articles/apple-executive-defends-tools-to-fight-child-porn-acknowledges-privacy-backlash-11628859600> of its system is that there are technical safeguards against misuse, which outsiders can independently audit. But Apple has a record <https://www.washingtonpost.com/technology/2021/08/16/apple-corellium-child-porn-iphone/> of obstructing security research. And its vague proposal <https://www.apple.com/child-safety/pdf/Security_Threat_Model_Review_of_Apple_Child_Safety_Features.pdf> for verifying the content-matching database would flunk an introductory security course.

Apple could implement stronger technical protections, providing public proof that its content-matching database originated with child-safety groups. We’ve already designed a protocol <https://twitter.com/jonathanmayer/status/1426540534517182464> it could deploy. Our conclusion, though, is that many downside risks probably don’t have technical solutions.

Apple is making a bet that it can limit its system to certain content in certain countries, despite immense government pressures. We hope it succeeds in both protecting children and affirming incentives for broader adoption of encryption. But make no mistake that Apple is gambling with security, privacy and free speech worldwide.

Apple drops intellectual property lawsuit against maker of security tools – Reed Albergotti
https://www.washingtonpost.com/technology/2021/08/10/apple-drops-corellium-lawsuit/

Apple settled its federal lawsuit Tuesday against Corellium, the maker of tools that allow security researchers to find software flaws in iPhones, according to court records.

BlackBerry resisted announcing major flaw in software powering cars, hospital equipment

https://www.politico.com/news/2021/08/17/blackberry-qnx-vulnerability-hackers-505649

BlackBerry resisted announcing major flaw in software powering cars, hospital equipment
The former smartphone maker turned software firm resisted announcing a major vulnerability until after federal officials stepped in.
By BETSY WOODRUFF SWAN and ERIC GELLER
08/17/2021 02:42 PM EDT

A flaw in software made by BlackBerry has left two hundred million cars, along with critical hospital and factory equipment, vulnerable to hackers — and the company opted to keep it secret for months.

On Tuesday, BlackBerry announced that old but still widely used versions of one of its flagship products, an operating system called QNX, contain a vulnerability that could let hackers cripple devices that use it. But other companies affected by the same flaw, dubbed BadAlloc, went public with that news in May.

Two people familiar with discussions between BlackBerry and federal cybersecurity officials, including one government employee, say the company initially denied that BadAlloc impacted its products at all and later resisted making a public announcement, even though it couldn’t identify all of the customers using the software.

The back-and-forth between BlackBerry and the government highlights a major difficulty in fending off cyberattacks on increasingly internet-connected devices ranging from robotic vacuum cleaners to wastewater-plant management systems. When companies such as BlackBerry sell their software to equipment manufacturers, they rarely provide detailed records of the code that goes into the software — leaving hardware makers, their customers and the government in the dark about where the biggest risks lie.

BlackBerry may be best known for making old-school smartphones beloved for their manual keyboards, but in recent years it has become a major supplier of software for industrial equipment, including QNX, which powers everything from factory machinery and medical devices to rail equipment and components on the International Space Station. BadAlloc could give hackers a backdoor into many of these devices, allowing bad actors to commandeer them or disrupt their operations.

Microsoft security researchers announced in April that they’d discovered the vulnerability and found it in a number of companies’ operating systems and software. In May, many of those companies worked with the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency to publicly reveal the flaws and urge users to patch their devices.

BlackBerry wasn’t among them.

Privately, BlackBerry representatives told CISA earlier this year that they didn’t believe BadAlloc had impacted their products, even though CISA had concluded that it did, according to the two people, both of whom spoke anonymously because they were not authorized to discuss the matter publicly. Over the last few months, CISA pushed BlackBerry to accept the bad news, eventually getting them to acknowledge the vulnerability existed.

Then BlackBerry said it didn’t intend to go public to deal with the problem. The company told CISA it planned to reach out privately to its direct customers and warn them about the QNX issue.

Technology companies sometimes prefer private vulnerability disclosures because doing so doesn’t tip off hackers that patching is underway — but also because it limits (or at least delays) any resulting public backlash and financial losses.

But that outreach would only cover a fraction of the affected companies, because BlackBerry also told CISA that it couldn’t identify everyone using its software in order to warn them.

That’s because BlackBerry licenses QNX to “original equipment manufacturers,” which in turn use it to build products and devices for their customers, just as Microsoft sells its Windows operating system to HP, Dell and other computer makers. BlackBerry told the government it doesn’t know where its software ends up, and the people using it don’t know where it came from. Its known customers are a comparatively small group.

“Their initial thought was that they were going to do a private advisory,” said a CISA employee. Over time, though, BlackBerry “realized that there was more benefit to being public.”

The agency produced a PowerPoint presentation, which POLITICO reviewed, stressing that many BlackBerry customers wouldn’t know about the danger unless the federal government or the original equipment manufacturers told them. CISA even cited potential risks to national security and noted that the Defense Department had been involved in finding an acceptable timing for BlackBerry’s announcement.

CISA argued that BlackBerry’s planned approach would leave out many users who could be in real danger. A few weeks ago, BlackBerry agreed to issue a public announcement. On Tuesday, the company published an alert about the vulnerability and urged customers to upgrade their devices to the latest QNX version. CISA issued its own alert as well.

In a statement to POLITICO, BlackBerry did not deny that it initially resisted a public announcement. The company said it maintains “lists of our customers and have actively communicated to those customers regarding this issue.”

“Software patching communications occur directly to our customers,” the company said. “However, we will make adjustments to this process in order to best serve our customers.”

QNX “is used in a wide range of products whose compromise could result in a malicious actor gaining control of highly-sensitive systems,” Eric Goldstein, the head of CISA’s cyber division, said. “While we are not aware of any active exploitation, we encourage users of QNX to review the advisory BlackBerry put out today and implement mitigation measures, including patching systems as quickly as possible.”

Goldstein declined to address CISA’s conversations with BlackBerry but said the agency “works regularly with companies and researchers to disclose vulnerabilities in a timely and responsible manner so that users can take steps to protect their systems.”

Asked about whether the company originally believed QNX was unaffected, Blackberry said its initial investigation into affected software “identified several versions that were affected, but that list of impacted software was incomplete.”

BlackBerry is hardly the first company to disclose a bug in widely used industrial software, and cybersecurity experts say such flaws are to be expected occasionally in highly complex systems. But resolving the QNX problem will be a major task for BlackBerry and the government.

In a June announcement about QNX’s integration into 195 million vehicles, BlackBerry called the operating system “key to the future of the automotive industry” because it provides “a safe, reliable, and secure foundation” for autonomous vehicles. BlackBerry bragged that QNX was the embedded software of choice of 23 of the top 25 electric vehicle makers.

The QNX vulnerability also has the Biden administration scrambling to prevent major fallout. Vulnerabilities in this code could have significant ripple effects across industries — from automotive to health care — that rely heavily on the software. In some cases, upgrading this software will require taking affected devices offline, which could jeopardize business operations.

“By compromising one critical system, [hackers] can potentially hit thousands of actors down that line globally,” said William Loomis, an assistant director at the Atlantic Council’s Cyber Statecraft Initiative. “This is a really clear example of a good return on investment for those actors, which is what makes these attacks so valuable for them.”

After analyzing the industries where QNX was most prevalent, CISA worked with those industries’ regulators to understand the “major players” and warn them to patch the vulnerability, the agency employee said.

Goldstein confirmed that CISA “coordinated with federal agencies overseeing the highest risk sectors to understand the significance of this vulnerability and the importance of remediating it.”

CISA also planned to brief foreign governments about the risks, according to the PowerPoint presentation.

BlackBerry is far from unique in knowing little about what happens to its products after it sells them to its customers, but for industrial software like QNX, that supply-chain blindness can create national security risks.

“Software supply chain security is one of America’s greatest vulnerabilities,” said Andy Keiser, a former top House Intelligence Committee staffer. “As one of the most connected societies on the planet, we remain one of the most vulnerable.”

But rather than expecting vendors to identify all of their customers, security experts say, companies should publish lists of the types of the code included in their software, so customers can check to see if they’re using code that has been found to be vulnerable.

“BlackBerry cannot possibly fully understand the impact of a vulnerability in all cases,” said David Wheeler, a George Mason University computer science professor and director of open source supply chain security at the Linux Foundation, the group that supports the development of the Linux operating system. “We need to focus on helping people understand the software components within their systems, and help them update in a more timely way.”

For years, the Commerce Department’s National Telecommunications and Information Administration has been convening industry representatives to develop the foundation for this kind of digital ingredient list, known as a “software bill of materials.” In July, NTIA published guidance on the minimum elements needed for an SBOM, following a directive from President Joe Biden’s cybersecurity executive order.

Armed with an SBOM, a car maker or medical device manufacturer that learned of a software issue such as the QNX breach could quickly check to see if any of its products were affected.

SBOMs wouldn’t prevent hackers from discovering and exploiting vulnerabilities, and the lists alone cannot tell companies whether a particular flaw actually poses a risk to their particular systems. But these ingredient labels can dramatically speed up the process of patching flaws, especially for companies that have no idea what software undergirds their products.

“Buying software is only the start of the transaction. It is not the end,” said Trey Herr, director of the Atlantic Council’s Cyber Statecraft Initiative.

“It’s not a new problem,” Herr added. “It’s not a problem that’s going away, and what we are doing right now is insufficient for the scale of that problem.”

You’ve Never Heard of the Biggest Digital Media Company in America
https://www.nytimes.com/2021/08/15/business/media/red-ventures-digital-media.html

THE THOUGHT POLICE ARE HERE
Florida Sheriff’s Office Now Notifying People It Will Be Inflicting Its Pre-Crime Program On Them
https://www.techdirt.com/articles/20210724/15223647236/florida-sheriffs-office-now-notifying-people-it-will-be-inflicting-pre-crime-program-them.shtml

Facebook responsible for 94% of 69 million child sex abuse images reported by US tech firms

‼️‼️‼️ Facebook responsible for 94% of 69 million child sex abuse images reported by US tech firms

Amazon, Apple, Facebook and Google ‘are monopolies’, warns Congress report

Antitrust measures should be used to break up the companies so they don’t stifle the digital market, according to the report.

 

Scott Galloway -How Amazon, Apple, Facebook and Google manipulate our emotions

Scott Galloway -How Amazon, Apple, Facebook and Google manipulate our emotions

Dec 12, 2017

The combined market capitalization of Amazon, Apple, Facebook and Google is now equivalent to the GDP of India. How did these four companies come to infiltrate our lives so completely? In a spectacular rant, Scott Galloway shares insights and eye-opening stats about their dominance and motivation.

These companies are evading taxes, hiring less people, lying about their abilities while making more money that most countries but people seem to respect them instead of questioning their morals. Especially since most people here make less than 50k a year its surprising how defensive people become for a man who pays minimum wage and no overtime to his employees but has 100 billion in the bank.

Educational CyberPlayGround: NetHappenings News Letter 11-7-19

EDUCATIONAL CYBERPLAYGROUND
Reference Directory of K-12 public, private, and charter schools in all 50 states. Find Teaching Resources for Teachers, Music, Literacy, Internet, Technology, Arts and Linguistics for students, teachers, parents, and policy makers.

K12PlayGround.com
IT IS ALL ABOUT THE PROCESS
working together, problem solving, team building, imagination, creativity and failure, which carries into art, math, writing, science, reading, social studies, and all other parts of the curricula. Help students gain enduring skills and knowledge for current and future challenges.

NEWS

Credibility, not information, is the real currency!
Newspapers are still considered by most as credible. American Newspapers still decide what is a real story by covering it, which is makes it important and real.
“On the Internet, nobody knows you’re a dog.” is an adage and meme about Internet anonymity which began as a cartoon caption written by Peter Steiner and published by The New Yorker on July 5, 1993.
The Internet democratized access to the production and dissemination of information and simultaneously destroyed the economics of high-quality journalism while leaving in place the culture and custom of credibility and truth.

Boeing’s poor information security posture threatens passenger safety, national security, researcher says
Boeing test development networks are publicly exposed to the internet, Kubecka said, and at least one of Boeing’s email servers is infected with multiple strains of malware. Kubecka believes that the infected email servers are being used to exfiltrate sensitive intellectual property including code used in both civilian passenger aircraft as well as aircraft Boeing sells to the US military.
Kubecka, a well-respected security researcher, critical infrastructure expert, and Air Force veteran, tells CSO she has struggled to report what she calls blatant, easily fixable security issues for more than six months. She also alleges that Boeing, through back channels at DEF CON, threatened her with legal action and a public relations smear campaign to prevent her from going public. Kubecka declined to identify who made the threats, when and where they were made, or how they might be associated with Boeing.
“If I saw a broken door on an aircraft, I would not get in trouble for reporting to the FAA that the plane flew,” Kubecka tells CSO. “But as a security researcher, it’s legally fraught to report security vulnerabilities.”
https://www.csoonline.com/article/3451585/boeings-poor-information-security-posture-threatens-passenger-safety-national-security-researcher-s.html

Former Twitter employees charged with spying for Saudi Arabia by digging into the accounts of kingdom critics.  The arrest of one of the former Twitter employees, Ahmad Abouammo, a U.S. citizen who is alleged to have spied on the accounts of three users — including one whose posts discussed the inner workings of the Saudi leadership — on behalf of the government in Riyadh.
The Justice Department has charged two former Twitter employees with spying for Saudi Arabia by accessing the company’s information on dissidents who use the platform, marking the first time federal prosecutors have publicly accused the kingdom of running agents in the United States. One of those implicated in the scheme, according to court papers, is an associate of Saudi Crown Prince Mohammad bin Salman, who the CIA has concluded likely ordered the assassination of journalist Jamal Khashoggi in Istanbul last year.

In Trump’s Twitter Feed: Conspiracy-Mongers, Racists and Spies
“…The New York Times examined Mr. Trump’s interactions with Twitter since he took office, reviewing each of his more than 11,000 tweets and the hundreds of accounts he has retweeted, tracking the ways he is exposed to information and replicating what he is likely to see on the platform. The result, including new data analysis and previously unreported details, offers the most comprehensive view yet of a virtual world in which the president spends significant time mingling with extremists, impostors and spies.
https://www.nytimes.com/interactive/2019/11/02/us/politics/trump-twitter-disinformation.html

Dark Web: 8chan returns with new name 8kun
8kun  warning says ‘Any content that violates the laws of the United States of America will be deleted and the poster will be banned.’” Launched in 2013 by Fredrick Brennan as an alternative to 4chan, 8chan had been linked to harassment campaigns, racism, misogyny, neo-Nazism, pedophilia and mass shootings. It was also a hub for believers of far-right conspiracy theory QAnon, which claims that a secret cabal of “Satan-worshiping pedophiles” rules the world and that only Donald Trump can stop them.
https://mashable.com/article/8chan-8kun-rebrand-return

https://www.vice.com/en_us/article/a359dz/8chan-is-back-with-a-new-name-and-qanon-is-already-posting

Putin’s Top Spy: We’re Teaming Up With D.C. on Cybersecurity
By Amy Knight The Daily Beast 11.04.19
Behind-the-scenes cooperation with U.S. agencies, particularly on cybercrime and terrorism, is a theme the Kremlin likes to push onto center stage. Trump likes it, too.
https://www.thedailybeast.com/putins-top-spy-russian-fsb-chief-alexander-bortnikov-were-teaming-up-with-dc-on-cybersecurity

The Pentagon is under assault every hour of the day
Microsoft’s $10 billion contract win over cloud rival Amazon for the ultra-lucrative military contact means that an intelligence-gathering apparatus among the most important in the world is based in the woods outside Seattle. These kinds of national security responsibilities once sat almost exclusively in Washington, DC. Now in this corner of Washington state, dozens of engineers and intelligence analysts are dedicated to watching and stopping the government-sponsored hackers proliferating around the world.
https://www.technologyreview.com/s/614646/inside-the-microsoft-team-tracking-the-worlds-most-dangerous-hackers/

Following a recent conference of foreign security and law enforcement agencies, the head of Russia’s State Security Service, the FSB, made the surprising announcement that Russia and the United States have resumed cooperation on cybersecurity.
“We are maintaining working contacts by our experts and special unit heads with the Central Intelligence Agency, the Federal Bureau of Investigation and the Drug Enforcement Agency,” said Gen. Alexander Bortnikov, noting that such contacts should always occur, regardless of the foreign policy situation.
Behind-the-scenes cooperation with the Trump administration, particularly when it comes to cybercrime and terrorism, is a theme the Kremlin likes to push onto center stage every so often. And according to our sources there is indeed some consultation at a practical level, but for Washington’s intelligence professionals it’s a very delicate, very dangerous game, complicated enormously by the inclinations and prejudices of President Donald J. Trump.
In response to queries about Bortnikov’s statement, spokespersons for both the CIA and the DEA told The Daily Beast that they had no comment, and the FBI has not responded at all. […]

Cyber memo warns of new risks to White House network

An internal memo on cybersecurity, obtained by Axios, warns that “the White House is posturing itself to be electronically compromised once again.”
The state of play: That’s after at least a dozen top- or high-level officials have resigned or been pushed out of a cybersecurity mission that was established under Barack Obama to protect the White House from Russian hacking and other threats, according to conversations with several current and former officials.

KGB Manuals Notes on Exposure of the Enemy’s Set-Ups
Top Secret: Exposure of the Enemy’s Set-ups [Dangles] in the Process of Development of Persons of Interest to Intelligence 1971
http://www.interpretermag.com/notes-on-exposure-of-the-enemys-set-ups/

Facebook will allow UK election candidates to run false ads. “A controversial policy allowing politicians to run false ads on Facebook will extend to the United Kingdom as the country prepares to vote in a historic December election, Facebook confirmed to CNN Business.”
https://www.cnn.com/2019/11/01/tech/facebook-false-ads-uk/index.html

Why Facebook Should Sit Out The 2020 Election.
American democracy is in deep trouble, social media companies have violated our trust too many times to count and, at least in the US, there’s no way to regulate digital election ads — or to even ask the Federal Elections Commission, which has been effectively shut down under Republican control, to offer guidance. Without oversight, there’s no civically responsible way to allow digital ad buys. From my experience as a political strategist for Democratic candidates and advocacy groups, I believe Facebook should adopt the same policy.
https://www.buzzfeednews.com/article/melissaryan1/facebook-political-ads-2020-election-dorsey-zuckerberg

The US government is looking into the popular social media app TikTok for possible security risks. TikTok, which is owned by Chinese company ByteDance, has become incredibly popular with teenagers in the US and around the world for its short-form videos.
https://www.cnet.com/news/us-launches-a-national-security-review-of-tiktok-report/#ftag=CAD590a51e

Why worry about the KGB when ISPs do a fantastic job lying to Congress
ISPs lied to Congress to spread confusion about encrypted DNS, Mozilla says. “Mozilla is urging Congress to reject the broadband industry’s lobbying campaign against encrypted DNS in Firefox and Chrome. The Internet providers’ fight against this privacy feature raises questions about how they use broadband customers’ Web-browsing data, Mozilla wrote in a letter sent [yesterday] to the chairs and ranking members of three House of Representatives committees.”
https://arstechnica.com/tech-policy/2019/11/isps-lied-to-congress-to-spread-confusion-about-encrypted-dns-mozilla-says/

0-Day Alert! #Google is warning Windows, Mac, #Linux users to update their #Chrome browser (to 78.0.3904.87) immediately due to a security vulnerability.

#Google is trying to kill web URLs and this has nothing to do with security
a chrome extension tries to restore the URLs to searches
https://chrome.google.com/webstore/detail/remove-breadcrumbs/banhponphmmpnpogmfaahcgkgbgkcoka?hl=en

PRIVACY

NordVPN users’ passwords exposed in mass credential-stuffing attacks
https://arstechnica.com/information-technology/2019/11/nordvpn-users-passwords-exposed-in-mass-credential-stuffing-attacks/

BRAVE Browser
Chrome, Firefox, DuckDuckGo, and Opera’s “private” browsing mode is not truly private. Brave was created with a built-in ad-blocker to give you the fastest internet browsing experience, while providing the deepest level of privacy and security protection. Brave also lets you control who profits from your data with blockchain-based tokens. Faster, Safer, Ad-Free Browsing.

 

This Is How the U.S. Military’s Massive Facial Recognition System Works
The presentation also sheds light on how military, state, and local law enforcement biometrics systems are linked. According to Krizay’s presentation, ABIS is connected to the FBI’s biometric database, which is in turn connected to databases used by state and local law enforcement. Ultimately, that means that the U.S. military can readily search against biometric data of U.S. citizens and cataloged non-citizens. The DFBA is also currently working to connect its data to the Department of Homeland Security’s biometric database. The network will ultimately amount to a global surveillance system. In his notes, Krizay outlines a potential scenario in which data from a suspect in Detroit would be run against data collected from “some mountaintop in Asia.”
The documents, which are embedded in full below, were obtained through a Freedom of Information Act request. These documents were presented earlier this year at a closed-door defense biometrics conference known as the Identity Management Symposium…
https://onezero.medium.com/exclusive-this-is-how-the-u-s-militarys-massive-facial-recognition-system-works-bb764291b96d

“After more than half a year of work, check out our latest paper Light Commands: Laser-Based Audio Injection on Voice-Controllable Systems.
https://twitter.com/sara_rampazzi/status/1191415126630354944

GDPR matchup: The California Consumer Privacy Act 2018
https://iapp.org/news/a/gdpr-matchup-california-consumer-privacy-act/

Road to Adequacy: Can California Apply Under the GDPR?
https://www.lawfareblog.com/road-adequacy-can-california-apply-under-gdpr

FTC Brings First Case Against Developers of “Stalking” Apps
https://www.ftc.gov/news-events/press-releases/2019/10/ftc-brings-first-case-against-developers-stalking-apps

Instagram is shutting down a creepy app that lets you stalk loved ones. A new app is looking to revive one of the creepiest Instagram features and encouraging people to spy on their significant others through social media. Critics said the apps offerings make it resemble stalkerware.
https://www.cnet.com/news/instagram-is-shutting-down-a-creepy-app-that-lets-you-stalk-loved-ones/

Amazon, Apple, And Google Are Distributing Products From Companies Building China’s Surveillance State
https://www.buzzfeednews.com/article/rosalindadams/apple-amazon-google-apps-blacklist-china-xinjiang

WHERE ARE THE ETHICS AT THESE COMPANIES????

The Smart Girl’s Guide to Privacy: Practical Tips for Staying Safe Online: Violet Blue: 9781593276485: Amazon.com: Books

Chapter 2 https://nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf

Former Trend Micro employee enabled scam calls by stealing customers’ personal data
https://www.cyberscoop.com/trend-micro-customer-data-stolen-scam/

Spanish companies’ networks shut down as result of ransomware
https://arstechnica.com/information-technology/2019/11/spanish-companies-networks-shut-down-as-result-of-ransomware/

Paradise Ransomware Decryptor Gets Your Files Back for Free
Emsisoft has released a decryptor for the Paradise Ransomware that allows victims going back as far as 2017 to decrypt their files without paying a ransom.
https://www.bleepingcomputer.com/news/security/paradise-ransomware-decryptor-gets-your-files-back-for-free/

Once you have an encrypted and unencrypted file pair, download Emsisoft’s Paradise Ransomware decryptor and execute it.
https://www.emsisoft.com/ransomware-decryption-tools/paradise

HEALTH

Healthcare data breaches will cost industry $4 billion by year’s end, and 2020 is poised to be worse
https://www.healthcarefinancenews.com/news/healthcare-data-breaches-will-cost-industry-4-billion-years-end-and-2020-poised-be-worse

‘Volume Control’ Author David Owen Says Ambient Noise Threatens Our Hearing
https://www.npr.org/sections/health-shots/2019/11/05/776242285/from-lawn-mowers-to-rock-concerts-our-deafening-world-is-hurting-our-ears

BANKSTERS

ETHICS BE DAMNED

2/25/19 Commerce Secretary Ross Flouts Government Ethics Rules.

Fake Billionaire Wilbur Ross Ignores the Law and Lies About His Stock Holdings

Kremlin connections to investments in Facebook and Twitter are the results of a capitalist “free market” fetish.

Paradise Papers reveal Companies controlled by the Russian government quietly invested in several major Silicon Valley startups, including Facebook.

11/5/17 Paradise Papers reveals a vast financial network—beyond the reach of most governments—maintained by the world’s wealthiest people. They include commerce secretary Wilbur Ross, Queen Elizabeth of the UK, and a close advisor to Canadian prime minister Justin Trudeau. Here’s a guide to the major revelations in the Paradise Papers
https://qz.com/1120731/paradise-papers-a-guide-to-the-major-revelations/

Wilbur Ross’s business ties to Putin’s inner circle
US commerce secretary Wilbur Ross maintains a stake in a shipping company that is closely linked to the family of Russian president Vladimir Putin. According to the Paradise Papers, Ross owns between $2 million and $10 million in shipping company Navigator. The second-biggest client of Navigator is Russian gas company Sibur. Kirill Shamalov, who is Putin’s son-in-law, has been deputy chairman of Sibur’s board and until April owned more than a fifth of the company. (He has since reduced his ownership share.) @SecretaryRoss conceals business dealings with Vladimir Putin’s son-in-law. 

“The Paradise Papers showed Ross failed to disclose financial interest in Navigator Gas, a shipping company that transports petrochemicals for Russian gas and petrochemicals company Sibur. Sibur is subject to sanctions for its close ties to Putin’s son-in-law Kirill Shamalov.” https://qz.com/1120731/paradise-papers-a-guide-to-the-major-revelations/

Ross shorted Russian-linked shipping company ahead of Paradise Papers
https://www.icij.org/investigations/paradise-papers/ross-shorted-russian-linked-shipping-company-ahead-paradise-papers/

also …. Former Co-Chair of (Russian Laundromat) Bank of Cyprus
REMINDER- Paul Manafort & Rick Gates allegedly laundered money through bank accounts in Cyprus. @SecretaryRoss & @DeutscheBank former chairman Josef Ackermann served on the board of Bank of Cyprus.

Donald Trump’s commerce secretary, Wilbur Ross, is doing business with Vladimir Putin’s son-in-law through a shipping venture in Russia.

Leaked documents and public filings show Ross holds a stake in a shipping company, Navigator, through a chain of offshore investments. Navigator operates a lucrative partnership with Sibur, a Russian gas company part-owned by Kirill Shamalov, the husband of Putin’s daughter Katerina Tikhonova.
https://www.theguardian.com/news/2017/nov/05/trump-commerce-secretary-wilbur-ross-business-links-putin-family-paradise-papers

2017

WALL STREET

Wall Street’s Liquidity Crisis: It’s Not Getting Better
https://wallstreetonparade.com/2019/11/wall-streets-liquidity-crisis-its-not-getting-better/
By Pam Martens and Russ Martens: November 7, 2019 ~
Deutsche Bank Headquarters in Frankfurt, Germany
This morning, Wall Street’s money spigot arm of the Federal Reserve, the New York Fed, paid out $35 billion in 14-day term loans to Wall Street’s trading houses. The problem was, this morning the banks wanted $41.15 billion or $6.15 billion or $6.15 billion more than the Fed was offering. That’s a very clear sign that liquidity remains tight on Wall Street and we have yet to enter the pivotal year-end period when banks try to dress up their books by dumping or parking their most toxic positions. Between the term loan and the overnight loan, the New York Fed paid out $115 billion this morning to unnamed securities firms on Wall Street. (The Fed won’t say who is doing all of this borrowing and Congress can’t summon the willpower to hold a hearing.) 
https://wallstreetonparade.com/2019/11/wall-streets-liquidity-crisis-its-not-getting-better/

Dangerous Liaisons: New York Fed and JPMorgan’s Incestuous Relationship By Pam Martens and Russ Martens
The Federal Reserve Bank of New York (New York Fed) is just one of the 12 regional Federal Reserve banks around the country. But it has amassed enormous powers for itself since the Federal Reserve was created in 1913. Three of those powers dwarf all others: the ability to create money electronically at the push of a button; the accepted right to meddle in the markets; and the supervision of some of the largest bank holding companies in America.
After Wall Street blew itself up under the indulging and incompetent supervision of the New York Fed in 2008 and it was exposed that the Fed had secretly created $29 trillion in electronic money to bail out zombie banks – most of that funneled out by the New York Fed – most rational folks would have assumed that Congress would have stripped it of supervisory and money-printing powers for bailouts. Insanely, that did not happen and here we are today with the same deeply-conflicted New York Fed creating its own money to dole out $690 billion a week in super-cheap loans to unnamed securities firms while buying up $60 billion a month in the debt of the United States. (The Fed doesn’t want you to call the $60 billion a month QE4 because that would strongly suggest that this is just Stage II of the continuing 2008 bailout of Wall Street and that QE-Infinity is coming.)
https://wallstreetonparade.com/2019/11/dangerous-liaisons-new-york-fed-and-jpmorgans-incestuous-relationship/

 

LOOKING FORWARD TO THANKSGIVING EVERYONE!

Inland Northwest’s thriving turkey population is an invasive nuisance or a conservation success – or both

Thanksgiving Turkey Recipe from the First Nation American Indians and every state.
The 1621 feast between the Pilgrims and the Indians was not the first official Thanksgiving.

POTLATCH – The Tradition of Giving / Sharing a Meal

Roasted Pumpkin Soup with Fresh Tarragon and the best Brined Turkey

                   .--.
    {\             / q {\
    { `\           \ (-(~`
   { '.{`\          \ \ )
   {'-{ ' \  '-. \ \
   {._{'.' \/       '.) \
   {_.{.   {`            |
   {._{ ' {   ;'-=-.     |
    {-.{.' {  ';-=-.`    /
     {._.{.;    '-=-   .'
      {_.-' `'.__  _,-'
            |||`
              .='==,