Search Results for “New York Times”


March 31, 2020
Danny Hakim and Natasha Singer / New York Times

Danny Hakim and Natasha Singer / New York Times  
New York Attorney General Asks Zoom Whether Its Security Practices Are Sufficient to Detect Hackers

Videoconferencing app Zoom, which has skyrocketed in use during the coronavirus crisis, is under scrutiny by the office of New York’s attorney general, Letitia James, for its data privacy and security practices. James’ office sent Zoom a letter asking what, if any, new security measures the company has put in place to handle increased traffic on its network and to detect hackers. Among the concerns raised In the letter is that Zoom had been slow to address security flaws such as vulnerabilities “that could enable malicious third parties to, among other things, gain surreptitious access to consumer webcams.” Internet trolls have recently been capable of exploiting a screen sharing feature on Zoom leading to a phenomenon called Zoombombing. The suit also follows a report by Motherboard that Zoom had been sharing customer data from its iOS app with Facebook. Zoom updated its privacy policy on Sunday to reflect the mounting concern.

March 5, 2020
Michael H. Keller / New York Times

Michael H. Keller / New York Times  
End-to-End Encryption Threatened by New Legislation Aimed at Stopping the Spread of Online Child Sexual Abuse, International Effort Among Five Eyes Countries

New legislation called the EARN IT Act, and a further separate, international initiative among the English speaking so-called Five Eye countries threaten to significantly erode the ability of tech companies to incorporate end-to-end encryption in their technologies.  Multiple U.S. agencies, together with the governments of Britain, Canada, Australia, and New Zealand, released a set of voluntary guidelines and standards on how platforms can stop the spread of online child sexual abuse material. The guidelines were developed in conjunction with a half-dozen tech companies: Facebook, Google, Microsoft, Roblox, Snap, and Twitter. The legislation, introduced by Senators Lindsey Graham of South Carolina, a Republican, and Richard Blumenthal of Connecticut, a Democrat, likewise calls for standards. The bill, however, would take away legal protections under Section 230 of the Communications Decency Act if tech companies fail to meet the guidelines and standards. Encryption significantly reduces companies’ ability to detect illegal activity. Attorney General Bill Barr and many law enforcement officials believe that encryption allows predators and other criminals to hide in darkness.

Related: Apple Insider, The Mac Observer, POLITICO, CNET, CNBC, Wall Street Journal, TechCrunch, The Sun, Channel News Asia, Reuters, The Center for Internet and Society, Wired, The Register – Security, The Guardian, Daily Dot, Slashdot, Matthew Green

Tweets:@matthew_d_green @zackwhittaker @Riana_Crypto

Apple Insider : Apple & big tech urged to fight online child sexual abuse with more vigor
The Mac Observer: A.G. William Barr Wants Tech Companies to Fight Child Sexual Abuse
POLITICO: DOJ urges Silicon Valley to step up fight against child predation online
CNET: Feds see opening on encryption as tech firms sign on to protect children
CNBC: Facebook, Google and other tech companies back new principles to prevent online child sexual exploitation and abuse
Wall Street Journal: Tech Giants Pledge Fight Against Online Child Exploitation
TechCrunch: US threatens to pull big tech’s immunities if child abuse isn’t curbed
The Sun: Social media giants sign up to crackdown to find paedophiles and stop abuse live-streams online
Channel News Asia: US legislation targets online child sexual abuse; threatens encryption on Facebook, Google
Reuters: U.S. lawmakers introduce bill fighting online child sexual abuse while threatening encryption
The Center for Internet and Society: THE EARN IT ACT IS HERE. SURPRISE, IT’S STILL BAD NEWS.
Wired: The EARN IT Act Is a Sneak Attack on Encryption
The Register – Security: Don’t be fooled, experts warn, America’s anti-child-abuse EARN IT Act could burn encryption to the ground
The Guardian: US internet bill seen as opening shot against end-to-end encryption
Daily Dot: Internet freedom activists: Congress must reject hotly contested EARN IT Act
Slashdot: The EARN IT Act is an Attack on Encryption
Matthew Green: EARN IT is a direct attack on end-to-end encryption

@matthew_d_green: My apologies: legislation that was intended to prevent the distribution of child sexual abuse materials online — and that’s not in any way intended to advance the DoJ’s long-running war on encryption.
@zackwhittaker: Not often you get the Five Eyes in the same room together publicly but I have $20 on this being the anti-encryption push we've been bracing ourselves for. @Riana_Crypto has the background. https://cyberlaw.stanford.edu/blog/2020/02/doj-plans-strike-against-encryption-while-techlash-iron-hot
@Riana_Crypto: I finally finished writing up my blog post about the #EARNITAct as introduced today. This time it's only 4000 words long. tl;dr It is still very bad. https://cyberlaw.stanford.edu/blog/2020/03/earn-it-act-here-surprise-it%E2%80%99s-still-bad-news


May 13, 2020
Catalin Cimpanu / ZDNet

Catalin Cimpanu / ZDNet  
Google Removed 813 ‘Creepware’ Apps That Were Downloaded Millions of Times From Official Android Play Store

Google removed last year a batch of 813 “creepware” apps from the official Android Play Store following a report from a group of academics from the New York University, Cornell Tech, and NortonLifeLock (formerly Symantec). Creepware refers to mobile apps that aren’t full-fledged spyware but can still be used to stalk, harass, defraud, or threaten another person, directly or indirectly. The researchers developed an algorithm named CreepRank that identifies creepware-like behavior inside mobile apps, and then assigns a creep score to each app. They then ran CreepRank on a sample of anonymized data from apps installed on more than 50 million Android smartphones. They found that 857 of the top 1,000 apps qualified as creepware, with the “creepware” functions taking a central role in the app and, sometimes, in its marketing. They told Google about the apps which took down 813 of them.

May 29, 2020
Davey Alba / New York Times

Davey Alba / New York Times  
ACLU Sues Facial Recognition Company Clearview AI for Violating Illinois Law Forbidding Use of Face Scans Without Consent

The American Civil Liberties Union (ACLU) sued the facial recognition start-up Clearview AI, which claims to have helped hundreds of law enforcement agencies use online photos to solve crimes, accusing the company of “unlawful, privacy-destroying surveillance activities.” The suit claims that Clearview is violating a stringent Illinois law that forbids companies from using a resident’s fingerprints or face scans without consent. Each violation of the law could cost the company $5,000. The suit follows a report in the New York Times that the company had amassed a database of more than three billion photos across the internet, including from Facebook, YouTube, Twitter, and Venmo.

Related: BiometricUpdate, SC Magazine, Law360, Chicago Sun-Times – All, Gizmodo, The Verge, Daily Dot, Slashdot, Gizmodo AustraliaCNET, VentureBeat, PogoWasRight.org, Engadget, BuzzFeed News

Tweets:@alfredwkng

BiometricUpdate: China considers biometric data protection law to curb facial recognition abuses and secure PII
SC Magazine: Facial recognition fails accuracy test raises privacy concerns; ACLU sues Clearview AI | SC Media
Law360: Advocacy Orgs Say Clearview AI Broke Biometric Privacy Law – Law360
Chicago Sun-Times – All: ACLU sues Clearview AI, developer of controversial facial recognition technology used by CPD
Gizmodo: The ACLU Is Suing Shady Facial Recognition Startup Clearview AI for Being a Shady Facial Recognition Startup
The Verge: ACLU sues facial recognition firm Clearview AI, calling it a ‘nightmare scenario’ for privacy
Daily Dot: ACLU sues facial recognition company Clearview AI
Slashdot: ACLU Accuses Clearview AI of Privacy ‘Nightmare Scenario’
Gizmodo Australia: The ACLU Is Suing Shady Facial Recognition Startup Clearview AI for Being a Shady Facial Recognition Startup
CNET: Clearview AI faces lawsuit over gathering people’s images without consent
VentureBeat: ACLU sues facial recognition startup Clearview AI for privacy and safety violations
PogoWasRight.org: ACLU: We’re Taking Clearview AI to Court to End its Privacy-Destroying Face Surveillance Activities
Engadget: ACLU sues Clearview AI over alleged privacy violations
BuzzFeed News: The ACLU Is Suing Clearview AI To Stop “Privacy-Destroying Face Surveillance”

@alfredwkng: Clearview AI is getting sued for allegedly violating Illinois's biometric privacy law. If you are an Illinois resident and don't want your photo in Clearview's database, you have to agree to give them your photo. https://cnet.com/news/clearview


May 18, 2020
David Shortell, Evan Perez / CNN

David Shortell, Evan Perez / CNN  
FBI Claims to Have Broken the Encryption on Pensacola Shooter’s iPhones Substantially Weakening the Government’s Push for Encryption Backdoors

Mohammed Alshamrani, a member of the Royal Saudi Air Force in training at Naval Air Station Pensacola who killed three U.S. sailors and wounded others at the base, was in touch with a suspected al Qaeda operative, according to the FBI broke which broke through the encryption protecting the Saudi attacker’s iPhones, sources say. If the Bureau did achieve this encryption breakthrough, the case made by the FBI and Attorney General William Barr for demanding backdoors into encrypted communications services and devices appears to be substantially weakened. Law enforcement said they had initially been unable to retrieve data stored on two iPhones belonging to the shooter, and they cited that hurdle in trying to complete their investigation of the attacker’s ideology and his radicalization.

Related: New York Times, Wall Street Journal, Forbes, Justice Department, MacRumors, Associated Press, Task & Purpose, Capital Gazette, The Sun, Business Insider, AOL, GANNETT Syndication Service, Newsweek, Yahoo! News, Bloomberg, RT USA, The Crime Report, Axios, Cult of Mac, USATODAY, AppleInsider, NBC News, Wired, The Register – Security, Cyberscoop, CNET, News : NPR, iDownloadBlog.com, Fortune, WCCFtech, ZDNet Security, AppleInsider, iMore, Cult of Mac, Patently Apple, Business Insider, The Sun, BuzzFeed News, Newsweek, iDownloadBlog.com, Appleosophy, MacRumors, Homeland Security Today, Zero Hedge, CBSNews.com,TechSpot, iPhone Hacks, The Mac Observer,Cult of Mac, The Guardian, UPI.com, TIME, Ars Technica, USATODAY, New York Post, AppleInsider, The Huffington Post , Capital Gazette, TIME, Heavy.com, Engadget, Slashdot, Daily Dot, Cyberscoop, Multichannel, Vox, WCCFtech, POLITICO, The Sun, USNI News, Business Insider, Fortune, Input, TribLIVE, emptywheel, PhoneArena, Channel News Asia, RT USA, Algemeiner.com, MacDailyNews, Reuters: U.S., France 24, The New Daily, The Verge, Slashdot, Washington Post, New York Times

Tweets:@dnvolz @adamgoldmanNYT @kevincollier @nakashimae @zackwhittaker @zackwhittaker @zackwhittaker @iblametom @karaswisher @macrumors @zackwhittaker @iblametom @dotmudge @DevlinBarrett @ahmed

New York Times: F.B.I. Is Said to Find Links Between Pensacola Gunman and Al Qaeda
Wall Street Journal: FBI Discovers al Qaeda Link in Pensacola Attack
Forbes: Feds Hack iPhones In Pensacola Terrorist Shooting Case, But Still Slam Apple For Not Helping
Justice Department: Attorney General William P. Barr and FBI Director Christopher Wray Announce Significant Developments in the Investigation of the Naval Air Station Pensacola Shooting
MacRumors: FBI Reportedly Gained Access to iPhone Used by Mass Shooter in Florida After Apple Refused to Help
Associated Press: Pensacola gunman’s cellphones reveal meticulous planning for attack, FBI says
Task & Purpose: The FBI has evidence linking Al Qaeda to the NAS Pensacola shooting
Capital Gazette: Gunman accused of killing 3 sailors at Pensacola military base linked to al-Qaida, US official says
The Sun: Saudi student who shot dead 3 US sailors on Florida Naval Base ‘had been in contact with Al Qaeda’ in days before attack
Business Insider: The FBI found links to Al Qaeda after cracking the phones of the Saudi gunman who attacked a Florida naval base
AOL: Official: FBI finds link between Pensacola gunman, al-Qaida
GANNETT Syndication Service: Official: FBI finds link between NAS Pensacola gunman, al-Qaida
Newsweek: FBI Finds Florida Gunman Who Killed U.S. Sailors Was Linked to Al Qaeda After Breaking iPhone Encryption
Yahoo! News: FBI finds Al Qaeda link to Pensacola naval base shooting suspect: US official
Bloomberg: FBI Gets Into Pensacola Shooter’s iPhone, Finds an Al-Qaeda Tie
RT USA: Saudi pilot who went on gun rampage at Florida naval base linked to ‘Al-Qaeda operative’
The Crime Report: FBI Finds Link Between Pensacola Shooter, Al-Qaeda
Axios: FBI finds links between Pensacola gunman and Al Qaeda
Cult of Mac: FBI cracks alleged al-Qaida shooter’s iPhone without Apple’s help
USATODAY: Feds connect al Qaeda contacts to deadly Pensacola Naval Air Station shooting
AppleInsider: FBI breaks iPhone security to uncover Pensacola shooter & Al Qaeda link
NBCNews: FBI: Pensacola gunman prodded by al Qaeda to attack
Wired: The FBI Backs Down Against Apple—Again
The Register – Security: Attorney General: We didn’t need Apple to crack terrorist’s iPhones – tho we still want iGiant to do it in future
Cyberscoop: U.S. officials say they’ve cracked Pensacola shooter’s iPhones, blast Apple
CNET: FBI slams ‘Apple problem’ as it unlocks Pensacola shooter’s iPhones – CNET
News : NPR: FBI: New iPhone Evidence Shows Pensacola Shooter Had Ties To Al-Qaida
iDownloadBlog.com: The FBI has reportedly bypassed the security on the Pensacola mass shooter’s iPhone
Fortune: FBI: “We received effectively no help from Apple” in accessing Pensacola Shooter’s iPhones
WCCFtech: FBI Hacks Florida Shooter’s iPhones without Apple’s Help & Finds al Qaeda Link
ZDNet Security: FBI criticizes Apple for not helping crack Pensacola shooter’s iPhones
AppleInsider: Apple rejects ‘false claims’ by Justice Department regarding Pensacola investigation
iMore: Apple denies “false claims” by Justice Department over Pensacola attack
Cult of Mac: FBI attacks Apple for ‘no help’ unlocking Florida attacker’s iPhone; Apple rejects ‘false’ claims
Patently Apple: DOJ and FBI described crucial data found on the Pensacola Terrorist’s iPhones today in a news Conference, without Apple’s Assistance
Business Insider: The FBI found links to Al Qaeda after cracking the phones of the Saudi gunman who attacked a Florida naval base
The Sun: Saudi student who shot dead 3 US sailors on Florida Naval Base ‘had been in contact with Al Qaeda’ in days before attack
BuzzFeed News: The Pensacola Naval Base Shooter Had Longtime “Significant Ties” To Al-Qaeda
Newsweek: FBI Finds Florida Gunman Who Killed U.S. Sailors Was Linked to Al Qaeda After Breaking iPhone Encryption
iDownloadBlog.com: The FBI has reportedly bypassed the security on the Pensacola mass shooter’s iPhone
Appleosophy: Apple Fires Back at FBI and Attorney General William Barr Regarding Florida Shooter’s iPhone
MacRumors: FBI Reportedly Gained Access to iPhone Used by Mass Shooter in Florida After Apple Refused to Help
Task & Purpose: The FBI has evidence linking Al Qaeda to the NAS Pensacola shooting
MacRumors: Apple Calls FBI Comments on Lack of Help Unlocking Florida Shooter’s iPhone an ‘Excuse to Weaken Encryption’
SlashGear » security: Apple blasts Barr over iPhone lock “false claims” in Pensacola shooter case
Homeland Security Today: FBI: Pensacola Shooter Tied to AQAP Before Coming to the U.S., Discussed Attack
Zero Hedge: FBI Cracks Into Pensacola Shooter’s iPhone, Find “Significant Ties” To Al Qaeda
CBSNews.com: Saudi shooter in Florida air base attack had ties to al Qaeda
TechSpot: Officials still want backdoor into cellphones after cracking two iPhones without help
Yahoo! News: U.S. Supreme Court heaps more damages on Sudan in embassy bombing cases
iPhone Hacks: FBI Has Reportedly Unlocked One of the iPhones Used by Mass Shooter in Florida Last Year
The Mac Observer: FBI Bypasses Encryption on Pensacola Attacker’s iPhones
Cult of Mac: FBI cracks alleged al-Qaida shooter’s iPhone without Apple’s help
The Guardian: Pensacola gunman’s cellphones reveal meticulous planning for attack, FBI says
UPI.com: FBI: Agents unlocked phones to tie Pensacola gunman Mohammed Saeed Alshamrani to al-Qaida
TIME: Gunman in Deadly Pensacola Military Base Attack Linked to al-Qaida, FBI Says
Ars Technica: iPhone crypto hid al-Qaida link to naval base shooting, AG fumes
USATODAY: Feds connect al Qaeda contacts to deadly Pensacola Naval Air Station shooting
New York Post: FBI found al Qaeda’s link to Pensacola shooter through iPhones
AppleInsider: FBI breaks iPhone security to uncover Pensacola shooter & Al Qaeda link [u]
The Huffington Post : FBI Says It Found Links Between Pensacola Gunman And Al-Qaeda
Capital Gazette: Gunman accused of killing 3 sailors at Pensacola military base linked to al-Qaida, US official says
Stars and Stripes: FBI: Shooter at Naval Air Station Pensacola had link to al-Qaida
TIME: Gunman in Deadly Pensacola Military Base Attack Linked to al-Qaida, FBI Says
Ars Technica: iPhone crypto hid al-Qaida link to naval base shooting, AG fumes
Heavy.com: Pensacola, Florida Gunman Mohammed Alshamrani Link to Al-Qaida Found
Engadget: AG Barr seeks ‘legislative solution’ to make companies unlock phones
Daily Dot: FBI unlocks Pensacola shooter’s iPhone despite Apple’s opposition
Multichannel: AG Barr Hammers Apple in Terrorism Case Announcement
Vox: Why Attorney General Bill Barr is mad at Apple
Heavy.com: Pensacola, Florida Gunman Mohammed Alshamrani Link to Al-Qaida Found
POLITICO: Pensacola gunman was working with al Qaeda, FBI finds
USNI News: FBI Says Unlocked iPhone Messages Link NAS Pensacola Shooter to Al Qaeda; AG Barr Says Incident was ‘Act of Terrorism’
Input: FBI breaks into Pensacola shooter’s iPhone after six months, revealing al Qaeda links
TribLIVE: FBI: Shooter at Pensacola military base linked to al-Qaida
emptywheel: Bill Barr and Chris Wray Schedule a Press Conference to Admit Trump Let an Al Qaeda Terrorist onto Our Military Base
PhoneArena: Who is lying, Apple or Attorney General William Barr?
Channel News Asia: FBI phone probe links al Qaeda to Saudi who killed 3 at Florida base
RT USA: Saudi pilot who went on gun rampage at Florida naval base linked to ‘Al-Qaeda operative’
Algemeiner.com: FBI Phone Probe Links Al Qaeda to Saudi Shooter Who Killed Three at Florida Navy Base
MacDailyNews: Apple rejects ‘false claims’ by Justice Department regarding Islamic terrorist attack in Pensacola
Reuters: U.S.: FBI phone probe links al Qaeda to Saudi who killed three at Florida base, Barr says
France 24: FBI says al Qaeda linked to Saudi shooter at Florida naval base
The New Daily: FBI links al-Qaeda to US base shooting
MacDailyNews: FBI cracks iPhone encryption, links al Qaeda to Islamic terrorist who killed three at Florida naval base
MacDailyNews: Apple rejects ‘false claims’ by Justice Department regarding Islamic terrorist attack in Pensacola
CNN.com: FBI delivers to America a chilling reminder about al Qaeda
Input: FBI breaks into Pensacola shooter’s iPhone after six months, revealing al Qaeda links
The Verge: The FBI successfully broke into a gunman’s iPhone, but it’s still very angry at Apple
Washington Post: Attorney general and FBI director blast Apple after tracing Pensacola gunman’s phone to al-Qaeda
New York Times: F.B.I. Finds Links Between Pensacola Gunman and Al Qaeda

@dnvolz: Sound familiar? FBI gets into iPhone belonging to dead terrorist that they said months ago they could not unlock.
@adamgoldmanNYT: The F.B.I. found the gunman, a Saudi Air Force cadet training with the American military, had communicated with a Qaeda operative who had encouraged the attacks
@kevincollier: "Breaking encryption" on an iPhone has a specific meaning and enormous consequences. I really hope those making that claim today wouldn't do so without backing it up.
@nakashimae: FBI Director Chris Wray: "We received effectively no help from Apple" in accessing the Pensacola shooter's iPhones.
@zackwhittaker: Apple in January: "The FBI only notified us on January 6 that they needed additional assistance—a month after the attack occurred. Only then did we learn about the existence of a second iPhone associated with the investigation and the FBI's inability to access either iPhone."
@zackwhittaker: Apple also said at the time it responded to six more legal requests for information between Dec. 7 and Dec. 14, and that it provided iCloud backups, account information and transactional data for multiple accounts.
@zackwhittaker: It's not that Apple provided "effectively no help" to the FBI. It's that Apple didn't acquiesce to the wants and wishes of the government and backdoor its own devices. We almost had an entire court case about this — but the FBI bottled it.
@iblametom: New - The FBI hacks into the iPhones of Pensacola shooter, finds links to Al Qaeda. But director Chris Wray still says Apple should've helped and its delays caused real problems.
@karaswisher: Looks like the government can do what it said it could not do
@macrumors: FBI Reportedly Gained Access to iPhone Used by Mass Shooter in Florida After Apple Refused to Help https://macrumors.com/2020/05/18/fbi-reportedly-accessed-alshamrani-iphone/ by @rsgnl
@zackwhittaker: ACLU statement is extremely Nail polish "The boy who cried wolf has nothing on the agency that cried encryption."
@iblametom: Source at FBI told me they chose the wrong battle with Pensacola too... they’ve been able to get into iPhone 5 and 7 for some time.
@dotmudge: Two things: 1 - AQAP (Al Qaeda Arabian Peninsula) linked terrorist attack on US soil, and it barely makes the news cycle 2 - investigations show accessing iPhones on one-off’s continues to negate necessity to drop user crypto protections at large
@DevlinBarrett: Attorney general and FBI director crank up their encryption fight with Apple, blasting the company after agents traced data on a Pensacola gunman’s phone to al-Qaeda
@ahmed: FBI says Saudi shooter at Pensacola base was in touch with al-Qaeda leaders, accuses Apple of wasting “valuable time” by refusing to unlock his phone to investigators


May 7, 2020
Lindsey O'Donnell / Threatpost

Lindsey O'Donnell / Threatpost  
China’s Naikon APT Group is Waging an Espionage Campaign Against Several Governments in the Asia-Pacific Region

Although seemingly silent since Kaspersky Lab discovered them in 20015, China’s state-backed hacking group, the Naikon APT group, is behind a five-year campaign against several governments in the Asia-Pacific region, researchers at Check Point said. The campaign, which accelerated in 20019 and during the first quarter of 2020, is targeting countries in the APAC region, including Australia, Indonesia, Philippines, Vietnam, Thailand, Myanmar, and Brunei, in a quest to gather geopolitical intelligence. The attackers are using phishing emails with attachments that contain an invisible cyberattack tool called Aria-body, which had never been detected before and had alarming new capabilities. Naikon will continue to pose as a significant threat, Check Point said, as it uses new server infrastructure, ever-changing loader variants, in-memory fileless loading, and a new backdoor.

Related: CyberSecurity Help s.r.o., TechRepublic, Check Point Research, Engadget, The Hacker News, Reddit – cybersecurity, BleepingComputer.com, CNBC, New York Times, The Times of Israel, Mother Jones, BetaNews, 9News , News.com.au, PerthNow, Braidwood Times, The New Daily, News.com, The West

Tweets:@ronenbergman

CyberSecurity Help s.r.o.: Naikon APT silently spied on government entities in the APAC region for at least five years
TechRepublic: Report: Chinese-linked hacking group has been infiltrating APAC governments for years
Check Point Research: Naikon APT: Cyber Espionage Reloaded
Engadget: A Chinese hacking group is reportedly targeting governments across Asia
The Hacker News: This Asia-Pacific Cyber Espionage Campaign Went Undetected for 5 Years
Reddit – cybersecurity: Naikon APT Hid Five-Year Espionage Attack Under Radar
BleepingComputer.com: New ‘Aria-body’ backdoor gets advanced hackers ?back in the spy game
CNBC: New cybersecurity report says China-based group is hacking Asia-Pacific governments
New York Times: Naikon, Group Tied to China’s Military, Deploys Debilitating New Cyberattack Tool
The Times of Israel: Israeli firm says Chinese cyber-espionage tool used to spy on governments
Mother Jones: Amid Coronavirus Cyber Attacks, a New Report Sheds Light on a Major Chinese Hacking Group
BetaNews: Hacker group has targeted Asia Pacific governments in five-year campaign
9News : Top WA department in ‘China cyber attack’ – 9News
News.com.au: Premier hit by hackers with China link
PerthNow: WA Government ‘targeted’ by Chinese hackers with advanced cyberattack tool: report
Braidwood Times : McGowan office in ‘China cyber attack’ – Braidwood Times
The New Daily: WA Premier Mark McGowan’s office targeted in ‘China cyber attack’
News.com.au: Premier hit by hackers with China link
The West : Chinese hackers targeted Premier Mark McGowans office with advanced cyberattack tool, report claims

@ronenbergman: NEW- cyber group affiliated with Chinese intelligence,is using a new never-seen-before powerful hacking weapon, in a series of attacks on embassies,government offices and state owned technology and science companies in Asia and Australia W\ @stevenleemyers


May 10, 2020
David Sanger, Nicole Perlroth / New York Times

David Sanger, Nicole Perlroth / New York Times  
DHS and FBI to Formally Warn That China’s Top Hackers and Spies Aim to Steal Coronavirus Vaccine, Treatment Research

In the latest Trump Administration move to highlight the cyber threat China poses, the F.B.I. and the Department of Homeland Security will issue a warning that China’s most skilled hackers and spies are working to steal American research into vaccines and treatments for the coronavirus. This effort is part of a wider surge of cyberthreats by nation-states seeking to exploit the coronavirus pandemic. The warning comes as Israeli officials accuse Iran of mounting an attempt in late April to cripple water supplies as Israelis were confined to their houses. A draft of the warning reads that “valuable intellectual property and public health data through illicit means related to vaccines, treatments, and testing.”  It focuses on cybertheft and action by “nontraditional actors,” a euphemism for researchers and students inside educational institutions seeking to steal research.

Related: Daily Mail, WSJ.com, The Hill: Cybersecurity, New York Post

Tweets:@jsfslowi @idreesali @ericgeller @SangerNYT @JenGriffinFNC @peterjhasson @lukOlejnik

Daily Mail: US officials ‘plan to accuse China of preparing hackers to steal coronavirus vaccine’ from America’
WSJ.com: U.S. to Accuse China of Attempts to Hack Coronavirus Research
The Hill: Cybersecurity: FBI, DHS to accuse China of trying to hack coronavirus researchers: reports
New York Post: FBI to warn of Chinese hackers trying to steal coronavirus vaccine data

@jsfslowi: Two technically and operationally ignorant hacks attempt to make pursuit of priority intelligence requirements/needs sound like some Earth-shattering revelation:
@idreesali: "A draft of the forthcoming public warning, which officials say is likely to be issued in the days to come, says China is seeking “valuable intellectual property and public health data through illicit means related to vaccines, treatments and testing.”"
@ericgeller: In the next few days, DHS and the FBI will publicly accuse China of trying to steal U.S. research into coronavirus treatments and vaccines, officials tell NYT.
@SangerNYT: The US is preparing to accuse China of hacking into American networks for vaccine and coronavirus treatment research, just the tip of the spear in how the pandemic has redirected state-sponsored cyber attackers. Exclusive, with the great @nicoleperlroth
@JenGriffinFNC: U.S. to Accuse China of Trying to Hack Vaccine Data, as Virus Redirects Cyberattacks - The New York Times
@peterjhasson: "The F.B.I. and the Department of Homeland Security are preparing to issue a warning that China’s most skilled hackers and spies are working to steal American research in the crash effort to develop vaccines and treatments for the coronavirus."
@lukOlejnik: Countries accuse other countries over cyberattacks designed to steal #COVID19 information (e.g. about vaccine research). "a dozen countries have redeployed military and intelligence hackers to glean whatever they can about other nations’ virus responses" https://nytimes.com/2020/05/10/us/


March 23, 2020
Natasha Singer and Choe Sang-Hun / New York Times

Natasha Singer and Choe Sang-Hun / New York Times  
Surveillance Systems Set Up to Track Coronavirus Victims’ Movement Could Become Permanent After Pandemic Ends

From South Korea to Lombardy, Italy to Israel, government agencies are harnessing surveillance-camera footage, smartphone location data and credit card purchase records in surveillance systems designed to trace the movement of coronavirus victims to stop transmission of the deadly virus. Expanding surveillance now to combat the pandemic now could permanently open the doors to more invasive forms of snooping later, as was the case after 9/11. An example of such a potentially overreaching law is one adopted in New York state this month that gives Gov. Andrew M. Cuomo unlimited authority to rule by executive order during state crises like pandemics and hurricanes. The law allows him to issue emergency response directives that could overrule any local regulations.

Related: The Verge, Verdict, EFF, FOX News, Futurism, Tech Insider

Tweets:@torproject @natashanyt @freedomhouse @evanchill @fightfortheftr @mims

The Verge: Governments are increasingly using cellphone location data to manage the coronavirus
Verdict: Location data: How telecom providers are helping to track Covid-19
EFF: Governments Haven’t Shown Location Surveillance Would Help Contain COVID-19
FOX News: European countries considering tracking phone data to help stop coronavirus spread, report says
Futurism: A Growing Number of Countries Tap Phone Data to Track COVID-19
Tech Insider: 11 countries are now using people’s phones to track the coronavirus pandemic, and it heralds a massive increase in surveillance

@torproject: "ratcheting up surveillance to combat the pandemic now could permanently open the doors to more invasive forms of snooping later. It is a lesson Americans learned after the terrorist attacks of Sept. 11, 2001..." https://nytimes.com/2020/03/23/technology/coronavirus-surveillance-tracking-privacy.html .onion: https://nytimes3xbfgragh.onion/2020/03/23/tec
@natashanyt: Disclosures of personal data about coronavirus patients around the world have drastically eroded people’s ability to keep their health status private.
@freedomhouse: Racheting up surveillance to combat the pandemic now could permanently open the doors to more invasive snooping later (as Americans learned in the wake of 9/11 terrorism investigations).
@evanchill: The fine-tuned surveillance that allows a country like South Korea to drastically slow coronavirus could leave in place a new network of control ripe for to authoritarian abuse
@fightfortheftr: More surveillance is not the answer. More surveillance is not the answer. More surveillance is not the answer. More surveillance is not the answer. More surveillance is not the answer. More surveillance is not the answer.
@mims: A critical discussion right now and for the next, well, forever: How Surveillance Could Save Lives Amid a Public Health Crisis https://wired.com/story/surveillance-save-lives-amid-public-health-crisis/ vs. As Coronavirus Surveillance Escalates, Personal Privacy Plummets


May 15, 2020
David Shepardson, Karen Freifeld, Alexandra Alper / Reuters

David Shepardson, Karen Freifeld, Alexandra Alper / Reuters  
Trump Administration Blocks Chip Supplies to Huawei Raising Fears That China Will Retaliate, Commerce Department Separately Extended Ability of Rural Telcos to Use Huawei Gear

The Trump administration moved to block global chip supplies to blacklisted telecoms equipment giant Huawei Technologies spurring fears of Chinese retaliation and hammering shares of U.S. producers of chipmaking equipment. Under a new rule developed by the Commerce Department, U.S. authority to require licenses for sales to Huawei of semiconductors made abroad with U.S. technology has been dramatically expanded to halt exports to China’s leading smartphone maker. Reports indicate that China is getting ready to put U.S. companies on an “unreliable entity list,” as part of the retaliation against the U.S. move against Huawei. Among the measures contemplated are launching investigations and imposing restrictions on U.S. companies such as Apple, Cisco, and Qualcomm as well as suspending purchase of Boeing airplanes.  The move also hits Taiwan Semiconductor Manufacturing, the biggest contract chipmaker, and key Huawei supplier, which just announced plans to build a U.S.-based plant. Separately, the Commerce Department extended a temporary license that was set to expire on Friday to allow U.S. companies, mostly rural telcos, to continue doing business with Huawei through August 13.

Related: Global Times, Global Times, iMore, Law360, Computer Weekly, SiliconANGLE, Wired, New York Times – Business, South China Morning Post, Cyberscoop, WCCFtech, MacDailyNews, Android CentralZero Hedge, xda-developers, Digit, Multichannel, Law360, MarketWatch.com – Software Industry News, CNBC Technology, Reuters: Business News, The Hill: Cybersecurity

Tweets:@SariArhoHavren

Global Times : Shares of key US firms dive as Chinese govt source leaks retaliation plan on Huawei ban
Global Times : Insider reveals details on China’s plan to target US tech giants to retaliate against Huawei ban
iMore : China threatens companies like Apple with investigations and restrictions
Law360: US Aims To Muscle Huawei Out Of Global Chip Supply Chain – Law360
Computer Weekly: US maintains ban on Chinese tech firms as Huawei, ZTE make 5G leaps
SiliconANGLE: U.S. implements new rules to restrict Huawei’s access to chip technology
Wired: The US Will Help a Taiwan Firm Build a Chip Plant in Arizona
New York Times – Business: U.S. Delivers Another Blow to Huawei With New Tech Restrictions
South China Morning Post: US plans to further restrict Huawei’s development of semiconductors using American technology
Cyberscoop: US Commerce Department tightens screws on Huawei export controls
WCCFtech: Huawei Crippled by the Latest Round of U.S. Sanctions as the Broader Chipmaker Sphere Plunges Into the Red
MacDailyNews: China ready to target Apple, other U.S. firms in retaliation against U.S.’ Huawei ban
Android Central : Trump administration will soon begin blocking Huawei’s global chip supply
Zero Hedge: Futures Tumble After US Restarts Trade War With China, Locks Out Huawei; China Vows Retaliation Against Apple, Boeing
xda-developers: Win a Huawei P40 Pro+ [Open to all Countries]
Digit: Jios new Rs 999 prepaid plan gives users 3GB daily data with a validity of 84 days
Multichannel: Commerce Targets Huawei with New Restrictions
Law360: US Aims To Muscle Huawei Out Of Global Chip Supply Chain – Law360
MarketWatch.com – Software Industry News: Capitol Report: Trump administration moves to cut Huawei off from semiconductor suppliers
CNBC Technology: U.S.-China tensions rise as Trump administration moves to cut Huawei off from global chip suppliers
Reuters: Business News: U.S. moves to cut Huawei off from global chip suppliers
The Hill: Cybersecurity: Commerce Department cracks down on Huawei’s access to chips

@SariArhoHavren: On Friday, “the Trump administration moved to block shipments of semiconductors to Huawei from global chipmakers. The US Commerce Department said it was amending an export rule to strategically target Huawei's acquisition of semiconductors.."


April 27, 2020
Adam Satariano / New York Times

Adam Satariano / New York Times  
Europe’s GDPR is Struggling to Fulfill Its Promise Because Authorities Fear Getting Ensnared in Lawsuits Against Big Tech Companies, Brave

Europe’s widely hailed data protection and privacy law, the General Data Protection Regulation (GDPR), enacted two years ago, is struggling to fulfill its promise according to a new report from security-focused browser organization Brave. According to the report, the governments of EU Member States have not given data protection authorities (DPAs) the tools they need to enforce the GDPR. Brave’s investigation found that few expert tech investigators are working to uncover private sector GDPR infringements and that few  DPAs use their powers against major tech firms because they can not afford the cost of legally defending their decisions against ‘Big Tech’ legal firepower. The report concludes that GDPR enforcers must be able to properly investigate ‘big tech’ and act without fear of vexatious appeals.

Related: Brave.com, The Mac Observer, Pen Test Partners, TechCrunch, Financial Times

Tweets:@satariano @1Br0wn @piracybydesign @nytbusiness @johnnyryan