Search Results for “The Hill”


March 23, 2020
Natasha Singer and Choe Sang-Hun / New York Times

Natasha Singer and Choe Sang-Hun / New York Times  
Surveillance Systems Set Up to Track Coronavirus Victims’ Movement Could Become Permanent After Pandemic Ends

From South Korea to Lombardy, Italy to Israel, government agencies are harnessing surveillance-camera footage, smartphone location data and credit card purchase records in surveillance systems designed to trace the movement of coronavirus victims to stop transmission of the deadly virus. Expanding surveillance now to combat the pandemic now could permanently open the doors to more invasive forms of snooping later, as was the case after 9/11. An example of such a potentially overreaching law is one adopted in New York state this month that gives Gov. Andrew M. Cuomo unlimited authority to rule by executive order during state crises like pandemics and hurricanes. The law allows him to issue emergency response directives that could overrule any local regulations.

Related: The Verge, Verdict, EFF, FOX News, Futurism, Tech Insider

Tweets:@torproject @natashanyt @freedomhouse @evanchill @fightfortheftr @mims

The Verge: Governments are increasingly using cellphone location data to manage the coronavirus
Verdict: Location data: How telecom providers are helping to track Covid-19
EFF: Governments Haven’t Shown Location Surveillance Would Help Contain COVID-19
FOX News: European countries considering tracking phone data to help stop coronavirus spread, report says
Futurism: A Growing Number of Countries Tap Phone Data to Track COVID-19
Tech Insider: 11 countries are now using people’s phones to track the coronavirus pandemic, and it heralds a massive increase in surveillance

@torproject: "ratcheting up surveillance to combat the pandemic now could permanently open the doors to more invasive forms of snooping later. It is a lesson Americans learned after the terrorist attacks of Sept. 11, 2001..." https://nytimes.com/2020/03/23/technology/coronavirus-surveillance-tracking-privacy.html .onion: https://nytimes3xbfgragh.onion/2020/03/23/tec
@natashanyt: Disclosures of personal data about coronavirus patients around the world have drastically eroded people’s ability to keep their health status private.
@freedomhouse: Racheting up surveillance to combat the pandemic now could permanently open the doors to more invasive snooping later (as Americans learned in the wake of 9/11 terrorism investigations).
@evanchill: The fine-tuned surveillance that allows a country like South Korea to drastically slow coronavirus could leave in place a new network of control ripe for to authoritarian abuse
@fightfortheftr: More surveillance is not the answer. More surveillance is not the answer. More surveillance is not the answer. More surveillance is not the answer. More surveillance is not the answer. More surveillance is not the answer.
@mims: A critical discussion right now and for the next, well, forever: How Surveillance Could Save Lives Amid a Public Health Crisis https://wired.com/story/surveillance-save-lives-amid-public-health-crisis/ vs. As Coronavirus Surveillance Escalates, Personal Privacy Plummets


March 12, 2020
MARTIN MATISHAK and MARIANNE LEVINE / Politico

MARTIN MATISHAK and MARIANNE LEVINE / Politico  
Extension of FISA Surveillance Powers Pass the House of Representatives

Following weeks of controversy, the House passed by 278-136, a long-term extension of surveillance powers under the Foreign Intelligence Surveillance Act (FISA) that are due to expire in three days. Several Republicans backed the bill despite the warnings of Donald Trump that he wouldn’t support an extension of the sunsetting authorities under FISA without significant changes to the FISA. The bill now heads to the Senate, where it faces a filibuster.

Related: Reuters, Daily Beast, USATODAY, CBSNews.com, The Hill, POLITICO, Courthouse News Service, CNN.com – Politics, Lawfare, GlobalNews.ca, AP Breaking News


May 15, 2020
David Shepardson, Karen Freifeld, Alexandra Alper / Reuters

David Shepardson, Karen Freifeld, Alexandra Alper / Reuters  
Trump Administration Blocks Chip Supplies to Huawei Raising Fears That China Will Retaliate, Commerce Department Separately Extended Ability of Rural Telcos to Use Huawei Gear

The Trump administration moved to block global chip supplies to blacklisted telecoms equipment giant Huawei Technologies spurring fears of Chinese retaliation and hammering shares of U.S. producers of chipmaking equipment. Under a new rule developed by the Commerce Department, U.S. authority to require licenses for sales to Huawei of semiconductors made abroad with U.S. technology has been dramatically expanded to halt exports to China’s leading smartphone maker. Reports indicate that China is getting ready to put U.S. companies on an “unreliable entity list,” as part of the retaliation against the U.S. move against Huawei. Among the measures contemplated are launching investigations and imposing restrictions on U.S. companies such as Apple, Cisco, and Qualcomm as well as suspending purchase of Boeing airplanes.  The move also hits Taiwan Semiconductor Manufacturing, the biggest contract chipmaker, and key Huawei supplier, which just announced plans to build a U.S.-based plant. Separately, the Commerce Department extended a temporary license that was set to expire on Friday to allow U.S. companies, mostly rural telcos, to continue doing business with Huawei through August 13.

Related: Global Times, Global Times, iMore, Law360, Computer Weekly, SiliconANGLE, Wired, New York Times – Business, South China Morning Post, Cyberscoop, WCCFtech, MacDailyNews, Android CentralZero Hedge, xda-developers, Digit, Multichannel, Law360, MarketWatch.com – Software Industry News, CNBC Technology, Reuters: Business News, The Hill: Cybersecurity

Tweets:@SariArhoHavren

Global Times : Shares of key US firms dive as Chinese govt source leaks retaliation plan on Huawei ban
Global Times : Insider reveals details on China’s plan to target US tech giants to retaliate against Huawei ban
iMore : China threatens companies like Apple with investigations and restrictions
Law360: US Aims To Muscle Huawei Out Of Global Chip Supply Chain – Law360
Computer Weekly: US maintains ban on Chinese tech firms as Huawei, ZTE make 5G leaps
SiliconANGLE: U.S. implements new rules to restrict Huawei’s access to chip technology
Wired: The US Will Help a Taiwan Firm Build a Chip Plant in Arizona
New York Times – Business: U.S. Delivers Another Blow to Huawei With New Tech Restrictions
South China Morning Post: US plans to further restrict Huawei’s development of semiconductors using American technology
Cyberscoop: US Commerce Department tightens screws on Huawei export controls
WCCFtech: Huawei Crippled by the Latest Round of U.S. Sanctions as the Broader Chipmaker Sphere Plunges Into the Red
MacDailyNews: China ready to target Apple, other U.S. firms in retaliation against U.S.’ Huawei ban
Android Central : Trump administration will soon begin blocking Huawei’s global chip supply
Zero Hedge: Futures Tumble After US Restarts Trade War With China, Locks Out Huawei; China Vows Retaliation Against Apple, Boeing
xda-developers: Win a Huawei P40 Pro+ [Open to all Countries]
Digit: Jios new Rs 999 prepaid plan gives users 3GB daily data with a validity of 84 days
Multichannel: Commerce Targets Huawei with New Restrictions
Law360: US Aims To Muscle Huawei Out Of Global Chip Supply Chain – Law360
MarketWatch.com – Software Industry News: Capitol Report: Trump administration moves to cut Huawei off from semiconductor suppliers
CNBC Technology: U.S.-China tensions rise as Trump administration moves to cut Huawei off from global chip suppliers
Reuters: Business News: U.S. moves to cut Huawei off from global chip suppliers
The Hill: Cybersecurity: Commerce Department cracks down on Huawei’s access to chips

@SariArhoHavren: On Friday, “the Trump administration moved to block shipments of semiconductors to Huawei from global chipmakers. The US Commerce Department said it was amending an export rule to strategically target Huawei's acquisition of semiconductors.."


March 23, 2020
Raphael Satter, Jack Stubbs, Christopher Bing / Reuters

Raphael Satter, Jack Stubbs, Christopher Bing / Reuters  
Hackers Tried to Break into World Health Organization as Agency Comes Under Two-Fold Increase in Cyberattacks

Elite hackers tried to break into the World Health Organization earlier this month, part of what a senior agency official said was a more than two-fold increase in cyberattacks. WHO Chief Information Security Officer Flavio Aggio said the identity of the hackers was unclear, and the effort was unsuccessful. Alexander Urbelis, a cybersecurity expert and attorney with the New York-based Blackstone Law Group, which tracks suspicious internet domain registration activity, brought the attempted WHO break-in to Reuters’ attention. He picked up on the activity around March 13 when a group of hackers he had been following activated a malicious site mimicking the WHO’s internal email system. The same malicious web infrastructure belonging to a hacking group known as DarkHotel had also been used to target other healthcare and humanitarian organizations in recent weeks, although it’s unclear if DarkHotel is connected to the WHO hacking.

Related: DataBreaches.net, PYMNTS.com, Slashdot, Boing Boing, The Hill: Cybersecurity, Business Insider

Tweets:@bing_chris @bing_chris @bing_chris @bing_chris


March 16, 2020
Shira Stein and Jennifer Jacobs / Bloomberg

Shira Stein and Jennifer Jacobs / Bloomberg  
U.S. Health and Human Services Department Was Target of Apparent DDoS Attack as It Grapples With Coronavirus Pandemic

The U.S. Health and Human Services Department suffered a cyber-attack, an apparent DDoS attack, on its computer system Sunday night during the nation’s response to the coronavirus pandemic. The attack appears to have been intended to slow the agency’s operations down but didn’t do so in any meaningful way, according to a source. A tweet issued by the National Security Council warning of a fake quarantine alert is somehow related to this cyberattack and the release of disinformation.

Related: AOL, Tech Insider, MSSP Alert, RT USA, Good Morning America, CNET, The Hill: Cybersecurity, FOX News, Mashable, Washington Examiner, ABC News: U.S., Channel News Asia, Mercury News, The Sun, Cyberscoop

Tweets:@shiramstein @jenniferjjacobs @jenniferjjacobs @josephfcox @gregotto @WHNSC @kevincollier @kevincollier @ericgeller @gregotto

AOL: U.S. health department hit by a cyberattack: Bloomberg
Tech Insider: Hackers just attacked a US health agency’s computer system in an attempt to slow down its COVID-19 response
MSSP Alert: Cyberattack Hits US Health Agency Amid Coronavirus Response Efforts
RT USA: US Health and Human Services faces cyber attack during coronavirus response — reports
Good Morning America: Cyberattack on HHS meant to slow coronavirus response, sources say
CNET: Hackers hit US health agency during coronavirus crisis
The Hill: Cybersecurity: Top US health agency suffers cyberattack: report
FOX News: Cyberattack hits Department of Health and Human Services, report says
Mashable: U.S. health agency attacked by hackers amid coronavirus outbreak
Washington Examiner: Health and Human Services hit with cyberattack
ABC News: U.S.: Cyberattack on HHS meant to slow coronavirus response, sources say
Channel News Asia: Cyberattack hits US health department amid coronavirus – Bloomberg
Mercury News: Coronavirus: Stocks plunge; Apple, Intel slump despite Fed’s rate cut
The Sun: Cyber attack to ‘slow US response to coronavirus’ took place overnight
Cyberscoop: HHS saw increase in network scanning in midst of COVID-19 outreach

@shiramstein: SCOOP: HHS suffered a cyber-attack last night during the nation’s response to #COVID?19. The attack appears to have been intended to slow the agency’s systems down, but didn’t do so in any meaningful way. From me and @JenniferJJacobs
@jenniferjjacobs: NEWS: The National Security Council’s tweet on Sunday night was related to HHS hacking and release of disinformation, per sources. The govt realized Sunday that there had been a cyber intrusion and false information was circulating. Story with @shiramstein https://bloomberg.com/amp/news/articles/2020-03-16/u-s-health-agency-suffers-cyber-attack-during-covid-9-response
@jenniferjjacobs: LATEST: U.S. officials have not yet confirmed who was behind the HHS hacking. The hack yesterday involved overloading the HHS servers with millions of hits over several hours, sources tell me and @shiramstein https://bloomberg.com/amp/news/articles/2020-03-16/u-s-health-agency-suffers-cyber-attack-during-covid-9-response
@josephfcox: - "The hack involved overloading the HHS servers with millions of hits over several hours." - "intended to slow the agency’s systems down, but didn’t do so in any meaningful way." So a failed DDoS. Meh.
@gregotto: VERY scant details from Bloomberg right now. Reading between the lines it looks like someone tried to DDOS @HHSGov last night -- and most importantly, it looks like the attempt failed
@WHNSC: Text message rumors of a national #quarantine are FAKE. There is no national lockdown. @CDCgov has and will continue to post the latest guidance on #COVID19. #coronavirus
@kevincollier: The Bloomberg HHS story seems really overblown by what they have so far. An unsuccessful DDoS attack isn't a major concern, is extremely difficult to attribute, and importantly isn't a "hack." Of note: neither of the bylines are from cyber reporters. Tread lightly w this one.
@kevincollier: Not every smidgen of suspicious internet activity is a hack, or newsworthy. We cyber reporters would have a lot more to do if it was. This is one of those times where news outlets should lean on the judgement on the experts they have in-house.
@ericgeller: Can't emphasize enough how important it is for newsrooms to vet these things with their in-house experts, i.e. their cybersecurity reporters.
@gregotto: Myself, @snlyngaas & @shanvav did some work on this -- sources tell us it was a failed DDOS attempt at best. Systems/website never went down


March 18, 2020
Tony Romm, Elizabeth Dwoskin and Craig Timberg / Washington Post

Tony Romm, Elizabeth Dwoskin and Craig Timberg / Washington Post  
Tech Giants Including Facebook and Google Are Talking With Federal Government About Using Americans’ Location Data Gleaned From Mobile Devices to Combat COVID-19

Raising a host of privacy issues, the U.S. government is in active talks with Facebook, Google, and a wide array of tech companies and health experts about how they can use location data gleaned from Americans’ phones to combat the novel coronavirus. These discussions include the prospect of tracking whether people are keeping one another at safe distances to stem the outbreak. Facebook executives said the U.S. government is particularly interested in understanding patterns of people’s movements, which can be derived through data the company collects from users who allow it. Google confirmed it is talking with the government on its own to tap its trove of location data, particularly any insights it can derive from its popular maps app.

Related: TechSpotiMore, Android Central , The Hill: Cybersecurity, POLITICO, GeekWire, TODAYonline, Fortune, PhoneArena, Vox, Android Authority, CNET


May 1, 2020
Michael Hill / Infosecurity Magazine

Michael Hill / Infosecurity Magazine  
Cybercriminals Increasingly Use Official reCAPTCHA to Disguise Malicious Content in Phishing Attempts

Cybercriminals are increasingly using official reCAPTCHA walls to disguise malicious content from email security systems and trick unsuspecting users, researchers at Barracuda Networks report. A single phishing campaign that sent out 128,000 emails to a variety of organizations and employees using reCAPTCHA walls to conceal fake Microsoft log-in pages was observed by the Barracuda researchers. Given this, users must be educated about the threat so they know to be cautious instead of assuming a reCAPTCHA is a sign that a page is safe, Barracuda says.

April 25, 2020
Dewey Coldewey / TechCrunch

Dewey Coldewey / TechCrunch  
FCC’s Public Comment System Suffers From Dozens of Cybersecurity Vulnerabilities That Must Be Addressed, GAO

An investigation by the General Accountability Office (GAO) found that the FCC’s comment system for collecting public input on agency rulemakings suffers from dozens of cybersecurity vulnerabilities that must be addressed. The GAO’s investigation was sparked by a segment of an HBO show hosted by John Oliver. During that segment, Oliver urged his viewers to file comments at the FCC, asking the communications regulatory agency not to repeal its net neutrality rules. In the aftermath of Oliver’s show, the FCC’s public comment submission process broke down under strain, a failure that the agency initially and falsely blamed on a DDoS attack.

Related: The Hill: Cybersecurity, Multichannel News, GAO, Security Week, Federal Times, Fifth Domain

Tweets:@dellcam @karlbode @karlbode


March 19, 2020
Security Ledger

Security Ledger  
Episode 178: Killing Encryption Softly with the EARN IT Act. Also: SMBs Struggle with Identity

The EARN IT Act is slouching its way to passage on Capitol Hill, alarming privacy and civil liberties experts. Andrea Little Limbago the Chief Social Scientist at the firm Virtru talks about why EARN IT is so dangerous. Also: small and medium-sized businesses are the majority of businesses in the U.S., but they are often overlooked by the companies marketing and selling security solutions.

April 23, 2020
Derek B. Johnson / FCW

Derek B. Johnson / FCW  
Justice Department Has Disrupted Hundreds of Internet Domains Used to Exploit COVID-19 Pandemic

The U.S. Department of Justice announced that through an ongoing cooperative effort between law enforcement and several private-sector companies, it had taken action to disrupt “hundreds” of internet domains used to exploit the COVID-19 pandemic to commit fraud and other crimes. The domains often contained words such as “covid19,” or “coronavirus” and sometimes purported to be run by, or affiliated with, public health organizations or agencies. But they were scam sites that advertised fake vaccines and cures, operated fraudulent charity drives, delivered malware, or hosted various other types of scams. The Justice Department said that they have reviewed and received more than 3,600 complaints related to such sites.