Search Results for “Washington Post”


July 22, 2019
Ellen Nakashima, Gerry Shih and John Hudson / Washington Post

Ellen Nakashima, Gerry Shih and John Hudson / Washington Post  
Huawei Secretly Helped North Korea Build, Maintain Country’s Commercial Wireless Network, Helped Develop Phones Immune to Surveillance, Report

In a discovery that is likely to fuel even further distrust among Western nations, controversial telecom giant Huawei secretly helped the North Korean government build and maintain the country’s commercial wireless network, according to internal documents obtained by The Washington Post and people familiar with the arrangement. Huawei partnered with a Chinese state-owned firm, Panda International Information Technology, on a variety of projects there spanning at least eight years. North Korean wireless provider Koryolink reportedly emerged from a visit by Kim Jong Il to Huawei’s headquarters in Shenzhen, China and was built through a 2008 joint venture of Orascom Telecom Holding, an Egyptian firm, and the state-owned Korea Post and Telecommunications in a venture called CHEO Technology. An encryption “test bed” was built by Huawei in Shenzhen to develop a local encryption protocol immune to the same surveillance vulnerabilities that international standard mobile phones are.

Related: Engadget, Technology News, YonhapNews, CNBC Technology, Yahoo News, Daily Mail, South China Morning Post, The Guardian, Techradar, Yahoo News, 38 North, Hacker Combat

Tweets:@martyn_williams


September 12, 2019
Daniel Lippman / Politico

Daniel Lippman / Politico  
Israel Was Most Likely Behind Placement of Surveillance Stingray Devices Near White House Which Aimed to Spy on Donald Trump, Administration Failed to Rebuke Israeli Government, Sources

The U.S. government concluded within the last two years that Israel was most likely behind the placement of cell-phone surveillance devices known as Stingrays, or more formally international mobile subscriber identity-catchers or IMSI-catchers, that were found near the White House and other sensitive locations around Washington, D.C., yet the Trump Administration did nothing about it and failed to rebuke the Israeli government. The devices were intended to spy on Donald Trump as well as his top aides and closest associates. U.S. officials shared their findings with relevant federal agencies, according to a letter a top DHS official, Christopher Krebs, wrote in May 2018 to Sen. Ron Wyden (D-OR.). According to a detailed forensic analysis, the FBI and other agencies working on the case felt confident that Israeli agents had placed the devices, sources say. Israel issued a pro forma denial that it is the culprit behind the stingrays.

Related: Gizmodo, Slate, Bloomberg, The Guardian, Just Security, Washington Examiner, Israel National News, Haaretz.com, Washington Examiner, NBC News Top Stories, PressTV, South China Morning Post, FuturismCBSNews.com, Jerusalem Post, Vox, BBC News – World, CBSNews.com, The Times of Israel, Algemeiner.com, BBC News – World, SC Magazine, Reuters: World News, Slashdot

Tweets:@dlippman @thegrugq @maxblumenthal @olgaNYC1211 @kenklippenstein @yashar @KyleWOrton @NTarnopolsky @AkiPeritz @CrispinBurke @ericgeller @timothypmurphy @gregotto @russellbrandom

Gizmodo: Israel Allegedly Installed Stingray Devices Around D.C. to Spy on President Trump
Slate: Israel Reportedly Known to Be Spying on White House Cell Phones, but Trump Didn’t Do Anything About It
Bloomberg: Israel Denies Report it Planted Spying Devices in Washington D.C.
The Guardian: Israel accused of planting spying devices near White House
Just Security: The Early Edition: September 12, 2019
Washington Examiner: Israel blamed for spy devices found near White House
Israel National News : Report: Israel accused of planting spy devices near White House
Haaretz.com: Israel reportedly planted mysterious spy devices near White House
Washington Examiner: Israel blamed for spy devices found near White House
NBC News Top Stories: Netanyahu denies Israel planted spy devices near the White House
PressTV: Israel accused of placing spy devices near White House: Report
South China Morning Post: Israel accused of planting mysterious spy devices near the White House
Futurism: The FBI Reportedly Thinks Israel Spied on Trump’s Phone
CBSNews.com: Politico: Israel accused of planting spy devices near White House
Jerusalem Post: Trump says he does not believe Israelis are spying on the U.S.
Vox: Vox Sentences: Another hurdle for asylum seekers
BBC News – World: Netanyahu denies Politico report Israel spying on the White House
CBSNews.com: “StingRay” surveillance devices found near the White House
The Times of Israel: Trump says he doesn’t believe report of Israel spying on White House
Algemeiner.com: Netanyahu Denies Report of Israeli Spy Operation in US
BBC News – World: Netanyahu denies Politico report Israel spying on the White House
SC Magazine: Israel reportedly behind spying devices found near White House, other sensitive areas | SC Media
Reuters: World News: Trump says he does not believe Israelis are spying on the U.S.
Slashdot: Israel Accused of Planting Mysterious Spy Devices Near the White House

@dlippman: SCOOP: The U.S. government concluded within the last two years that Israel was most likely behind cell-phone surveillance devices that were found operating near the WH and other sensitive parts of D.C., according to three former senior U.S. officials.
@thegrugq: The counterintelligence threat of using commodity mobile phones for sensitive matters is very very real. The ISMSI catchers found around the WH a couple years ago were apparently intended to capture Trump & his crew’s phones.Linked, allegedly, to Israel.
@maxblumenthal: US govt has concluded within the last two years that Israel was most likely behind surveillance devices found near the White House and other sensitive locations around DCYet “the Trump administration did not rebuke the Israeli government” #IsraelGate
@olgaNYC1211: Wait let me get this straight.. Trump is accusing Israel off spying on him? Can't wait to see Trump cults response
@kenklippenstein: "after the FBI and other agencies concluded that the Israelis were most likely responsible for the devices, the Trump administration took no action to punish or even privately scold the Israeli government."
@yashar: New: Israel was most likely behind the placement of surveillance devices that were found near the White House. But even though officials believe the devices were planted to spy on POTUS and other officials, the WH did not punish Israel@dlippman scoops
@KyleWOrton: Espionage devices, designed to fool mobile telephones into giving up data, were found "near the White House and other sensitive locations around Washington, D.C.", targeting Trump and other senior officials. #Israel is almost certainly responsible.
@NTarnopolsky: #Breaking: The FBI accuses Israel of spying on the White House. Administration tried to downplay findings. Israeli embassy says "we don't spy on the United States."
@AkiPeritz: So it turns out it was Israel that places the Stingrays around downtown DC to collect intelligence on top US policymakers, like POTUS, Kushner and everyone else.
@CrispinBurke: "Unlike most other occasions when flagrant incidents of foreign spying have been discovered on American soil, the Trump administration did not rebuke the Israeli government, and there were no consequences for Israel’s behavior..."
@ericgeller: Israel planted StingRays in D.C. to spy on Trump, and his administration is fine with it because, you know, Israel. https://politico.com/story/2019/09/12/israel-white-house-spying-devices-1491351
@timothypmurphy: best frenz
@gregotto: Three officials tell Politico that Israel planted stingrays in areas around the White House
@russellbrandom: Israel planted Stingrays cell-trackers pointed towards the White House, per Politico


October 4, 2019
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Microsoft Says ‘Phosphorous’ Threat Group Linked to Iranian Government Targeted Unnamed 2020 U.S. Presidential Candidate’s Email Account Along With 2,700 Other Email Accounts

Microsoft said that it has seen a threat group linked to the Iranian government, which it calls Phosphorous but is also known as APT 35, target an unnamed 2020 U.S. presidential candidate. In a 30-day period between August and September of this year, Phosphorous made more than 2,700 attempts to identify consumer email accounts belonging to specific Microsoft customers that are “associated” with a presidential campaign, current and former U.S. government officials, journalists and prominent Iranians living outside the country. Four of the accounts not associated with the U.S. presidential campaign or current and former U.S. government officials were compromised in the effort. The attacks, which Microsoft described as not sophisticated, attempted to use a “significant amount of personal information” to game password reset or account recovery features and try to take over some targeted accounts. Some of the attacks entailed gathering and targeting user phone numbers.

Related: Microsoft, Fifth Domain | Cyber, New York Post, Digital Trends, Algemeiner.com, AOL, Financial Times, The Hill: Cybersecurity, The Hill: Cybersecurity, The Register – Security, MSPoweruser, Gizmodo, The Age, Reuters, Axios , BleepingComputer.com, News : NPR, UPI.com, CNN.com, Slashdot , Haaretz.com, Jerusalem Post, Channel News Asia, Arutz Sheva News, News.com.au, CNBC, News.com.au, AP Breaking News,NBC News Top Stories, VentureBeat, USA Today, RT News, CTVNews.ca, TribLIVE, Star TribuneEngadget, PCMag.com, WashingtonExaminer.com, ZDNet, Bloomberg Politics, Al Jazeera English, CNET News, CNN.com, New York Times – Nicole Perlroth, CNET News, Deutsche Welle, Washington Post, Washington Post, ZDNet, The Palm Beach Post, The Age, ZDNet, Stars and Stripes, Windows Central , Law & Disorder – Ars Technica, GeekWire, JNS.org, The Verge, Fortune, TIME, POLITICO, RT News, The Times of Israel, South China Morning Post

Tweets:@Bing_Chris @Olivia_Gazis @W7VOA @tonyromm @adrianweckler @g_ratnam @shanav @jseldin @gregotto @jamestutt @magmill95 @alexwardvox

Microsoft: Recent cyberattacks require us all to be vigilant
Fifth Domain | Cyber: Iran-backed hackers targeted 2020 presidential campaign, says Microsoft
New York Post: Microsoft says Iran plotted cyber attack against US presidential campaign
Digital Trends: Microsoft blames Iran for hacking attempts on U.S. presidential candidates
Algemeiner.com: France Gives One Month to Get Iran-US to Negotiating Table
AOL: Iran-linked hackers tried to compromise presidential campaign, Microsoft says
Financial Times: Microsoft says Iran tried to hack 2020 Democratic campaign
The Register – Security: Iran tried to hack hundreds of politicians, journalists email accounts last month, warns MicrosoftThe Hill: Cybersecurity: Iran-linked group targeted email accounts for US presidential campaign, government officials
MSPoweruser: Microsoft uncovers US election hacking plot by Iranian agencies
Gizmodo: Someone ‘Highly Motivated’ Tried to a Hack 2020 Presidential Campaign, Microsoft Warns
Firstpost: Iranian hackers targeted U.S. presidential campaign, did not succeed – Microsoft
The Age: Iranian hackers targeted US presidential campaign, Microsoft says
Reuters: Iranian hackers targeted U.S. presidential campaign, did not succeed: Microsoft
Axios : Microsoft: Iranian group tried to hack unnamed 2020 candidate, others
BleepingComputer.com: Microsoft Discovers Iranian Hacking Campaign Targeting U.S. Politics
News : NPR: Microsoft Says Iranians Tried To Hack U.S. Presidential Campaign
UPI.com: Microsoft: Iran-linked hacking group has targeted 2020 U.S. campaign
CNN.com: Iranian hackers targeted presidential campaign and US government officials
Slashdot : Microsoft: Iranian Hackers Targeted a 2020 Presidential Campaign
Haaretz.com: Iranian hackers targeted a U.S. presidential campaign, Microsoft says
Jerusalem Post: Microsoft finds Iranian hackers targeted a U.S. presidential campaign
Channel News Asia: Iranian hackers targeted US presidential campaign, did not succeed – Microsoft
Arutz Sheva News: Microsoft: Iran-linked hackers tried to compromise US campaign
News.com.au: Microsoft: Iranian hackers targeted US campaign
CNBC: Microsoft says Iranian hackers targeted presidential campaign, government officials, media
News.com.au: Microsoft: Iranian hackers targeted US campaign
AP Breaking News: Iranian hackers said to target presidential campaign
New York Times : Iranian Hackers Targeted Presidential Campaign, Microsoft Says
NBC News Top Stories: Iran-linked hackers tried to compromise presidential campaign, Microsoft says
VentureBeat: Microsoft: Hackers linked to Iran targeted U.S. presidential candidate
USA Today: Microsoft: Iran government-linked hacker targeted 2020 presidential campaign
RT News: Iranian govt-linked op tried to HACK TRUMP 2020 campaign, Reuters sources claim
CTVNews.ca: Iranian hackers said to target U.S. presidential campaign
TribLIVE: Iranian hackers said to target presidential campaign
Star Tribune: Iranian hackers said to target presidential campaign
CNN.com: Iranian hackers targeted presidential campaign and US government officials
Engadget: Microsoft: Iranian cyberattack targeted a US presidential campaign
USA Today: Microsoft: Iran government-linked hacker targeted 2020 presidential campaign
PCMag.com: Microsoft: Iranian Hackers Targeted US Presidential Campaign
WashingtonExaminer.com: Microsoft: Iran-tied group attempted to hack US presidential campaign email accounts
ZDNet: Microsoft: Iranian hackers targeted a 2020 presidential campaign
Bloomberg Politics: Microsoft Says Iran Tried Hack of U.S. Presidential Campaign
Al Jazeera English: Iranian hackers targeted a US presidential campaign: Microsoft
CNET News: Iranian hackers targeted a US presidential campaign, Microsoft says – CNET
CNET News: Iranian hackers targeted a US presidential campaign, Microsoft says – CNET
Deutsche Welle: Hackers target US presidential campaign, Microsoft reports
Washington Post: Iranians tried to hack U.S. presidential campaign in effort that targeted hundreds, Microsoft says
The Palm Beach Post: Iranian hackers said to target presidential campaign
The Age: Iranian hackers targeted US presidential campaign, Microsoft says
ZDNet: Microsoft: Iranian hackers targeted a 2020 presidential campaign
Stars and Stripes: Iran tried to hack US candidates, journalists in effort that targeted hundreds, Microsoft finds
Firstpost: Iranian hackers targeted a U.S. presidential campaign, Microsoft says
Windows Central : Microsoft: Iranian hacking group targeted 2020 presidential campaign
TechCrunch: Microsoft says Iranian hackers targeted a 2020 presidential candidate
Law & Disorder – Ars Technica: Microsoft says Iranian hackers tried to hack a US presidential campaign
GeekWire: Iranian hacker group attacked email accounts tied to a US presidential candidate, Microsoft says
JNS.org: Microsoft: Iran sought to hack US presidential campaign
The Verge: Microsoft says Iranian hacking group targeted a 2020 US presidential candidate
Fortune: How Iran-linked Hackers Tried to Compromise a Presidential Campaign
TIME: Microsoft Says Iranian Hackers Targeted U.S. Presidential Campaign
POLITICO: Iranian hackers targeted 2020 presidential campaign, Microsoft finds
The Times of Israel: Microsoft says Iranian hackers targeted a US presidential campaign
South China Morning Post: Iranian hackers targeted 2020 US presidential campaign, Microsoft finds

@Bing_Chris: "The targeted accounts are associated with a U.S. presidential campaign, current and former U.S. government officials, journalists covering global politics and prominent Iranians living outside Iran"
@Olivia_Gazis: .@Microsoft says it has detected hackers linked to the Iranian government targeting at least one U.S. presidential campaign:
@W7VOA: Cyber activity from #Iran and linked to that government detected by @Microsoft.
@tonyromm: A campaign linked to the Iranian government attempted to identify, attack and breach email addresses belonging to U.S. presidential campaigns, government officials and journalists, according to new data unveiled by Microsoft
@adrianweckler: Microsoft head of security posts blog saying Iranian govt-backed hackers attacked email accounts of journalists and an unnamed US presidential campaign
@g_ratnam: A group called Phosphorous, believed to be tied to Iran, has targeted 2700 email accounts associated with US presidential campaigns, US officials, journalists and others, per @Microsoft . 241 of those were then attacked.
@shanav: NEW: Microsoft says Iranian APT group Phosphorous, with ties to Iran's government, has worked to get past two-factor authentication and reset passwords for a U.S. presidential campaign, as well as current and former U.S. gov officials and journalists.
@jseldin: "Microsoft has notified the customers related to these investigations and threats and has worked as requested with those whose accounts were compromised to secure them" per @TomBurt45More here:
@gregotto: NEW: Microsoft found an Iranian group going after microsoft email accounts tied to a presidential campaign, current and former gov, and journalists
@jamestutt: Today we are sharing details of significant cyber activity from a threat group we call Phosphorous, believed to originate in Iran with links to the Iranian govt. More here: https://blogs.microsoft.com/on-the-issues/2019/10/04/recent-cyberattacks-require-us-all-to-be-vigilant/
@magmill95: Big cyber news today: Microsoft announced that it tracked an Iranian-linked threat group over 30 days attempt to identify and attack consumer email accounts linked to Microsoft customers, including an unnamed U.S. presidential campaign and U.S. officials:
@alexwardvox: .@Microsoft's @TomBurt45 : "Today we’re sharing that we’ve recently seen significant cyber activity by a threat group we call Phosphorous, which we believe originates from Iran and is linked to the Iranian government."


September 16, 2019
Drew Harwell and Tony Romm / Washington Post

Drew Harwell and Tony Romm / Washington Post  
Smash Hit Mobile App TikTok Might Be Complying With China’s ‘Great Firewall’ by Censoring Videos Related to Hong Kong Protests, Researcher

TikTok, which has quickly become one of America’s most popular mobile apps, might be bringing Chinese-style censorship to mainstream U.S. audiences because TikTok has a dearth of videos related to the protests in Hong Kong, Yaqiu Wang, a Hong Kong-based researcher for Human Rights Watch, said. TikTok’s parent company, Beijing-based ByteDance, said in a statement that U.S. user data is stored domestically and that the app’s content and moderation policies in the U.S. are led by a U.S.-based team not influenced by the Chinese government. Even though ByteDance is required to comply with China’s “Great Firewall,” which blocks major news sources and censors what the party regards as objectionable facts and ideas, ByteDance says the lack of Hong Kong protest videos on its app reflects its audience’s desire for positive and joyful content.

Related: Hong Kong Free Press HKFP, South China Morning Post, WSJ.com

Tweets:@fryan @tonyromm


August 20, 2019
Tony Romm / The Washington Post

Tony Romm / The Washington Post  
Facebook Unveils ‘Off-Facebook Activity’ Tool Giving Users Leeway to Limit Data Collected About Them Elsewhere on the Web, New Controls Do Not Allow Users to Delete Data in Full

Facebook unveiled its long-awaited feature, called “Off-Facebook Activity,” which allows users to limit businesses, apps and other groups that collect data about them on the Web and pass that information to the tech giant. The feature does not, however, allow users to delete that information from Facebook in full but instead has been designed to “shed more light” on a form of online tracking that determines some of the ads people see on Facebook. Users now can choose to remove this history from their accounts and turn off some or all of that tracking in the future although these actions merely disconnect information from being identified to a specific user but do not delete it. The new controls also won’t prevent Facebook from reporting back to another business whenever users generally purchase their product after seeing an ad targeted to them. The complexity of the system likely won’t prevent privacy advocates from criticizing the company because company CEO Mark Zuckerberg implied a more robust deletion tool one year ago when he vowed Facebook would develop a “Clear History” tool.

Related: TechCrunch, CNET, The Guardian, The Verge, Buzzfeed News, Wall Street Journal, Facebook, New York Times, BBC News, The Verge, Tech Insider, AP Breaking News, The Sun, Slashdot, Tech Insider, WRAL Tech Wire, Z6 Mag, New York Times – Business, Neowin, Tech Insider, Sky News, The Next Web, Channel News Asia, SecurityWeek, The Straits Times Tech News, CNN.com

Tweets:@geoffreyfowler @kashhill @ashk4n @fbnewsroom @zackwhittaker @ruskin147 @tonyromm @gcluley @stevekovach @alexhern

TechCrunch: Facebook unveils new tools to control how websites share your data for ad-targeting
CNET: How to use Facebook’s new privacy tool to control your data
The Guardian: Facebook launches ‘clear history’ tool – but it won’t delete anything
The Verge: Facebook’s Clear History privacy tool finally begins rolling out in three countries
Buzzfeed News: You Can Finally See All Of The Info Facebook Collected About You From Other Websites
Wall Street Journal: Facebook to Let Users Control Their Data From Other Companies
Facebook: Now You Can See and Control the Data That Apps and Websites Share With Facebook
New York Times: Facebook’s New Tool Lets You See Which Apps and Websites Tracked You
BBC News: Facebook to stop stalking you off-site – but only if asked
The Verge: Facebook’s Clear History privacy tool finally begins rolling out in three countries
Tech Insider: Facebook is finally letting users control the info that other websites are sharing with the social network about them (FB)
AP Breaking News: Facebook rolls out tool to block off-Facebook data gathering
The Sun: Facebook launches ‘off-platform activity’ tool to stop it tracking you across the internet – and you can even wipe your history
Slashdot: You Can Finally See All Of The Info Facebook Collected About You From Other Websites
Tech Insider: Advertisers have been grappling for alternatives ahead of Facebook’s ‘clear-history’ tool that could limit one of its most powerful targeting tools
WRAL Tech Wire: New Facebook tools enables users to turn off tracking
Z6 Mag: Control the data you share via ‘Off-Facebook Activity’
New York Times – Business: Facebook’s New Tool Lets You See Which Apps and Websites Tracked You
Neowin: Facebook adds new tool that helps you control its off-site stalking
Tech Insider: Facebook is finally letting users control the info that other websites are sharing with the social network about them (FB)
Sky News: Facebook to let users stop app and website tracking
The Next Web: Facebook lets you (sorta) control what info it gets from other sites
Channel News Asia: Facebook launches tool to let users control data flow
SecurityWeek: Facebook Launches Tool to Let Users Control Data Flow
The Straits Times Tech News: Facebook launches tool to let users control data flow
CNN.com: Facebook finally rolls out privacy tool for your browsing history

@geoffreyfowler: Facebook’s long-promised “clear history” tool has arrived, but it is not the data re-set we really needed.@tonyromm has the details here @posttech : https://wapo.st/2ZkWXoYWhat’s missing? Thread -->
@kashhill: In news you can't actually use yet (unless you live in Ireland, S. Korea, or Spain), Facebook is giving you a way to make your Instagram ads way less creepy.
@ashk4n: Facebook just announced their long awaited 'Clear History' tool -- tho it only really lets you 'Disconnect Activity' (and even then its pretty limited)PR release: https://newsroom.fb.com/news/2019/08/off-facebook-activity/Fact sheet: https://facebook.com/off-facebook-activityTechnical writeup: https://engineering.fb.com/data-infrastructure/off-facebook-activity/
@fbnewsroom: With Off Facebook Activity, you can see a summary of the info that websites and apps send to help show you relevant ads - you can also disconnect this info from your account. Learn more: https://newsroom.fb.com/news/2019/08/off-facebook-activity/
@zackwhittaker: This sounds great! But nowhere in this blog post does it say how we get it.
@ruskin147: My story on Facebook’s new “Off-Facebook Activity” tool which shows you why those shoes are following you around the Internet
@tonyromm: Zuck in 2018 used the word "flush" and other FB execs used the word "delete" but it's not exactly what's happening here, so it will be interesting to see how users and regulators react
@gcluley: Good thread here on Facebook's "Clear History" announcement.Most people won't ever turn off "Off-Facebook activity" of course.. but even if you do, you may be interested to hear what it does (and doesn't) do.
@stevekovach: The best way to clear your Facebook history is to delete Facebook
@alexhern: The clear history tool Mark Zuckerberg announced over a year ago is finally coming (except it won’t actually clear your history from Facebook’s servers)


July 23, 2019
Devlin Barrett / Washington Post

Devlin Barrett / Washington Post  
Attorney General Barr Ramps Up Attack on Encryption Technologies, Warns Tech Industry It May Be Running Out of Time

Attorney General William Barr revived the contentious “going dark” encryption debate during a speech at the International Conference on Cyber Security with an amped-up attack on encrypted messaging programs, saying they are preventing law enforcement from stopping killings, drug dealing, and terrorism, and warning that time may be running out for the tech industry to make changes on its own. Countering the consensus opinion of most security professionals, who believe encryption actually protects the public, Barr contended that “our ability to protect the public from criminal and national security threats is rapidly deteriorating” due to encryption technology.

Related: Bloomberg Politics, Digital TrendsFifth Domain | Cyber, TribLIVE, PYMNTS.com, AP Breaking News, Technology News, CNBC, SecurityWeek, New York Post, Wall Street Journal, CNN.com – Politics, TechCrunch, Voice of America, Slashdot, Motherboard

Tweets:@JoeBeOne @mattblaze @evan_greer @nicoleperlroth @matthew_d_green @josephfcox

Bloomberg Politics: Barr Warns Time Is Running Out for Companies to Open Encryption
Digital Trends: Attorney General says the government should have access to your encrypted data
Fifth Domain | Cyber: US attorney general says encryption creates security risk
TribLIVE: Barr: Encryption creates U.S. security risk
PYMNTS.com: US AG Wants Lawmakers To Have Access To Encrypted Messaging
AP Breaking News: US attorney general says encryption creates security risk
Technology News: Barr renews fight with tech companies over ‘dangerous’ use of encryption
CNBC: AG Barr says tech companies need to make encrypted messages accessible to law enforcement
SecurityWeek: US Attorney General Says Encryption Creates Security Risk
New York Post: Barr: Law enforcement should be allowed to read encrypted messages
Wall Street Journal: Barr Revives Debate Over ‘Warrant-Proof’ Encryption
CNN.com – Politics: Barr renews fight with tech companies over ‘dangerous’ use of encryption
TechCrunch: AG Barr says consumers should accept security risks of encryption backdoors
Voice of America: US Attorney General Says Encryption Creates Security Risk
Slashdot: AG Barr Says Consumers Should Accept Security Risks of Encryption Backdoors
Motherboard: Barr Says Police Need Encryption Backdoors, Doesn’t Mention Hacking Tools They Use All the Time

@JoeBeOne: Barr Speech transcript is up:
@mattblaze: I have to say, Barr’s argument that the personal and commercial data protected by encryption isn’t all that important and that software security risks aren’t that big a deal is so flat-earth bizarre that I don’t even know where to begin.
@evan_greer: Encryption protects airports, hospitals, water treatment facilities, etc. Weakening encryption makes us less safe, not more safe.
@nicoleperlroth: Best thread on Barr's crypto "backdoor" talk today... Important to note there is no such thing as a "backdoor" or one. It's a backdoor for all. We've been having the same debate for 25+ years. The NSA/FBI etc. have ways into the end points. Let's not rehash this.
@matthew_d_green: William Barr gave a talk today at Fordham, on “going dark” and the need for encryption backdoors. A lot of this is old hat. The surprising thing is that it was the only subject of the talk: it seems like the Trump administration is serious about this. (Thread).
@josephfcox: Today Barr reignited the call for companies to intro backdoors into their products. Somehow in his 4,172 speech, Barr didn't mention that cops around the country are using hacking everyday to unlock iPhones. You can't have an honest debate if you omit that


July 29, 2019
Emily Flitter and Karen Weise / New York Times

Emily Flitter and Karen Weise / New York Times  
Firewall Misconfiguration by Capital One Allowed Hacker to Steal Millions of Credit Applications, Social Security and Bank Account Numbers Affecting More Than 100 Million People in North America

In one of the largest cases of bank data theft ever, software engineer Paige Thompson hacked into a server holding customer information for Capital One, exploiting a firewall misconfiguration in the bank’s network to steal millions of credit card applications, federal prosecutors say. Thompson, who used the online handle “erratic” was the organizer of a group on Meetup, a social network, called Seattle Warez Kiddies, described as a gathering for “anybody with an appreciation for distributed systems, programming, hacking, cracking.” The F.B.I. noticed her activity on Meetup and used it to trace her other online activities, eventually linking her to posts describing the data theft on Twitter and the Slack messaging service. Thompson stole 140,000 U.S. Social Security numbers and 77,000 bank account numbers, along with one million Canadian social insurance numbers affecting more than 100 million people in the United States and Canada. A“firewall misconfiguration” by the bank had allowed Ms. Thompson to communicate with the server where Capital One was storing its information and, eventually, gain access to customer files, an FBI agent investigating the case said in court documents. Ms. Thompson worked as a systems engineer at Amazon from 2015 to 2016.

Related: CNN, Reuters, Associated Press, Axios, CNBC, NBC News, Politico, Capital One, The Register, Bloomberg, Washington Post, TechCrunch, TechCrunch, Wired, Justice.gov, Ars Technica, CNET, Wall Street Journal, The Verge, The Hill, Venture Beat, Law360, Reuters, Daily Mail,DataBreachToday.com, BGR, USATODAY, Business Insider, The Daily Swig, Newsweek, Financial Times, CRN, CRN, UPI.comDataBreaches.net, SecurityWeek, MobileSyrup.com, BetaNews, The Verge, GBHackers On Security, SlashGear » security, E-Commerce Times, CNN.com, PCMag.com, The VergeEvening Standard, EngadgetMarketWatch.com – Software Industry News, TechSpot, Digital Trends, Neowin, Fast Company, Mother Jones, New York Daily News, New on MIT Technology Review, FOX News, The Hacker News, Help Net Security, CBSNews.com, Fortune, Technology News | Boston.com, SecurityWeek, The Huffington Post, Cyberscoop, IT World Canada, ARN, The Guardian, Digital Trends, The Next Web, Android Central , GeekWire, SC Magazine, Techerati, SlashdotABC News: U.S., Graham Cluley, Japan Times,Security Affairs, Cyber Kendra, PYMNTS.com, Heavy.com, Computer Business Review, TechNadu, Silicon Republic, Infosecurity Magazine, The State of Security, DataBreaches.netGadgets Now, Courthouse News Service, BBC News – WorldBleepingComputer.comITV News, RT USA, AOL, New York Post, EJ Insight, Mercury News, TODAYonline, CBC , Deutsche Welle, Gizmodo, News : NPR, POLITICO, Gizmodo, Daily BeastGeekWire

Tweets:@zackwhittaker @briankrebs @cnbcnow @gregotto @yoda @RepKatiePorter @zackwhittaker @Wired @BleepingComputer @kimzetter @dnvolz @BleepingComputer @McGrewSecurity @weldpond @h0tdish @hacks4pancakes @RayRedacted @catcalvinla @malwarejake @somanyshrimp @TorresLuzardo

CNN: A hacker gained access to 100 million Capital One credit card applications and accounts
Reuters: Capital One reveals 100M affected by data breach, hacker arrested
Associated Press: Capital One says hacker gained access to personal information of more than 100 million people
Axios: 100 million credit card applications stolen from Capital One
CNBC: Capital One data breach exposes tens of thousands of Social Security numbers, linked bank accounts
NBC News: Over 100 million credit card applicants at risk in Capital One breach, Seattle woman arrested
Politico: Capital One reveals historic data breach after FBI arrests Seattle suspect
Capital One: Capital One Announces Data Security Incident
The Register: Capital One gets Capital Done: Hacker swipes personal info on 106 million US, Canadian credit card applicants
Bloomberg: Capital One Says Breach Hit 100 Million Individuals in U.S.
Washington Post: Capital One says data breach affected 100 million credit card applications
TechCrunch: Capital One’s breach was inevitable, because we did nothing after Equifax
TechCrunch: Capital One hacked, over 100 million customers affected
Wired: THE ALLEGED CAPITAL ONE HACKER DIDN’T COVER HER TRACKS
Justice.gov: Seattle Tech Worker Arrested for Data Theft Involving Large Financial Services Company
Ars Technica: Feds: former cloud worker hacks into Capital One and takes data for 106 million people
CNET: Capital One data breach involves 100 million credit card applications
Wall Street Journal: Capital One Reports Data Breach Affecting 100 Million Customers, Applicants
The Verge: Massive Capital One breach exposes personal info of 100 million Americans
The Hill: Woman arrested, accused of hacking 100 million Capital One records
Venture Beat : Capital One announces hack affecting 106 million U.S. and Canadian customers
Law360: Capital One Says Breach Impacted 106M As Suspect Arrested – Law360
Daily Mail : Ex-tech worker arrested for Capital One hack after stealing data from 100 million customers
DataBreachToday.com: Woman Arrested in Massive Capital One Data Breach
BGR: Hacker steals data for more than 100 million Capital One users, then brags about it and gets arrested
USATODAY: Massive data breach hits Capital One affecting more than 100 million customers
Business Insider: Capital One data breach, affecting tens of millions
The Daily Swig: Millions affected by Capital One data breach
Newsweek: Capital One Data Breach: How to Know, and What You Should Do, If Your Account Has Been Compromised
Financial Times: Capital One reports massive data breach
CRN: Capital One Breach Exposed Data From 106M Credit Card Applicants, Users
UPI.com: Capital One data breach affects 100M credit card applicants
DataBreaches.net: Capital One says data breach affected 100 million credit card applications
SecurityWeek: CapitalOne Discloses Massive Data Breach: 106 Million Impacted
MobileSyrup.com: Capital One data breach could have affected six million Canadian bank accounts
BetaNews: Personal details of 106 million Americans and Canadians stolen in huge Capital One data breach
The Verge: Massive Capital One breach exposes personal info of 100 million Americans
GBHackers On Security: Capital One Hacked – Over 100 Million Credit Card Application Data Exposed
SlashGear » security: Capital One hack affects over 100 million people in the US and Canada
E-Commerce Times: Equifax Data Breach Settlement No Wrist Slap
CNN.com: Worried about the Capital One hack? Here’s what to do
PCMag.com: Capital One Suffers Data Breach Affecting 100 Million Customers
Evening Standard: Capital One data breach 2019: What to do if you have been affected
Engadget: Capital One data breach affected 100 million in the US
MarketWatch.com – Software Industry News: Everything you need to know about the massive Capital One hack, but were afraid to ask
TechSpot: Capital One hack exposed 100 million US customers’ personal details
Digital Trends: New Capital One data breach affects 100 million people. Here’s the very latest
Neowin: Over 100 million accounts compromised after Capital One data breach
Fast Company: Capital One data breach: what was stolen and how to find out if you are affected
Mother Jones: What’s In Your Wallet?
New York Daily News: Capital One hit with data breach affecting some 100 million U.S. customers
New on MIT Technology Review: A hacker stole the personal data of 100 million Capital One customers
FOX News: Capital One data breach exposes info of 106M customers, applicants; suspect arrested
The Hacker News: Capital One Data Breach Affects 106 Million Customers; Hacker Arrested
Help Net Security: Capital One breach: Info on 106 million customers compromised, hacker arrested
CBSNews.com: Capital One data breach hits more than 100 million people
CNBC: Capital One data breach exposes tens of thousands of Social Security numbers, linked bank accounts
Fortune: Hacker May Have Stole Info About Millions of Capital One Customers, U.S. Says
Technology News | Boston.com: Capital One target of massive data breach
SecurityWeek: Capital One Target of Massive Data Breach
The Huffington Post: Credit Card Company Reveals 100 Million People May Be Affected By Hack
Cyberscoop: Capital One announces massive data breach; lone suspect arrested in Seattle
IT World Canada: Six million Canadians impacted by Capital One data breach
ARN: Capital One: hacker gained access to personal information of over 100 million Americans
The Guardian: Capital One: hacker stole data of over 100m Americans
Ars Technica: Hacker ID’d as former Amazon employee steals data of 106 million people from Capital One
Axios: 100 million credit card applications were stolen from Capital One
The Next Web: Capital One data breach compromises 106 million customers’ personal data
Android Central : Capital One breach exposes personal details of over 100 million customers
SC Magazine: Capital One hacker who stole personal info on 100M arrested | SC Media
AP Breaking News: Capital One target of massive data breach
Techerati: Capital One breach affecting 106 million customers caused by misconfigured cloud storage
Slashdot: Capital One Says Hacker Breached Accounts of 100 Million People; Ex-Amazon Employee Arrested
ABC News: U.S.: Capital One target of massive data breach
Graham Cluley: Woman arrested after Capital One hack spills personal info on 106 million credit card applicants
Japan Times: Hacker accesses over 100 million Capital One credit applications in massive data breach
Zero Hedge: Capital One Admits Massive Data Breach: 100 Million Americans Affected, Seattle Woman Arrested
Security Affairs: Capital One data breach: hacker accessed details of 106M customers before its arrest
Cyber Kendra: Capital One Suffered Data Breach 106 Million People Affected
PYMNTS.com: Cap One Hack Hits 100M Credit Card Applications
Heavy.com: Paige Adele Thompson: 5 Fast Facts You Need to Know
Computer Business Review: Capital One Hacker was Ex-AWS Employee
TechNadu: Capital One Reports a Major Data Breach Affecting 106 Million Individuals in the USA & Canada
Infosecurity Magazine: Capital One Breached by Cloud Insider in Major Attack
Tech Insider: Amazon’s cloud was at the heart of the big Capital One hack, even though it doesn’t seem to be at fault (AMZN, COF)
The State of Security: Woman arrested after Capital One hack spills personal info on 106 million credit card applicants
DataBreaches.net: Capital One says data breach affected 100 million credit card applications
Gadgets Now: Capital One hacked, says information of 100 million-plus users leaked
Reuters: Capital One says information of over 100 million individuals in U.S., Canada hacked
BBC News – World: Capital One data breach: Arrest after details of 100m US individuals stolen
TIME: Capital One Information Hacked in Massive Data Breach
NDTV Gadgets360.com: Capital One Bank Targeted in Massive Data Breach
BleepingComputer.com: Capital One Data Breach Affects 106 Million People, Suspect Arrested
ITV News: 100 million applications targeted in Capital One bank data breach
RT USA: 100mn+ people’s data exposed in Capital One bank hack, thousands of SSNs & accounts leaked
AOL: Capital One: information of over 100 mln individuals in U.S., Canada hacked
New York Post: Capital One reveals 100M affected by data breach, hacker arrested
EJ Insight: Capital One data breach affects millions in US, Canada
Mercury News: Capital One: Hacker got info on 100M in the US, 6M in Canada
CBC : Hacker obtained personal information of 6 million people in Canada
Deutsche Welle: Capital One data theft: US arrests ‘erratic’ hacker
Gizmodo: Hacker Claims to Be in Possession of Personal Info on Up to 20,000 LAPD Applicants
The Register: Capital One gets Capital Done: Hacker swipes personal info on 106 million US, Canadian credit card applicants
POLITICO: Capital One reveals historic data breach after FBI arrests Seattle suspect
Daily Beast: Tens of Millions of Credit Card Applications Stolen in Capital One Breach
GeekWire: Seattle engineer arrested for Capital One hack that affected 100M people

@zackwhittaker: Wow. Capital One discloses massive data breach: 100M in US, 6M in Canada. One person in FBI custody. Credit files, applications, the lot. Hard to see this as anything other than Equifax 2.0. (link: http://press.capitalone.com/phoenix.zhtml?c=251626&p=irol-newsArticle&ID=2405043) press.capitalone.com/phoenix.zhtml?…
@briankrebs: Nice write up. Yes, this appears to be her resume. Worked at Amazon 2015-2016
@cnbcnow: BREAKING: Capital One says data breach has “affected approximately 100M individuals in the United States & approximately 6M in Canada” but “no credit card account numbers or log-in credentials were“ taken and “99% of Social Security numbers” weren’t stolen
@gregotto: According to the FBI, a firewall misconfiguration was partly responsible for allowing Thompson to access the Capital One cloud storage
@yoda: what kind of wordsmith fuckery is this???
@RepKatiePorter: One week *to the day* after Equifax announced its settlement terms. It’s clear corporations won’t clean up their acts on their own. We need to create an enforceable federal data privacy standard, so I’m drafting that bill.
@zackwhittaker: Incredible. Capital One's data breach site is titled "Facts."And yet it also pulls this bullshit by saying that no Social Security numbers were breached... except for all the Social Security numbers that were breached.Fuck you, Capital One.
@Wired: On Monday, the FBI and Capital One disclosed a data breach of 106 million credit card applications, one of the biggest breaches of a major financial institution ever.And now someone has been arrested in connection with the crime:
@BleepingComputer: The suspect allegedly posted about her accessing of Capital One's data on GitHub. A security researcher saw her post and contacted Capital One.
@kimzetter: This Capital One breach definitely has more going on to it than the headlines suggest. Perhaps not a coordinated vuln disclosure gone wrong ?but something is def weird about it - she used Tor to access the data but then publicly posted the data to an account with her name?
@dnvolz: The arrested suspect behind the hack, Paige Thompson, is a former employee of Amazon Web Services, according to people familiar with the matter. She is accused of breaching a misconfigured Capitol One firewall to access data stored in AWS. via @nicole_hong
@BleepingComputer: This breach was discovered by a security researcher who responsibly disclosed a vulnerability to Capital One. After investigating the vulnerability, Capital One discovered that an unauthorized user accessed their systems and data between March 22 and 23, 2019.
@McGrewSecurity: Located the Capital One hacker's twitter (also thanks to those that backchanneled on the topic). Clearly they were/are in a bad state mentally/emotionally. I've deleted the earlier tweets about her. I hope they find some peace.
@weldpond: The FBI said the suspect, Paige A. Thompson, was apprehended after she “made statements on social media for evidencing the fact that she has information of Capital One, and that she recognizes that she has acted illegally,”
@h0tdish: Insider/ex employee threats and those who willingly commit crimes, creating, selling malware or stealing info via exploit/breach ARE NOT hero's & anyone who frames it that way has to explain why they're not currently launching a legal $ raiser for her but did for other criminals.
@hacks4pancakes: I feel a great disturbance in the Force, like dozens of Capital One cybersecurity analysts who were screaming futilely for into the wind for years were suddenly silenced.
@RayRedacted: I have removed all of my OSINT posts about the Capital One hacker, because it is clear that she is suffering from mental illness.Mental illness does not discriminate. It can affect anyone. I truly hope she gets the help she needs.
@catcalvinla: At this point, I’m getting like two breach notices a day. Who DOESN’T have my info?
@malwarejake: Takeaways from #CapitalOne: 1. Having a disclosure program may have saved them. I'm FAR less likely to report to an org that lacks a disclosure policy. (link: http://press.capitalone.com/phoenix.zhtml?c=251626&p=irol-newsArticle&ID=2405043) press.capitalone.com/phoenix.zhtml?…
@somanyshrimp: Losing your personal information in a massive data breach is just a thing that happens now, like 110 degree days and regular mass shootings
@TorresLuzardo: I'm trying to come up with an analogy but there's really no topping this.No SSNs were stolen except 140,000 of them.


August 17, 2019
Joseph Marks / Washington Post

Joseph Marks / Washington Post  
Hackers Find Bad Bugs in F-15 Fighter Jet That Could Shut Down Key Aircraft Information System

A team of highly vetted hackers approved by the Pentagon’s Digital Defense Service sabotaged a vital flight system for an F-15 fighter jet during Def Con. The seven hackers, brought to Las Vegas by the cybersecurity company Synack, the first such white hat hackers to have physical access to the jet, found a host of vulnerabilities that could completely shut down the Trusted Aircraft Information Download Station, which collects reams of data from video cameras and sensors while the jet is in flight. They also found bugs that the Air Force had tried but failed to fix after the same group of hackers performed similar tests in November without actually touching the device.

August 1, 2019
Joseph Marks / Washington Post

Joseph Marks / Washington Post  
Cisco Agrees to Pay $8.6 Million in Settlement With Whistleblower for Selling Video Surveillance Software It Knew Was Flawed

Tech giant Cisco has agreed to pay $8.6 million to settle a claim it sold video surveillance software it knew was vulnerable to hackers to hospitals, airports, schools, state governments, and federal agencies. Cisco didn’t fix the massive security weakness for about four years after a whistleblower, James Glenn, first alerted the company about it in 2008, according to a settlement with the Justice Department and 15 states plus the District of Columbia. The flaw could have allowed hackers to spy on video footage and turn surveillance cameras on and off, delete footage and even potentially compromise other connected physical security systems such as alarms or locks with no detection. The settlement reflects the first time has been forced to pay out for a cybersecurity vulnerability under a federal whistleblower law.

Related: Cisco Blog, ARN, PCMag.com, ReutersCNBC, Slashdot, PCMag.com, The Hacker News, Security – Computing, Gizmodo, Infosecurity Magazine, Security Affairs, WRAL Tech Wire, Securelist, Beta News, The Register