The FBI Team Sent to ‘Exploit’ Protesters’ Phones in Portland
https://www.nybooks.com/daily/2020/10/08/the-fbi-team-sent-to-exploit-protesters-phones-in-portland
The FBI’s Washington, D.C., headquarters sent agents from its “Fly Team,” an elite counterterrorism unit, to Portland this summer during the second weekend in July. Their task was to interview arrested protesters and carry out the “initial exploitation of phones, or other communication devices,” according to FBI emails obtained through a public records request. It is unclear whether the Fly Team operation extended either past that weekend or beyond Portland, but the emails suggest that the FBI has been using counterterrorism tools and powers to map left-wing protest networks just months before an election whose result is likely to be delayed, if not challenged.
#usa #phone #exploit #protesters #cops #fbi
https://www.nybooks.com/daily/2020/10/08/the-fbi-team-sent-to-exploit-protesters-phones-in-portland
The FBI’s Washington, D.C., headquarters sent agents from its “Fly Team,” an elite counterterrorism unit, to Portland this summer during the second weekend in July. Their task was to interview arrested protesters and carry out the “initial exploitation of phones, or other communication devices,” according to FBI emails obtained through a public records request. It is unclear whether the Fly Team operation extended either past that weekend or beyond Portland, but the emails suggest that the FBI has been using counterterrorism tools and powers to map left-wing protest networks just months before an election whose result is likely to be delayed, if not challenged.
#usa #phone #exploit #protesters #cops #fbi
The New York Review of Books
The FBI Team Sent to ‘Exploit’ Protesters’ Phones in Portland | by Mattathias Schwartz | The New York Review of Books
The FBI’s Washington, D.C., headquarters sent agents from its “Fly Team,” an elite counterterrorism unit, to Portland this summer during the second weekend in July. Their task was to interview arrested protesters and carry out the “initial exploitation of…
Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
All Creatures Welcome
All Creatures Welcome sketches a utopian image of society in the digital era. Accompanied by the appeal to “use hacking as a mindset,” the viewers immerse themselves, together with the filmmaker, in a documentary adventure game and explore the world of digital communities at the events held by the Chaos Computer Club; a real-world reflection of the virtual spectrum. Together with the filmmaker and the slogan"use hacking as a mindset" we immerse in a documentary adventure game and explore the world of Komputerfrieks, as they used to call themselves at the inaugural meeting of the Chaos Computer Club in 1981.
📺 👉🏼 (German Subs)
https://media.ccc.de/v/all_creatures_welcome
#ccc #welcome #video #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
All Creatures Welcome sketches a utopian image of society in the digital era. Accompanied by the appeal to “use hacking as a mindset,” the viewers immerse themselves, together with the filmmaker, in a documentary adventure game and explore the world of digital communities at the events held by the Chaos Computer Club; a real-world reflection of the virtual spectrum. Together with the filmmaker and the slogan"use hacking as a mindset" we immerse in a documentary adventure game and explore the world of Komputerfrieks, as they used to call themselves at the inaugural meeting of the Chaos Computer Club in 1981.
📺 👉🏼 (German Subs)
https://media.ccc.de/v/all_creatures_welcome
#ccc #welcome #video #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Media is too big
VIEW IN TELEGRAM
Operation Warp Speed is Using a CIA-Linked Contractor to Keep Covid-19 Vaccine Contracts Secret
https://www.thelastamericanvagabond.com/operation-warp-speed-is-using-a-cia-linked-contractor-to-keep-covid-19-vaccine-contracts-secret/
https://www.youtube.com/watch?v=kSK1Pf7fjTA
#usa #covid #cia #vaccines
https://www.thelastamericanvagabond.com/operation-warp-speed-is-using-a-cia-linked-contractor-to-keep-covid-19-vaccine-contracts-secret/
https://www.youtube.com/watch?v=kSK1Pf7fjTA
#usa #covid #cia #vaccines
Portland passes broadest facial recognition ban in the US
via www.cnn.com
Comments: https://news.ycombinator.com/item?id=24745076
#usa #portland #ban #facial #recognition #biometrics
via www.cnn.com
Comments: https://news.ycombinator.com/item?id=24745076
#usa #portland #ban #facial #recognition #biometrics
Telegraph
Portland passes broadest facial recognition ban in the US
(CNN Business)The city of Portland, Oregon, on Wednesday banned the use of facial-recognition technology by city departments — including local police — as well as public-facing businesses such as stores, restaurants and hotels. Portland joins a growing number…
Plan Your Route Privately: DuckDuckGo Now Has Driving and Walking Directions
https://spreadprivacy.com/duckduckgo-search-map-directions
Comments: https://news.ycombinator.com/item?id=24745511
#ddg #duckduckgo #maps #alternatives
https://spreadprivacy.com/duckduckgo-search-map-directions
Comments: https://news.ycombinator.com/item?id=24745511
#ddg #duckduckgo #maps #alternatives
Spread Privacy
Plan Your Route Privately: DuckDuckGo Now Has Driving & Walking Directions
We're excited to announce a big step forward with the introduction of route-planning directions on DuckDuckGo Search – private, as always.
Forwarded from BlackBox (Security) Archiv
*URGENT* Samsung confirmed sending massive user data to china
SAMSUNG 港行 會連大陸DNS? 114.114.114.114
- 分享自 LIHKG 討論區
https://lihkg.com/thread/2228654/page/1
The original source is Chinese, but it also affects the rest of the world so i will translate that in English. In short, samsung is constantly communicating with 114 dns, hao123, taobao and qq.com, four notorious chinese companies after oneui2.5 update
1. Samsung機自Android 9/10之後隱藏114DNS做DNS3
After android 10 oneui 2.5 update, a number of samsung phones are set to use 114 dns as dns3
2. 就算set咗其他DNS,甚至set咗Private DNS (密文DNS),電話都會用隱藏咗嘅114DNS,繞過所有DNS設定 (包括Private DNS同router DNS設定)定期用舊式明文DNS連114DNS
114 dns has been disguised, hardcoded and can override your private dns or router dns settings
3. 每逢電話著mon就會每分鐘用114DNS明文查詢www.qq.com
Samsung will make dns query via 114dns to qq.com every minute when your screen is on
4. 另外亦會以正常途經用Private DNS同router DNS設定(視何者適用)查詢m.hao123.com,taobao.com
And it will also make query to hao123 and taobao.con via your default normal dns
6. 就算電話已連接VPN,都一樣繞過VPN流量定期用舊式明文DNS被強制連接114DNS查詢www.qq.com
It overrides your vpn
7. 另外亦發現每連一次wifi,都會連接connectivity.samsung.com.cn
It connects to connectivity.samsumg.com.CN, another malicious Chinese website
8. 韓水美水越南水貨都有類似發現
Same problem spotted not just in hong kong, but also in korea, usa, vietnam version
9呢種行為算唔算全球DDoS? 而用家又在不知情下被當攻擊者,算唔算已經成為殭屍網絡(botnet)嘅一部分?
Can this be considered a global DDos by using samsung customers as part of their botnet?
👀 Shame on your samsung, i have always been a diehard samsu
ng user but this time, i am fuxking done with your crap. 👀
👀 👉🏼 https://redd.it/j8w267
#sumsum #samsung #userdata #china #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
SAMSUNG 港行 會連大陸DNS? 114.114.114.114
- 分享自 LIHKG 討論區
https://lihkg.com/thread/2228654/page/1
The original source is Chinese, but it also affects the rest of the world so i will translate that in English. In short, samsung is constantly communicating with 114 dns, hao123, taobao and qq.com, four notorious chinese companies after oneui2.5 update
1. Samsung機自Android 9/10之後隱藏114DNS做DNS3
After android 10 oneui 2.5 update, a number of samsung phones are set to use 114 dns as dns3
2. 就算set咗其他DNS,甚至set咗Private DNS (密文DNS),電話都會用隱藏咗嘅114DNS,繞過所有DNS設定 (包括Private DNS同router DNS設定)定期用舊式明文DNS連114DNS
114 dns has been disguised, hardcoded and can override your private dns or router dns settings
3. 每逢電話著mon就會每分鐘用114DNS明文查詢www.qq.com
Samsung will make dns query via 114dns to qq.com every minute when your screen is on
4. 另外亦會以正常途經用Private DNS同router DNS設定(視何者適用)查詢m.hao123.com,taobao.com
And it will also make query to hao123 and taobao.con via your default normal dns
6. 就算電話已連接VPN,都一樣繞過VPN流量定期用舊式明文DNS被強制連接114DNS查詢www.qq.com
It overrides your vpn
7. 另外亦發現每連一次wifi,都會連接connectivity.samsung.com.cn
It connects to connectivity.samsumg.com.CN, another malicious Chinese website
8. 韓水美水越南水貨都有類似發現
Same problem spotted not just in hong kong, but also in korea, usa, vietnam version
9呢種行為算唔算全球DDoS? 而用家又在不知情下被當攻擊者,算唔算已經成為殭屍網絡(botnet)嘅一部分?
Can this be considered a global DDos by using samsung customers as part of their botnet?
👀 Shame on your samsung, i have always been a diehard samsu
ng user but this time, i am fuxking done with your crap. 👀
👀 👉🏼 https://redd.it/j8w267
#sumsum #samsung #userdata #china #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
LIHKG 討論區
SAMSUNG 港行 會連大陸DNS? 114.114.114.114
屌呀,點解SAMSUNG港行用WIFI既時候第二個DNS
會係 114.114.114.114 ?
試左幾個WIFI都係呢個情況…
https://www.whois.com/whois/114.114.114.114
有冇其他人都係咁既情況?
有冇打手可以解釋下?
我用呢個APPS CHECK
https://play.google.com/store/apps/details?id=com.ulfdittmer.android.ping
會係 114.114.114.114 ?
試左幾個WIFI都係呢個情況…
https://www.whois.com/whois/114.114.114.114
有冇其他人都係咁既情況?
有冇打手可以解釋下?
我用呢個APPS CHECK
https://play.google.com/store/apps/details?id=com.ulfdittmer.android.ping
Media is too big
VIEW IN TELEGRAM
All the best Android 11 privacy & security features
https://www.youtube.com/watch?v=dYTlSlnb-iE
#android #11 #security #privacy
https://www.youtube.com/watch?v=dYTlSlnb-iE
#android #11 #security #privacy
Google Plans to Make YouTube a Major Shopping Destination
https://fossbytes.com/google-youtube-ecommerce-shopping
#Google #YouTube #Shopping
https://fossbytes.com/google-youtube-ecommerce-shopping
#Google #YouTube #Shopping
Fossbytes
Google Is Planning To Add A Shopping Feature To YouTube
YouTube, the world's biggest video library, may soon become the biggest product catalog too as Google looks to add a shopping interface.
Google will now alert you of household sounds through Android notifications
Once you enable this feature, your phone will recognize sounds like the doorbell, a barking dog, and running water. This functionality is powered by Google’s Live Transcribe technology, which was originally used only to convert speech to text. But now, it can also identify sounds around you.
While the household sound notifications are targeted towards people with hearing loss, it can also alert you to incidents if you’re wearing headphones and listening to music or podcasts.
https://thenextweb.com/plugged/2020/10/09/google-will-now-alert-you-of-household-sounds-through-android-notifications
#Google #alert #house #sounds #Android #notifications
Once you enable this feature, your phone will recognize sounds like the doorbell, a barking dog, and running water. This functionality is powered by Google’s Live Transcribe technology, which was originally used only to convert speech to text. But now, it can also identify sounds around you.
While the household sound notifications are targeted towards people with hearing loss, it can also alert you to incidents if you’re wearing headphones and listening to music or podcasts.
https://thenextweb.com/plugged/2020/10/09/google-will-now-alert-you-of-household-sounds-through-android-notifications
#Google #alert #house #sounds #Android #notifications
Plugged | The Next Web
Google will now alert you of household sounds through Android notifications
Google is rolling out a handy accessibility feature that should make life easier in your home — notifications about household sounds. Once you enable this feature, your phone will recognize sounds like the doorbell, a barking dog, and running water. This…
Forwarded from BlackBox (Security) Archiv
Algorthmic monitoring - EU develops interception platform with speech analysis and face recognition
Police authorities in the EU are to be given a powerful monitoring instrument. The system is to recognize persons in telephone conversations by their voice. But it also uses traces left by suspects in public places or on the Internet.
‼️ The rise of organised criminal networks in the European Union is facilitated by new travelling possibilities and new technologies. Fighting organised crime has become a top priority for European law enforcement agencies (#LEA). The EU-funded #ROXANNE project intends to combine new speech technologies, face recognition and network analysis to facilitate the identification of criminals. Specifically, ROXANNE will develop a platform that will increase agencies’ capabilities via #voice #recognition, #language and #video #technologies. The project will support LEA’s activities through multilanguage applications based on voice, text and face technologies. ROXANNE, in conformity with #Interpol and #EU #regulations, will be tested on real case data in nine EU Member States.
👀 👉🏼 Source 🇩🇪
https://netzpolitik.org/2020/algorthmische-ueberwachung-eu-entwickelt-abhoerplattform-mit-sprachanalyse-und-gesichtserkennung/
👀 👉🏼 Real time network, text, and speaker analytics for combating organized crime:
https://cordis.europa.eu/project/id/833635
#eu #surveillance #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Police authorities in the EU are to be given a powerful monitoring instrument. The system is to recognize persons in telephone conversations by their voice. But it also uses traces left by suspects in public places or on the Internet.
‼️ The rise of organised criminal networks in the European Union is facilitated by new travelling possibilities and new technologies. Fighting organised crime has become a top priority for European law enforcement agencies (#LEA). The EU-funded #ROXANNE project intends to combine new speech technologies, face recognition and network analysis to facilitate the identification of criminals. Specifically, ROXANNE will develop a platform that will increase agencies’ capabilities via #voice #recognition, #language and #video #technologies. The project will support LEA’s activities through multilanguage applications based on voice, text and face technologies. ROXANNE, in conformity with #Interpol and #EU #regulations, will be tested on real case data in nine EU Member States.
👀 👉🏼 Source 🇩🇪
https://netzpolitik.org/2020/algorthmische-ueberwachung-eu-entwickelt-abhoerplattform-mit-sprachanalyse-und-gesichtserkennung/
👀 👉🏼 Real time network, text, and speaker analytics for combating organized crime:
https://cordis.europa.eu/project/id/833635
#eu #surveillance #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
netzpolitik.org
Algorithmische Überwachung: EU entwickelt Abhörplattform mit Sprachanalyse und Gesichtserkennung
Polizeibehörden in der EU sollen ein mächtiges Überwachungsinstrument erhalten. Das System soll Personen in Telefongesprächen anhand der Stimme erkennen. Es nutzt aber auch Spuren, die Verdächtige im öffentlichen Raum oder dem Internet hinterlassen.
Forwarded from BlackBox (Security) Archiv
Facebook responsible for 94% of 69 million child sex abuse images reported by US tech firms
The figures emerge as the UK is among seven nations warning of the impact of end-to-end encryption on public safety online.
Facebook was responsible for 94% of the 69 million child sex abuse images reported by US technology companies last year.
The figures emerged as seven countries, including the UK, published a statement on Sunday warning of the impact of end-to-end encryption on public safety online.
Facebook has previously announced plans to fully encrypt communications in its Messenger app, as well as its Instagram Direct service - on top of WhatsApp, which is already encrypted - meaning no one apart from the sender and recipient can read or modify messages.
The social media site said the changes are designed to improve user privacy on all of its platforms.
But law enforcement agencies fear the move will have a devastating impact on their ability to target paedophiles and protect children online.
Some 16.9 million referrals were made by US tech firms to the National Centre for Missing and Exploited Children (NCMEC) last year, including 69 million images of children being abused - up 50% on the previous year.
Some 94% of the reports, which include the worst category of images, came from Facebook, Home Office officials said.
👀 👉🏼 https://news.sky.com/story/facebook-responsible-for-94-of-69-million-child-sex-abuse-images-reported-by-us-tech-firms-12101357
#fb #DeleteFacebook #childabuse #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The figures emerge as the UK is among seven nations warning of the impact of end-to-end encryption on public safety online.
Facebook was responsible for 94% of the 69 million child sex abuse images reported by US technology companies last year.
The figures emerged as seven countries, including the UK, published a statement on Sunday warning of the impact of end-to-end encryption on public safety online.
Facebook has previously announced plans to fully encrypt communications in its Messenger app, as well as its Instagram Direct service - on top of WhatsApp, which is already encrypted - meaning no one apart from the sender and recipient can read or modify messages.
The social media site said the changes are designed to improve user privacy on all of its platforms.
But law enforcement agencies fear the move will have a devastating impact on their ability to target paedophiles and protect children online.
Some 16.9 million referrals were made by US tech firms to the National Centre for Missing and Exploited Children (NCMEC) last year, including 69 million images of children being abused - up 50% on the previous year.
Some 94% of the reports, which include the worst category of images, came from Facebook, Home Office officials said.
👀 👉🏼 https://news.sky.com/story/facebook-responsible-for-94-of-69-million-child-sex-abuse-images-reported-by-us-tech-firms-12101357
#fb #DeleteFacebook #childabuse #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Sky News
Facebook responsible for 94% of 69 million child sex abuse images reported by US tech firms
The figures emerge as the UK is among seven nations warning of the impact of end-to-end encryption on public safety online.
Undocumented backdoor that covertly takes snapshots found in kids’ smartwatch
A popular smartwatch designed exclusively for children contains an undocumented backdoor that makes it possible for someone to remotely capture camera snapshots, wiretap voice calls, and track locations in real time, a researcher said.
The X4 smartwatch is marketed by Xplora, a Norway-based seller of children’s watches. The device, which sells for about $200, runs on Android and offers a range of capabilities, including the ability to make and receive voice calls to parent-approved numbers and to send an SOS broadcast that alerts emergency contacts to the location of the watch. A separate app that runs on the smartphones of parents allows them to control how the watches are used and receive warnings when a child has strayed beyond a present geographic boundary.
https://arstechnica.com/information-technology/2020/10/a-watch-designed-exclusively-for-kids-has-an-undocumented-spying-backdoor
https://www.theregister.com/2020/10/12/xplora_4_smartwatches
#xplora #smartwatch #kids #backdoor
A popular smartwatch designed exclusively for children contains an undocumented backdoor that makes it possible for someone to remotely capture camera snapshots, wiretap voice calls, and track locations in real time, a researcher said.
The X4 smartwatch is marketed by Xplora, a Norway-based seller of children’s watches. The device, which sells for about $200, runs on Android and offers a range of capabilities, including the ability to make and receive voice calls to parent-approved numbers and to send an SOS broadcast that alerts emergency contacts to the location of the watch. A separate app that runs on the smartphones of parents allows them to control how the watches are used and receive warnings when a child has strayed beyond a present geographic boundary.
https://arstechnica.com/information-technology/2020/10/a-watch-designed-exclusively-for-kids-has-an-undocumented-spying-backdoor
https://www.theregister.com/2020/10/12/xplora_4_smartwatches
#xplora #smartwatch #kids #backdoor
Ars Technica
Undocumented backdoor that covertly takes snapshots found in kids’ smartwatch
The X4, made and jointly developed in China, raises concerns.
Forwarded from cRyPtHoN™ INFOSEC (EN)
Yahoo Groups to shut down for good on December 15, 2020.
Nineteen-year-old discussion board to shut down for good after Verizon effectively killed the service last year.
Yahoo Groups, one of the last vestiges of the old Yahoo web properties, will shut down on December 15, 2020, when Verizon plans to take the groups.yahoo.com website offline for good.
Verizon, which bought Yahoo in 2017, announced the decision today in emails sent to Yahoo Groups users and a message posted on the Yahoo Groups website.
At the time, Verizon announced that users would no longer be able to create new content (discussions) to the site after October 21, and the company planned to permanently remove all past user content on December 14, 2019.
That final announcement came today.
https://www.zdnet.com/article/yahoo-groups-to-shut-down-for-good-on-december-15-2020/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Nineteen-year-old discussion board to shut down for good after Verizon effectively killed the service last year.
Yahoo Groups, one of the last vestiges of the old Yahoo web properties, will shut down on December 15, 2020, when Verizon plans to take the groups.yahoo.com website offline for good.
Verizon, which bought Yahoo in 2017, announced the decision today in emails sent to Yahoo Groups users and a message posted on the Yahoo Groups website.
At the time, Verizon announced that users would no longer be able to create new content (discussions) to the site after October 21, and the company planned to permanently remove all past user content on December 14, 2019.
That final announcement came today.
https://www.zdnet.com/article/yahoo-groups-to-shut-down-for-good-on-december-15-2020/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
Monitoring the Dark Web - TITANIUM Project
TITANIUM has researched, developed, and validated novel data-driven techniques and solutions designed to support Law Enforcement Agencies (LEAs) charged with investigating criminal or terrorist activities involving virtual currencies and/or underground markets in the darknet.
The result of TITANIUM is a set of services and forensic tools, which operate within a privacy and data protection environment that is configurable to local legal requirements, and can be used by investigators
👀 👉🏼 https://titanium-project.eu/
#titanium #police #eu #darknet #cybercrime #video #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
TITANIUM has researched, developed, and validated novel data-driven techniques and solutions designed to support Law Enforcement Agencies (LEAs) charged with investigating criminal or terrorist activities involving virtual currencies and/or underground markets in the darknet.
The result of TITANIUM is a set of services and forensic tools, which operate within a privacy and data protection environment that is configurable to local legal requirements, and can be used by investigators
👀 👉🏼 https://titanium-project.eu/
#titanium #police #eu #darknet #cybercrime #video #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Forwarded from BlackBox (Security) Archiv
German State-Malware Company FinFisher Raided
The public prosecutor has searched multiple premises of the FinFisher company group in Munich and Romania. They are suspected of having exported state malware without the required authorization. The investigations follow a criminal complaint we filed together with other NGOs.
Law enforcement agencies have conducted a large-scale raid of the German state malware company group FinFisher last week. The customs authorities are investigating the suspicion „that software may have been exported without the required export license from the Federal Office of Economics and Export Control“.
The raids follow our criminal complaint, which we have written and submitted together with the Society for Freedom Rights, Reporters Without Borders and the European Center for Constitutional and Human Rights.
15 objects
A spokesperson of the responsible public prosecutor’s office in Munich comments:
"In co-operation with the Customs Investigation Bureau and supported by further prosecution authorities the public prosecutor’s office Munich I searched 15 objects (business premises and private apartments) around Munich and an enterprise from the entrepreneurial group in Romania on 06.10.2020. The search lasted until the evening of 08.10.2020."
"Investigations are still being conducted against managing directors and employees of FinFisher GmbH and at least two other companies on suspicion of violation of the Foreign Trade and Payments Act. The investigations were started in summer 2019 on the basis of criminal charges."
3 days
FinFisher advertises its state malware as „complete IT intrusion portfolio“, both German federal police and Berlin police have purchased the powerful surveillance tool. Variants of the FinFisher suite have been found in dictatorships like Ethiopia and Bahrain, or more recently again in Egypt.
In summer 2017 a FinFisher sample was discovered in Turkey. The authors of the criminal complaint assume that FinFisher is developed and produced in Munich. If true, the group of companies needs an export license, which the German government has not issued. An export without a license would be a criminal offense.
FinFisher denies these accusations. In a statutory declaration, the CEO states:
"FinFisher GmbH has at no time sold or distributed the FinFisher software in Turkey. Against this background, FinFisher GmbH has at no time violated export regulations of the Federal Republic of Germany or the EU."
👀 👉🏼 https://netzpolitik.org/2020/our-criminal-complaint-german-state-malware-company-finfisher-raided/
👀 👉🏼 This is a translation of our original german reporting.
#german #statemalware #FinFisher #raid
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The public prosecutor has searched multiple premises of the FinFisher company group in Munich and Romania. They are suspected of having exported state malware without the required authorization. The investigations follow a criminal complaint we filed together with other NGOs.
Law enforcement agencies have conducted a large-scale raid of the German state malware company group FinFisher last week. The customs authorities are investigating the suspicion „that software may have been exported without the required export license from the Federal Office of Economics and Export Control“.
The raids follow our criminal complaint, which we have written and submitted together with the Society for Freedom Rights, Reporters Without Borders and the European Center for Constitutional and Human Rights.
15 objects
A spokesperson of the responsible public prosecutor’s office in Munich comments:
"In co-operation with the Customs Investigation Bureau and supported by further prosecution authorities the public prosecutor’s office Munich I searched 15 objects (business premises and private apartments) around Munich and an enterprise from the entrepreneurial group in Romania on 06.10.2020. The search lasted until the evening of 08.10.2020."
"Investigations are still being conducted against managing directors and employees of FinFisher GmbH and at least two other companies on suspicion of violation of the Foreign Trade and Payments Act. The investigations were started in summer 2019 on the basis of criminal charges."
3 days
FinFisher advertises its state malware as „complete IT intrusion portfolio“, both German federal police and Berlin police have purchased the powerful surveillance tool. Variants of the FinFisher suite have been found in dictatorships like Ethiopia and Bahrain, or more recently again in Egypt.
In summer 2017 a FinFisher sample was discovered in Turkey. The authors of the criminal complaint assume that FinFisher is developed and produced in Munich. If true, the group of companies needs an export license, which the German government has not issued. An export without a license would be a criminal offense.
FinFisher denies these accusations. In a statutory declaration, the CEO states:
"FinFisher GmbH has at no time sold or distributed the FinFisher software in Turkey. Against this background, FinFisher GmbH has at no time violated export regulations of the Federal Republic of Germany or the EU."
👀 👉🏼 https://netzpolitik.org/2020/our-criminal-complaint-german-state-malware-company-finfisher-raided/
👀 👉🏼 This is a translation of our original german reporting.
#german #statemalware #FinFisher #raid
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
netzpolitik.org
Our Criminal Complaint: German Made State Malware Company FinFisher Raided
The public prosecutor has searched multiple premises of the FinFisher company group in Munich and Romania. They are suspected of having exported state malware without the required authorization. The investigations follow a criminal complaint we filed together…
Forwarded from GJ Vie Privée Internet Sécurité (T~__/>_GJ_06)
Roger Waters (@rogerwaters): "What great company to join. Please join us. Love R. https://mikopeled.com/2020/10/04/register-for-the-online-event-the-trial-of-julian-assange-october-15-2020/" | nitter – https://nitter.net/rogerwaters/status/1316362328347160576#m
Miko Peled
The Trial of Julian Assange
Author and speaker, Miko Peled, for a webinar discussion on the topic of the fate of Julian Assange with a special guest panel featuring Roger Waters, John Pilger, and Ray McGovern
Forwarded from BlackBox (Security) Archiv
The Pandemic's Digital Shadow
The pandemic is fueling digital repression worldwide.
The coronavirus pandemic is accelerating a dramatic decline in global internet freedom. For the 10th consecutive year, users have experienced an overall deterioration in their rights, and the phenomenon is contributing to a broader crisis for democracy worldwide.
In the COVID-19 era, connectivity is not a convenience, but a necessity. Virtually all human activities—commerce, education, health care, politics, socializing—seem to have moved online. But the digital world presents distinct challenges for human rights and democratic governance. State and nonstate actors in many countries are now exploiting opportunities created by the pandemic to shape online narratives, censor critical speech, and build new technological systems of social control.
Three notable trends punctuated an especially dismal year for internet freedom. First, political leaders used the pandemic as a pretext to limit access to information. Authorities often blocked independent news sites and arrested individuals on spurious charges of spreading false news. In many places, it was state officials and their zealous supporters who actually disseminated false and misleading information with the aim of drowning out accurate content, distracting the public from ineffective policy responses, and scapegoating certain ethnic and religious communities. Some states shut off connectivity for marginalized groups, extending and deepening existing digital divides. In short, governments around the world failed in their obligation to promote a vibrant and reliable online public sphere.
👀 👉🏼 https://freedomhouse.org/report/freedom-net/2020/pandemics-digital-shadow
👀 👉🏼 Countries: 👇🏼
https://freedomhouse.org/countries/freedom-net/scores?sort=desc&order=Country
#surveillance #pandemic #digital #shadow #report #netpolitics #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
The pandemic is fueling digital repression worldwide.
The coronavirus pandemic is accelerating a dramatic decline in global internet freedom. For the 10th consecutive year, users have experienced an overall deterioration in their rights, and the phenomenon is contributing to a broader crisis for democracy worldwide.
In the COVID-19 era, connectivity is not a convenience, but a necessity. Virtually all human activities—commerce, education, health care, politics, socializing—seem to have moved online. But the digital world presents distinct challenges for human rights and democratic governance. State and nonstate actors in many countries are now exploiting opportunities created by the pandemic to shape online narratives, censor critical speech, and build new technological systems of social control.
Three notable trends punctuated an especially dismal year for internet freedom. First, political leaders used the pandemic as a pretext to limit access to information. Authorities often blocked independent news sites and arrested individuals on spurious charges of spreading false news. In many places, it was state officials and their zealous supporters who actually disseminated false and misleading information with the aim of drowning out accurate content, distracting the public from ineffective policy responses, and scapegoating certain ethnic and religious communities. Some states shut off connectivity for marginalized groups, extending and deepening existing digital divides. In short, governments around the world failed in their obligation to promote a vibrant and reliable online public sphere.
👀 👉🏼 https://freedomhouse.org/report/freedom-net/2020/pandemics-digital-shadow
👀 👉🏼 Countries: 👇🏼
https://freedomhouse.org/countries/freedom-net/scores?sort=desc&order=Country
#surveillance #pandemic #digital #shadow #report #netpolitics #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
📡@NoGoolag
Freedom House
The Pandemic's Digital Shadow
The pandemic is fueling digital repression worldwide.
YouTube bans misinformation that coronavirus vaccine will kill or be used to implant surveillance microchips
https://www.independent.co.uk/life-style/gadgets-and-tech/youtube-ban-coronavirus-vaccine-misinformation-kill-microchip-covid-b1037100.html
#yt #youtube #coronavirus
https://www.independent.co.uk/life-style/gadgets-and-tech/youtube-ban-coronavirus-vaccine-misinformation-kill-microchip-covid-b1037100.html
#yt #youtube #coronavirus
The Independent
YouTube finally bans misinformation about coronavirus vaccine
The World Health Organisation says a vaccine against Covid-19 may be ready by the end of 2020
You can’t post a link to an article on Twitter or Facebook that details corruption by a major-party presidential candidate
They are officially censoring The New York Post's about Joe Biden's son
https://nypost.com/2020/10/14/email-reveals-how-hunter-biden-introduced-ukrainian-biz-man-to-dad
https://thefederalist.com/2020/10/14/facebook-is-now-officially-censoring-the-new-york-posts-hunter-biden-bombshell
#censorship #fb #facebook #twitter #usa #biden #elections
They are officially censoring The New York Post's about Joe Biden's son
https://nypost.com/2020/10/14/email-reveals-how-hunter-biden-introduced-ukrainian-biz-man-to-dad
https://thefederalist.com/2020/10/14/facebook-is-now-officially-censoring-the-new-york-posts-hunter-biden-bombshell
#censorship #fb #facebook #twitter #usa #biden #elections