In Edward Snowden’s New Memoir, the Disclosures This Time Are Personal

Snowden, of course, is the former intelligence contractor who, in 2013, leaked documents about the United States government’s surveillance programs, dispelling any notions that the National Security Agency and its allies were playing a quaint game of spy vs. spy, limiting their dragnet to specific persons of interest. 

…Sweeping up phone records of Americans citizens, eavesdropping on foreign leaders, harvesting data from internet activity: For revealing these secret programs and more, Snowden was deemed a traitor by the Obama administration, which charged him with violating the Espionage Act and revoked his passport, effectively stranding Snowden in Moscow, where he has been living ever since.

…The internet of the 1990s was a liberating space, he says, where adopting and discarding different avatars could open up possibilities for more authentic expression and connection.

…What does it mean to have the data of our lives collected and stored on file, ready to be accessed — not just now, by whatever administration happens to be in office at the moment, but potentially forever? Should such sensitive work be outsourced to private contractors? What entails effective “oversight” if the public is kept in the dark? When can concerns about “national security” slip into bids for unchecked power?

In Edward Snowden’s New Memoir, the Disclosures This Time Are Personal – The New York Times

hmmm

Edward Snowden: My Hope in Obama Was ‘Misplaced’

Snowden also wrote that America had engaged in “self-destruction” after 9/11, “with the promulgation of secret policies, secret laws, secret courts and secret wars.”

…“I fully supported defensive and targeted surveillance,” Snowden writes, but he called the government’s “bulk collection” of data hypocritical. According to The New York Times, Snowden felt like Obama was doubling down on the Bush administration’s surveillance programs.

Edward Snowden: My Hope in Obama Was ‘Misplaced’

hmmm

How California’s data privacy law will change your online experience — no matter where you live

The California law goes further than any other U.S. law when it comes to who has access to a consumer’s personal data online. Beyond opting out, individuals can ask the company for what reason the data is being collected and sold, learn about the types of third-party companies buying the data and find out the financial incentives for the business selling user data. The law also applies not just to an individual, but personal data for a household or connected devices.

How California’s data privacy law will change your online experience — no matter where you live – The Colorado Sun

hmmm

Inside Olympic Destroyer, the Most Deceptive Hack in History

The Wi-Fi seemed to have suddenly stopped working. Thousands of internet-linked TVs showing the ceremony around the stadium and in 12 other Olympic facilities had gone black. Every RFID-based security gate leading into every Olympic building was down. The Olympics’ official app, including its digital ticketing function, was broken too; when it reached out for data from backend servers, they suddenly had none to offer.

…If they couldn’t recover the servers by the next morning, the entire IT backend of the organizing committee—responsible for everything from meals to hotel reservations to event ticketing—would remain offline as the actual games got underway. 

…All nine of the Olympic staff’s domain controllers, the powerful machines that governed which employee could access which computers in the network, had somehow been paralyzed, crippling the entire system. 

…Almost exactly 12 hours after the cyberattack on the Olympics had begun, Oh and his sleepless staffers finished reconstructing their servers from backups and began restarting every service.

…The Pyeongchang cyberattack would turn out to be perhaps the most deceptive hacking operation in history, using the most sophisticated means ever seen to confound the forensic analysts searching for its culprit.

…When state-sponsored Russian hackers stole and leaked emails from the Democratic National Committee and Hillary Clinton’s campaign in 2016, we now know that the Kremlin likewise created diversions and cover stories. It invented a lone Romanian hacker named Guccifer 2.0 to take credit for the hacks; it also spread the rumors that a murdered DNC staffer named Seth Rich had leaked the emails from inside the organization—and it distributed many of the stolen documents through a fake whistle-blowing site called DCLeaks. Those deceptions became conspiracy theories, fanned by right-wing commentators and then-presidential candidate Donald Trump.

…The deceptions generated a self-perpetuating ouroboros of mistrust: Skeptics dismissed even glaring clues of the Kremlin’s guilt, like Russian-language formatting errors in the leaked documents, seeing those giveaways as planted evidence. Even a joint statement from US intelligence agencies four months later naming Russia as the perpetrator couldn’t shake the conviction of disbelievers. 

…With the malware that hit the Pyeongchang Olympics, the state of the art in digital deception took several evolutionary leaps forward. Investigators would find in its code not merely a single false flag but layers of false clues pointing at multiple potential culprits. And some of those clues were hidden deeper than any cybersecurity analyst had ever seen before.

…In broad outline, Cisco’s description of Olympic Destroyer’s anatomy called to mind two previous Russian cyberattacks, NotPetya and Bad Rabbit. As with those earlier attacks, Olympic Destroyer used a password-stealing tool, then combined those stolen passwords with remote access features in Windows that allowed it to spread among computers on a network. Finally, it used a data-destroying component to delete the boot configuration from infected machines before disabling all Windows services and shutting the computer down so that it couldn’t be rebooted. Analysts at the security firm CrowdStrike would find other apparent Russian calling cards, elements that resembled a piece of Russian ransomware known as XData.

…There would be plenty of evidence vaguely hinting at Russia’s responsibility. The problem, it would soon become clear, was that there seemed to be just as much evidence pointing in a tangle of other directions too.

…The more that forensic analysts reverse-engineered Olympic Destroyer’s code, the further they seemed to get from arriving at a resolution.

In fact, all those contradictory clues seemed designed not to lead analysts toward any single false answer but to a collection of them, undermining any particular conclusion. The mystery became an epistemological crisis that left researchers doubting themselves. “It was psychological warfare on reverse-engineers,” says Silas Cutler, a security researcher who worked for CrowdStrike at the time. “It hooked into all those things you do as a backup check, that make you think ‘I know what this is.’ And it poisoned them.”

…“Even as it accomplished its mission, it also sent a message to the security community,” Williams says. “You can be misled.”

…By the end of that night, the traffic had thinned, he was virtually alone in the office, and he had determined that the header metadata didn’t actually match other clues in the Olympic Destroyer code itself; the malware hadn’t been written with the programming tools that the header implied. The metadata had been forged.

This was something different from all the other signs of misdirection that researchers had fixated on. The other red herrings in Olympic Destroyer had been so vexing in part because there was no way to tell which clues were real and which were deceptions. But now, deep in the folds of false flags wrapped around the Olympic malware, Soumenkov had found one flag that was provably false. It was now clear that someone had tried to make the malware look North Korean and failed due to a slipup. It was only through Kaspersky’s fastidious triple-checking that it came to light.

…Only after he had established those hidden connections did Matonis go back to the Word documents that had served as the vehicles for each malware sample and begin to Google-translate their contents, some written in Cyrillic. Among the files he’d tied to the Olympic Destroyer bait, Matonis found two other bait documents from the collection that dated back to 2017 and seemed to target Ukrainian LGBT activist groups, using infected files that pretended to be a gay rights organization’s strategy document and a map of a Kiev Pride parade. Others targeted Ukrainian companies and government agencies with a tainted copy of draft legislation.

…Even as that physical war had killed 13,000 people in Ukraine and displaced millions more, a Russian hacker group known as Sandworm had waged a full-blown cyberwar against Ukraine as well: It had barraged Ukrainian companies, government agencies, railways, and airports with wave after wave of data-destroying intrusions, including two unprecedented breaches of Ukrainian power utilities in 2015 and 2016 that had caused blackouts for hundreds of thousands of people. Those attacks culminated in NotPetya, a worm that had spread rapidly beyond Ukraine’s borders and ultimately inflicted $10 billion in damage on global networks, the most costly cyberattack in history.

…Matonis began painstakingly checking every IP address his hackers had used as a command and control server in their campaign of malicious Word document phishing; he wanted to see what domains those IP addresses had hosted. Since those domain names can move from machine to machine, he also used a reverse-lookup tool to flip the search—checking every name to see what other IP addresses had hosted it. He created a set of treelike maps connecting dozens of IP addresses and domain names linked to the Olympics attack. And far down the branch of one tree, a string of characters lit up like neon in Matonis’ mind: account-loginserv.com.

…Election officials had warned in 2016 that, beyond stealing and leaking emails from Democratic Party targets, Russian hackers had broken into the two states’ voter rolls, accessing computers that held thousands of Americans’ personal data with unknown intentions.

…At the end of his long chain of internet-address connections, Matonis had found a fingerprint that linked the Olympics attackers back to a hacking operation that directly targeted the 2016 US election. Not only had he solved the whodunit of Olympic Destroyer’s origin, he’d gone further, showing that the culprit had been implicated in the most notorious hacking campaign ever to hit the American political system.

…On July 13, 2018, special counsel Robert Mueller unsealed an indictment against 12 GRU hackers for engaging in election interference, laying out the evidence that they’d hacked the DNC and the Clinton campaign; the indictment even included details like the servers they’d used and the terms they’d typed into a search engine.

Deep in the 29-page indictment, Matonis read a description of the alleged activities of one GRU hacker named Anatoliy Sergeyevich Kovalev. Along with two other agents, Kovalev was named as a member of GRU Unit 74455, based in the northern Moscow suburb of Khimki in a 20-story building known as “the Tower.”

The indictment stated that Unit 74455 had provided backend servers for the GRU’s intrusions into the DNC and the Clinton campaign. But more surprisingly, the indictment added that the group had “assisted in” the operation to leak the emails stolen in those operations. Unit 74455, the charges stated, had helped to set up DCLeaks.com and even Guccifer 2.0, the fake Romanian hacker persona that had claimed credit for the intrusions and given the Democrats’ stolen emails to WikiLeaks.

Kovalev, listed as 26 years old, was also accused of breaching one state’s board of elections and stealing the personal information of some 500,000 voters. Later, he allegedly breached a voting systems company and then impersonated its emails in an attempt to hack voting officials in Florida with spoofed messages laced with malware. 

…As the 2020 election approaches, Olympic Destroyer shows that Russia has only advanced its deception techniques—graduating from flimsy cover stories to the most sophisticated planted digital fingerprints ever seen. And if they can fool even a few researchers or reporters, they can sow even more of the public confusion that misled the American electorate in 2016. 

Inside Olympic Destroyer, the Most Deceptive Hack in History | WIRED

hmmm

State Dept. finds no pattern of classified violation in Hillary Clinton private-server emails

“While there were some instances of classified information being inappropriately introduced into an unclassified system in furtherance of expedience, by and large, the individuals interviewed were aware of security policies and did their best to implement them in their operations,” the report said.

“Instances of classified information being deliberately transmitted via unclassified email were the rare exception and resulted in adjudicated security violations. There was no persuasive evidence of systemic, deliberate mishandling of classified information.”

…The report noted that none of the messages in question was marked as classified, which led to questions about whether the sender or recipient should have known the information was classified. The investigators also pointed to significant ambiguity about what sort of “foreign government information” should be treated as classified and what could be shared in unclassified systems.

…Clinton allies have bitterly complained about Comey’s statement as a breach of Justice Department protocol. A Justice Department inspector general review backed up that view.

The State Department’s internal security review prompted concern among some former Clinton aides and current State officials that it could amount to an effort to alleviate pressure from Clinton critics who were disappointed that no one was prosecuted over the emails. Some also said it could be an attempt to strip the security clearances of former Clinton aides and allies.

State Dept. finds no ‘systemic’ classified violation in Hillary Clinton private-server emails – POLITICO

hmmm

Reality Winner sentenced to more than 5 years for leaking info about Russia hacking attempts

Winner, 26, who was a contractor with the National Security Agency, pleaded guilty in June to copying a classified report that detailed the Russian government’s efforts to penetrate a Florida-based voting software supplier.

U.S. intelligence agencies later confirmed Russia had meddled in the election. Authorities have never confirmed what exactly the report said, or identified the news organization that received it.

But a leaked document that was published by the online news outlet The Intercept in June 2017 bore the same May 5 date as the NSA report that Winner had leaked. The Justice Department announced it had arrested Winner on the same day as the Intercept report came out.

…Winner has been held with no bail since she was arrested last June and charged under the Espionage Act. A former Air Force linguist who speaks Arabic and languages used in Afghanistan, including Farsi and Pashto, Winner had a top-secret security clearance while working for national security contractor Pluribus International at Fort Gordon in Georgia when she was charged.

Reality Winner sentenced to more than 5 years for leaking info about Russia hacking attempts

hmmmm

Inside Mark Zuckerberg’s private meetings with conservative pundits

The conversations center around “free expression, unfair treatment of conservatives, the appeals process for real or perceived unfair treatment, fact checking, partnerships, and privacy,” the source familiar with the meetings said.

…Allegations that Facebook censors conservatives, however, have gone largely unsubstantiated—conservative publications including Fox, Breitbart, and Shapiro’s Daily Wire were among the top publishers on Facebook as of this past May, according to data from the social media tracking firm Newswhip.

…News of the outreach is likely to further fuel suspicions on the left that Zuckerberg is trying to appease the White House and stay out of Trump’s crosshairs. The president threatened to sue Facebook and Google in June and has in the past pressured the Justice Department to take action against his perceived foes.

…The ongoing talks between Zuckerberg and prominent conservatives have attracted the attention of the House Energy and Commerce Committee, which conducts oversight on issues related to telecommunications and consumer protection and is “aware” of allegations that conservatives “are trying to work the refs” ahead of 2020, according to a person with knowledge of the matter.

…Facebook has been criticized in recent days, including by Democratic presidential candidate Elizabeth Warren, for its ad policy, which exempts politicians from third-party fact-checking and arguably facilitates the spread of disinformation.

Inside Mark Zuckerberg’s private meetings with conservative pundits – POLITICO

 

hmmm

Cambridge Analytica Whistleblower Christopher Wylie: Company Fueled ‘Insurgency’

Wylie’s new book, Mindf*ck, explains how Cambridge Analytica harvested the information of tens of millions of Facebook users, then used the data to target people susceptible to disinformation, racist thinking and conspiracy theories. 

…[Bannon] followed this notion of the Breitbart doctrine, which is that politics exists downstream from culture. So don’t just focus on the day-to-day politics. Try to actually make an impact on an enduring change in culture, because politics will just flow from that.

…If you can understand how a person thinks and feels and engages in the world, and what kinds of biases they have, you can then figure out what’s going to be most effective at engaging them in a particular objective

…What we were looking at is how to use data online to identify people who would be likely targets of different extremist groups. And from that, try to understand and unpack: How would a fairly extreme ideological message spread through different kinds of social networks? 

……”They targeted people who were more prone to conspiratorial thinking,” Wylie says. “They used that data, and they used social media more broadly, to first identify those people, and then engage those people, and really begin to craft what, in my view, was an insurgency in the United States.”

Cambridge Analytica Whistleblower Christopher Wylie: Company Fueled ‘Insurgency’ : NPR

hmmm

US, UK sign agreement to access data from tech companies like Facebook

In a press release late Thursday, the Justice Department said the historic agreement will “dramatically speed up investigations by removing legal barriers to timely and effective collection of electronic evidence.” The pact will allow U.K. authorities to go directly to tech companies like Facebook, Google or Twitter for evidence in cases related to terrorism, child sexual abuse and other serious crimes. U.S. officials will also be able to receive access to British communication service providers.

Currently, authorities must go through government agencies to access such evidence from companies, which the officials said can take “years.” Under the new agreement, the process will be reduced to “a matter of weeks or even days,” according to the U.K. Home Office.

…The new agreement will not, however, prevent tech companies from encrypting data on their platforms. End-to-end encryption, which already exists in some apps like WhatsApp and Signal, means that only users sending and receiving messages can see them.

US, UK sign agreement to access data from tech companies like Facebook

hmmm

Anti-ICE Activists Are Marching on Jeff Bezos’ Home to Protest Amazon’s Role in ‘Fueling Trump’s Deportation Force’

Amazon’s decision to continue to provide technology to help ICE deport and separate thousands of immigrant families across the country “makes no sense,” Varona said. As one of the very few tech giants to hit the $1 trillion mark in market value, Amazon, he said, should not have to rely on ICE for profit.

Anti-ICE Activists Are Marching on Jeff Bezos’ Home to Protest Amazon’s Role in ‘Fueling Trump’s Deportation Force’

hmmmm

Sophisticated iPhone hacking went unnoticed for over two years

Victims’ iPhones would have had malware installed in the form of a powerful monitoring implant capable of stealing chat messages (including WhatsApp, Telegram and iMessage), photos, tracking users’ locations in real time, and even accessing the Keychain password store.

If you set out to design a compromise of a mobile device, it’d be hard to imagine a more complete one than this, excepting that this campaign was eventually detected.

…Beer’s write-up hints that the attack may be the work of a nation state group trying to gather intel on specific groups of people for political reasons. We can’t verify if that’s true but if it is, it wouldn’t be the first.

Sophisticated iPhone hacking went unnoticed for over two years – Naked Security

hmmmm

ThinkProgress: Steve Bannon knows how often you go to church

Steve Bannon and the conservative group CatholicVote used cell-phone location data for people who had been inside Roman Catholic churches in Dubuque, Iowa, in 2018 to target them with get-out-the-vote ads, ThinkProgress has learned.

…“If your phone’s ever been in a Catholic church, it’s amazing, they got this data,” Bannon told director Alison Klayman as they sat in his Washington, D.C., home on the eve of the 2018 midterm elections.

“Literally, they can tell who’s been in a Catholic church and how frequently,” Bannon added. “And they got it triaged.”

…CatholicVote planned to use the data to send targeted get-out-the-vote ads on election day telling Catholics that it was their duty “to support President Trump,” according to Bannon.

…CatholicVote would not say more about how the group collected and used data in 2018.

The technology Bannon was alluding to is called “geofencing” or “ring-fencing.” It’s become popular over the last several years with advertisers, campaigns, and advocacy groups that want to find people who may be receptive to their message.

When Klayman asked Bannon, on-camera, where he got his data from, he answered, simply, “the phone companies.”

“And the data guys sell it,” Bannon added.

…Geofencing creates a virtual fence around a geographic location, allowing data brokers and digital marketing firms to either serve ads to people while they are inside the fence or capture their phones’ unique IDs for later use. The ads themselves appear in apps or on websites as the person uses their phone, whether they’re served up while the user is in the geofenced area or at a later date.

…Here’s how geofencing information is collected: Our phones constantly give up our locations. Experts who spoke with ThinkProgress said there are several ways that brokers can collect that data. One method estimates the location of a phone based on the cell towers it pings as it looks for a signal. In other methods, some of a smart phone’s apps collect location data from its GPS chip or the wifi networks it connects to. Many of the biggest app makers then monetize that data, selling it to brokers and digital ad firms.

…In 2017, Copley Advertising settled with the Massachusetts attorney general’s office after it used geofencing to help anti-abortion groups target ads to women who visited Planned Parenthood clinics.

…The New York Times reviewed some of the location data that app makers sold to a broker, the paper was able to identify individual users and track them to a Planned Parenthood clinic, a middle school, an emergency room, and to their homes and offices.

The technology news site Motherboard went a step further, paying a bounty hunter to locate a specific phone in Queens, New York, after T-Mobile sold the user’s location data, gleaned from cell towers, to a broker who then re-sold it to third-party dealers.

Exclusive: Steve Bannon knows how often you go to church

sigh…

Facebook’s privacy agreement with the FTC does little to constrain it

The $5 billion penalty is all-but-inconsequential to a company as profitable as Facebook. The new oversight structure has some major flaws and weaknesses. The settlement does little to limit Zuckerberg’s power and doesn’t hold him personally accountable for the actions of a company that he alone controls. And the agreement does almost nothing to stop the collection and sharing of data — or the use of it for targeted advertising — that was at the heart of the company’s privacy violations.

Facebook’s privacy agreement with the FTC does little to constrain it – Business Insider

Jeezus…

FBI, TSA use of facial recognition tech needs cleaning up, say lawmakers

At a Tuesday hearing on facial recognition by the House Committee on Oversight and Reform, lawmakers questioned how government agencies like the FBI and the Transportation Security Administration have been using the technology. The FBI faced heavy criticism for failing to meet the Government Accountability Office’s recommendations on accuracy, transparency and privacy issues.

“They still haven’t fixed the five things they were supposed to do when they started,” Rep. Jim Jordan, a Republican from Ohio and the ranking member of the oversight committee, said at the hearing. “But we’re supposed to believe ‘don’t worry, everything’s just fine.'”

Those five recommendations about the use of facial recognition systems include publishing privacy documents, conducting privacy impact assessments, improving sample sizes in accuracy tests, testing accuracy of partners, and conducting annual reviews of accuracy.

…The TSA uses facial recognition at airports, saying the technology speeds the check-in process, but critics have said the tech is being utilized without proper vetting or regulatory safeguards

…Researchers have pointed out that facial recognition tech can be flawed and can show race and gender bias, and civil rights advocates have argued that facial recognition threatens privacy and free speech.

FBI, TSA use of facial recognition tech needs cleaning up, say lawmakers – CNET

hmmm