SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : 2026 TeoTwawKi ... 2032 Darkest Interregnum -- Ignore unavailable to you. Want to Upgrade?


To: ggersh who wrote (175105)7/18/2021 11:14:37 PM
From: TobagoJack  Read Replies (1) | Respond to of 217753
 
get with the program

if it is about spying, file under china china china, and

if it is about china, cross file under spying

:0)

more seriously, good to see snowdon still relevant

hard to be sure for whom he actually worked for

lauded in a (spy) museum in NYC and domiciled in Moscow

Hope he is still together with his original girlfriend but there are a lot of pretty girls in Russia

let's do perusal search ...

aha, snowdon married, and better, baby snowdon on the way



usatoday.com

Edward Snowden and his wife, awaiting birth of son, seek to be Russian-US dual nationals


MOSCOW – Former U.S. security contractor Edward Snowden said Monday that he and his wife intend to apply for Russian citizenship without renouncing their U.S. citizenship.

Snowden, a former contractor with the U.S. National Security Agency, has been living in Russia since 2013 to escape prosecution in the U.S. after leaking classified documents detailing government surveillance programs. He was granted permanent residency last month, his Russian lawyer said.

Snowden's wife, Lindsay Mills, an American who has been living with him in Russia, announced last week that the couple are expecting a child. According to Snowden's lawyer, Anatoly Kucherena, the child, a boy, will be born in December and will have Russian citizenship.

“After years of separation from our parents, my wife and I have no desire to be separated from our son. That’s why, in this era of pandemics and closed borders, we’re applying for dual U.S.-Russian citizenship,” Snowden said in a tweet Monday.

Kucherena told the Interfax news agency that the process of preparing the paperwork for getting Snowden a Russian passport will start soon.

He will be able to get a Russian passport without renouncing his U.S. nationality after Russia relaxed its strict citizenship laws this year. The law had required foreigners to renounce other nationalities to get Russian citizenship.

Snowden added in another tweet that the couple plan to be “raising our son with all the values of the America we love – including the freedom to speak his mind" and that he looked forward to the day he can return to the U.S. “so the whole family can be reunited.”

Snowden, who has kept a low profile in Russia and occasionally criticized Russian government policies on social media, said last year that he was willing to return to the U.S. if he’s guaranteed a fair trial.

'Out of harm's way': US Marshals Service leads recovery of 27 missing children in Virginia's 'Operation Find Our Children'

Hurricane Eta strengthens to Category 3: Threatens to bring 'catastrophic' damage to Central America



To: ggersh who wrote (175105)7/19/2021 9:01:20 AM
From: TobagoJack  Read Replies (1) | Respond to of 217753
 
Just in, China China China is now accused not only of attaching tiny spy chips to Amazon and Apple devices, but also of hacking Microsoft, that which was tee-ed up as an NSA weapon against China to begin with.

The boyz play well together.

Team USA should do same as Team China, ban Microsoft on all government computers google.com
China tells government offices to remove all foreign computer equipment


bloomberg.com

U.S., U.K., Allies Tie Chinese Government to Microsoft Hack

John Follain
July 19, 2021, 8:02 PM GMT+8

The U.S., U.K. and their allies formally attributed the Microsoft Exchange hack to actors affiliated with the Chinese government and accused the Chinese government of a broad array of “malicious cyber activities,” escalating last week’s tensions between the White House and China.

The group of nations said Monday that the Chinese government has been the mastermind behind a series of malicious ransomware, data theft and cyber-espionage attacks against public and private entities, including the sprawling Microsoft Exchange hack earlier this year.

“The Chinese Government must end this systematic cyber sabotage and can expect to be held account if it does not,” U.K. Foreign Secretary Dominic Raab said Monday in a statement.

The White House said that it was joining with European nations to expose the scale of China’s activity and will take steps to counter it.

“Responsible states do not indiscriminately compromise global network security nor knowingly harbor cyber criminals -- let alone sponsor or collaborate with them,” Secretary of State Antony Blinken said in a statement. “These contract hackers cost governments and businesses billions of dollars in stolen intellectual property, ransom payments, and cybersecurity mitigation efforts, all while the MSS had them on its payroll,” referring to China’s Ministry of State Security.

The European Union’s foreign policy chief Josep Borrell said that the cyberattack was conducted from China and “resulted in security risks and significant economic loss for our government institutions and private companies.” The activities were linked to the hacker groups Advanced Persistent Threat 40 and Advanced Persistent Threat 31, according to an EU statement on Monday.

The group of nations attributing the attack to China includes Australia, Canada, New Zealand, Japan and NATO, marking the first condemnation by the North American-European alliance on China’s cyber activities, the senior Biden administration official said.

Read: Cyberwar, How Nations Attack Without Bullets or Bombs: QuickTake

Monday’s announcement will add to the range of issues -- including economic, military and political -- the U.S. and China have been at odds over. Those tensions intensified last week when the administration warned investors about the risks of doing business in Hong Kong with an advisory saying China’s push to exert more control over the financial hub threatens the rule of law and endangers employees and data.

The U.S. also charged four Chinese nationals affiliated with the Ministry of State Security with a campaign to hack into computer systems of dozens of companies, universities and and government entities in the U.S. and abroad between 2011 and 2018. The indictment, which was unsealed Monday, alleges that the hackers targeted, among other things, Ebola vaccine research.

President Joe Biden has called competition with China one of the defining challenges of the century. China’s leaders were surprised by the administration’s decision to leave in place tariffs imposed by former President Donald Trump, and were infuriated by its support for reopening a review of how the Covid-19 pandemic started -- and whether it leaked from a lab in Wuhan.

With the report Monday, the U.S. aims to show how China’s Ministry of State Security uses criminal contract hackers to conduct unsanctioned cyber operations globally, including for its own personal profit.

“In some cases, we are aware that PRC government-affiliated cyber operators have conducted ransomware operations against private companies that have included ransom demands of millions of dollars,” the White House said in a fact sheet.

The Chinese Ministry of Foreign Affairs did not immediately reply to a request for comment outside of office hours. In March, the ministry dismissed allegations that China-based government hackers were behind cyberattacks on Microsoft Exchange servers, accusing the company of making “groundless accusations,” and saying that tracing the source of cyberattacks is a “highly sensitive political issue.” China has long insisted that it is not a perpetrator but a victim of cyberattacks.

50 TacticsAs part of the announcement, the National Security Agency, the Cybersecurity and Infrastructure Security Agency and Federal Bureau of Investigation detailed more than 50 tactics Chinese state-sponsored cyber hackers used when targeting U.S. and allied networks, including spearphishing emails with malicious attachments, exploitation of public-facing applications and drive-by compromise.

The agencies also provided advice and technical mitigations to confront threats, such as installing patches to protect against system vulnerabilities, strengthening login and password requirements and storing critical information on air-gapped systems.

Among the threats is state-sponsored cyber extortion, also known as ransomware attacks, in which the Chinese government has demanded millions of dollars from private companies in exchange for digital keys that allow victims to regain access to their computer networks, the official said.

Microsoft Corp. has previously attributed the hack to Chinese actors the software giant called Hafnium. The U.S.’s assessment appears to support Microsoft’s conclusions, attributing the hack to MSS-affiliated actors with “a high degree of confidence,” according to the fact sheet.

The attack against Microsoft’s Exchange email servers exploded over the course of two weeks between late February and early March. Microsoft first released software patches on March 2 to fix the critical vulnerabilities exploited in the hack. The attack exposed tens of thousands of victim email systems, including those of health-care facilities, manufacturers, energy companies and state and local governments.

Until now, most ransomware attacks had been attributed to Eastern European and North Korean operators. Now, the U.S. is accusing the Chinese government of not only leading malicious cyber operations, but also of hiring mercenaries, according to the official. The claim accuses China of not only sponsoring espionage, but also supporting and possibly endorsing the work of cyber criminals executing these attacks.

Due to the breadth of victims around the world, the formal attribution came only after the U.S. had attained a high confidence level on the source of the hack, and the announcement could be made in concert with allies, the official added.

— With assistance by Kitty Donaldson, Lucille Liu, and Jordan Fabian

(Updates with CISA fact sheet in 14th paragraph)

Before it's here, it's on the Bloomberg Terminal.
LEARN MORE

Sent from my iPad



To: ggersh who wrote (175105)7/22/2021 3:23:21 AM
From: TobagoJack1 Recommendation

Recommended By
ggersh

  Read Replies (1) | Respond to of 217753
 
Re << caucus99percent.com >>

hmmmmnnnn

Snowdon turns out to be correct, that the story is taking a life of its own, and funnily, appears at least for the moment have pushed the 'other' story, the one about CCP China China China hacking Microsoft in 5-eyes + Japan, off of the front pages

Let us see if Team Germany got hacked with Israeli help by 5-eyes

zerohedge.com

Pegasus Spyware Targeted French President Macron - "Extremely Serious" Breach Under Investigation

The latest victim who was targeted using the phone hacking spyware Pegasus has been revealed to French President Emmanual Macron - part of a growing list that's said to include some 600 government officials and politicians from over 30 countries. Israeli tech firm and Pegasus-developer NSO Group is in damage control mode after an international consortium of news outlets has published dozens of stories exposing the hacks. Pakistan Prime Minister Imran Khan is also on the list.

It's believed that governments used the Israeli company's military-grade hacking tools to access the phones of dissidents, activists and journalists in countries like UAE, Saudi Arabia, Morocco, and even Hungary. The fact that heads of state were also likely targeted suggests that customers also turned the powerful spyware against foreign rivals and enemies, or perhaps to get a leg up in major business or political negotiations. The Independent writes that the following 10 governments are believed to be NSO customers:

Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India and the United Arab Emirates (UAE).


AFP via Getty Images

But in terms of world leaders also reportedly targeted, Macron may be the most visible and influential European figure thus far.

"French newspaper Le Monde reports that Moroccan intelligence services identified a phone that Mr Macron had been using since 2017," BBC reportsof the new revelation. However, Morocco has denied ever being a client of NSO, despite the country's name being all over the recent reporting.

The French presidency's office has yet to confirm if Macron was a victim of a hack, and it's as yet unclear if his phone was breached using Pegasus, but it called the allegations "very serious" if confirmed.

"If confirmed this would be extremely serious" - a statement from Macron's office said while saying a major investigation is underway.


According to the BBC, "Numbers on the leaked list are also said to include those of President Baram Salih of Iraq and South Africa's Cyril Ramaphosa, as well as the current prime ministers of Pakistan, Egypt and Morocco, and the King of Morocco."

Saudi Arabia was behind an NSO spyware attack on Jamal Khashoggi’s associates and family both before and after his murder, according to the new revelations...

As we described previously, Pegasus is a very advanced malware that infects iOS and Android devices to allow operators of the spyware to copy messages, photos, calls and other data, including secretly activate microphones and cameras. Based on the investigation of leaks initially reported in Forbidden Stories, the leak contains a list of 50,000 phone numbers that have been identified as those of people of interest by clients of NSO since 2016.

The list includes many close family members of one country’s ruler, suggesting he might have instructed the country’s intelligence agencies to explore the possibility of tracking and spying on their own relatives. Forbidden Stories has summarized the enormity of the leak and follow-up investigative reporting as follows:

An unprecedented leak of more than 50,000 phone numbers selected for surveillance with Pegasus, a spyware sold by Israeli company NSO Group, shows how this technology has been systematically abused for years to spy on journalists, human rights defenders, academics, businesspeople, lawyers, doctors, union leaders, diplomats, politicians and several heads of states.


Likely we have only witnessed the tip of the iceberg in terms of both government officials and journalists and activists targeted, with the further obvious implication of Israeli intelligence being at the center of this - as The Washington Post has recently explored.

Meanwhile, NSO Group has announced it's shutting down all media inquiries related to the ongoing scandal..



To: ggersh who wrote (175105)7/22/2021 10:05:54 AM
From: TobagoJack  Read Replies (1) | Respond to of 217753
 
Re <<Who controls that program?>>

The twisting, shimmying, squirming, and twirling is so very unbecoming.

Yeup, the app is designed to be used to spy, and all governments spy, all do so ‘legally’ per rule by making up rules, so NSO has a point, that finger-pointing should be at the customer.

Am fairly sure the customers cannot conveniently point anything at NSO unless NSO start to give away true secrets, in which case would not be fingers that be pointing. What a mess.

What now?

Well, 50,000 names, released 4-5 a batch, can last quite some time. Should it be the case that the name already died a mysterious death, very problematic.

Maybe Haim is right about Israel after all.

Wonder how the original story got ‘leaked’.
"But all the allegations and all the finger-pointing should be at the customer."

bbc.com

Pegasus spyware seller: Blame our customers not us for hacking
4 hours ago
By Joe Tidy
Cyber reporter

AFP

The maker of powerful spy software allegedly used to hack the phones of innocent people says blaming the company is like "criticising a car manufacturer when a drunk driver crashes".

NSO Group is facing international criticism, after reporters obtained a list of alleged potential targets for spyware, including activists, politicians and journalists.

Investigations have begun as the list, of 50,000 phone numbers, contained a small number of hacked phones.

Pegasus infects iPhones and Android devices, allowing operators to extract messages, photos and emails, record calls and secretly activate microphones and cameras.

What’s it like to have spyware on your phone?

NSO Group has said the software is intended for use against criminals and terrorists and made available to only military, law enforcement and intelligence agencies from countries with good human-rights records.

But a consortium of news organisations, led by French media outlet Forbidden Stories, has published dozens of stories based around the list, including allegations French President Emmanuel Macron's number was on it and may have been targeted.

Dubai princesses' phone numbers 'on Pegasus list' French president identified as spyware target The princess who vanished

NSO Group said it had been told the list had been hacked from its Cyprus servers

But a company spokesman told BBC News: "Firstly, we don't have servers in Cyprus.

"And secondly, we don't have any data of our customers in our possession.

"And more than that, the customers are not related to each other, as each customer is separate.

"So there should not be a list like this at all anywhere."

And the number of potential targets did not reflect the way Pegasus worked.

"It's an insane number," the spokesman said.

"Our customers have an average of 100 targets a year.

"Since the beginning of the company, we didn't have 50,000 targets total."

Security services

Many times in recent years, the company has been accused of allowing repressive governments to hack innocent people, including those close to murdered Washington Post columnist Jamal Khashoggi.

But it denies this and all other allegations.

It does not routinely investigate who is targeted but has systems in place to vet security services it sells to, it says.

Getty Images
US-based journalist and critic of Saudi Arabia's government Jamal Khashoggi was murdered on 2 October 2018

Earlier this month, NSO Group launched its Transparency Report, saying: "We must hold ourselves to a higher standard and act with stewardship and transparency... to ensure public safety and concern for human rights and privacy."

But on Wednesday, the spokesman said: "If I am the manufacturer of a car and now you take the car and you are driving drunken and you hit somebody, you do not go to the car manufacturer, you go to the driver.

"We are sending the system to governments, we get all the correct accreditation and do it all legally.

"You know, if a customer decides to misuse the system, he will not be a customer anymore.

"But all the allegations and all the finger-pointing should be at the customer."

'A coincidence'

Of the people whose numbers are on the list, 67 agreed to give Forbidden Stories their phones for forensic analysis.

And this research, by Amnesty International Security Labs, reportedly found evidence of potential targeting by Pegasus on 37 of those.

But NSO Group said it had no knowledge of how some phones on the list contained remnants of spyware.

It could be "a coincidence", the spokesman said.

Sent from my iPad