"Given the government's obsession with passing cybersecurity legislation, you would think they'd be happy that Apple and Google are making it harder for foreign governments and criminals to break into people's phones or company servers to steal your data. But you'd be forgetting that the head of the FBI and his fellow fear-mongerers are still much more concerned with making sure they retain control over your privacy, rather than protecting everyone's cybersecurity."
"But unbeknown to Real G and hundreds of criminals who until this week believed that ANOM was the best way to arrange drug deals, money laundering and murders away from the eyes of authorities, the FBI was also secretly copied in on every message.
Indeed, in one of the most elaborate and sprawling honeypot traps known to date, the entire communications platform was being covertly operated by the FBI, marking a first for the agency."
"Citizens would no longer have the right to get information about their records. The Privacy Act states that anyone can request their record from a government database so it can be reviewed and any errors corrected. That right would be eliminated if the database were exempted, meaning no one would ever know what information the FBI had on them."
"The criminals who took over the library system want $35,000 in Bitcoin to give it back.The criminals who took over the library system want $35,000 in Bitcoin to give it back. The FBI is investigating. The library does not store sensitive patron data, so the hack does not expose patrons to data-breach risks."
"The FBI can issue national security letters to conduct online surveillance in the US without court approval, but requests often come with a gagging order, which prevents websites from publicly disclosing them.
To get around this, many websites state that they have not received any classified requests."
"There it is. If you run a business, and the FBI or NSA want to turn it into a mass surveillance tool, they believe they can do so, solely on their own initiative. They can force you to modify your system. They can do it all in secret and then force your business to keep that secret. Once they do that, you no longer control that part of your business. You can't shut it down. You can't terminate part of your service. In a very real sense, it is not your business anymore. It is an arm of the vast U.S. surveillance apparatus, and if your interest conflicts with theirs then they win. Your business has been commandeered."
"Ransomware has been in the news repeatedly over the past few years. This is the insidious malware that will lock your data or device (smartphone or PC) and displays a screen-wide message that demands money from you to release it, which it does by sending you an unlock code."
"Marcus Hutchins, the 23-year-old British security researcher who was credited with stopping the WannaCry outbreak in its tracks by discovering a hidden "kill switch" for the malware, has been arrested by the FBI over his alleged involvement in another malicious software targeting bank accounts."
"Jim Baker served as the FBI's general counsel from 2014 until 2017, and he presided over the the FBI's attempt to force Apple to undermine its cryptography under the rubric of investigating the San Bernadino shooters; he has long been a prominent advocate for mass surveillance, but he has had a change of heart: in a long, detailed essay on Lawfare, Baker explains why he believes that governments should not seek to introduce defects into cryptographic systems."
"A New York Times deep-dive into a facial recognition AI tool sold to law enforcement agencies uncovered that the company has amassed more than three billion images. Those images are scraped from all corners of the internet from social media sites to companies' "About Us" pages. That's way more than the typical police or even FBI database. "
"Dubbed typosquatting, the idea is simple (if devious): A hacker registers a domain that is close enough to a real site, like yourbanknarne.com, and puts up a clone of yourbankname.com. The unsuspecting victim goes to the wrong site by mistake, and enters their personal banking information. In doing so, they have inadvertently handed the digital keys to their account to a hacker. "
"The organisation is a pioneer of the "ransomware as a service" model, whereby it outsources the target selection and attacks to a network of semi-independent "affiliates", providing them with the tools and infrastructure and taking a commission on the ransoms in return.
As well as ransomware, which typically works by encrypting data on infected machines and demanding a payment for providing the decryption key, LockBit copied stolen data and threatened to publish it if the fee was not paid, promising to delete the copies on receipt of a ransom."