Florida man enters encrypted wars
Only three months of the promised repression of the Trump administration on immigration to the United States, migration and customs execution now has a $ 30 million contract with Palantir to build a “almost real -time” monitoring platform called immigration, which can track information about spontaneous people (decide to leave us). Meanwhile, the Department of Security of the Homeland is sending offensive emails to people with a temporary legal status to leave the United States. It is unclear who has actually sent messages, given that a number of people who are American -born citizens have reported them.
The US Cyber Security and Infrastructure Security Agency seems to be briefly prepared this week to cancel funds for the important software vulnerability trace project known as the CVE program. The CISA was finally funded by the budget, but some members of the CV program board intend to turn the project into an independent nonprofit.
A petition for the Trump administration’s Houthi Signal Chat Group chats the details of the actions that the federal departments have taken – and did not do – to keep messages in any record.
The Wired look at the most dangerous hackers you have never heard of, diverted to the depth of the ruthless and two -way Russian Gamaredon diving. China’s Triple China Triple Text Framework; Dangerous members of the Fallen Black Black Black Black Black Black Iran’s critical infrastructure hackers known as Cyberv3ngers. Encrypted hackers with North Korean trade responsible for the amazing number of enormously. And the infamous, long -standing Chinese and sponsored government -backed rice.
Most importantly, a suspicious 4chan hack may have destructive consequences for the controversial image page. Massive Blue Artificial Intelligence Helps the police to produce artificial intelligence social media robots to be sympathetic figures and talk to favorite people. And the New Jersey prosecutor is complaining about Discord and claims that the platform does not have enough protection to protect children under the age of 13 from sexual hunters and harmful content.
But wait, there are more things! Every week, we collect security news and privacy that we have not covered deeply. Click on the titles to read the full stories and be safe there.
The draft bill in the state of Florida requires social media companies to provide law enforcement with encryption support so that the police can access the user’s account. The bill unanimously progressed from the committee this week and is now going to vote for the Senate. If approved, the use of social media by the minors’ bill, backed by the Belize Ingglia state senator, “social media operating systems need to summon a mechanism for decryption of end -to -end encryption during the law enforcement.” The bill can also ban the disappeared messages in children’s accounts designed for children and require social media companies to create a mechanism for parents or supervisors to access children’s accounts. Experts have long warned that the backward encryption all makes everyone use less security, including those intended to help them. However, the waves of attacks on encryption have been repeatedly emerged over the years, including the recent trend in the European Union and the United Kingdom.
A Judge of Nevada district this week said the action of “tower waste”, where the law enforces large quantities of personal callers from the cell towers, violates the fourth amendment and is therefore illegal. Cellular towers collect large quantities of information about users, including telephone numbers and telephone locations, so when the police request data from a tower over a specific time period, they often receive information on thousands of units or more. Despite this week’s decision, Judge Miranda M. Two said the law enforcement could still use the evidence they collected in their case through a tower garbage.
China claimed this week that the US National Security Agency carried out “advanced” cyber attacks against critical industries in February in February. The law enforcement from the northeast of Harbin, the three alleged factors in the NSA – Catherine A. Wilson, Robert Jay Snowing and Stephen W. Johnson – have been prosecuted on the list, claiming that the University of California and Virginia Technique participated in the attacks. A spokesman for the ministry, a spokesman for the ministry, said: “We call on the United States to apply the cyber security and … Ministry spokesman Lynn Jian, during a news justification on numerous issues, said the US government is often referred to as Chinese -backed hacks. There is tension between the two countries, including the Trump administration’s trade war.
CBP uses several artificial information tools to scan social media and identify people’s favorite people online, according to agency information and marketing materials reviewed by 404 media. The CBP released information on this week’s operating systems in parallel with the US Department of Security Declaration that “it is screening aliens’ social media activity for anti -Judaism.” The statement also said that US citizenship and immigration services are conducting “anti -Jewish” social media search. CBP told 404 Media in an email that “no tools are used to review or process the travel plan”, referring to Dataminr and Onyx, but not beyond. These operating systems use artificial intelligence to separate a lot of data and can be used to develop people who may violate US immigration laws.