MI5 Requests 'Exceptional Access' To Encrypted Messages | Mexico's Economy Ministry Hit by Cyber Attack | China’s Virus Censorship and Propaganda Backlash
MI5’s director general has called on technology companies to find a way to allow spy agencies “exceptional access” to encrypted messages, amid fears they cannot otherwise access such communications. In an ITV interview to be broadcast on Thursday, Sir Andrew Parker says he has found it “increasingly mystifying” that intelligence agencies like his are not able to easily read secret messages of terror suspects they are monitoring. The Guardian
Mexico's economy ministry detected a cyber attack on some of its servers on Sunday but did not consider sensitive information to have been compromised, and beefed up safety measures, it said in a statement. NYT
As the number of coronavirus cases rises, epidemiologists around the world look at maps, flight bookings and population data to estimate the size of the outbreak—and explain why their results are higher than China’s official tally. WSJ
How TikTok became China’s first global app
“I expect there to be increased regulatory pushback on TikTok and ByteDance this year—and it looks like TikTok sees this coming and is taking steps to deal with,” says Fergus Ryan, an analyst with Australian Strategic Policy Institute which regularly analyzes China’s tech giants and propaganda activities.
Marc Faddoul @MarcFaddoulA TikTok novelty: FACE-BASED FITLER BUBBLES The AI-bias techlash seems to have had no impact on newer platforms. Follow a random profile, and TikTok will only recommend people who look almost the same. Let’s do the experiment from a fresh account: 1/6 https://t.co/VAwkh3qNjv
Here's How China Is Hunting Down Coronavirus Critics
"What we did see in general with this outbreak was a brief period inside China when the censorship wasn't as strict and there was more muckraking journalism going on," Fergus Ryan, an analyst at the Australian Strategic Policy Institute (ASPI) who studies Chinese social media told VICE News.
Dutton wants to let ASD spy on Australians
Home Affairs has long argued that changing operational demands require stronger powers, with Department of Home Affairs secretary Michael Pezzullo last year warning of a looming cyber attack “with economy-wide ramifications”. “Earlier distinctions between ‘home’ and ‘abroad’ are breaking down completely as a result of advances in technology, communications and finance… and much more,” he said in a speech to the Australian Strategic Policy Institute. “We are facing the separate and combined challenges of dealing with the ‘gathering storms’… the state’s role in protecting sovereignty and the citizen is being challenged and deconstructed.” Regulations, he said, were “a work in progress, especially with regards to the use of data which avoids the peril of mass surveillance of that populace.”
Why Doesn’t the U.S. Have Its Own Huawei?
When it comes to countering Huawei’s dominance, White House officials have offered a disorganized assortment of options to respond, and often muddled the messaging. In the process, there is one major question that Washington still hasn’t directly confronted: Why doesn’t the United States have its own homegrown competitor?
No, Facebook’s is not telling you everything
Facebook "Download Your Information" feature only gives you part of the picture. Information about advertisers uploading lists with your personal information is limited in time and prevents users from exercising their rights.
Stigma, shame and frustration': cashless welfare card found to do more harm than good
The government’s controversial cashless debit card scheme and other compulsory welfare income management programs are causing more harm than good, a new study has found. Researchers from four universities said in a new report released on Wednesday that they had “uncovered an overwhelming number of negative experiences” stemming from the card, ranging from feelings of “stigma, shame and frustration” to practical issues such as cardholders simply not having enough cash for essential items.
China’s Virus Censorship and Propaganda Draw Backlash
As the number of coronavirus cases rises, epidemiologists around the world look at maps, flight bookings and population data to estimate the size of the outbreak—and explain why their results are higher than China’s official tally.
Protecting the Truth About the Coronavirus in China
Tens of thousands of us are working to save the articles and accounts of COVID-19 before Chinese censors can delete them forever.
(Information about the coronavirus outbreak is not immune from Chinese censors. But more and more citizens are dodging censorship by creating a digital archive of deleted posts. They told us how.)
Research into China’s sovereign digital currency is delayed amid epidemic
China's research into its sovereign digital currency has been delayed from the first quarter due to the outbreak of the coronavirus.
North Korea Is Recycling Mac Malware. That's Not the Worst Part
North Korea Is Recycling Mac Malware. The reality of malware reuse—often known as “living off the land”—is well established. The NSA reportedly reuses malware, as do state-sponsored hackers from China, Russia, North Korea, and elsewhere.
Digital Edits, a Paid Army: Bloomberg Is ‘Destroying Norms’ on Social Media
His campaign is testing the boundaries of what platforms like Twitter and Facebook allow in politics. They’re having trouble coming up with an answer.
Russia Wants to Meddle in Our Election. We’re Helping.
For all the talk since 2016 of foreign election interference and Russian “meddling,” it seems few people really understand the information war and how not to play into the hands of our enemies. Last week is proof.
The 'accidental director' on the front line of the fight for election security
Christopher Krebs, the first director of the Cybersecurity and Infrastructure Security Agency (CISA), is zeroing in on elections ahead of November.
N.S.A. Phone Program Cost $100 Million, but Produced Only Two Unique Leads
A disputed program that allowed the National Security Agency to gain access to logs of Americans’ domestic calls and texts yielded only one significant investigation, according to a newly declassified study.
How Technology Is Changing the Future of Higher Education
Labs test artificial intelligence, virtual reality and other innovations that could improve learning and lower costs for Generation Z and beyond.
Apple may be forced to disclose censorship requests from China
Apple could be forced to disclose details of censorship requests from China and other nations after two major shareholder groups backed a proposal that would force the tech firm to make new human rights commitments.
How schools are using kids' phones to track and surveil them
At least 10 schools across the US have installed radio frequency scanners, which pick up on the Wi-Fi and Bluetooth signals from students' phones and track them with accuracy down to about one meter, or just over three feet, said Nadir Ali, CEO of indoor data tracking company Inpixon.
Removing a GPS tracking device from your car isn’t theft, court rules
Indiana high court: Removing a small unmarked device from your car isn't theft.
After WhatsApp spyware allegations, Indian journalists demand government transparency
While it’s not clear which national or state agencies, if any, could have deployed the spyware, experts interviewed by CPJ said the government’s efforts to investigate WhatsApp’s accusations have been half-hearted at best, while the NSO Group has taken no public steps to remedy the alleged abuse. The incident highlights the lack of transparency around the Indian government's surveillance powers, a concern that has escalated under Prime Minister Narendra Modi and the ruling Bharatiya Janata Party (BJP).
MI5 chief asks tech firms for 'exceptional access' to encrypted messages
MI5’s Director General has called on technology companies to find a way to allow spy agencies “exceptional access” to encrypted messages, amid fears they cannot otherwise access such communications. In an ITV interview to be broadcast on Thursday, Sir Andrew Parker says he has found it “increasingly mystifying” that intelligence agencies like his are not able to easily read secret messages of terror suspects they are monitoring.
Swiss court rules defamatory Facebook likes ‘can be illegal’
The Swiss Federal Court has ruled that Facebook likes and shares can be considered as illegal defamation. The case was hearing a matter from the canton of Zurich says people can in some cases be punished for sharing or liking particular posts on social media, even if they did not create the content themselves.
Chris sorted through the 'blood and gore' on social media. Now he's suing Facebook over PTSD
Social media moderators see the worst the internet serves up — bloody executions, vitriolic hate speech, sexual abuse. But their work takes a heavy toll.
Mexico's Economy Ministry Hit by Cyber Attack
Mexico's economy ministry detected a cyber attack on some of its servers on Sunday but did not consider sensitive information to have been compromised, and beefed up safety measures, it said in a statement.
Gender and Cyber
How a Trans Woman’s Murder Led to an App that Saves Lives
Trans women across Brazil know the dangers of just being themselves—so a Canadian researcher stepped in to help them with an app called Dandara. The app is an on-the-ground safety resource for Brazilian trans women. It features user-generated maps of areas within major Brazilian cities, indicating places where trans women are known to congregate while providing tools to communicate with each other about incidents of violence in real-time.
Google is cracking down on Android apps that track your location in the background
Google is placing new restrictions on which Android apps can track your location in the background, with a new review process that will check whether an app definitely needs access to the data. The changes were announced in a blog post to Android developers earlier this week.
DNS Over HTTPS: The Big Privacy Win Behind This Acronym Soup
Google and Mozilla both recently announced plans to encrypt users’ browsing data when they visit websites with Google Chrome or Mozilla Firefox. The companies are rolling out a technology called DNS over HTTPS in their browsers.
‘Cloud Snooper’ Attack Bypasses Firewall Security Measures
SophosLabs discovered a sophisticated attack that employed a unique combination of techniques to evade detection and that permits the malware to communicate freely with its command and control (C2) servers through a firewall that should, under normal circumstances, prevent precisely that kind of communication from reaching the infected server.
The evolution of the internet and geopolitics
The Atlantic Council
The internet has been a pivotal force behind the growth of the global digital economy and altered the relationship among states, their citizens, and the private sector. These changes have disrupted the geopolitical balance of power and ushered in a new generation of globally-powerful multinational companies. However, new dynamics of conflict are threatening the internet as we know it.
Analyst – Technical
ASPI’s International Cyber Policy Centre has an outstanding opportunity for a talented and passionate technically-focused analyst to join its growing centre. We are looking for a creative and passionate individual who can contribute unique technical skills to work across a range of projects in the centre. This individual may possess skills and experience in one or more of the following areas including malware analysis, reverse-engineering, data analysis and web scraping (for work on online disinformation for example) and/or a deep technical knowledge of critical technologies. The successful candidate will be offered a remuneration package at a level aligned with their demonstrated skills and expertise. This is a contract position for an initial 1 year term with the option of extension. At any one time ASPI has multiple people working at the institute who are on secondments or unpaid leave from the Australian Public Service (APS). Similar arrangements - including secondments - can be negotiated in this instance pending approval from the APS department/agency.
Researcher – Cyber, Technology, Asia-Pacific
ASPI’s International Cyber Policy Centre has an outstanding opportunity for an emerging researcher to join its growing centre and work directly with the ICPC Director. Staff in the centre have diverse backgrounds and are usually involved in several projects at once. We are looking for a team member with a flexible, entrepreneurial approach, who is a self-starter, has the ability to deliver to deadlines and enjoys working in a collaborative team environment. Foreign languages (particularly Asian languages) and social media analysis skills are desirable but not essential. We are looking for a creative and passionate individual who can work collaboratively in a team environment to support the centre’s program of work. This will include working with a variety of centre staff to conduct research on a range of priority projects, on project coordination and administration, working to facilitate international fellowships, supporting public and private events and engaging with key stakeholders.