Warm Southern Breeze

"… there is no such thing as nothing."

Posts Tagged ‘hacking’

Apple Computer To Make “Back Door” For iPhones

Posted by Warm Southern Breeze on Thursday, August 5, 2021

Apple Computer, Apple Juice: Which One’s Better?

So… I just read this story:

Apple unveils plans to scan US iPhones for images of child sex abuse
By Rebecca Klar – 08/05/21 05:22 PM EDT
https://thehill.com/policy/technology/566603-apple-unveils-plans-to-scan-us-iphones-for-images-of-child-sex-abuse

Sounds good, right?

At least, superficially, perhaps.

The second sentence reads in part, “but security researchers and advocates are warning the scanning update — along with one that aims to give parents protective tools in children’s messages — could pose data and security risks beyond the intended purpose.”

But, here’s the creepy part:
“Apple said its method to detect the abusive material is “designed with user privacy in mind.” Instead of scanning images in the cloud, the system performs “on-device matching” using a database of known child sexual abuse material image hashes provided by child safety organizations.”

Did you get that?

“A database of known child sexual abuse material image hashes provided by child safety organizations.”

Now, what follows is a rather simplified version, and quite frankly, it wouldn’t surprise me to know that Law Enforcement authorities are onto that game. But here’s something even more sophisticated: Image hashes.

Here’s a primer on the matter:
https://jenssegers.com/perceptual-image-hashes

It almost does the same thing, albeit with a slight twist – it’s not encrypted.

The technology is called PhotoDNA, was invented by Microsoft, and essentially, works from a known database of child pornographic images, and analyzes them (creates a “hash”) thereby creating a unique digital identifier for each and every image, that is resistant, or impervious to change, such as the elimination of color, or adjustments made using photo editing software/algorithms, including of size, and analyzes each cell/pixel’s intensity gradients, or edges.

But again, it’s based upon ONE premise: An unencrypted file.

Immediately after reading the headline, I saw the flaw.

That flaw is base upon the presumption that customers of Apple’s iCloud service are uploading UNENCRYPTED files.

HOWEVER… PhotoDNA is alleged to work with encryption.
See: https://5rightsfoundation.com/uploads/5rights-briefing-on-e2e-encryption–csam.pdf

In a very simple way, here’s what Read the rest of this entry »

Posted in - Business... None of yours, - Even MORE Uncategorized!, - Read 'em and weep: The Daily News, WTF | Tagged: , , , , , , , , , , , , | Leave a Comment »

New Threats Emerge In 2020

Posted by Warm Southern Breeze on Monday, February 10, 2020

When Russia – our sworn enemy – decided that they wanted to influence the election, to cause Donald Trump to win… I mean… what do you say!?!

If it had been Hillary Clinton, I would’ve been against it.

But it wasn’t.

But the thing is, is that, the Russians have achieved what they wanted to do – and that is to get the President elected. And when you acknowledge that fact, you have to come to the conclusion that, for that reason, he is an illegitimate President regardless of how many Electoral College votes he got. And the Electoral College should be abolished. Because it was designed for a country 250 years ago.

And the problem with that – not bashing the Constitution – but the idea is, “it’s time for a change,” because right now, when you can communicate with someone on the opposite side of the globe, when you can talk to someone in Hong Kong, when you can talk to someone in London, England, when you can talk to someone in Sydney, Australia, when you can talk with someone in Banff, Canada, when you can talk with someone in Switzerland, and in Mumbai, India, SIMULTANEOUSLY, and have a conference call, you KNOW that worldwide global instant communications has revolutionized the way that we are able to think about things. That is a transformation of UNPARALLELED proportion! When one person can have a voice and speak around the world – globally, in an instant – our forefathers never dreamed of anything like that. They certainly didn’t dream of an automobile. And they could not have dreamt of satellites. They certainly couldn’t have dreamt of rockets. They didn’t even have electricity, for heaven’s sake! And they came up with this idea of the Electoral College.

Why?

Because communications was not instant n 1776, or in 1787 when the Constitutional Convention was established. They had to wait WEEKS, or even MONTHS, before people could be able to hear about what was going on. And now, we can have it in an instant. You have it on your cell phone.

Look, the Communist Chinese government has now written a Social Media app called Read the rest of this entry »

Posted in - Did they REALLY say that?, - Lost In Space: TOTALLY Discombobulated, - My Hometown is the sweetest place I know | Tagged: , , , , , , , , , , , , , , , , | Leave a Comment »

Russians Hacked Into Election Software

Posted by Warm Southern Breeze on Tuesday, June 13, 2017

The ONLY FAILSAFE means to electronically count ballots is by using an Optical Scanning system. Votes can be counted manually, and Voter Intent can be determined by examining ballots. I write from experience as an Election Official in numerous elections. Can any electronic device be hacked? Yes. But physical ballots are the “backup” which can be examined to check against any suspicious machine, or software.

—//—

Russians Hacked Into Election Software, Databases In 39 States

The scope and sophistication so concerned Obama administration officials that they complained directly to Moscow over a modern-day “red phone.”

By Michael Riley and Jordan Robertson, Bloomberg News

WASHINGTON – Russia’s cyberattack on the U.S. electoral system before Donald Trump’s election was far more widespread than has been publicly revealed, including incursions into voter databases and software systems in almost twice as many states as previously reported.

In Illinois, investigators found evidence that cyber intruders tried to delete or alter voter data. The hackers accessed software designed to be used by poll workers on Election Day, and in at least one state accessed a campaign finance database. Details of the wave of attacks, in the summer and fall of 2016, were provided by three people with direct knowledge of the U.S. investigation into the matter. In all, the Russian hackers hit systems in a total of 39 states, one of them said.

The scope and sophistication so concerned Obama administration officials that they took an unprecedented step — complaining directly to Moscow over a modern-day “red phone.” In October, two of the people said, the White House contacted the Kremlin on the back channel to offer detailed documents of what it said was Russia’s role in election meddling and to warn that the attacks risked setting off a broader conflict.

The new details, buttressed by a classified National Security Agency document recently disclosed by the Intercept, show the scope of alleged hacking that federal investigators are scrutinizing as they look into whether Trump campaign officials may have colluded in the efforts. But they also paint a worrisome picture for future elections: The newest portrayal of potentially deep vulnerabilities in the U.S.’s patchwork of voting technologies comes less than a week after former FBI Director James Comey warned Congress that Moscow isn’t done meddling.

“They’re coming after America. They will be back.”

– Former FBI Director James Comey testifying to the Senate Intelligence Committee investigating Russian interference in the 2016 Presidential election.

A spokeswoman for the Federal Bureau of Investigation in Washington declined to comment on the agency’s probe.

Russian officials have publicly denied any role in cyberattacks connected to the U.S. elections, including a massive “spear phishing” effort that compromised Hillary Clinton’s campaign and the Democratic National Committee, among hundreds of other groups. President Vladimir Putin said in recent comments to reporters that criminals inside the country could have been involved without having been sanctioned by the Russian government.

One of the mysteries about the 2016 presidential election is why Russian intelligence, after gaining access to state and local systems, didn’t try to disrupt the vote. One possibility is that the American warning was effective. Another former senior U.S. official, who asked for anonymity to discuss the classified U.S. probe into pre-election hacking, said a more likely explanation is that several months of hacking failed to give the attackers the access they needed to master America’s disparate voting systems spread across more than 7,000 local jurisdictions.

Such operations need not change votes to be effective. In fact, the Obama administration believed that the Russians were possibly preparing to delete voter registration information or slow vote tallying in order to undermine confidence in the election. That effort went far beyond the carefully timed release of private communications by individuals and parties.

One former senior U.S. official expressed concern that the Russians now have three years to build on their knowledge of U.S. voting systems before the next presidential election, and there is every reason to believe they will use what they have learned in future attacks.

As the first test of a communication system designed to de-escalate cyber conflict between the two countries, the cyber “red phone” — not a phone, in fact, but a secure messaging channel for sending urgent messages and documents — didn’t quite work as the White House had hoped. NBC News first reported that use of the red phone by the White House last December.

The White House provided evidence gathered on Russia’s hacking efforts and reasons why the U.S. considered it dangerously aggressive. Russia responded by asking for more information and providing assurances that it would look into the matter even as the hacking continued, according to the two people familiar with the response.

“Last year, as we detected intrusions into websites managed by election officials around the country, the administration worked relentlessly to protect our election infrastructure,” said Eric Schultz, a spokesman for former President Barack Obama. “Given that our election systems are so decentralized, that effort meant working with Democratic and Republican election administrators from all across the country to bolster their cyber defenses.”

Illinois, which was among the states that gave the FBI and the Department of Homeland Security almost full access to investigate its systems, provides a window into the hackers’ successes and failures.

In early July 2016, a contractor who works two or three days a week at the state board of elections detected unauthorized data leaving the network, according to Ken Menzel, general counsel for the Illinois board of elections. The hackers had gained access to Read the rest of this entry »

Posted in - Did they REALLY say that?, - My Hometown is the sweetest place I know, - Politics... that "dirty" little "game" that first begins in the home., - Read 'em and weep: The Daily News | Tagged: , , , , , , , , , , , , , , , , , | Leave a Comment »

Russian Meddling in U.S. Presidential Election: How Should Congress Proceed?

Posted by Warm Southern Breeze on Thursday, March 2, 2017

There is clear, unambiguous evidence that “Russian efforts to influence the 2016 US presidential election represent the most recent expression of Moscow’s longstanding desire to undermine the US-led liberal democratic order, but these activities demonstrated a significant escalation in directness, level of activity, and scope of effort compared to previous operations.”

Assessing Russian Activities and Intentions in Recent US Elections” is a declassified version of a highly classified assessment that has been provided to the President and to recipients approved by the President.”

A header appears upon EVERY page and states: “This report is a declassified version of a highly classified assessment; its conclusions are identical to those in the highly classified assessment but this version does not include the full supporting information on key elements of the influence campaign.”

Several “Key Judgments” are made in the report issued by the Office of the Director of National Intelligence which is dated 6 January 2017.

Among them:
We assess Russian President Vladimir Putin ordered an influence campaign in 2016 aimed at the US presidential election. Russia’s goals were to undermine public faith in the US democratic process, denigrate Secretary Clinton, and harm her electability and potential presidency. We further assess Putin and the Russian Government developed a clear preference for President elect-Trump. We have high confidence in these judgments.

• We also assess Putin and the Russian Government aspired to help President-elect Trump’s election chances when possible by discrediting Secretary Clinton and publicly contrasting her unfavorably to him. All three agencies agree with this judgment. CIA and FBI have high confidence in this judgment; NSA has moderate confidence.

• Moscow’s approach evolved over the course of the campaign based on Russia’s understanding of the electoral prospects of the two main candidates. When it appeared to Moscow that Secretary Clinton was likely to win the election, the Russian influence campaign began to focus more on undermining her future presidency.

• Further information has come to light since Election Day that, when combined with Russian behavior since early November 2016, increases our confidence in our assessments of Russian motivations and goals.

Moscow’s influence campaign followed a Russian messaging strategy that blends covert intelligence operations — such as cyber activity — with overt efforts by Russian Government agencies, state-funded media, third-party intermediaries, and paid social media users or “trolls.” Russia, like its Soviet predecessor, has a history of conducting covert influence campaigns focused on US presidential elections that have used intelligence officers and agents and press placements to disparage candidates perceived as hostile to the Kremlin.

• Russia’s intelligence services conducted cyber operations against targets associated with the 2016 US presidential election, including targets associated with both major US political parties.

• We assess with high confidence that Russian military intelligence (General Staff Main Intelligence Directorate or GRU) used the Guccifer 2.0 persona and DCLeaks.com to release US victim data obtained in cyber operations publicly and in exclusives to media outlets and relayed material to WikiLeaks.

• Russian intelligence obtained and maintained access to elements of multiple US state or local electoral boards. DHS assess es that the types of systems Russian actors targeted or compromised were not involved in vote tallying.

• Russia’s state-run propaganda machine contributed to the influence campaign by serving as a platform for Kremlin messaging to Russian and international audiences.

We assess Moscow will apply lessons learned from its Putin-ordered campaign aimed at the US presidential election to future influence efforts worldwide, including against US allies and their election processes.

—//—

Obama Administration Rushed to Preserve Intelligence of Russian Election Hacking

 President Obama in December. Some in his administration feared that intelligence about Russian interference in the 2016 election could be covered up or destroyed. Credit Al Drago/The New York Times

President Obama in December. Some in his administration feared that intelligence about Russian interference in the 2016 election could be covered up or destroyed. Credit Al Drago/The New York Times

By MATTHEW ROSENBERG, ADAM GOLDMAN and MICHAEL S. SCHMIDT

MARCH 1, 2017

WASHINGTON — In the Obama administration’s last days, some White House officials scrambled to spread information about Russian efforts to undermine the presidential election — and about possible contacts between associates of President-elect Donald J. Trump and Russians — across the government. Former American officials say they had two aims: to ensure that such meddling isn’t duplicated in future American or European elections, and to leave a clear trail of intelligence for government investigators.

American allies, including the British and the Dutch, had provided information describing meetings in European cities between Russian officials — and others close to Russia’s president, Vladimir V. Putin — and associates of President-elect Trump, according to three former American officials who requested anonymity in discussing classified intelligence. Separately, American intelligence agencies had intercepted communications of Russian officials, some of them within the Kremlin, discussing contacts with Trump associates.

Then and now, Mr. Trump has denied that his campaign had any contact with Russian officials, and at one point he openly suggested that American spy agencies had cooked up intelligence suggesting that the Russian government had tried to meddle in the presidential election. Mr. Trump has accused the Obama administration of hyping the Russia story line as a way to discredit his new administration.

At the Obama White House, Mr. Trump’s statements stoked fears among some that intelligence could be covered up or destroyed — or its sources exposed — once power changed hands. What followed was a push to preserve the intelligence that underscored the deep anxiety with which the White House and American intelligence agencies had come to view the threat from Moscow.

It also reflected the suspicion among many in the Obama White House that the Trump campaign might have colluded with Russia on election email hacks — a suspicion that American officials say has not been confirmed. Former senior Obama administration officials said that none of the efforts were directed by Mr. Obama.

 President Vladimir V. Putin of Russia. Credit Alexei Nikolsky/Sputnik


President Vladimir V. Putin of Russia. Credit Alexei Nikolsky/Sputnik

Sean Spicer, the Trump White House spokesman, said, Read the rest of this entry »

Posted in - Lost In Space: TOTALLY Discombobulated, - My Hometown is the sweetest place I know, - Politics... that "dirty" little "game" that first begins in the home., - Read 'em and weep: The Daily News | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Original Russian Tea Recipe

Posted by Warm Southern Breeze on Tuesday, December 13, 2016

Holiday season is again upon us, and many folks – particularly Southerners – are familiar with a tasty warm beverage known as “Russian Tea.”

Exactly how and where the recipe developed, and how it came by that name is somewhat unclear, but “the font of all knowledge” – and I sarcastically refer to Wikipedia – cites an article entitled “Russian Tea is Favorite Recipe in the South” by Cecily Brownstone in the November 27, 1976 issue of Kentucky New Era newspaper in Hopkinsville.

Interestingly, the story which is perhaps the newspaper’s most renown is the August 1955 Kelly-Hopkinsville Alien Encounter, which may also be known as “Kelly Green Men Case,” or the “Hopkinsville Goblins Case.” It’s a precursor of sorts to a “Close Encounters of the Third Kind” type story in which five adults and seven children reported to Hopkinsville Police that “little men with big heads and long arms,” presumably alien creatures, were attacking their farm house, and that they’d held them off with gunfire “for nearly four hours.” It all started around 7PM when one of the men went out of the house to get a bucket of water, and lasted until 0330 – that’s 3:30AM.

Who knows? Maybe they’d had too much Russian Tea. Anyway, I don’t think you’ll be doing any hallucinating, or discharging any firearms after drinking this, so it’s pretty tame stuff… unless you start adding Kentucky Bourbon or other liquor to it.

Anyway…

Spiced Tea infusion recipe in Joy of Cooking, p40

Spiced Tea infusion recipe in Joy of Cooking, p40

However, as seen in the image herein, the Read the rest of this entry »

Posted in - Did they REALLY say that?, - Even MORE Uncategorized!, - Lost In Space: TOTALLY Discombobulated | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

China hacks Army’s Redstone Arsenal computers in Huntsville, Alabama, steals military secrets

Posted by Warm Southern Breeze on Friday, May 3, 2013

Among defense contractors, QinetiQ North America (QQ/) is known for spy-world connections and an eye- popping product line. Its contributions to national security include secret satellites, drones, and software used by U.S. special forces in Afghanistan and the Middle East.

Former CIA Director George Tenet was a director of the company from 2006 to 2008 and former Pentagon spy chief Stephen Cambone headed a major division. Its U.K. parent was created as a spinoff of a government weapons laboratory that inspired Q’s lab in Ian Fleming’s James Bond thrillers, a connection QinetiQ (pronounced kin-EH-tic) still touts.

QinetiQ’s espionage expertise didn’t keep Chinese cyber- spies from outwitting the company. In a three-year operation, hackers linked to China’s military infiltrated QinetiQ’s computers and compromised most if not all of the company’s research. At one point, they logged into the company’s network by taking advantage of a security flaw identified months earlier and never fixed.

“We found traces of the intruders in Read the rest of this entry »

Posted in - Business... None of yours, - My Hometown is the sweetest place I know, - Politics... that "dirty" little "game" that first begins in the home., - Read 'em and weep: The Daily News | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

 
%d bloggers like this: