Cyber Attacks, Threats, and Vulnerabilities
Experts Reiterate Cybersecurity Warnings for 2020 Election (Government Technology) Cybersecurity experts warned that hacking had reached crisis level last year, and based on what they've seen in early 2020, a similar warning has now been issued with a note that hackers will likely focus on elections.
Shift to digital census raises fear of Iowa-like breakdown (Federal Times) A government watchdog agency, the Census Bureau's inspector general and some lawmakers have grown concerned about whether the systems are ready for prime time.
Chinese-linked hacking group using Windows backdoors to go after gambling industry targets (CyberScoop) A nation-state actor that has links with Chinese hackers is exploiting two new backdoors to run a cyber-espionage campaign against gambling entities in Southeast Asia, according to Trend Micro research.
Operation DRBControl: Uncovering a Cyberespionage Campaign Targeting Gambling Companies in Southeast Asia (Trend Micro) The DRBControl campaign attacks its targets using a variety of malware and techniques that coincide with those used in other known cyberespionage campaigns.
Russia sees jump in cyber theft from bank accounts: central bank (Reuters) Russia's central bank last year recorded an increase in online theft that s...
Iran-linked hackers use VPN exploits in far-flung spying campaign (CyberScoop) Iranian hackers are using unpatched vulnerabilities in VPNs to spy on companies in the aviation, oil and gas, and telecommunications sectors.
2020 Tax Season Attacks: Abusing Legitimate Applications and Websites (Proofpoint US) There’s an old saying that only two things are certain: death and taxes. And in 2020 you can add tax scams to that list. With April 15 quickly approaching, people in the United States are starting to think about their taxes and attackers are as well. Proofpoint researchers have already seen attackers aggressively jumping into tax season. So far we’ve seen attacks fall into two categories:
FAQ on the Security Analysis of Voatz - Internet Policy Research Initiative at MIT (Internet Policy Research Initiative at MIT) Written by Michael Specter, James Koppel, and Daniel Weitzner The below is an FAQ about...
Claroty discovers new vulnerability related to Industroyer malware (Claroty) Claroty has discovered a vulnerability (CVE-2019-19279) in the Siemens Digsi 4 protocol.
Hundreds of Millions of PC Components Still Have Hackable Firmware (Wired) The lax security of supply chain firmware has been a known concern for years—with precious little progress being made.
Windows, Linux Devices at Risk Due to Unsigned Peripheral Firmware (BleepingComputer) Researchers have discovered multiple instances of unsigned firmware in computer peripherals that can be used by malicious actors to attack laptops and servers running Windows and Linux.
Five years after the Equation Group HDD hacks, firmware security still sucks (ZDNet) Device manufacturers are not forcing driver signatures at all times.
DoppelPaymer: New, Trendy and Dangerous (Security Boulevard) DoppelPaymer initially began to add victims to its ever-growing list in June 2019. For a relative newcomer to the ransomware scene, it has made a name for
DHS says ransomware hit US gas pipeline operator (ZDNet) Operations halted for two days at unnamed US natural gas compression facility.
US Govt Warns of Ransomware Attacks on Pipeline Operations (BleepingComputer) The Cybersecurity and Infrastructure Security Agency (CISA) today alerted organizations across all critical U.S. infrastructure sectors about a recent ransomware attack that affected a natural gas compression facility.
Ransomware Impacting Pipeline Operations (CISA) Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) framework. See the MITRE ATT&CK for Enterprise and ATT&CK for Industrial Control Systems (ICS) frameworks for all referenced threat actor techniques and mitigations.
Interpeak IPnet TCP/IP Stack (Update C) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low skill level to exploit/public exploits are available
Vendors: ENEA, Green Hills Software, ITRON, IP Infusion, Wind River
Equipment: OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River
Vulnerabilities: Stack-based Buffer Overflow, Heap-based Buffer Overflow, Integer Underflow, Improper Restriction of Operations within the Bounds of a Memory Buffer, Race Condition, Argument Injection, Null Pointer Dereference
Honeywell INNCOM INNControl 3 (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 6.6
ATTENTION: Low skill level to exploit
Equipment: INNCOM INNControl 3
Vulnerability: Improper Privilege Management
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to escalate user privileges within the INNControl application.
GE Ultrasound products (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 6.8
ATTENTION: Low skill level to exploit
Equipment: Ultrasound Products
Vulnerability: Protection Mechanism Failure
Spacelabs Xhibit Telemetry Receiver (XTR) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/Low skill level to exploit/Public exploits known
Equipment: Xhibit Telemetry Receiver
Vulnerability: Improper Input Validation
Emerson OpenEnterprise (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 8.1
ATTENTION: Exploitable remotely
Equipment: OpenEnterprise SCADA Server
Vulnerability: Heap-based Buffer Overflow
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to execute code on an OpenEnterprise SCADA Server.
FC Barcelona Suffers Likely Credential-Stuffing Attack on Twitter (Threatpost) OurMine took over the Spanish powerhouse soccer team's Twitter account.
Many Chrome Extensions Are Stealing Your Personal Information. Here's How to Tell if You're at Risk (Inc.com) Google has removed 500 extensions from the Chrome Store. Now you should remove them from your browser.
IOTA shuts down network temporarily to fight wallet hacker (Naked Security) Popular cryptocurrency IOTA has temporarily shut down its entire network after a hacker stole funds from ten of its highest-value users.
Council returns to using pen and paper after cyberattack (Naked Security) Ten days after a suspected ransomware attack, residents of the English borough of Redcar and Cleveland must be starting to wonder when their Council’s IT systems will return.
Security Patches, Mitigations, and Software Updates
Ring makes two-factor sign-in mandatory for its video doorbells, security cameras (CNET) The Amazon-owned maker of smart doorbells says it's tightening privacy and security.
Microsoft's February Security Patches Bring Lots of Problems (Redmondmag) Microsoft's February security updates came with plenty of technical bumps.
Spacelabs Mitigation Plan for BlueKeep Vulnerability (ISSSource) Spacelabs recommends updating to the latest release to mitigate an improper input validation vulnerability in its Xhibit Telemetry Receiver, according to a report with CISA.
Google security boffin bemoans Android tweaks (TelecomTV) Samsung alterations leave A50 smartphone more vulnerable to hackersExpert implies that Samsung is not the only offenderSales of devices with hardware security …
Kubernetes adoption & market share skyrockets | StackRox · StackRox: Cloud-Native, Container, and Kubernetes Security (StackRox) Kubernetes adoption has grown by 50% from 12 months ago, reaching 87% penetration. See more stats from the State of Container and Kubernetes Security Report
2020 Webroot Threat Report: Phishing Attempts Grew by 640% Last Year (PR Newswire) OpenText™ (NASDAQ: OTEX) (TSX: OTEX) today issued the 2020 Webroot Threat Report, highlighting not only the agility and innovation of cybercriminals...
37.3% of Vulnerabilities in 2019 Had Available Exploit Code or a Proof of Concept (Risk Based Security) Today we released our 2019 Year End Vulnerability QuickView Report which encompasses the trends occurring within the computer vulnerability disclosure landscape. Our VulnDB team aggregated 22,316 newly-disclosed vulnerabilities during 2019, finding that 37.26% had available exploit code or a Proof o
Akamai Security Research: APIs Are Now Target of Choice for Cybercriminals Attacking Financial Services Organizations (Akamai) Akamai Technologies, Inc. (NASDAQ: AKAM) today published the Akamai 2020 State of the Internet / Security: Financial Services – Hostile Takeover Attempts report.
Axiomatics Presents Data Security Trends Emerging in 2020 (PRWeb) Axiomatics, the leader in externalized, fine-grained dynamic authorization, today released its annual trends that are now developing in the data security landsca
Spikes in High-risk Vulnerabilities and Public Cloud-based Attacks Dominate Threat Landscape, Imperva Researchers Find with New Cyber Threat Index (Imperva) New threat landscape report highlights latest trends around vulnerabilities, bugs, spam bots and cloud-based attacks, as well as at-risk industries and regions REDWOOD SHORES, Calif. – February 19, 2020 – Imperva, Inc., the cybersecurity leader championing the fight to secure data and applications wherever they reside, today launched the Cyber Threat Index, a monthly report …
Yubico and Ponemon Institute Release the 2020 State of Password and Authentication Security Behaviors Report (BusinessWire) Yubico, the leading provider of hardware authentication security keys, today announced results of the company’s second annual State of Password and Authentication...
2020 Password and Authentication Security Behaviors Report (Yubico) The Ponemon Institute surveyed 2,507 IT and IT security practitioners around the globe regarding password and authentication behaviors. Download this report and learn.
Ring and Nest helped normalize American surveillance and turned us into a nation of voyeurs (Washington Post) For all the worries about hacking, owners of Internet-connected cameras say they love watching people silently from afar — often their own family members
Dell sells RSA to consortium led by Symphony Technology Group for over $2B (TechCrunch) Dell Technologies announced today that it was selling legacy security firm RSA for $2.075 billion to a consortium of investors led by Symphony Technology Group. Other investors include Ontario Teachers’ Pension Plan Board and AlpInvest Partners. RSA came to Dell when it bought EMC for $67 billion i…
It’s Official: Dell To Sell RSA Security To STG Partners For $2.08 Billion (CRN) Dell Technologies has agreed to sell RSA Security to private equity firm Symphony Technology Group (STG) less than four years after acquiring the encryption pioneer.
Huntress Secures $18M Investment Led By ForgePoint Capital (Globe Newswire) New funding will expand operations and allow for further research and development to address security challenges aimed at MSP and reseller channel.
Insight Partners Backs SentinalOne in $200 Million Investment (CTECH) The month-long Israeli investment spree of New York-based venture capital and private equity firm Insight Partners continues
Lumu Emerges From Stealth Mode At RSAC To Pinpoint Compromises And Ill (PRWeb) Lumu, a cybersecurity vendor focused on helping organizations measure compromise in real-time, today announced that it has come out of stealth mode and for the fir
Hitwise Shuts Down Less Than A Month After Jumpshot Closes Shop (AdExchanger) It’s a rough time to be in the clickstream data analytics biz. On Tuesday, Connexity-owned Hitwise announced that it would cease US operations. The closure is “due to events outside of our control,” Hitwise said on its homepage. “This is a very sad time for us at Hitwise after 20 years of operations providing first-to-market... Continue reading »
Despite major competitors abroad, Phronesis strives to make India a self-sufficient in cyber capabilities (TechSprouts) Amongst all these giants, Phronesis an Indian origin company has been making it big overseas giving Indian cyber capabilities a new edge.
The messy, secretive reality behind OpenAI’s bid to save the world (MIT Technology Review) The AI moonshot was founded in the spirit of transparency. This is the inside story of how competitive pressure eroded that idealism.
LogRhythm Selects Keeper as a Technology Alliance Partner (PR Newswire) Keeper Security, provider of the leading cybersecurity platform for preventing password-related data breaches and cyberthreats, and LogRhythm,...
SIEM Leader Exabeam Achieves Record Momentum and Growth, Moves to Expanded HQ (BusinessWire) Exabeam today announced record growth in 2019.
AlgoSec Celebrates Record Quarter in Q4 2019 and Another Record Year of Strong Growth and Profitability in 2019 (Globe Newswire) Leader in network security management solutions reports strong year-over-year product revenue growth of 43% in Q4 2019 and 26% in full year 2019
Lares Continues Global Expansion to Meet Growing International Demand for Trusted Cybersecurity Solutions (PR Newswire) Lares, a global leader in security assessment, red teaming, penetration testing, application security and security program development, today...
WhiteHat Security Names Chris Leffel Vice President of Product Management (BusinessWire) WhiteHat Security today announced the appointment of Chris Leffel as the new vice president of Product Management.
LogicMonitor Expands Executive Team to Fuel Next Stage of Growth (Yahoo) LogicMonitor, the leading provider of infrastructure monitoring and intelligence across both on-premises and cloud, today announced the appointment of two key executives to its leadership team. Yvonne Schroeder is joining the company as General Counsel and Todd Riesterer is its new Chief People Officer
US Navy Vice Admiral Jan E. Tighe (Ret.) joins the RangeForce Advisory Board (EIN News) Adm. Tighe brings 30 Years of Cybersecurity experience, including Commander of U.S. Fleet Cyber Command, to RangeForce’s Advisory Board
Products, Services, and Solutions
Odo Security Announces Zero Trust Privileged Access Management and Scales US Operations (Globe Newswire) Delivers secure access to self-hosted resources across cloud, hybrid-cloud and on-premise environments
Axonius Expands Cybersecurity Asset Management Platform with Cloud Com (PRWeb) Axonius, the cybersecurity asset management company, today announced the launch of Cloud Asset Compliance, leveraging data aggregated from public cloud provider
Untangle Releases NG Firewall 15.0 to Keep SMB Assets Safe from Today's Evolving Threats (PR Newswire) Untangle® Inc., a leader in comprehensive network security for small-to-medium businesses (SMBs) and distributed enterprises, today announced...
New Offering From Breach Clarity Gives Financial Institutions Hyper-Pe (PRWeb) Fraud prevention and detection technology firm Breach Clarity, which analyzes and scores every publicly reported U.S. data breach based on more than 1,000
OPSWAT Issues Its First 2,000 Certifications To Cybersecurity Professionals To Help Close The Skills Gap In The Critical Infrastructure Protection Market (PRWeb) OPSWAT, a leader in critical infrastructure protection, today announced that more than 2,000 certifications have been issued to current and aspiring cybers
Fortinet Unveils New FortiGate 1800F to Enable High Performance and Dynamic Internal Segmentation (Fortinet) FortiGate 1800F is Powered by NP7, Fortinet’s New Seventh Generation Network Processor Designed to Accelerate Security Performance in the Data Center
Fortinet Introduces Over 350 New Features to its Security Fabric Platform (Fortinet) FortiOS 6.4 Broadens the Fortinet Security Fabric, Enables Additional Integration and Automation
Essence SigmaDots Fills Market Gap for Robust IoT Security - Builds Complete End-to-end IoT Cyber Protection (PR Newswire) Essence SigmaDots, the expert in IoT cybersecurity, has developed a comprehensive cybersecurity solution that harnesses the power of...
KnowBe4 Launches Season Two of Award-Winning, Network-Quality Security Awareness Training Series (PR Newswire) KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, today announced it will launch season...
Veeam launch of new data protection suite 'biggest ever' (Data Center News) This is the biggest release in the history of Veeam, creating the simplest solution for hybrid-cloud environments.
ReversingLabs Releases First Threat Intelligence Platform with Explainable Machine Learning to Automate Incident Response Processes with Verified Results (Globe Newswire) Advances to ReversingLabs Titanium Platform Deliver Transparent and Trusted Malware Insights that Address Security Skills Gap
Bastille Announces First Solution to Detect and Locate the Millions of Bluetooth Low Energy Devices Subject To The New SweynTooth Vulnerability (Yahoo) Bastille, the leader in enterprise threat detection through software-defined radio, today announced that Bastille Enterprise can see all the SweynTooth-vulnerable Bluetooth Low Energy devices within an Enterprise.
BlueVoyant Provides Managed Detection and Response for Microsoft Defender Advanced Threat Protection (PR Newswire) BlueVoyant, a global analytics-driven cybersecurity firm, today announced the availability of its Managed Detection and Response (MDR) Service...
Cyware Labs Enhances Suite of Cyber Fusion Solutions with “The Human Element” (BusinessWire) Cyware’s 2.0 suite of cyber fusion products enables organizations to detect, analyze, and act on security threats.
Cisco Systems, Fortinet, Palo Alto Networks and SonicWall are First Four Security Vendors to Achieve NetSecOPEN-Certified Performance Results (PR Newswire) NetSecOPEN, the first industry organization focused on the creation of open, transparent network security performance testing standards, today...
Trustwave Unveils Cloud Security Services For Palo Alto Networks Prisma Cloud (Trustwave) Trustwave unveiled a new portfolio of consulting and managed security services for Palo Alto Networks Prisma Cloud
Technologies, Techniques, and Standards
Byos Cautions RSA Conference 2020 Attendees, Travelers and General Public to “Dirty Half-Dozen” Public Wi-Fi Risks (BusinessWire) Byos Cautions RSA Conference 2020 Attendees, Travelers and General Public to “Dirty Half-Dozen” Public Wi-Fi Risks
New guidance to protect journalists from online abuse calls for 'culture of safety' in newsroom (Press Gazette) Journalists who are targeted by online harassment should be empowered to report and share abuse aimed at “silencing them and discrediting their work”, the International Press Institute has said.
Accellera Forms Functional Safety Working Group to Standardize Data for Interoperability & Traceability in the Functional Safety Lifecycle (Globe Newswire) Standard will target the capture and propagation of functional safety intent across different safety operations and work products
Design and Innovation
Another Step in Testing ElectionGuard - Microsoft on the Issues (Microsoft on the Issues) As voters cast ballots for Wisconsin Supreme Court candidates, ElectionGuard will provide an encrypted digital tally that will enable voters to confirm their votes have been counted and not altered. It's one step in a careful process to get ElectionGuard right before it’s used more broadly across the country.
AI filter launched to block Twitter cyberflashing (Naked Security) A small but determined group of Twitter users think it is a good idea to direct message (DM) pictures of male genitals to complete strangers.
Introduction and Application of Model Hacking (McAfee Blogs) Catherine Huang, Ph.D., and Shivangee Trivedi contributed to this blog. The term “Adversarial Machine Learning” (AML) is a mouthful! The term describes a
Model Hacking ADAS to Pave Safer Roads for Autonomous Vehicles (McAfee Blogs) The last several years have been fascinating for those of us who have been eagerly observing the steady move towards autonomous driving. While
Research and Development
Mixed-signal hardware security thwarts powerful electromagnetic attacks (EurekAlert!) A Purdue University team developed technology to use mixed-signal circuits to embed critical information that is suppressed at a lower level.
Strategic cyber-leaders of the future rise to the challenge (SC Magazine) Increasingly tech needs to be coupled with an ability to see the big picture, strategise and articulate problems and potential solutions to policy makers - which is where the Cyber 9/12 Challenge comes in.
Legislation, Policy, and Regulation
Cyber Deterrence Is Dead. Long Live Cyber Deterrence! (Council on Foreign Relations) Although the concept of cyber deterrence has fallen out of fashion in academic literature in recent years, it is being remolded in emerging approaches to national security.
EU Fights For ‘Purpose’ in Grand Plan for Tech, AI Rules (Bloomberg) Bloc on Wed. to unveil plans on rules for AI, platforms, data. Chinese AI ‘a different quality’ than Europe’s, tech czar says.
EU says it will look closer at smaller acquisitions made by big tech firms after 'shopping spree' (CNBC) Europe has been a hot bed of technology acquisitions by major U.S. firms over the last decade, but those purchases have warranted little attention from regulators. That could be about to change.
EU dismisses Zuckerberg's proposed rules for online content regulation (Computing) It is Facebook's responsibility to meet EU's demands and not the other way around, says EU Industry Commissioner
Zuckerberg meets EU officials as bloc's new tech rules loom (AP NEWS) LONDON (AP) — Facebook CEO Mark Zuckerberg met top European Union officials on a visit to Brussels on Monday, days before the bloc is expected to release new proposals on regulating artificial...
Facebook 'deeply concerned' about Singapore directive to block access (ZDNet) Singapore government's decision to block access to a Facebook page 'contradicts' its previous claim that the legislation would not be used as a censorship tool, says the social network.
Europe resists mounting US pressure on Huawei 5G technology (C4ISRNET) A visit to London by a United States delegation highlights how China's involvement in new 5G networks is an increasingly important part of President Donald Trump's battle with China over economic and technological preeminence.
State Department designates 5 Chinese media outlets 'foreign missions' (Fox News) The State Department is designating five Chinese media outlets “foreign missions,” calling them, in essence, state-sponsored propaganda and agents of the Communist Party of China, officials announced Tuesday.
China Expels Three Wall Street Journal Reporters (Wall Street Journal) China revoked the press credentials of three Wall Street Journal reporters based in Beijing, the first time in the post-Mao era that the Chinese government has expelled multiple journalists from one international news organization at the same time.
The Cybersecurity 202: The administration's Huawei policy has a Trump problem (Washington Post) The Trump administration’s Huawei policy is hitting a familiar snag: President Trump.
One man is standing up to Donald Trump's ban on US chip tech going to Huawei. That man... is Donald Trump (Register) President slams his own administration's 'ridiculous' China crackdown
Japan seeks domestic alternatives to Huawei, ZTE (Mobile World Live) Japan’s government stepped-up its campaign against Chinese infrastructure vendors, moving to incentivise domestic companies to ...
Huawei role in Brazil 5G up to national security chief: regulator (Reuters) The Brazilian telecoms regulator preparing to auction bandwidth for fifth-genera...
#Protect2020 Strategic Plan (CISA) Election security is a top priority for the U.S. Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA). As the lead federal agency responsible for securing the Nation’s elections infrastructure, CISA works closely with the intelligence community, law enforcement officials, private sector partners, and others across the Federal Government to ensure we are doing everything possible to defend our electoral systems. But this needs to be a whole of nation effort. State and local election officials are on the front lines, and the role of the Federal Government is to make sure that they are prepared.
What States, Locals and the Business Community Should Know and Do: A Roadmap for Effective Cybersecurity (US Senate Committee on Homeland Security & Governmental Affairs) Witnesses
The Honorable Christopher C. Krebs
Cybersecurity and Infrastructure Security Agency
U.S. Department of Homeland Security
Download Testimony (231.3 KB)
Department of Information Resources
State of Texas
Download Testimony (210.3 KB)
Chief Security Officer
Cybersecurity and Infrastructure Protection Office
State of Michigan
Download Testimony (180 KB)
U.S. Navy Opens Center for Cyber Weapon Development (The Maritime Executive) The U.S. Navy has opened a new Cyber Foundry - a development center specifically for offensive (not...
It’s been a smooth launch for the Defense Counterintelligence and Security Agency (Federal News Network) In today’s Federal Newscast, the DCSA says it’s business model is getting more efficient in its first full year of operation.
A new cyber group to help Marines - and they don’t have purple hair (Fifth Domain) The newly established Marine Corps Cyber Auxiliary has been working on a series of projects since it was created in May, one being an automation task force.
Trump Plans to Nominate DOD Exec Kathryn Wheelbarger to Deputy Undersecretary of Defense for Intelligence and Security Role | WashingtonExec (WashingtonExec) President Donald Trump on Feb. 13 announced his intent to nominate Kathryn Wheelbarger to serve as deputy undersecretary of defense for intelligence and
Top intel office lawyer who handled Ukraine whistleblower complaint resigning (POLITICO) Jason Klitenic, the general counsel for the Office of the Director of National Intelligence, will depart early next month.
Litigation, Investigation, and Law Enforcement
India cracks down on use of VPNs in Kashmir to get around social media ban (Reuters) Authorities in Indian Kashmir are cracking down on virtual private network (VPN)...
Indian police open case against hundreds in Kashmir for using VPN (TechCrunch) Local authorities in India-controlled Kashmir have opened a case against hundreds of people who used virtual private networks (VPNs) to circumvent a social media ban in the disputed Himalayan region in a move that has been denounced by human rights and privacy activists. Tahir Ashraf, who heads the…
Uighurs 'detained for beards and veils' - leak (BBC News) New documents reveal the "strongest evidence yet" of China's crackdown on people in Xinjiang.
Court rejects Huawei's lawsuit over federal defense spending law (POLITICO) District Judge Amos Mazzant determined that Congress acted within its powers when it passed the 2019 National Defense Authorization Act.
US District Court dismisses Huawei lawsuit that federal ban is unconstitutional (ZDNet) 'Contracting with the federal government is a privilege, not a constitutionally guaranteed right,' according to a US District Court judge.
Raytheon Engineer Guilty After Taking Laptop to China (Manufacturing Business Technology) His computer contained sensitive material, including a user's guide for an air-to-air missile.
Joshua Schulte's defense asks for a mistrial in the Vault 7 case (CyberScoop) A former CIA employee accused of being responsible for the largest leak in agency history thinks his case should be thrown out of court.
Imprisoned for leaking secrets, woman seeks Trump clemency (Fifth Domain) Reality Winner, 28, is serving a sentence of five years and three months at a federal prison in Fort Worth, Texas, after she pleaded guilty in 2018 to a single count of transmitting national security information when she worked at a National Security Agency office in Georgia.
NSA Whistleblower Reality Winner Submits Clemency Petition Alongside More Than 4,000 Letters of Support (The Intercept) The attorney who organized Reality Winner’s clemency petition was introduced to her by another client who met the NSA whistleblower behind bars.
Facebook must unblock NSO Group employee’s account, Israeli court rules (CyberScoop) An Israeli court has ordered Facebook to unblock the account of an employee of NSO Group after a complaint from the software surveillance vendor, according to officials at both companies.
Israeli court orders Facebook to unblock account of NSO Group employee (Reuters) A Tel Aviv court ordered Facebook Inc to unblock the private account of a worker...
Judge hears arguments in Jill Stein’s voting machine lawsuit (Washington Post) Pennsylvania’s top elections official spent hours in federal court Tuesday, defending the certification of voting machines being used by Philadelphia and two other Pennsylvania counties, including one where problems led to undercounted returns in a race in November.
California Police Have Been Illegally Sharing License Plate Reader Data (Vice) A major audit found that California cops shared data on the movements of millions of drivers without having policies in place, disregarding state law.
Automated License Plate Readers (Auditor of the State of California) To Better Protect Individuals’ Privacy, Law Enforcement Must Increase Its Safeguards for the Data It Collects
Manhattan U.S. Attorney Announces Guilty Plea Of U.S. Taxpayer In Panama Papers Investigation (US Department of Justice) Geoffrey S. Berman, the United States Attorney for the Southern District of New York and Brian A. Benczkowski, Assistant Attorney General of the Criminal Division of the U.S. Department of Justice, announced today that HARALD JOACHIM VON DER GOLTZ, a/k/a “H.J. von der Goltz,” “Johan von der Goltz,” “Jochen von der Goltz,” “Tica,” “Tika,” pled guilty today before U.S. Magistrate Judge Barbara Moses to wire fraud, tax fraud, money laundering, false statements, and other charges.