Monthly Archives: July 2017

NATO Is Fighting Russia’s Fake News Schemes by Training Danish Troops How to Spot Propaganda – Newsweek

Posted: July 18, 2017 at 3:52 am

Political elections are not the only target of Russia's hacking and "fake news" campaigns. Fighting forces can be targeted, as well.As such, Denmark will reportedly train troops against propaganda that it plans to send NATO next year in Estonia as the build-up of forces in Eastern Europe continues, according to Reuters.

Though Russia was not specifically mentioned, President Vladimir Putins government has been directly accused of meddling in the United Stateselection by disseminating false news reports and conducting cyberattacks as well as similar efforts in France, Austria, the Ukraine, Germany and the Netherlands, to name a few.

"It is a whole new world. The Danish soldiers need to be extremely aware of that. Therefore I have arranged with the armed forces that the soldiers being sent out in January are informed and educated in how to protect themselves,"Danish defense minister Claus Hjort Frederiksen said Monday.

Daily Emails and Alerts - Get the best of Newsweek delivered to your inbox

"It is easy to imagine they will become exposed to intimidation and fake rumors," Frederiksen added.

The 200 Danish troops are scheduled to reach Estonia in January.

Denmarks plan comes in response to an incident in February when German NATO troops stationed in Lithuania were falsely accused of raping a 15-year-old girl in emails sent to high-ranking members of Lithuanias government and its media outlets, DW reported.

Prosecutors later opened a criminal investigation because of the false story, and NATO blamed Russia.

Putin, who met with President Donald Trump for more than two hours earlier this month at the Group of 20 summit in Hamburg, Germany, claimed he firmly denied accusations of election meddling when Trump brought it up. Russia also has denied knowledge ofother alleged hacks.

In Europe, Russias efforts also involve attempts to thwart the increasing number of troops in Eastern Europe as NATO and Russia posture for military prominence.

Most recently, leaders from NATO members congregated in Poland to discuss defense efforts. The new movements will mark the first time multinational forces will rotate in Eastern Europe since the Cold War, according to PBS.

The U.S., alone, had deployed roughly 4,000 troops to Polandand to make rotations in Europeas of January, with other equipment like tanks also making its way to Latvia, Romania and Lithuania.

Original post:
NATO Is Fighting Russia's Fake News Schemes by Training Danish Troops How to Spot Propaganda - Newsweek

Posted in NATO | Comments Off on NATO Is Fighting Russia’s Fake News Schemes by Training Danish Troops How to Spot Propaganda – Newsweek

US to create the independent US Cyber Command, split off from NSA – PBS NewsHour

Posted: at 3:52 am

An undated aerial handout photo shows the National Security Agency headquarters building in Fort Meade, Maryland. Photo by NSA via Reuters

WASHINGTON After months of delay, the Trump administration is finalizing plans to revamp the nations military command for defensive and offensive cyber operations in hopes of intensifying Americas ability to wage cyberwar against the Islamic State group and other foes, according to U.S. officials.

Under the plans, U.S. Cyber Command would eventually be split off from the intelligence-focused National Security Agency.

Details are still being worked out, but officials say they expect a decision and announcement in the coming weeks. The officials werent authorized to speak publicly on the matter so requested anonymity.

The goal, they said, is to give U.S. Cyber Command more autonomy, freeing it from any constraints that stem from working alongside the NSA, which is responsible for monitoring and collecting telephone, internet and other intelligence data from around the world a responsibility that can sometimes clash with military operations against enemy forces.

Making cyber an independent military command will put the fight in digital space on the same footing as more traditional realms of battle on land, in the air, at sea and in space. The move reflects the escalating threat of cyberattacks and intrusions from other nation states, terrorist groups and hackers, and comes as the U.S. faces ever-widening fears about Russian hacking following Moscows efforts to meddle in the 2016 American election.

The U.S. has long operated quietly in cyberspace, using it to collect information, disrupt enemy networks and aid conventional military missions. But as other nations and foes expand their use of cyberspying and attacks, the U.S. is determined to improve its ability to incorporate cyber operations into its everyday warfighting.

Experts said the command will need time to find its footing.

Right now I think its inevitable, but its on a very slow glide path, said Jim Lewis, a cybersecurity expert with the Center for Strategic and International Studies. But, he added, A new entity is not going to be able to duplicate NSAs capabilities.

The NSA, for examples, has 300 of the countrys leading mathematicians and a gigantic super computer, Lewis said. Things like this are hard to duplicate.

He added, however, that over time, the U.S. has increasingly used cyber as a tactical weapon, bolstering the argument for separating it from the NSA.

The two highly secretive organizations, based at Fort Meade, Maryland, have been under the same four-star commander since Cyber Commands creation in 2009.

But the Defense Department has been agitating for a separation, perceiving the NSA and intelligence community as resistant to more aggressive cyberwarfare, particularly after the Islamic States transformation in recent years from an obscure insurgent force into an organization holding significant territory across Iraq and Syria and with a worldwide recruiting network.

While the military wanted to attack IS networks, intelligence objectives prioritized gathering information from them, according to U.S. officials familiar with the debate. They werent authorized to discuss internal deliberations publicly and requested anonymity.

Then-Defense Secretary Ash Carter sent a plan to President Barack Obama last year to make Cyber Command an independent military headquarters and break it away from the NSA, believing that the agencys desire to collect intelligence was at times preventing the military from eliminating IS ability to raise money, inspire attacks and command its widely dispersed network of fighters.

Carter, at the time, also pushed for the ouster of Adm. Mike Rogers, who still heads both bodies. The Pentagon, he warned, was losing the war in the cyber domain, focusing on cyberthreats from nations such as Iran, Russia and China, rather than on countering the communications and propaganda campaigns of internet-savvy insurgents.

Officials also grew alarmed by the growing number of cyberattacks against the U.S. government, including several serious, high-level Defense Department breaches that occurred under Rogers watch.

NSA is truly an intelligence-collection organization, said Lauren Fish, a research associate with the Center for a New American Security. It should be collecting information, writing reports on it. Cyber Command is meant to be an organization that uses tools to have military operational effect.

After President Donald Trumps inauguration, officials said Defense Secretary Jim Mattis endorsed much of the plan. But debate over details has dragged on for months.

Its unclear how fast the Cyber Command will break off on its own. Some officials believe the new command isnt battle-ready, given its current reliance on the NSAs expertise, staff and equipment. That effort will require the department to continue to attract and retain cyber experts.

Cyber Command was created in 2009 by the Obama administration to address threats of cyber espionage and other attacks. It was set up as a sub-unit under U.S. Strategic Command to coordinate the Pentagons ability to conduct cyberwarfare and to defend its own networks, including those that are used by combat forces in battle.

Officials originally said the new cyber effort would likely involve hundreds, rather than thousands, of new employees.

Since then, the command has grown to more than 700 military and civilian employees. The military services also have their own cyber units, with a goal of having 133 fully operational teams with as many as 6,200 personnel.

Its proposed budget for next year is $647 million. Rogers told Congress in May that represents a 16 percent increase over this years budget to cover costs associated with building the cyber force, fighting IS and becoming an independent command.

Under the new plan being forwarded by the Pentagon to the White House, officials said Army Lt. Gen. William Mayville would be nominated to lead Cyber Command. Leadership of the NSA could be turned over to a civilian.

Mayville is currently the director of the militarys joint staff and has extensive experience as a combat-hardened commander. He deployed to both Iraq and Afghanistan, leading the 173rd Airborne Brigade when it made its assault into Iraq in March 2003 and later heading coalition operations in eastern Afghanistan.

Visit link:
US to create the independent US Cyber Command, split off from NSA - PBS NewsHour

Posted in NSA | Comments Off on US to create the independent US Cyber Command, split off from NSA – PBS NewsHour

Prosecutor: Attempted murder began with feud over a coat | Local … – Bloomington Pantagraph

Posted: at 3:51 am

BLOOMINGTON A dispute over a coat led to a November shooting on Bloomingtons east side, prosecutors said Monday on the first day in the attempted-murder trial of Darvell Williams.

A six-man, six-woman jury was seated Monday before opening arguments and the states first witness, a woman who reluctantly testified against her former roommate.

Its a really simple case, Ghrist said. It will come down to common sense. The defendant took a 9 mm handgun and shot multiple times at Willie Love. Eight shell casings were found in the apartment the defendant was living in.

Williams is facing nine felony charges, including attempted murder in the Nov. 26 shooting that also damaged a mailbox in an apartment complex, a passing car and a window at Lowes Home Improvement at 2101 E. Empire St.

One of the charges, an aggravated unlawful use of a weapon into a vehicle, against Williams was dropped in court Monday.

Defense attorney Brian McEldowney asked the jurors to keep an open mind and to listen to all of the evidence before making a decision on Williams' guilt or innocence.

These are volatile charges and our natural reaction is to get angry, but please listen to all of the testimony before making a judgment, he said.

The state called Chiquan Felton to the stand, who attempted to avoid Ghrists questions.

I plead the Fifth, she said. I have nothing to say.

Ghrist reminded her that she was not facing charges, so there were no grounds to invoke the Fifth Amendment protection against self-incrimination.

After excusing the jury, Judge Robert Freitag explained that she had to be truthful with her testimony.

You are here pursuant to a court order and if you are asked a question, you must answer truthfully, and if you refuse, you could be held in contempt of court and be held in county jail until you decide to answer, he said.

When the jury returned, Felton testified that she never saw Williams shoot at Love because her back was turned while she was trying to open the door to the apartment she shared with Williams.

I heard gunshots, but I never saw him shoot at him, she said. Where I come from, you run away from gunshots.

The trial is expected to conclude Tuesday or Wednesday. Testimony will resume at 9 a.m. Tuesday.

Follow Kevin Barlow on Twitter: @pg_barlow

View original post here:
Prosecutor: Attempted murder began with feud over a coat | Local ... - Bloomington Pantagraph

Posted in Fifth Amendment | Comments Off on Prosecutor: Attempted murder began with feud over a coat | Local … – Bloomington Pantagraph

New gun law threat to constitutional rights – Herald and News

Posted: at 3:51 am

The Oregon Legislature adjourned last Friday with a parting shot at law-abiding gun owners and a resounding whack across the rump of constitutional rights of all Americans. It involves passing along to the governor a bill that will permit untrained or certified individuals to petition a judge to have a third partys Second Amendment rights to possess firearms for lawful purposes suspended.

The bill, SB719A, will permit most any relative, former housemate, police officer or educational professional to file a motion to have their rights suspended under the weakly defined extreme risk restraining order parameters that most any former domestic partner could be denied their rights for most any specious justification.

This action reeks of the means and skullduggery anti-freedom factions begin their campaigns to change governments into leftist regimes by undermining the constitutional forms of free nations.

Their failure to pass gun prohibition legislation through the federal government relegates them to plan B where they resort to the same trickery and underhanded tactics that did not work then and now are trying to push through many anti-constitutional measures through big buck financing of the same junk bills into state legislatures.

They seem to feel they can hornswaggle local government much easier than federal administrations.

The measure the Oregon Democrats are seeking to pass into law faces serious constitutional questions of denying a right without any criminal conviction of wrongdoing and only on the strength of an accusation but by prohibiting an accused their right to due process before personal property is confiscated by the government in violation of the Fifth Amendment.

Those that are unsatisfied with the current government are attempting to change it with methods not in good faith processes but in ways that only breed disrespect for the rule of law just to denigrate the system.

See the original post here:
New gun law threat to constitutional rights - Herald and News

Posted in Fifth Amendment | Comments Off on New gun law threat to constitutional rights – Herald and News

NRA: Washington Post abuses First Amendment – Washington Examiner

Posted: at 3:51 am

The National Rifle Association targeted the Washington Post in a new video Monday, accusing the newspaper of "doing damage to the country" and promoting the "violent left."

The release of the video comes after the Post wrote a story last week about recent NRA videos that criticize Democratic politicians and the media, but do not focus on gun policy.

"They tell us to not have an opinion unless it's about guns," says conservative talk show host Grant Stinchfield, who narrates the new video attacking the Post. "Listen to me Washington Post. We talk about more than guns because every freedom is connected. If one is threatened, they all are threatened, and the organized anarchy that you, our politicians and you're activists are pushing is destroying our country."

Stinchfield went on to condemn the Post's slogan, "Democracy Dies in Darkness," and said the newspaper "should say, "Journalism Dies at the Washington Post.'"

The Post wrote a story July 11 that mentions a recent NRA video released in late June featuring commentator Dana Loesch that received widespread criticism because it did not emphasize Second Amendment Rights.

In the video, Loesch described liberal demonstrators who "smash windows, burn cars, shut down interstates and airports bully and terrorize the law-abiding." A petition to have the Loesch video removed from Facebook argued that "the video tries to create an us-vs-them' narrative and pit Americans against one another."

Critics said the video exploited the congressional baseball shooting that had just happened prior to the video's release, in which five people were wounded, including House Majority Whip Rep. Steve Scalise, R-La., by an outspoken supporter of Sen. Bernie Sanders, I-Vt.

The NRA is brushing off the criticism. In the new video, Stinchfield says the NRA "will never stop fighting the violent left on the battlefield of truth."

"Here's a suggestion for the Washington Post: don't worry about how many guns are in our videos, worry about how many facts are in your articles," Stinchfield said. "Because if gun owners abused our Second Amendment the way you abuse your paper and the First Amendment, our rights would have been taken away long ago. You people do more to damage our country with a keyboard than any NRA member has ever done combined with a firearm."

See the article here:
NRA: Washington Post abuses First Amendment - Washington Examiner

Posted in First Amendment | Comments Off on NRA: Washington Post abuses First Amendment – Washington Examiner

Companies Don’t Have a First Amendment Right to Talk About National Security Letters, Court Rules – Gizmodo

Posted: at 3:51 am

Cloudflare and Credo Mobile today lost their fight to speak publicly about the National Security Letters they and other tech companies receive, which demand user data and frequently forbid companies from ever disclosing the demands to their users.

The two companies received NSLs from the FBI in 2011 and 2013, requiring them to secretly disclose account information.

The Electronic Frontier Foundation, representing web performance company Cloudflare and mobile network Credo, said the gag orders accompanying the NSLs violated the companies rights to free speech. But the 9th Circuit Court of Appeals ruled today that this nondisclosure requirement does not run afoul of the First Amendment.

The ruling is a major upset for Cloudflare and Credo, as well as for larger tech companies that have begun disclosing NSLs over the past year. Companies that receive NSLs are usually restricted from discussing them for yearssometimes foreverand, if they disclose them in transparency reports, they may only do so in ranges of 500.

The EFF argued that companies with millions of users should be allowed to disclose the specific number of NSLs they receive and to mention their experiences receiving NSLs when communicating with customers or lobbying the government. (While lobbying against NSLs in 2014, Cloudflares in-house counsel was told by a dismissive Capitol Hill staffer that it was impossible for Cloudflare to receive an NSL, and because of the gag order, he was unable to point out that Cloudflare had already received several of the letters.)

Id be lying if I didnt say this is a real setback, EFF staff attorney Andrew Crocker told Gizmodo. But the trend is going the other way. Ive seen a lot of courts questioning these blanket indefinite gag orders.

Twitter, which is also challenging NSL gag orders in court, recently secured a promising ruling from a district court judge that suggests Twitters reporting of NSLs in narrower ranges than 500 could be protected under the First Amendment.

The 9th Circuit, however, was more dismissive of the reporting bands: We decline the recipients invitation to quibble with the particular ranges selected by Congress, the court wrote.

In 2017, its really unsupportable to not give internet companies like my clients a full First Amendment set of rights that they would give to any other speaker, Crocker said, likening internet service providers like Cloudflare to traditional publishers like newspapers. The implicit assumption in this ruling is that they dont have this set of rights.

Go here to read the rest:
Companies Don't Have a First Amendment Right to Talk About National Security Letters, Court Rules - Gizmodo

Posted in First Amendment | Comments Off on Companies Don’t Have a First Amendment Right to Talk About National Security Letters, Court Rules – Gizmodo

Recording police is protected under the First Amendment – Buffalo … – Buffalo Business First

Posted: at 3:51 am


OneNewsNow
Recording police is protected under the First Amendment - Buffalo ...
Buffalo Business First
The Third District Court of Appeals in Philadelphia ruled in favor of the right to record police activities, affirming the activity is protected under the First ...
Whitehead: First Amendment won in court - One News NowOneNewsNow

all 2 news articles »

View post:
Recording police is protected under the First Amendment - Buffalo ... - Buffalo Business First

Posted in First Amendment | Comments Off on Recording police is protected under the First Amendment – Buffalo … – Buffalo Business First

Apple users warned of dangerous new Mac malware that steals banking credentials – ThaiVisa News

Posted: at 3:50 am

Apple users are being warned about a newly discovered form of Mac malware which is spread via a phishing attack and steals banking credentials.

The malware, dubbed OSX/Dox, was discovered by researchers from Check Point Security and mirrors the websites of some of the worlds leading banks to steal attempt to steal money from users.

The malware is being spread via a combination of phishing and so called Man in the Middle attacks.

Security experts say the Mac malware is extremely difficult to detect as it is able to bypass Apples stringent security measures and spy on all communications from the victim.

Check Point said they have seen a recent surge in the malware being used by hackers who are currently playing a game of cat and mouse with Apple.

Check Point say the hackers are purchasing dozens of Apple certificates to sign on the application bundle and bypass GateKeeper. As soon as Apple revokes one of the certificates the hackers switch to another, with new certificates being used on a daily basis.

They are aiming at the victims banking credentials by mimicking major bank sites. The fake sites prompt the victim to install an application on their mobile devices, which could potentially lead to further infection and data leakage from the mobile platform as well, Check Point said in a blog post.

Once the malware has been installed on a device it downloads the Tor browser and starts to communicate with servers controlled by the hackers. It then records the location of the infected device and customises the fake banking page depending on the location of the victim, making the attack even more convincing.

Image: Check Point. The very convincing but fake banking page by use by OSX/Dox

The malware then asks victims to login into the fake banking page with their banking credentials and also asks for their mobile number to setup SMS authentication.

Victims are then tricked into downloading a malicious app and the Stack encrypted messaging app.

It is not known why victims are made to download Stack but Check Point researchers speculate that it could be used by the hackers to commit more fraud at later date.

Whatever the goal may be, Signal will possibly make it harder for law enforcement to trace the attacker.

Alternatively, the perpetrator might be using Signal temporarily, to acquire install rate statistics and prove the method is working, while planning to install a malicious mobile application with future victims at a later time.

Unfortunately, the OSX/Dok malware is still on the loose and its owners continue to invest more and more in its obfuscation by using legitimate Apple certificates, Check Point researchers wrote.

The fact that the OSX/Dok is ported from Windows may point to a tendency. We believe more Windows malware will be ported to macOS, either due to the lower number of quality security products for macOS compared to the ones for Windows, or the rising popularity of Apple computers.

Jonathan is our Google Nexus and Android enthusiast. He is also fanatical about football which makes it all the more strange that he should support Stockport County. In addition to writing about tech, Jonathan has a passion for fitness and nutrition and has previously written for one the UKs leading watch and horology websites.

The rest is here:
Apple users warned of dangerous new Mac malware that steals banking credentials - ThaiVisa News

Posted in Tor Browser | Comments Off on Apple users warned of dangerous new Mac malware that steals banking credentials – ThaiVisa News

AMD rallies as cryptocurrency miners snap up graphics chips

Posted: at 3:49 am

By Noel Randewich

SAN FRANCISCO (Reuters) - Shares of Advanced Micro Devices surged nearly 9 percent on Tuesday boosted by strong demand for its chips from cryptocurrency miners, leaving short sellers at a loss for the year.

A rally in cryptocurrency Ethereum has boosted demand for graphics chips used by people to "mine" it and other digital currencies, with some of AMD's processors sold out on Amazon.com and other retail websites.

Mining for cryptocurrency involves using networks of computers to validate transactions and prevent counterfeit by solving complex mathematical problems. New currency is generated as a reward to the computer operators.

The emergence of Bitcoin in 2009 made cryptocurrency mining popular. Recent rallies in the price of Bitcoin and newer digital currency Ethereum have rekindled interest.

Ethereum miners spending as little as $2,000 to build mining computers using graphics processing units, or GPUs, from AMD or its rival Nvidia could break even within three or four months, estimated RBC analyst Mitch Steves in a note to clients on Tuesday.

"We think economics suggests that GPUs continue to be sold out," Steves wrote. "We think GPU demand will remain robust as long as the return is under (about) one year."

As of Monday, AMD short sellers had been up about $15 million for 2017. But Tuesdays share surge left them at a loss of $125 million on paper for the year, according to S3 Partners, a financial analytics firm.

That follows losses of over $700 million for AMD short sellers last year, when the stock tripled.

The stock last traded up 7.3 percent at $12.06.

"There are going to be a lot of traders saying, 'This is the last straw. I'm out,'" said Ihor Dusaniwsky, S3's managing director of research.

AMD spokesman Drew Prairie acknowledged that interest from cryptocurrency miners was contributing to demand for the company's chips, but he stressed that game enthusiasts are the core market.

JPMorgan Chase, Microsoft Corp, Intel Corp and more than two dozen other companies have teamed up to develop standards to make it easier for enterprises to use technology related to Ethereum.

Adding to support for AMD's stock, Apple on Monday refreshed its lineup of Mac personal computers, including upgraded graphics chips from AMD.

See the rest here:
AMD rallies as cryptocurrency miners snap up graphics chips

Posted in Cryptocurrency | Comments Off on AMD rallies as cryptocurrency miners snap up graphics chips

Cryptocurrencies are crashing, but bitcoin isn’t falling as badly as the rest – Quartz

Posted: at 3:49 am

Cryptocurrency markets are crashing. Bitcoins price has fallen by about 20% in the last seven days, wiping out $7 billion of market value. But its doing better than other major cryptocurrencies like ether and ripple, which have lost 30% or more.

Bitcoins relative resilience in the current crash bolsters its status as the reserve currency of the cryptocurrency markets. Some $29.5 billion worth of bitcoin has been traded on global exchanges in the last month, compared to $26.3 billion worth of ethereum, according to data site Coin Marketcap. Not all traders are cashing out of ether into bitcoin, of course, the ether-Korean won currency pair is among the most actively traded in the last 24 hours, Coin Marketcaps data shows.

One indicator of bitcoins health relative to other cryptocurrencies is the so-called Bitcoin Dominance Index maintained by Coin Marketcap. It shows the total value of all bitcoin in circulation as a proportion of the value of all cryptocurrencies in circulation. As cryptos in general rallied this year, bitcoins dominance has fallen. But as markets have corrected in recent weeks, bitcoins dominance rose.

Bitcoin is still more than twice as valuable as ethereum, and about six times as valuable as Ripple. That gap could grow if the cryptomarket correction continues.

Read next: The strange mix of reasons why bitcoin has soared to all-time records

Go here to read the rest:
Cryptocurrencies are crashing, but bitcoin isn't falling as badly as the rest - Quartz

Posted in Cryptocurrency | Comments Off on Cryptocurrencies are crashing, but bitcoin isn’t falling as badly as the rest – Quartz