Barely three months after the Trump administration’s promised repression of the Immigration Administration in the United States, immigrants and customs application now have a $ 30 million contract with Palant to build a “quasi-real” time surveillance platform called immigrationos that would follow information on the self-deportation of people (elected to leave the United States). Meanwhile, the Ministry of Internal Security sent aggressive emails telling people with temporary legal status to leave the United States. It is not clear that has really received the messages, given that a number of people born in the United States said that receiving them.
The American Cybersecurity and Infrastructure Safety Agency has briefly seen in evidence this week to cancel the financing of the vulnerability project for essential software known as the CVE program. The CISA finally succeeded in funding, but some members of the board of directors of the CVE program plan to make the project an independent non -profit organization.
A trial on the cat from the Houthi signal group of the Trump administration reveals details on the stages that the federal ministries have made – and did not make to preserve the messages by laws on recordings.
Wired has taken a look at the most dangerous pirates you have never heard of, deeply plunging on the relentless Russian intelligence group and two Gamaredon faces; The incredibly prolific Chinese text messaging crooks of the triad triad; The dangerous members of the giant of the deposed Black Basta ransomware; Iranian critical infrastructure pirates known as Cyberav3ngers; North Korean cryptocurrency pirates traderrait north Korean responsible for an amazing number of massive robberies; And long -standing Chinese and Chinese crossed hackers and supported by the state known as the brass typhoon.
In addition to all this, a suspected hack of 4chan can have devastating consequences for the controversial image card. The Ai Massive Blue company helps the cops to generate social media robots powered by AI to pretend to be nice personalities and speak to interested people. And the Attorney General of New Jersey continues discord, saying that the platform has no adequate guarantees in place to protect children under the age of 13 against sexual predators and harmful content.
But wait, there is more! Each week, we bring together the news of security and confidentiality that we have not covered in depth ourselves. Click on the titles to read the full stories and stay safe there.
A draft bill in the state of Florida would oblige social media companies to provide the order forces for encryption deadlines so that the cops can access the accounts of the users. The bill has increased unanimously from the committee this week and will now go to the State Senate for a vote. If he passed, the Use of social media by minors Bill, sponsored by the Senator of the Blaise INGOGLIA State, would require that “social media platforms provide a mechanism to decipher end -to -end encryption when the police obtain an assignment.” The bill would also prohibit the disappearance of messages in accounts designed for children and would oblige social media companies to create a mechanism for parents or tutors to access the accounts of children. Experts have long warned that encryption times make everyone less secure, including those they are intended to help. However, waves of attacks against encryption have appeared several times over the years, including a recent trend in the European Union and the United Kingdom.
A judge of the Nevada district said this week that the practice of “tower spills” this week, in which the police derive large amounts of personal data from calls to cellular towers, violates the fourth amendment and is therefore unconstitutional. Cellular towers collect large amounts of user information, including telephone numbers and telephone locations, so when COPs require data from a tower for a specific period, they often receive information on thousands of or more devices. Despite the decision this week, judge Miranda M. Due said that the police could always use the evidence they had collected through a tower dump in their case.
China said this week that the American National Security Agency committed “advanced” cyber attacks against the critical industries in February during the Asian winter games. The Northeast Harbin city forces have put three alleged NSA agents – Kathery A. Wilson, Robert J. Snelling and Stephen W. Johnson – on a desired list and said that the University of California and Virginia Tech were involved in the attacks. “We urge the United States to adopt a responsible attitude on the issue of cybersecurity and … to stop smears and attacks not caused against China,” said ministry spokesman Jian, at a press conference on several subjects, according to Reuters. The American government frequently calls for Chinese hack supported by the state and appoints allegedly individual authors, but China has been less consistent in such declarations. This decision this week comes in the midst of growing tensions between the two countries, including the Trump administration business war.
CBP uses several artificial intelligence tools to scan social media and identify people of online interest, according to information from the agency and marketing equipment examined by 404 entrepreneurs media. CBP has published information on platforms in parallel this week with the announcement of the American Department of Internal Security according to which it “will begin to filter the activity of the social media of extraterrestrials for anti -Semitism”. This declaration also indicates that the American citizenship and immigration services are carrying out research on “anti -Semitic” social networks. CBP told 404 Media in an email that “neither of the two tools is used for the verification or treatment of travel applications”, referring to Dataminr and Onyx, but has not developed beyond. Platforms use AI to analyze large data trucks and can be used to develop avenues on people who can be in violation of American immigration laws.