Law Enforcement can Find your Cell Phone in Seconds

Lots of applications here, some rather scary, others real terrifying while others are rewarding. Make your own decision(s). As an aside, we can only hope there is no Chinese technology involved or data is sold without knowledge or permission.

The service provided by Securus reveals a potential weakness in a system that is supposed to protect the private information of millions of cellphone users. With customers’ consent, carriers sell the ability to acquire location data for marketing purposes like providing coupons when someone is near a business, or services like roadside assistance or bank fraud protection. Companies that use the data generally sign contracts pledging to get people’s approval — through a response to a text message, for example, or the push of a button on a menu — or to otherwise use the data legally.

But the contracts between the companies, including Securus, are “the legal equivalent of a pinky promise,” Mr. Wyden wrote. The F.C.C. said it was reviewing the letter.

Courts are split on whether investigators need a warrant based on probable cause to acquire location data. In some states, a warrant is required for any sort of cellphone tracking. In other states, it is needed only if an investigator wants the data in real time. And in others no warrant is needed at all.

https://images-na.ssl-images-amazon.com/images/G/01/aplus/detail-page/B0079SR572_securus_201304294_4627.jpg photo

The Justice Department has said its policy is to get warrants for real-time tracking. The Supreme Court has ruled that putting a GPS tracker on a car counts as a search under the Fourth Amendment, but this was because installing the device involved touching a person’s property — something that doesn’t happen when a cellphone is pinged.

Phone companies have a legal responsibility under the Telecommunications Act to protect consumer data, including call location, and can provide it in response to a legal order or sell it for use with customer consent. But lawyers interviewed by The New York Times disagreed on whether location information that was not gathered during the course of a call had the same protections under the law.

As long as they are following their own privacy policies, carriers “are largely free to do what they want with the information they obtain, including location information, as long as it’s unrelated to a phone call,” said Albert Gidari, the consulting director of privacy at the Stanford Center for Internet and Society and a former technology and telecommunications lawyer. Even when the phone is not making a call, the system receives location data, accurate within a few hundred feet, by communicating with the device and asking it which cellphone towers it is near.

Other experts said the law should apply for any communications on a network, not just phone calls. “If the phone companies are giving someone a direct portal into the real-time location data on all of their customers, they should be policing it,” said Laura Moy, the deputy director of the Georgetown Law Center on Privacy & Technology.

***

Thousands of jails and prisons across the United States use a company called Securus Technologies to provide and monitor calls to inmates. But the former sheriff of Mississippi County, Mo., used a lesser-known Securus service to track people’s cellphones, including those of other officers, without court orders, according to charges filed against him in state and federal court.

The service can find the whereabouts of almost any cellphone in the country within seconds. It does this by going through a system typically used by marketers and other companies to get location data from major cellphone carriers, including AT&T, Sprint, T-Mobile and Verizon, documents show.

Between 2014 and 2017, the sheriff, Cory Hutcheson, used the service at least 11 times, prosecutors said. His alleged targets included a judge and members of the State Highway Patrol. Mr. Hutcheson, who was dismissed last year in an unrelated matter, has pleaded not guilty in the surveillance cases.

As location tracking has become more accurate, and as more people carry their phones at every waking moment, the ability of law enforcement officers and companies like Securus to get that data has become an ever greater privacy concern. Important to read more here.

China is Buying America with and without CFIUS

Statistics found here.

When China is not buying America, they are busy in other parts of the globe buying places like Europe. That is how China is expanding, including stealing intelligence, espionage and hacking. The parts of Britain not owned by Russia are being gobbled up by China. Russia has a long plan and China has a long plan, not too sure about the United States, Britain or other allies.

There has been many discussions in Congress to reform CFIUS, Committee on Foreign Investment in the United States. The most widely noticed scandal with CFIUS was the Uranium One deal.

U.S. watchdog expands scrutiny to more Chinese deals ... photo

Anyway, John Carlin recently spoke with the National Law Journal about bipartisan legislation introduced in November in the U.S. Senate and House of Representatives by U.S. Sen. John Cornyn, R-Texas, and U.S. Rep. Robert Pittenger, R-North Carolina, respectively, to overhaul the CFIUS review process. CFIUS reviews, which are voluntary, are meant to protect the nation from business transactions that pose a national security or strategic risk to the United States. The panel has the authority to require the transaction’s parties to undertake risk mitigation, such as carving out a specific location or element of the deal.

The panel can also recommend that the president block a deal entirely. President Donald Trump, for example, in September blocked the sale of Oregon-based Lattice Semiconductor Corp. to a Chinese company. A deal by Anthony Scaramucci, briefly a White House communications director, to sell his stake in SkyBridge Capital to Chinese company HNA Group Co., which is partly government-owned, appears to be in jeopardy after not yet clearing its nearly yearlong CFIUS review, according to reports in financial media including Bloomberg News in mid-December.Treasury Secretary Steven Mnuchin, who chairs the panel, has urged toughening CFIUS reviews.

While leading the DOJ’s National Security Division, Carlin oversaw the indictment in 2014 of five Chinese military members for economic espionage for hacks against several big U.S. companies, among them United States Steel, Westinghouse, Alcoa Inc. and SolarWorld from 2006 through 2014. The division also investigated the cyberattack on Sony Pictures Entertainment in late 2014 that the U.S. government determined originated in North Korea; and brought charges with the FBI against seven Iranians working for computer companies under contract to the Iranian government and military that conducted cyberattacks between 2011 and 2013 against 46 financial institutions including Wells Fargo and JPMorgan Chase & Co. More here.

The CFIUS review process also appears to be affecting efforts by China Oceanwide Holdings Group Co. Ltd. to acquire Genworth Financial Inc.

BusinessInsider: In 2016, General Electric sold its appliances business to Qingdao-based Haier. China’s Zoomlion made an unsolicited bid for heavy-lifting-equipment maker Terex Corporation, and property and investment firm Dalian Wanda announced a deal to buy a majority stake in Hollywood’s Legendary Entertainment.

On Friday, a Chinese-led investor group announced it would buy the Chicago Stock Exchange. And then there’s ChemChina’s record-breaking deal for the Swiss seeds and pesticides group Syngenta, valued at $48 billion according to Dealogic.

There have already been 82 Chinese outbound mergers-and-acquisitions deals announced this year, amounting to $73 billion in value, according to Dealogic. That’s up from 55 deals worth $6.2 billion in the same period last year.

Last year was a record-breaker for Chinese outbound deals, with 607 deals valued at $112.5 billion in total. Just over one month into 2016, and China is more than halfway to breaking that record.

So what’s going on?

One interpretation is that Chinese companies are simply hungry for growth as that country’s economy slows, and they’re feeding themselves by buying other companies.

“With the slowdown of the economy, Chinese corporates are increasingly looking to inorganic avenues to supplement their growth,” Vikas Seth, head of emerging markets in the investment-banking and capital-markets department at Credit Suisse, told Business Insider.

Last year, investment bankers earned $558 million in revenue from Chinese outbound M&A deals, according to Dealogic. This year, that number is at $121 million to date.

But there are, of course, a number of challenge these deals will face — especially in the US.

M&A deals in the US are subject to scrutiny by the Committee on Foreign Investment in the United States, or CFIUS. It recently prevented the $3.3 billion sale of Philips’ lighting business to a group of buyers in Asia.

feb 5 total china m&a deal value
The 82 Chinese outbound deals announced so far in 2016 are worth more than half of 2015’s total Chinese outbound-deal value.
Andy Kiersz/Business Insider

“I would be very surprised if CFIUS did not have an interest in taking a look at this deal,” said Anne Salladin of law firm Stroock & Stroock, referring to the Chicago Stock Exchange deal.

Facebook Suggested Friends Feature Recruited for ISIS

Ooops, call it Artificial Intelligence or an automated outcome friend feature because Mark Zuckerberg thinks connecting people to be friends globally is a good thing. In this case, not so much and who was paying attention? Further, has it been fixed? Nah.

Remember the time when Islamic State has mastered social media to exploit their jihad successes including their videos and publications? The world was in shock and yet, it continues today.

What about al Qaeda, or other domestic militant groups? Facebook says there is no easy fix, what? Anyone considering other social media platforms or the tech companies such as Google?

Facebook (FB) is being accused of inadvertently helping Islamist extremists connect and recruit new members. A new report in The Telegraph cites research suggesting that the social media giant connected and introduced thousands of extremists through its “suggested friends” feature. One writer who spoke to CBSN says “it’s cause for concern.”

The research was conducted by the Counter Extremism Project, a non-profit organization that pressures companies to remove extremist content online. It plans to release its findings in an extensive report later this month.

“The failure to effectively police its platform has allowed Facebook to become a place where extensive (Islamic State of Iraq and Syria or ISIS) supporting networks exist, propaganda is disseminated people are radicalized and new supporters are recruited,” researcher Gregory Waters told The Telegraph.

Facebook is already facing criticism for failing to remove terrorist material from its platform. The platform has also been blamed for spreading disinformation that stokes violence in Myanmar.

“There is no place for terrorists on Facebook,” a Facebook spokesperson said in a statement. “We work aggressively to ensure that we do not have terrorists or terror groups using the site, and we also remove any content that praises or supports terrorism. 99 percent of ISIS and Al Qaeda-related content we remove is found by our automated systems.”

J.M. Berger, author of “Extremism” and a fellow with the Counter-Terrorism Strategic Communications program, told CBSN’s Elaine Quijano that this issue is something that’s been known for some time and says “it’s cause for concern,” but further analysis of the research is needed. Berger said that “the online environment for ISIS and other jihadist extremists is much more difficult than it was just a couple of years ago.”

“It’s a problem we’ve known about for a long time … I first wrote about it in 2013,” Berger said. “All of the social media platforms use algorithms that allow them to suggest content that you might be interested in. It’s a key, integral part of their functioning and what we’ve seen is that these algorithms will recommend whatever kind of content … whether it’s extremist content or normal content. Managing that is a slightly different problem than managing extremist content where you go in and look for keywords.”

“You can be on Facebook and be an ISIS supporter and not post content that would get you suspended — if you don’t put anything publicly than you’re not going to get caught,” Berger explained. “But if you’re part of a social network that supports ISIS, then once a person becomes friends with you — Facebook is going to suggest that they all become friends.”

Berger elaborated: “It used to be that it was extraordinarily easy to find this content — to find other people doing active recruiting who are being open supporters — now that is no longer the case. We can’t realistically hope for 100 percent elimination of this content on these platforms, but now the question is how much is left?”

From the APP Store, Notifica ICE Raids

Ah yes those pesky apps found on iTunes and Google Play, funded by George Soros. This app helps illegal immigrants avoid federal immigration authorities. The group behind this scheme is United We Dream and guess what? That organization receives taxpayer funding. Uh huh…

Notifica is a project of United We Dream

***

In Case of an ICE Raid, Undocumented Immigrants Can Use ...

Notifica, is a new app that will act as a panic button for undocumented immigrants who are detained by Immigration and Customs Enforcement (ICE), Wired reports.

To help immigrants who have been detained, the organization United We Dream, which is led by young immigrants, and digital agency Huge developed the Notifica app. When immigrants are detained by ICE their families and loved ones might not even know what happened, but Notifica aims to change that.

“You have the right to be prepared,” says the app’s site. “Be prepared with Notifica, an app that sends out secure messages to your support network when you need it most.”

How The Notifica App Works

With Notifica, users can select contacts they want to notify in case they are taken by ICE. The app allows users to set up a personalized notification to each recipient, for example, a message to your mom or sibling would be different than the one you send to your attorney. After you write the preloaded messages, others will not have access to them and will not be able to read them. There is also a pin that seals off the messages in case your device is lost or stolen.

If the user is taken by ICE, a single click will send all messages via text in less than two seconds. Huge has also launched a phone hotline for those who don’t have a phone in reach but may be able to make a call afterwards. More here.

***

A division of the Justice Department awarded at least $206,453 to the National Immigration Law Center, which advises illegal immigrants on their rights, according to records obtained by Judicial Watch.

The Office of Justice Programs awarded the grants between fiscal years 2008 and 2010, the records cited by the conservative government watchdog group show. That would overlap the administrations of both Presidents George W. Bush and Barack Obama.

One of the projects of the National Immigration Law Center is United We Dream, which describes itself as a youth program for “undocumented” immigrants.

The Laredo Morning Times quoted Adrian Reyna, director of membership and technology strategies for United We Dream, as saying that “when something actually happens, most people don’t know what to do at that moment.”

The Texas newspaper also reported that United We Dream is working on a second version of Notifica that will include the ability to use more languages besides Spanish and English.

The second version, set to be released this summer, would include Vietnamese, Korean, and Chinese. The updated app also will be able to determine where an illegal immigrant is being detained, the newspaper reported.

United We Dream pushes to give legal status to so-called Dreamers, illegal immigrants brought to the United States when they were children. The organization, which has a hotline, advises illegal immigrants against cooperating with agents from U.S. Immigration and Customs Enforcement.

In a press release, the group says: “United We Dream calls on our communities to defend their rights, not open the door to ICE, and to report ICE activities to the United We Dream MigraWatch hotline.”

The April release adds: “United We Dream has also developed the mobile app, Notifica, which immediately alerts your loved ones and legal advocates to the user’s location in cases of detention. Text ‘Notifica’ to 877-877 for a link for download.”

The Soros-backed Open Societies Foundations don’t have a direct role in the app, but doesn’t find it objectionable, said Angela Kelley, the senior strategic adviser on immigration at the Open Society Foundations.

Col. Kang Defects from North Korea, Manhunt Underway

Mr. Kang is likely under protection of the West and has offered key intelligence that has aided the United States, Japan and South Korea in the talks with the Kim regime.

One of North Korea’s most senior intelligence officials, who played a major role in building Pyongyang’s nuclear weapons program, has disappeared and is believed to have defected to France or Britain, according to sources. South Korean media identified the missing official as “Mr. Kang”, and said he is a colonel in North Korea’s State Security Department (SSD), also known as Ministry of State Security. Mr. Kang, who is in his mid-50s, enjoyed a life of privilege in North Korea, because he is related to Kang Pan-sok (1892-1932), a leading North Korean communist activist and mother to the country’s late founder, Kim Il-sung.

According to South Korean reports, Kang was in charge of North Korea’s counter-espionage operations in Russia and Southeast Asia, including China. He is also believed to have facilitated secret visits to Pyongyang by foreign nuclear scientists, who helped build North Korea’s nuclear weapons program. In recent years, Kang was reportedly based in Shenyang, the largest Chinese city near the North Korean border, which is home to a sizeable ethnic Korean population. According to reports, Kang led Unit 121, an elite North Korean hacker group based in Shenyang, with the aim of carrying out cyber-attacks without implicating North Korea. The South Korean-based DailyNK website said on Wednesday that Kang had been based at the Zhongpu International Hotel in Shenyang (until recently named Chilbosan Hotel), which has historically been operated through a joint Chinese-North Korean business venture and is known to host numerous North Korean government officials.

Chilbosan Hotel Shenyang (Shenyang) photo

But according to DailyNK, Kang disappeared from Shenyang in February and is now believed to have defected, possibly “to France or Great Britain”. The Seoul-based website said Kang took “a lot of foreign currency with him” as well as “a machine capable of printing American dollars”. Following Kang’s disappearance, the government in Pyongyang launched a worldwide manhunt for him, sending at least 10 agents to assassinate him before he is given political asylum in the West, said DailyNK. Pang’s family, including his wife and children, are believed to still be in Pyongyang.

***

While it is reported that North Korea has released 3 Americans from a labor camp to detention at a hotel from observation and deprogramming. There is no word on full release however, there is more going on with behind the scenes and that includes this defection along with the unit this Colonel worked for while living and stationed in China.

***

The North Korean hackers hit the systems of the Israeli energy company to attempt to penetrate the best electronic protection systems, South Korea’s newspaper Naver reported. According to the company’s experts, the North Korean cyber actors have real capabilities to damage the infrastructure of the United States, Japan and other countries.

Last year, experts warned that the North Korean cyber army could be far more dangerous to global security than its nuclear missiles. “North Korean cyberattacks and other malicious cyber activities pose a risk to critical infrastructure in countries around the world and to the global economy,” the statement said.

Since 2011, Pyongyang has been scaling up its cyber capacities. The North Korean regime is suspected to be exploiting its cyber weapons for political purposes to intimidate its opponents as well as to steal crypto-currency.

North Korean hackers are involved in major cyber offensives
In 2013, the three largest broadcasting companies and two banking institutions of South Korea suffered a massive attack against their systems. According to Shinhan Bank and Nonghyup Bank representatives, about 32,000 computers were infected while internet banking and ATMs stopped working. While Pyongyang still denies any involvement, cybersecurity experts pointed to North Korean group Lazarus.

In August 2014, North Korea hacked the Channel 4 to prevent the production of a drama depicting the fictional story of a nuclear scientist kidnapped in the country.

However one of the most advanced attacks was the intrusion into the network of Sony Corporation in September 2014. The malware destroyed 70% of information stored in the company’s computers. According to Jim Lewis, senior fellow at the Center for Strategic and International Studies, the attack turned out to be the worst of its type on a company on U.S. soil.

North Korean hackers raise funds for regime
International sanctions forced Kim Jong-un to look for alternative and illegal sources of financing. By late 2015, the North Korean hackers shifted their attention to the global financial system, according to researchers at BAE Systems, FireEye and Symantec.

In 2016, they were about to commit the most astonishing bank robbery in history. The cybercriminals were close to stealing a billion dollars from the Federal Reserve of New York and only a misprint in the word “foundation” kept them from it.

North Korean state-backed hackers have been also accused of the WannaCry ransomware attack that affected hundreds of thousands of computers worldwide in 2017. Taking into account large amounts of stolen money, it becomes clear that despite the growing political and economic pressure Pyongyang will be able to stay afloat for long.

“Winter is coming”
According to the commander of the US forces in South Korea, General Brooks, the North Korean military forces are currently capable of carrying out the most efficient and well-prepared cyber-attacks in the world.

Robert Hannigan, former director of the Center for Government Communication of Great Britain says that as of June 2017, North Korea had 1,700 state-sponsored hackers and more than 5,000 support staff personnel. They all operate under the Main Intelligence Department of North Korean Armed Forces, known as Unit 586. The so-called Bureau 121 is the main unit conducting cyberattacks abroad. The US Department of Homeland Security refers to this structure as Hidden Cobra, while private companies gave the common name Lazarus to all North Korean hackers. But no one exactly knows how many different subdivisions the North Korea’s cyber-army has.

Earlier this year, cybersecurity firm McAfee reported that hackers have targeted organizations involved in the 2018 Pyeongchang Winter Olympics, which are set to start this week.  The malicious actors attempted to obtain passwords and sensitive financial data. Speculations have risen that the North could be responsible amid anti-North Korean demonstrations in the Korean Republic and increasingly hostile rhetoric between Pyongyang and Washington.

Some analysts believe that the ongoing talks between Pyongyang and Seoul are Kim Jong-un ruse aimed to distract attention from the North Korea’s nuclear program and its malicious activities in cyberspace. But even if talks go smoothly, Pyongyang will never give up further development of its cyber weapons.

North Korea’s advanced cyber warfare capabilities could be truly scaring and risk escalating the crisis. As international bodies consider enforcing sanctions, Pyongyang continues its campaign of outright theft. Korean Olympic detente won’t last forever.

Next time when Kim Jong-Un feels trapped or insulted his cyber army will be ready to wreak havoc.