Google Wont Stop Following You, Regardless of Settings

Even when you opt out. Even when you change the settings. Even without your knowledge. Next question that needs an answer…who is Google selling the data to?

Google is tracking your every move, apparently | Metro News photo

SAN FRANCISCO (AP) — Google wants to know where you go so badly that it records your movements even when you explicitly tell it not to.

An Associated Press investigation found that many Google services on Android devices and iPhones store your location data even if you’ve used a privacy setting that says it will prevent Google from doing so.

Computer-science researchers at Princeton confirmed these findings at the AP’s request.

For the most part, Google is upfront about asking permission to use your location information. An app like Google Maps will remind you to allow access to location if you use it for navigating. If you agree to let it record your location over time, Google Maps will display that history for you in a “timeline” that maps out your daily movements.

** In case you missed Tucker Carlson’s segment on Google:

 

Storing your minute-by-minute travels carries privacy risks. So Google will let you “pause” a setting called Location History.

Google says that prevents the company from remembering where you’ve been. Its support page states: “You can turn off Location History at any time. With Location History off, the places you go are no longer stored.”

But this isn’t true. Even with Location History paused, some Google apps automatically store time-stamped location data without asking.

For example, Google stores a snapshot of where you are when you merely open its Maps app. Automatic daily weather updates on Android phones note your location. So can searches that have nothing to do with location.

The privacy issue affects some two billion users of devices that run Google’s Android operating software and hundreds of millions of worldwide iPhone users who rely on Google for maps or search.

Storing location data in violation of a user’s preferences is wrong, said Jonathan Mayer, a Princeton computer scientist and former chief technologist for the Federal Communications Commission’s enforcement bureau. A researcher from Mayer’s lab confirmed the AP’s findings on multiple Android devices; the AP conducted its own tests on several iPhones and found the same behavior.

“If you’re going to allow users to turn off something called ‘Location History,’ then all the places where you maintain location history should be turned off,” Mayer said.

Google says it is being perfectly clear.

“There are a number of different ways that Google may use location to improve people’s experience, including: Location History, Web and App Activity, and through device-level Location Services,” Google said in a statement to the AP. “We provide clear descriptions of these tools, and robust controls so people can turn them on or off, and delete their histories at any time.”

To stop Google from saving these location markers, the company says, users can turn off another setting, though it doesn’t specifically reference location information. Called “Web and App Activity,” that setting stores a variety of information from Google apps and websites to your Google account.

When paused, it will prevent activity on any device from being saved to your account. But leaving “Web & App Activity” on and turning “Location History” off only prevents Google from adding your movements to the “timeline,” its visualization of your daily travels. It does not stop Google’s collection of other location markers.

You can see these stored location markers on a page in your Google account at myactivity.google.com. It’s possible, though laborious, to delete them.

To demonstrate how powerful these other markers can be, the AP created a visual map of the movements of Princeton postdoctoral researcher Gunes Acar, who carried an Android phone with Location history off and shared a record of his Google account.

The map includes Acar’s train commute on two trips to New York and visits to the High Line park, Chelsea Market, Hell’s Kitchen, Central Park and Harlem.

Huge tech companies are under increasing scrutiny over their data practices, following a series of privacy scandals at Facebook and new data-privacy rules recently adopted by the European Union.

Critics say Google’s insistence on tracking its users’ locations stems from its drive to boost advertising revenue.

“They build advertising information out of data,” said Peter Lenz, the senior geospatial analyst at Dstillery, a rival advertising technology company. “More data for them presumably means more profit.”

The AP learned of the issue from K. Shankari, a graduate researcher at UC Berkeley who studies the commuting patterns of volunteers in order to help urban planners. She noticed that her Android phone prompted her to rate a shopping trip to Kohl’s, even though she had turned Location History off.

“I am not opposed to background location tracking in principle,” she said. “It just really bothers me that it is not explicitly stated.”

Google offers a more accurate description of how Location History works in a popup when you pause the setting on your Google account webpage . It notes that “some location data may be saved as part of your activity on other Google services, like Search and Maps.”

There’s another obscure notice if you turn off and re-activate the “Web & App Activity” setting. It notes that the setting “saves the things you do on Google sites, apps, and services … and associated information, like location.”

The warnings offered when you turn Location History off via Android and iPhone device settings are more difficult to interpret.

Since 2014, Google has let advertisers track the effectiveness of online ads at driving foot traffic , a feature that Google has said relies on user location histories.

Racketeering and the Bloody Streets of Chicago

The news reports, the headlines and numbers are head-shaking. It has to be difficult to listen to the police radios calling due to emergencies all over the city. The reporters are tasked with getting names, ages, locations and getting interviews and responses from law enforcement.

Merely reading the article from the Chicago Tribune from a very bloody weekend in Chicago was hard to finish. Getting crime statistics from the Windy City is one thing, believing them is another.

Is crime just part of Chicago’s DNA, a permanent condition given those like Dillinger, Capone or Durkin? From the earliest days of the Bureau, it was clear that agents were permanently needed in two cities—New York and Chicago. By July 21, 1908, several days before the FBI’s official birthday, the Department of Justice had assigned four special agents to Chicago.

The FBI Chicago Field Office grew larger.

On August 27, 1964, the Chicago Division moved into new space located in the just completed E.M. Dirksen Federal Building and Courthouse. Located at 219 South Dearborn Street in Chicago’s “Loop,” the Chicago FBI occupied the entire ninth floor of the building. Marlin W. Johnson was the special agent in charge, and the office included 281 special agents and 185 support employees. The Dirksen building remained the home of the division for the next 42 years. During that time, the office expanded to occupy the entire eighth and 10th floors and part of the 11th floor.

In October 1969, violent members of a radical group known as the Students for a Democratic Society (SDS) bombed a Chicago police memorial and fomented the “Days of Rage” riot in Chicago. An offshoot of SDS called the Weathermen—later the Weather Underground Organization—which evolved into a domestic terrorist group that used bombings, robberies, arson, and other illegal acts to further its radical political agenda. Chicago agents, along with other field offices across the country, thoroughly investigated this organization and its activities. In 1974, the Chicago Division produced an extensive summary of the group’s motivations and activities.

The FALN (Fuerzas Armadas de Liberación National/Armed Forces of National Liberation)—which advocated Puerto Rican Independence—was another 1970s terrorist group subject to intense investigation by the Chicago Division. In the early morning hours of October 27, 1975, bombs exploded outside three Chicago Loop office buildings, including the Sears Tower. A fourth device was found outside the Standard Oil building, but was disarmed before detonating.

In the late 1970s, the division opened what ended up being the FBI’s longest-running domestic terrorism investigation. On May 28, 1978, a bomb exploded at the University of Illinois at Chicago, injuring one individual. In 1979, an FBI-led task force that included the Bureau of Alcohol, Tobacco, and Firearms and the U.S. Postal Inspection Service was formed to investigate the “UNABOM” case—code-named for the UNiversity and Airline BOMbing targets involved. Sixteen more bombings took place over the next 17 years, killing three and injuring more than 20 people. FBI Chicago, along with nearly all of the FBI’s 56 field offices, pursued this terrorist throughout the 1980s and into the 1990s. After an extensive investigation—and a tip from the bomber’s brother—the FBI arrested Theodore Kaczynski in April 1996. Kaczynski ultimately pled guilty and was sentenced to life in prison for his crimes.

Operation Family Secrets—began in 1999 and culminated in 2005 with the indictment and arrest of 14 known or suspected members of a Chicago organized crime group for 18 unsolved mob hits. A Chicago policeman and Cook County sheriff’s deputy were also charged. The defendants all either pled guilty, were convicted in court, or died prior to trial. Read more detail here.

So, now we have a sanctuary city where gangs and illegals own the streets. Mayor Rahm Emanuel either cant get control of the city or refuses to do so. So, the people of Chicago are protesting, demanding he resign. While there is clearly political corruption in the Mayor’s office, racketeering is nothing new in Chicago. Remember Tony Rezko? He was a former fundraiser for Obama and close friend. Then there was the mortgage scandal for the land slated to be part of the Olympic Park in 2009. Moving forward to 2018, there are shady operations going on with the Obama Presidential Library.

But is there corruption within the ranks of Chicago law enforcement? Appears so.

Just this part February, multiple members of a Chicago Police Department anti-gang unit have been stripped of their authority following a federal probe into allegations that they robbed drug dealers.

In 2016, 762 homicides last year and more than 4,000 people wounded—has been described as an epidemic. Primarily gang-related, the shootings are often spontaneous and unpredictable, and the toll on victims, families, and entire communities cannot be overstated. That’s why the FBI’s Chicago Division, working with the Chicago Police Department (CPD) and other agencies, has undertaken significant measures to address the problem.

Flowers, candles, and a t-shirt that says “Justice for Marc” mark the spot where an individual was killed in Chicago.  photo

The tasks appear to be too daunting for the FBI in Chicago as they work with law enforcement officials.

That effort involves three major areas:

  • The creation in 2016 of a homicide task force—in addition to the FBI’s existing violent crimes squad—in which agents work alongside CPD detectives and other law enforcement officers to assist in solving the city’s murder cases;
  • Increased intelligence-gathering efforts to identify shooters and “directors of violence,” which includes embedding FBI analysts at CPD headquarters; and
  • Stepping up community outreach efforts to gain the public’s trust and enlist their help in solving crimes and making communities safer.

U.S. is on the Offensive, Espionage and Cyber

In the last few weeks, there was the Aspen Security Forum, a 3 day event. Then there was a DNI report. Then came 2 separate nationwide conference calls hosted by CERT, the cyber division of DHS.

A remarkable White House press briefing included the heads of intelligence agencies explaining the condition of cyber/espionage and the countermeasures against Russia.

Then there is the military side, a division frankly not well known, the Defense Security Services.

 

See the whole 2 page release here.

 

 

 

 

 

 

 

 

 

 

And there is more:

FBI Releases Article on Securing the Internet of Things

The Federal Bureau of Investigation (FBI) has released an article on the risks associated with internet-connected devices, commonly referred to as the Internet of Things (IoT). FBI warns that cyber threat actors can use unsecured IoT devices as proxies to anonymously pursue malicious cyber activities.

As our reliance on IoT becomes an important part of everyday life, being aware of the associated risks is a key part of keeping your information and devices secure. NCCIC encourages users and administrators to review the FBI article for more information and refer to the NCCIC Tip Securing the Internet of Things.

*** IOT?

The internet of things, at its simplest level, is a network of smart devices – from refrigerators that warn you when you’re out of milk to industrial sensors – that are connected to the internet so they can share data, but IoT is far from a simple challenge for IT departments.

Related reading: Five IoT Predictions For 2019

For many companies, it represents a vast influx of new devices, many of which are difficult to secure and manage. It’s comparable to the advent of BYOD, except the new gizmos are potentially more difficult to secure, aren’t all running one of three or four basic operating systems, and there are already more of them.

A lot more, in fact – IDC research says that there are around 13 billion connected devices in use worldwide already, and that that number could expand to 30 billion within the next three years. (There were less than 4 billion smartphone subscriptions active around the world in Ericsson’s most recent Mobility Report.)

With a huge number of companies “doing IoT” – most big-name tech companies, including Google, Microsoft, Apple, Cisco, Intel, and IBM have various types of IoT play – all working to bring as many users as possible into their respective ecosystems, motivation to make sure IoT systems and devices from different companies all work with each other is sometimes lacking.

Internet of Things photo

The problem, of course, is that nobody’s willing to give up on the idea of their own ecosystem becoming a widely accepted standard – think of the benefits to the company whose system wins out! – and so the biggest players in the space focus on their own systems and development of more open technologies lags behind. More here.

Night Wolves, Putin’s Hells Angels

The Slovak foreign ministry says it is “disturbing” that the Night Wolves – a Russian nationalist biker gang close to President Vladimir Putin – now have a base in Slovakia.

The base has old military vehicles and lies in Dolna Krupa, a village 70km (44 miles) from the capital Bratislava.

The Russian government calls it the Night Wolves’ “European headquarters”.

The bikers are under US sanctions, accused of providing military help for the pro-Russian rebels in Ukraine.

Russian Nationalist biker gang Night Wolves set up base in ...  story/photo

 

So close in fact, Putin rode with them and endorses the group.

Earlier this year, the Night Wolves did a 9 day tour. Bosnia? Yes.  Members of the Night Wolves motorcycle gang visiting a monastery in Serbia. The gang’s tour, funded with a grant from the Kremlin, was billed as a “pilgrimage” meant to showcase the shared Orthodox faith of Russia and the region.CreditLaura Boushnak for The New York Times

Heck, the rode through the Balkins.

The Night Wolves billed their tour, funded with a $41,000 grant from the Kremlin, as a “pilgrimage” meant to showcase the shared Orthodox faith of Russia and the region, at least the bits of it inhabited by ethnic Serbs like Republika Srpska, which is legally part of Bosnia and Herzegovina.

***

Performances organized by the Russian hyper-patriotic biker club Night Wolves stand as prime examples of the Kremlin’s new take on old propaganda efforts. Their spectacles tend to display the full gamut of the Kremlin’s imagery and messaging, from the evil of the United States and Ukrainians to the glorification of the Russian Orthodox Church and the Russian military.

An analysis of Night Wolves spectacles reveals how the Kremlin’s agent provocateurs make use of the fuzzy lines between patriotism, pro-Putinism, Russian Orthodoxy, civic/national duty, and militarism. The purposes of these anti-American scripts are many, not least of which is to garner psychological and physical support for the motherland one way or the other, especially during the Euromaidan era, but also to create a sense of Russian identity, which has been vacuous since the early 1990s. The alarming aspect is that these types of fantastical attractions can transform patriotic attendees into actual networks of gun-toting Russian combatants, which may be part of the government’s objective. Read more here, chilling operation concocted by the Kremlin.

Rock videos supporting the Night Wolves? Yes, glad you asked.

 

Did they have some role in Crimea and Ukraine? Yup. In 2014:

As night fell on Friday , there were signs that the Ukrainian peninsula of Crimea was slipping beyond Kiev’s reach. The parliament remained under siege by pro-Russian protesters, armed men of unknown allegiance were guarding the airports and the Night Wolves, a biker gang with close ties to the Kremlin, blockaded the roads.

Three hundred men in military uniforms with no identifying insignia had entered the Sevastopol airport compound on Thursday night, witnesses said, in what Ukraine’s new interior minister, Arsen Avakov, described as a “military invasion and occupation”.

***

In 2014, the U.S. Treasury added the Night Wolves to the sanctions list due to Crimea and in violation of the Minsk Agreement.

The Night Wolves biker group had its members serve in the Crimean self-defense forces as early as February 2014, which supported local Crimeans against the Government of Ukraine. In March 2014, the Night Wolves conducted intimidation and criminal activities within Ukraine and also abducted and subsequently assaulted a Ukrainian Border Guard official. This biker group also participated in the storming of the gas distribution station in Strikolkove and the storming of the Ukrainian Naval Forces Headquarters in Sevastopol. In early-April 2014, the Night Wolves helped smuggle a former senior Ukrainian official out of Ukraine and also helped obtain Russian passports for another larger group of senior Ukrainian officials that they helped get into Russia. The Night Wolves have been closely connected to the Russian special services, have helped to recruit separatist fighters for Donetsk and Luhansk, Ukraine, and were deployed to the cities of Luhansk and Kharkiv. The Night Wolves group is being designated because it is an entity that is responsible for or complicit in, or has engaged in, directly or indirectly, actions or policies that threaten the peace, security, stability, sovereignty, or territorial integrity of Ukraine.

Aleksandr Zaldostanov, also known as “the Surgeon,” is the leader of the Night Wolves. Zaldostanov chairs the overall Night Wolves organization, and some of his responsibilities include the punishing of chapter groups and members for disloyalty to the Night Wolves organization. During the late-March storming of the Ukrainian Naval Forces Headquarters in Sevastopol, he coordinated the confiscation of Ukrainian weapons with the Russian forces. Zaldostanov is being designated for being a leader of a group, the Night Wolves, that is engaging in, directly or indirectly, actions or policies that threaten the peace, security, stability, sovereignty, or territorial integrity of Ukraine.

 

 

Eligible Receiver 97, Red Team Being Applied Today for Cyber Hacks?

An early classified Defense Department cybersecurity exercise named “Eligible Receiver 97” (ER97) featured a previously unpublicized series of mock terror attacks, hostage seizures, and special operations raids that went well beyond pure cyber activities in order to demonstrate the potential scope of threats to U.S. national security posed by attacks in the cyber domain, according to recently declassified documents and a National Security Agency (NSA) video posted today by the nongovernmental National Security Archive at The George Washington University.

“Joint Exercise Eligible Receiver 97”, run during the Clinton presidency, is frequently pointed to as a critical event in the United States’ appreciation of threats in cyber space. The exercise led directly to the formation of what would eventually become United States Cyber Command (USCYBERCOM) and informed key studies such as the formative Marsh Report on critical infrastructure protection. Despite the significance of ER97, however, very little is publicly known about the exercise itself.

ER97 involved an NSA Red Team playing the role of North Korean, Iranian and Cuban hostile forces whose putative aim was to attack critical infrastructure as well as military command-and-control capabilities to pressure the U.S. government into changing its policies toward those states. An interagency Blue Team was required to provide recommendations to personnel enacting defensive responses. Until now, only two phases out of three (infrastructure and command-and-control) had been publicly known.  The video and documents posted today provide new details about the third phase involving kinetic attacks in the physical domain – i.e. more traditional terrorist assaults on civilian targets – which were built upon intelligence gathered through the Red Team’s successes. Read more here on the declassified files.

*** With all the cyber terror going on today in the United States, are we doing more ‘red team’ exercises? Perhaps some of those tactics are paying off many years later.

3 Carbanak (FIN7) Hackers Charged With Stealing 15 Million ...

Three Members of Notorious International Cybercrime Group “Fin7” in Custody for Role in Attacking Over 100 U.S. Companies

Victim Companies in 47 U.S. States; Used Front Company ‘Combi Security’ to Recruit Hackers to Criminal Enterprise

          SEATTLE – Three high-ranking members of a sophisticated international cybercrime group operating out of Eastern Europe have been arrested and are currently in custody facing charges filed in U.S. District Court in Seattle, announced U.S. Attorney Annette L. Hayes, Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division and Special Agent in Charge Jay S. Tabb Jr. of the FBI’s Seattle Field Office.

According to three federal indictments unsealed today, Ukrainian nationals Dmytro Fedorov, 44, Fedir Hladyr, 33, and Andrii Kolpakov, 30, are members of a prolific hacking group widely known as FIN7 (also referred to as the Carbanak Group and the Navigator Group, among other names).  Since at least 2015, FIN7 members engaged in a highly sophisticated malware campaign to attack more than 100 U.S. companies, predominantly in the restaurant, gaming, and hospitality industries.  As set forth in the indictments, FIN7 hacked into thousands of computer systems and stole millions of customer credit and debit card numbers which were used or sold for profit.

In the United States alone, FIN7 successfully breached the computer networks of businesses in 47 states and the District of Columbia, stealing more than 15 million customer card records from over 6,500 individual point-of-sale terminals at more than 3,600 separate business locations.  Additional intrusions occurred abroad, including in the United Kingdom, Australia, and France.  Companies that have publicly disclosed hacks attributable to FIN7 include such familiar chains as Chipotle Mexican Grill, Chili’s, Arby’s, Red Robin and Jason’s Deli.  Additionally here in Western Washington FIN7 targeted the Emerald Queen Casino (EQC) and other local businesses.  The Emerald Queen Casino was able to stop the intrusion and no customer data was stolen.

“Protecting consumers and companies who use the internet to conduct business – both large chains and small ‘mom and pop’ stores — is a top priority for all of us in the Department of Justice,” said U.S. Attorney Annette L. Hayes.  “Cyber criminals who believe that they can hide in faraway countries and operate from behind keyboards without getting caught are just plain wrong.  We will continue our longstanding work with partners around the world to ensure cyber criminals are identified and held to account for the harm that they do – both to our pocketbooks and our ability to rely on the cyber networks we use.”

“The three Ukrainian nationals indicted today allegedly were part of a prolific hacking group that targeted American companies and citizens by stealing valuable consumer data, including personal credit card information, that they then sold on the Darknet,” said Assistant Attorney General Benczkowski.  “Because hackers are committed to finding new ways to harm the American public and our economy, the Department of Justice remains steadfast in its commitment to working with our law enforcement partners to identify, interdict, and prosecute those responsible for these threats.”

“The naming of these FIN7 leaders marks a major step towards dismantling this sophisticated criminal enterprise,” said Special Agent in Charge Jay S. Tabb Jr., of the FBI’s Seattle Field Office.  “As the lead federal agency for cyber-attack investigations, the FBI will continue to work with its law enforcement partners worldwide to pursue the members of this devious group, and hold them accountable for stealing from American businesses and individuals.”

Each of the three FIN7 conspirators is charged with 26 felony counts alleging conspiracy, wire fraud, computer hacking, access device fraud, and aggravated identity theft.

In January 2018, at the request of U.S. officials, foreign authorities separately arrested Ukrainian Fedir Hladyr and a second FIN7 member, Dmytro Fedorov.  Hladyr was arrested in Dresden, Germany, and is currently detained in Seattle pending trial.  Hladyr allegedly served as FIN7’s systems administrator who, among other things, maintained servers and communication channels used by the organization and held a managerial role by delegating tasks and by providing instruction to other members of the scheme.  Hladyr’s trial is currently scheduled for October 22, 2018.

Fedorov, a high-level hacker and manager who allegedly supervised other hackers tasked with breaching the security of victims’ computer systems, was arrested in Bielsko-Biala, Poland.  Fedorov remains detained in Poland pending his extradition to the United States.

In late June 2018, foreign authorities arrested a third FIN7 member, Ukrainian Andrii Kolpakov in Lepe, Spain.  Kolpakov, also is alleged to be a supervisor of a group of hackers, remains detained in Spain pending the United States’ request for extradition.

According to the indictments, FIN7, through its dozens of members, launched numerous waves of malicious cyberattacks on numerous businesses operating in the United States and abroad.  FIN7 carefully crafted email messages that would appear legitimate to a business’ employee, and accompanied emails with telephone calls intended to further legitimize the email. Once an attached file was opened and activated, FIN7 would use an adapted version of the notorious Carbanak malware in addition to an arsenal of other tools to ultimately access and steal payment card data for the business’ customers. Since 2015, many of the stolen payment card numbers have been offered for sale through online underground marketplaces. (Supplemental document “How FIN7 Attacked and Stole Data” explains the scheme in greater detail.)

FIN7 used a front company, Combi Security, purportedly headquartered in Russia and Israel, to provide a guise of legitimacy and to recruit hackers to join the criminal enterprise.  Combi Security’s website indicated that it provided a number of security services such as penetration testing.  Ironically, the sham company’s website listed multiple U.S. victims among its purported clients.

 

The charges in the indictments are merely allegations, and the defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

The indictments are the result of an investigation conducted by the Seattle Cyber Task Force of the FBI and the U.S. Attorney’s Office for the Western District of Washington, with the assistance of the Justice Department’s Computer Crime and Intellectual Property Section and Office of International Affairs, the National Cyber-Forensics and Training Alliance, numerous computer security firms and financial institutions, FBI offices across the nation and globe, as well as numerous international agencies. Arrests overseas were executed in Poland by the “Shadow Hunters” from CBŚP (Polish Central Bureau of Investigation); in Germany by LKA Sachsen – Dezernat 33, (German State Criminal Police Office) and the Polizeidirektion Dresden (Dresden Police); and in Spain by the Grupo de Seguridad Logica within the Unidad de Investigación Technologica of the Cuerpo Nacional de Policía (Spanish National Police).

This case is being prosecuted by Assistant U.S. Attorneys Francis Franze-Nakamura and Steven Masada of the Western District of Washington, and Trial Attorney Anthony Teelucksingh of the Justice Department’s Computer Crime and Intellectual Property Section.

how_fin7_attacked_and_stole_data.pdf