Apply More Shame to Facebook

Okay, so without much media attention, YouTube was just fined $170 million for children’s privacy violations. Hello Google? WTH? This was a settlement by the way between Google and the Federal Trade Commission.

But what about Facebook and protecting our data? We have heard and read items about how casual Facebook is with out data. But hold on, there is more.

Primer: Cambridge Analytica was a cyber spy network with political operations and twisted tactics.

In part:

The company at the centre of the Facebook data breach boasted of using honey traps, fake news campaigns and operations with ex-spies to swing election campaigns around the world, a new investigation reveals.

Executives from Cambridge Analytica spoke to undercover reporters from Channel 4 News about the dark arts used by the company to help clients, which included entrapping rival candidates in fake bribery stings and hiring prostitutes to seduce them.

In one exchange, the company chief executive, Alexander Nix, is recorded telling reporters: “It sounds a dreadful thing to say, but these are things that don’t necessarily need to be true as long as they’re believed.” More here.

Meanwhile:

Techcrunch: Hundreds of millions of phone numbers linked to Facebook accounts have been found online.

The exposed server contained more than 419 million records over several databases on users across geographies, including 133 million records on U.S.-based Facebook users, 18 million records of users in the U.K., and another with more than 50 million records on users in Vietnam.

But because the server wasn’t protected with a password, anyone could find and access the database.

Each record contained a user’s unique Facebook ID and the phone number listed on the account. A user’s Facebook ID is typically a long, unique and public number associated with their account, which can be easily used to discern an account’s username.

But phone numbers have not been public in more than a year since Facebook restricted access to users’ phone numbers.

TechCrunch verified a number of records in the database by matching a known Facebook user’s phone number against their listed Facebook ID. We also checked other records by matching phone numbers against Facebook’s own password reset feature, which can be used to partially reveal a user’s phone number linked to their account.

Some of the records also had the user’s name, gender and location by country.

fb 3 2

This is the latest security lapse involving Facebook data after a string of incidents since the Cambridge Analytica scandal, which saw more than 80 million profiles scraped to help identify swing voters in the 2016 U.S. presidential election.

Since then the company has seen several high-profile scraping incidents, including at Instagram, which recently admitted to having profile data scraped in bulk.

This latest incident exposed millions of users’ phone numbers just from their Facebook IDs, putting them at risk of spam calls and SIM-swapping attacks, which relies on tricking cell carriers into giving a person’s phone number to an attacker. With someone else’s phone number, an attacker can force-reset the password on any internet account associated with that number.

Sanyam Jain, a security researcher and member of the GDI Foundation, found the database and contacted TechCrunch after he was unable to find the owner. After a review of the data, neither could we. But after we contacted the web host, the database was pulled offline.

Jain said he found profiles with phone numbers associated with several celebrities.

Facebook spokesperson Jay Nancarrow said the data had been scraped before Facebook cut off access to user phone numbers.

“This data set is old and appears to have information obtained before we made changes last year to remove people’s ability to find others using their phone numbers,” the spokesperson said. “The data set has been taken down and we have seen no evidence that Facebook accounts were compromised.”

But questions remain as to exactly who scraped the data, when it was scraped from Facebook and why.

Facebook has long restricted developers‘ access to user phone numbers. The company also made it more difficult to search for friends’ phone numbers. But the data appeared to be loaded into the exposed database at the end of last month — though that doesn’t necessarily mean the data is new.

This latest data exposure is the most recent example of data stored online and publicly without a password. Although often tied to human error rather than a malicious breach, data exposures nevertheless represent an emerging security problem.

In recent months, financial giant First American left data exposed, as did MoviePass and the Senate Democrats.

Feds Prepare States for Foreign Voting Interference

The Democrats have really lost their argument against voter ID if they are being fully candid about foreign interference. It is without question that several cities and states are victims of ransomware and Florida is especially concerned. Remember that a foreign actor, where clues point to Russia were able to gain access to voter registration databases and it stands to reason China will attempt the same.

Continually, the Democrats say that the Trump administration is virtually doing nothing to protect the election system. Read on as the Democrats know the mission and actions of the Cyber division of the Department of Homeland Security.

Image result for foreign hackers us voting systems photo
As Reuters reports:

The U.S. government plans to launch a program in roughly one month that narrowly focuses on protecting voter registration databases and systems ahead of the 2020 presidential election.

These systems, which are widely used to validate the eligibility of voters before they cast ballots, were compromised in 2016 by Russian hackers seeking to collect information. Intelligence officials are concerned that foreign hackers in 2020 not only will target the databases but attempt to manipulate, disrupt or destroy the data, according to current and former U.S. officials.

“We assess these systems as high risk,” said a senior U.S. official, because they are one of the few pieces of election technology regularly connected to the Internet.

The Cybersecurity Infrastructure Security Agency, or CISA, a division of the Homeland Security Department, fears the databases could be targeted by ransomware, a type of virus that has crippled city computer networks across the United States, including recently in Texas, Baltimore and Atlanta.

“Recent history has shown that state and county governments and those who support them are targets for ransomware attacks,” said Christopher Krebs, CISA’s director. “That is why we are working alongside election officials and their private sector partners to help protect their databases and respond to possible ransomware attacks.”

A ransomware attack typically locks an infected computer system until payment, usually in the form of cryptocurrency, is sent to the hacker.

The effort to counter ransomware-style cyberattacks aimed at the election runs parallel to a larger intelligence community directive to determine the most likely vectors of digital attack in the November 2020 election, according to current and former U.S. officials.

“It is imperative that states and municipalities limit the availability of information about electoral systems or administrative processes and secure their websites and databases that could be exploited,” the FBI said in a statement, supporting the Homeland Security initiative.

CISA’s program will reach out to state election officials to prepare for such a ransomware scenario. It will provide educational material, remote computer penetration testing, and vulnerability scans as well as a list of recommendations on how to prevent and recover from ransomware.

These guidelines, however, will not offer advice on whether a state should ultimately pay or refuse to pay ransom to a hacker if one of its systems is already infected.

“Our thought is we don’t want the states to have to be in that situation,” said a Homeland Security official. “We’re focused on preventing it from happening.”

Over the last two years, cyber criminals and nation state hacking groups have used ransomware to extort victims and create chaos. In one incident in 2017, which has since been attributed to Russian hackers, a ransomware virus was used to mask a data deletion technique, rendering victim computers totally unusable.

That attack, dubbed “NotPetya,” went on to damage global corporations, including FedEx and Maersk, which had offices in Ukraine where the malware first spread.

The threat is concerning because of its potential impact on voting results, experts say.

“A pre-election undetected attack could tamper with voter lists, creating huge confusion and delays, disenfranchisement, and at large enough scale could compromise the validity of the election,” said John Sebes, chief technology officer of the ESET Institute, an election technology policy think tank.

The databases are also “particularly susceptible to this kind of attack because local jurisdictions and states actively add, remove, and change the data year-round,” said Maurice Turner, a senior technologist with the Center for Democracy and Technology. “If the malicious actor doesn’t provide the key, the data is lost forever unless the victim has a recent backup.”

Nationwide, the local governments that store and update voter registration data are typically ill-equipped to defend themselves against elite hackers.

State election officials told Reuters they have improved their cyber defenses since 2016, including in some cases preparing backups for voter registration databases in case of an attack. But there is no common standard for how often local governments should create backups, said a senior Homeland Security official.

“We have to remember that this threat to our democracy will not go away, and concern about ransomware attacks on voter registration databases is one clear example,” said Vermont Secretary of State Jim Condos. “We’re sure the threat is far from over.”

 

President Trump, As Long as You are Declassifying…

Providing declassification authority to AG William Barr on all things Russia investigation is a great thing. Patriotic Americans need to understand all the abuses of power that were applied by Democrat operatives since your nomination.

Then as long as there is the matter of Israel and Iran that continues to fester and maintain a political as well as militant component, there are at least two suggestions noted below that will for sure be favorable to your foreign policy and will likely have some positive outcomes for domestic policy.

Let’s go back to 2016 and 2017 shall we? Congressman Louis Gohmert of Texas was part of a hearing where then Eric Holder was the witness. At one point, Gohmert demanded that Holder declassify and release the Holyland Foundation trial documents. ALL OF THEM. tic toc…

Since then, Gohmert is still ringing the bell. He continues to plea for more attention to the Muslim Brotherhood and CAIR so that a legitimate status can be attached to black list those organizations.

So as long as Congresswomen Ilhan Omar and Rashida Tlaib continue the path to attack Israel, consider Gohmert’s presentations.

In both House floor presentations, Congressman Gohmert lays out a cogent argument and rightly so. You can bet that ‘The Squad’ and Speaker Pelosi would certainly feel the political pain. The media? Yes, popcorn ready.

Now, on the Iran component. To remind the reader, there was once a DEA mission called Operation Cassandra. This was a multiple agency investigation with major opportunities to indict so many both at home and abroad. This mission to continue to completion was killed by President Obama because it would have complicated the Obama/Kerry quest to see the JCPOA through to the end. Frankly, Operation Cassandra had many piece parts including Bowe Bergdahl and the Afghanistan thing. Then should also take a long look at Bruce Ohr at the DoJ and his work assignments at the time.

January 7th, 2018 Operation Cassandra Is Awan Contra - YouTube (in full disclosure, I have done several interviews with former DEA Special Agent, Derek Maltz on Operation Cassandra)

For some basic details on Operation Cassandra, note below in part:

In its determination to secure a nuclear deal with Iran, the Obama administration derailed an ambitious law enforcement campaign targeting drug trafficking by the Iranian-backed terrorist group Hezbollah, even as it was funneling cocaine into the United States, according to a POLITICO investigation.

The campaign, dubbed Project Cassandra, was launched in 2008 after the Drug Enforcement Administration amassed evidence that Hezbollah had transformed itself from a Middle East-focused military and political organization into an international crime syndicate that some investigators believed was collecting $1 billion a year from drug and weapons trafficking, money laundering and other criminal activities.

Over the next eight years, agents working out of a top-secret DEA facility in Chantilly, Virginia, used wiretaps, undercover operations and informants to map Hezbollah’s illicit networks, with the help of 30 U.S. and foreign security agencies.

They followed cocaine shipments, some from Latin America to West Africa and on to Europe and the Middle East, and others through Venezuela and Mexico to the United States. They tracked the river of dirty cash as it was laundered by, among other tactics, buying American used cars and shipping them to Africa. And with the help of some key cooperating witnesses, the agents traced the conspiracy, they believed, to the innermost circle of Hezbollah and its state sponsors in Iran.

They followed cocaine shipments, tracked a river of dirty cash, and traced what they believed to be the innermost circle of Hezbollah and its state sponsors in Iran.

But as Project Cassandra reached higher into the hierarchy of the conspiracy, Obama administration officials threw an increasingly insurmountable series of roadblocks in its way, according to interviews with dozens of participants who in many cases spoke for the first time about events shrouded in secrecy, and a review of government documents and court records. When Project Cassandra leaders sought approval for some significant investigations, prosecutions, arrests and financial sanctions, officials at the Justice and Treasury departments delayed, hindered or rejected their requests.

Pros of Buying Drugs at https://canadianbestpills.com/buy-tadapox-online-cheap/ Brick-and-Mortar Pharmacies
When it comes to buying drugs at physical drugstores, you may enjoy a number of privileges such as the ones listed below:
You can always be sure that you are dealing with a certified service provider whose products are licensed and effective posing no risks to your health;
You have a chance to consult a certified pharmacist to get exactly what you need without any risk of getting a wrong product;

The Justice Department declined requests by Project Cassandra and other authorities to file criminal charges against major players such as Hezbollah’s high-profile envoy to Iran, a Lebanese bank that allegedly laundered billions in alleged drug profits, and a central player in a U.S.-based cell of the Iranian paramilitary Quds force. And the State Department rejected requests to lure high-value targets to countries where they could be arrested.

Of course there is more Mr. President. However, if you order release of just these two files in full on a well timed schedule it will play well in your favor and be an excellent counter-measure against the Pelosi lead House, the media, restoring some law and order and give a huge lift to John Bolton and Mike Pompeo’s good work.

 

Historical Look at Afghanistan, US in or Out?

As we hear the talks with the Taliban have concluded with the United States, we have no idea just yet whether the United States will keep troops in country in an unknown quantity. Could it be that the Taliban have truly defeated coalition nations in Afghanistan that victory for the Taliban is real?

What could happen next if the Taliban shares rule of the nation? More Taliban, more al Qaeda, more ISIS? Or could there be another Russian invasion? How about other major conflicts in the future that include the Tajiks, the Uzbecks or maybe the Hazaras? Or China?

In particular, the analysis cites a local media report claiming that local militias of former Tajik Mujahedeen have started to remobilizing alongside the Afghan National Defense and Security Forces in Afghanistan’s Panjshir province because of an uptick in threats against the province from the Taliban. The media report, published by TOLO News, claims the area has “changed to a hub for insurgents’ activities over the past few weeks.”

Afghanistan - Comintern (SH) - for a communist Afhjanistan ... photo

Going back in time:

Genghis Khan took over the territory in the 13th century, but it wasn’t until the 1700s that the area was united as a single country. By 1870, after the area had been invaded by various Arab conquerors, Islam had taken root.

During the 19th century, Britain, looking to protect its Indian empire from Russia, attempted to annex Afghanistan, resulting in a series of British-Afghan Wars (1838-42, 1878-80, 1919-21).

1921

The British, beleaguered in the wake of World War I, are defeated in the Third British-Afghan War (1919-21), and Afghanistan becomes an independent nation. Concerned that Afghanistan has fallen behind the rest of the world, Amir Amanullah Khan begins a rigorous campaign of socioeconomic reform.1926

Amanullah declares Afghanistan a monarchy, rather than an emirate, and proclaims himself king. He launches a series of modernization plans and attempts to limit the power of the Loya Jirga, the National Council. Critics, frustrated by Amanullah’s policies, take up arms in 1928 and by 1929, the king abdicates and leaves the country.

1933

Zahir Shah becomes king. The new king brings a semblance of stability to the country and he rules for the next 40 years.

1934

The United States formally recognizes Afghanistan.

1947

Britain withdraws from India, creating the predominantly Hindu but secular state of India and the Islamic state of Pakistan. The nation of Pakistan includes a long, largely uncontrollable, border with Afghanistan.

1953

The pro-Soviet Gen. Mohammed Daoud Khan, cousin of the king, becomes prime minister and looks to the communist nation for economic and military assistance. He also introduces a number of social reforms including allowing women a more public presence.

1956

Soviet Premier Nikita Khrushchev agrees to help Afghanistan, and the two countries become close allies. More here.

***

Afghanistan “Is On The Path Towards Completing Another Monumental Struggle Of Freedom From American Imperialism In The 21st Century”

“The centennial of Afghanistan gaining independence from the British colonialists will be celebrated on 28th of Assad of the Hijri solar calendar [corresponding with August 19, 2019]. Exactly a century earlier our righteous mujahid predecessors gained freedom from the British occupiers after long drawn-out battles, and as a result Afghanistan became a shining beacon on how to attain freedom from Western imperialists for oppressed people worldwide.

“Sovereignty or political freedom is the God-given right of every nation. A people can only become a peer of others when they are independent in their political actions. Even though some people in the current world order only care about worldly interests and do not give much thought to spiritual values such as independence, freedom and sovereignty… The reality is that the most valued treasure possessed by humanity remains their spiritual values. It is this spirituality that distinguishes humans from other living beings because they seemingly have no other superiority over other beings in worldly matters.

“Even as our Muslim nation remains one of the most underdeveloped in worldly matters due to constant foreign invasions… its spiritual chest is overflowing with riches and pride. Our nation is not only the first to gain independence from the British colonialists but also holds the honor of shattering the Soviet Union and freeing itself from the shackles of communism in the 20th century, and is on the path towards completing another monumental struggle of freedom from American imperialism in the 21st century.”

“All Segments Of The Mujahid Afghan Nation Must Rise To Fulfill Their Religious And Moral Obligation; They Must Back The Mujahideen”

“Now as we are approaching a centennial of independence from British colonialism, this opportunity must be used by our younger generation to diligently study the history of their mujahid forefathers so that they may comprehend that freedom is such an immeasurable blessing that our forefathers fought great prolonged battles over it against British imperialism. And as today the valiant grandchildren [i.e., the Taliban fighters] of this believing nation have presented their heads as offering, they understand full well that a Muslim nation can only live a life of honor when they are independent and free from influence of infidel occupiers. More here.

5 Senators Threaten the Supreme Court

In a case where the National Rifle Association is suing the City of New York, 5 U.S. Senators decide to put their signatures to a letter to the Supreme Court telling the entire panel of judges they are not well and have become too political.

In what is know in legal terms as an Amicus brief, consisting of 25 pages, SENATORS SHELDON WHITEHOUSE,MAZIE HIRONO,RICHARD BLUMENTHAL, RICHARD DURBIN, AND KIRSTEN GILLIBRAND essentially write out this diatribe.

So, we have a legislative branch essentially threatening the Supreme Court. Consider the implications here and read on. Maybe even take notes.

These senators state the court itself needs to heal.

In part: With bare partisan majorities, the Court has influenced sensitive areas like voting rights, partisan gerrymandering, dark money, union power, regulation of pollution, corporate liability, and access to federal court, particularly regarding civil rights and discrimination in the workplace.

Yet this is precisely—and explicitly—what petitioner’s ask the Court to do in this case, in the wake of a multimillion-dollar advertising campaign to shape this Court’s composition, no less, and an industrial-strength influence campaign aimed at this Court.Indeed, petitioners and their allies have made perfectly clear that they seek a partner in a“project”to expand the Second Amendment and thwart gun-safety regulations. Particularly in an environment where a growing majority of Americans believes this Court is “motivated mainly by politics,” rather than by adherence to the law, the Court should resist petitioners’ invitation

Every single time, the corporate and Republican political interests prevailed. The pattern of outcomes is striking; and so is the frequency with which these 5-4 majorities disregarded“conservative” judicial principles like judicial restraint, originalism, stare decisis, and even federalism. Today, fifty-five percent of Americans believe the Supreme Court is “mainly motivated by politics”(up five percent from last year);fifty-nine percent believe the Court is “too influenced by politics”;and a majority now believes the “Supreme Court should be restructured in order to reduce the influence of politics.”Quinnipiac Poll, supranote 2. To have the public believe that the Court’s pattern of outcomes is the stuff of chance(or “the requirements of the law,”The Supreme Court is not well. And the people know it. Perhaps the Court can heal itself before the public demands it be “restructured in order to reduce the influence of politics.”Particularly on the urgent issue of gun control, a nation desperately needs it to heal.

CONCLUSION:

For the foregoing reasons, the Court should vacate and remand with instructions to dismiss. Respectfully submitted,

Sen. Sheldon Whitehouse

Conservative Blog & Conservative News Source for Right of ...