#AceSecurityNews – Just In: Revealed today Cybercriminals have stolen a massive trove of Norway’s healthcare data in a recent data breach, which likely impacts more than half of the nation’s population private records #AceNewsDesk

#AceNewsReport – Jan.22: Editor in the latest hack of ‘ Medical Records ‘ Nearly Half of the Norway Population Was Exposed in HealthCare Data Breach: An unknown hacker or group of hackers managed to breach the systems of Health South-East Regional Health Authority (RHF) and reportedly stolen personal info and health records of some 2.9 million Norwegians out of the country’s total #AceNewsDesk reports


#AceNewsDesk reports today that it’s just been revealed that a ‘ Massive Health Data Breach ‘ in Norway has been found
: According to The Hacker News says unknown hacker or group of hackers managed to breach the systems of Health South-East Regional Health Authority (RHF) and reportedly stolen personal info and health records of some 2.9 million Norwegians out of the country’s total 5.2 million inhabitants: Health South-East RHA is a healthcare organisation that manages hospitals in Norway’s southeast region, including Østfold, Akershus, Oslo, Hedmark, Oppland, Buskerud, Vestfold, Telemark, Aust-Agder and Vest-Agder………The healthcare organisation announced the data breach on Monday after it had been alerted by HelseCERT, the Norwegian CERT department for its healthcare sector, about an “abnormal activity” against computer systems in the region……..HelseCERT also said the culprits behind the data breach are “advanced and professional” hackers, although it is still unknown as to whether they were managed to exfiltrate data successfully and if so, how many people may have been impacted………So far there’s also no evidence if the stolen data theft has had any consequences for or effects on patients’ safety. However, the healthcare organisation assured that security “measures had been taken to limit the damage caused by the burglary.“………”We are in a phase where we try to get an overview. It’s far too early to say how big the attack is. We are working to acquire knowledge of all aspects, ” NorCERT director Kjetil Nilsen told Norwegian publication VG……….”Everything indicates that it is an advanced player who has the tools and ability to perform such an attack. It can be advanced criminals. There is a wide range of possibilities.”………

Digital healthcare has been growing to satisfy the demands of connected healthcare technology that provides better treatment and improved patient care.

We know that any organisation with a computer is at risk from cyber-attacks both from criminals wanting to extort money and state-sponsored hackers wanting to cause chaos………Since the healthcare sector is part of the critical national infrastructure, alongside water, electricity and transport, it becomes an attractive target for hackers……….Believe it or not, your medical records are worth more to hackers than your stolen credit card details on the dark web markets………Financial data has a finite lifespan, but the information contained in health care records—which includes names, birth dates, policy numbers, diagnosis codes, social security number and billing information—has a much longer shelf life and is rich enough for identity theft………Fraudsters can use this data to create fake identities to do all illegal kinds of stuff in your name, combine a patient number with a false provider number and file fake claims with insurers, and even file fake tax returns using your stolen addresses, phone numbers and employment history……..

Editor says #AceNewsDesk reports & #Brittius says are provided by Sterling Publishing & Media News and all our posts, links can be found at here https://t.me/acenewsdaily and thanks for following as always appreciate every like, reblog or retweet and free help and guidance tips on your PC software or need help & guidance from our experts AcePCHelp.WordPress.Com or you can follow our breaking news posts on AceBreakingNews.WordPress.Com or become a member on Telegram https://t.me/acebreakingnews

#acesecuritynews

#AceSecurityNews – First there was ‘ Fake News ‘ and Facebook provided much of it so that Soros and Gates could provide a ‘ Fake News Detector ‘ and spy on your private data through your browser so we NOW know who the real FAKES are Zuckerberg, Soros and Gates – @AceNewsServices

#AceNewsReport – Jan.28: George Soros and Bill Gates Exposed as the force behind Facebook’s New ‘ Fake News Detector ‘ so they came up with a way to stop it with an extension on your browser …..
soros-gates.jpg?fit=790%2C415

After controversy erupted over Facebook’s plan to use left-leaning, liberal fact-checking organizations to flag “disputed” news — as part of the wholly vapid and unnecessary war on “fake news” — additional information has emerged that won’t quell the public’s misgivings on the situation. Billionaire globalist George Soros is among several liberal ‘luminaries’ funding the social media platform’s latest foray into soft censorship of dissent.

CEO Mark Zuckerberg announced the plan to combat fake news — incidentally, an issue he wasn’t concerned about until the left establishment applied pressure — but was met with consternation and outrage from constitutional rights advocates, alternative media, and right-leaning media for the singular viewpoint of the ostensible fact-checking organizations.

Indeed, Facebook’s announcement it would use third-party fact-checkers from the ‘trusted’ Poynter Institute should have sounded even louder alarm bells, as Poynter receives funding from Soros’ Open Society Foundations, Google, the Craig Newmark Foundation, the Bill & Melinda Gates Foundation, the Omidyar Network, and other extreme left groups.

EBay founder Pierre Omidyar has donated over $30 million to the Clintons and their charities; the Gates have given the Clinton Foundation no less than $25 million; and the loathed George Soros — who donated an unprecedented $27 million to defeat George W. Bush in 2004 — reportedly spent over $25 million on Hillary Clinton and other Democrats this election cycle.

In short, these entities who will be deeming articles legitimate or “disputed” are anything but unbiased. As the Ron Paul Institute notes:

“Never fear. A group of selfless and unbiased philanthropists have stepped forward to offer millions of dollars to assist these ‘fact-checkers’ in their efforts to ferret out and disappear anything they determine to be ‘fake news.’ It seems rather curious, however, that these donors are all in fact in one way or other completely beholden to Hillary Clinton and the left-interventionists of the Democratic Party.”

As admittedly right-slanted Breitbart pointed out, “On Monday, just days before the announcement of the Facebook partnership, Poynter issued a press release revealing that Newmark donated $1 million to the group to fund a faculty chair in journalism ethics.”

That press release states:

“The gift will support a five-year program at Poynter that focuses on verification, fact-checking and accountability in journalism. It’s the largest donation Poynter’s ever received from an individual foundation.

“The Newmark Chair will expand on Poynter’s teaching in journalism ethics and develop certification programs for journalists that commit to ethical decision-making practices. The faculty member will also organize an annual conference on ethics issues at Poynter and be a regular contributor to Poynter.org.”

Ferreting out dis- and misinformation has little, if anything, to do with actual dis- and misinformation, and everything to do with Hillary Clinton and the Democratic establishment’s disgust with Donald Trump and their losing election campaign.

Zuckerberg’s plan will at first entail fact-checking by Politifact, Snopes, FactCheck.org, the Associated Press, and ABC News, with the option to rope more outlets into the effort in the future. But as the Ron Paul Institute reports, the bias in these groups — and their penchant for reporting false information — is astonishing:

“One problem: these organizations themselves are among the biggest purveyors of real fake news! PolitiFact has a whole website dedicated to exposing the organization’s biases. The popular site Snopes is in fact run by a husband and wife out of their home in California. Neither have any background in research or investigative techniques — they just use Google to make their determinations. As for AP and ABC News — they are mainstream media outlets with no clean hands when it comes to propagating fake stories. In fact the Associated Press has a long history of coordinating with governments to produce fake news.

“Political fact checking is not a science. On the contrary, more often than not it carries with it all the biases of any hyper-partisan organization.”

That point should not be overlooked — because as Facebook claims to be combating ‘fake news,’ employing organizations like the Open Society Foundations, Snopes, Google, and, particularly, Politifact in the plan evince the underlying motivation to further an establishment-left agenda — not combat actual, false reports, at all.

In fact, by using the International Fact-Checking Network (IFCN) — funded by the Poynter Institute, and thus Soros, Gates, and the others — Zuckerberg is committing to liberal bias in Facebook newsfeeds and foregoing the last shreds of open idea-sharing the platform originally claimed to embrace.

Although the left often downplays the role Soros plays in global events, his alleged fingerprints in the affairs of nations from the Ukraine to Macedonia to the United States show little more than a pattern of self-interest and profiteering disguised as concern for the public interest.

“Soros has earned his megafortune in part by short selling currencies and causing economic crises. He is credited with breaking the pound on September 16, 1992 in a day that became known in Britain as ‘Black Wednesday.’ He reportedly made $1.2 billion from that crisis. In 2002, he was convicted for insider trading,” Breitbart’s Aaron Klein reports.

With clear favoritism for the left now on display, many conservative press organizations and alternative media outlets, whose bias largely doesn’t represent a particular ideology, have begun discussing leaving Facebook for any social media platform whose running modus operandi refuses censorship of any stripe.

It would behoove the U.S. populace to recognize the war against ‘fake news’ has nothing at all to do with actual fabricated reports and everything to do with funneling thought into one, accepted frame — that of the Democratic establishment.

Facebook, Soros, the Gates’, and Clintonites are trying to make acceptable the idea of spoon-feeding information, and the packaged narrative of news being somehow ‘fake’ does the job handily.

But losing the choice to view competing and sometimes unpleasant viewpoints is the steepest price to pay for the convenience of not being tasked with researching items on your own — and it’s the slipperiest of slopes in an increasingly authoritarian State.

Courtesy of The Free Thought Project

EDITOR NOTES: Thanks for following as always appreciate every like, reblog or retweet also our newspaper is added with all our posts daily below: Private Messages to https://telegram.me/acenewsgroup

All our other main news can be found Ace News Services Our #Breaking144 news as it happens when it happens can be found at #AceBreakingNews

Featured writers posts here:Ace News Room ​Our daily newspaper is here : Ace Worldwide News

@AceNewsServices

Ace Share News

#acesecuritynews

#AceSecurityNews – A new variant of a well-known malware program known as ‘ GOOLICAN ‘ has infected more than one million phones around the world that run older versions of Google’s Android operating system, a security firm reported Wednesday – @AceNewsServices

#AceNewsReport – Dec.01: Android malware infects 1 million phones globally

However because the #malware, dubbed Googlian, is delivered via apps downloaded from non-approved, third-party app sites, it only affects an estimated 1,000 users in the United States.

“The Gooligan campaign most heavily affects Android users in Asia. That’s likely because users there rely more on third-party app stores. In the United States, Android users stick to Google Play for apps,” said Check Point spokeswoman

Ali Donzanti.

The malware campaign, named Googlian, attacks phones running the Android 4 and 5 operating systems, known as Jelly Bean, KitKat and Lollipop, and according to Check Point Software Technologies can potentially access information from users’ other Google accounts.

However, Google said in a blog post that it had found no evidence of other fraudulent activity within affected Google accounts.

The software is part of “GhostPush,” a family of apps that once installed, try to download other apps. Google said that it has been tracking this family of malware since 2014 and so far has detected and prevented the installation of over 150,000 variations of Ghost Push.

The problem almost only affects Android phone users who have downloaded apps from a non-approved Android site. Those who buy their apps on the Google Play store are generally safe, Check Point said.

Google said it has contacted affected users, removed apps associated with the problem and added new protections to its Verify Apps technology.

The problem is similar to an issue that surfaced with malware that could affect iPhones running non-Apple approved apps in 2015.

The moral of the story is that consumers should stick with legitimate sources for their apps, said Dimitri Sirota, CEO of BigID, a data protection company.

“The best policy for avoiding this type of unfortunate situation is to look at the reputation of the purveyor — buy your Gucci from a Gucci store, get your news from a publication with a reputation at stake and download your apps from certified stores like Google Play,” he said.

Google also reminded users of Android phones to keep their devices up to date and thus secure.

Because Ghost Push only uses publicly known vulnerabilities, devices with up-to-date security patches have not been affected,” its blog post said.

Read or Share this story: http://usat.ly/2glzSiU

EDITOR NOTES: Please share and comment on this with consideration for others please …

#acesecuritynews

#AceSecurityNews – MOSCOW: Putins ‘ Red Web’ joining together with China’s Firewall to integrate the country ’s system of internet filtering and control, monitoring your PRIVATE DATA through a state provided Chinese private company Huawei – @AceNewsServices

#AceNewsReport – Nov.29: Putin brings China’s Great Firewall to Russia in cybersecurity pact

Russia has been working on incorporating elements of China’s Great Firewall into the “Red Web”, the country’s system of internet filtering and control, after unprecedented cyber collaboration between the countries.

A decision earlier this month to block the networking site LinkedIn in Russia is the most visible in a series of measures to bring the internet under greater state control.

Legislation was announced this month that gives the Kremlin primacy over cyberspace – the exchange points, domain names and cross-border fibre-optic cables that make up the architecture of the internet.

China and Russia: the world’s new superpower axis?

In the summer, a measure known as Yarovaya’s law was introduced, which requires Russia’s telecoms and internet providers to store users’ data for six months and metadata for three years.

A group of Kremlin and security officials is driving the offensive against internet freedoms. The government fears the web could be used to mobilise protesters and disseminate dangerous ideas and information and it is looking for ways to switch off connections in times of crisis.

The strategy is being developed in close cooperation with China after a string of high-level meetings in Beijing and Moscow this year. At their first cybersecurity forum, in April, top Chinese officials and their Russian counterparts gathered in Moscow for the talks. Delegates included Lu Wei, the head of China’s state internet information office, Fang Binxing, the so-called father of the Great Firewall and Igor Shchyogolev, President Vladimir Putin’s assistant on internet issues and former minister of communications.

“The principal agreement to have a forum was reached by Igor Shchyogolev and Fang Binxing at a meeting in December 2015 in Beijing,” said Denis Davydov, the executive director of the misleadingly named League of Safe Internet, a government-affiliated group that has drafted internet-filtering legislation and recruited teams of volunteers to patrol the web for “harmful content”.

Earlier this year, the security council secretary, Nikolai Patrushev, who was head of the Russian Federal Security Service during Putin’s 2000-08 presidency, had two meetings with Chinese politburo members on information security; and in June, Putin went to Beijing to sign a joint communique about cyberspace.

What the Russians want most from China is technology. Russia has no means of handling the vast amounts of data required by Yarovaya’s law, and it cannot rely on western technologies because of sanctions.

However, the Chinese are willing to lend a hand. In August it was reported that Blat, the Russian telecoms equipment manufacturer, was in talks with Huawei, the Chinese telecoms company, to buy technologies for data storage and produce servers to implement Yarovaya’s law.

The Chinese officials also ensured senior Huawei staff were present at key information security conferences in Russia, and the company was the major sponsor of the Russian information security forum held in Beijing in October.

“Huawei is essentially an arm of the Chinese state, whoever nominally owns it,” said Gordon Chang, author of The Coming Collapse of China. “Its origins are murky, its growth far too fast for a private company in China, state officials support its efforts, and the absence of competition from state enterprises is another important tell.”

The Russians apparently see no other option than to invite Chinese heavyweights into the heart of its IT strategy. “China remains our only serious ‘ally’, including in the IT sector,” said a source in the Russian information technology industry, adding that despite hopes that Russian manufacturers would fill the void created by sanctions “we are in fact actively switching to Chinese”.

In Russia, the strategy for greater collaboration with China has been developed and promoted by top-level Kremlin officials, generals and businessmen. These include Patrushev, Shchyogolev and Konstantin Malofeev, the billionaire founder of Orthodox channel Tsargrad TV who is the subject of EU sanctions for his connections to separatists in Ukraine. The group is believed to be the driving force behind Yarovaya’s law.

On 7 November, China adopted a controversial cybersecurity law that revived international concerns about censorship in the country. In a sign that collaboration between the countries is mutually beneficial, the legislation echoes Russia’s rules on data localisation and requires “critical information infrastructure operators” to be stored domestically – the law LinkedIn fell foul of. It seems the exchange of ideas has already borne fruit.

EDITOR NOTES: Please share and comment on this with consideration for others please …

#acesecuritynews

#AceSecurityNews – Social media can influence your VIEWS on important issues such as the US ELECTION if the news your are reading and the headlines can slant your view as Zuckerberg’s denial of FAKE NEWS takes hold in the media – CHAT BOTS contribute to YOUR VIEWS and help create THEIR NEWS – BE CAREFUL WHAT YOU SAY – @AceNewsServices

#AceNewsReport – Nov.12: Facebook: Social media really can change what people believe Mashable reported on Friday
Https%3a%2f%2fblueprint-api-production.s3.amazonaws.com%2fuploads%2fcard%2fimage%2f282575%2f774de2f853ce442f989f82d7c7fb2751

Facebook CEO Mark Zuckerberg does not believe that fake news on his social network influenced the election. Facebook has recently been plagued with criticism that partisan stories posted on the site helped to influence the U.S. presidential election.

The outcry was so strong that on Thursday Zuckerberg spoke out to defend his company, saying at a conference in San Francisco that the idea is “pretty crazy.” “There is a profound lack of empathy in asserting that the only reason someone could have voted the way they did is because they saw fake news,” he said.

But recent findings from the Pew Research Center suggest the opposite is true, as 20 percent of social media users say they’ve changed their stance on a political issue because of something they saw on sites like Facebook. The shift was usually pessimistic this was the result

Social media causes some users to rethink their views on an issue
// Pew Research Center

Exposure to a range of new ideas and viewpoints that many social media users encounter can occasionally cause people to change their minds about political issues or candidates.

People who said they had changed their minds on [the presidential] candidates often said that social media pointed their opinion in a more negative direction,” Pew research associate Monica Anderson said in a post about the survey that was published Monday….

Editors Notes:

I would remind you that this blog is produced free for the public good and you are welcome to republish or re-use this article or any other material freely anywhere without requesting further permission.

News & Views welcome always published as long as NO bad language or is not related to subject matter.

To keep online information secure, experts recommend keeping your social media accounts private, changing your passwords often, and never answering unsolicited emails or phone calls asking for your personal information. Need help and guidance visit https://acepchelp.wordpress.com and leave a comment or send a private message on Telegram @Aceone31

Ace News Services Site Links Listed Here:

AceTweet This News

#acesecuritynews

#AceSecurityNews FCC: Passes regulation governing sharing ‘ ONLINE HISTORY ‘ with ‘ THIRD PARTIES ‘ without their PERMISSION but this does NOT include PRIVATE DATA YOU SHARE – Be safe and secure only share what you feel safe to share – @AceNewsServices

#AceNewsReport – Oct.28: FCC passes tougher regulations on data sharing by internet companies, angering ISPs
Preview

New rules passed by the Federal Communications Commission (FCC) prohibit internet providers from sharing a user’s online history with third parties without that person’s consent……

Editors Notes:

I would remind you that this blog is produced free for the public good and you are welcome to republish or re-use this article or any other material freely anywhere without requesting further permission.

News & Views welcome always published as long as NO bad language or is not related to subject matter.

To keep online information secure, experts recommend keeping your social media accounts private, changing your passwords often, and never answering unsolicited emails or phone calls asking for your personal information. Need help and guidance visit https://acepchelp.wordpress.com and leave a comment or send a private message on Telegram @Aceone31

Ace News Services Site Links Listed Here:

AceTweet This News

#acesecuritynews

#AceSecurityNews – Full Report: #DDoS Third attack hit last night with everyone blaming everyone a security firm and a writer have said it is most likely linked to ‘ Internet of All Things (IOT) where all devices are linked together of course the simple answer is DON’T LINK ALL YOUR DEVICES TOGETHER – @AceNewsServices

#AceNewsReport – Oct.22: This is an update on Fridays #DDoS Attacks that took down major sites on both social and news media sites that seems to be linked but not proven to ‘ The Internet of All Things ‘ or #IOT as Dyn says #DDoS attacks are coming from millions of IP address at the same time and one source appears to be Internet-connected devices – CNBC

Dyn reports incident has been resolved‘ after 3rd denial of service attack reported nearly 2 hours ago
Dyn says 1st #DDoS attack targeted DNS infrastructure in the US-East region, 2nd attack was ‘distributed in a more global fashion‘; more in-depth analysis expected at later date – statement
http://bit.ly/2dwdApL

Brian Krebs, who covers security news, says distributed denial of service attacks have increased “thanks largely to the broad availability of tools for compromising and leveraging the collective firepower of so-called Internet of Things devices.” Krebs notes that today’s attacks on Dyn – which impacted Twitter, Spotify, Reddit and others – came just hours after a company researcher presented a talk in Dallas on #DDoS attacks. Krebs himself was hit by a major DDoS attack last month that was so large it caused Akamai to kick his blog off their network due to approximately 665 Gigabits of traffic per second
http://bit.ly/2dvHPNy

Flashpoint Researchers: Security intelligence firm Flashpoint’s researchers report they have observed a Mirai botnet attacking Dyn. Forbes reports this botnet consists of thousands of Internet-connected devices such as DVRs and cameras, which are vulnerable to simple hacks. Dyn told CNBC that the “Internet of Things” devices are one source of the ongoing attacks, which have been occurring for about nine hours. http://bit.ly/2eoVwCt

In a tweet, WikiLeaks urged supporters to “stop taking down the US internet,” saying Julian Assange is still alive and the organization is still publishing.
#WikiLeaks has been publishing emails connected to Hillary Clinton campaign, and U.S. officials believe Russia is tied to the hack. Officials have not said who is responsible for Friday’s attacks on Dyn’s DNS infrastructure, which is causing widespread disruption. However, an intelligence official told NBC News it is unlikely these are state sponsored attacks. http://bit.ly/2ep4hwd

Our previous report on attacks #DDOS Report: Domain name servers host Dyn suffering distributed denial-of-service attack, causing outages to several websites – Business Insider reported earlier and since its says services resumed at 09.20:AM ET – @AceNewsServices
// Ace News Services

Editors Notes:

I would remind you that this blog is produced free for the public good and you are welcome to republish or re-use this article or any other material freely anywhere without requesting further permission.

News & Views welcome always published as long as NO bad language or is not related to subject matter.

To keep online information secure, experts recommend keeping your social media accounts private, changing your passwords often, and never answering unsolicited emails or phone calls asking for your personal information. Need help and guidance visit https://acepchelp.wordpress.com and leave a comment or send a private message on Telegram @Aceone31

Ace News Services Site Links Listed Here:

AceTweet This News

#acesecuritynews

#AceSecurityNews Report: Yahoo secretly built software program to search customer’s incoming emails for US intelligence officials, sources tell Reuters; unclear if Yahoo handed over any data but why would you build it in the first place – @AceNewsServices

#AceNewsReport – Oct.04: This is a follow up report on hacking of email accounts back in 2014 ….
https://acenewsservices.wordpress.com/2016/09/22/acesecuritynews-statement-on-the-yahoo-data-breach-the-bbc-report-on-the-yahoo-hack-of-more-than-500-million-accounts-disclosed-today-notes-that-it-appears-to-be-greater-than-recent-prominent-

Report: Yahoo secretly built software program to search customer’s incoming emails for US intelligence officials, sources tell Reuters; unclear if Yahoo handed over any data

http://reut.rs/2dBQpyq

Editors Notes:

I would remind you that this blog is produced free for the public good and you are welcome to republish or re-use this article or any other material freely anywhere without requesting further permission.

News & Views welcome always published as long as NO bad language or is not related to subject matter.

To keep online information secure, experts recommend keeping your social media accounts private, changing your passwords often, and never answering unsolicited emails or phone calls asking for your personal information. Need help and guidance visit https://acepchelp.wordpress.com and leave a comment or send a private message on Telegram @Aceone31

Ace News Services Site Links Listed Here:

AceTweet This News

#acesecuritynews, #nsa

#AceSecurityNews – Russia’s email site Rambler.ru has been breached and 98-million users login details and passwords stolen and being sold online after it was revealed there was NO ENCRYPTION OR HASHING applied but they were just stored on the server in plain text – @AceNewsServices

#AceNewsReport – Sept.07: Russian site ‘hit by huge data breach’_91041872_thinkstockphotos-494914784.jpgLogin names and passwords for more than 98 million users of the Russian Rambler.ru email service have been stolen and put online.

The data included email addresses and passwords that had been stored without any protection, a security firm said.

Leaked Source said the massive cache of credentials dated from 2012 but had only now been leaked and put online.

And it had come from a hacker who had supplied security firms with 43 million user names from music service Last.fm.

Rambler has been described as the Russian equivalent of Yahoo as it offers email services as well as acting as a news and content hub for its users.

Leaked Source broke the news about the breach and said it had verified some of the data with the help of Russian journalists.
Rambler.ru has not responded to requests for comment on the breach.

Leaked Source said passwords associated with login names had been stored with “no encryption or hashing“. Instead, it said, they had been listed in plain text.

Analysis of the long list of passwords showed that “asdasd” was the most popular string, used by more than 723,000 people, it said.

The second most popular password among the 98 million users was “asdasd123“.

In June this year, details of more than 100 million users of the Russian VK.com service were shared online.

Copies of the long list of login names and passwords was offered online at a price of 1 bitcoin (£456).

Editors Notes:

I would remind you that this blog is produced free for the public good and you are welcome to republish or re-use this article or any other material freely anywhere without requesting further permission.

News & Views welcome always published as long as NO bad language or is not related to subject matter.

To keep online information secure, experts recommend keeping your social media accounts private, changing your passwords often, and never answering unsolicited emails or phone calls asking for your personal information. Need help and guidance visit https://acepchelp.wordpress.com and leave a comment or send a private message on Telegram @Aceone31

Ace News Services Site Links Listed Here:

AceTweet This News

#acesecuritynews

#AceSecurityNews – Ahmed Mansoor’s iPhone promised to reveal details about torture in the United Arab Emirates’ prisons. All Mansoor had to do was click the link – @AceNewsServices

#AceNewsReport – Aug.28: Apple tackles iPhone one-tap spyware flaws_90932747_eb00416d-0f27-40e7-9192-cf6afd41fa72.jpgThree flaws in Apple’s iOS operating system are found that meant spyware could be installed with a single tap.

The discovery was made after a human rights lawyer alerted security researchers to unsolicited text messages he had received.

They discovered three previously unknown flaws within Apple’s code.
Apple has since released a software update that addresses the problem.

The two security firms involved, Citizen Lab and Lookout, said they had held back details of the discovery until the fix had been issued.

Apple issues iPhone security update after spyware discovery

iphone-spyware.jpg

The suspicious text message that appeared on Ahmed Mansoor’s iPhone promised to reveal details about torture in the United Arab Emirates’ prisons. All Mansoor had to do was click the link.

Editors Notes:

I would remind you that this blog is produced free for the public good and you are welcome to republish or re-use this article or any other material freely anywhere without requesting further permission.

News & Views welcome always published as long as NO bad language or is not related to subject matter.

To keep online information secure, experts recommend keeping your social media accounts private, changing your passwords often, and never answering unsolicited emails or phone calls asking for your personal information. Need help and guidance visit https://acepchelp.wordpress.com and leave a comment or send a private message on Telegram @Aceone31

Ace News Services Site Links Listed Here:

AceTweet This News

#acesecuritynews

#AceSecurityNews REPORT: EU Wants your ‘ Private Data ‘ and they intend to get it with is plans to extend telecom rules covering security and confidentiality allowing web services and social media companies such as Google and Facebook to make money out of your data and to prevent encryption – @AceNewsServices

#AceNewsReport – Aug.16:.EU plans to extend some telecom rules to web-based providers

EU is planning to extend telecom rules covering security and confidentiality of communications to web services such as Microsoft’s Skype and Facebook’s WhatsApp which could restrict how they use encryption

The rules currently only apply to telecoms providers such as Vodafone and Orange.

According to an internal European Commission document seen by Reuters, the EU executive wants to extend some of the rules to web companies offering calls and messages over the Internet.

Telecoms companies have long complained that web groups such as Alphabet Inc’s Google, Microsoft and Facebook are more lightly regulated despite offering similar services and have called for the EU’s telecoms-specific rules to be repealed.

They have also said that companies such as Google and Facebook can make money from the use of customer data.

Unlike telcos, OTT (web-based) are global players that are allowed to commercially exploit the traffic data and the location data they collect,” telecoms group Orange said in a response to the EU’s public consultation on the reform proposals.

Under the existing “ePrivacy Directive”, Public Consultation on the Evaluation and Review of the ePrivacy Directive | Digital Single Market https://duckduckgo.com/?q=existing%20%22ePrivacy%20Directive%22, telecoms operators have to protect users’ communications and ensure the security of their networks and may not keep customers’ location and traffic data.

The EU rules also allow national governments to restrict the right to confidentiality for national security and law enforcement purposes.

Many tech companies such as Facebook and Google already offer end-to-end encryption on their messaging and email services.

They argue there is no need to extend the telecoms rules to web services and that the EU should not dictate how they protect their users’ communications.

Facebook, which uses full-scale encryption on WhatsApp, said in its response to the Commission’s public consultation that extending the rules to online messaging services would mean they could in effect “no longer be able to guarantee the security and confidentiality of the communication through encryption” because governments would have the option of restricting the confidentiality right for national security purposes.

Proposed changes in 2017 … Commission to propose reform of ePrivacy directive in 2017 – EurActiv.com

https://duckduckgo.com/?q=ePrivacy%20Directive%22,

Editors Notes:

I would remind you that this blog is produced free for the public good and you are welcome to republish or re-use this article or any other material freely anywhere without requesting further permission.

News & Views welcome always published as long as NO bad language or is not related to subject matter.

To keep online information secure, experts recommend keeping your social media accounts private, changing your passwords often, and never answering unsolicited emails or phone calls asking for your personal information. Need help and guidance visit https://acepchelp.wordpress.com and leave a comment or send a private message on Telegram @Aceone31

Ace News Services Site Links Listed Here:

AceTweet This News

#acesecuritynews

` Joint Investigations are Under-Way in US States Over Alleged Cyber-Attacks and Ebays Security Practices '

#AceSecurityNews – UNITED STATES – May 23 – Several U.S. states, including Connecticut, Florida, and Illinois, are jointly leading an investigation into eBay’s security practices, following eBay’s reveal this week of a massive cyber-attack which the company says compromised a large number of users’ personal information.


Courtesy of LoopNews

Though eBay claims that financial data, which was stored separately, was not acquired during this breach, these U.S. States Attorney Generals’ offices are taking the matter seriously after a series of high-profile attacks at retailers like Target, Neiman Marcus and Michael’s have left U.S. consumers vulnerable to identity theft.

#ans2014, #connecticut, #ebay, #florida, #illinois, #united-states

` NSA Records Almost All Domestic and International Phone Calls in Afghanistan ‘

#AceSecurityNews – NSA – May 23 – The NSA records almost all domestic and international phone calls in Afghanistan, similar to what it does in the Bahamas, WikiLeaks’ Julian Assange said.

Reports in the Washington Post and the Intercept had previously reported that domestic and international phone calls from two or more target states had been recorded and stored in mass as of 2013.

Both publications censored the name of one victim country at the request of the US government, which the Intercept referred to as ‘Country X’.

Assange says he cannot disclose how WikiLeaks confirmed the identity of the victim state for the sake of source protection, though the claim can be “independently verified” via means of “forensic scrutiny of imperfectly applied censorship on related documents released to date and correlations with other NSA programs.”


This is not the first time it has been revealed mass surveillance was being conducted on Afghanistan by the NSA. According to a book released by Der Spiegel entitled ‘Der NSA Komplex’, a program called ACIDWASH collects 30-40 million telephony metadata records per day from Afghanistan. ACIDWASH has been identified as being part of the MYSTIC program.

WikiLeaks cannot be complicit in the censorship of victim state X. The country in question is #Afghanistan. https://t.co/vWwU4DJw0I#afpak
— WikiLeaks (@wikileaks) May 23, 2014
The Intercept, which Glenn Greenwald, who first broke the Edward Snowden revelations helped to found, had earlier named the Bahamas as having their mobile calls recorded and stored by a powerful National Security Agency (NSA) program called SOMALGET.

SOMALGET is part of a broader NSA program called MYSTIC, which the the NSA is using to gather metadata – including the numbers dialled and the time and duration of the calls – from phone calls in the Bahamas, Mexico, Kenya and the Philippines. SOMALGET by its nature is far more controversial, however, as it stores actual phone conversations for up to 30 days.

WikiLeaks initially opted not to reveal the name of ‘Country X’ as they were led to believe it could “lead to deaths” by Greenwald. WikiLeaks later accused The Intercept and its parent company First Look Media of censorship, saying they would go ahead and publish the name of the NSA-targeted country.

“We do not believe it is the place of media to ‘aid and abet’ a state in escaping detection and prosecution for a serious crime against a population,” Assange said in the statement.

Read More at: RT – 23/05/2104 – http://tinyurl.com/paehpu9

#ANS2014

#bahamas, #kenya, #mexico, #nsa, #philippines, #wikileaks

` Anti-Secrecy Group WikiLeaks Plans to Publish Name of Country Targeted by NSA ‘

#AceSecurityNewsUNITED STATES – May 21  – Despite warnings that doing so “could lead to increased violence” and potentially deaths, anti-secrecy group WikiLeaks says it plans to publish the name of a country targeted by a massive United States surveillance operation.

Wikileaks and Intercept

On Monday this week, journalists at The Intercept published a report based off of leaked US National Security Agency documents supplied by former contractor Edward Snowden which suggested that the NSA has collected in bulk the contents of all phone conversations made or received in two countries abroad. 

Only one of those nations, however — the Bahamas — was named by The Intercept. The other, journalists Ryan Devereaux, Glenn Greenwald and Laura Poitras wrote this week, was withheld as a result of “credible concerns that doing so could lead to increased violence.”

WikiLeaks has since accused The Intercept and its parent company First Look Media of censorship and says they will publish the identity of the country if the name remains redacted in the original article. The Intercept’s Greenwald fired back over Twitter, though, and said his outlet chose to publish more details than the Washington Post, where journalists previously reported on a related call collection program but chose to redact more thoroughly. 

“We condemn Firstlook for following the Washington Post into censoring the mass interception of an entire nation,” WikiLeaks tweeted on Monday.

“It is not the place of Firstlook or the Washington Post to deny the rights of an entire people to know they are being mass recorded,” WikiLeaks added. “It is not the place of Firstlook or WaPo to decide how people will [choose] to act against mass breaches of their rights by the United States.”

When Greenwald defended his decision to publish the names of four countries where telephony metadata is collected by the NSA but withhold a fifth where content is recorded as well, WikiLeaks said it could be interpreted as meaning that the unknown country doesn’t deserve to know they’re being surveilled, but Greenwald said

The Intercept was “very convinced” it could lead to deaths.

Later, WikiLeaks equated this as an act of racism.

But as the conversation escalated, the WikiLeaks Twitter announced it would disclose the nation’s identify if The Intercept did not, despite requests from the US government to leave that information redact over fears of what the response could be. 

When has true published information harmed innocents?” WikiLeaks asked.“To repeat this false Pentagon talking point is to hurt all publishers.” 

 

“We will reveal the name of the censored country whose population is being mass recorded in 72 hours,” WikiLeaks wrote at 6:35 p.m. EST Tuesday evening.

If the organization intends to uphold that promise, that the identity of the country could be revealed before the weekend. 

Read More at: RT

#ANS2014 

Enhanced by Zemanta

#ans2014, #edward-snowden, #bahamas, #glenn-greenwald, #laura-poitras, #twitter, #united-states, #washington-post, #wikileaks

` Google Must Comply with European Laws on Privacy by Amending Search Results ‘

#AceSecurityNews – EU COURT Of JUSTICE – May 13 – Google must comply with the European laws on privacy and amend some search results, a top EU court ruled on Tuesday, May 13.

English: Google Logo officially released on Ma...

English: Google Logo officially released on May 2010 (Photo credit: Wikipedia)

The European Union Court of Justice said that ordinary people can ask Google to remove some sensitive, irrelevant or outdated information from Internet search results.

Earlier, the search engine stated that it does not control search results and bears no responsibility for personal data that is “in open access”. The responsibility lies with the owner of the website that provides the information, and Google merely presents the user with a link.

The case was brought by a Spanish man who complained that an auction notice of his home that could be found on Google infringed upon his privacy.

Around 180 similar complaints have been filed in Spain.

#ANS2014

Enhanced by Zemanta

#ans2014, #do-not-track-policy, #european-union, #european-union-court-of-justice, #google, #personally-identifiable-information, #spain, #spanish-language, #web-search-engine

` US House of Representatives Approves Legislation to Prevent Bulk Collection of Data ‘

#AceSecurityNewsUNITED STATES – WASHINGTON – NSA – May 08 –  A US House of Representatives committee approved legislation on Wednesday that would limit the National Security Agency’s bulk collection of domestic telephone metadata. By a vote of 32 to 0, the House Judiciary Committee advanced the USA Freedom Act, which would end the NSA’s wholesale gathering and storage of American phone data, leaving telecommunications companies responsible for retaining the records.

The bill would still allow the NSA to collect a person’s phone records, and those of people two “hops” or contacts away, if a judge on the Foreign Intelligence Surveillance Act court, which has been very generous to NSA spying requests in recent years, signs off on the request based on reasonable suspicion of so-called terrorism involvement.

A reform bill deemed as the toughest clampdown yet on the NSA’s collection of phone metadata is expected to move through a key US House committee this week, setting up a showdown between the bill and less stringent legislation supported by House leaders.

House of Representatives Judiciary Committee Chairman Bob Goodlatte (R-VA) will reportedly act on the USA Freedom Act on Wednesday after the bill sat dormant since its introduction in October by former judiciary committee chair and US Patriot Act author Jim Sensenbrenner (R-OH).

The bill is the favored legislative vehicle for privacy advocates that want to see reform of the NSA’s bulk collection of domestic phone call data. Congressional aides believe the bill will pass through the committee with bipartisan support, the Guardian reported. Privacy advocates believe the bill has real potential to pass in a general House vote should it get the chance.

The House Judiciary Committee’s USA Freedom Act was left for dead by House Republican leadership after a competing NSA reform bill was offered in March by House Intelligence Committee Chairman Mike Rogers. The intel committee’s proposal would allow the NSA to continue gathering domestic call data without a prior judicial order.

Hours after the Judiciary Committee announced it would markup its NSA bill on Wednesday, the Intelligence Committee said it would do the same with its own reform bill, the FISA Transparency and Modernization Act, on Thursday. FISA, or the Foreign Intelligence Surveillance Act, dictates US surveillance of “foreign intelligence information” that can include American citizens or permanent residents suspected of terrorism.

Goodlatte’s support for the USA Freedom Act was reportedly in doubt before House Republican leaders decided to bypass his committee effort to reform the NSA in favor of the Intelligence Committee’s more lukewarm legislation.

The Intelligence Committee’s Rogers has criticized the USA Freedom Act for going too far in curbing bulk collection capabilities that, he says, are vital for national security reasons.

Sensenbrenner’s USA Freedom Act was initially more strict in limiting NSA collection abilities, positing that it would “end bulk collection under Section 215 of the Patriot Act, in light of the massive intrusion on Americans’ privacy and the lack of evidence of its effectiveness.”

Ace Related News:

1. FOIA – http://www.gpo.gov/fdsys/pkg/BILLS-113hr3361ih/pdf/BILLS-113hr3361ih.pdf

2. FISA – http://judiciary.house.gov/_cache/files/d4c6f7fd-4768-4b30-813d-47109cac271a/fisa-anos-001-xml.pdf

RT – March 27

Tweet or Share adding @AceNewsServices or #ANS2014  

 

Enhanced by Zemanta

#ans2014, #bob-goodlatte, #foreign-intelligence-surveillance-act, #house-judiciary-committee, #jim-sensenbrenner, #judiciary-committee, #national-security-agency, #nsa, #united-states, #united-states-house-committee-on-the-judiciary, #united-states-house-permanent-select-committee-on-intelligence, #usa-freedom-act

NSA: ` Complex Analysis of Electronic Surveillance used to Target Lethal Drone Attacks ‘

#AceSecurityNews – Guest Post – May 06 – The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people.

According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.

The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere.

His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in Iraq, Afghanistan and Yemen.

In one tactic, the NSA “geolocates” the SIM card or handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device.

The former JSOC drone operator is adamant that the technology has been responsible for taking out terrorists and networks of people facilitating improvised explosive device attacks against U.S. forces in Afghanistan. But he also states that innocent people have “absolutely” been killed as a result of the NSA’s increasing reliance on the surveillance tactic.

One problem, he explains, is that targets are increasingly aware of the NSA’s reliance on geolocating, and have moved to thwart the tactic. Some have as many as 16 different SIM cards associated with their identity within the High Value Target system. Others, unaware that their mobile phone is being targeted, lend their phone, with the SIM card in it, to friends, children, spouses and family members.

Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. “They would do things like go to meetings, take all their SIM cards out, put them in a bag, mix them up, and everybody gets a different SIM card when they leave,” the former drone operator says. “That’s how they confuse us.”

Courtesy of By  and  10 Feb 2014, 12:03 AM EDT

Ace Related News:

  1. First Look

Share or Tweet with #ANS2014 

 

 

 

 

Enhanced by Zemanta

#ans2014, #edward-snowden, #afghanistan, #central-intelligence-agency, #high-value-target, #jeremy-scahill, #joint-special-operations-command, #national-security-agency, #nsa, #subscriber-identity-module

` Telekom Obliged by Law to Give Security Agencies Information to Monitor under the Four Eyes Principle ‘

AceSecurityNews – BERLIN – May 05 – PRESS RELEASE – Telekom is obliged by law to give security agencies under certain conditions and information to enable monitoring. To ensure transparency, the Telekom now publishes the annual figures.

The Telekom pays strict attention to the compliance of telecommunications secrecy and data protection. If authorities intervene in these fundamental rights of citizens, Deutsche Telekom provides the legally impeccable machining state monitoring and requests for information secure. In particular, it is guaranteed that Telekom is active only if the legal conditions are met.

Support services for surveillance activities are thereby rendered strictly in accordance with the four-eyes principle, ie there are always two people involved that monitor each other.

This procedure protects against work errors. The individual processing steps are documented and subject to regular inspection by the safety representative and by the Federal Network Agency. In addition, check the Privacy Officer and the Internal Audit Department of Deutsche Telekom.

The following table shows for the period 2013 arranged by state authorities against the telecom connection monitoring and beauskunfteten traffic data sets, participants inventory data and IP addresses:

Ace Related News:
1. German Telekom Press Release – May 05 – http://tinyurl.com/o4kvkyu
2. Sueddeutsche.de – Article – May 05 – http://tinyurl.com/oxrda4k

#ANS2014

#acesecuritynews, #berlin

` Global Financial Crisis in the Cloud Could Lead to Worst Scenario as Data Here Today and Gone Tomorrow ‘

#AceSecurityNews – UNITED STATES – May 04 – Zurich Insurance has drawn a parallel between the mortgage market problems, which resulted in the global financial crisis seven years ago, and a potential major cloud provider failure, the consequences of which might be just as grave.

“Just imagine if a major cloud service provider had a ‘Lehman moment’, with everyone’s data there on Friday and gone on Monday,” the report written by the Swiss insurance group in cooperation with the Atlantic Council think tank says. “If that failure cascaded to a major logistics provider or company running critical infrastructure, it could magnify a catastrophic ripple running throughout the real economy in ways difficult to understand, model or predict beforehand.”

Problems in the US sub-prime mortgage market in 2008 led to banking crisis which later resulted in a global economic downturn.

The current “interconnected nature of the internet” leads to the increasing danger of cyber risks, spurring similar type of scenario.

“Few people truly understand their own computers or the internet, or the cloud to which they connect, just as few truly understood the financial system as a whole or the parts to which they are most directly exposed,” Chief Risk Officer at Zurich Insurance, Axel Lehman, said in a statement.

The new study says part of the problem in 2008 was that before the credit crunch “risks were assessed by financial institutions individually” and urges governments and organizations not to repeat the same mistake when it comes to tackling cyber threats.

The study warns people against being misled by the fact “the internet has been incredibly resilient (and generally safe) for the past few decades.” With the system getting ever more complex and ever more connected to real life, bigger shocks to it are unavoidable.

A company should no longer focus primarily on its own internal cyber security as an threat might be coming from outsourced services it’s getting or from its suppliers. Those are on the list of the seven “risk pools” the study outlines.

Seven hundred and forty million data files were potentially exposed or stolen worldwide in 2013, making the year the worst in terms of the internet security thus far, according to the statistics given by the On-line Trust Alliance and cited in the survey, which warns that the situation is only going to become aggravated.

“While our society’s reliance on the internet grows exponentially, our control of it only grows linearly, limited by outdated government procedures and ineffective governance.”

One of the major proposals in the report is supporting the idea put forward earlier by Microsoft, of establishing a G20+20 group, 20 governments and 20 global information and communications technology firms – to work out ways of ensuring viable security in cyberspace.

RT – NEXUS – News Sources

Ace Related News:
1 . Swiss Insurance Report – http://www.zurich.com/internet/main/SiteCollectionDocuments/insight/risk-nexus-april-2014-en.pdf

#ANS2014

#united-states

` White House Seeks to Obtain Legislator's Approval over Legal Immunity for Companies Handing over Data '

#AceSecurityNews – WASHINGTON – WHITE HOUSE – (Guardian) – The White House has asked legislators crafting competing reforms of the National Security Agency to provide legal immunity for telecommunications firms that provide the government with customer data, the Guardian has learned.

In a statement of principles privately delivered to lawmakers some weeks ago to guide surveillance reforms, the White House said it wanted legislation protecting “any person who complies in good faith with an order to produce records” from legal liability for complying with court orders for phone records to the government once the NSA no longer collects the data in bulk.

The brief request, contained in a four-page document, echoes a highly controversial provision of the 2008 Fisa Amendments Act, which provided retroactive immunity to the telecommunications companies that allowed the NSA to access calls and call data between Americans and foreigners, voiding lawsuits against them. Barack Obama’s vote for that bill as a senator and presidential candidate disappointed many supporters.

(PressTV) – A senior US administration official described the provision as typical for surveillance law that aims to protect firms that comply with Fisa court orders for customer data.

“This would refer to any new orders issued by the court under the new regime we are proposing. This is similar to the way the rest of Fisa already operates, and Fisa already contains virtually identical language for its other provisions, including Section 215,” the official stated.

A congressional aide said such companies were anticipated to “fight hard” for the provision in order to survive in any other surveillance bill.

Press TV – Guardian
Fisa 2008 Act – http://www.gpo.gov/fdsys/pkg/BILLS-110hr6304enr/pdf/BILLS-110hr6304enr.pdf

#ANS2014

#national-security-agency, #nsa, #us-foreign-intelligence-surveillance-court-fisa, #washington, #white-house