Wednesday, April 13, 2022

Could you detect intruders wandering around your systems? I used to send managers lists of the users they had authorized. Who did these guys belong to?

https://www.databreaches.net/lockbit-ransomware-gang-lurked-in-a-u-s-gov-network-for-months/

LockBit ransomware gang lurked in a U.S. gov network for months

Bill Toulas reports:

A regional U.S. government agency compromised with LockBit ransomware had the threat actor in its network for at least five months before the payload was deployed, security researchers found.
Logs retrieved from the compromised machines showed that two threat groups had compromised them and were engaged in reconnaissance and remote access operations.
The attackers tried to remove their tracks by deleting Event Logs but the pieces of the files remained allowed threat analysts to get a glimpse of the actor and their tactics.

Read more at BleepingComputer.





Contrast with Russia fighting the last war all over again…

https://warontherocks.com/2022/04/new-tech-new-concepts-chinas-plans-for-ai-and-cognitive-warfare/

NEW TECH, NEW CONCEPTS: CHINA’S PLANS FOR AI AND COGNITIVE WARFARE

China is developing a new concept of warfare, which they call intelligentized warfare (智能化战争). First mentioned by the government in 2019, it is an innovative military concept with a focus on human cognition, which Beijing intends to use to bring Taiwan under its control without waging conventional warfare. However, only a few of the many studies on intelligentized warfare have focused on this aspect of human cognition.

Chinese thinkers have clearly stated that the core operational concept of intelligentized warfare is to directly control the enemy’s will. The idea is to use AI to directly control the will of the highest decision-makers, including the president, members of Congress, and combatant commanders, as well as citizens. “Intelligence dominance” or “control of the brain” will become new areas of the struggle for control in intelligentized warfare, putting AI to a very different use than most American and allied discussions have envisioned.

In July 2019, the People’s Liberation Army of China, in its first defense white paper in four years, wrote that “war is evolving in form towards informationized warfare, and intelligentized warfare is on the horizon,” indicating their recognition that a new form of warfare had emerged. Although the Chinese government has not provided its official definition, several Chinese researchers explain this concept as, “integrated warfare waged in land, sea, air, space, electromagnetic, cyber, and cognitive arenas using intelligent weaponry and equipment and their associated operation methods, underpinned by the IoT [internet of things] information system.”





You keep using that word. I do not think it means what you think it means.- Inigo Montoya

https://thenextweb.com/news/muting-your-mic-doesnt-stop-big-tech-recording-your-audio

Muting your mic doesn’t stop big tech from recording your audio

Anytime you use a video teleconferencing app, you’re sending your audio data to the company hosting the services. And, according to a new study, that means all of your audio data. This includes voice and background noise whether you’re broadcasting or muted.

Researchers at the University of Wisconsin-Madison investigated “many popular apps” to determine the extent that video conferencing apps capture data while users employ the in-software ‘mute’ button.

Unfortunately, as this research remains unpublished, we’re unable to confirm the specific apps tested. So, for now, we can’t name and shame them.

However, the efficacy of this paper isn’t necessarily in doubt due to the fact that it’s been accepted to the 2022 Privacy Enhancing Technologies Symposium. We’ll just have to wait and see who gets name-dropped when the paper is published in June.

Per the unpublished paper’s abstract:

Using network traffic that we intercept en route to the telemetry server, we implement a proof-of-concept background activity classifier and demonstrate the feasibility of inferring the ongoing background activity during a meeting — cooking, cleaning, typing, etc. We achieved 81.9% macro accuracy on identifying six common background activities using intercepted outgoing telemetry packets when a user is muted.





More on Clearview…

https://www.bbc.com/news/technology-61055319

How facial recognition is identifying the dead in Ukraine

Mr Toler says that he uses the facial recognition platform FindClone in Russia, and that it's been particularly helpful for identifying dead Russian soldiers.

As with Clearview, FindClone searches through publicly available internet images, including Russian social media pages.

Even people who do not have social accounts can be found.

"They might not have a social media profile but their wives or girlfriends might… sometimes they do have profiles and they live in a small town with a big military base. Or they may have a lot of friends who are currently in their unit", Mr Toler explains, describing FindClone's use as an investigative tool.

This last point is fundamental in understanding the power of facial recognition technology.

It means that even if a person has never had a social media profile, and thinks they've wiped the internet clean of their image - they can still be found. By appearing in a photo uploaded by a friend or simply by being in the background of a random picture on the internet, they are in the database.





Imagine how valuable/useful Grammarly would be if the founders had been native English speakers.

https://www.scmp.com/magazines/style/celebrity/article/3174005/meet-grammarly-founders-max-lytvyn-alex-shevchenko-and

Meet Grammarly founders Max Lytvyn, Alex Shevchenko and Dmytro Lider: the AI app turned Lytvyn and Shevchenko into billionaires – but they still give back to their native Ukraine



No comments: