Tuesday, November 19, 2019


Hacker tourism? Travel around the world looking for vulnerable systems.
Turkish cybercriminals hack ATMs in Tripura, steal huge cash
After Assam, suspected cybercriminals from Turkey have stolen huge amounts of cash from ATMs through ATM-cloning devices installed in Tripura’s capital Agartala, police said on Monday.
… SBI’s Regional Manager Dibyendu Chowdhury said that they have so far received complains from 45 customers that they lost their money due to the ATM hacking.
… According to a cyber-technology expert, the ATM card cloning system comprises a spy camera, a memory card and a small data device to gather ATM and account details of bank customers.
Incidents of stealing money of a large number of bank customers from ATMs through ATM cloning devices took place in different parts of the country including Kolkata and Guwahati.




Because suspects are not trustworthy.
The Newspaper.com reports:
California cops may grab your dashcam video without first obtaining a warrant under a state Court of Appeal ruling published last week. A three-judge panel considered the case of motorist Robert Kien Tran, 39, who was driving his Volkswagen Golf on Palomar Mountain Road on November 6, 2016. This twisty route in San Diego County is a favorite for motorcyclists and car enthusiasts, so Tran had GoPro cameras recording his ascent from both the front and rear of the Golf.
Read more on TheNewspaper.com.
[From the article:
"Here the data from Tran's dashboard camera was not viewed or downloaded until after a warrant was obtained," Judge Huffman wrote. "Moreover, Tran had possession of the camera, and Palmer expressed concern that he could destroy the camera or the SD card from the camera…
The appellate court found that taking the camera was justified to preserve the potential evidence.
A copy of the ruling is available in a 150k PDF file at the source link below.
Source: California v. Tran (Court of Appeal, State of California, 11/13/2019)




Consider the capabilities of the technology. The police are inside their target’s computer before they encrypt anything or after they decrypt.
With New Surveillance Technology, Are Encryption Backdoors Still Needed?
… Much of this new surveillance technology is now being sold by a handful of surveillance technology companies, such as Cellebrite and NSO Group, both of them based in Israel. For its part, Cellebrite sells hacking hardware that enables law enforcement authorities to hack open locked and encrypted smartphones. As long as law enforcement officials have the actual smartphone in their possession and are willing to abide by a few ground rules (such as only unlocking smartphones in a secure, designated location), they have the ability to unlock encrypted phones – something that previously was impossible to do without the assistance of the phone manufacturer. When law enforcement authorities tried to get access to the locked iPhone of the infamous San Bernadino mass shooter, they ran into a brick wall when Apple refused to unlock the phone for them. With Cellebrite, though, law enforcement now has access to surveillance technology for unlocking any Android or iPhone.
NSO Group takes a different approach than Cellebrite. Instead of hacking hardware, NSO Group uses “lawful access” software that is implanted on the phone of a criminal suspect or terrorist. Once the software has been implanted, it works like malware, in that it goes to work infecting smartphone and grabbing the images, encrypted data, or contact lists it needs. And NSO Group has even found a way to infiltrate the strong end-to-end encryption of WhatsApp by exploiting a known security vulnerability. In one high-profile case, NSO Group enabled more than 1,400 people to be tracked and monitored as soon as they received a WhatsApp video call. Even if they didn’t answer the video call, the security vulnerability enabled malware to be loaded onto the phones.
The problem here, of course, is that surveillance technology designed with law enforcement agencies in mind is often used for other purposes and by less savory individuals.




Wide ranging article.
AI is the Fourth Industrial Revolution Technology
Moving from the third to the fourth industrial revolution is going to open a new chapter in human development – incorporating the extraordinary technological advances. These advanced technologies are emerging and will continue to merge in the business world. We see the fourth industrial revolution changing the digital, physical, and biological worlds. It is creating novel opportunities and promises of a better future.
Economists say the fourth industrial revolution has a significant tendency to improve the lifestyle of the people all across the globe by raising global income levels. For now, consumers are the ones who are taking the most advantage from the digital world because of AI-powered products and services.
The fourth industrial revolution mainly represents a confluence of different technologies – artificial intelligence, machine learning, augmented, and virtual reality. Internet of things into innovative products, services, and industries.
The Identity verification market is an excellent example of this new AI-powered technology. The impact of these advanced technologies is all set to bring revolution to the business world.
The fourth industrial revolution is expected to profoundly impact national and international security by affecting the nature of conflict and increased probability. Warfare isn’t just a single concept of the traditional battlefield. Now it relies on technological innovations.




Are you smarter than an AI? A bias article.
How To Get Your Résumé Past The Artificial Intelligence Gatekeepers
It’s no longer a secret that getting past the robot résumé readers to a human – let alone land an interview – can seem like trying to get in to see the Wizard of Oz. As the résumés of highly qualified applicants are rejected by the initial automated screening, job seekers suddenly find themselves having to learn résumé submission optimization to please the algorithms and beat the bots for a meeting with the Wizard.


(Related) Getting my students employed.



No comments: