Connect with us

Home Security

Police Spies Use Fake Instagram Accounts

Published

on

Law enforcement uses social media to enhance its power lying and spying on civilians. It’s no secret that the police spies use fake Instagram accounts and have been creating fictitious Facebook profiles for years. Often using the accounts to spy on suspects. Have you been sent a friend request from a random stranger? Your new ‘friend’ may be FBI.

// -- Discuss and ask questions in our community on Workplace.

No search warrant is required for the consensual sharing of this type of information, – William Martini, Federal Judge

For example, officers posing as young women use the accounts to befriend suspected gang members. Police spies use features like ‘Checking In’ to track their locations, gather evidence. In fact, state-sponsored malware has spied on computers for years. Now, a case from New Jersey features evidence proving Police spies use fake Instagram accounts to spy on you.

Also read: Facebook Virus Mining Bitcoin Discovered in Norway

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

Police Spies Use Fake Instagram Accounts, Judge says “OK”

InstagramIn 2012, the NYPD issued a memo to its officers. It stated that police must register these intended arises with the police department. Also, officers must use department-issued laptops. No mention is made of the practice directly violating website terms and conditions.

In a criminal case, United States v. Danial Gatson, police collected data on Gatson via Instagram. Federal Judge, William Martini wrote that not only is the evidence valid but no search warrant is required by agents of the state to begin such collections.

President Bush appointed Martini in 2002. He is one of the twenty-four judges seated on the New Jersey District Court. Martini made his name sentencing the former mayor of Newark to 27 months in prison for corruption. In spite of prosecutors pushing for the maximum sentence of 15 to 20 years.

Martini continues, “Further, defendants are not entitled to demand precise details about the evidence the Government anticipates will be presented at trial…”

Also read: Digital Rights Groups Release Tool to “Detekt” Government Spyware

This is not the first time spying programs have found respite with Martini. In 2014, Martini dismissed a case brought by 8 Muslims alleging police targeted them for surveillance. They claimed the NYPD had spied on mosques, schools, and restaurants. Martini wrote in his decision, “The more likely explanation for the surveillance was to locate budding terrorist conspiracies.”

Why do you pay law enforcement to spy on you? Should Police Spies use fake Instagram Accounts? Comment below.

Images from Bloomua and Shutterstock.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

Cybersecurity

Proposed Law Would Require U.S. Companies to Unlock Encryption under Court Order

Published

on

The encryption controversy in the U.S. isn’t going away anytime soon. Two U.S. senators have proposed requiring companies to unlock encrypted technology when a court calls on them to do so, changing the current law and escalating a conflict between the technology industry and the U.S. government, according to The Wall Street Journal.

// -- Discuss and ask questions in our community on Workplace.
Sen. Richard Burr

Sen. Richard Burr

The conflict that arose when a federal court ordered Apple to help unlock an iPhone used in a terror attack has fueled the encryption controversy.

Sen. Richard Burr, R-N.C., chairman of the Senate Intelligence Committee, and Sen. Diane Feinstein, D-Calif., the panel’s vice chairman, have proposed legislation that addresses one of the most difficult issues facing policymakers, which is how to address the use of private technology on behalf of law enforcement.

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

Law Requires Compliance

The “discussion draft” requires companies served with a court order to give such information or technical assistance when the government wants to obtain encrypted material.

A company would have to help the government if the data has become unintelligible on account of a feature or service that is owned, provided by or created by the covered entity or a third party on the covered entity’s behalf.

Congress has faced pressure to balance privacy and security in regards to encryption. The courts have struggled with the issue, most recently in conflicts between Apple Inc. and the Justice Department over defendants’ encrypted iPhones.

Privacy Versus Security

Burr said he has long believed data is too insecure and he feels strongly that consumers have the right to find solutions protecting their information, which involves strong encryption. He said he does not think those solutions should be above the law.

Sen. Diane Feinstein

Sen. Diane Feinstein

Apple chose not to comment on the proposal. The draft’s chances for adoption are considered slim in the short term.

Apple and other technology companies have opposed any rule that they should help circumvent encryption, which is currently commonplace in smartphones and other devices.

Sen. Ron Wyden, D-Ore., and other lawmakers have said they would oppose any efforts to weaken encryption.

Wyden said the legislation would prohibit Americans from protecting themselves as much as possible. He said it would outlaw the best types of encryption and weaken cybersecurity for millions.

Other lawmakers from both parties, supported by law enforcement officials, said Congress has to intervene due to concerns that criminals and terrorists use encryption tools to conceal crimes and plan attacks.

A wide range of companies would have to comply with the requirement if it becomes law, including software manufacturers, remote communication companies and electronic communication companies.

Technology Companies Object

Technology companies oppose undermining encryption and have said that to comply with court orders they would need to alter how they encrypt messages, which would likely require them to retain access to keys that unlock communication. Many companies do not currently have such keys.

Industry leaders also say weakening encryption would make it easier for foreign governments and hackers to get consumers’ data or private messages.

Images from Shutterstock and Wikimedia.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

Continue Reading

Business

Is the FBI Warrant against Apple Legally Suspect?

Published

on

The Wall Street Journal has come out today in favor of Apple in its legal fight with the FBI in an editorial titled “Apple is Right on Encryption.” The editorial notes that the FBI is invoking a law that only allows them to exercise powers Congress has granted, which in this case it has not. The newspaper says the case is not about privacy but about security for all Americans. 

// -- Discuss and ask questions in our community on Workplace.

A California judge ordered the company to design a custom version of its operating software to disable certain security features and allow the FBI to break the password. Apple has cooperated with the probe but argues that forcing it to write new code is illegal.

Judges Must Follow Laws

The FBI’s assertion that its order is a run-of-the-mill search warrant is false, the editorial argues. The FBI is invoking the 1789 All Writs Act, which grants judges the authority to enforce their orders as “necessary or appropriate.” But the All Writs Act is not a license for anything judges want to do. They can only exercise powers granted by Congress.

Laws of Congress already obligate telecoms, for example, to assist in surveillance collection. But Congress never said the courts can command companies to provide digital forensics or build programs for the FBI, even if needed for a search.

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

Congress could require companies to create “back doors” into their devices. In the absence of congressional action, however, courts cannot commandeer third parties ex post facto.

An Extraordinary FBI Request

The FBI’s request is extraordinary since the iPhone security methods were legal when they were created and still are. Apple has no more relation to the data on terrorist’s phone than Ford does to a bank robber who uses a Ford as a getaway vehicle.

If the government can require a manufacturer to invent intellectual property that does not exist in order to invade its own products, there is no limiting legal principle.

Order Sets Bad Precedent

Apple is not merely being asked to crack “one phone in the entire world,” as presidential candidate Marco Rubio asserts, the editorial notes. The Justice Department is demanding Apple provide software retrofits in at least a dozen public cases, and local and state prosecutors have stacks of backlogged iPhones they want unlocked too.

If Apple now writes the desired program, the technique will be used in investigations having nothing to do with terrorism as other prosecutors will use the same argument. Such is the “back door by degrees” that Apple CEO Tim Cook has described.

FBI Director James Comey told Congress last week the Apple case was “unlikely to be a trailblazer” and “instructive for other courts.” This is a contradiction.

Also read: FBI director admits mistakes were made with Apple iPhone after San Bernardino attack

The FBI Has Other Options

One question is why the phone wasn’t sent immediately to the National Security Agency, which has a formidable decryption unit. Federal specialists probably can hack the phone without Apple’s services, especially considering it is an older model.

This case isn’t about privacy; it’s about the security of all Americans.

Terrorists and criminals will always be able to find an underground encrypted communication channel, so regulating back doors into legal devices accomplishes little national-security benefit.

If Congress is really going to outlaw stronger encryption for law-abiding Americans, it would be a far more dangerous precedent for the courts to do so without guidance from Capitol Hill.

If the debate really is critical to protecting public safety, Comey should appeal to Congress to change the law instead of insisting the courts should resolve a major policy dispute on his behalf.

Featured image from Shutterstock.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

Continue Reading

Breaches

U.K. Police Arrest Teen Following Hacks Of High-Level U.S. Intelligence Officials

Published

on

Police in the United Kingdom arrested a teenager suspected of breaching U.S. intelligence officials’ accounts, according to phys.org, a science, research and technology news site. The arrest followed news reports of hacking attacks against CIA, FBI, White House, Homeland Security and other government agencies claimed by someone using the name “Cracka.”

// -- Discuss and ask questions in our community on Workplace.

A police spokesperson said they arrested a 16-year-old boy on Tuesday in East Midlands on charges including suspected conspiracy to commit unauthorized access to computer material and to commit unauthorized acts with intent to repair.

Arrest Linked To Hacking?

The police spokesperson did not connect the arrest to the widely-reported hacking attacks on U.S. intelligence officials, but Motherboard, CNN and other sources said the hacking of U.S. officials was linked to the suspect.

Brian Hale, a spokesperson for the Office of the Director of National Intelligence, confirmed a hack against James Clapper, the national intelligence director, to Motherboard on Tuesday.

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

‘Free Palestine’ Fields Clapper’s Calls

“Cracka” contacted Lorenzo Franceschi-Bicchierai, a writer at Motherboard, claiming to have accessed a series of Clapper’s accounts, including his personal email, his wife’s Yahoo email, and his home phone number.

“Cracka” gave the Motherboard writer a phone number he claimed was Clapper’s home phone number. When Franceschi-Bicchierai called the number on Monday evening, he got an answer from Paul Larudee, the co-founder of the Free Palestine Movement. Larudee told the writer that he had been getting calls for Clapper for the last hour after an anonymous caller told him that he had set Clapper’s number to forward calls to him. Larudee said that one of the callers said he was sitting in Clapper’s house next to his wife.

“Cracka” told Motherboard he switched the settings on the home phone to reroute calls to the Free Palestine Movement based in California.

The FBI declined to comment.

U.S. Intelligence Officials Hacked

Government officials reported last month Clapper’s online accounts were hacked a few months after John Brennan, CIA director, also suffered an attack.

Brennan said in October he was outraged that attackers accessed his personal AOL email account. WikiLeaks released information from the hack, including policy recommendations on Pakistan and Afganistan as well as family phone numbers and addresses.

Hackers told Wired Magazine in October they were able to fool Verizon using falsified employee identification numbers to gain access to Brennan’s AOL account, Hacked reported. The hacking group’s Twitter account was decorated with screenshots from the hack.

A back and forth of account resetting took place three times before the hackers called Brennan’s personal phone number. They claimed Brennan asked what they wanted, and the hackers told him, “We just want Palestine to be free and for you to stop killing innocent people.”

Homeland Security Secretary Jeh Johnson’s Comcast account was also compromised though it appears the hackers didn’t get much further than that with his account.

Also read: WikiLeaks and CIA Chief Brennan’s emails: the roundup so far

WikiLeaks Releases Dump On Brennan

WikiLeaks released the “Unidentified Brennan Group,” a table of 22 people including Brennan along with prominent figures in Homeland Security and former CIA employees, Hacked reported. The release also contained information about Brennan’s previous employers – the Analysis Corporation along with details of the 22 people such as previous employment, compensation, security clearance, etc.
Another document revealed a comprehensive dossier on an FBI agent, taken directly from Brennan’s personal email. FBI agent Donovan J. Leighton was the FBI program manager for the FBI’s counterterrorism division in the Arabian Peninsula.

WikiLeaks also published e-mails taken from the Stratfor breach, a private firm dealing with global intelligence operations. One of the emails taken from the company revealed: “Brennan is behind the witch hunts of investigative journalists learning information from inside the beltway sources.”

Featured image from Shutterstock.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

Continue Reading

Recent Comments

Recent Posts

A part of CCN

Trending