ReportWire

Tag: national security agency

  • China claims the NSA conducted cyberattacks on its national time center

    [ad_1]

    As political tensions between the two global superpowers grow, China’s State Security Ministry accused the US’ National Security Agency of a cyberattack operation that took place between 2023 and 2024. As first reported by Reuters, the Chinese agency posted on WeChat that the NSA targeted the country’s National Time Service Center. As part of the Chinese Academy of Sciences, the center is tasked with generating, maintaining and transmitting its national standard of time, which is provided to important sectors across the country, including communications, defense and finance.

    The state ministry said the operation used around 42 types of “special cyberattack weapons” to infiltrate the National Time Service Center which could have led to the disruption of network communications, financial systems and power supply. The WeChat post also claimed that the NSA exploited vulnerabilities in a foreign mobile phone brand’s messaging system to steal sensitive info from staff devices, without naming the brand.

    The NSA has yet to respond to the accusation. On the other hand, the US Treasury Department said it was targeted by a “China state-sponsored actor” in a December cyberattack.

    [ad_2]

    Jackson Chen

    Source link

  • Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights

    [ad_1]

    After a quarter century defending digital rights, Cindy Cohn announced on Tuesday that she is stepping down as executive director of the Electronic Frontier Foundation. Cohn, who has led the San Francisco–based nonprofit since 2015, says she will leave the role later this year, concluding a chapter that helped define the modern fight over online freedom.

    Cohn first rose to prominence as lead counsel in Bernstein v. Department of Justice, the 1990s case that overturned federal restrictions on publishing encryption code. As EFF’s legal director and later executive director, she guided the group through legal challenges to government surveillance, reforms to computer crime laws, and efforts to hold corporations accountable for data collection. Over the past decade, EFF has expanded its influence, becoming a central force in shaping the debate over privacy, security, and digital freedom.

    In an interview with WIRED, Cohn reflected on EFF’s foundational encryption victories, its unfinished battles against National Security Agency (NSA) surveillance, and the organization’s work protecting independent security researchers. She spoke about the shifting balance of power between corporations and governments, the push for stronger state-level privacy laws, and the growing risks posed by artificial intelligence.

    Though stepping down from leadership, Cohn tells WIRED she plans to remain active in the fight against mass surveillance and government secrecy. Describing herself as “more of a warrior than a manager,” she says her intent is to return to frontline advocacy. She is also at work on a forthcoming book, Privacy’s Defender, due out next spring, which she hopes will inspire a new generation of digital rights advocates.

    This interview has been edited for length and clarity.

    WIRED: Tell us about the fights you won, and the ones that still feel unfinished after 25 years.

    CINDY COHN: The early fight that we made to free up encryption from government regulation still stands out as setting the stage for a potentially secure internet. We’re still working on turning that promise into a reality, but we’re in such a different place than we would’ve been in had we lost that fight. Encryption protects anybody who buys anything online, anyone who uses Signal to be a whistleblower or journalists, or just regular people who want privacy and use WhatsApp or Signal. Even the backend-certificate authorities provided by Let’s Encrypt—that make sure that when you think you’re going to your bank, you’re actually going to your bank website—are all made possible because of encryption. These are all things that would’ve been at risk if we hadn’t won that fight. I think that win was foundational, even though the fights aren’t over.

    The fights that we’ve had around the NSA and national security, those are still works in progress. We were not successful with our big challenge to the NSA spying in Jewel v. NSA, although over the long arc of that case and the accompanying legislative fights, we managed to claw back quite a bit of what the NSA started doing after 9/11.

    [ad_2]

    Dell Cameron

    Source link

  • Ahead of 9/11 commemorations, National Security Agency reveals details of its role in hunt for Osama bin Laden

    Ahead of 9/11 commemorations, National Security Agency reveals details of its role in hunt for Osama bin Laden

    [ad_1]

    The National Security Agency is revealing aspects it never disclosed before about its role in helping the U.S. government track down Osama bin Laden, the al Qaeda founder and terrorist who orchestrated numerous deadly strikes on U.S. and Western targets including, most notoriously, the attacks of September 11, 2001.

    In a new podcast series called “No Such Podcast” that debuted this week, current and former senior NSA officials who were involved in the decade-long search for bin Laden after 9/11 describe how the highly secretive operation unfolded before culminating in the 2011 raid on a compound in Abbottabad, Pakistan, where Bin Laden had fled.

    “I remember late night meetings in the fall of 2001, we’d sit around a table and say, ‘How do we find him?’” recounts Jon Darby, former NSA director of operations, according to a transcript of the first episode released by the agency.  “And one of the early theories was a courier, somebody that’s going to be taking care of him. But that was 2001.”

    Darby described the operation as “ultra-compartmented,” with no more than 50 of the tens of thousands of NSA employees aware of the effort until after the day of the Abbottabad raid.

    “So the government had decided to carry out this special forces raid. So what’s NSA’s role at that point? Our job is to make sure there are no threats to those choppers that are flying in and on the way out,” Darby said, in an apparent allusion to the risk that the two Black Hawk helicopters that had secretly entered Pakistan’s airspace could be intercepted. “So we had people poised, you know, ready to provide any indications and warning of threats to those helicopters,” he said.

    NSA aided Ukraine after Russia’s invasion

    Natalie Laing, the current director of operations at NSA who was also interviewed for the podcast, offered an overview of the fundamentals of signals intelligence, the NSA’s core focus, and described more recent examples of the agency’s role in informing U.S. policymakers, foreign partners, and the Ukrainian government about the imminence of Russia’s 2022 invasion of Ukraine.

    Signals intelligence is information about targets obtained from electronic signals and communications from those targets such as phone calls, texts, radio waves and other things that create digital data.

    “[W]e collected those signals and we were able to see that Russia had the plans and intentions to invade Ukraine before they invaded,” she said, adding that personnel from U.S. Cyber Command, which works hand-in-glove with the NSA, were dispatched overseas to help Kyiv strengthen its cyber defenses.

    “Cyber Command was able to send before the invasion, again, a small team over to Ukraine to help them look through their networks and point to some activity that seemed to be Russian activity there, so they could shore up their networks from a cybersecurity perspective,” Laing said.

    She also explained how signals intelligence collected by NSA helped the U.S. government determine the Chinese origins of a chemical used to synthesize fentanyl, whose illicit influx into the country American agencies have deemed a national security threat.

    U.S. intel agencies pulling back the curtain more

    Once so secretive its very existence was classified, the NSA has sought in recent years to pull back the curtain on some of its operations and to share more cybersecurity information with non-government entities and the public.

    In launching its own podcast, the NSA joins other American intelligence agencies – including the CIA, which started a podcast, “The Langley Files,” in 2022, and the Defense Intelligence Agency, whose podcast “Connections” was released in 2020 in an effort to demystify some of their work, albeit through carefully choreographed, in-house productions.

    Efforts to better shape the public narrative surrounding the NSA’s activities follows the 2013 disclosures by former contractor Edward Snowden of classified U.S. government mass surveillance programs, which ignited a firestorm of controversy that intelligence officials have acknowledged did lasting damage to the reputation of the American intelligence community.

    “Because it’s sensitive, we can’t talk about some of our work, but it’s time to start telling more stories that we can talk about, sharing more of that expertise, and highlighting these incredible public servants,” Sara Siegle, NSA’s Chief of Strategic Communications, said in a statement.

    The NSA aims to release six more episodes on major podcast platforms through next month. 

    [ad_2]

    Source link

  • Notable US Spies Fast Facts | CNN

    Notable US Spies Fast Facts | CNN

    [ad_1]



    CNN
     — 

    Here is a look at some US citizens who have been convicted of spying against the United States.

    1962 – Aldrich Ames, son of a CIA analyst, joins the agency as a low-level documents analyst.

    1967-1968 – Enters the Career Trainee Program at the CIA and becomes an operations officer.

    1970s – Specializes in Soviet/Russian intelligence services.

    April 16, 1985 – Volunteers to spy against the United States to KGB agents at the Soviet Embassy in Washington, DC. He receives a payment of $50,000.

    1986-1989 – Ames is stationed in Rome and continues to pass information to Soviet agents. He is paid approximately $1.8 million during this period.

    Late 1980s – The CIA and FBI learn that a number of Russian double agents have been arrested and some executed.

    May 1993 – The FBI begins investigating Ames, with both physical and electronic surveillance.

    February 21, 1994 – Ames and his wife, Rosario, are arrested in Arlington, Virginia, by the FBI, accused of spying for the Soviet Union and later, Russia. It is estimated that Ames has received approximately $2.5 million from Russia and the Soviet Union for his years of spying.

    April 28, 1994 – Ames pleads guilty and is sentenced to life in prison without the possibility of parole. In October 1994, Ames’ wife receives 63 months in prison.

    October 31, 1995 – CIA Director John Deutch testifies before Congress about the scope of Ames’ espionage. He states that more than 100 US spies were compromised and that tainted intelligence was given to Presidents George H.W. Bush and Bill Clinton.

    1970-1991 – David Boone serves in the US Army as a signals intelligence analyst. During the late 1980s, he is assigned to the National Security Agency as a senior cryptologic traffic analyst.

    October 1988 – In the midst of a divorce and financial problems, Boone goes to the Soviet embassy in Washington, DC, and offers to spy on the United States. He is paid about $20,000 a year for his work over the next three years. He continues spying after being transferred to a post in Germany.

    1991 – Boone loses his security clearance and retires from the Army, remaining in Germany.

    1998 – He is contacted by a retired FBI agent posing as a Russian agent. The agent meets with Boone in London and the United States and pays him $9,000 to return to spying for Russia.

    October 14, 1998 – Boone is charged with passing defense documents to the Soviet Union. He pleads guilty in December 1998.

    February 26, 1999 – He is sentenced to 24 years in prison.

    January 14, 2020 – Boone is released from prison.

    1996 – Peter Rafael Dzibinski Debbins makes visits to Russia to meet with their intelligence agents. He is given a code name and signs a settlement “attesting that he wanted to serve” them.

    1998-2005 – Debbins joins the Army, where he serves in chemical units before being selected for the US Army Special Forces.

    August 21, 2020 – The Department of Justice announces that Debbins has been charged with providing information about US national defenses to Russian agents.

    May 14, 2021 – The DOJ announces that Debbins is sentenced to 188 months in federal prison for conspiring with Russian agents to provide them with US defense intelligence.

    1968-1986 – Noshir Gowadia is employed by Northrop Grumman where he works on technology relating to the B-2 Spirit Bomber, aka the “Stealth” bomber.

    July 2003-June 2005 – Travels to China six times to “provide defense services in the form of design, test support and test data analysis of technologies to assist the PRC with a cruise missile system by developing a stealthy exhaust nozzle.” He is paid over $100,000 during this period.

    October 2005 – Arrested and charged with passing national defense information to China. Superseding indictments are issued in 2006 and 2007.

    August 9, 2010 – Gowadia is found guilty.

    January 24, 2011 – He is sentenced to 32 years in prison.

    January 12, 1976 – Robert Hanssen joins the FBI.

    1979 – Begins spying for the Soviet Union.

    1980 – Begins working for the counterintelligence unit, focusing on the Soviet Union.

    1981 – Transfers to FBI headquarters, initially tracking white-collar crime and monitoring foreign officials assigned to the United States. He is later assigned to the Soviet Analytical Unit.

    1981 – Hanssen’s wife catches him with classified documents and convinces him to stop spying.

    October 4, 1985 – Resumes spying.

    1991 – Breaks off relations with the KGB.

    1999 – Resumes spying, this time for the Russian Foreign Intelligence Service.

    2000 – The FBI identifies Hanssen from a fingerprint and from a tape recording supplied by a disgruntled Russian intelligence operative. The FBI also obtains the complete original KGB dossier on Hanssen.

    December 2000 – The FBI begins surveillance of Hanssen.

    February 18, 2001 – Hanssen is arrested in a Virginia park after making a drop of classified documents. Agents find a bag nearby containing $50,000 that they believe is Hanssen’s payment for the documents.

    July 6, 2001 – Pleads guilty to 15 counts of espionage and conspiracy in exchange for the government not seeking the death penalty.

    May 10, 2002 – He is sentenced to life in prison without the possibility of parole.

    June 5, 2023 – Hanssen dies in prison.

    1984 – Ana Montes is recruited to spy for Cuba. She is never paid for her spying.

    1985-2001 – She is employed by the Defense Intelligence Agency as an analyst. She is promoted several times, eventually becoming the DIA’s top Cuba analyst.

    Fall 2000 – The FBI and DIA begin investigating Montes.

    September 11, 2001 – In response to attacks on the United States, Montes is named acting division chief, which gives her access to the plans to attack Afghanistan and the Taliban.

    September 21, 2001 – Montes is arrested in Washington, DC, and is charged with conspiracy to deliver defense information to Cuba.

    March 20, 2002 – Pleads guilty to espionage and is sentenced to 25 years in prison.

    January 6, 2023 – Montes is released from prison.

    1977 – Walter Kendall Myers begins working for the US State Department on contract, as an instructor.

    1978 – Myers travels to Cuba and is recruited by Cuban intelligence.

    1979 – Myers and his girlfriend [later his wife], Gwendolyn, begin spying for Cuba. It is believed they receive little to no payment for their services.

    1985 – He is hired by the State Dept. as a senior analyst.

    October 31, 2007 – Myers retires from the State Dept.

    June 4, 2009 – The Myers are arrested.

    November 20, 2009 – He pleads guilty to wire fraud and conspiracy to commit espionage. Gwendolyn Myers pleads guilty to conspiracy to gather and transmit national defense information.

    July 16, 2010 – Myers is sentenced to life in prison. His wife is sentenced to 81 months.

    1980 – Harold Nicholson joins the CIA after serving in the United States Army.

    1982-1989 – Nicholson works for the CIA in the Philippines, Thailand and Japan.

    1992-1994 – Deputy Chief of Station/Operations Officer in Kuala Lumpur, Malaysia.

    June 1994-November 1996 – Provides Russian Intelligence with sensitive information.

    November 16, 1996 – Arrested at Dulles International Airport carrying classified CIA information.

    November 27, 1996 – Nicholson pleads not guilty.

    June 5, 1997 – He is convicted of espionage and sentenced to 23 years in prison.

    2008 – Nicholson’s son, Nathaniel, is arrested on charges he met with Russian agents to collect money owed to his father.

    January 18, 2011 – Harold Nicholson is sentenced to an additional eight years in prison on charges of conspiracy to act as an agent of a foreign government and conspiracy to commit money laundering. Nathaniel Nicholson is sentenced to five years probation.

    1965-1979 – Ronald Pelton works for the National Security Agency, with top-level security clearance.

    1979 – Pelton leaves the NSA due to financial problems.

    January 1980 – After declaring bankruptcy in 1979, Pelton begins spying for the Soviet Union. He discloses classified information on the United States’ ability to intercept Soviet communications.

    November 25, 1985 – After a KGB defector reveals his name, Pelton is arrested and charged with espionage.

    June 5, 1986 – He is convicted of spying.

    December 17, 1986 – Pelton is sentenced to three concurrent life sentences plus 10 years.

    November 24, 2015 – Pelton is released from prison.

    1983-1996 – Earl Edwin Pitts works at the FBI.

    1987-1992 – Pitts passes information on FBI operations to the Soviet Union and Russia.

    1995 – A Russian diplomat at the UN names Pitts as a former spy. FBI agents posing as Russian intelligence officers contact Pitts to attempt to lure him back to spying. Pitts delivers documents in exchange for $65,000.

    December 18, 1996 – Pitts is arrested. He is charged two days later with conspiring and attempting to commit espionage.

    February 28, 1997 – Pleads guilty. At the time, he is only the second agent in the FBI’s history to be found guilty of espionage.

    June 23, 1997 – He is sentenced to 27 years in prison.

    December 20, 2019 – Pitts is released from prison.

    1979 – Pollard is hired to work at the Navy Field Operational Intelligence Office. He had been rejected previously from employment at the CIA due to drug use. His specialty is North America and the Caribbean.

    June 1984 – He begins spying for Israel, passing on information on Arab countries. He earns $1,500-$2,500 a month.

    November 21, 1985 – Pollard is arrested outside the Israeli Embassy after his request for asylum is denied.

    June 4, 1986 – Pleads guilty to conspiracy to commit espionage.

    March 4, 1987 – US District Judge Aubrey Robinson Jr. rejects a plea agreement reached by federal prosecutors and Pollard. Instead, he sentences Pollard to life in prison. Pollard is the only person in US history to receive a life sentence for spying on behalf of a US ally. Presidents Bill Clinton, George W. Bush and Barack Obama have rejected pleas for clemency.

    1995 – Israel grants Pollard citizenship.

    May 11, 1998 – Israel admits for the first time that Pollard was working as its agent.

    2002 – Former Israeli Prime Minister Benjamin Netanyahu visits Pollard in prison.

    July 28, 2015 – Pollard’s attorney announces that Pollard has been granted parole and will be released in November.

    November 20, 2015 – Pollard is released on parole.

    November 20, 2020 – Pollard completes his parole. A month later Pollard and his wife arrive in Israel to start a new life.

    1969-1994 – George Trofimoff, a naturalized American citizen of Russian parentage, works as a civilian for the US Army at the Joint Interrogation Center in Nuremberg, Germany. He also attains the rank of colonel in the Army reserve.

    1994 – Trofimoff and a priest in the Russian Orthodox church, Igor Susemihl, are arrested in Germany on spying charges. The charges are later dropped.

    1994 – Retires and moves to South Florida.

    June 14, 2000 – Trofimoff is arrested. US Attorney Donna Bucella describes him as “the highest-ranking US military officer ever charged with espionage. He is accused of passing classified information on Soviet and Warsaw Pact military capabilities from 1969-1994. Allegedly, he received payment of over $250,000 during that time.

    June 27, 2001 – He is convicted of spying for the Soviet Union and Russia. He is later sentenced to life in prison.

    September 19, 2014 – Trofimoff dies in prison.

    [ad_2]

    Source link

  • The NSA Warns That US Adversaries Free to Mine Private Data May Have an AI Edge

    The NSA Warns That US Adversaries Free to Mine Private Data May Have an AI Edge

    [ad_1]

    Electrical engineer Gilbert Herrera was appointed research director of the US National Security Agency in late 2021, just as an AI revolution was brewing inside the US tech industry.

    The NSA, sometimes jokingly said to stand for No Such Agency, has long hired top math and computer science talent. Its technical leaders have been early and avid users of advanced computing and AI. And yet when Herrera spoke with me by phone about the implications of the latest AI boom from NSA headquarters in Fort Meade, Maryland, it seemed that, like many others, the agency has been stunned by the recent success of the large language models behind ChatGPT and other hit AI products. The conversation has been lightly edited for clarity and length.

    Gilbert HerreraCourtesy of National Security Agency

    How big of a surprise was the ChatGPT moment to the NSA?

    Oh, I thought your first question was going to be “what did the NSA learn from the Ark of the Covenant?” That’s been a recurring one since about 1939. I’d love to tell you, but I can’t.

    What I think everybody learned from the ChatGPT moment is that if you throw enough data and enough computing resources at AI, these emergent properties appear.

    The NSA really views artificial intelligence as at the frontier of a long history of using automation to perform our missions with computing. AI has long been viewed as ways that we could operate smarter and faster and at scale. And so we’ve been involved in research leading to this moment for well over 20 years.

    Large language models have been around long before generative pretrained (GPT) models. But this “ChatGPT moment”—once you could ask it to write a joke, or once you can engage in a conversation—that really differentiates it from other work that we and others have done.

    The NSA and its counterparts among US allies have occasionally developed important technologies before anyone else but kept it a secret, like public key cryptography in the 1970s. Did the same thing perhaps happen with large language models?

    At the NSA we couldn’t have created these big transformer models, because we could not use the data. We cannot use US citizen’s data. Another thing is the budget. I listened to a podcast where someone shared a Microsoft earnings call, and they said they were spending $10 billion a quarter on platform costs. [The total US intelligence budget in 2023 was $100 billion.]

    It really has to be people that have enough money for capital investment that is tens of billions and [who] have access to the kind of data that can produce these emergent properties. And so it really is the hyperscalers [largest cloud companies] and potentially governments that don’t care about personal privacy, don’t have to follow personal privacy laws, and don’t have an issue with stealing data. And I’ll leave it to your imagination as to who that may be.

    Doesn’t that put the NSA—and the United States—at a disadvantage in intelligence gathering and processing?

    II’ll push back a little bit: It doesn’t put us at a big disadvantage. We kind of need to work around it, and I’ll come to that.

    It’s not a huge disadvantage for our responsibility, which is dealing with nation-state targets. If you look at other applications, it may make it more difficult for some of our colleagues that deal with domestic intelligence. But the intelligence community is going to need to find a path to using commercial language models and respecting privacy and personal liberties. [The NSA is prohibited from collecting domestic intelligence, although multiple whistleblowers have warned that it does scoop up US data.]

    [ad_2]

    Will Knight

    Source link

  • Huawei wants to go all in on AI for the next decade | CNN Business

    Huawei wants to go all in on AI for the next decade | CNN Business

    [ad_1]

    Editor’s Note: Sign up for CNN’s Meanwhile in China newsletter which explores what you need to know about the country’s rise and how it impacts the world.


    Hong Kong
    CNN
     — 

    Huawei has joined the list of companies that want to be all about artificial intelligence.

    For the first time in about 10 years, the Chinese tech and telecoms giant announced its new strategic direction on Wednesday, saying it would shift its focus to AI. Previously, the company had prioritized cloud computing and intellectual property, respectively, over two decade-long periods.

    Meng Wanzhou, Huawei’s rotating chairwoman and chief financial officer, made the announcement in Shanghai during a company event.

    “As artificial intelligence gains steam, and its impact on industry continues to grow, Huawei’s All Intelligence strategy is designed to help all industries make the most of new strategic opportunities,” the company said in a statement.

    Meng said in a speech that Huawei was “committed to building a solid computing backbone for China — and another option for the world.”

    “Our end goal is to help meet the diverse AI computing needs of different industries,” she added, without providing details.

    Huawei’s decision follows a similar move by fellow Chinese tech giant Alibaba (BABA), announced earlier this month, to prioritize AI.

    Other companies, such as Japan’s SoftBank, have also long declared an intent to focus more on the fast-moving technology, and more businesses have jumped on the bandwagon this year due to excitement about platforms such as GPT-4.

    Meng returned to China in September 2021 after spending nearly three years under house arrest in Canada as part of an extradition battle with the United States. She and Huawei had been charged for alleged bank fraud and evasion of economic sanctions against Iran.

    The executive, who is also the daughter of Huawei founder Ren Zhengfei, was able to leave after reaching an agreement with the US Department of Justice and ultimately having her charges dismissed.

    Meng began her role as the rotating chairperson of the company in April and is expected to stay in the position for six months.

    News of Huawei’s strategic update came the same day the company was mentioned in allegations lodged by China against the United States.

    In a statement posted Wednesday on Chinese social network WeChat, China’s Ministry of State Security accused Washington of infiltrating Huawei servers nearly 15 years ago.

    “With its powerful arsenal of cyberattacks, the United States intelligence services have carried out surveillance, theft of secrets and cyberattacks against many countries around the world, including China, in a variety of ways,” the ministry said.

    It alleged that the US National Security Agency (NSA), in particular, had “repeatedly conducted systematic and platform-based attacks on China in an attempt to steal China’s important data resources.”

    Huawei declined to comment on the allegations, while the NSA did not immediately respond to a request for comment outside regular US business hours.

    The claims are especially notable because US officials have long suspected the company of spying on the networks that its technology operates, using it as grounds to restrict trade with the company. Huawei has vehemently denied the claims, saying it operates independently of the Chinese government.

    In 2019, Huawei was added to the US “entity list,” which restricts exports to select organizations without a US government license. The following year, the US government expanded on those curbs by seeking to cut Huawei off from chip suppliers that use US technology.

    In recent weeks, Huawei has added to US-China tensions again after launching a new smartphone that represents an apparent technological breakthrough.

    Huawei launched the Mate 60 Pro, its latest flagship device, last month, prompting a US investigation. Analysts who have examined the phone have said it includes a 5G chip, suggesting Huawei may have found a way to overcome American export controls.

    — Mengchen Zhang contributed to this report.

    [ad_2]

    Source link

  • As Beijing’s intelligence capabilities grow, spying becomes an increasing flashpoint in US-China ties | CNN

    As Beijing’s intelligence capabilities grow, spying becomes an increasing flashpoint in US-China ties | CNN

    [ad_1]


    Hong Kong
    CNN
     — 

    For the second time this year, concerns of Chinese spying on the United States have cast a shadow over a planned visit to China by the US’ top diplomat as the two superpowers try to improve fractured ties while keeping a watchful eye on each other.

    US Secretary of State Antony Blinken is expected to land in Beijing over the weekend following the postponement of his earlier trip planned for February after a Chinese surveillance balloon meandered across the continental US, hovering over sensitive military sites before being shot down by an American fighter plane.

    But with Blinken poised to make a trip seen as a key step to mend fractured US-China communications, another espionage controversy has flared in recent days following media reports that China had reached a deal to build a spy perch on the island of Cuba.

    Beijing has said it wasn’t “aware” of the situation, while the White House said the reports were not accurate – with Blinken earlier this week saying China upgraded its spying facilities there in 2019.

    The situation is just the latest in a string of allegations of spying between the two in recent months. They underscore how intelligence gathering – an activity meant to go on without detection, out of the public eye – is becoming an increasingly prominent flashpoint in the US-China relationship.

    CIA Director Bill Burns secretly traveled to China in May to meet counterparts and emphasize the importance of maintaining open lines of communication in intelligence channels, CNN reported earlier this month.

    “Crisis communications are arguably in their worst state since 1979. This puts a premium on both countries’ ability to gather intelligence to understand each other’s capabilities, actions, and strategic intent around the globe,” said Lyle Morris, a senior fellow at the Asia Society Policy Institute’s Center for China Analysis.

    That pushes intelligence gathering itself to become “another factor that is complicating US-China relations,” he said.

    That’s especially the case, experts say, as China continues to expand its own intelligence gathering capabilities – catching up in an area where the US has traditionally had an edge.

    “It’s fair to say that we’ve been spying on each other at various scales for a long time,” said former Central Intelligence Agency (CIA) China analyst Christopher Johnson.

    “No doubt there’s been an uptick from both sides, but probably more so on the Chinese side, simply because they’ve gotten larger, more influential, richer, and therefore have more resources to devote than they did in the past,” said Johnson, who is now president of the China Strategies Group consultancy.

    Chinese leader Xi Jinping has also pursued a far more assertive foreign policy than his predecessors during his past decade in power.

    That’s been accompanied by “a consistent emphasis on enhancing intelligence capabilities, modernizing technology, and improving coordination among different security agencies,” according to Xuezhi Guo, a professor of political science at Guilford College in the US.

    China’s main intelligence activities fall under departments within the People’s Liberation Army and its vast civilian agency known as the Ministry of State Security (MSS). Other arms of the Communist Party apparatus also play a role in activities beyond conventional intelligence gathering, experts say.

    The MSS, established in 1983, oversees intelligence and counterintelligence both within China and overseas. Its remit has encouraged analogies to a combined CIA and Federal Bureau of Intelligence. But the sprawling Beijing-headquartered MSS is even more secretive – without even a public website describing its activities.

    The agency is “expected to play an even more significant role in China’s domestic and international security and stability” in the coming years, amid mounting challenges at home and abroad, Guo said.

    In the context of both China’s growing clout and geopolitical frictions, experts say it’s no surprise Beijing is allegedly seeking to establish or expand surveillance facilities in Cuba – or other places around the world – with the US as a key target, but not the only one.

    Meanwhile, intelligence gathering in China has become harder.

    Xi has consolidated his power and become increasingly focused on security – including building out the state’s ability to monitor its citizens, both online and through China’s extensive surveillance infrastructure.

    “The task of collecting intelligence in China is arguably harder than ever and yet more necessary than ever,” said Johnson, the former analyst, pointing to challenges of gaining insight into the government under the centralized leadership of Xi, who maintains a “very small circle of knowledge or trust.”

    China’s building of a domestic “surveillance panopticon” has also enabled its counter-intelligence, according to Johnson.

    US intelligence has difficulties having operational meetings or “going black” (dodging surveillance) within China, he said, especially during the Covid-19 pandemic when movement was tightly controlled and even more digitally monitored than usual.

    CIA operations also suffered a staggering setback starting in 2010, according to The New York Times, when the Chinese government killed or imprisoned more than a dozen sources over two years.

    In 2021, CNN reported that the agency was overhauling how it trains and manages its network of spies as part of a broad transition to focus more closely on adversaries like China and Russia.

    A tower of security cameras near Shanghai's Lujiazui financial district in May.

    This contrasts with what some US lawmakers and commentators believe has been a too relaxed approach to national security with regards to China, where even private businesses are beholden to the ruling Communist Party, which also seeks to keep tabs on its citizens overseas.

    Experts have also warned about the overlap between espionage efforts and operations like those of China’s United Front – a sprawling network of groups that manage the party’s relationship with non-party industries, organizations and individuals around the world.

    Heightened concern and awareness about Chinese intelligence gathering – or the potential for it – has exploded in the US in recent years.

    That’s played out in debates about the use of Chinese telecoms equipment and social media platforms – think Huawei and TikTok – as well as in government efforts to prosecute economic espionage cases and prevent any influence campaigns from impacting American democracy.

    Beijing has said repeatedly that it does not interfere in the “internal affairs” of other countries. Both Huawei and Tiktok have repeatedly denied that their products present a national security risk or would be accessed by the Chinese government.

    In the US, there’s also been concern about over-hyping the threat and sparking anti-Chinese sentiment.

    The US Justice Department last year ended its 3-year-old China Initiative, a national security program largely focused on thwarting technology theft, including in academia, after a string of cases were dismissed amid concerns of fueling suspicion and bias against Chinese Americans.

    US intellectual property had long been a traditional target of Chinese espionage.

    A survey of 224 reported instances of Chinese espionage directed at the United States since 2000, conducted using open source data by the Center for Strategic and International Studies (CSIS) think tank in Washington, found nearly half involved cyber-espionage, while over half were seeking to acquire commercial technologies.

    Beijing appears to be increasingly pushing back on what it sees as a double standard – as the US’ international surveillance efforts have also been well-documented.

    The 2013 leak produced by former National Security Agency contractor Edward Snowden, for example, revealed Washington’s vast global digital surveillance capabilities, against both rivals and allies alike. Meanwhile, the US intelligence community is widely understood to have its own overseas facilities for collecting signals intelligence.

    Last month, Beijing released a report from a national cybersecurity agency titled “‘Empire of Hacking’: The US Central Intelligence Agency.” It accused the US of promoting the internet in the 1980s in order to further its intelligence agencies’ efforts to launch “Color Revolutions” and overthrow governments abroad.

    “The organizations, enterprises and individuals that use the Internet equipment and software products of the USA have been used as the puppet ‘agents’ by CIA, helping it to be a ‘shining star’ in global cyber espionage wars,” the report also claimed.

    China’s own internet is heavily censored with access limited by a “Great Firewall” – part of its extensive efforts to control the flow of information alongside its extensive digital surveillance of its own population.

    China’s Foreign Ministry last month again pointed its finger at the US after Washington released a warning alleging that a Chinese state-sponsored hacker had infiltrated networks across US critical infrastructure sectors.

    Earlier this month, the ministry also slammed the US for sending what it said were more than 800 flights of large reconnaissance aircraft “to spy on China” last year – though no assertion was made of crossing into Chinese airspace.

    The comment came after each country’s military accused the other of misbehavior after a Chinese fighter jet intercepted a US spy plane in international airspace over the South China Sea.

    TikTok CEO Shou Zi Chew testifies at a House Energy and Commerce Committee hearing on Capitol Hill in Washington, DC on Thursday, March 23, 2023.

    Experts say this rhetorical back-and-forth over each other’s clandestine activities is likely only to continue as US-China competition drives both to ramp up their intelligence gathering – and China continues to expand its own prowess, including through technological advancements such as satellite networks, surveillance balloons and data processing.

    “China increasingly has capabilities (that the US has been known for) … this is moving from a one way street historically to a two-way street,” said John Delury, author of “Agents of Subversion: The Fate of John T. Downey and the CIA’s Covert War in China.”

    He pointed to how China had long been subject to US offshore surveillance and – prior to the restoration of diplomatic relations in the 1970s – direct aerial surveillance.

    “There’s a psychological dimension to this as well,” Delury added, noting that the spy balloon incident earlier this year brought this to the fore – giving Americans the unnerving sense that China “can do this to us now, they have technical capabilities and can look at us.”

    Meanwhile, there’s much at stake in how well the two governments can repair official communication – seen as a key element of Blinken’s expected visit on Sunday and Monday.

    “When there’s less communication, the two intelligence communities inside the two governments have to do more and more guesswork,” said Delury. “Then there’s a lot more room for faulty assumptions.”

    [ad_2]

    Source link

  • Authorities in China question staff at U.S. consulting firm Bain & Company in Shanghai

    Authorities in China question staff at U.S. consulting firm Bain & Company in Shanghai

    [ad_1]

    Chinese authorities have questioned staff at Bain & Company’s Shanghai office, the U.S. consultancy giant said Thursday.

    “We can confirm that the Chinese authorities have questioned staff in our Shanghai office. We are cooperating as appropriate with the Chinese authorities. At this time, we have no further comment,” the company told CBS News in an emailed statement.

    The Financial Times, which first reported the news Wednesday, said that according to multiple sources, police made a surprise visit to the office two weeks ago. Phones and computers were taken away, but no one was detained, the newspaper said.

    Fog covering Shanghai, China at sunrise.
    A file photo shows the skyline of Shanghai, China, blanketed in thick fog as the sun rises.

    Getty/iStockphoto


    The news will likely fuel concern among U.S. companies operating in China that Beijing might take retaliatory action against them for Washington’s moves against Chinese firms.

    Last month, U.S. due diligence firm Mintz Group said Chinese police had arrested five of its local employees and shut down its Beijing office. Chinese authorities later said the company was being investigated for “illegal” activities. A few days later, China’s top cybersecurity regulator said it was investigating leading U.S. computer chip maker Micron Technology and would review its products over “national security concerns.”


    China sets 5% GDP growth target for 2023, plans to increase military spending

    03:45

    Tensions have escalated in recent months between Washington and Beijing. In February, the U.S. shot down an alleged Chinese spy balloon. Beijing insisted the object was a benign weather monitoring device.

    In March, the chief executive of social media giant TikTok, Shou Zi Chew, was grilled by U.S. lawmakers about the app’s data security and privacy practices amid concern in the U.S. that the company could share data with Chinese authorities. TikTok has insisted that it operates independently from China’s government, but there is a growing belief in Washington that the platform represents a national security threat.

    Just last week, meanwhile, FBI agents arrested two people who have been accused of operating an illegal Chinese police station in New York City. The U.S. Justice Department has called the operation a bid to influence and intimidate dissidents critical of the Chinese government in the U.S.

    As U.S.-China relations have soured, U.S. businesses operating in the country believe they have already suffered from the fallout.

    “There certainly is a chill in the air,” Michael Hart, who heads the American Chamber of Commerce in Beijing, told CBS News in March. “Companies feel like they’re squeezed out of certain industries, and so there is a question mark that many U.S. companies have about, you know, are we really welcome?”

    [ad_2]

    Source link

  • TikTok collects a lot of data. But that’s not the main reason officials say it’s a security risk | CNN Business

    TikTok collects a lot of data. But that’s not the main reason officials say it’s a security risk | CNN Business

    [ad_1]



    CNN
     — 

    After TikTok CEO Shou Chew testified for more than five hours on Thursday before a Congressional committee, one thing was clear: US lawmakers remain convinced that TikTok is an urgent threat to national security.

    The hearing, Chew’s first appearance before Congress, kicked off with a lawmaker calling for TikTok to be banned and remained combative throughout. A number of lawmakers expressed deep skepticism about TikTok’s efforts to safeguard US user data and ease concerns about its ties to China. Nothing Chew said appeared to move the needle.

    The rhetoric inside and outside the hearing room highlighted the growing, bipartisan momentum for cracking down on the app in the United States. As the hearing was taking place, House Speaker Kevin McCarthy said he supports legislation that would effectively ban TikTok; Secretary of State Antony Blinken said TikTok should be “ended one way or another,” and the Treasury Department issued a statement vowing to “safeguard national security,” without mentioning TikTok by name.

    Concerns about TikTok’s connections to China have led governments worldwide to ban the app on official devices, and those fears have factored into the increasingly tense US-China relationship. But the remarks across the federal government on Thursday, combined with a prior threat from the Biden administration to impose a nationwide ban unless TikTok’s Chinese owners sell their stakes, shows that a complete ban of the hugely popular app very much remains a live possibility.

    However, more than two years after the Trump administration first issued a similar threat to TikTok, evidence remains unclear about whether the app is a national security threat. Security experts say the government’s fears, while serious, currently appear to reflect only the potential for TikTok to be used for foreign intelligence, not that it has been. There is still no public evidence the Chinese government has actually spied on people through TikTok.

    TikTok doesn’t operate in China. But since the Chinese government enjoys significant leverage over businesses under its jurisdiction, the theory goes that ByteDance, and thus indirectly, TikTok, could be forced to cooperate with a broad range of security activities, including possibly the transfer of TikTok data.

    “It’s not that we know TikTok has done something, it’s that distrust of China and awareness of Chinese espionage has increased,” said James Lewis, an information security expert at the Center for Strategic and International Studies. “The context for TikTok is much worse as trust in China vanishes.”

    When Rob Joyce, the National Security Agency’s director of cybersecurity, was asked by reporters in December to articulate his security concerns about TikTok, he offered a general warning rather than a specific allegation.

    “People are always looking for the smoking gun in these technologies,” Joyce said. “I characterize it much more as a loaded gun.”

    Technical experts also draw a distinction between the TikTok app — which appears to operate very similarly to American social media in the amount of user tracking and data collection it performs — and TikTok’s approach to governance and ownership. It’s the latter that’s been the biggest source of concern, not the former.

    The US government has said it’s worried China could use its national security laws to access the significant amount of personal information that TikTok, like most social media applications, collects from its US users.

    The laws in question are extraordinarily broad, according to western legal experts, requiring “any organization or citizen” in China to “support, assist and cooperate with state intelligence work,” without defining what “intelligence work” means.

    Should Beijing gain access to TikTok’s user data, one concern is that the information could be used to identify intelligence opportunities — for example, by helping China uncover the vices, predilections or pressure points of a potential spy recruit or blackmail target, or by building a holistic profile of foreign visitors to the country by cross-referencing that data against other databases it holds. Even if many of TikTok’s users are young teens with seemingly nothing to hide, it’s possible some of those Americans may grow up to be government or industry officials whose social media history could prove useful to a foreign adversary.

    Another concern is that if China has a view into TikTok’s algorithm or business operations, it could try to exert pressure on the company to shape what users see on the platform — either by removing content through censorship or by pushing preferred content and propaganda to users. This could have enormous repercussions for US elections, policymaking and other democratic discourse.

    Security experts say these scenarios are a possibility based on what’s publicly known about China’s laws and TikTok’s ownership structure, but stress that they are hypothetical at best. To date, there is no public evidence that Beijing has actually harvested TikTok’s commercial data for intelligence or other purposes.

    Chew, the TikTok CEO, has publicly said that the Chinese government has never asked TikTok for its data, and that the company would refuse any such request. In Thursday’s hearing, Chew said that what US officials fear is a hypothetical scenario that has not been proven.

    “I think a lot of risks that are pointed out are hypothetical and theoretical risks,” Chew said. “I have not seen any evidence. I am eagerly awaiting discussions where we can talk about evidence and then we can address the concerns that are being raised.”

    If there’s a risk, it’s primarily concentrated in the relationship between TikTok’s Chinese parent, ByteDance, and Beijing. The main issue is that the public has few ways of verifying whether or how that relationship, if it exists, might have been exploited.

    TikTok has been erecting technical and organizational barriers that it says will keep US user data safe from unauthorized access. Under the plan, known as Project Texas, the US government and third-party companies such as Oracle would also have some degree of oversight of TikTok’s data practices. TikTok is working on a similar plan for the European Union known as Project Clover.

    But that hasn’t assuaged the doubts of US officials. Multiple lawmakers at the hearing specifically said they were not persuaded by Project Texas. That’s likely because no matter what TikTok does internally, China would still theoretically have leverage over TikTok’s Chinese owners. Exactly what that implies is ambiguous, and because it is ambiguous, it is unsettling.

    In congressional testimony, TikTok has sought to assure US lawmakers it is free from Chinese government influence, but it has not spoken to the degree that ByteDance may be susceptible. TikTok has also acknowledged that some China-based employees have accessed US user data, though it’s unclear for what purpose, and it has disclosed to European users that China-based employees may access their data as part of doing their jobs.

    Multiple privacy and security researchers who’ve examined TikTok’s app say there aren’t any glaring flaws suggesting the app itself is currently spying on people or leaking their information.

    In 2020, The Washington Post worked with a privacy researcher to look under the hood at TikTok, concluding that the app does not appear to collect any more data than your typical mainstream social network. The following year, Pellaeon Lin, a Taiwan-based researcher at the University of Toronto’s Citizen Lab, performed another technical analysis that reached similar conclusions.

    But even if TikTok collects about the same amount of information as Facebook or Twitter, that’s still quite a lot of data, including information about the videos you watch, comments you write, private messages you send, and — if you agree to grant this level of access — your exact geolocation and contact lists. TikTok’s privacy policy also says the company collects your email address, phone number, age, search and browsing history, information about what’s in the photos and videos you upload, and if you consent, the contents of your device’s clipboard so that you can copy and paste information into the app.

    TikTok’s source code closely resembles that of its China-based analogue, Douyin, said Lin in an interview. That implies both apps are developed on the same code base and customized for their respective markets, he said. Theoretically, TikTok could have “privacy-violating hidden features” that can be turned on and off with a tweak to its server code and that the public might not know about, but the limitations of trying to reverse-engineer an app made it impossible for Lin to find out whether those configurations or features exist.

    If TikTok used unencrypted communications protocols, or if it tried to access contact lists or precise geolocation data without permission, or if it moved to circumvent system-level privacy safeguards built into iOS or Android, then that would be evidence of a problem, Lin said. But he found none of those things.

    “We did not find any overt vulnerabilities regarding their communication protocols, nor did we find any overt security problems within the app,” Lin said. “Regarding privacy, we also did not see the TikTok app exhibiting any behaviors similar to malware.”

    TikTok has cited Lin’s research as part of its defense. But Citizen Lab came out swinging this week at the company’s characterizations of the paper, saying in a statement that TikTok has presented the research as “somehow exculpatory” when a key finding was that Lin couldn’t see what happens to user data after it is collected.

    Chew, in a rare moment of apparent frustration, told lawmakers at the hearing that TikTok and Citizen Lab were really saying a version of the same thing. “Citizen Lab is saying they cannot prove a negative, which is what I’ve been trying to do for the last four hours,” he said.

    TikTok has faced claims that its in-app browser tracks its users’ keyboard entries, and that this type of conduct, known as keylogging, could be a security risk. The privacy researcher who performed the analysis last year, Felix Krause, said that keylogging is not an inherently malicious activity, but it theoretically means TikTok could collect passwords, credit card information or other sensitive data that users may submit to websites when they visit them through TikTok’s in-app browser.

    There is no public evidence TikTok has actually done that, however. TikTok has said the keylogging function is used for “debugging, troubleshooting, and performance monitoring,” as well as to detect bots and spam. Other research has shown that the use of keyloggers is extremely widespread in the technology industry. That does not necessarily excuse TikTok or its peers for using a keylogger in the first place, but neither is it proof positive that TikTok’s product, by itself, is any more of a national security threat than other websites.

    There have also been a number of studies that report TikTok is tracking users around the internet even when they are not using the app. By embedding tracking pixels on third-party websites, TikTok can collect information about a website’s visitors, the studies have found. TikTok has said it uses the data to bolster its advertising business. And in this respect, TikTok is not unique: the same tool is used by US tech giants including Facebook-parent Meta and Google on a far larger scale, according to Malwarebytes, a leading cybersecurity firm.

    At the hearing, Chew said the company does keystroke logging to “identify bots,” not to track what users say. He also repeatedly noted that TikTok does not collect more user data than most of its peers in the industry.

    As with the keylogging tech, the fact TikTok uses tracking pixels does not on its own transform the company into a national security threat; the risk is that the Chinese government could compel or influence TikTok, through ByteDance, to abuse its data collection capabilities.

    Separately, a report last year found TikTok was spying on journalists, snooping on their user data and IP addresses to find out when or if certain reporters were sharing the same location as company employees. TikTok later confirmed the incident and ByteDance fired several employees who had improperly accessed the TikTok data of two journalists.

    The circumstances surrounding the incident suggest it was not the type of wide-scale, government-directed intelligence effort that US national security officials primarily fear. Instead, it appeared to be part of a specific internal effort by some ByteDance employees to hunt down leaks to the press, which may be deplorable but hardly uncommon for an organization under public scrutiny. (Nevertheless, the US government is reportedly investigating the incident.)

    Joyce, the NSA’s top cyber official, told reporters in December that what he really worries about is “large-scale influence” campaigns leveraging TikTok’s data, not “individualized targeting through [TikTok] to do malicious things.”

    To date, however, there’s no public evidence of that taking place.

    TikTok may collect an extensive amount of data, much of it quietly, but as far as researchers can tell, it isn’t any more invasive or illegal than what other US tech companies do.

    According to security experts, that’s more a reflection of the broad leeway we’ve given to tech companies in general to handle our data, not an issue that’s unique or specific to TikTok.

    “We have to trust that those companies are doing the right thing with the information and access we’ve provided them,” said Peiter “Mudge” Zatko, a longtime ethical hacker and Twitter’s former head of security who turned whistleblower. “We probably shouldn’t. And this comes down to a concern about the ultimate governance of these companies.”

    Lin told CNN that TikTok and other social media companies’ appetite for data highlights policy failures to pass strong privacy laws that regulate the tech industry writ large.

    “TikTok is only a product of the entire surveillance capitalism economy,” Lin said. “And governments around the world are ignoring their duty to protect citizens’ private information, allowing big tech companies to exploit user information for gain. Governments should try to better protect user information, instead of focusing on one particular app without good evidence.”

    Asked how he would advise policymakers to look at TikTok instead, Lin said: “What I would call for is more evidence-based policy.”

    [ad_2]

    Source link

  • Lawmakers say TikTok is a national security threat, but evidence remains unclear | CNN Business

    Lawmakers say TikTok is a national security threat, but evidence remains unclear | CNN Business

    [ad_1]



    CNN
     — 

    As TikTok CEO Shou Zi Chew prepares for his first congressional grilling on Thursday, much of the focus will undoubtedly be on the short-form video app’s potential national security risks.

    Concerns about TikTok’s connections to China have led governments worldwide to ban the app on official devices, and those fears have factored into the increasingly tense US-China relationship. The Biden administration has threatened TikTok with a nationwide ban unless its Chinese owners sell their stakes in the company.

    But more than two years after the Trump administration first issued a similar threat to TikTok, security experts say the government’s fears, while serious, currently appear to reflect only the potential for TikTok to be used for foreign intelligence, not that it has been. There is still no public evidence the Chinese government has actually spied on people through TikTok.

    TikTok doesn’t operate in China. But since the Chinese government enjoys significant leverage over businesses under its jurisdiction, the theory goes that ByteDance, and thus indirectly, TikTok, could be forced to cooperate with a broad range of security activities, including possibly the transfer of TikTok data.

    “It’s not that we know TikTok has done something, it’s that distrust of China and awareness of Chinese espionage has increased,” said James Lewis, an information security expert at the Center for Strategic and International Studies. “The context for TikTok is much worse as trust in China vanishes.”

    When Rob Joyce, the National Security Agency’s director of cybersecurity, was asked by reporters in December to articulate his security concerns about TikTok, he offered a general warning rather than a specific allegation.

    “People are always looking for the smoking gun in these technologies,” Joyce said. “I characterize it much more as a loaded gun.”

    Technical experts also draw a distinction between the TikTok app — which appears to operate very similarly to American social media in the amount of user tracking and data collection it performs — and TikTok’s approach to governance and ownership. It’s the latter that’s been the biggest source of concern, not the former.

    The US government has said it’s worried China could use its national security laws to access the significant amount of personal information that TikTok, like most social media applications, collects from its US users.

    The laws in question are extraordinarily broad, according to western legal experts, requiring “any organization or citizen” in China to “support, assist and cooperate with state intelligence work,” without defining what “intelligence work” means.

    Should Beijing gain access to TikTok’s user data, one concern is that the information could be used to identify intelligence opportunities — for example, by helping China uncover the vices, predilections or pressure points of a potential spy recruit or blackmail target, or by building a holistic profile of foreign visitors to the country by cross-referencing that data against other databases it holds. Even if many of TikTok’s users are young teens with seemingly nothing to hide, it’s possible some of those Americans may grow up to be government or industry officials whose social media history could prove useful to a foreign adversary.

    Another concern is that if China has a view into TikTok’s algorithm or business operations, it could try to exert pressure on the company to shape what users see on the platform — either by removing content through censorship or by pushing preferred content and propaganda to users. This could have enormous repercussions for US elections, policymaking and other democratic discourse.

    Security experts say these scenarios are a possibility based on what’s publicly known about China’s laws and TikTok’s ownership structure, but stress that they are hypothetical at best. To date, there is no public evidence that Beijing has actually harvested TikTok’s commercial data for intelligence or other purposes.

    Chew, the TikTok CEO, has publicly said that the Chinese government has never asked TikTok for its data, and that the company would refuse any such request.

    If there’s a risk, it’s primarily concentrated in the relationship between TikTok’s Chinese parent, ByteDance, and Beijing. The main issue is that the public has few ways of verifying whether or how that relationship, if it exists, might have been exploited.

    TikTok has been erecting technical and organizational barriers that it says will keep US user data safe from unauthorized access. Under the plan, known as Project Texas, the US government and third-party companies such as Oracle would also have some degree of oversight of TikTok’s data practices. TikTok is working on a similar plan for the European Union known as Project Clover.

    But that hasn’t assuaged the doubts of US officials, likely because no matter what TikTok does internally, China would still theoretically have leverage over TikTok’s Chinese owners. Exactly what that implies is ambiguous, and because it is ambiguous, it is unsettling.

    In congressional testimony, TikTok has sought to assure US lawmakers it is free from Chinese government influence, but it has not spoken to the degree that ByteDance may be susceptible. TikTok has also acknowledged that some China-based employees have accessed US user data, though it’s unclear for what purpose, and it has disclosed to European users that China-based employees may access their data as part of doing their jobs.

    Multiple privacy and security researchers who’ve examined TikTok’s app say there aren’t any glaring flaws suggesting the app itself is currently spying on people or leaking their information.

    In 2020, The Washington Post worked with a privacy researcher to look under the hood at TikTok, concluding that the app does not appear to collect any more data than your typical mainstream social network. The following year, Pellaeon Lin, a Taiwan-based researcher at the University of Toronto’s Citizen Lab, performed another technical analysis that reached similar conclusions.

    But even if TikTok collects about the same amount of information as Facebook or Twitter, that’s still quite a lot of data, including information about the videos you watch, comments you write, private messages you send, and — if you agree to grant this level of access — your exact geolocation and contact lists. TikTok’s privacy policy also says the company collects your email address, phone number, age, search and browsing history, information about what’s in the photos and videos you upload, and if you consent, the contents of your device’s clipboard so that you can copy and paste information into the app.

    TikTok’s source code closely resembles that of its China-based analogue, Douyin, said Lin in an interview. That implies both apps are developed on the same code base and customized for their respective markets, he said. Theoretically, TikTok could have “privacy-violating hidden features” that can be turned on and off with a tweak to its server code and that the public might not know about, but the limitations of trying to reverse-engineer an app made it impossible for Lin to find out whether those configurations or features exist.

    If TikTok used unencrypted communications protocols, or if it tried to access contact lists or precise geolocation data without permission, or if it moved to circumvent system-level privacy safeguards built into iOS or Android, then that would be evidence of a problem, Lin said. But he found none of those things.

    “We did not find any overt vulnerabilities regarding their communication protocols, nor did we find any overt security problems within the app,” Lin said. “Regarding privacy, we also did not see the TikTok app exhibiting any behaviors similar to malware.”

    TikTok has faced claims that its in-app browser tracks its users’ keyboard entries, and that this type of conduct, known as keylogging, could be a security risk. The privacy researcher who performed the analysis last year, Felix Krause, said that keylogging is not an inherently malicious activity, but it theoretically means TikTok could collect passwords, credit card information or other sensitive data that users may submit to websites when they visit them through TikTok’s in-app browser.

    There is no public evidence TikTok has actually done that, however. TikTok has said the keylogging function is used for “debugging, troubleshooting, and performance monitoring,” as well as to detect bots and spam. Other research has shown that the use of keyloggers is extremely widespread in the technology industry. That does not necessarily excuse TikTok or its peers for using a keylogger in the first place, but neither is it proof positive that TikTok’s product, by itself, is any more of a national security threat than other websites.

    There have also been a number of studies that report TikTok is tracking users around the internet even when they are not using the app. By embedding tracking pixels on third-party websites, TikTok can collect information about a website’s visitors, the studies have found. TikTok has said it uses the data to bolster its advertising business. And in this respect, TikTok is not unique: the same tool is used by US tech giants including Facebook-parent Meta and Google on a far larger scale, according to Malwarebytes, a leading cybersecurity firm.

    As with the keylogging tech, the fact TikTok uses tracking pixels does not on its own transform the company into a national security threat; the risk is that the Chinese government could compel or influence TikTok, through ByteDance, to abuse its data collection capabilities.

    Separately, a report last year found TikTok was spying on journalists, snooping on their user data and IP addresses to find out when or if certain reporters were sharing the same location as company employees. TikTok later confirmed the incident and ByteDance fired several employees who had improperly accessed the TikTok data of two journalists.

    The circumstances surrounding the incident suggest it was not the type of wide-scale, government-directed intelligence effort that US national security officials primarily fear. Instead, it appeared to be part of a specific internal effort by some ByteDance employees to hunt down leaks to the press, which may be deplorable but hardly uncommon for an organization under public scrutiny. (Nevertheless, the US government is reportedly investigating the incident.)

    Joyce, the NSA’s top cyber official, told reporters in December that what he really worries about is “large-scale influence” campaigns leveraging TikTok’s data, not “individualized targeting through [TikTok] to do malicious things.”

    To date, however, there’s no public evidence of that taking place.

    TikTok may collect an extensive amount of data, much of it quietly, but as far as researchers can tell, it isn’t any more invasive or illegal than what other US tech companies do.

    According to security experts, that’s more a reflection of the broad leeway we’ve given to tech companies in general to handle our data, not an issue that’s unique or specific to TikTok.

    “We have to trust that those companies are doing the right thing with the information and access we’ve provided them,” said Peiter “Mudge” Zatko, a longtime ethical hacker and Twitter’s former head of security who turned whistleblower. “We probably shouldn’t. And this comes down to a concern about the ultimate governance of these companies.”

    Lin told CNN that TikTok and other social media companies’ appetite for data highlights policy failures to pass strong privacy laws that regulate the tech industry writ large.

    “TikTok is only a product of the entire surveillance capitalism economy,” Lin said. “And governments around the world are ignoring their duty to protect citizens’ private information, allowing big tech companies to exploit user information for gain. Governments should try to better protect user information, instead of focusing on one particular app without good evidence.”

    Asked how he would advise policymakers to look at TikTok instead, Lin said: “What I would call for is more evidence-based policy.”

    [ad_2]

    Source link

  • NSA chief warns TikTok could censor videos as part of Chinese influence operations | CNN Business

    NSA chief warns TikTok could censor videos as part of Chinese influence operations | CNN Business

    [ad_1]


    Washington
    CNN
     — 

    US national security officials are concerned that TikTok could use its vast global reach to shape public opinion by either suppressing certain videos or promoting others, the head of the National Security Agency and US Cyber Command told lawmakers on Tuesday.

    “It’s not only the fact that you can influence something, but you can also turn off the message as well when you have such a large population of listeners,” Gen. Paul Nakasone said in testimony before the Senate Armed Services Committee.

    TikTok’s collection of data and its control over the algorithm that serves user content are also concerning, Nakasone said.

    Nakasone’s comments follow a directive from the White House that gives US federal agencies 30 days to remove TikTok from government-issued devices. And they come amid a major policy debate in Washington about what to do about one of the most popular apps among American youth.

    US officials have for years accused TikTok – and its Chinese parent firm ByteDance – of collecting data that could enable surveillance by the Chinese government. TikTok denies the allegations and has called on the Biden administration to finalize a national security deal that would allow TikTok to continue operating in the US in exchange for greater US government visibility into how it collects and stores data on Americans.

    A TikTok spokesperson said that the company has been working with the US government to address national security concerns.

    “Our status has been debated in public in a way that is divorced from the facts of that agreement and what we’ve achieved already. We will continue to do our part to deliver a comprehensive national security plan for the American people,” Brooke Oberwetter from TikTok said in statement.

    Some House lawmakers have pushed legislation that could effectively force the Biden administration to impose an outright ban on TikTok, but the prospects of that bill becoming law are slim.

    A bipartisan Senate bill that Virginia Democrat Mark Warner and South Dakota Republican John Thune are expected to unveil on Tuesday would give the Commerce Department authority to develop “mitigation measures,” up to and including a ban, to meet the risk posed by foreign-linked technologies.

    Like the US government push to ban hardware and other gear made by Huawei, another Chinese technology giant, US officials are often short on specifics when asked to show public proof of collusion between the Chinese government and ByteDance.

    “People are always looking for the smoking gun in these technologies,” NSA Cybersecurity Director Rob Joyce told reporters in December. “I characterize it much more as a loaded gun.”

    “I would not expect individualized targeting through [TikTok] to do malicious things,” Joyce said. “Where I’m concerned is the overall ability to do large-scale influence.”

    [ad_2]

    Source link

  • NSA director pushes Congress to renew surveillance powers

    NSA director pushes Congress to renew surveillance powers

    [ad_1]

    A top U.S. intelligence official on Thursday urged Congress to renew sweeping powers granted to American spy agencies to surveil and examine communications, saying they were critical to stopping terrorism, cyberattacks and other threats.

    The remarks by Army Gen. Paul Nakasone, director of the National Security Agency, opened what’s expected to be a contentious debate over provisions of the Foreign Intelligence Surveillance Act that expire at year’s end. The bipartisan consensus in favor of expanded surveillance powers in the years after Sept. 11 has given way to increased skepticism, especially among some Republicans who believe spy agencies used those powers to undermine former President Donald Trump.

    The new GOP majority in the U.S. House has already formed a panel on the “weaponization of the federal government.” And progressive Democrats have pushed for more curbs on warrantless surveillance.

    The NSA and other spy agencies use authorities under FISA’s Section 702 to collect huge swaths of foreign communications, which also results in the incidental collection of emails and calls from Americans. The law prohibits spy agencies from targeting Americans and requires the FBI to seek a court order to access a U.S. citizen’s communications.

    Section 702 was first added to FISA in 2008 and renewed for six years in 2018, when Trump originally tweeted opposition to the program but then reversed himself.

    Nakasone argued the law “plays an outsize role in protecting the nation” and generates “some of the U.S. government’s most valuable intelligence on our most challenging targets.”

    Gen. Paul Nakasone To Lead NSA
    Gen. Paul M. Nakasone is director of the National Security Agency.

    Alex Wong / Getty Images


    He gave several broad examples of that work, including the discovery of attempts to steal sensitive U.S. technology, stopping the transfer of weapons components, preventing cyberattacks, and “understanding the strategic intentions” of China and Russia.

    “We have saved lives because of 702,” Nakasone told a virtual meeting of the U.S. Privacy and Civil Liberties Oversight Board.

    The general said he could not publicly share more details about the impact of that surveillance, acknowledging that also limited his ability to make his case. Civil liberties advocates have long criticized the secrecy of intelligence court proceedings and the power agencies have to collect years of incidental data on Americans.

    Cindy Cohn, executive director of the Electronic Frontier Foundation, said Congress had created an effective “national security exception to the U.S. Constitution.”

    “The American people and indeed people all around the world have lost the ability to have a private conversation over digital networks,” she told the board. Section 702, Cohn said, “was a mass monitoring infrastructure that subjects people’s communications to NSA review.”

    Republicans on the House Intelligence Committee and other national security hawks are expected to push GOP colleagues to support a renewal this year accompanied by still-unspecified changes.

    “We’ve got to have a discussion within our own caucus, but I feel good about the groundwork we’ve laid,” said Rep. Mike Gallagher, a Wisconsin Republican who will lead the House’s new select committee on China, in an interview this week. “There’s serious and legitimate concern. And so part of the process of getting renewal is to put in place reform that gives people confidence that there won’t be abuses in the future.”

    In December 2019, the Justice Department’s inspector general found the FBI had withheld key information from the Foreign Intelligence Surveillance Court as it applied for warrants to monitor the communication of Carter Page, a Trump campaign aide. But the inspector general did make clear the extent to which agents relied during that process on uncorroborated allegations compiled by a former British spy.

    The chief judge of that court would issue an unusual rebuke to the FBI, saying it had made “unsupported” representations as it submitted the eavesdropping applications and had failed to provide other information that would have weakened the government’s case for surveillance.

    Responding to the scrutiny, the FBI announced a series of changes designed to ensure that its applications to the court, which approves warrants to eavesdrop on American soil on people suspected of being agents of a foreign power, are more accurate.

    Congress in 2020 let expire three provisions of the Patriot Act that the FBI and Justice Department had said were essential for national security, including one that permits investigators to surveil subjects without establishing that they’re acting on behalf of an international terrorism organization. A bill renewing those authorities passed the Senate, but Democrats pulled legislation from the House floor after Trump and House Republicans turned against the measure and ensured its defeat.

    [ad_2]

    Source link

  • Utilities Beware: The Whole IoT Is At Risk From Itself

    Utilities Beware: The Whole IoT Is At Risk From Itself

    [ad_1]

    Has the internet of things — the vast, interconnected, computer-centered ecosystem of today — reached a point where it is so complex, so multilayered, has so many architects, and has so many national interests embedded in it that it has become a threat to itself?

    Will the electric grid, the financial system or the air traffic control apparatus implode not by the hand of a malicious hacker but because the system — which is now systems of systems — has become the most subtle threat it faces?

    Worse, as the speed of telephony increases with 5G, will that speed up the system implosion with devastating consequences?

    Will this technological meltdown be triggered from within by a long-forgotten piece of code, a failed sensor or inferior products in vital, load-bearing points in this system?

    This kind of disaster from complexity is known as “emergent behavior.” Remember that concept. Likely, you will hear a lot about it going forward.

    Emergent behavior is what happens when various objects or substances come together and trigger a reaction which can’t be predicted, nor can the trigger be predetermined.

    Robert Gardner, founder and principal at New World Technology Systems and a National Security Agency consultant, tells me that the computer ecosystem is highly subject to emergent behavior in the so-called complex, adaptive system of systems which is today’s cyberworld. It is a world which has been built over time with new layers of complexity added willy-nilly as computing, and what has been asked of it, has become a huge, impregnable structure, beyond the reach of its present-day architects and minders, including cybersecurity aficionados.

    In At The Creation

    Gardner, to my mind, is worth listening to because he was, if you will, in at the beginning. At least, he was on hand and worked on the computer evolution, starting in the 1970s when he helped build the first supercomputers and has consulted with various national laboratories, including Lawrence Livermore and Los Alamos. He has also played a key role in the development of today’s super-sophisticated financial computing infrastructure, known as “fintech.”

    Gardner says of emergent behaviors in complex systems, “They can’t be predicted by examining individual components of a system as they are produced by the system as a whole — facilitating a perfect storm that conspires to produce catastrophe.”

    Complexity is the new adversary, he says of these huge, virtual systems of systems.

    Gardner adds, “The complexity adversary does not require outside assistance; it can be summoned by minor user, environmental or equipment failures, or timing instabilities in the ordinary operation of a system.

    “Current threat detection software does not seek or detect these system conditions, leaving them highly vulnerable.”

    Gardner cites two examples where the system failed itself. The first example is when a tree branch which fell on a power line in Ohio set in motion a blackout across the Michigan, New York, and Canada. The system became the problem: It went berserk, and 50 million people lost power.

    The second example is how something called “counterparty risk” sped the demise of Lehman Brothers, the Wall Street colossus. That was when a single default embedded in the system initiated the implosion of the whole structure.

    No Nefarious Actors

    Of these, Gardner says, “There were no nefarious actors to defend against; the complex, heterogeneous nature of the systems themselves led to emergent behaviors.”

    Going forward, the best practices in cyber hygiene won’t defend against catastrophe. The entwined systems are their own enemy. Utilities take note.

    And the danger may get worse, according to Gardner.

    The villain is 5G: the super-fast phone and data system now being deployed across the country. It will come in what are called “slices,” but for that you can read stages.

    · Slice one is what is being built out now: It is faster than today’s 4G, which is what phones and data use currently. It features mobile broadband.

    · Slice two, called “machine to machine,” is faster yet.

    · Slice three will move vast quantities of data at astounding speeds which, if the data is damaging to the system and has occurred at an unidentifiable location, represents a threat to a whole tranche of human activity.

    Self-destroying machines will be unstoppable when they have 5G slice three to speed bad information throughout their system and connected systems. Tech Armageddon.

    [ad_2]

    Llewellyn King, Contributor

    Source link

  • Chinese hacking group targeting US agencies and companies has surged its activity, analysis finds | CNN Politics

    Chinese hacking group targeting US agencies and companies has surged its activity, analysis finds | CNN Politics

    [ad_1]


    Washington
    CNN
     — 

    An elite Chinese hacking group with ties to operatives indicted by a US grand jury in 2020 has surged its activity this year, targeting sensitive data held by companies and government agencies in the US and dozens of other countries, according to an expert at consulting giant PricewaterhouseCoopers.

    The findings highlight the biggest cyber-espionage challenge facing the Biden administration: combating a Chinese hacking program that the FBI has called more prolific than that of all other governments in the world combined.

    The Justice Department has aggressively sought to expose the alleged data-stealing campaigns through indictments, and made the case that Chinese hackers have robbed American companies of intellectual property, causing huge losses. But China-based hackers have often developed new tools or otherwise altered their operations, according to analysts.

    One of the Chinese groups tracked by PwC has targeted dozens of US organizations in the last year, including government agencies and software or tech firms, said Kris McConkey, who leads PwC’s global cyber threat intelligence practice. The intruders often comb networks for data that could offer insights into foreign or trade policy, he said, but also dabble in cryptocurrency schemes for personal profit. He declined to detail what types of US government agencies, whether at the federal, state or local level, were targeted.

    “They are, by far, the most active and globally impactful [hacking group] that we track at the minute,” McConkey, who closely follows China-based hackers, told CNN. He believes the attackers have been successful in breaching at least some organizations because they operate on a vast scale, targeting organizations in at least 35 countries this year alone.

    McConkey traced part of the activity to an ostensibly legitimate cybersecurity company based in the Chinese city of Chengdu, but he stopped short of publicly connecting the hacking to the Chinese government. US officials have for years accused China of using front companies to conduct hacking that feeds the government’s sprawling intelligence collection efforts.

    China has repeatedly denied allegations of hacking and Beijing has in recent months stepped up its own accusations that Washington has conducted cyber operations against Chinese assets.

    Cybersecurity issues have been a repeated source of friction between the world’s two biggest economies; President Joe Biden raised the subject on a call with Chinese President Xi Jinping last year.

    McConkey was one of multiple private cyber specialists who exposed the operations, and sometimes the alleged locations, of hackers from China, Iran and elsewhere at a recent conference called LABScon, hosted by US security firm SentinelOne, in Scottsdale, Arizona.

    Adam Kozy, who tracked Chinese hackers at the FBI from 2011 to 2013, showed the audience a photo of a People’s Liberation Army building in the city of Fuzhou that allegedly houses officers who conduct information operations against Chinese adversaries. That unit has targeted Taiwan, Kozy said, and “is the main area for China’s disinformation operations.”

    In their investigations of foreign hackers, the FBI and Justice Department prosecutors have drawn on those types of revelations from private researchers.

    At least one FBI agent and officials from the National Security Agency and the US Cybersecurity and Infrastructure Security Agency attended the conference, a reminder of how reliant government officials are on data held by tech firms to pursue spies and cybercriminals. Sometimes that work happens not in a classified facility but in the halls of a luxury hotel.

    Morgan Adamski, a senior NSA official, told conference attendees that the coronavirus pandemic changed how her agency worked with private firms to guard sensitive data targeted by hackers.

    “The pandemic actually helped because it no longer revolved around big government meetings in a room, in a SCIF [Sensitive Compartmentalized Information Facility], where you couldn’t use any of the information,” said Adamski, who heads the NSA’s Cybersecurity Collaboration Center, which works with defense contractors to blunt the impact of foreign hacking.

    After US defense contractors began working from home during the pandemic, she said, Chinese government hackers exploited the virtual private networking (VPN) software the contractors were using. One hacked contractor, which she didn’t name, shared data with federal agencies so they could build a clearer picture of what was going on.

    Asked by CNN whether the NSA and other federal agencies responding to the hacks were able to evict the Chinese hackers, Adamski said it’s an iterative process.

    “When you talk about nation-state actors, you kick them out, but they’re going to come back,” Adamski said, “especially if you’re a defense industrial base company that is producing critical military intelligence for the Department of Defense.”

    [ad_2]

    Source link

  • Inside the furious week-long scramble to hunt down a massive Pentagon leak | CNN Politics

    Inside the furious week-long scramble to hunt down a massive Pentagon leak | CNN Politics

    [ad_1]



    CNN
     — 

    Jack Teixeira, wearing a green t-shirt and bright red gym shorts with his hands above his head, walked slowly backward toward the armed federal agents outside his home in North Dighton, Massachusetts, who took him into custody on charges of leaking classified documents.

    The carefully choreographed arrest of the 21-year-old Air National Guardsman stood in stark contrast to the Biden administration’s scramble one week earlier to deal with the fallout from the revelation that highly classified documents had been sitting publicly on the internet for weeks.

    Those leaked documents, which appeared to catch the Biden administration flat-footed, disclosed a blunt US intelligence assessment of the war in Ukraine, as well as details revealing US intelligence collection on allies.

    The Biden administration raced to determine the identity of the leaker who had posted pictures of folded-up documents online, to understand the full scope of what had been leaked and to soothe allies who were varying degrees of angry that their secrets had spilled out for the world to see.

    While the suspected leaker has been arrested, the administration’s damage assessment is still ongoing. It remains unclear whether the full extent of the impact of the leaks is known, as details from additional classified documents continued to be published throughout the week – even on Friday morning, the day after his arrest.

    Inside the Pentagon, Chairman of the Joint Chiefs of Staff Gen. Mark Milley was “pissed” at the leak and “deeply concerned” about its national security implications, a US official told CNN. The Defense Department has been holding daily meetings on the leak since Defense Secretary Lloyd Austin was first briefed last Thursday.

    The episode represents the most egregious disclosure of classified documents in years. The leaked documents have exposed what officials say are lingering vulnerabilities in the management of government secrets, even after agencies overhauled their computer systems following the 2013 Edward Snowden leak, which revealed the scope of the National Security Agency’s intelligence gathering apparatus.

    It is unlikely, however, that those safeguards would have prevented the most recent leak, sources said. “All classified systems have multiple levels of risk controls, but a determined insider will find the weak points over time,” said a former US official.

    The Pentagon has already taken steps to clamp down on who can access sensitive classified material, while Austin has ordered a review over access to classified documents. And Congress is vowing to investigate exactly what happened and why the US intelligence community failed to discover its secrets were sitting on a public internet forum for weeks.

    In a statement acknowledging the extent of the problem that the leaks exposed, President Joe Biden said Friday that he had directed both the military and intelligence community to “take steps to further secure and limit distribution of sensitive information.”

    “This is a breakdown,” Chris Krebs, the former head of the Department of Homeland Security’s cybersecurity agency, told CNN. “There’s no question that there will be a lot of introspection inside the intelligence community and across the government of where were those breakdowns? How do we ensure that we tighten that system of military discipline that that was referred to earlier to ensure that these things do not happen?”

    According to charging documents unsealed on Friday, Teixeira allegedly began posting classified information on the Discord server in December 2022.

    Teixeira is believed to be the head of obscure invite-only Discord chatroom called “Thug Shaker Central,” multiple US officials told CNN, where information from the classified documents was first posted.

    One of the users on the Discord server told FBI investigators that Teixeira began posting photographs of documents that appeared to be classified in January 2023, according to the affidavit unsealed Friday after Teixeira was arraigned.

    Investigators wrote in the affidavit that at least one of the documents that described the status of the Russia-Ukraine conflict, including troop movements, was classified at the TS-SCI level, meaning it contains top-secret, sensitive compartmentalized information.

    “The Government Document is based on sensitive U.S. intelligence, gathered through classified sources and methods, and contains national defense information,” the affidavit states.

    Teixeira, an airman first class stationed at Otis Air National Guard Base, was assigned to the 102nd Intelligence Wing, which is a “24/7 operational mission” that takes in intelligence from various sources and packages it into a product for some of the most senior military leaders around the globe, a defense official said.

    His job was not to be the one packaging the intelligence for those senior commanders, but rather to work on the network on which that highly classified intelligence lived. For that purpose, the official said Teixeira would be required to have a TS/SCI clearance, in the instance that he was exposed to that level of intelligence.

    “It’s not like your regular IT guy where you call a help desk and they come fix your computer,” the official said. “They’re working on a very highly classified system, so they require that clearance.”

    CNN has reviewed 53 documents that were posted on social media sites, which include US intelligence assessments of Ukrainian and Russian forces, as well as details about other countries providing weapons to Ukraine and other intelligence matters. The Washington Post has reported on an additional tranche of documents from the server.

    The photos showed crumpled documents laid on top of magazines and surrounded by other random objects, such as zip-close bags and Gorilla Glue, suggesting they had been hastily folded up and shoved into a pocket before being removed from a secure location.

    A Discord user told investigators that Teixeira had become concerned “he may be discovered making the transcriptions of text in the workplace, so he began taking the documents to his residence and photographing them,” according to the affidavit.

    Four Discord users active in a different Discord chatroom where the documents later appeared told CNN they began circulating on Thug Shaker. Another user who was in the Thug Shaker chatroom told CNN they saw the original posts of classified documents but declined to speak further about them.

    While the documents were being shared on Discord, there’s no indication that the US intelligence community was aware they were on the internet. Discord servers are typically small, private online communities that require an invitation to join.

    On April 6, The New York Times first reported on the leaked documents and the Pentagon having launched an investigation into who may have been behind the leak.

    The investigation into finding the leaker quickly moved into the hands of the Justice Department, while the Pentagon investigation focused on a damage assessment of the leaks themselves.

    But the number of leaked documents continued to grow in the hours and days that followed the initial disclosure, revealing new intelligence assessments on everything from South Korea’s hesitance to provide the US weapons that might be sent to Ukraine to intelligence suggesting Egypt planned to supply rockets to Russia.

    US diplomats were forced to deal with the fallout. Seoul said it would hold “necessary discussions with the US” following the leak.

    The documents that were leaked appear to be part of a daily intelligence briefing deck prepared for the Pentagon’s senior leaders, including Milley, the top US military general. On any given day, the slides in that deck can be properly accessed by hundreds, if not thousands, of people across the government, officials said.

    Last Friday’s announcement of a Justice Department investigation underscored just how high a priority the leak was considered.

    By Monday, FBI agents from Washington to California to Boston were combing through evidence, conducting interviews and tracking volumes of computer data that within days pointed to Teixeira. They worked with Army CID investigators experienced in classified document probes.

    Anthony Ferrante, a former FBI agent, said that the “first few hours are critical” in a case like the Discord leaks as investigators rush to preserve digital evidence before it becomes harder to find online or vanishes altogether.

    FBI agents likely worked backward from the initial Discord posts to build a profile of the leaker, combing through his other online accounts to “put a human behind a keyboard,” Ferrante, who is now global head of cybersecurity at FTI Consulting, told CNN.

    Even though Teixeira emerged quickly as the most obvious suspect, counterintelligence agents trained in uncovering foreign spies looked through Teixeira’s background to try to find any sign that he could be working with a foreign intelligence service.

    The FBI agents’ work was made more urgent because the trove of documents had set off a media frenzy and reporters found ready interviews among members of Teixeira’s Internet social circle.

    On Monday, the FBI interviewed a user of the Discord chatroom where the classified information had been posted, according to the affidavit. That person told investigators that a user who went by “Jack” and said he was in the Air National Guard was the server’s administrator.

    A day earlier, the investigative news outlet Bellingcat posted an interview with a member of that same chatroom.

    On Wednesday, a day before Teixeira’s arrest, the FBI obtained records from Discord that included the subscriber information of the server’s administrator, which had Teixeira’s name and address, according to the affidavit.

    By day 5 of the FBI’s search, agents believed they had enough to charge Teixeira, and they began surveilling him.

    In a different scenario, without the intense public attention, agents might have watched him for weeks to see if he was meeting anyone suspicious or if he had accomplices.

    Instead, they moved to make an arrest Thursday, as news helicopters flew above.

    Teixeira was charged under the Espionage Act with unauthorized retention and transmission of national defense information and unauthorized removal of classified information and defense materials. He will next appear on Wednesday in federal court in Massachusetts.

    For the Biden administration, the episode has already prompted the Pentagon to begin to limit who across the government receives its highly classified daily intelligence briefs, amid lingering questions over why a 21-year-old junior Air National Guardsman had access to such classified information – and why it wasn’t discovered more quickly.

    Austin and Milley spent time on the phone speaking with US allies and partners around the world regarding the sensitive intelligence and top-secret documents suddenly thrust into the public sphere. Those conversations were expected to continue through the end of the week, another US official said.

    Deputy Secretary of State Wendy Sherman was tapped to lead the diplomatic response to the leaked US intelligence documents, according to a US official familiar with the matter.

    Biden was continually briefed on the state of the investigation while abroad, as well as the efforts of his top officials to engage with allies over the leaked information, officials said. Behind the scenes, that effort was a reality that loomed over a deeply personal and important foreign trip for Biden, one official acknowledged. 

    Still, the leaks didn’t arise when Biden met Wednesday with British Prime Minister Rishi Sunak, a Five Eyes intelligence sharing ally.

    Biden publicly downplayed the significance of the leak when he made his first comments on the matter. “I’m concerned that it happened, but there is nothing contemporaneous that I’m aware of that is of great consequence,” Biden told reporters Thursday.

    [ad_2]

    Source link

  • How Meta got caught in tensions between the US and EU | CNN Business

    How Meta got caught in tensions between the US and EU | CNN Business

    [ad_1]



    CNN
     — 

    Facebook-parent Meta has perhaps become the most high-profile casualty of a long-running privacy dispute between Europe and the United States — but it may not be the last.

    Meta has been fined a record-breaking €1.2 billion ($1.3 billion) by European Union regulators for violating EU privacy laws by transferring the personal data of Facebook users to servers in the United States. Meta said Monday it would appeal the ruling, including the fine.

    The historic fine against Meta — and a potentially game-changing legal order that could force Meta to stop transferring EU users’ data to the United States — isn’t just a one-off decision limited to this one company or its individual business practices. It reflects bigger, unresolved tensions between Europe and the United States over data privacy, government surveillance and regulation of internet platforms.

    Those underlying and fundamental disagreements, which have simmered for years, have now come to a head, casting a significant shadow over thousands of businesses that depend on processing EU data in the United States.

    Beyond its huge economic implications, however, the fine has once again highlighted Europe’s deep mistrust of US surveillance powers — right as the US government is trying to build its own case against foreign-linked apps such as TikTok over similar surveillance concerns.

    The origins of Meta’s fine this week trace back to a 2020 ruling by Europe’s top court.

    In that decision, the European Court of Justice struck down a complex transatlantic framework Meta and many other companies had been relying on until then to legally move EU user data to US servers in the ordinary course of running their businesses.

    That framework, known as Privacy Shield, was itself the outgrowth of European complaints that US authorities didn’t do enough to protect the privacy of EU citizens. At the time Privacy Shield was created, the world was still reeling from disclosures made by National Security Agency leaker Edward Snowden. His disclosures highlighted the vast reach of US surveillance programs such as PRISM, which allowed the NSA to snoop on the electronic communications of foreign nationals as they used tech tools built by Google, Microsoft, and Yahoo, among others.

    PRISM relied on a basic fact of internet architecture: Much of the world’s online communications take place on US-based platforms that route their data through US servers, with few legal protections or recourse for either foreigners or Americans swept up in the tracking.

    A 2013 European Parliament report on the PRISM program captured the EU’s sense of alarm, noting the “very strong implications” for EU citizens.

    “PRISM seems to have allowed an unprecedented scale and depth in intelligence gathering,” the report said, “which goes beyond counter-terrorism and beyond espionage activities carried out by liberal regimes in the past. This may lead towards an illegal form of Total Information Awareness where data of millions of people are subject to collection and manipulation by the NSA.”

    Privacy Shield was a 2016 US-EU agreement designed to address those concerns by making US companies certifiably accountable for their handling of EU user data. For a time, it seemed as if Privacy Shield could be a lasting solution facilitating the growth of the internet and a globally connected society, one in which the free flow of data would not be impeded.

    But when the European Court of Justice invalidated that framework in 2020, it reiterated longstanding surveillance concerns and insisted that Privacy Shield still didn’t provide EU citizens’ personal information the same level of protection in the US that it enjoys in EU countries, a standard required under GDPR, the EU’s signature privacy law.

    The loss of Privacy Shield created enormous uncertainty for the more than 5,300 businesses that rely on the smooth transfer of data across borders. The US government has said transatlantic data flows support the more than $7 trillion dollars of economic activity that occurs every year between the United States and the European Union. And the US Chamber of Commerce has estimated that transatlantic data transfers account for about half of all data transfers in both the US and the EU.

    The Biden administration has moved to implement a successor to Privacy Shield that contains some changes to US surveillance practices, and if it is fully implemented in time, it could prevent Meta and other companies from having to suspend transatlantic data transfers or some of their European operations.

    But it’s unclear whether those changes will be enough to be accepted by the EU, or whether the new data privacy framework could avoid its own court challenge.

    The possibility that US-EU data transfers may be seriously disrupted is refocusing scrutiny on US surveillance law just as the US government has been sounding its own alarms about Chinese government surveillance.

    US officials have warned that China could seek to use data collected from TikTok or other foreign-linked companies to benefit the country’s intelligence or propaganda campaigns, using the personal information to identify spying targets or to manipulate public opinion through targeted disinformation.

    But US moral authority on the issue risks being eroded by the EU criticism, a problem for the US government that may only be compounded by its own missteps.

    Just last week, a federal court described how the FBI improperly accessed a vast intelligence database meant for surveilling foreign nationals in a bid to gather information on US Capitol rioters and those who protested the 2020 killing of George Floyd.

    The improper access, which was not “reasonably likely” to retrieve foreign intelligence information or evidence of a crime, according to a Justice Department assessment described in the court’s opinion, has only inflamed domestic critics of US surveillance law, and could give ammunition to EU critics.

    The intelligence database at issue was authorized under Section 702 of the Foreign Intelligence Surveillance Act — the same law used to justify the NSA’s PRISM program and which the EU has repeatedly cited as a danger to its citizens and a reason to suspect transatlantic data sharing.

    While the US distinguishes itself from China based on commitments to open and democratic governance, the EU’s concerns about the US are not much different in kind: They come from a place of deep mistrust of broad surveillance authority and suspicions about the potential misuse of user data.

    For years, civil liberties advocates have alleged that Section 702 enables warrantless spying on Americans on an enormous scale. Now, the FBI incident may only further validate EU fears; add to the existing concerns that led to Meta’s fine; contribute to the potential unraveling of the US-EU data relationship; and damage US credibility in its push to warn about the hypothetical risks of letting TikTok data flow to China.

    If a new transatlantic data agreement is delayed or falls apart, Meta won’t be the only company stuck with the bill. Thousands of other companies may get caught in the middle, and the United States will have to hope nobody looks too closely at why while still trying to make a case against TikTok.

    [ad_2]

    Source link

  • Biden picks Air Force general to lead NSA and Cyber Command | CNN Politics

    Biden picks Air Force general to lead NSA and Cyber Command | CNN Politics

    [ad_1]



    CNN
     — 

    President Joe Biden has nominated an Air Force general to head the nation’s powerful electronic spying agency and the US military command that conducts offensive cyber operations – a crucial position as the US continues to battle Russia, China and other foes in cyberspace.

    Lt. Gen. Timothy Haugh, who has served for years in senior US military cyber positions, is Biden’s choice to replace outgoing Army Gen. Paul Nakasone as head of the National Security Agency and US Cyber Command, an Air Force official confirmed to CNN.

    Politico first reported on Haugh’s nomination.

    The White House did not respond to a request for comment.

    Haugh’s nomination could face a roadblock in the Senate after Republican Sen. Tommy Tuberville of Alabama put a hold on senior military nominations because he objects to the department’s abortion travel policy.

    Haugh is currently deputy of US Cyber Command, a command of thousands of US military personnel who conduct offensive and defensive cyber operations to protect US critical infrastructure. Officials from the command traveled to Ukraine in late 2021 to prepare Kyiv for an onslaught of Russian cyberattacks that accompanied the full-scale Russian invasion.

    The command and NSA also have taken an increasingly active role in helping defend American elections from foreign interference under Nakasone’s leadership over the last five years.

    During the 2020 election, Iranian hackers accessed a US municipal website for reporting unofficial election results and Cyber Command kicked the hackers off the network out of concern that they might post fake results on the website, a senior US military official revealed last month.

    Haugh’s nomination signals a continued emphasis on election security work at Fort Meade, the sprawling military base in Maryland where the NSA and Cyber Command are housed. As a senior US military cyber official, Haugh has been involved in election security discussions in recent midterm and general elections.

    [ad_2]

    Source link