ReportWire

Tag: Security products and services

  • Ukraine bans religious organizations with links to Russia

    Ukraine bans religious organizations with links to Russia

    KYIV, Ukraine — Ukraine on Friday banned the activities of religious organizations “affiliated with centers of influence” in Russia and said it would examine the links between the Ukrainian and Russian Orthodox churches.

    Ukrainian President Volodymyr Zelenskyy signed a decree enacting a National Security and Defense Council decision to impose personal sanctions against representatives of religious organizations associated with Russia, which invaded Ukraine more than nine months ago.

    Zelenskyy’s decree additionally provided for examining the Ukrainian Orthodox Church of the Moscow Patriarchate, one of two Orthodox bodies in Ukraine following a schism that in 2019 resulted in the establishment of one with independence from the Russian church.

    Ukrainian officials suspect the Ukrainian Orthodox Church is promoting pro-Russian views and that some priests may be actively collaborating with Russia. Moscow Patriarch Kirill, the head of the Russian Orthodox Church, has justified Russia’s war in Ukraine as part of a “metaphysical struggle” to prevent a liberal ideological encroachment from the West.

    Kremlin spokesman Dmitry Peskov accused Ukrainian authorities last week of “waging a war on the Russian Orthodox Church.” But the Rev. Mykolay Danylevich, who has often served as a spokesperson for the Ukrainian Orthodox Church, disputed Peskov’s characterization, asserting on Telegram that the church was not Russian.

    The UOC declared its independence from Moscow in May over Russia’s invasion of Ukraine.

    In his nightly video address on Thursday, Zelenskyy said the use of Kyiv’s Pechersk Lavra monastery complex — a UNESCO world heritage site revered as the cradle of Orthodox monasticism in the region — would also come under further scrutiny.

    Members of the Security Service of Ukraine, the country’s National Guard and police searched the monastery last week after a priest spoke favorably about Russia during a service there. The Security Service said its agents searched more than 350 church buildings in all, including at another monastery and in a diocese of the Rivne region, 240 kilometers (150 miles) west of Kyiv.

    The security agency, which is known by the Ukrainian acronym SBU, said the searches turned up “pro-Russian literature, which is used during studies in seminaries and parish schools, including for propaganda of the ‘Russian world.’” More than 50 people underwent in-depth “counterintelligence interviews, including using a polygraph,” as part of the investigation, the agency said.

    The investigation of the centuries-old monastic complex in Ukraine’s capital and other religious sites underscored Ukrainian authorities’ suspicions about some Orthodox Christian clergy they consider as remaining loyal to Russia. The SBU said last week’s activities were part of its “systematic work to counter the subversive activities of the Russian special services in Ukraine.”

    Orthodox Christians are the largest religious population in Ukraine. But they have been fractured along lines that echo political tensions over Ukraine’s defense of its independence and its Western orientation amid Russia’s continued claim to political and spiritual hegemony in the region — a concept sometimes called the “Russian world.” Many Orthodox leaders have spoken fiercely in favor of Ukrainian independence and denounced the Russian invasion, but the recent searches show that authorities suspect places like Pechersk Lavra of being hotbeds of pro-Russian sentiment and activity.

    ———

    Follow AP’s coverage of the war in Ukraine: https://apnews.com/hub/russia-ukraine

    Source link

  • US FCC bans sales, import of Chinese tech from Huawei, ZTE

    US FCC bans sales, import of Chinese tech from Huawei, ZTE

    WASHINGTON — The U.S. is banning the sale of communications equipment made by Chinese companies Huawei and ZTE and restricting the use of some China-made video surveillance systems, citing an “unacceptable risk” to national security.

    The five-member Federal Communications Commission said Friday it has voted unanimously to adopt new rules that will block the importation or sale of certain technology products that pose security risks to U.S. critical infrastructure. It’s the latest in a years-long escalation of U.S. restrictions of Chinese technology that began with President Donald Trump and has continued under President Joe Biden’s administration.

    “The FCC is committed to protecting our national security by ensuring that untrustworthy communications equipment is not authorized for use within our borders, and we are continuing that work here,” said FCC Chairwoman Jessica Rosenworcel, a Democrat, in a prepared statement.

    Huawei declined comment Friday. Along with Huawei and ZTE, the order affects products made by companies such as Hikvision and Dahua, makers of widely used video surveillance cameras.

    The FCC’s order applies to future authorizations of equipment, though the agency leaves open the possibility it could revoke previous authorizations.

    “Our unanimous decision represents the first time in FCC history that we have voted to prohibit the authorization of new equipment based on national security concerns,” tweeted Brendan Carr, a Republican FCC commissioner.

    Carr added that as “a result of our order, no new Huawei or ZTE equipment can be approved. And no new Dahua, Hikvision, or Hytera gear can be approved unless they assure the FCC that their gear won’t be used for public safety, security of government facilities, & other national security purposes.”

    Hikvision said in a statement that its video products “present no security threat” to the U.S. but the FCC’s decision “will do a great deal to make it more harmful and more expensive for US small businesses, local authorities, school districts, and individual consumers to protect themselves, their homes, businesses and property.”

    Source link

  • US FCC bans sales, import of Chinese tech from Huawei, ZTE

    US FCC bans sales, import of Chinese tech from Huawei, ZTE

    The U.S. is banning the sale of communications equipment made by Chinese companies Huawei and ZTE and restricting the use of some China-made video surveillance systems, citing an “unacceptable risk” to national security

    WASHINGTON — The U.S. is banning the sale of communications equipment made by Chinese companies Huawei and ZTE and restricting the use of some China-made video surveillance systems, citing an “unacceptable risk” to national security.

    The five-member Federal Communications Commission said Friday it has voted unanimously to adopt new rules that will block the importation or sale of certain technology products that pose security risks to U.S. critical infrastructure. It’s the latest in a years-long escalation of U.S. restrictions of Chinese technology that began with President Donald Trump and has continued under President Joe Biden’s administration.

    “The FCC is committed to protecting our national security by ensuring that untrustworthy communications equipment is not authorized for use within our borders, and we are continuing that work here,” said FCC Chairwoman Jessica Rosenworcel, a Democrat, in a prepared statement.

    Along with Huawei and ZTE, the order affects products made by companies such as Hikvision and Dahua, makers of widely used video surveillance cameras.

    The FCC’s order applies to future authorizations of equipment, though the agency leaves open the possibility it could revoke previous authorizations.

    “Our unanimous decision represents the first time in FCC history that we have voted to prohibit the authorization of new equipment based on national security concerns,” tweeted Brendan Carr, a Republican FCC commissioner.

    Carr added that as “a result of our order, no new Huawei or ZTE equipment can be approved. And no new Dahua, Hikvision, or Hytera gear can be approved unless they assure the FCC that their gear won’t be used for public safety, security of government facilities, & other national security purposes.”

    Source link

  • Report: Norway detains university lecturer as suspected spy

    Report: Norway detains university lecturer as suspected spy

    COPENHAGEN, Denmark — Norway’s domestic security agency has detained a man who entered the country as a Brazilian citizen but is suspected of being a Russian spy, a Norwegian broadcaster reported Tuesday.

    The man was arrested Monday in the Arctic city of Tromsoe, Norwegian public broadcaster NRK said, adding that investigators believe he was in Norway under a false name and identity while working for one of Russia’s intelligence services.

    Norwegian Police Security Service deputy chief Hedvig Moe told NRK that the man had been based at the Arctic University of Norway in Tromsoe as “a Brazilian researcher” and would be expelled from the Scandinavian country “because we believe he represents a threat to fundamental national interests.”

    The security service, known as PST, “is concerned that he may have acquired a network and information about Norway’s policy in the northern region,” Moe said, according to NRK. “Even if this network or the information bit by bit is a threat to the security of the kingdom, we are worried that the information could be misused by Russia.”

    PST representatives were not immediately available to comment. In a statement, Arctic University of Norway administrator Jørgen Fossland said the person in question was “a guest lecturer” at the school. Fossland referred other questions to the security service.

    Several Russian citizens have been detained in Norway in recent weeks. They include three men and a woman who were seen allegedly taking photos in central Norway of objects covered under a photography ban. They have since been released.

    European nations have heightened security around key energy, internet and power infrastructure following underwater explosions that ruptured two natural gas pipelines in the Baltic Sea that were built to deliver Russian gas to Germany.

    The damaged Nord Stream pipelines off Sweden and Denmark discharged huge amounts of methane, a potent greenhouse gas, into the air.

    Source link

  • Former Uber security chief guilty of data breach coverup

    Former Uber security chief guilty of data breach coverup

    SAN FRANCISCO — The former chief security officer for Uber was convicted Wednesday of trying to cover up a 2016 data breach in which hackers accessed tens of millions of customer records from the ride-hailing service.

    A federal jury in San Francisco convicted Joseph Sullivan of obstructing justice and concealing knowledge that a federal felony had been committed, federal prosecutors said.

    Sullivan remains free on bond pending sentencing and could face a total of eight years in prison on the two charges when he is sentenced, prosecutors said.

    “Technology companies in the Northern District of California collect and store vast amounts of data from users,” U.S. Attorney Stephanie M. Hinds said in a statement. “We will not tolerate concealment of important information from the public by corporate executives more interested in protecting their reputation and that of their employers than in protecting users.”

    It was believed to be the first criminal prosecution of a company executive over a data breach.

    A lawyer for Sullivan, David Angeli, took issue with the verdict.

    “Mr. Sullivan’s sole focus — in this incident and throughout his distinguished career — has been ensuring the safety of people’s personal data on the internet,” Angeli told the New York Times.

    An email to Uber seeking comment on the conviction wasn’t immediately returned.

    Sullivan was hired as Uber’s chief security officer in 2015. In November 2016, Sullivan was emailed by hackers, and employees quickly confirmed that they had stolen records on about 57 million users and also 600,000 driver’s license numbers, prosecutors said.

    After learning of the breach, Sullivan began a scheme to hide it from the public and the Federal Trade Commission, which had been investigating a smaller 2014 hack, authorities said.

    According to the U.S. attorney’s office, Sullivan told subordinates that “the story outside of the security group was to be that ‘this investigation does not exist,’” and arranged to pay the hackers $100,000 in bitcoin in exchange for them signing non-disclosure agreements promising not to reveal the hack. He also never mentioned the breach to Uber lawyers who were involved with the FTC’s inquiry, prosecutors said.

    “Sullivan orchestrated these acts despite knowing that the hackers were hacking and extorting other companies as well as Uber,” the U.S. attorney’s office said.

    Uber’s new management began investigating the breach in the fall of 2017. Despite Sullivan lying to the new chief executive officer and others, the truth was uncovered and the breach was made public, prosecutors said.

    Sullivan was fired along with Craig Clark, an Uber lawyer he had told about the breach. Clark was given immunity by prosecutors and testified against Sullivan.

    No other Uber executives were charged in the case.

    The hackers pleaded guilty in 2019 to computer fraud conspiracy charges and are awaiting sentencing.

    Sullivan was convicted of of obstruction of proceedings of the Federal Trade Commission and misprision of felony, meaning concealing knowledge of a felony from authorities.

    Meanwhile, some experts have questioned how much cybersecurity has improved at Uber since the breach.

    The company announced last month that all its services were operational following what security professionals called a major data breach, claiming there was no evidence the hacker got access to sensitive user data.

    The lone hacker apparently gained access posing as a colleague, tricking an Uber employee into surrendering their credentials. Screenshots the hacker shared with security researchers indicate they obtained full access to the cloud-based systems where Uber stores sensitive customer and financial data.

    It is not known how much data the hacker stole or how long they were inside Uber’s network. There was no indication they destroyed data.

    Source link

  • Former Uber security chief guilty of data breach coverup

    Former Uber security chief guilty of data breach coverup

    SAN FRANCISCO — The former chief security officer for Uber was convicted Wednesday of trying to cover up a 2016 data breach in which hackers accessed tens of millions of customer records from the ride-hailing service.

    A federal jury in San Francisco convicted Joseph Sullivan of obstructing justice and concealing knowledge that a federal felony had been committed, federal prosecutors said.

    Sullivan remains free on bond pending sentencing and could face a total of eight years in prison on the two charges when he is sentenced, prosecutors said.

    “Technology companies in the Northern District of California collect and store vast amounts of data from users,” U.S. Attorney Stephanie M. Hinds said in a statement. “We will not tolerate concealment of important information from the public by corporate executives more interested in protecting their reputation and that of their employers than in protecting users.”

    Sullivan was hired as Uber’s chief security officer in 2015. In November 2016, Sullivan was emailed by hackers, and employees quickly confirmed that they had stolen records on about 57 million users and also 600,000 driver’s license numbers, prosecutors said.

    After learning of the breach, Sullivan began a scheme to hide it from the public and the Federal Trade Commission, which had been investigating a smaller 2014 hack, authorities said.

    According to the U.S. attorney’s office, Sullivan told subordinates that “the story outside of the security group was to be that ‘this investigation does not exist,’” and arranged to pay the hackers $100,000 in bitcoin in exchange for them signing non-disclosure agreements promising not to reveal the hack. He also never mentioned the breach to Uber lawyers who were involved with the FTC’s inquiry, prosecutors said.

    “Sullivan orchestrated these acts despite knowing that the hackers were hacking and extorting other companies as well as Uber,” the U.S. attorney’s office said.

    Uber’s new management began investigating the breach in the fall of 2017. Despite Sullivan lying to the chief executive officer and others, the truth was uncovered and the breach was made public, prosecutors said.

    Sullivan was fired. The hackers pleaded guilty in 2019 to computer fraud conspiracy charges and are awaiting sentencing.

    An email to Uber seeking comment on the conviction wasn’t immediately returned.

    Some experts have questioned how much cybersecurity has improved at Uber since the breach.

    The company announced last month that all its services were operational following what security professionals called a major data breach, claiming there was no evidence the hacker got access to sensitive user data.

    The lone hacker apparently gained access posing as a colleague, tricking an Uber employee into surrendering their credentials. Screenshots the hacker shared with security researchers indicate they obtained full access to the cloud-based systems where Uber stores sensitive customer and financial data.

    It is not known how much data the hacker stole or how long they were inside Uber’s network. There was no indication they destroyed data.

    Source link