Congressional hearing investigates role of cryptocurrencies in domestic terrorism financing

Congressional hearing investigates role of cryptocurrencies in domestic terrorism financing

A recent Congressional hearing held by the Subcommittee on National Security, International Development, and Monetary Policy sought to examine the use of cryptocurrencies in financing domestic terrorism such as the Capitol Insurrection as well as the way privacy rights make investigations harder.

US Defense Intelligence Agency admits to buying citizens’ location data

US Defense Intelligence Agency admits to buying citizens’ location data

In a memo sent to Sen. Ron Wyden (D-OR) and obtained by The New York Times, the Defense Intelligence Agency (DIA) admitted that it buys location data from brokers — and that the data isn’t separated by whether a person lives in the US or outside of it.

Intelligence Analysts Use U.S. Smartphone Location Data Without Warrants, Memo Says

Intelligence Analysts Use U.S. Smartphone Location Data Without Warrants, Memo Says

In October, BuzzFeed reported on the existence of a legal memo from the Department of Homeland Security opining that it was lawful for law enforcement agencies to buy and use smartphone location data without a warrant.

Standard Notes Completes Penetration Test and Cryptography Audit

Standard Notes Completes Penetration Test and Cryptography Audit

This release uses the latest state-of-the-art, cryptographer-recommended algorithms for modern day encryption and key generation, designed to withstand the latest advances in cryptographic attacks and brute-forcing.These new releases are backed by two new security audits conducted by two of the world’s leading cryptography research and testing firms: Cure53 and Trail of Bits.

Dark web crime: how Australia's powerful new warrants would work

Dark web crime: how Australia's powerful new warrants would work

Data disruption and network activity warrants can be issued by an eligible judge or a nominated member of the administrative appeals tribunal (AAT), while account takeover warrants must come from a magistrate.

Government Mandated Backdoors

Government Mandated Backdoors

We cover the current processes for gaining lawful access to data and how these new proposals don't amount to any true improvement upon existing capabilities.These new positions reflect a stark step in the wrong direction if you care to preserve human privacy.

US joins six countries in new call for backdoor encryption access

US joins six countries in new call for backdoor encryption access

On Monday, the US Department of Justice signed on to a new international statement warning of the dangers of encryption and calling for an industry-wide effort to enable law enforcement agencies to access encrypted data once a warrant has been obtained.

Inside the NBA's plan to use smart technology and big data to keep players safe from coronavirus

Inside the NBA's plan to use smart technology and big data to keep players safe from coronavirus

According to the NBA's health and safety memo for the restart of the season, which was obtained by CNBC, residents will receive a "smart" ring, a Disney MagicBand, individual pulse oximeter and a smart thermometer to help monitor and reduce the spread of the coronavirus.

Amazon to use AI tech in its warehouses to enforce social distancing

Amazon to use AI tech in its warehouses to enforce social distancing

(Reuters) - Inc (AMZN.O) on Tuesday launched an artificial intelligence-based tracking system to enforce social distancing at its offices and warehouses to help reduce any risk of contracting the new coronavirus among its workers.

DEA Can Secretly Surveil George Floyd Protesters

DEA Can Secretly Surveil George Floyd Protesters

The Drug Enforcement Administration has been granted sweeping new authority to “conduct covert surveillance” and collect intelligence on people participating in protests over the police killing of George Floyd, according to a two-page memorandum obtained by BuzzFeed News.

Acting Intelligence Chief says he's "increasingly concerned" over handling of sensitive U.S. person information among agencies and orders broad review

Acting Intelligence Chief says he's "increasingly concerned" over handling of sensitive U.S. person information among agencies and orders broad review

But Grenell wrote, "As the Acting Director of National Intelligence, I serve as the approving official for dissemination of unmasked congressional identity information...I have become increasingly concerned with intelligence reports that inconsistently apply the policies and procedures governing how U.S. person identities are masked.".

Why should the UK pensions watchdog be able to spy on your internet activities? Same reason as the Environment Agency and many more

Why should the UK pensions watchdog be able to spy on your internet activities? Same reason as the Environment Agency and many more

In a memorandum [PDF] first spotted by The Guardian, the British government is asking that five more public authorities be added to the list of bodies that can access data scooped up under the nation's mass-surveillance laws: the Civil Nuclear Constabulary, the Environment Agency, the Insolvency Service, the UK National Authority for Counter Eavesdropping (UKNACE), and the Pensions Regulator.

Qubes Architecture Next Steps: The GUI Domain

Qubes Architecture Next Steps: The GUI Domain

There were two big issues in the previous Qubes architecture that needed to be handled for an effective approach to a GUI domain: how the GUI protocol relied on dom0-level privileges and how managing anything in the system required dom0-level access to the hypervisor.

US to start collecting DNA from people detained at border

US to start collecting DNA from people detained at border

A memo outlining the program published Monday by the Department of Homeland Security said U.S. citizens and permanent residents holding a “green card” who are detained could be subject to DNA testing, as well as asylum seekers and people entering the country without authorization.

Pentagon warns US military not to use home DNA testing kits

Pentagon warns US military not to use home DNA testing kits

The Pentagon is advising members of the US military not to use DNA testing kits, warning that the popular genetic identification kits could pose a security risk.But a department of defence memo, obtained by Yahoo News, warned that the kits could put members of the military at risk.

New Intel CPU Vulnerability Puts Protected Data At Risk

New Intel CPU Vulnerability Puts Protected Data At Risk

Intel CPUs are at the center of controversy once again as yet another vulnerability is discovered by Cybersecurity researchers.According to their findings, the security vulnerability can compromise SGX (software guard extensions) protected by undervolting the CPU when executing protected computations, to the degree that the SGX memory encryption failed to protect data.

Librem 13 – Purism

Librem 13 – Purism

The Librem 13 is the first ultra-portable laptop for the security-conscious road warrior—designed chip-by-chip, line-by-line, to respect your rights to privacy, security, and freedom.When you use a Purism computer you know you are operating the best hardware and software, while keeping your rights to privacy, security, and freedom in mind.

Snowden will make first major appearance since U.S. lawsuit at conference next month

Snowden will make first major appearance since U.S. lawsuit at conference next month

NEW YORK (Reuters) - Fugitive U.S. intelligence whistleblower Edward Snowden will speak next month by video at Web Summit in Lisbon, billed by the organizers as the world’s largest annual tech conference.

Feds Sue Edward Snowden, Move to Seize Book Proceeds

Feds Sue Edward Snowden, Move to Seize Book Proceeds

"The United States' ability to protect sensitive national security information depends on employees' and contractors' compliance with their non-disclosure agreements, including their pre-publication review obligations," said US assistant attorney general Jody Hunt in a statement.

Weakness in Intel chips lets researchers steal encrypted SSH keystrokes

Weakness in Intel chips lets researchers steal encrypted SSH keystrokes

Now, researchers are warning that, in certain scenarios, attackers can abuse DDIO to obtain keystrokes and possibly other types of sensitive data that flow through the memory of vulnerable servers.

The Neuroscientist Who's Building a Better Memory for Humans

The Neuroscientist Who's Building a Better Memory for Humans

Later, when Berger gave the memory task rats a drug that blocks memory formation, he used his device to electrically stimulate the brain with the pattern of pulses—the outgoing space-time code—predicted by his model.

An electronic chip that makes ‘memories’ is a step towards creating bionic brains

An electronic chip that makes ‘memories’ is a step towards creating bionic brains

Our new electronic chip uses light to create and modify memories, moving us closer towards artificial intelligence (AI) that can replicate the human brain’s sophistication. This enables it to mimic the way neurons work to store and delete information in the brain.

Memory Industry

Memory Industry

If you choose to make your Vid public and it includes the auto-generated memory for a particular brand, then that brand will have the opportunity to add a swipe-up link to that memory, provided the user has chosen to monetize it.

JavaScript tells all, which turns out not to be so great for privacy: Side-channel leaks can be exploited to follow you around the interweb

JavaScript tells all, which turns out not to be so great for privacy: Side-channel leaks can be exploited to follow you around the interweb

Boffins from Graz University of Technology in Austria have devised an automated system for browser profiling using two new side channel attacks that can help expose information about software and hardware to fingerprint browsers and improve the effectiveness of exploits.

New Intel CPU Flaws Expose VMs and Clouds to Full Takeover – Introducing RIDL, ZombieLoad and Fallout

New Intel CPU Flaws Expose VMs and Clouds to Full Takeover – Introducing RIDL, ZombieLoad and Fallout

While existing attacks target information at specific addresses, RIDL operates akin to a passive sniffer that eavesdrops on in-flight data (e.g., data in the line fill buffers) flowing through CPU components.

GrapheneOS is an Android-based, security-hardened, open source operating system

GrapheneOS is an Android-based, security-hardened, open source operating system

It’s called GrapheneOS, and it comes from Daniel Micay, the former lead developer of another security-based Android fork called CopperheadOS. Since it’s an open source project, independent developers may be able to port the operating system to run on additional devices.

GitHub - rek7/mXtract: mXtract - Memory Extractor & Analyzer

GitHub - rek7/mXtract: mXtract - Memory Extractor & Analyzer

It is developed as an offensive pentration testing tool, which is used to scan memory for private keys, ips, and passwords using regexes. Scan with verbose and with a simple IP regex, scanning only heap and stack.

Federal agency looking at fitness trackers for public sector workers

Federal agency looking at fitness trackers for public sector workers

"Interactive insurance policies give consumers the opportunity to receive discounts on premiums for sharing health-related information through wearable tracking devices," says the memo.

Warning over 'high severity' security flaw in Google's Chrome web browser being exploited in the wild

Warning over 'high severity' security flaw in Google's Chrome web browser being exploited in the wild

Users of Google's Chrome web browser have been advised to update it as a matter of urgency following the discovery of exploits in the wild for a ‘high severity' security flaw publicised in February.

Google Project Zero team reveals ‘high severity’ flaw in macOS kernel, working w/ Apple on a patch

Google Project Zero team reveals ‘high severity’ flaw in macOS kernel, working w/ Apple on a patch

Most recently, the team at Google has reported and publicly disclosed a “high severity” flaw in the macOS kernel which can grant an attacker access to a users computer without their knowledge.