{"id":18905,"date":"2022-04-30T10:45:05","date_gmt":"2022-04-30T18:45:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/04\/30\/news-12638\/"},"modified":"2022-04-30T10:45:05","modified_gmt":"2022-04-30T18:45:05","slug":"news-12638","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/04\/30\/news-12638\/","title":{"rendered":"FBI Conducted 3.4 Million Warrantless Searches of Americans&#8217; Data"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/626c7f0298bdedbbd2da03d7\/master\/pass\/FBI-Warrantless-Searches-Roundup-Security-1337330477.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Sat, 30 Apr 2022 13:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/lily-hay-newman\">Lily Hay Newman<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">Surprising news abounded<\/span> this week as Ukrainian officials weigh next steps in their digital campaigns against Russia, given that <a href=\"https:\/\/www.wired.com\/story\/ukraine-russia-digital-battle\/\">their efforts so far have been unexpectedly successful<\/a>, if sometimes controversial. Overall, <a href=\"https:\/\/www.wired.com\/story\/russia-hacked-attacks\/\">Russia is being pummeled with cyberattacks<\/a> of all sorts at a scale beyond anything the country has dealt with before.<\/p>\n<p class=\"paywall\">Meanwhile, new research indicates that a small group of North Koreans have taught themselves to <a href=\"https:\/\/www.wired.com\/story\/north-korean-phone-jailbreakers\/\">jailbreak smartphones in an effort to bypass the regime&#x27;s extensive digital restrictions<\/a> and access forbidden media.<\/p>\n<p class=\"paywall\">Elon Musk&#x27;s bid this week to purchase Twitter highlighted a host of <a href=\"https:\/\/www.wired.com\/story\/elon-musk-twitter-privacy-anonymity\/\">potential privacy and security concerns for the platform&#x27;s users<\/a>. The <a href=\"https:\/\/www.wired.com\/story\/child-abuse-hosting-us-increase\/\">United States faced a notable spike in child sexual abuse sites<\/a> in 2021 as CSAM hosting continued to increase dramatically around the world. <a href=\"https:\/\/www.wired.com\/story\/hollywood-piracy-vpn-lawsuits\/\">Hollywood&#x27;s fight against VPNs has gotten more heated<\/a> as the entertainment industry expands its accusations about illegal activity enabled by the services. And Cloudflare recorded a <a href=\"https:\/\/www.wired.com\/story\/ddos-attack-botnet-crypto-platform\/\">historic DDoS attack that bombarded a cryptocurrency platform<\/a> with 15.3 million requests.<\/p>\n<p class=\"paywall\">If you feel like doing something for your own security or that of your business this weekend, we&#x27;ve got a <a href=\"https:\/\/www.wired.com\/story\/ios-android-chrome-updates-april-2022\/\">roundup of all the most critical mainstream vulnerabilities<\/a> from April that you can patch right now.\u00a0<\/p>\n<p class=\"paywall\">And there&#x27;s more. We\u2019ve rounded up all the news that we didn\u2019t break or cover in depth this week. Click on the headlines to read the full stories. And stay safe out there.<\/p>\n<p class=\"paywall\">The Office of the Director of National Intelligence released its annual <a data-offer-url=\"https:\/\/www.dni.gov\/files\/CLPT\/documents\/2022_ASTR_for_CY2020_FINAL.pdf\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.dni.gov\/files\/CLPT\/documents\/2022_ASTR_for_CY2020_FINAL.pdf&quot;}\" href=\"https:\/\/www.dni.gov\/files\/CLPT\/documents\/2022_ASTR_for_CY2020_FINAL.pdf\" rel=\"nofollow noopener\" target=\"_blank\">transparency report<\/a> on Friday, which showed that the FBI conducted as many as 3.4 million warrantless searches of Americans\u2019 data in 2021, including 1.9 million searches related to a Russian cyberattack. This is the first time ODNI has published a number for FBI searches utilizing the Foreign Intelligence Surveillance Act of 1978, or FISA. The law is meant to authorize investigative capabilities related to foreign threats, but it allows for some incidental domestic searches in the process. FISA activity has often been criticized for happening without public transparency.<\/p>\n<p class=\"paywall\">In an in-depth analysis, Reuters looks at eight incidents around the country in which activists supportive of former President Donald Trump have attempted to breach or successfully compromised local voting systems as part of their quest to uncover evidence of manipulation in the 2020 US presidential election. In most cases, activists persuaded local election officials, all Republicans, to export and leak vote data. In the year and a half since Joe Biden became president, Trump loyalists have continued to falsely assert that voting machines across the US were compromised to produce Biden&#x27;s win.<\/p>\n<p class=\"paywall\">\u201cThese threats are being fueled by extreme elected officials and political insiders who are spreading the Big Lie\u201d\u2014that the 2020 vote was stolen\u2014\u201cto further suppress the vote, destabilize American elections, and undermine voter confidence,\u201d Colorado Secretary of State Jena Griswold told Reuters in a statement.<\/p>\n<p class=\"paywall\">In a report on Wednesday, Microsoft said it has found evidence that Russia began setting the stage for its invasion of Ukraine as early as March or April 2021. During that time, Russian state-backed hackers began establishing access points in Ukrainian government and critical infrastructure systems, researchers found. The attackers seem to have been collecting intelligence on the Ukrainian military, NATO member states, and diplomatic targets. In the report, Microsoft calls Russian aggression against Ukraine a \u201chybrid war\u201d and says that Russian cyberattacks have been \u201crelentless and destructive.\u201d\u00a0<\/p>\n<p class=\"paywall\">Microsoft reports that in early 2021, as Russian troops began to gather at the Ukrainian border, the Russian hacking group known as APT 29, Cozy Bear, and Nobelium began mounting phishing attacks to establish access. Microsoft says the Russian hacking group known as Ghostwriter was also active at this time, targeting Ukrainian military email accounts and networks with phishing attacks.<\/p>\n<p class=\"paywall\">An internal Facebook <a data-offer-url=\"https:\/\/www.documentcloud.org\/documents\/21716382-facebook-data-lineage-internal-document\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.documentcloud.org\/documents\/21716382-facebook-data-lineage-internal-document&quot;}\" href=\"https:\/\/www.documentcloud.org\/documents\/21716382-facebook-data-lineage-internal-document\" rel=\"nofollow noopener\" target=\"_blank\">document<\/a> prepared last year and obtained by Motherboard lays out concerns from privacy engineers on the social network&#x27;s Ad and Business Product team about the company&#x27;s ability to account for the data it holds and track data as it moves through the service. The revelations are not necessarily surprising, given Facebook&#x27;s sheer scale and recurrent data control issues, but they are significant as the tech giant works to comply with an increasing array of privacy legislations around the world.\u00a0<\/p>\n<p class=\"paywall\">\u201cWe do not have an adequate level of control and explainability over how our systems use data, and thus we can\u2019t confidently make controlled policy changes or external commitments such as \u2018we will not use X data for Y purpose.\u2019 And yet, this is exactly what regulators expect us to do, increasing our risk of mistakes and misrepresentation,\u201d the document says.<\/p>\n<p class=\"paywall\">A company spokesperson told Motherboard that the document \u201cdoes not describe our extensive processes and controls to comply with privacy regulations\u201d and that \u201cthis document reflects the technical solutions we are building to scale the current measures we have in place to manage data and meet our obligations.\u201d<\/p>\n<p class=\"paywall\">Hackers compromised the Instagram account of NFT collection Bored Ape Yacht Club on Monday, posting a link to a copycat site that scammed visitors out of NFTs. The company said in a statement to WIRED that \u201cRough estimated losses due to the scam are 4 Bored Apes, 6 Mutant Apes, and 3 BAKC, as well as assorted other NFTs estimated at a total value of ~$3m.\u201d NFT scams and other cryptocurrency hustles in which attackers publish a malicious or misleading link to steal coins are unfortunately not new. The BAYC situation is particularly ominous, though, because the company says it had full two-factor authentication enabled on the Instagram account and that \u201cthe security practices surrounding the IG account were tight.\u201d The group is investigating how the Instagram takeover occurred.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/fbi-warrantless-searches-americans-2021-security-roundup\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/626c7f0298bdedbbd2da03d7\/master\/pass\/FBI-Warrantless-Searches-Roundup-Security-1337330477.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Sat, 30 Apr 2022 13:00:00 +0000<\/strong><\/p>\n<p>Plus: Trump backers breach election systems, Microsoft tracks Russia&#8217;s war prep, a new Facebook leak reveals a mess, and Bored Ape Yacht Club gets hacked.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-18905","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18905"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18905\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18905"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}