{"id":14621,"date":"2019-02-16T10:45:24","date_gmt":"2019-02-16T18:45:24","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/02\/16\/news-8370\/"},"modified":"2019-02-16T10:45:24","modified_gmt":"2019-02-16T18:45:24","slug":"news-8370","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/02\/16\/news-8370\/","title":{"rendered":"Chinese Surveillance, Facebook Tracking, and More Security News This Week"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c672ea42cbde374dceb08a7\/master\/pass\/Security-Roundup-UighurMuslims-126330936.jpg\"\/><\/p>\n<p><strong>Credit to Author: Emily Dreyfuss| Date: Sat, 16 Feb 2019 14:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">The US government <\/span>averted <a href=\"https:\/\/www.wired.com\/story\/the-shutdown-shows-just-how-vital-government-scientists-are\/\">another shutdown<\/a> when Donald Trump instead opted to declare a national emergency to fund his <a href=\"https:\/\/www.wired.com\/story\/trump-bags-of-heroin\/\">border wall dreams<\/a>\u2014a wall which <a href=\"https:\/\/www.wired.com\/story\/congress-spending-bill-wall-money-border-tech\/\">raises huge privacy and security concerns<\/a> and will cause more problems than it solves. As the country digested the national emergency, cybersecurity workers were still <a href=\"https:\/\/www.wired.com\/story\/government-shutdown-cybersecurity-recovery\/\">scrambling to clean up<\/a> the security nightmare wrought by the longest shutdown in history.<\/p>\n<p>Amid all the border wall news this week, you\u2019d be forgiven for missing that the president also signed an executive order creating the American AI Initiative. In an <a href=\"https:\/\/www.wired.com\/story\/a-national-strategy-for-ai\/\">op-ed for WIRED<\/a>, White House deputy assistant to the president for technology policy Michale Kratsios explained why AI strategy is a security issue. Speaking of AI, to combat the growing threat of deep fakes, <a href=\"https:\/\/www.wired.com\/story\/amber-authenticate-video-validation-blockchain-tampering-deepfakes\/\">a new tool<\/a> uses the blockchain to monitor video for tampering and manipulation.<\/p>\n<p class=\"paywall\">A popular electric scooter <a href=\"https:\/\/www.wired.com\/story\/xiaomi-scooter-hack\/\">can be hacked<\/a> to speed up and stop. <a href=\"https:\/\/www.wired.com\/story\/severe-online-harassment-2018-adl-survey\/\">One in three Americans<\/a> has been the victim of severe online harassment. A US Air Force defector <a href=\"https:\/\/www.wired.com\/story\/us-air-force-defector-allegedly-helped-iran-hack-americans\/\">allegedly helped<\/a> Iranians hack America. If <a href=\"https:\/\/www.wired.com\/story\/russia-internet-disconnect-what-happens\/\">Russia really cuts itself off from the internet<\/a>, as it has threatened, the unintended consequences would be far reaching.<\/p>\n<p class=\"paywall\">Oh, and it was also Valentine\u2019s Day this week. We hope you didn\u2019t buy an <a href=\"https:\/\/www.wired.com\/story\/internet-connected-sex-toys-security\/\">internet-connected sex toy<\/a>\u2014unless it was one of the few that meets basic privacy and security standards, or you\u2019re really into exhibitionism. Likewise, <a href=\"https:\/\/www.wired.com\/story\/ok-cupid-dating-apps-hacks-breaches-security\">if you use OKCupid, Coffee Meets Bagel, or Jack&#x27;d<\/a>, look out for some security lapses this months. And make sure you&#x27;re <a href=\"https:\/\/www.wired.com\/story\/know-it-alls-safe-dating-apps\/\">staying safe on dating apps<\/a> in general.<\/p>\n<p class=\"paywall\">The Uyghur Muslim population in China\u2019s Xinjiang providence is under constant surveillance from the Chinese government. Uyghurs are forced to install spyware on their mobile devices, and accept Chinese officials invading their homes to live and observe their families. Hundreds of thousands have reportedly been sent to \u201cre-education camps.\u201d And those who are not interned are being tracked via facial recognition technology by cameras and GPS all over Xinjiang.<\/p>\n<p class=\"paywall\">This week, a security researcher found that Chinese company SenseNets, which allegedly facilitates that facial recognition tracking, had left a database containing the associated data completely exposed online. The researcher was able to watch as \u201c6.7 million GPS coordinates were recorded,\u201d according to ZDNet, which broke the news. The database revealed how the government tracks Uyghurs throughout their day, noting the names of locations they frequent, as well as GPS coordinates, all matched to highly personal information like name, date of birth, sex, home address, official identification card number, and more.<\/p>\n<p class=\"paywall\">Before realizing what he had stumbled across, the researcher alerted SenseNets that its server was exposed. The company then locked it down. \u201cHe now regrets helping the company secure its oppression tool,\u201d ZDNet reports.<\/p>\n<p class=\"paywall\">According to former employees, Facebook tracks users it worries pose a threat to the company via their mobile apps. CNBC reports that the program is known as BOLO, short for \u201cBe on the look out.\u201d BOLO is a list of Facebook account holders who have made threats against the company or its employees. Security guards at Facebook offices are informed to watch out for these individuals, and other security personnel are, according to what the former employees told CNBC, empowered to monitor their location using the GPS tracking on their Facebook apps. That latter fact is what security consultants said sets Facebook apart from other companies that maintain similar threat lists. One of the former employees called the program \u201cvery Big Brother-esque.&quot;<\/p>\n<p class=\"paywall\">A Texas man who had been banned from owning guns for a period of two years, owing to a history of domestic violence, was found by police with a partially printed 3-D AR-15 rifle and a list of politicians he allegedly planned to kill. The cops arrested him. It was a clear example, authorities said, of criminals attempting to circumvent the law and legal background checks by building weapons rather than buying them\u2014a potential popularized by gun-rights activist Cody Wilson, who <a href=\"https:\/\/www.wired.com\/tag\/cody-wilson\/page\/1\/\">WIRED has been following for years<\/a>, and who was <a href=\"https:\/\/www.wired.com\/story\/cody-wilson-accused-child-sexual-assault\/\">arrested on charges<\/a> of child sexual assault last year.<\/p>\n<p class=\"paywall\">After the 2015 passage of the Iranian nuclear deal, under which Iran promised to destroy much of its nuclear program, president Barack Obama\u2019s White House and the rest of the world were hopeful that Iran\u2019s nuclear ambitions would be kept in check. Then <a href=\"https:\/\/www.nytimes.com\/2018\/05\/08\/world\/middleeast\/trump-iran-nuclear-deal.html\" target=\"_blank\">last year<\/a> president Trump <a href=\"https:\/\/www.wired.com\/story\/iran-nuclear-deal-cyberattacks\/\">backed the US out of the deal<\/a>, and now <em>The New York Times<\/em> reports that his administration is \u201creviving\u201d a secretive program to sabotage Iran\u2019s weapons. Those efforts began under the presidency of George W Bush, and was continued by Obama until Iran\u2019s nuclear activity severely waned after the 2015 nuclear accord. With the accord abandoned, the US is apparently accelerating its sabotage. The <em>Times<\/em> reports that in the last two months, \u201ctwo Iranian attempts to launch satellites have failed within minutes.\u201d<\/p>\n<p class=\"paywall\">Ever wonder, sitting in a college class as someone asks a less-than-brilliant question, how some of the students around you managed to get in? A current student at Stanford recently figured out that since 2015 any Stanford student who has requested to access their own admissions information under the Family Educational Rights and Privacy Act (FERPA) could, if they tweaked the URL on their own data, view that of other admitted students. This error would let students reach each other\u2019s admissions essays, see their test scores, ethnicity, and even whether they had applied for financial aid. The security flaw, as reported by Stanford\u2019s student newspaper The Stanford Daily, was found in the third-party system the school uses to host scanned admissions documents. The school has now closed the breach, and will be telling 93 students that their information was compromised.<\/p>\n<p class=\"related-cne-video-component__dek\">It seems like every time you turn around there&#39;s a new breach of personal information. Follow these steps to minimize the damage.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/database-leak-details-chinas-oppressive-tracking-of-muslims-security-roundup\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c672ea42cbde374dceb08a7\/master\/pass\/Security-Roundup-UighurMuslims-126330936.jpg\"\/><\/p>\n<p><strong>Credit to Author: Emily Dreyfuss| Date: Sat, 16 Feb 2019 14:00:00 +0000<\/strong><\/p>\n<p>3-D printed rifles, Iran missile hacking, and more of the week&#8217;s top security news.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-14621","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14621"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14621\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}