Thursday, December 14, 2023

Brian Krebs has a site, Krebs on Security.  He put out a report titled, "Hackers Gaining Power of Subpoena Via Fake 'Emergency Data Requests'," Brain Krebs, Krebs on Security, March 29, 2022.

Like all privacy reports, you're thankful for the news and terrified by the results.  There's a terrifying and highly effective method [that Krebs] says that criminal hackers are now using to harvest sensitive customer data.  They're getting this from all kinds of companies, from internet service providers and phone companies and social media firms, and basically any tech company that you can think of.  

They are doing this by compromising email accounts and websites that are tied to police departments and government agencies so what happens is that they will hack someone's email account or hack someone's website and then get access or create a shell account at the back end and create more email accounts for them and then they will send unauthorized demands for subscriber data.  So they'll be like, "Hey Twitter, you need to send me this data on this user."  Now usually when companies are asked for this information, along with it comes a court order; there's a subpoena; there's official documentation.  What Brian Krebs has pointed out is what hackers are doing is they're saying, you know, send us this information, Twitter, and the information being requested can't wait for a court order, because it relates to an urgent matter of life and death.  This is a specific thing that law enforcement can do, called an Emergency Data Request. 

Krebs explains further

But in certain circumstances — such as a case involving imminent harm or death — an investigating authority may make what’s known as an Emergency Data Request (EDR), which largely bypasses any official review and does not require the requestor to supply any court-approved documents.

It is now clear that some hackers have figured out there is no quick and easy way for a company that receives one of these EDRs to know whether it is legitimate. Using their illicit access to police email systems, the hackers will send a fake EDR along with an attestation that innocent people will likely suffer greatly or die unless the requested data is provided immediately.

In this scenario, the receiving company finds itself caught between two unsavory outcomes: Failing to immediately comply with an EDR — and potentially having someone’s blood on their hands — or possibly leaking a customer record to the wrong person.

“We have a legal process to compel production of documents, and we have a streamlined legal process for police to get information from ISPs and other providers,” said Mark Rasch, a former prosecutor with the U.S. Department of Justice. 

NOTHING TO SEE HERE: Charles McGonigal, Disgraced Former FBI Counterintelligence Agent Based in New York, who “Investigated” Trump-Russia ties set to plead guilty to illegally working for Russian oligarch Oleg Deripaska

WINTERS: Wuhan-Linked Researcher Behind Studies Praising COVID-19 Vaccine Received $11,000 A DAY From Pfizer & Never Disclosed It.

 

If we want to be able to use our phones to connect to the Internet or make phone calls wherever we go, we need to subscribe to our cell provider.  They'll either provide us with the physical SIM card to insert into our phone or use the e-SIM that's already built into our device.  SIM stands for Subscriber Identity Module.  It stores your IMSI, or International Mobile Subscriber Identity number, enabling cell Networks to identify your device by authenticating this identity the SIM card ensures that calls and data are correctly routed to and from your phone to maintain network connectivity your phone is constantly scanning for nearby cell towers and connecting to the strongest signal. This means that your cell providers know your location at all times, based on the signals they are receiving from your phone/  If there aren't many cell towers around, this is a rough estimate of your location; with lots of cell towers, the accuracy of location tracking improves.  


It makes sense that cell networks log your location as a byproduct of maintaining connectivity, but did you know that they also have a long history of selling that location data to basically anyone who wants it?  It's pretty egregious.  You might be tempted to think that if you just remove your SIM card, your phone can't connect to cell towers but that's not actually true. Without a SIM, your phone will still connect to cell towers for safety reasons, legal compliance, or certain core services; for example, emergency calls like those to 911.  


In many countries, it's mandated that people have access to Emergency Services on their phones regardless of their subscription status with a mobile carrier.  So even without a SIM card, your phone is designed to connect with cell towers to make emergency calls.  Then there's GPS assistance.  Now normally in situations where GPS signals are weak or obstructed, a system on your phone called AGNSS or Assisted Global Navigation Satellite System, will step in to help.  Your phone will either use a SIM or a Wi-Fi connection to download satellite location data to help GPS and other Satellite Systems find your precise location.  However, if your phone doesn't have an active internet connection, it will still connect to cell towers for assistance through a different process known as cellular triangulation or network-based positioning.  This method uses visible cell towers to provide an initial rough estimate of your location.  It can also help speed up the GPS and achieve a more accurate fix, and it works even when your phone doesn't have a SIM in it.  And then there are services like time sync.  Modern smartphones can keep time very accurately on their own but they also can synchronize with a cell Network's time your phone will connect to cell towers to retrieve accurate time data.

Wednesday, December 13, 2023

Biden's War in Ukraine accelerated the growth of BRICS, uniting half of the world against America.