Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label US Goverment. Show all posts

Dark Web Revealed: The Hidden Internet’s Role in Cybercrime and Digital Privacy

 

The dark web, often shrouded in mystery and fear, is portrayed as a breeding ground for illicit activities and cybercrime. While this image is not entirely unfounded, the dark web’s origins and uses are more nuanced, with surprising ties to the United States government. The dark web represents a portion of the internet not indexed by traditional search engines, accessible only through specialized software such as the Tor Browser, short for The Onion Router. Unlike familiar domains ending in .com or .org, dark web addresses end in .onion, reflecting the layered encryption process that protects user anonymity. 

Tor, which was released to the public as an open-source project in October 2002, routes internet traffic through a series of volunteer-operated servers. This “onion” layering ensures that each relay only knows the previous and next step in the chain, but not the entire route, thus preserving the privacy of users. Interestingly, the dark web’s creation is linked to the U.S. Naval Research Laboratory in the mid-1990s. It was initially designed to secure online communications for U.S. intelligence agencies and military personnel, enabling them to transmit confidential information without revealing their identities or locations. 

Despite its government origins, the dark web has since evolved into a diverse ecosystem. While it is true that it harbors illegal marketplaces for drugs, stolen data, and other contraband, it also serves as a crucial tool for privacy advocates and journalists. Platforms like WikiLeaks and other whistleblowing sites use the dark web to share sensitive information without risking exposure. The U.S. government’s presence on the dark web remains strong, often employing the very technology it helped create to monitor criminal activities. Law enforcement agencies frequently set up “honeypots” – fake websites designed to catch criminals in the act. 

The closure of notorious drug markets like Silk Road and the arrest of its founder, Ross Ulbricht, in 2013, marked a significant victory for these operations. However, as one site is taken down, others often emerge to take its place, illustrating the persistent cat-and-mouse game between authorities and cybercriminals. However, the dark web’s reputation as a lawless zone is somewhat exaggerated. For many, it is a vital tool for escaping censorship and surveillance. In countries like Russia and China, where internet access is heavily restricted, the dark web offers a means to access banned information and communicate freely. 

Even mainstream entities like Facebook and The New York Times maintain dark web versions of their sites to ensure global accessibility. Despite its dark reputation, the dark web is not inherently illegal. In fact, it plays a crucial role in protecting online privacy and freedom. While criminals have exploited its anonymity, it also empowers individuals in repressive regimes to speak out against injustice, report on human rights abuses, and share critical information with the world. As cyber threats continue to evolve, so too does the dark web. 

It remains a double-edged sword – a refuge for both the world’s worst actors and its most vulnerable. Understanding its complexities and the balance between privacy and security is essential as the digital landscape continues to expand.

ByteDance Employees Seized User Data Of Two Journalists

The Chinese company ByteDance, which owns  TikTok, disclosed on Thursday that some of its workers had illegally collected the data of American TikTok users, which included two journalists.

According to an email from ByteDance general counsel Erich Andersen, employees of the company had access to the data as part of a failed investigation into information leaks earlier this year. The employees had access to two reporters' IP addresses and other information via their TikTok accounts, as well as the data of a limited number of individuals connected to the journalist. The company stated that they were searching for connections between two journalists—a former BuzzFeed reporter and a Financial Times reporter—and  ByteDance, however, they were unable to find any breaches.

The inquiry, which was initiated in response to a Forbes story, emphasizes the privacy and security dangers associated with TikTok that have been brought up by American lawmakers, state governors, and administrations for more than two years, and supports some of the information in that study. More than a dozen states have prohibited TikTok from being used on government-issued devices, and the business has been in extensive discussions with the administration about security and privacy policies that would prevent ByteDance and the Chinese government from possibly gaining access to user data in the United States.

Two employees in China and two in the US of ByteDance who were associated with the incident were sacked. Company representatives announced that they were taking extra precautions to safeguard user data. In an effort to identify the source of leaks, ByteDance traced several Forbes journalists, including those who had previously worked for BuzzFeed, according to a Forbes investigation. 

In an effort to completely remove user data from China, TikTok has taken efforts to disassociate itself from ByteDance and is currently in talks with the US government. The fate of those talks is still up in the air.





FBI: Tik Tok privacy issues


Christopher Wray, the director of the FBI, expressed its concern over the potential that the Chinese government might alter TikTok's recommendation algorithms, which can be utilised for conventional espionage activities.

The short clip social network is under federal attention recently, largely because of worries about data privacy, especially when it comes to youngsters, and because of the ongoing tension between the United States and China. In 2020, the Trump government made an unsuccessful effort to eliminate TikTok from app stores. Additionally, there have been legislative hearings on user data in both 2021 and this year.

While Wray acknowledged that there are numerous countries that pose cyberthreats to the United States, "China's rapid hacking operation is the largest, and they have gained more of Americans' personal and business data than any other country combined," Wray said.

He claimed that TikTok APIs may be used by China to manage the software on consumer devices, opening the door for the Chinese government to basically breach the appliances of Americans.

Rep. John Katko, D-NY, the ranking member of the committee and a persistent advocate of cybersecurity issues in Congress, claims that Chinese cyber operations pose a threat to the economic and national security of all Americans. He updated the members that ransomware assaults caused companies $1.2 billion in losses last year.

Using HUMINT operations, China has gained access to the US military and government and gathered important information about US intelligence operations. Due to the development of these abilities, China was able to intercept communications, gather sensitive information, and gather a variety of data regarding US military and diplomatic activities.





 Facial Recognition Technology is Transforming in Texas

The Facial Recognition Act, a measure that places stringent restrictions on law enforcement's use of facial recognition surveillance, was introduced on September 28. 

The proposed legislation would establish a set of regulations that effectively address both the risks associated with facial recognition technology's failures, such as algorithmic bias and erroneous arrests and those associated with its successes, such as the possibility of widespread surveillance and abuse.

Errors in facial recognition might have drastic effects. Some of the various cases were the rejection of a woman's application for unemployment benefits in Texas, which made it impossible for her to pay her rent, and the arrest of a Black man by police in New Jersey, which could have limited the guy's options for housing and work.

Citizens had not been shielded from pointless facial identification by the laws of the new state. In Texas, businesses are not allowed to gather your biometric data without your permission, but if you refuse, you have no other options. Citizens are obligated to grant the apartment manager's request for approval. 

Researchers have already expended too much time and money to turn around now. In the majority of the U.S., there are even fewer limitations on the use of biometric data. Without regulation, businesses sell biometric information to advertisers and governments. Then, it can be used by state, federal, and private entities to silence our speech, pursue our preferences, and prevent us from exercising our fundamental rights.

To gather evidence against renters, at least one city even installed facial recognition-capable cameras outside a public housing complex. Facial recognition is growing increasingly widespread despite its flaws and potentially harmful effects. A facial recognition solution was introduced by Equifax, which targets leasing offices.

In order to determine if a customer would pay for their purchases, Socure and other companies market a service that combines facial recognition technology with computer code. A facial recognition technology marketed by ODIN is said to be able to recognize people who are homeless and give the police personal information about them. 

Such information includes any existing arrest warrants, which frequently just serve to criminalize poverty and make it harder to acquire housing, as well as claims of prior behavior, which could put armed cops on edge and make effective outreach more difficult. There is no reason why such characteristics are required for that work, notwithstanding ODIN's assertions that its system can remotely check people into shelters using biometric identification and location tracking. Facial recognition doesn't function as intended, and authors can't rely on it to make crucial judgments regarding housing, credit, or law enforcement.

Since the foundation of America, a lot has happened. Urbanization has brought us closer together, and technology has linked everyone on a scale that was previously unimaginable.

US State Department Offers $10 Million for Information on North Korean Hackers

 

The US government has disclosed it is offering up to $10m as a reward for information on people linked with North Korean state-sponsored hacking groups. 

The US State Department revealed Tuesday it is interested in information on hackers that are part of groups including Lazarus Group, Guardians of Peace, Kimsuky, and APT38 amongst others. 

“If you have information on any individuals associated with North Korean government-linked malicious cyber groups (such as Andariel, APT38, Bluenoroff, Guardians of Peace, Kimsuky, or Lazarus Group) and who are involved in targeting US critical infrastructure in violation of the Computer Fraud and Abuse Act, you may be eligible for a reward,” read a notice posted to Twitter. 

The North Korean hacking group is the only one to be called out by name on the Rewards for Justice site, which otherwise explains the purpose of the program is to generate useful information “that protects Americans and furthers US national security.” It says rewards are also offered for information on “the financial mechanisms of individuals engaged in certain activities to support the North Korean regime.” 

The amount is double the bounty the government offered in March 2022 for information on DPRK-backed hackers targeting crypto exchanges and financial institutions worldwide to support the Kim Jong-un regime's illegal operations. 

Lazarus, for example, has been blamed for various high-profile cyberattacks, including the world’s biggest ever crypto-heist when $618m was stolen from Vietnamese developer Sky Mavis and its Ronin Network. In 2020, the hackers exfiltrated $281m from Singapore-headquartered cryptocurrency exchange KuCoin. 

The North Korean hackers have also infiltrated mobile phones of well-known personalities, including particular South Korean legislators, to obtain their private data, claimed Mun Chong Hyun, head of the EST security response center (ESRC). He said hackers target organizations on North Korea's websites or build counterfeit Facebook accounts for those functioning in the North Korean industry on an ongoing basis. 

Last year, the US Department of Justice unsealed a federal incitement of several suspected members of the infamous Lazarus Group (APT38), said to be linked to military intelligence agency the Reconnaissance General Bureau (RGB). However, North Korea is a notoriously secretive and globally isolated state, making traditional intelligence-gathering efforts challenging. 

In 2019, the U.S. Treasury Department banned three North Korean hacking groups (Lazarus Group, Bluenoroff, and Andariel) for funneling financial assets they stole in cyberattacks to the North Korean government.