Free Network and Geo Analysis Tools

Free Network and Geo Analysis Tools

1034 bookmarks
Newest
Molly
Molly
Molly is an improved Signal app for Android
·molly.im·
Molly
Simple Hosting - Gandi.net
Simple Hosting - Gandi.net
Web hosting for websites and web applications of all sizes. Try your first instance of any size for free for 10 days with a free Gandi account. No credit card required.
·shop.gandi.net·
Simple Hosting - Gandi.net
Canada eSIM | Prepaid Canada data | aloSIM
Canada eSIM | Prepaid Canada data | aloSIM
Looking for Canada data? No matter where you are in the Great White North, a Canada eSIM can keep you online without Wi-Fi.
·alosim.com·
Canada eSIM | Prepaid Canada data | aloSIM
eSIM for Canada
eSIM for Canada
Buy a prepaid eSIM for Canada with instant delivery. Stay connected without roaming fees. Easy & fast.
·prepaid.canadiansim.com·
eSIM for Canada
Inside DOGE’s Takeover of the Social Security Administration
Inside DOGE’s Takeover of the Social Security Administration
DOGE has ignored urgently needed reforms and upgrades at the Social Security Administration, according to dozens of insiders and 15 hours of candid interviews with the former acting chief of the agency, who admits he sometimes made things worse.
On Feb. 10, on the third floor of the Social Security Administration’s Baltimore-area headquarters, Leland Dudek unfurled a 4-foot-wide roll of paper that extended to 20 feet in length. It was a visual guide that the agency had kept for years to explain Social Security’s many technological systems and processes. The paper was covered in flow charts, arrows and text so minuscule you almost needed a magnifying glass to read it. Dudek called it Social Security’s “Dead Sea Scroll.” Dudek and a fellow Social Security Administration bureaucrat taped the scroll across a wall of a windowless executive office. This was where a team from the new Department of Government Efficiency was going to set up shop.
Even today, thousands of its physical records are stored in former limestone mines in Missouri and Pennsylvania. Its core software dates back to the early 1980s, and only a few programmers remain who understand the intricacies of its more than 60 million lines of code.
Several times over those first few days, Akash Bobba, a 21-year-old coder who’d been the first of them to arrive, held his face close to Dudek’s scroll, tracing connections between the agency’s venerable IT systems with his index finger. Bobba asked: “Who would know about this part of the architecture?”
Their senior leaders had already written out goals on a whiteboard. At the top: Find fraud. Quickly.
acting commissioner of the Social Security Administration, a position he held through May.
DOGE, he said, began acting like “a bunch of people who didn’t know what they were doing, with ideas of how government should run — thinking it should work like a McDonald’s or a bank — screaming all the time.”
Key DOGE team members have transitioned to permanent jobs at the SSA, including as the agency’s top technology officials. The 19-year-old whose self-anointed moniker — “Big Balls” — has made him one of the most memorable DOGErs joined the agency this summer.
The DOGE philosophy has been embraced by the SSA’s commissioner, Frank Bisignano, who was confirmed by the Senate in May.
For all the controversy DOGE has generated, its time at the Social Security Administration has not amounted to looming armageddon, as some Democrats warn.
while squandering the chance for systemic change at an agency that genuinely needs it.
They could have worked to modernize Social Security’s legacy software, the current and former staffers say. They could have tried to streamline the stupefying volume of documentation that many Social Security beneficiaries have to provide. They could have built search tools to help staff navigate the agency’s 60,000 pages of policies.
They did none of these things.
Dudek, a midlevel bureaucrat with blunt confidence and a preference for his own ideas, had failed in his one past attempt to manage a small team within the SSA, leading him and his supervisors to conclude he shouldn’t oversee others. Despite that, Trump made him the boss of 57,500 people as acting commissioner of the agency this spring.
Dudek asked people he knew at big tech companies for introductions to potential DOGE members
And unlike Michelle King, the acting agency chief at the time, Dudek was willing to speed up the new-hire training process to give DOGE access to virtually all of the SSA’s databases
“I confess,” he posted. “I helped DOGE understand SSA. … I confess. I … circumvented the chain of command to connect DOGE with the people who get stuff done.
Between February and May, when Dudek’s tenure ended, his erratic rhetoric and decisions routinely made front-page news. He was often portrayed as a DOGE patsy, perhaps even a fool. But in his interviews with ProPublica this summer, he revealed himself to be a much more complex figure, a disappointed believer in DOGE’s potential, who maintains he did what he could to protect Social Security’s mission under duress.
Yet Dudek had barely settled in as commissioner when Bobba unintentionally sparked a national misinformation firestorm: A table he created appeared as a screenshot in a grossly misleading Musk tweet about “vampires” over the age of 100 allegedly collecting Social Security checks.
Bobba had sorted people with a Social Security number by age and found more than 12 million over 120 years old still listed in the agency’s data.
Dudek watched in horror as Trump then shared the same statistics with both houses of Congress and a national television audience, claiming the numbers proved “shocking levels of incompetence and probable fraud in the Social Security program for our seniors
Inside the SSA, the DOGE team tried to find proof of the fraud that Musk and Trump had proclaimed, but it didn’t seem to know how to go about it, jumping from tactic to tactic
” It was the senior leaders who were issuing orders without heeding what the young DOGErs were learning.
Michelle Kowalski, an analyst who has since departed the agency, was instructed to take one of the DOGE people, Cole Killian, through earnings data and historical records to analyze the cases of extremely old people whose deaths had not been recorded in Social Security data. She found herself having to explain to him, again and again, that many of these people were born before states reported births and deaths to the federal government and decades before the advent of electronic record keeping. In the early days of the agency, some people didn’t even know their birthdays.
But he usually kept his camera turned off during video meetings. When he finally turned it on for one call, the face she saw seemed like that of a teenager.
Kowalski was exasperated by having to answer to such inexperience
Employees at headquarters took their time walking past the glass-walled conference room where DOGE staffers had set up, glaring in at them as they worked among stacks of laptops that they used for assignments at different agencies.
He decided to move the DOGE operatives to a more secluded area of the campus and assigned an armed security detail to protect them.
And he sent out insulting full-staff emails pressuring career employees to retire.
“There’s Lee, and then there’s Leland-performingly-Dudek.”)
which could in turn give him credibility as he kept trying to push them toward the real issues at Social Security.
Its demands usually came through Coulter, the DOGE lead with the Harvard and hedge fund background
“I really think it would be helpful if you were to do this tomorrow,” Coulter would say to Dudek about eliminating an entire division of the SSA or cutting more staff
Coulter would call a few hours later on the encrypted-messaging app Signal to ask, “You really aren’t catching on, are you?” and “Do you know how many times I’ve defended you?”
Coulter, who has been working for DOGE at NASA i
But instead of facilitating this effort at greater efficiency, Coulter told Dudek to close the office
Such was the case with the issue of phone fraud. Knowing that the DOGErs would perk up at the mention of anything fraud-related, Dudek and other officials made a point of explaining that they’d been working on an initiative to block bots that had been calling the agency.
The plans included running all phone-based requests for bank account changes against a Treasury Department database of suspicious accounts and analyzing such calls to verify whether they were being made from the vicinity of the address
he White House instructed Dudek to end all claims and direct-deposit transactions by phone.
Beneficiaries would have to verify their own identities by using an often-confusing web portal or by traveling to a field office to do it in person. For millions of elderly or disabled people, these were daunting or impossible options.
“Well, Lee, you just fired that team,” one official answered, referring to the Office of Transformation. (Dudek said he asked this question on purpose to make sure DOGE heard the answer.)
Over the course of six weeks under Dudek, the phone policy zigged and zagged a half dozen times — for example, the SSA adopted, then abandoned, a three-day waiting period to conduct an algorithmic fraud check on all calls — before finally ending up nearly where it began. Transactions could be carried out by phone again.
Throughout this saga, Dudek was still getting calls from White House officials — most often from Katie Miller, DOGE’s spokesperson and the wife of Stephen Miller
Frank Bisignano, in the oval office with President Donald Trump, was confirmed as commissioner of the Social Security Administration in May.
Yet, like DOGE, he appears to have embraced the appearance of efficiency rather than efficiency itself. He has repeatedly told staff that Social Security should be run more like Amazon, with AI handling more customer interactions
Bisignano has also fixated on how much time it takes to reach an agent on the SSA’s 800 number. In a July press release, he claimed that the average was down to six minutes, an 80% reduction from 2024. He achieved this in part by reassigning 1,000 field office employees to phone duty. That means initial calls are getting answered faster, but there are significantly fewer staff members available to handle complex, in-person cases.
·propublica.org·
Inside DOGE’s Takeover of the Social Security Administration
Resources - Access Now
Resources - Access Now
Resources Access Now’s team of policy experts, advocates, and technologists are finding solutions to help everyone protect themselves from digital threats
·accessnow.org·
Resources - Access Now
Forensic Methodology Report: How to catch NSO Group’s Pegasus
Forensic Methodology Report: How to catch NSO Group’s Pegasus
NSO Group claims that its Pegasus spyware is only used to “investigate terrorism and crime” and “leaves no traces whatsoever”. This Forensic Methodology Report shows that neither of these statements are true. This report accompanies the release of the Pegasus Project, a collaborative investigation that involves more than 80 journalists from 17 media organizations in 10 countries coordinated by Forbidden Stories with technical support of Amnesty International’s Security Lab. Amnesty International’s Security Lab has performed in-depth forensic analysis of numerous mobile devices from human rights defenders (HRDs) and journalists around the world. This research has uncovered widespread, persistent and ongoing unlawful surveillance and human rights abuses perpetrated using NSO Group’s Pegasus spyware.
In our October 2019 report, we detail how we determined these redirections to be the result of network injection attacks performed either through tactical devices, such as rogue cell towers, or through dedicated equipment placed at the mobile operator.
free247downloads[.]com
, but also when using other apps.
WebKit local storage, IndexedDB folders, and more.
Safari’s Session Resource logs provide additional traces that do not consistently appear in Safari’s browsing history.
Maati Monjib visited https://yahoo.fr, and a network injection forcefully redirected the browser to documentpro[.]org before further redirecting to free247downloads[.]com and proceed with the exploitation.
iOS maintains records of process executions and their respective network usage in two SQLite database files called “DataUsage.sqlite” and “netusage.sqlite”
network usage databases contained records of a suspicious process called “bh”.
leveraged a vulnerability in the iOS JavaScriptCore Binary (jsc) to achieve code execution on the device
persistence on the device after reboot
“bh.c – Loads API functions that relate to the decompression of next stage payloads and their proper placement on the victim’s iPhone by using functions such as BZ2_bzDecompress, chmod, and malloc
herefore, we suspect that “bh” might stand for “BridgeHead”, which is likely the internal name assigned by NSO Group to this component of their toolkit.
The bh process first appeared on Omar Radi’s phone on 11 February 2019. This occurred 10 seconds after an IndexedDB file was created by the Pegasus Installation Server
At around the same time the file com.apple.CrashReporter.plist file was written in /private/var/root/Library/Preferences/, likely to disable reporting of crash logs back to Apple.
roleaboutd and msgacntd processes are a later stage of the Pegasus spyware which was loaded after a successful exploitation and privilege escalation with the BridgeHead payload.
Network injection is an effective and cost-efficient attack vector for domestic use especially in countries with leverage over mobile operators
iOS keeps a record of Apple IDs seen by each installed application in a plist file located at /private/var/mobile/Library/Preferences/com.apple.identityservices.idstatuscache.plist
·amnesty.org·
Forensic Methodology Report: How to catch NSO Group’s Pegasus
How to Securely Wipe a Hard Drive on Your Mac
How to Securely Wipe a Hard Drive on Your Mac
Spread the loveIf you’re planning on selling, donating or disposing of your Mac, it’s important to make sure all of your personal files and information are gone for good. The best way to accomplish this is to securely wipe your hard drive. Here’s how you can do it: 1. Create a backup: Before you start the process, make sure you have a backup of all your important files, so you don’t lose any data you may need in the future. 2. Disable FileVault: If you have FileVault enabled, you’ll need to disable it before wiping your hard drive. You can […]
·thetechedvocate.org·
How to Securely Wipe a Hard Drive on Your Mac
What happens on your Mac, stays on Apple’s iCloud?!
What happens on your Mac, stays on Apple’s iCloud?!
The document discusses vulnerabilities in macOS privacy mechanisms, focusing on unauthorized access to user data such as location, contacts, and calendar through exploitation of iCloud tokens. It highlights attacks via applications like GarageBand and iMovie by manipulating macOS entitlements and dynamic libraries. The conclusion urges users to review their iCloud settings to enhance security.
·slideshare.net·
What happens on your Mac, stays on Apple’s iCloud?!