International Orgs and Aid

5 bookmarks
Newest
U.S. Press Freedom Tracker - U.S. Press Freedom Tracker
U.S. Press Freedom Tracker - U.S. Press Freedom Tracker
The U.S. Press Freedom Tracker is a project that aims to comprehensively document press freedom incidents in the United States — such as the arrests of journalists, seizures of their equipment, interrogations and searches at the U.S. border, subpoenas to testify about sources, leak prosecutions and physical attacks. The Press Freedom Tracker documents cases across the country, involving national, state and local authorities.
·pressfreedomtracker.us·
U.S. Press Freedom Tracker - U.S. Press Freedom Tracker
#KeepItOn: fighting internet shutdowns around the world - Access Now , reach out to #KeepItOn Campaign Manager Felicia Anthonio at felicia@accessnow.org.
#KeepItOn: fighting internet shutdowns around the world - Access Now , reach out to #KeepItOn Campaign Manager Felicia Anthonio at felicia@accessnow.org.
The #KeepItOn coalition brings together hundreds of civil society organizations and our allies from around the world – in government, international institutions, media, the private sector, and beyond – to fight for an end to internet shutdowns.
·accessnow.org·
#KeepItOn: fighting internet shutdowns around the world - Access Now , reach out to #KeepItOn Campaign Manager Felicia Anthonio at felicia@accessnow.org.
DIGITAL SECURITY HELPLINE - Access Now
DIGITAL SECURITY HELPLINE - Access Now
Our Helpline provides 24/7 free of charge technical support for journalists, activists, and human rights defenders
·accessnow.org·
DIGITAL SECURITY HELPLINE - Access Now
Forensic Methodology Report: How to catch NSO Group’s Pegasus
Forensic Methodology Report: How to catch NSO Group’s Pegasus
NSO Group claims that its Pegasus spyware is only used to “investigate terrorism and crime” and “leaves no traces whatsoever”. This Forensic Methodology Report shows that neither of these statements are true. This report accompanies the release of the Pegasus Project, a collaborative investigation that involves more than 80 journalists from 17 media organizations in 10 countries coordinated by Forbidden Stories with technical support of Amnesty International’s Security Lab. Amnesty International’s Security Lab has performed in-depth forensic analysis of numerous mobile devices from human rights defenders (HRDs) and journalists around the world. This research has uncovered widespread, persistent and ongoing unlawful surveillance and human rights abuses perpetrated using NSO Group’s Pegasus spyware.
In our October 2019 report, we detail how we determined these redirections to be the result of network injection attacks performed either through tactical devices, such as rogue cell towers, or through dedicated equipment placed at the mobile operator.
free247downloads[.]com
, but also when using other apps.
WebKit local storage, IndexedDB folders, and more.
Safari’s Session Resource logs provide additional traces that do not consistently appear in Safari’s browsing history.
Maati Monjib visited https://yahoo.fr, and a network injection forcefully redirected the browser to documentpro[.]org before further redirecting to free247downloads[.]com and proceed with the exploitation.
iOS maintains records of process executions and their respective network usage in two SQLite database files called “DataUsage.sqlite” and “netusage.sqlite”
network usage databases contained records of a suspicious process called “bh”.
leveraged a vulnerability in the iOS JavaScriptCore Binary (jsc) to achieve code execution on the device
persistence on the device after reboot
“bh.c – Loads API functions that relate to the decompression of next stage payloads and their proper placement on the victim’s iPhone by using functions such as BZ2_bzDecompress, chmod, and malloc
herefore, we suspect that “bh” might stand for “BridgeHead”, which is likely the internal name assigned by NSO Group to this component of their toolkit.
The bh process first appeared on Omar Radi’s phone on 11 February 2019. This occurred 10 seconds after an IndexedDB file was created by the Pegasus Installation Server
At around the same time the file com.apple.CrashReporter.plist file was written in /private/var/root/Library/Preferences/, likely to disable reporting of crash logs back to Apple.
roleaboutd and msgacntd processes are a later stage of the Pegasus spyware which was loaded after a successful exploitation and privilege escalation with the BridgeHead payload.
Network injection is an effective and cost-efficient attack vector for domestic use especially in countries with leverage over mobile operators
iOS keeps a record of Apple IDs seen by each installed application in a plist file located at /private/var/mobile/Library/Preferences/com.apple.identityservices.idstatuscache.plist
·amnesty.org·
Forensic Methodology Report: How to catch NSO Group’s Pegasus
‘User X with driver Y traveled from point A to point B’ Yandex is set to start sharing Yango taxi ride data with the FSB. Users in Israel, Europe, and elsewhere may find their privacy rights compromised by Russia’s new surveillance law. — Meduza
‘User X with driver Y traveled from point A to point B’ Yandex is set to start sharing Yango taxi ride data with the FSB. Users in Israel, Europe, and elsewhere may find their privacy rights compromised by Russia’s new surveillance law. — Meduza

What prompted a wave of concern was the news that Russia was about to pass a new law granting its Federal Security Service (FSB) round-the-clock access to all the traffic data aggregated by certain taxi services. Due to a quirk in its formulation, the law, in fact, applied to only one Russian company: Yandex Go, the only taxi service on the Russian register of information distributors.

Until then, companies in Russia were only obliged to share their data with the law enforcement and security services if petitioned formally by the officials. Now, concerned customers were writing to Yandex from outside of Russia, asking for explanations about their data and whether it would be handed over to the secret police. This prompted an internal message exchange, in which the management clarified that “data from all of Yango” is “stored in Russia,” and there is no “material or logical division” between data collected from users inside and outside of the country. All of Yandex’s data centers, the messages stated, were located in Russia, but mentioning this information should be avoided when talking to customers.

Every single installation of the app is linked to a concrete location, and you can differentiate and granulate everything city-by-city. So it’s perfectly possible to move, say, the Istanbul or the Tbilisi data. The problem is that, come September, the secret services will gain access to the common data that flows into Yandex. And that includes the foreign rides. Yandex has long claimed that its European operations were in strict compliance with the GDPR. These protections are also mentioned in the confidentiality policies published by Yango and Yandex Go. Inside Russia, though, European privacy norms may well be compromised where they come in conflict with the applicable Russian law.

The former Yandex executive Grigory Bakunov says that he can see two possible ways in which the FSB could make use of the data obtained from Yandex:

Imagine that you have two possibilities. Either you can work bare-handed with a heap of raw data, or you can, figuratively speaking, get an email report based on certain variables: “User X with driver Y traveled from point A to point B.” It’s really in the hands of the FSB whether they want to work with the big pile of data. If they have enough specialists, maybe they wouldn’t mind reading the whole trove.

If the FSB were to choose the second option, Bakunov suggests, Russians who left the country for former CIS countries since the start of the Ukraine war will be especially at risk:

That trove contains ride data from Kyrgyzstan, Kazakhstan, Armenia, Georgia, and other places where Russians moved since the start of the war. This, I would say, is more of a threat than access to data on Finland, Norway, or Algeria.

·meduza.io·
‘User X with driver Y traveled from point A to point B’ Yandex is set to start sharing Yango taxi ride data with the FSB. Users in Israel, Europe, and elsewhere may find their privacy rights compromised by Russia’s new surveillance law. — Meduza