STE WILLIAMS

Facebook loses control of 50 million users’ data, suspends analytics firm

Cambridge Analytica – the data-crunching firm with tools so muscular that founder Christopher Wylie has described it as “Steve Bannon’s psychological warfare mindf**k tool” – has been collecting Facebook user data without permission through “a scam and a fraud,” Facebook said on Friday.

That statement to the New York Times came from Paul Grewal, a Facebook vice president and deputy general counsel. It preceded a day of chaos inspired by big data use and abuse that has raged all weekend and promises to keep playing out as lawmakers pledge to launch investigations.

On Friday, after a week of questions from investigative reporters, Facebook suspended Cambridge Analytica and parent company Strategic Communication Laboratories (SCL) from its platform. The suspensions came late in the game, news outlets are charging, given that Facebook has known about this for three years. Facebook, for its part, claims that the parties involved lied about having deleted harvested data years ago. At least one of the parties involved has shown evidence that points to Facebook having done very little to make sure the data was deleted.

The banishment was unveiled a day before the publishing of two investigatory reports – one from the New York Times, another from The Observer. The reports both detailed how Cambridge used personal information taken without authorization from more than 50 million Facebook users in early 2014 to build a system that could profile individual US voters in order to target them with personalized political ads.

Cambridge is owned by conservative Republican hedge fund billionaire Robert Mercer. It’s a voter-profiling company that was used by conservative investors during both the Trump and Brexit campaigns.

The NYT/Observer reports relied on interviews with six former employees and contractors plus a review of the firm’s emails and documents. One such source was whistleblower Christopher Wylie, who worked with Cambridge University professor Aleksandr Kogan to obtain the data. The Observer quoted Wylie:

We exploited Facebook to harvest millions of people’s profiles. And built models to exploit what we knew about them and target their inner demons. That was the basis the entire company was built on.

Cambridge did so, the newspapers reported, because it had a $15 million investment from Mercer burning a hole in its pocket. Cambridge wanted to woo Steve Bannon with a tool to identify American voters’ personalities and to influence behavior, but it first needed data to flesh out that tool. So it took Facebook users’ data without their permission, according to the newspapers.

They called it “one of the largest data leaks in the social network’s history” – one that allowed Cambridge to “exploit the private social media activity of a huge swath of the American electorate, developing techniques that underpinned its work on President Trump’s campaign in 2016.”

Not surprisingly, Facebook immediately pushed back against the characterization of a massive data leak in an update to its initial announcement of the suspensions. It said that the data got out not through a leak but because some 270,000 Facebook users willingly signed up for a Facebook personality test called thisisyourdigitallife that billed itself as “a research app used by psychologists.”

The claim that this is a data breach is completely false. Aleksandr Kogan requested and gained access to information from users who chose to sign up to his app, and everyone involved gave their consent. People knowingly provided their information, no systems were infiltrated, and no passwords or sensitive pieces of information were stolen or hacked.

Kogan was the developer of thisisyourdigitallife. Facebook says that in 2015, it found out that Kogan had lied and violated Facebook’s Platform Policies by passing data from an app that was using Facebook Login to SCL/Cambridge. Facebook says that Kogan also gave the data to Wylie. Wylie was an employee of Cambridge Analytica at the time of the alleged breach but went on to start his own firm, Euonia Technologies, in 2014.

Wylie has produced a dossier of evidence about the data misuse to the Observer that apparently contradicts testimony provided last month by Facebook and Cambridge Analytica CEO Alexander Nix, who both told a parliamentary inquiry on fake news that Cambridge didn’t have, nor use, private Facebook data.

The Observer reports that the dossier includes emails, invoices, contracts and bank transfers that reveal more than 50 million profiles – most of which belong to registered US voters – that were harvested from Facebook. Facebook has suspended Wylie from its platform while it carries out its investigation.

With regards to Facebook’s assertion that it was lied to about data deletion, Wylie’s dossier implies that it didn’t break much of a sweat to ensure that the data, improperly shared with third parties as it was, had in fact been deleted. The dossier includes a letter from Facebook’s lawyers, dated August 2016, in which he was asked to destroy data collected by GSR: a company Kogan set up to harvest user profiles.

That’s all that Facebook apparently did about the leak, or breach, or whatever you want to call it. It sent a letter, the receipt of which was delayed since Wylie was traveling, didn’t pursue a response when he didn’t answer for weeks, and neglected to follow up with forensics to make sure the data was deleted from his computers and storage.

Wylie:

That to me was the most astonishing thing. They waited two years and did absolutely nothing to check that the data was deleted. All they asked me to do was tick a box on a form and post it back.

You might well question how 270,000 people signing up for a Facebook personality quiz blossomed into a potential data breach affecting 50 million users – nearly 25% of potential US voters.

As The Observer describes it, the app scraped not just test-takers’ private profile data, but also that of their friends. Facebook didn’t disallow such behavior from apps at the time, but such data harvesting was allowed only to improve user experience in the app, not to be sold or used for advertising.

Of the 50 million profiles scraped (only 270,000 of which belonged to users who’d granted permission), roughly 30 million contained enough information, including places of residence, that the company could (at least theoretically) match users to other records and build “psychographic” profiles.

The NYT published an email from Kogan to Wylie describing what traits could be predicted from those profiles: they include gender, age, political views, religion, job, “sensational interests” (a category that includes whether somebody’s into guns/shooting/martial arts/drugs/black magic/paganism/how credulous they are), and belief in star signs, among others.

Cambridge Analytica gained notoriety for what its own execs called “psychological warfare” in both the Trump and Brexit campaigns.

Not surprisingly, Facebook has a far different account of what went down. But one thing the social network and the investigative journalists all agree on is that Cambridge not only relied on users’ private Facebook data, but it’s looking like it still possesses “most or all of the trove,” according to the NYT.

From Facebook’s explanation of why it’s suspended SCL and Cambridge:

Several days ago, we received reports that, contrary to the certifications we were given, not all data was deleted. We are moving aggressively to determine the accuracy of these claims. If true, this is another unacceptable violation of trust and the commitments they made.

This is a lot, but there’s far more. The revelations come just weeks after special counsel Robert Mueller indicted 13 Russians for allegedly using Facebook to perpetrate “information warfare” against the US.

Cambridge Analytica is currently under investigation on both sides of the pond: it’s a key focus in two inquiries in the UK, one from the Electoral Commission, into the firm’s possible role in the EU referendum, and one by the Information Commissioner’s Office (ICO), into data analytics for political purposes. In the US, Mueller’s probe is also delving into how the analytics firm helped Donald Trump win the presidency.

And then of course there’s Russia and its part in the dissemination of fake news. It turns out that Kogan has previously unreported links to St. Petersburg State University and has accepted Russian grants for research. His Facebook license was only to collect data for research purposes, not to pass on to a commercial outfit like Cambridge, and thus was in violation of Facebook’s terms.

Kogan claims that everything he did was legal, according to the Observer, and that he had a “close working relationship” with Facebook, which had granted him permission for his apps.

Democrat Senator Mark R. Warner, Vice Chairman of the Senate Select Committee on Intelligence, who’s been proposing an Honest Ads Act to regulate online political advertising similar to how it’s done in television, radio and print, put out a statement saying that the latest revelations are yet another sign that online ads are the Wild West:

This is more evidence that the online political advertising market is essentially the Wild West. Whether it’s allowing Russians to purchase political ads, or extensive micro-targeting based on ill-gotten user data, it’s clear that, left unregulated, this market will continue to be prone to deception and lacking in transparency. This is another strong indication of the need for Congress to quickly pass the Honest Ads Act to bring transparency and accountability to online political advertisements.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/Zcjgfuww_PU/

Russia accused of burrowing into US energy networks

Russia has been accused of so many things recently, it’s easy to lose track.

This week the Department of Homeland Security (DHS) added cyber-intrusion and surveillance of the US critical infrastructure sector to the growing list of accusations – in a move that might have been missed by commentators had it not come packaged with sanctions connected to alleged interference in elections.

Posted as an alert on US-CERT, this one matters. Anxiety about the probing of the energy grid goes back years but this is the first time the US has formally accused another country, Russia, of being behind such incidents.

Until now, the public alerts have been coy about attribution. Not this time:

Since at least March 2016, Russian government cyber actors targeted government entities and multiple US critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors.

Although it didn’t appear that any disruption had taken place this time, the incident pointed to menacing intent:

DHS and FBI characterize this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities’ networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks.

Coming only weeks after the US and its Five-Eyes allies joined forces to condemn Russia for last year’s global NotPetya malware attack, the report looks like another signal of a changed strategy.

Only days before, the UK Defence Secretary Gavin Williamson warned that Russia’s attitude to the UK might include wanting to:

Damage its economy, rip its infrastructure apart, actually cause thousands and thousands and thousands of deaths.

Attack reports traditionally include technical detail but without naming names. Now, it’s as if the US and UK have decided to play Russia at its own game of information war, exposing them in as much detail as possible.

What used to be the Russian defence of plausible deniability has morphed remarkably quickly into an even stranger form, that of implausible deniability, a world where Russia plays the role of default culprit.

The strangeness of this isn’t that fewer believe Russia’s denials but that it’s sometimes as if the Russian Government takes perverse satisfaction from notoriety, like a movie gun-slinger proudly showing off wanted posters naming the high price on his head.

Exposing a country’s bad behaviour is about playing the long game, exposing a pattern that includes two alleged cyberattacks on Ukraine’s energy sector in 2014 and 2015 that led to power outages.

For the first time, it’s being suggested that the US and UK might contemplate cyber-retaliation in kind, which seems unlikely given that the US simply has more to lose compared to a Russian economy that is smaller than some US states.

But there is another way of understanding alleged Russian cyber-incursions against the US and others – everyone is vulnerable. The internet’s inter-connectedness has become the ultimate leveller, perhaps more so than any conventional military weapon.

Cyberattacks on infrastructure show us how everyone can be hurt – the US, the UK, of course, but also ordinary Russians too.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/mJRPFTCcVYY/

Modified BlackBerrys sold to drug dealers, five indicted

A cocaine bust in Southern California has led to the indictment of five execs at “uncrackable” phone seller Phantom Secure. The investigation involved a suspect who allegedly used the devices to coordinate shipments of thousands of kilos of cocaine and other drugs.

As of this morning, Phantom Secure’s site was still up, advertising BlackBerry and other mobile devices with encrypted email and chat that make them impervious to decryption, wiretapping or legal third-party records requests.

But while Phantom Secure’s site was still up, the secure-phone company has been hollowed out.

The US Department of Justice (DOJ) indicted five of the company’s execs on Thursday, including Phantom Secure CEO Vincent Ramos. He’s the only one in custody. The remaining four execs are fugitives.

Authorities also seized Phantom Secure’s property, including more than 150 domains and licenses allegedly used by transnational criminal organizations to send and receive encrypted messages. They also seized bank accounts and property in Los Angeles, California and Las Vegas, Nevada.

According to the FBI’s criminal complaint, a Phantom Secure device whose hardware and software had been modified – including the technology that enables voice communication, microphone, GPS navigation, camera, internet access and Messenger service – cost between $2,000 to $3,000 for a six-month subscription.

You couldn’t become a client until a current subscriber vouched for you – a strategy likely meant to keep the company from being infiltrated by law enforcement agents, the FBI says. That strategy ultimately failed: investigators managed to infiltrate the company and eavesdrop on alleged conversations between drug dealers and Ramos. The bust involved agents around the world, including in the US, Canada (where Phantom Secure is based), Australia, Panama, Hong Kong and Thailand.

Ramos was arrested in Seattle on 7 March and has been charged with allegedly helping illegal organizations, including the Sinaloa drug cartel. He and his four fugitive colleagues have been charged with participating in and aiding and abetting a racketeering enterprise and conspiring to import and distribute controlled substances around the world.

Vice reports that the allegations include members of the notorious Sinaloa drug cartel having used Phantom’s devices, and that the “upper echelon members” of transnational criminal groups have bought Phantom phones.

A source who’s familiar with the secure phone industry told Motherboard that the devices have been sold in Mexico, Cuba and Venezuela, as well as to the Hells Angels gang. The criminal complaint estimates that 20,000 Phantom devices are in use worldwide, with around half in Australia. The subscriptions have brought in tens of millions of dollars of revenue to Phantom: the DOJ says that Phantom has made approximately $80 million in annual revenue since 2008 and has facilitated drug trafficking, obstruction of justice, and violent crime around the world.

As Motherboard reports, Phantom Secure isn’t the only company selling uncrackable phones, sometimes stripped of cameras and microphones, that send messages only through private networks. But it is one of the most infamous.

In March 2014, Australian outlet ABC reported that Phantom’s encrypted BlackBerrys were linked to at least two murders of Hells Angels bikers. The Sydney Morning Herald subsequently reported that North South Wales police had made the trip to BlackBerry’s headquarters in Canada, looking for advice on how they could get information out of the encrypted devices.

Ramos will face charges in San Diego. Still on the run are Phantom execs Kim Augustus Rodd, Younes Nasri, Michael Gamboa and Christopher Poquiz.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/sOLEjZHdImM/

Facebook confirms Cambridge Analytica stole its data; it’s a plot, claims former director

Analysis Facebook has “suspended” any business with controversial analytics firm Cambridge Analytica (CA) and its holding company, following claims by CA’s former director that the social media ad slinger’s data was purloined and used for political dirty tricks.

In a statement Facebook said that in April 2015 Dr Aleksandr Kogan, a lecturer at Cambridge University’s Department of Psychology, published an app on its site called thisisyourdigitallife, and said it was “a research app used by psychologists.” But instead of just using it for research, Facebook claims it was used for commercial purposes by Cambridge Analytica and others.

“Approximately 270,000 people downloaded the app. In so doing, they gave their consent for Kogan to access information such as the city they set on their profile, or content they had liked, as well as more limited information about friends who had their privacy settings set to allow it,” the statement reads.

The kicker’s in the last bit of that. Unless users had their Facebook privacy settings locked down the app slurped not only the 270,000 consenting users but all their friends as well – over 50 million people according to Christopher Wylie, a former researcher director at CA, who had a copy of the data set.

Facebook is peeved that the data was collected under an academic license and then sold commercially. Dr Kogan has no comment at time of publication, but CA has said it was misled about the data’s legality under British law when it worked with Kogan’s company Global Science Research (GSR) in 2014.

“When it subsequently became clear that the data had not been obtained by GSR in line with Facebook’s terms of service, Cambridge Analytica deleted all data received from GSR,” CA said in a statement.

“No data from GSR was used by Cambridge Analytica as part of the services it provided to the Donald Trump 2016 presidential campaign.”

Facebook knew about the incident in 2015 and sought assurances from all concerned that the data had been deleted. What has prompted Friday’s suspension of Cambridge Analytica was Wylie going public to various media outlets with some extraordinary claims about how the data was used.

Down the rabbit hole

According to Wylie the Facebook data was used to build up detailed profiles of the social and political views of around 30 million US voters. Once their preferences had been cataloged, Cambridge Analytica determined what types of emotional and visual messages would sway their views and then spammed their social media fields with professionally produced, carefully crafted misinformation.

Wylie was an early employee of Cambridge Analytica and claims the firm’s flamboyant old-Etonian CEO Alexander Nix sold former Trump campaign manager Steve Bannon on the technology. The way Wylie tells it, Bannon, who at the time was editor of the right-wing website Breitbart, wanted to use Cambridge Analytica’s technology to change the very culture of America.

“Steve wanted weapons for his culture war,” Wylie told The Observer. “We offered him a way to accomplish what he wanted to do which was change the culture of America.” You can see the full interview below:

Youtube Video

Bannon needed money to do this, and Wylie claims it came from Robert Mercer, the billionaire hedge fund manager and former IBM fellow who is known for throwing millions in funding at right-wing causes, including Breitbart.

Wylie claims he and Nix travelled to pitch Mercer on the plan in New York and sold him on the idea. Mercer pumped US$15m into Cambridge Analytica, Bannon became the company’s vice president, and Nix celebrated by slicing the top off a champagne bottle with a sabre that he keeps in the office, Wylie said.

There was only one problem – the software didn’t work. So Cambridge Analytica, in the time honored tradition of Bill Gates’ first IBM operating system, went out and bought better software for peanuts. Documents Wylie took with him after he left the company in mid-2014 show it paid GSR a little under £1m ($1.39m) for the data and the means to use it.

“What Kogan offered us was way cheaper, way faster, and of a quality that nothing matched,” he said. In a few months the profiles of over 50 million Facebook users had been slurped and fed into Cambridge Analytica’s new and improved algorithms. “I was naive and made a big mistake”, Wylie said.

Last month Nix denied Cambridge Analytica had ever used Facebook data for political purposes to the UK’s Culture Media and Sport select committee. Wylie claims this was a lie and while it wasn’t explicitly stated, everyone at CA knew where the data had come from.

“It was an instance of If you don’t ask questions then you won’t get an answer that you don’t like,” he said.

In light of Wylie’s claims the UK Information Commissioner’s Office has announced that it will open an investigation into the affair. CA is already being quizzed as to its involvement in Britain’s Brexit referendum, so it looks like Nix will be back to Parliament soon for another grilling.

“We are investigating the circumstances in which Facebook data may have been illegally acquired and used,” said the Information Commissioner Elizabeth Denham.

“We are continuing to invoke all of our powers and are pursuing a number of live lines of inquiry. Any criminal and civil enforcement actions arising from the investigation will be pursued vigorously”.

Wylie said he quit the company in mid-2014, telling Channel 4 News “I don’t want to work for the alt-right.”

He set up a similar firm called Eunoia Technologies to do more ethical marketing, taking a copy of the data with him, and has since had legal issues with CA But he insisted he wasn’t out for revenge.

“If it was revenge I could have done this years ago,” he said. And if I wanted to recreate Cambridge Analytica I should have just stayed. But I didn’t, I chose to leave.”

You can watch the full interview, complete with somewhat cliched shots of Wylie using a laptop on an artfully lit pavement and looking moody, here:

Youtube Video

He claims to have deleted the data before being formally asked to do so by Facebook in 2016, a year after the misuse was discovered by the social media firm. All he had to do was fill in a form saying he had deleted and Facebook were satisfied with that.

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/03/18/facebook_confirms_cambridge_analytica_stole_its_data_its_a_plot_claims_former_director/

Coverity Scan code checker’s systems crypto-jacked to run cheeky mining op

The systems of freebie open-source code scanning tool Coverity Scan were hacked and abused to run a cryptocurrency mining operation, its operator has confirmed.

Synopsys, the firm behind Coverity Scan, said its corporate systems were not affected by the previously unexplained incident, which resulted in the suspension of the service for around four weeks until last Friday.

In a breach notice this weekend, Synopsys said:

As you may be aware, there recently was an interruption in the availability of the Coverity Scan service. In February 2018, we discovered that servers used for the Coverity Scan service were accessed by an unauthorized third party. The access appears to have started earlier in the month. We suspect that the access was to utilize our computing power for cryptocurrency mining. We have not found evidence that database files or artifacts uploaded by the open source community users of the Coverity Scan service were accessed. We retained a well-known computer forensics company to assist us in our investigation.

We have closed the method of access, and the Coverity Scan service is again available as a free service to the open source community. The Coverity Scan service data is backed up frequently, and Coverity Scan service data will be restored. We regret any inconvenience caused by the downtime of the Coverity Scan service.

Registered users have been asked to reset their passwords to access the service again.

Jim Ivers, vice president of marketing at Synopsys’ Software Integrity Group, told El Reg the firm had called in computer forensics experts.

“The service was down for about four weeks. We took the service down immediately upon discovering the unauthorized access. We engaged a leading computer forensics company to independently assist in the investigation, and kept the service down until we completed the investigation. The investigation reported no evidence that database files or artifacts uploaded by the open source community users of the Coverity Scan service were accessed.

“We have addressed the source of the unauthorized access and took the down time to perform maintenance on the servers that drive the service. The service was restored Friday, March 16. The only interruption to the users was the unavailability of the service and that registered users had to reset their passwords on their first entry to the service once it was restored.”

Ivers reiterated that Synopsys’ corporate systems were not affected so its corporate data and intellectual property were never at risk.

“The servers used by Coverity Scan were not connected to any other Synopsys computer networks. The servers were purely for external access to the Coverity Scan service. No other Synopsys systems were affected by this event,” he added. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/03/19/coverity_scan_cryptomining/

Cybercriminals Launder Up to $200B in Profit Per Year

Cybercrime funds make up 8-10% of all illegal profits laundered and amount to $80-200 billion each year.

Cybercriminals launder an estimated $80-200 billion in illegal profit each year, which amounts to 8-10% of all illegal proceeds laundered around the world. Virtual currencies are the most common tool used for money laundering – but Bitcoin isn’t quite as trendy among hackers.

The data comes from Into the Web of Profit, an independent academic study sponsored by Bromium and conducted by Dr. Mike McGuire, senior lecturer in Criminology at Surrey University in England. It’s a nine-month study into the macroeconomics of cybercrime and how cybercriminals “cash out” the funds they generate through illegal activity.

With his academic background as a criminologist, Dr. McGuire has a decidedly different approach to cybercrime and focuses on how human factors affect behavior. In other words, he explores “not just that there are bad guys doing bad things, but the way responses are made.”

This study began as a simple question: What do cybercriminals spend their money on? However, it quickly evolved as Dr. McGuire discovered what he calls the “cybercrime economy.” His research turned into a broader study on how money flows around the criminal ecosystem.

“We’ve got to move beyond this idea that cybercrime is like a business – it’s more than that. It’s like an economy which mirrors the legitimate economy,” he explains. “Increasingly, what we’re seeing is the legitimate economy is feeding off the cybercrime economy.”

This economy consists of three parts: how cybercriminals’ revenue is generated, where that money goes, and what they do with the money when they move it around. Once the flow of money is understood, businesses can better determine how to protect themselves.

Virtual Currency is in. Bitcoin is out.

There are several reasons why cybercriminals are turning to cryptocurrency. They’re easily acquired, for one, and they have a reputation for enabling anonymous transactions.

Cybercriminals often cash out their virtual currencies by directly converting them into assets. Several sites, including Bitcoin Real Estate, let customers buy high-value properties (think tropical islands and penthouses in Paris) while evading financial regulators.

About 25% of all property sales will be conducted in cryptocurrency within the next few years, the report states. It’s concerning to financial analysts who fear swift and sneaky transactions, often paid for with criminal proceeds, will disrupt the global property market.

However, attackers are learning some digital currencies are more appealing than others.

“There’s almost a wholesale movement away from Bitcoin in the cybercrime world,” says McGuire. Bitcoin’s blockchain technology means all transactions are transparent, even if the users’ identities remain concealed.

This transparency has caused cybercriminals to explore software “tumbler” tools like CoinSwap and CoinJoin to hide where their payments come from. Yet even these are ineffective. Researchers at Princeton found data often leaks during these Web interactions through trackers and cookies. As a result, it’s possible to pinpoint users in 60% of transactions.

Now cybercriminals are adopting more anonymous currencies like Monero and Zcash.

Laundering via Gaming and Paypal

Cybercriminals often convert stolen funds into in-game currencies and then back into Bitcoin or other digital currencies. Popular games for this tactic include FIFA, Minecraft, World of Warcraft, Final Fantasy, Star Wars Online, and Grand Theft Auto 5.

FinCEN has stated that with respect to laundering, any person or business involved with currency exchange within games may be prosecuted as a “money transmitter.” Gaming companies are also increasingly aware that criminals leverage their games for fraud. Kabam, for example, warned users of possible misure of the currency used in its “Hobbit” game.

Digital payment systems (DPS), most frequently PayPal, are also exploited because they can be used anonymously. They’re most effective when they can be combined with other laundering techniques and resources, Dr. McGuire found. Many use sites like Ebay, which owns PayPal, to conduct the laundering so the activity seems less suspicious when it’s processed in PayPal.

By collecting data on online forums and interviewing both experts and cybercriminals, Dr. McGuire learned at least 10% of them used PayPal in some capacity to launder money – in some cases, up to £250,000, even though PayPal only allows a maximum of £2,500 per transaction.

Some criminals resort to micro-laundering, in which they use thousands of small electronic payments to launder a large sum of money. Dr. McGuire notes that during the HSBC laundering incident, testimony indicated that bank employees used PayPal to launder cash. Their process started with amounts as small as $0.15 over a period of up to 60 days. Over time they laundered hundreds of thousands of dollars through several PayPal accounts.

Dr. McGuire says while up to $200 billion is laundered each year, there is a gap between how much is made in cybercrime and how much is being laundered. The security community has to do more, he says, to stop the criminal and legitimate economies from interconnecting.

“The problem here is the cyber economy and the legitimate economy is so intertwined that some laundering is going on in cyber, then back to the real world, then back to cyber,” he explains.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Early bird special ends 3/16 – use promo code 200KS for an extra $200 off. Check out the security track here.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/cybercriminals-launder-up-to-$200b-in-profit-per-year/d/d-id/1331298?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

A Data Protection Officer’s Guide to the GDPR Galaxy

Impending deadline got you freaking out? These five tips might help you calm down, at least a little.

Many people are finding themselves faced with the need to familiarize themselves with a topic that pertains to everyone — data protection and privacy — even though most have not specialized in it. In April 2016, the General Data Protection Regulation (GDPR) was passed into law in the European Union. The goal of the law is to give individuals control over their own data. While GDPR became law in 2016, it won’t become enforceable until May 25, 2018. In this post, we’ll explore the universe of GDPR and provide some resources to help you prepare.

So, why is everyone freaking out over this law, particularly if a company is not in the EU? GDPR is composed of 99 articles and 173 recitals that are used to help interpret the law — that’s a lot of elements! What’s scarier is the sanctions for noncompliance can be a fine up to €20 million (approximately $24.6 million) or up to 4% of the annual worldwide turnover  (net sales generated by a business) of the preceding financial year, whichever is greater.

The “whichever is greater” is where most gasp a little. GDPR affects any business that operates in the EU and foreign companies that process the data of EU citizens. In our global economy, this is virtually every business. Furthermore, business must flow these requirements down to all their vendors.

The prospect of digging into this does seem daunting. So, where to start? First of all, breathe. While this is a large undertaking, there are many resources available.

1. Consider a training course. There are several avenues for training, and more become available each week. I’m lucky enough that my senior management team saw the importance of investing in sending someone to training so that our organization was educated, and we would be able to work with our customers to meet their GDPR compliance needs as well as our own.

I went to London and took the DPO Ready Track offered by the International Association of Privacy Professionals (IAPP). This was a four-day training and consisted of the Certified Information Privacy Professional/Europe (CIPP/E) and the Certified Information Privacy Manager (CIPM) courses. IAPP also offers these trainings online in a self-paced course. If you have the budget, I would highly recommend this option. There are consulting firms, training companies, and privacy vendors that also offer GDPR training.

If you don’t have the budget to attend a course, consider webinars. If you are able to attend an in-person course like those mentioned above, you may consider augmenting that with webinars as well. TrustArc, OneTrust, and Nymity have a comprehensive series of webinars that are available on their websites. The nice thing about webinars — in addition to being free — is that you can watch them from anywhere, at any time, as long as you have an Internet connection.

2. There are a few books that have been written on GDPR, but… Personally, the handful of books I have read on the topic reminded me of the early PCI DSS books that were not much more helpful than reading the standard itself. Most books are out of date before they even hit the virtual book shelves. I’ve found online articles, following the news feed from IAPP, and the guidance from the Article 29 Working Party advisory board and the Information Commissioner’s Office (ICO) out of the UK to be more helpful.

3. There are many other online resources and tools that are very helpful. If you are unsure if you need a data protection officer, there are flow charts online to help you step through the requirements to determine if you need to appoint or hire a resource. Also available with a quick online search are checklists and templates. Nymity has a very nice GDPR Compliance Toolkit available for download.

Augmenting your knowledge with tools to assist in executing on some of the more daunting tasks for GDPR is a great way to help your organization meet the requirements. If you don’t have processes and tools in place to address tasks such as process mapping performing privacy impact assessments (PIAs) and data protection impact assessments (DPIAs), vendor tools may be a solution. I joke that for Christmas I got the TrustArc Data Flow Manager and Assessment Manager Modules from our chief security officer and our VP of finance. These tools have proven invaluable to me. We decided to go with TrustArc for several reasons. However, I evaluated the solutions from OneTrust and Nymity as well. I highly recommend evaluating the solutions that best meet your needs.

4. If you’re not an attorney, identify your limits in terms of knowledge and ability. I have a very strong information security and compliance background and, before my training for GDPR, some privacy training; however, I’m not an attorney and have not gone to law school. I’m well aware of the boundaries of my knowledge and do not hesitate to work with our senior management to engage our outside counsel when necessary. For example, one instance where we deferred to our attorneys is when we had to write a data processing addendum (DPA), which is a formal legal contract required under GDPR that outlines the roles and responsibilities of data controllers and processors.

5. Last but not least, reach out to your peers. Many of us are working through the onslaught of requests for information on how our companies will meet the requirements of GDPR as well as reaching out to all our vendors to ask the dreaded question, “What are you doing to meet the requirements of GDPR?” Seek support from peers to discuss your questions, worries, confusion, and frustration.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at #Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the Interop ITX 2018 security track here. Save $200 off your conference pass with Promo Code 200MC.

Jen Brown is Sumo Logic’s compliance and data protection officer (DPO) and is responsible for leading compliance, risk, and privacy efforts for the company, including GDPR, PCI DSS, ISO 27001, HIPAA, SOC2, and FedRAMP, as well as several other regulations. Prior to Sumo … View Full Bio

Article source: https://www.darkreading.com/endpoint/a-data-protection-officers-guide-to-the-gdpr-galaxy-/a/d-id/1331262?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Microsoft Offers New Bug Bounties for Spectre, Meltdown-Type Flaws

Microsoft is offering a short-term bug bounty program for speculative execution side-channel vulnerabilities and threats.

Microsoft last week announced new bug bounties for speculative execution side-channel vulnerabilities. These vulnerabilities, of which Spectre and Meltdown were the first known examples, represent a new class of problem and Microsoft would like to know what else might be lurking in the neighborhood.

The bug bounties – on offer through December 31, 2018 – are:

According to Microsoft, Tier 1 vulnerabilities are new attacks, Tiers 2 and 3 are techniques that get around protections already put in place against existing vulnerabilities, and Tier 4 is a demonstrating an actual successful attack method using already known vulnerabilities.

Phillip Misner, principal security group manager at the Microsoft Security Response Center, said in Microsoft’s post announcing the program: “Speculative execution side channel vulnerabilities require an industry response.” To that end, Microsoft says that they will share any discovered vulnerabilities and attacks with the industry in ethical, industry standard forms.

For more, read here and here.

 

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the security track here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/risk-management/microsoft-offers-new-bug-bounties-for-spectre-meltdown-type-flaws/d/d-id/1331303?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Facebook suspends account of Cambridge Analytica whistle-blower

UPDATED Chris Wylie, the whistleblower who has alleged the knowingly improper use of Facebook data by Cambridge Analytica, says The Social Network™ has suspended his account.

Wylie took to Twitter with the following missive.

Wylie’s allegations appeared over the weekend in The New York Times and The Observer and detail how Cambridge Analytica sought and acquired Facebook-derived data on more than 50 million people and used the trove to conduct micro-targeted political campaigns thought to have contributed to the election of Donald Trump and the leave vote carrying the Brexit referendum.

Data_image_via_Shutterstock

Did somebody say Brexit? Cambridge Analytica grilled: Brit MPs’ Fake News probe

READ MORE

Cambridge Analytica’s links to alt-right groups and the whiff of privacy invasions have made it a subject of considerable interest, with execs appearing before the UK Parliament’s Culture Media and Sport select committee. Parliamentary committee to explain itself. Wylie’s allegations paint the company as ruthless in pursuit of data that would let it deliver on its promises.

CBS news reports that Facebook and Wylie have been in contact, with The Social Network™ saying “Mr. Wylie has refused to cooperate with us until we lift the suspension on his account. Given he said he ‘exploited Facebook to harvest millions of people’s profiles,’ we cannot do this at this time.”

Cambridge Analytica has also taken to Twitter, as follows.

That’s an interesting one as it suggests the firm and Facebook have not previously been in contact, despite Facebook knowing its data had gone astray.

Another interesting one, given Cambridge Analytica’s assumed role in the Brexit vote. However both Tweets are also a little porous: the language used allows the possibility that Cambridge Analytica holds Facebook-derived data from sources other than profiles, or could have provided services to pro-Brexit organisations other than the Leave campaign.

The Register has sought comment from Facebook, Cambridge Analytica and Wylie and will update this story or write a new one if they offer any additional information. ®

UPDATE: Facebook’s veep and deputy general counsel has been in touch with the following statement:

“Protecting people’s information is at the heart of everything we do, and we require the same from people who operate apps on Facebook. If these reports are true, it’s a serious abuse of our rules. All parties involved — including the SCL Group/Cambridge Analytica, Christopher Wylie and Aleksandr Kogan – certified to us that they destroyed the data in question. In light of new reports that the data was not destroyed, we are suspending these three parties from Facebook, pending further information. We will take whatever steps are required to see that the data in question is deleted once and for all — and take action against all offending parties.”

Bootnote: Another of Cambridge Analytica’s Tweets tried to paint its electioneering activities as anodyne.

As luck would have it, The Register encountered the Obama campaign’s chief technology officer, Harper Reed, in 2013. Here’s how we reported some of what he had to say.

“Data on what car you drive was not very useful in the campaign,” he said. “We did not use that much private data.” More useful, Reed said, was simple data points like a response to the question “do you support the President?” With a response to that question and information on whether an individual had voted in the past in hand, the Obama campaign was able to identify a voter as someone worthy of their attention.

We also wrote the following:

Reed also cautioned old people – anyone over 25 in his big-beard-chunky-earrings-and-thick-framed-glasses world – not to panic on the topic of privacy. Oldsters are uneasy with the notion that Facebook et al mines their data, he said. Young folk have no such qualms, understand the transactions they participate in and are more familiar with the privacy controls of the services they use.

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/03/19/facebook_suspends_account_of_cambridge_analytica_whistleblower_chris_wylie/

Facebook confirms Cambridge Analytica stole its data; it’s a plot claims former director

Analysis Facebook has “suspended” any business with Cambridge Analytica and its holding company following claims by CA’s former director that the social media ad slinger’s data was purloined and used for political dirty tricks.

In a statement Facebook said that in April 2015 Dr Aleksandr Kogan, a lecturer at Cambridge University’s Department of Psychology, published an app on its site called thisisyourdigitallife, and said it was “a research app used by psychologists.” But instead of just using it for research, Facebook claims it was used for commercial purposes by Cambridge Analytica and others.

“Approximately 270,000 people downloaded the app. In so doing, they gave their consent for Kogan to access information such as the city they set on their profile, or content they had liked, as well as more limited information about friends who had their privacy settings set to allow it,” the statement reads.

The kicker’s in the last bit of that. Unless users had their Facebook privacy settings locked down the app slurped not only the 270,000 consenting users but all their friends as well – over 50 million people according to Christopher Wylie, a former researcher director at CA, who had a copy of the data set.

What Facebook is peeved about is that the data was collected under an academic license and then sold commercially. Dr Kogan has no comment at time of publication, but CA has said it was misled about the data’s legality under British law when it worked with Kogan’s company Global Science Research in 2014.

“When it subsequently became clear that the data had not been obtained by GSR in line with Facebook’s terms of service, Cambridge Analytica deleted all data received from GSR,” CA said in a statement.

“No data from GSR was used by Cambridge Analytica as part of the services it provided to the Donald Trump 2016 presidential campaign.”

Facebook knew about the incident in 2015 and sought assurances from all concerned that the data had been deleted. What has prompted Friday’s suspension of Cambridge Analytica was Wylie going public to various media outlets with some extraordinary claims about what the data was used for.

Down the rabbit hole

According to Wylie the Facebook data was used to build up detailed profiles of the social and political views of around 30 million US voters. Once their preferences had been cataloged a Cambridge Analytica computer worked out what types of emotional and visual messages would sway their views and then spammed their social media fields with professionally produced, carefully crafted misinformation.

Wylie was an early employee of Cambridge Analytica and claims the firm’s flamboyant old-Etonian CEO Alexander Nix sold former Trump campaign manager Steve Bannon on the technology. The way Wylie tells it, Bannon, who at the time was editor of the right-wing website Breitbart, wanted to use Cambridge Analytica’s technology to change the very culture of America.

“Steve wanted weapons for his culture war,” Wylie told The Observer. “We offered him a way to accomplish what he wanted to do which was change the culture of America.” You can see the full interview below:

Youtube Video

Bannon needed money to do this, and Wylie claims it came from Robert Mercer, the billionaire hedge fund manager and former IBM fellow who is known for throwing millions in funding at right-wing causes, including Breitbart.

Wylie claims he and Nix travelled to pitch Mercer on the plan in New York and sold him on the idea. Mercer pumped $15m into Cambridge Analytica, Bannon became the company’s vice president, and Nix celebrated by slicing the top off a champagne bottle with a sabre that he keeps in the office, Wylie said.

There was only one problem – the software didn’t work. So Cambridge Analytica, in the time honored tradition of Bill Gates’ first IBM operating system, went out and bought better software for peanuts. Documents Wylie took with him after he left the company in mid-2014 show it paid GSR a little under £1m ($1.39m) for the data and the means to use it.

“What Kogan offered us was way cheaper, way faster, and of a quality that nothing matched,” he said. In a few months the profiles of over 50 million Facebook users had been slurped and fed into Cambridge Analytica’s new and improved algorithms. “I was naive and made a big mistake.”

Last month Nix denied Cambridge Analytica had ever used Facebook data for political purposes to the UK’s Culture Media and Sport select committee. Wylie claims this was a lie and while it wasn’t explicitly stated, everyone at CA knew where the data had come from.

“It was an instance of If you don’t ask questions then you won’t get an answer that you don’t like,” he said.

In light of Wylie’s claims the UK Information Commissioner’s Office has announced that it will open an investigation into the affair. CA is already being quizzed as to its involvement in Britain’s Brexit referendum, so it looks like Nix will be back rto Parliament soon for another grilling.

“We are investigating the circumstances in which Facebook data may have been illegally acquired and used,” said the Information Commissioner Elizabeth Denham.

“We are continuing to invoke all of our powers and are pursuing a number of live lines of inquiry. Any criminal and civil enforcement actions arising from the investigation will be pursued vigorously”.

Wylie said he quit the company in mid-2014, telling Channel 4 News “I don’t want to work for the alt-right.”

He set up a similar firm called Eunoia Technologies to do more ethical marketing, taking a copy of the data with him, and has since had legal issues with CA But he insisted he wasn’t out for revenge.

“If it was revenge I could have done this years ago,” he said. And if I wanted to recreate Cambridge Analytica I should have just stayed. But I didn’t, I chose to leave.”

You can watch the full interview, complete with somewhat cliched shots of Wylie using a laptop on an artfully lit pavement and looking moody, here:

Youtube Video

He claims to have deleted the data before being formally asked to do so by Facebook in 2016, a year after the misuse was discovered by the social media firm. All he had to do was fill in a form saying he had deleted and Facebook were satisfied with that.

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/03/18/facebook_confirms_cambridge_analytica_stole_its_data_its_a_plot_claims_former_director/