WebProNews

Tag: FBI

  • FBI: Hackers Exploited SonarQube to Steal Government and Commercial Source Code

    FBI: Hackers Exploited SonarQube to Steal Government and Commercial Source Code

    The FBI has warned that hackers have been accessing proprietary source code from government agencies and businesses by exploiting SonarQube.

    SonarQube is a code inspection platform that currently supports 27 programming languages and helps developers write cleaner, more secure, bug-free code. SonarQube integrates with a number of third-party services and platforms, including GitHub, GitLab, LDAP, Active Directory, BitBucket, Azure DevOps and more.

    Unfortunately, according to the FBI (PDF), it appears a number of organizations using SonarQube left the default parameters in place, opening themselves up to security issues and code theft.

    In August 2020, unknownthreat actors leaked internal data from two organizations through a public lifecycle repositorytool. The stolen data was sourced from SonarQube instances that used default port settings and admin credentials running on the affected organizations’ networks. This activity is similar toa previous data leak in July 2020, in which an identified cyber actor exfiltrated proprietary source code from enterprises throughpoorly secured SonarQube instances and published the exfiltrated source codeon a self-hosted public repository.

    During the initial attack phase, cyber actorsscan theinternetfor SonarQube instances exposed to the open Internet using the default port (9000) and a publicly accessible IP address. Cyber actors then use default administrator credentials (username: admin, password: admin) to attempt to access SonarQube instances.

    The FBI recommends following basic security protocols that, quite frankly, organizations should have implemented from the beginning. This includes, changing the default admin username and password, the default port through which SonarQube is accessed, putting SonarQube behind a login screen, checking for unauthorized users and keeping the platform behind the company firewall.

  • Zoom Charts Path Toward End-to-End Encryption For All Users

    Zoom Charts Path Toward End-to-End Encryption For All Users

    Zoom is adding end-to-end encryption (E2EE ) for all users, reversing a decision made just weeks ago to reserve the highest security for paid plans.

    Zoom has been in hot water more than once in recent months over its encryption claims and policies. Originally, the company’s marketing led customers to believe it provided E2EE when it did not. Once the company finally rolled out the upgraded encryption, it said it would only be for paid subscribers.

    The rationale for the decision was that free plans were more likely to be used for illegal activities, and the company wanted to be able to work with the FBI and local law enforcement. Needless to say, the stand was not a popular one.

    It appears the company has changed direction, and charted what it believes will be a compromise solution that will allow it to offer E2EE to free users.

    “To make this possible, Free/Basic users seeking access to E2EE will participate in a one-time process that will prompt the user for additional pieces of information, such as verifying a phone number via a text message,” writes CEO Eric S. Yuan. “Many leading companies perform similar steps on account creation to reduce the mass creation of abusive accounts. We are confident that by implementing risk-based authentication, in combination with our current mix of tools — including our Report a User function — we can continue to prevent and fight abuse.”

    The move is measured solution that will likely satisfy most critics.

  • Ransomware Attack Shuts Down Knoxville’s Network

    Ransomware Attack Shuts Down Knoxville’s Network

    Knoxville, TN has suffered a major ransomware attack, forcing it to shut down its entire network.

    According to BleepingComputer, a notice was sent out to city employees Thursday morning informing them of the issues.

    “Please be advised that our network has been attacked with ransomware,” reads the notice.

    “Information Systems is currently following recommended protocols. This includes shutting down servers, our internet connections, and PCs. Please do not log in to the network or use computer applications at this time.”

    So far, Knox County government computers were not impacted. Police and fire department operations are intact, although neither can access the network.

    As BleepingComputer points out, no group has yet claimed responsibility, although the FBI is investigating the incident. At the same time, officials said no personal data or credit card information was accessed or stolen.

    Ransomware has become one of the biggest threats to online security, with attacks costing the US an estimated $7.5 billion in 2019. Knoxville is just the latest example of the problems these attacks can cause.

  • The Case For Paid Zoom Plans: Free Plans Don’t Have End-to-End Encryption

    The Case For Paid Zoom Plans: Free Plans Don’t Have End-to-End Encryption

    Following Zoom’s addition of end-to-end encryption, the company’s CEO made it clear that only paying customers benefit from it.

    Zoom has become one of the dominant video communication platforms during the coronavirus pandemic, going from 10 million daily users to well over 200 million, and hitting 300 million at times. In spite of its dominance, Zoom has faced significant criticism for weak security. The company was forced to put a 90-day moratorium on new features, as it pivoted to security fixes.

    One of the biggest criticisms was the type of encryption Zoom used, with its marketing giving the impression it was end-to-end when, in fact, it was not. Zoom quickly moved to address the issue and offer true end-to-end encryption.

    In spite of that, not everyone will benefit from the upgrade. According to Bloomberg, in a call with analysts, CEO Eric Yuan indicated free users are out in the cold.

    “Free users for sure we don’t want to give that because we also want to work together with FBI, with local law enforcement in case some people use Zoom for a bad purpose,” said Yuan.

    The move is already receiving criticism and it will be interesting to see if Zoom sticks to its guns or upgrades free users as well.

  • FBI Warns of ‘Zoom-Bombing’ As Videoconferencing Soars

    FBI Warns of ‘Zoom-Bombing’ As Videoconferencing Soars

    The FBI is warning of ‘Zoom-bombing,’ where videoconferencing meetings are being hijacked by unwelcome participants.

    Zoom has quickly become one of the most popular videoconferencing platforms as millions of individuals self-isolate and work from home. The software is being used by companies, schools and individuals looking to continue some semblance of normalcy.

    Unfortunately, bad actors have been taking advantage of the platform and hijacking meetings. These disruptions have ranged from shouting profanities at the participants, to screen sharing pornography to the group. As a result, the FBI is recommending that Zoom users enable a number of settings to limit the risk, including:

    • Do not make meetings or classrooms public. In Zoom, there are two options to make a meeting private: require a meeting password or use the waiting room feature and control the admittance of guests.
    • Do not share a link to a teleconference or classroom on an unrestricted publicly available social media post. Provide the link directly to specific people.
    • Manage screensharing options. In Zoom, change screensharing to “Host Only.”
    • Ensure users are using the updated version of remote access/meeting applications. In January 2020, Zoom updated their software. In their security update, the teleconference software provider added passwords by default for meetings and disabled the ability to randomly scan for meetings to join.
    • Lastly, ensure that your organization’s telework policy or guide addresses requirements for physical and information security.

    These are excellent suggestions that everyone using Zoom should put into practice immediately.

  • FBI Using Fitness App to Track You

    FBI Using Fitness App to Track You

    It was bound to happen. With mass surveillance being one of the most effective tools in the fight against the coronavirus pandemic, the FBI may be taking the first steps.

    Monday the FBI sent out a tweet recommending their fitness app for individuals looking for ways to stay active and fit while stuck indoors as a result of the virus.

    #MondayMotivation Are you looking for tips for indoor workouts? Download the #FBI’s Physical Fitness Test app to learn proper form for exercises you can do at home like pushups and situps. http://ow.ly/6y3f50yQeHj

    — FBI (@FBI) 3/23/20

    As multiple users started pointing out, however, when the app is downloaded, it asks for specific location information, as well as what WiFi networks you connect to. While Twitter may not always be the bastion of sound, measured responses, in this case the Twitterverse appears to be spot on in largely taking a hard pass on downloading the app.

    The app is, at least in part, governed by the Privacy Policy posted on fbi.gov, especially when the app is accessing the site. That policy makes the following statement:

    “To protect the system from unauthorized use and to ensure that the system is functioning properly, individuals using this computer system are subject to having all of their activities monitored and recorded by personnel authorized to do so by the FBI (and such monitoring and recording will be conducted). Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals evidence of possible abuse or criminal activity, system personnel may provide the results of such monitoring to appropriate officials. Unauthorized attempts to upload or change information or otherwise cause damage to this service are strictly prohibited and may be punishable under applicable federal law.”

    In view of that statement, it looks as though it is technically possible for the FBI to legally justify using the app for surveillance. Consider yourself forewarned.

  • FBI Seizes Site With 12 Billion Stolen User Names & Passwords

    FBI Seizes Site With 12 Billion Stolen User Names & Passwords

    In an international operation, the FBI has seized a website containing user data from over 10,000 data breaches, according to Engadget.

    According to the report, the FBI seized WeLeakInfo, a website that contained personal data taken from 10,300 data breaches. Engadget says the “site promoted itself as a legitimate way to perform security research, even though it offered phone numbers, IP addresses and other personal info that’s protected by law.”

    Even worse, the information was organized in a searchable database that could be accessed through subscriptions that started as cheap as $2. With just an email address, someone could find any associated names, passwords, phone numbers and IP addresses. Engadget recommends individuals check “security expert Troy Hunt’s excellent haveibeenpawned.com site” to see if their information has been stolen.

    As more and more services, platforms and devices become interconnected, it’s important for users to periodically change their passwords, and to use unique passwords for different services. If a person uses the same password across multiple services, it only takes a single breach to expose their data in multiple locations.

  • FBI Using Deception to Help Protect Companies From Cybercrime

    FBI Using Deception to Help Protect Companies From Cybercrime

    According to an Ars Technica story, the FBI is using one of the oldest tricks in the book to help companies protect data: deception.

    Under a program called IDLE (Illicit Data Loss Exploitation), the FBI is working to proactively protect companies, rather than waiting for an incident to occur. According to Ars, IDLE is “a form of defensive deception—or as officials would prefer to refer to it, obfuscation—that the FBI hopes will derail all types of attackers, particularly advanced threats from outside and inside the network.”

    The goal is to lure hackers into going for fake data, servers or infrastructure, leading them down dead-ends. The longer hackers are engaged with these fake systems, the more time security experts have to track them down.

    The program represents a fundamental shift in the FBI’s approach, where there is a greater emphasis placed on cooperation between the FBI and other government agencies, as well as with the private sector. In the ongoing arms race between cyber criminals and cyber security experts, the FBI’s approach is an innovative—albeit old—tactic that should help companies better protect themselves.

  • ToTok Removed From Apple and Google Stores Amid Claims It’s a Government Spying App

    ToTok Removed From Apple and Google Stores Amid Claims It’s a Government Spying App

    ToTok was released only months ago and has climbed the charts to become one of the most popular messaging apps in Britain, India, Saudi Arabia and Sweden, as well as becoming one of the most downloaded social media apps in the U.S. last week.

    According to a report by the New York Times, however, the app is actually a spying tool for the United Arab Emirates government, giving it the ability to “track every conversation, movement, relationship, appointment, sound and image of those who install it on their phones.” The allegation is based on American officials who were aware of classified intelligence, as well as the NYT’s own investigation.

    The app is distributed by a company called Breej Holding. However, investigation indicates the firm is likely a front company associated with DarkMatter, a cyberintelligence and hacking firm located in Abu Dhabi. DarkMatter is staffed with individuals who previously worked for the NSA, Israeli intelligence and Emirate intelligence, and is under FBI investigation for possible cyber crimes.

    In the wake of these revelations, both Apple and Google have removed the app from their respective stores. ToTok released a post to their user community to address the allegations, but stopped short of denying them outright. In fact, their privacy policy expressly says they may share data with “group companies,” as well as “to comply with a legal obligation to which we are subject.” Either of those clauses come into play if the allegations are correct and the app is actually backed by the government.

    As the NYT comments, this is a significant “escalation in a digital arms race among wealthy authoritarian governments.” Whereas many governments have banned apps like WhatsApp and Signal, since they employ end-to-end encryption, the UAE took it a step further by lulling their citizens into a false sense of security with an app deliberately designed to spy on them and anyone else using it.

  • FBI Warns Travelers About Automatically Joining WiFi Hotspots

    FBI Warns Travelers About Automatically Joining WiFi Hotspots

    On the eve of the holiday travel season, the FBI’s Oregon field office is warning travelers about the danger of letting their computers and devices automatically connect to open WiFi networks.

    Many devices have a feature that allows them to automatically scan for, and join, open WiFi networks. While convenient, the feature represents a world of potential problems, as there is no way to verify the safety and security of an unknown hotspot. There could be hackers scanning traffic on a third-party, open network, or the network itself could be hosted by bad actors.

    The FBI’s post outlined a number of common sense precautions travelers should take:

    “Now is not the time you want to talk about cyber security, but we do have a few travel tips to keep you safe while you are on the go.

    • Don’t allow your phone, computer, tablet, or other devices to auto-connect to a free wireless network while you are away from home. This is an open invitation for bad actors to access your device. They then can load malware, steal your passwords and PINs, or even take remote control of your contacts and camera.
    • If you do need to connect to a public hotspot – such as at an airport or hotel – make sure to confirm the name of the network and the exact login procedures. Your goal is to avoid accidentally connecting to a fraudster’s WiFi that they are trying to make look legit.
    • If you absolutely have to use an unsecured hotspot, avoid doing anything sensitive like accessing your bank account. A hacker would love your user ID and password – don’t give it to them.
    • Related to the above point, using your own secured hotspot from your phone is generally a better option.
    • If you are having guests stay at your home, consider setting up a separate WiFi account for them. That way, if they are running unsecured devices on your network, you can segregate their vulnerabilities from your sensitive data.
    • Disable location services – including those on your social media accounts and in your camera settings – that tell people where you are.
    • Finally, as hard as this may be in a world of oversharing, consider NOT pushing out pictures and posts about your grand adventures. Yes, your kids are adorable and Christmas morning was the best ever – but do you really want to tell the world that you are away from home?

    “From the FBI family to your family, enjoy your travels and stay safe.”

    The FBI’s recommendations are solid tips that should be followed at all times.

  • Senators Express Alarm Over FBI Secretly Demanding Data From Credit Agencies

    Senators Express Alarm Over FBI Secretly Demanding Data From Credit Agencies

    Documents have come to light exposing the FBI’s practice of secretly demanding information about Americans from Equifax, Experian and TransUnion.

    According to a report by TechCrunch, the FBI has been using “legal powers — known as national security letters — to compel credit giants to turn over non-content information, such as records of purchases and locations, that the agency deems necessary in national security investigations. But these letters have no judicial oversight and are typically filed with a gag order, preventing the recipient from disclosing the demand to anyone else — including the target of the letter.”

    Tech companies have been dealing with national security letters for some time but, following the Edward Snowden revelations, the laws were changed in 2015 to give companies the right to petition for release from the gag orders. As a result, tech companies routinely publish transparency reports, disclosing how many times the government has requested their assistance.

    In the wake of these documents becoming public, at least three senators have expressed concern. Republican senator Rand Paul and Democratic senators Ron Wyden and Elizabeth Warren have written letters to the three credit agencies, questioning why the agencies have never disclosed the FBI’s requests.

    “Because your company holds so much potentially sensitive data on so many Americans and collects this information without obtaining consent from these individuals, you have a responsibility to be transparent about how you handle that data,” the letters said. “Unfortunately, your company has not provided information to policymakers or the public about the type or the number of disclosures that you have made to the FBI.”

    Senator Wyden, in particular, has been a vocal proponent of privacy protections and an equally vocal critic of questionable and illegal spying on American citizens. With these new revelations, it’s a safe bet there will be more inquiries and possible regulation to govern how the financial and credit information of Americans can be accessed and used.

  • Facebook Will Not Give Authorities a Backdoor to Access Encrypted Messages

    Facebook Will Not Give Authorities a Backdoor to Access Encrypted Messages

    Two months ago we reported on an open letter by Attorney General William Barr and his counterparts in Australia and the United Kingdom, calling on Facebook to create encryption backdoors in its messaging apps. This was followed by the FBI urging Interpol to condemn the use of strong encryption.

    Facebook has officially responded to the Attorney General’s request, via an open letter of their own. In the letter, Will Cathcart, Head of WhatsApp, and Stan Chudnovsky, Head of Messenger, highlight the inherent risks of making encryption weaker, or creating backdoors for authorities to access.

    “We believe that people have a right to expect this level of security, wherever they live. As a company that supports 2.7 billion users around the world, it is our responsibility to use the very best technology available to protect their privacy. Encrypted messaging is the leading form of online communication and the vast majority of the billions of online messages that are sent daily, including on WhatsApp, iMessage, and Signal, are already protected with end-to-end encryption.

    “Cybersecurity experts have repeatedly proven that when you weaken any part of an encrypted system, you weaken it for everyone, everywhere. The ‘backdoor’ access you are demanding for law enforcement would be a gift to criminals, hackers and repressive regimes, creating a way for them to enter our systems and leaving every person on our platforms more vulnerable to real-life harm. It is simply impossible to create such a backdoor for one purpose and not expect others to try and open it. People’s private

    “And we are not alone. In response to your open letter asking that Facebook break encryption, over 100 organizations, including the Center for Democracy and Technology and Privacy International, shared their strong views on why creating backdoors jeopardize people’s safety. Cryptography Professor Bruce Schneier said earlier this year: ‘You have to make a choice. Either everyone gets to spy, or no one gets to spy. You can’t have ‘We get to spy, you don’t.’ That’s not the way the tech works.’ And Amnesty International commented: ‘There is no middle ground: if law enforcement is allowed to circumvent encryption, then anybody can.’”

    The two executives argued that law enforcement already has viable ways of getting the information they need in cases that demand it.

    “That doesn’t mean that we cannot help law enforcement. We can and we do, as long as it is consistent with the law and does not undermine the safety of our users…. We deeply respect and support the work these officials do to keep us safe and we want to assure you that we will continue to respond to valid legal requests for the information we have available. We will also continue to prioritize emergencies, such as terrorism and child safety, and proactively refer to law enforcement matters involving credible threats.”

    Our initial report on the Attorney General’s open letter highlighted the dangers of weakening encryption or creating backdoors. As Amnesty International said, “there is no middle ground.” Encryption is about basic math. It’s no more possible to have strong encryption with backdoors than it is to break the laws of physics. Hopefully, Facebook’s questionable history with privacy and security will not cloud the very valid argument they are making about the importance of encryption.

  • Apple Threatens to Leave Russia in 2020, Citing Russian Software Demands

    Apple Threatens to Leave Russia in 2020, Citing Russian Software Demands

    The International Business Times (IBT) is reporting that Apple may leave the Russian market next year in response to a new law requiring Russian software alternatives be installed on electronic devices.

    The new law, which Putin signed on December 5, goes into effect on July 1, 2020. The law requires all computers, smartphones and smart TVs to have Russian applications pre-installed. As Reuters reports, electronic companies are pushing back on the law, although few as much as Apple.

    Apple has said the Russian law would require the equivalent of jailbreaking its software, something it has refused to do in the past. While the law’s proposed purpose is to allow local companies to better compete with the software that comes loaded on devices, critics believe any software the Russian government would insist be installed could, and likely would, be used to spy on people.

    According to IBT, “an unnamed Apple source allegedly informed Kommersant Business Daily that a mandate to include third-party applications to Apple’s ecosystem would be synonymous with jailbreaking. The Apple source also said that it might pose a security threat, and Apple would not tolerate such kind of risk. The Russian government will come up with a list of software and apps which tech firms are required to pre-install, as well as the list of devices covered by this new law, reports The Moscow Times.”

    For Apple, the stakes are far greater that just the Russian market. The company has made a name for itself as a staunch protector of privacy, going head-to-head with the FBI to fight attempts to force it to create backdoors in its software. If it gives in to Russia, it will set a dangerous precedent that other governments will no doubt seize upon.

  • Interpol Delays Encryption Criticism After Pushback

    Interpol Delays Encryption Criticism After Pushback

    A week ago news broke that the FBI had drafted a resolution for Interpol to release condemning the use of strong encryption. Ultimately the resolution was not passed, with Interpol contacting Nicole Perloth with the New York Times to deny the resolution was ever under consideration.

    When the story first came out, we wrote:

    “There is no doubt the resolution was drafted, with both Reuters and Ars Technica having seen a copy of it. The only question is whether Reuters’ sources about Interpol’s intentions were incorrect, or whether Interpol is attempting to backpedal after the news broke.”

    In an update by Reuters, it appears Interpol was backpedaling.

    “The international police organization Interpol put off plans to condemn the spread of strong encryption after objections by tech companies and civil liberties advocates, according to two people familiar with the matter.

    “After the Reuters article appeared, Facebook and others complained that strong encryption also deters criminal hacking and surveillance of peaceful political activists by repressive regimes, the people said.

    “Conference organizers told some who had attended that they were surprised by the feedback and delayed putting out a statement while they reconsidered, those people said.”

    Interpol is still denying there was ever any plans to release the statement and the agency did not return Reuters’ request for comments.

    If Reuters’ sources are correct, it is reassuring Interpol was willing to hold off in response to feedback and criticism of the proposal. At the same time, it’s still disconcerting the agency was surprised by the pushback and shows how little understood the privacy issue is—even by those who should understand it best.

  • FBI Recruits Interpol to Condemn End-to-End Encryption

    FBI Recruits Interpol to Condemn End-to-End Encryption

    Attorney General William Barr and his Australian and British counterparts made headlines recently when they wrote an open letter urging Facebook to create backdoors in its encryption. Not content with open letters, the FBI has drafted a resolution for Interpol to release urging companies to create methods that would allow access to encrypted data.

    Sources told Reuters the resolution “would be released without a formal vote by representatives of the roughly 60 countries in attendance.” A draft of the resolution seen by Reuters uses the threat of child exploitation as the reason behind the need for weakened encryption.

    “Service providers, application developers and device manufacturers are developing and deploying products and services with encryption which effectively conceals sexual exploitation of children occurring on their platforms.

    “Tech companies should include mechanisms in the design of their encrypted products and services whereby governments, acting with appropriate legal authority, can obtain access to data in a readable and useable format.”

    According to Nicole Perloth at the New York Times, however Interpol is denying the resolution was ever considered:

     

    There is no doubt the resolution was drafted, with both Reuters and Ars Technica having seen a copy of it. The only question is whether Reuters’ sources about Interpol’s intentions were incorrect, or whether Interpol is attempting to backpedal after the news broke.

    Either way, it’s another disturbing escalation of attempts to weaken end-to-end encryption. The draft resolution itself is misleading in nature. Ars reports the resolution claims “technologists agree” that creating systems that “\[allow] for lawful access to data, while maintaining customer privacy…can be implemented in a way that would enhance privacy while maintaining strong cyber security.”

    In point of fact, nothing could be further from the truth. As previously highlighted, mathematicians, cryptologist and privacy experts all agree there is no silver bullet. It is simple math—there is no way for encryption to be strong and protect its users, while simultaneously having backdoors or other means for companies or governments to access the encrypted data.

    If Interpol could be persuaded to condemn strong encryption, it would make it easier for countries around the world to pass laws requiring companies to create backdoors. Such a result would be disastrous for journalists, whistleblowers, political dissidents, refugees and anyone else who values their privacy.

  • Russian Gov Hackers Were Stealing Info From Dems For Over A Year

    The Washington Post is reporting that Russian government hackers penetrated DNC computers over a year ago and have everything including all email and chat traffic. According to Washington Post sources their main purpose was to steal opposition research about Donald Trump.

    The Post said that Russian spies were also targeting the networks of presidential candidates Hillary Clinton and Donald Trump and some GOP political action committees, but it is unknown if breaches were made at this time.

    From the Washington Post:

    The DNC said that no financial, donor or personal information appears to have been accessed or taken, suggesting that the breach was traditional espionage, not the work of criminal hackers.

    The intrusions are an example of Russia’s interest in the U.S. political system and its desire to understand the policies, strengths and weaknesses of a potential future president — much as American spies gather similar information on foreign candidates and leaders.

    The depth of the penetration reflects the skill and determination of the United States’ top cyber adversary as Russia goes after strategic targets, from the White House and State Department to political campaign organizations.

    Shawn Henry, the president of CrowdStrike and former F.B.I. agent, spoke to MSNBC: “We were able to identify with a very high degree of confidence a group that we have attributed back to the Russian government targeting that D.N.C. network. Foreign intelligence services are constantly interested in political processes.”

    “We were actually called by the DNC through their Counsel when they saw that there were some irregularities,” stated Henry. “They were concerned about a potential breach within their environment. We came in and did our typical incident response, we deployed certain pieces of technology that we use to try to get some visibility into the extent, the depth and breadth of this particular breach. In the course of this working very closely with the staff of the DNC we were able to identify with a very high degree of confidence a group that we have attributed back to the Russian government.”

    Henry added, “We know with certainty, my time in the Bureau, that foreign intelligence services are constantly interested in political processes, their interested in strategies, their interested in foreign policies, ect. The DNC and others have been targeted over the years by this very very sophisticated group with a high degree of capability and some very very sophisticated technology.”

    “Typically on our network we’ve got corporate strategies, email communication, documents, spreadsheets, PDF, calendars, etc.,” commented Henry. “The foreign intelligence services understand and recognize that organizations maintain this information and they’re looking to get any type of advantage as the political process continues to help them better develop their political strategies and to have a deep understanding of candidates. In this particular case, this groups level of sophistication is very very high, very very difficult to detect and they are able to maintain persistence for long periods of time without being uncovered. Because of that ability to remain stealth in the environment they’re able to look at these communications and documents for a protracted period of time.”

  • Emily Blunt: How the FBI Helped Her Prepare for ‘Sicario’ Role

    Emily Blunt plays a devoted FBI field agent in the film Sicario. Prior to its production, however, prominent backers of the film wanted the role rewritten to star a man instead.

    Writer Taylor Sheridan stuck to his guns. Emily Blunt was cast. The film opened nationwide last weekend.

    Emily Blunt recently dished on the help she received indirectly from the FBI during her preparation for the role. She read true stories of several FBI agents, from which she built her own character.

    “They were remarkably honest with me,” she said. “You’re given no back story in the film or the script. All you know about my character is that I’m divorced and I could do with a new bra. That’s about it. These women, I asked them everything, if their job affects their sleep, their relationships, what do their parents feel? What frightens them? What’s it like working with all the guys? One girl I really zeroed in on, she was quite shy…. I’d ask her things like, ‘What do you do to decompress after a hard day?’ She said, ‘I come home and watch “Downton Abbey.”‘ The women are so normal.”

    Emily Blunt is married to actor John Krasinski, and despite their star statuses, she prefers to lead a rather quiet life in the shadows with their 19-month-old daughter Hazel. She avoids social media and most big celebrity events.

    Have you checked out Emily Blunt in Sicario yet? If not, it’s well worth a trip to the theater. This one is destined to make Emily Blunt a big box office sensation.

  • Chattanooga Shooting by ISIS? Fox News Ran ISIS Tweet ‘Before’ Killings.

    The Chattanooga shootings are still the hot topic of conversation all across the United States. Everyone wants to know if this was another foreign terrorist attack within the United States, especially if it was carried out by ISIS?

    After Mohammad Youssuf Abdulazeez sprayed bullets into a military recruiting center and a Naval reserve center in Chattanooga, he was killed by police. He won’t be telling any tales. But some news outlets ran with a story that scared many Americans.

    “We’re taking a hard look at a Twitter account — an ISIS-linked Twitter account — that seemed to have foreknowledge of the shooting in Chattanooga,” Catherine Herridge, Fox News chief intelligence correspondent told viewers. “The tweet went out at 10:34 with the hashtag Chattanooga referring to American dogs and a likely shooting. This, of course, was about 15 minutes before the shooting took place,” she added.

    That has now been cleared up. Whoever saw the tweet and reported it was viewing it in Pacific Time Zone, which made it look like it had been sent before the Chattanooga shootings.

    The FBI special agent in charge has said they “have not determined whether it was an act of terrorism or whether it was a criminal act.”

    “We are looking at every possible avenue, whether it was terrorism — whether it was domestic, international — or whether it was a simple, criminal act,” Special Agent Ed Reinhold continued. “We will treat this as a terrorism investigation until it can be determined that it is not.”

    “We take all shootings very seriously. Obviously when you have an attack on a U.S. military facility, then we have to make sure that we have all the information necessary to make an assessment in terms of how this attack took place and what further precautions we can take in the future,” he said.

    Since then, politicians have been making their opinions known about whether ISIS was involved in the Chattanooga shootings.

    U.S. Rep. Michael McCaul, R-Texas, said on Friday that he was convinced the Chattanooga shootings were from ISIS.

    “If it can happen in Chattanooga, Tennessee, it can happen anywhere. The stats prove this. Over the last year, we’ve had over 60 ISIS-related arrests in the United States,” he said.

    “What keeps me up at night is the one case we don’t know about it, because we do know about a lot of the plots. We do know a lot about the individuals and the communications going on in the United States, but this one we did not,” he said.

    McCaul further warned, “I don’t know how many more of these could happen, but I can tell you there are ISIS investigations in all 50 states.”

    At this point, the FBI has not said whether they have determined if ISIS was involved in the Chattanooga shootings. So Americans wait.

  • Sean Hannity: Anjem Choudary Agrees With Death Threats Against Islamaphobe Pamela Geller

    Fox News did what it does best again – giving two well-known extremists a platform to spew their hate.

    Known Islamophobe Pam Geller, Muslim extremist Anjem Choudary and host Sean Hannity were embroiled in a 10-minute free-for-all shouting match during Hannity’s recent show.

    The ratings-loving host invited the two to a discussion on Geller’s art exhibit/ contest where exhibitors showcased their drawings of Mohammed, Islam’s prophet. The contest sparked a shooting and two suspects with alleged ties to ISIS were shot down.

    Hannity started the discussion by asking Geller if the FBI has contacted her about the “unverified” death threats made against her by a jihadist.

    The known anti-Muslim activist said the FBI hasn’t reached out to her and further claimed that President Barack Obama should be the one providing her with protection because the environment he created “raised the stakes on this.”

    Hannity then asked Choudary point-blank if he supported the “death threat against Pam Geller because she ran a free speech contest,” and the cleric more or less answered in the affirmative.

    “This isn’t Mickey Mouse or Donald Duck they were drawing,” Choudary answered, “this is the prophet [and] this woman wants to have people draw cartoons that insult the prophet knowing full well that carries the death penalty in Islam. So definitely, she’s asking people to attack.”

    As expected, that set Hannity off and he started shouting “You want her to die!”

    Choudary responded to that accusation by saying that if Geller (who’s definitely not a Muslim) was tried in a Sharia court, she would have been found guilty and given the capital punishment.

    The show rapidly went downhill from there.

    All viewers could see and hear for the next couple of minutes was Hannity calling the cleric “evil and pathetic,” Geller taking jabs at Choudary for “stepping on women” and the imam accusing the US of “murdering innocent people.”

    The short, vitriolic segment has been condemned by different sectors.

  • Antitrust Prosecution Comes To E-Commerce

    Antitrust Prosecution Comes To E-Commerce

    The U.S. Department of Justice announced that it has charged a former e-commerce executive with price fixing, in what would be the DoJ’s antitrust division’s first online marketplace prosecution. The defendant is charged with price fixing in violation of the Sherman Act, which carries a maximum sentence of 10 years and a fine of $1 million for individuals.

    David Topkins, who sold posters and other art through Amazon Marketplace, is facing a one-count felony charge, which was filed in the U.S. District Court of the Northern District of California in San Francisco. It alleges that Topkins and his “co-conspirators” fixed prices of certain posters sold from September 2013 through January 2014. The charge also alleges that Topkins and said co-conspirators adopted “specific pricing algorithms for the sale of certain posters with the goal of coordinating changes to their respective prices, and wrote computer code that instructed algorithm-based software to set prices.”

    The prosecution of Topkins came about from an investigation into price fixing in the online wall décor industry. The DoJ’s antitrust division is still conducting this with help from the FBI. Topkins agreed to plead guilty and pay a $20,000 criminal fine as well as cooperate with the ongoing investigation. The plea agreement is still subject to court approval. The maximum fine of $1 million can be increased to twice the gain derived from the crime or twice the loss suffered by the victims of the crime, if either amount is greater. It’s unclear what those figures are in this case.

    “Today’s announcement represents the division’s first criminal prosecution against a conspiracy specifically targeting e-commerce,” said Assistant Attorney General Bill Baer of the Department of Justice’s Antitrust Division. “We will not tolerate anticompetitive conduct, whether it occurs in a smoke-filled room or over the Internet using complex pricing algorithms. American consumers have the right to a free and fair marketplace online, as well as in brick and mortar businesses.”

    “These charges demonstrate our continued commitment to investigate and prosecute individuals and organizations seeking to victimize online consumers through illegal anticompetitive conduct,” said Special Agent in Charge David J. Johnson of the FBI’s San Francisco Field Office. “The FBI is committed to investigating price fixing schemes and remains unwavering in our dedication to bring those responsible for theses illegal conspiracies to justice.”

    Amazon itself, which has not been implicated in the case, has so far remained silent on the news.

  • David Duchovny, Gillian Anderson Returning for Six-Episode ‘X-Files’ Event Series

    David Duchovny and Gillian Anderson will return to Fox in The X-Files for a six-episode event series. Fox announced the news, that will no doubt thrill fans of the show, on Tuesday.

    “I think of it as a 13-year commercial break,” the show’s creator and executive producer Chris Carter said in a statement. “The good news is the world has only gotten that much stranger, a perfect time to tell these six stories.”

    The original sci-fi series, starring both David Duchovny and Gillian Anderson, ran on Fox for nine seasons, from 1993 to 2002. The show focused on FBI agents Dana Scully (played by Gillian Anderson) and Fox Mulder (played by David Duchovny) as they investigated numerous instances of paranormal activity. The X-Files won 16 Emmy Awards and five Golden Globes during its run.

    The X-Files was not only a seminal show for both the studio and the network, it was a worldwide phenomenon that shaped pop culture yet remained a true gem for the legions of fans who embraced it from the beginning,” Fox Chairmen and CEOs of Fox Television Group Dana Walden and Gary Newman said in a statement. “Few shows on television have drawn such dedicated fans as The X-Files, and we’re ecstatic to give them the next thrilling chapter of Mulder and Scully they’ve been waiting for.”

    It was back in January when Gillian Anderson first hinted at a return to the show.

    “Maybe do something where [Mulder] wakes up from a dream, and he’s been Hank Moody in Mulder’s dream. That was his fantasy,” she said during a podcast.

    Even though a release date for The X-Files six-episode event series hasn’t yet been announced, fans are likely clamoring for more information and blowing up Netflix for past episodes of the show.

    Are you among those who can’t wait to see David Duchovny and Gillian Anderson reprise their roles as Fox Mulder and Dana Scully on The X-Files?