The infiltrators may have the chief of Staff of Trump in a campaign

Photo of author

By [email protected]


For years, a A mysterious character that passes with a handle, the Trickbot Ransomware gang led and escaped from identity – even when other members of the group were leaking in leaks and a statement. this week German authorities revealedWithout a lot of noise, who believe that the mysterious amplifiers are: Vitaly Nikolavich Kovalev, a 36 -year -old Russian man who is generally still in his homeland.

Closer home, Wire Customs and border protection has 133,000 migrant and adolescent children to collect their DNA and download their genetic data to a national criminal database that is used by local, state and federal law enforcement. As the Trump administration’s migratory campaign continues, it is often justified through crime and terrorist calls, also wireless Evidence revealed This links the right -wing Swedish right -wing Swedish Championship in the American “Fighting Club” in California.

For those who seek to evade US government control, We gave advice About more special alternatives to web browsing, email and US -based search tools. We have assembled more general Guide to protecting yourself from monitoring and piracyBased on the questions, the great writer Matt Burgis received it in Radet, ask me anything.

But this is not all. Every week, we link the security and privacy news that we did not cover deeply. Click the titles to read full stories. And staying safe there.

The Wall Street Journal reported that the FBI investigates those who impersonate Suzy Wales, the Chief of Staff of the White House in Trump and one of the closest advisers of the president, in a series of fraudulent messages and calls to prominent republican political figures and business executives. Government officials and authorities participating in the investigation say that spear messages and calls have targeted individuals in the Wiles call list, and WILES told colleagues that her personal phone had been hacked to reach these connections.

Although Wales’s claim that she had penetrated her devices, it is still certain whether this is actually how attackers have identified Wiles partners. It will also be possible to assemble this target menu from a set of information and data available to the public sold by gray market brokers.

“It is an embarrassing level of security awareness. You cannot convince me that they have already done their security training,” says Jake Williams, a former National Security Agency and Vice President of Research and Development in the Hunter Strategy. “This is the various social engineering type in the garden that everyone can eventually deal with these days, and certainly senior government officials should expect it.”

In some cases, the goals not only received text messages, but the phone calls that committed suicide with Wales’s voice, and some government officials believe that calls may have used the artificial intelligence tools of Wales’s fake voice. If so, this would make the accident one of the most important cases so far for the so -called Deepfake programs used to try to hunt.

It was not clear after the Wales phone had been hacked, but the FBI ruled out the participation of a foreign country in the personal plagiarization campaign, according to White House officials. In fact, although some personal impersonation attempts have political goals – a member of Congress, for example, was asked to collect a list of people who may be forgiven by Trump – in at least one case, attempted suicide to deceive a goal for a cash transfer. This attempt to seize the money indicates that the deception campaign may be less than the spying process than the online fraud in operating the party, although it has a high -level goal.



https://media.wired.com/photos/6839f4e7e2939d1b83ce3bef/191:100/w_1280,c_limit/susie-wiles-deepfake-sec-2197665708.jpg

Source link

Leave a Comment