e dot dot dot
a mostly about the Internet blog by

January 2020
Sun Mon Tue Wed Thu Fri Sat
     
 


Italian Spyware Company Execs Arrested After Company Employees Spied On Innocent Citizens

Furnished content.


Any tool that gives people access to tons of personal data will be abused. Law enforcement databases are routinely misused by government employees. Ring -- law enforcement's favorite consumer home product -- collects tons of data about its customers and this data has been inappropriately accessed by Ring employees.The perfect storm of illicit surveillance and snooping comes from companies that sell spy tools to law enforcement but retain control of the servers where the personal data and communications are stored. An Italian developer, Diego Fasano, followed up his successful medical records app with something far more troubling: law enforcement spyware deployed with the aid of service providers.

The concept behind the company’s product was simple: With the help of Italy’s telecom companies, suspects would be duped into downloading a harmless-seeming app, ostensibly to fix network errors on their phone. The app would also allow Fasano’s company, eSurv, to give law enforcement access to a device’s microphone, camera, stored files and encrypted messages.Fasano christened the spyware “Exodus.”
The software was popular. Prosecutors all over Italy bought Fasano's product. So did Italy's NSA, L'Agenzia Informazioni e Sicurezza Esterna. There's no telling how much the government slurped from targets' phones over the years, but one prosecutor discovered the truth about eSurv's operations on accident. The information harvested by investigators wasn't walled off from the internet, only accessible by the prosecutor's office. It was accessible to anyone with the right credentials, stored thousands of miles away.
The Naples prosecutor began a more in-depth probe—and found that eSurv had been storing a vast amount of sensitive data, unencrypted, on an Amazon Web Services server in Oregon.The data included thousands of photos, recordings of conversations, private messages and emails, videos, and other files gathered from hacked phones and computers. In total, there were about 80 terabytes of data on the server—the equivalent of roughly 40,000 hours of HD video.
This meant eSurv employees -- at least the "Black Team" running eSurv's "Exodus" project -- could also access these recordings. There's no evidence (yet) that they did or that this very valuable stash of law enforcement intel was ever exfiltrated by hackers. But the fact remains law enforcement agencies did not have control of their harvested surveillance.This would have been a tempting stash of personal info for eSurv employees to dip into. But they didn't. They didn't have to because they were already deploying their malware to intercept communications and exfiltrate data from Italian citizens who had been tricked into installing eSurv's malicious, telco-miming apps.
In one instance, the Black Team hacked the phone of a 49-year-old woman from Crotone, a port city on the coast of Calabria, according to the prosecutor’s filings. The team collected the woman’s personal text messages to family and friends, and covertly recorded more than 3,800 audio clips using her mobile phone’s built-in microphone, chronicling the woman’s life and interactions as she went about her daily business, the filings say.In all, the Black Team spied on more than 230 people who weren’t authorized surveillance targets, according to police documents. Some of the surveillance victims were listed in eSurv’s internal files as “The Volunteers,” suggesting they were unwitting guinea pigs.
A court has already stated the company's product was "designed and intended.. to operate with functions that are very distant from the canons of legality." That should be an indictment of the law enforcement agencies who purchased it as well, but somehow it isn't. The proper paperwork may have been filed and approved by judges, but the spyware relies on cell service providers deceiving customers so malware can be implanted through fake apps.If the company has abused it tools, it's safe to say some of eSurv's customers have as well. For now, it's only eSurv's principals being investigated. But it does highlight the danger this malware poses, even when it's supposedly only being used for good.

Permalink | Comments | Email This Story


Read more here

posted at: 12:00am on 29-Jan-2020
path: /Policy | permalink | edit (requires password)

0 comments, click here to add the first



Court Tosses Evidence From Pretextual Stop When Dashcam Shows Cop Had Zero Reason To Perform A Stop

Furnished content.


The #BacktheBlue types like to say stuff like "If you don't want to get arrested, don't break the law." But breaking the law is never a prerequisite for a traffic stop, search, and/or arrest. The nation's top court has already said cops don't actually have to enforce real laws. They can predicate stops on what they perceive the law to be, whether or not any actual law was broken.Pretextual stops have also been given the Court's blessing. As long as there's a good enough reason to initiate a stop, cops can begin fishing for info or consent for a search. But they have to be quick about it and they have to have something approximating reasonable suspicion to continue questioning unrelated to the stop. There's not enough of a bright line drawn anywhere that would ensure success in a lawsuit or a suppression hearing. Cops know this so they play the odds.Sometimes this doesn't work out for the cops. It's a rarity but it happens. And it's happening more frequently thanks to the Supreme Court's Rodriguez decision and the increasing use of cameras by law enforcement officers.The Newspaper has grabbed another ruling highlighting a completely bullshit traffic stop that led to drug and gun charges against the driver. The stop was completely pretextual. Pretext doesn't invalidate a stop but the pretext itself must be valid -- either a real traffic violation or one close enough to the real thing that the court can be persuaded to grant good faith.None of that happened here. The defendant sought to suppress the evidence recovered from the search of his car, arguing he did not break any traffic law that would have given the officer justification to initiate a stop. The government argued that the defendant did not activate his turn signal before performing a right hand turn. It claimed Officer Caleb Sarchet "observed" this violation himself. Officer Sarchet needs to get his eyes checked.From the decision [PDF]:

The video evidence from Officer Sarchet’s cruiser camera reveals that Defendant activated his turn signal prior to approaching the stop sign at the intersection of Poplar Street and Linn Street and prior to turning from Poplar Street right onto Linn Street. (Govt. Exhibit 2). The video also show that Defendant’s car approached that stop sign close to the righthand curb and that, after Defendant made the right turn, he proceeded in a legal manner for some distance and safely pulled to the curb when Officer Sarchet activated his police cruiser’s overhead lights. (Id.). Moreover, the video reveals that Defendant completed the right-hand turn with reasonable safety and no other traffic might have been affected by his movement. (Id.). In short, the video evidence establishes that Defendant made the right turn at the intersection in accordance with CMC Sections 506-80 and 506-84 after coming to a complete stop.
To "objectively" believe someone violated the law, someone has to, you know, actually violate the law. The officer also claimed he thought the state's window tint law was violated but undercut that assertion with another assertion, resulting in this own goal.
In light of Officer Sarchet’s testimony clarifying that the sole basis for the traffic stop was Defendant’s alleged turn signal violation, (Doc. 33 at Page 30), the Court need not analyze whether Officer Sarchet had probable cause to belief Defendant violated Ohio Revised Code § 4513.241.
The court distinguishes this cop's BS from the permissible BS allowed by the Supreme Court's Heien decision.
The Supreme Court held that that a police officer's objectively reasonable mistake of law can give rise to reasonable suspicion. In this case, Officer Sarchet stopped Defendant’s car solely because he believed that Defendant violated CMC § 506-80. However, the video evidence reveals that Defendant did not do so. Hypothetically, if a police officer’s alleged sole basis for a traffic stop was that a defendant ran a “green light” (which is obviously not a traffic violation), the Court doubts that the Supreme Court would determine that police officer’s action to be objectively reasonable, as disregard of fact and law are not the same as a mistake of fact and law.
All the evidence from the stop disappears. The defendant is free to go since every bit of evidence the government had came from a traffic stop predicated on someone observing traffic laws.

Permalink | Comments | Email This Story


Read more here

posted at: 12:00am on 29-Jan-2020
path: /Policy | permalink | edit (requires password)

0 comments, click here to add the first



January 2020
Sun Mon Tue Wed Thu Fri Sat
     
 







RSS (site)  RSS (path)

ATOM (site)  ATOM (path)

Categories
 - blog home

 - Announcements  (0)
 - Annoyances  (0)
 - Career_Advice  (0)
 - Domains  (0)
 - Downloads  (3)
 - Ecommerce  (0)
 - Fitness  (0)
 - Home_and_Garden  (0)
     - Cooking  (0)
     - Tools  (0)
 - Humor  (0)
 - Notices  (0)
 - Observations  (1)
 - Oddities  (2)
 - Online_Marketing  (0)
     - Affiliates  (1)
     - Merchants  (1)
 - Policy  (3743)
 - Programming  (0)
     - Bookmarklets  (1)
     - Browsers  (1)
     - DHTML  (0)
     - Javascript  (3)
     - PHP  (0)
     - PayPal  (1)
     - Perl  (37)
          - blosxom  (0)
     - Unidata_Universe  (22)
 - Random_Advice  (1)
 - Reading  (0)
     - Books  (0)
     - Ebooks  (0)
     - Magazines  (0)
     - Online_Articles  (5)
 - Resume_or_CV  (1)
 - Reviews  (2)
 - Rhode_Island_USA  (0)
     - Providence  (1)
 - Shop  (0)
 - Sports  (0)
     - Football  (0)
          - Cowboys  (0)
          - Patriots  (0)
     - Futbol  (0)
          - The_Rest  (0)
          - USA  (0)
 - Technology  (1173)
 - Windows  (1)
 - Woodworking  (0)


Archives
 -2024  April  (109)
 -2024  March  (179)
 -2024  February  (168)
 -2024  January  (146)
 -2023  December  (140)
 -2023  November  (174)
 -2023  October  (156)
 -2023  September  (161)
 -2023  August  (49)
 -2023  July  (40)
 -2023  June  (44)
 -2023  May  (45)
 -2023  April  (45)
 -2023  March  (53)


My Sites

 - Millennium3Publishing.com

 - SponsorWorks.net

 - ListBug.com

 - TextEx.net

 - FindAdsHere.com

 - VisitLater.com