Proactive Computing | Optimizing IT for usability, performance and reliability since 1997

Category: #Riots

Auto Added by WPeMatico

Telegram took down ‘hundreds’ of calls for violence from public US channels

0a1059f0-ef1b-11e9-bbef-716b7a2e5cd0With just two days before Wednesday’s presidential inauguration, Telegram said it has spent much of the last two weeks monitoring the situation in the US and subsequently taking enforcement action. In a post to his public channel spotted by The Verge…

Source: https://www.engadget.com/telegram-us-calls-for-violence-230100510.html
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By:

Ocasio-Cortez: Facebook, Zuckerberg ‘bear partial responsibility’ for insurrection

ocasiocortezalexandria_120920gn3_lead.jp

Rep. Alexandria Ocasio-Cortez (D-N.Y.) on Friday condemned Facebook as well as co-founder and CEO Mark Zuckerberg for misinformation posted on the platform, arguing that both Zuckerberg and his company “bear partial…

Source: https://thehill.com/homenews/house/534585-ocasio-cortez-facebook-zuckerberg-partially-responsible-for-insurrection
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Celine Castronuovo

Jack Dorsey breaks his silence after Trump ban

50026d60-b9e0-11e9-beff-985d9d456e24Twitter CEO Jack Dorsey made his first public statements since the company permanently banned Donald Trump from its platform. In a series of tweets, Dorsey said he believed Twitter made the correct decision, but that “a ban is a failure of ours ultim…

Source: https://www.engadget.com/twitter-jack-dorsey-donald-trump-ban-005318790.html
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By:

Parler Users Breached Deep Inside U.S. Capitol Building, GPS Data Shows

c4wfqlhf91dp0pb1bfge.png

At least several users of the far-right social network Parler appear to be among the hoard of rioters that managed to penetrate deep inside the U.S. Capitol building and into areas normally restricted to the public, according to GPS metadata linked to videos posted to the platform the day of insurrection in Washington.

Read more…

Source: https://gizmodo.com/parler-users-breached-deep-inside-u-s-capitol-building-1846042905
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Dell Cameron and Dhruv Mehrotra

Facebook pauses political spending in wake of Capitol attack

facebooklogo_112819getty.jpg

Facebook is halting its political spending for at least the first quarter of 2021 in the wake of last week’s violent insurrection at the Capitol.”Following last week’s awful violence in D.C., we are pausing all of…

Source: https://thehill.com/policy/technology/533635-facebook-pauses-political-spending-in-wake-of-capitol-attack
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Chris Mills Rodrigo

Stolen computers are the least of the government’s security worries

GettyImages-1230453711.jpg?w=513

Reports that a laptop from House Speaker Nancy Pelosi’s office was stolen during the pro-Trump rioters’ sack of the Capitol building has some worried that the mob may have access to important, even classified information. Fortunately that’s not the case — even if this computer and others had any truly sensitive information, which is unlikely, like any corporate asset it can almost certainly be disabled remotely.

The cybersecurity threat in general from the riot is not as high as one might think, as we explained yesterday. Specific to stolen or otherwise compromised hardware, there are several facts to keep in mind.

In the first place, the offices of elected officials are in many ways already public spaces. These are historic buildings through which tours often go, in which meetings with foreign dignitaries and other politicians are held, and in which thousands of ordinary civil servants without any security clearance would normally be working shoulder-to-shoulder. The important work they do is largely legislative and administrative — largely public work, where the most sensitive information being exchanged is probably unannounced speeches and draft bills.

But recently, you may remember, most of these people were working from home. Of course during the major event of the joint session confirming the electors, there would be more people than normal. But this wasn’t an ordinary day at the office by a long shot — even before hundreds of radicalized partisans forcibly occupied the building. Chances are there wasn’t a lot of critical business being conducted on the desktops in these offices. Classified data lives in the access-controlled SCIF, not on random devices sitting in unsecured areas.

In fact, the laptop is reported by Reuters as having been part of a conference room’s dedicated hardware — this is the dusty old Inspiron that lives on the A/V table so you can put your PowerPoint on it, not Pelosi’s personal computer, let alone a hard line to top secret info.

Even if there was a question of unintended access, it should be noted that the federal government, as any large company might, has a normal IT department with a relatively modern provisioning structure. The Pelosi office laptop, like any other piece of hardware being used for official House and Senate business, is monitored by IT and should be able to be remotely disabled or wiped. The challenge for the department is figuring out which hardware does actually need to be handled that way — as was reported earlier, there was (understandably) no official plan for a violent takeover of the Capitol building.

In other words, it’s highly likely that the most that will result from the theft of government computers on Jan. 6 will be inconvenience or at most some embarrassment should some informal communications become public. Staffers do gossip and grouse, of course, on both back and official channels.

That said, the people who invaded these offices and stole that equipment — some on camera — are already being arrested and charged. Just because the theft doesn’t present a serious security threat doesn’t mean it wasn’t highly illegal in several different ways.

Any cybersecurity official will tell you that the greater threat by far is the extensive infiltration of government contractors and accounts through the SolarWinds breach. Those systems are packed with information that was never meant to be public and will likely provide fuel for credential-related attacks for years to come.

Note: Changes to the Full-Text RSS free service

Source: https://techcrunch.com/2021/01/08/stolen-computers-are-the-least-of-the-governments-security-worries/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Devin Coldewey