POPULARITY
Imaginez un journaliste américain qui découvre, en direct, les frappes secrètes de l'armée contre les Houthis… sur la messagerie Signal. La réalité a dépassé la fiction aux États-Unis. Des applications traquées ou infiltrées par la police comme récemment avec EncroChat : bienvenue dans un monde où la frontière entre cybersécurité et cybercriminalité se brouille. Derrière la promesse des conversations secrètes, se joue un débat brûlant : faut-il sacrifier le chiffrement pour plus de sécurité ?
Volgorde van de zaken in deze aflevering:(3:36) – Blinde loyaliteit bestraft: een advocaat verzweeg essentiële feiten in een vastgoedzaak en overtrad de waarheidsplicht. Het Hof legde een berisping op wegens het falen in zijn onafhankelijkheid als advocaat. Lees hier de gehele uitspraak.(07:27) – Schrapping na tekortschieten in zorgplicht: een advocaat maakte ernstige fouten in een nalatenschapszaak. De Raad gaf een schorsing, maar het Hof schrapte hem definitief. Lees hier de gehele uitspraak.(12:07) – EncroChat-berichten en beperkingen: een advocaat werd geschorst wegens vermeend lekken van vertrouwelijke info, maar het Hof vernietigde de maatregel wegens gebrek aan bewijs. Lees hier de gehele uitspraak.(22:07) – Waarschuwing na scherpe brief: een advocaat schreef een grievende brief in een Kifid-zaak en zou doelbewust onvolledige informatie hebben overgelegd. Het Hof matigde de berisping naar een waarschuwing. Lees hier de gehele uitspraak.(29:02) – Studiekostenbeding in strijd met regels: een patroon legde een stagiair onterecht een studiekostenbeding op. Het Hof veranderde een schorsing in een voorwaardelijke maatregel, waarbij er nog een andere zaak loopt met prejudiciële vragen. Lees hier de gehele uitspraak.…………………….. Experts: Robert Sanders en Tjitske CieremansPresentatie, montage en mastering: Hidde BruinsmaIllustratie: René van AsseltVragen, tips, opmerkingen? Mail ons: redactie@advocatenblad.nl Hosted on Acast. See acast.com/privacy for more information.
In this engaging episode, hosts Tom and Simon begin with light-hearted banter about their current locations—Simon in Singapore overlooking Marina Bay and Tom dealing with a grey afternoon in Scotland. The conversation takes a turn towards serious matters as they delve into the ever-growing problem of digital crime. They discuss the Pegasus spyware and emphasize the importance of basic online safety measures like two-step verification and VPNs. Simon suggests bringing in a tech expert to explain these concepts in layman's terms for their listeners.The duo then shifts their focus to historical assassinations, exploring the deaths of Martin Luther King Jr. and Robert F. Kennedy. They delve into the societal impact of these events, the subsequent conspiracy theories, and the importance of following evidence over speculation. Tom and Simon also touch on the Watts Riots of 1965, debating whether it should be termed a 'riot' or a 'rebellion,' and highlighting the role of community policing in preventing such occurrences.The conversation progresses to a cold case involving Innes Stewart, found dead in a London car park under suspicious circumstances, and the hosts express their skepticism about the official ruling of suicide. They then ponder the role of global law enforcement agencies like Interpol in combatting digital fraud and discuss the EncroChat case, which exposed a vast criminal network but also raised significant legal questions.Throughout the episode, Tom and Simon weave in anecdotes and personal reflections, offering a balanced mix of humor and serious analysis. They wrap up the discussion with a teaser about upcoming explorations of similar themes in future episodes.00:00 Greetings and Setting the Scene00:09 Living in Luxury: A Chat from Singapore01:11 Digital Crime and Online Safety03:51 The Importance of Cybersecurity Measures07:30 Assassination Decade: Martin Luther King Jr. and RFK09:51 Conspiracy Theories and Their Impact16:36 The Legacy of Martin Luther King Jr.17:38 The Assassination of Robert F. Kennedy20:25 The Impact of Personal Security21:52 Assassination and Its Aftermath22:01 The Mysterious Case of Innes Stewart25:50 Digital Age Challenges and Law Enforcement27:38 The Watts Rebellion: A Historical Perspective33:44 EncroChat: Unveiling the Dark Web36:54 Final Thoughts and Farewell Hosted on Acast. See acast.com/privacy for more information.
In this gripping episode of Crime Time Inc., we delve into the fascinating and complicated world of EncroChat—an encrypted communication network used by criminals worldwide. We uncover how this 'criminals only club' guaranteed anonymity and security with features like self-destructing messages and panic buttons. The platform's high membership fees created an exclusive environment for organized crime to thrive. However, in 2020, everything changed when authorities managed to hack into EncroChat by compromising its update server. This ingenious move allowed them access to messages, photos, locations, and more, exposing the inner workings of drug trafficking, money laundering, violence, and intimidation. The hack led to thousands of arrests and significant seizures across Europe, but it also raised numerous legal questions about privacy and the admissibility of the intercepted evidence. We explore the intricate legal battles that followed and the implications for future law enforcement tactics. Prominent cases, such as the downfall of the Hewton firm and individual players like Peter Moran, illustrate how the breach has reshaped the criminal landscape. Finally, we ponder the ethical dilemmas surrounding privacy, security, and the lengths we're willing to go to combat crime in an increasingly digital world. Tune in to hear more about this extraordinary case and its lasting impact on organized crime and legal systems.00:00 Introduction to EncroChat00:20 The Secret Network's Features01:33 The 2020 Hack02:20 Legal and Ethical Questions02:46 Revealing the Criminal World04:09 Law Enforcement's Response08:09 Privacy and Security Debate09:52 Ongoing Legal Battles10:31 Future Implications11:09 Conclusion and Upcoming Episodes Hosted on Acast. See acast.com/privacy for more information.
In this episode, Ken Macdonald KC and Tim Owen KC examine the powerful arguments for using telephone intercept evidence in UK criminal trials. Why are the security services so opposed to a reform that would obviously give a major boost to convicting terrorists and serious criminals, and why have successive governments failed to overcome this opposition? For context, Ken and Tim look at the 2020 joint French/Dutch police operation which led to the demise of EncroChat (the so-called “WhatsApp for professional criminals”) and the many successful prosecutions that followed in the UK and across Europe, as courts listened to criminals planning their crimes in real time. Virtually every other fair trial country relies heavily on intercept evidence to fight terrorism and organised crime. Why does the UK continue to stand against it?
In February, Canadian Paul Krusky was detained in France on drug and money laundering charges related to the encryption software EncroChat. Krusky's lawyer has told the Globe and Mail, “The story that was constructed by the police to get him in jail is cracking.” Oura's smart rings have become one of the most successful gadgets of 2024.
Newry millionaire money launderer ‘Mr-Fix-it' is now facing lengthy jail time. Rory Trainor was snared following a Europe-wide investigation into the EncroChat phone network. After spending almost 5 years fighting 39 charges he admitted guilt to drug and illegal cash charges, confessing to laundering almost £1.4 million. Sunday Life's Ciaran Barnes joins Ciarán Dunbar. Hosted on Acast. See acast.com/privacy for more information.
Chinese bedrijven moeten voorzichtig zijn met het kopen van Amerikaanse chips, omdat die "niet langer veilig" zijn. Dat zeggen vier grote Chinese branche-organisaties. Michiel Jurrjens vertelt erover in de Tech Update.De organisaties gaven geen details over waarom Amerikaanse chips onveilig of onbetrouwbaar zouden zijn. Het advies lijkt een reactie op de nieuwe exportrestricties voor de chipsector richting China, die de VS maandag aankondigde. Verder in de Tech Update: De Nederlandse en Franse autoriteiten hebben opnieuw een versleutelde communicatiedienst gekraakt waarmee criminelen zouden communiceren. De dienst, met de naam Matrix, zou de opvolger zijn van eerder gekraakte diensten als ANOM, Sky ECC en EncroChat. De politie heeft ruim 2,3 miljoen berichten weten te onderscheppen en enkele maanden mee kunnen lezen. See omnystudio.com/listener for privacy information.
Opsporingsdiensten rolden een nieuwe aanbieder van cryptotelefonie op, maar dat bracht weinig te weeg in het criminele milieu. In de Parool Misdaadpodcast leggen Paul Vugts en Wouter Laumans uit waarom criminelen steeds vaker mainstreamdiensten als Whatsapp en Telegram gebruiken om te communiceren. Dat het recente oprollen van de dienst Ghost geen opschudding teweeg bracht onder criminelen bevestigt volgens Laumans en Vugts dat de georganiseerde misdaad voor een belangrijk deel is afgestapt van versleutelde communicatiediensten die specifiek gericht zijn op criminelen. “Voorheen waanden criminelen op Sky ECC en Encrochat zich onbespied. Het was een makkelijke manier om vanuit het buitenland geweld aan te sturen. Na de ontmanteling van die pgp-servers is het geweld minder geworden,” zegt Laumans. Wat je nu ziet is dat ze veel meer gebruikmaken van reguliere diensten, zoals Signal, Telegram, Whatsapp en Snapchat. “Vroeger dachten ze als wolven tussen de wolven te moeten schuilen, maar nu schuilen ze tussen de schapen,” zegt Vugts. “Telegram heeft 700 gebruikers. Dat is voor opsporingsdiensten echt een speld in een hooiberg zoeken. En bovendien: de overheid kan niet zomaar alle berichten van iedereen doorzoeken.”Support the show: https://www.kiosk.nlSee omnystudio.com/listener for privacy information.
In this podcast I share some insights following my visit on 18 Sept to the Emergency Services and Tech Show at the NEC, Birmingham. Lots of tech, gadgets and equipment featured to support emergency crews including police officers and staff. The event also included CPD, data management tools and options, and ideas and options for mental health support. Robots and all sizes of drones were there too. What took my interest were a few of the facilitated talks on stage including ‘How law enforcement cracked Encrochat and the story 4 years on' and also ‘How to take a proactive, collaborative approach to tackling cyber defence' was a facilitated talk delivered by Pete O'Doherty, T/Commissioner of The City of London Police with audience Qs from a range of people. Lots of interesting insights as to the future approach to tech within policing! -------- For regular more in-depth content targeted for your ongoing police leadership CPD like this, or if you'd just like to support my work, please consider becoming a premium subscriber today for just £4.99 per month. https://podcasters.spotify.com/pod/show/ranksuccess/subscribe __________ About me and Rank Success: As a coach/mentor supporting police promotion candidates across the UK and beyond, I aim to provide valuable and meaningful insights to help you succeed in promotion; especially those aspiring to Sergeant, Inspector and Chief Inspector. I hope you find this podcast helpful leadership CPD. Please 'pass the ladder down' and share with colleagues to support their leadership development too. As always, I welcome your thoughts/feedback. For FREE support on your promotion journey to success, check out my other open-access podcasts, blogs and YouTube videos. If time is of the essence and you want comprehensive, structured information on promotion aligned to the CVF, my unique Digital Toolkits, CVF explainers and Masterclass super-briefing supports you throughout, whatever your force's competitive promotion process. FREE Blog: https://policepromotion.blog Premium eGuides, CVF deep-dive, & video Masterclass content: www.ranksuccess.co.uk YouTube: https://www.youtube.com/channel/UCRM4aUxiSEPzmslrur6KToQ _______ Consider becoming a premium podcast subscriber... REVIEWS: "Gold dust!", "Really enjoyed", "Reassuring", "Easy listening", "Simplifies things", "Paid off". WHY SUBSCRIBE? BONUS subscriber-only regular podcasts, EXCLUSIVE access to the BEST of my archives, FIRST for new episodes, supports my free content, 25% DISCOUNT off premium toolkits upon request. https://podcasters.spotify.com/pod/show/ranksuccess/subscribe
Kinahan Cartel lieutenants Liam Byrne and Thomas ‘Bomber' Kavanagh are facing a lengthy trial in the UK. They are accused of an alleged plot to get a reduced sentence for Kavanagh by hiding a stash of weapons and later revealing their whereabouts to the police.The trial involves intercepted Encrochat messages, and there could be a legal challenge regarding their admissibility in court. French police hacked the Encrochat messaging system used by suspected crime syndicates in 2020 and shared their intelligence with the UK's National Crime Agency (NCA).Both Byrne and Kavanagh have denied being part of the conspiracy to acquire guns and ammunition. Kavanagh is already serving a 21-year sentence for organizing cocaine and cannabis shipments worth €36 million, while Byrne was charged in relation to the plot after being extradited from Spain last December. (commercial at 7:09)to contact me:bobbycapucci@protonmail.comsource:Kinahan Cartel pair Liam Byrne and Thomas ‘Bomber' Kavanagh could launch Encrochat legal challenge - SundayWorld.com
Kinahan Cartel lieutenants Liam Byrne and Thomas ‘Bomber' Kavanagh are facing a lengthy trial in the UK. They are accused of an alleged plot to get a reduced sentence for Kavanagh by hiding a stash of weapons and later revealing their whereabouts to the police.The trial involves intercepted Encrochat messages, and there could be a legal challenge regarding their admissibility in court. French police hacked the Encrochat messaging system used by suspected crime syndicates in 2020 and shared their intelligence with the UK's National Crime Agency (NCA).Both Byrne and Kavanagh have denied being part of the conspiracy to acquire guns and ammunition. Kavanagh is already serving a 21-year sentence for organizing cocaine and cannabis shipments worth €36 million, while Byrne was charged in relation to the plot after being extradited from Spain last December. (commercial at 7:09)to contact me:bobbycapucci@protonmail.comsource:Kinahan Cartel pair Liam Byrne and Thomas ‘Bomber' Kavanagh could launch Encrochat legal challenge - SundayWorld.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.
Kinahan Cartel lieutenants Liam Byrne and Thomas ‘Bomber' Kavanagh are facing a lengthy trial in the UK. They are accused of an alleged plot to get a reduced sentence for Kavanagh by hiding a stash of weapons and later revealing their whereabouts to the police.The trial involves intercepted Encrochat messages, and there could be a legal challenge regarding their admissibility in court. French police hacked the Encrochat messaging system used by suspected crime syndicates in 2020 and shared their intelligence with the UK's National Crime Agency (NCA).Both Byrne and Kavanagh have denied being part of the conspiracy to acquire guns and ammunition. Kavanagh is already serving a 21-year sentence for organizing cocaine and cannabis shipments worth €36 million, while Byrne was charged in relation to the plot after being extradited from Spain last December. (commercial at 7:09)to contact me:bobbycapucci@protonmail.comsource:Kinahan Cartel pair Liam Byrne and Thomas ‘Bomber' Kavanagh could launch Encrochat legal challenge - SundayWorld.com
Paul Krusky is an unassuming tech nerd whose company, EncroChat, was once just one of the world's many encrypted phone services. Now, he is in a French prison as police accuse him of building a digital den for Europe's drug dealers.Globe reporters Joe Castaldo and Alexandra Posadzki explain how EncroChat wound up at the centre of thousands of criminal arrests in Europe and what we know about Paul Krusky's past and the charges against him.Questions? Comments? Ideas? E-mail us at thedecibel@globeandmail.com
Paris Marx is joined by Joseph Cox to discuss how the FBI created an encrypted phone company called Anom to read criminals' messages and eventually carry out the largest international sting operation by law enforcement.Joseph Cox is the author of Dark Wire: The Incredible True Story of the Largest Sting Operation Ever and the host of the 404 Media Podcast.Tech Won't Save Us offers a critical perspective on tech, its worldview, and wider society with the goal of inspiring people to demand better tech and a better world. Support the show on Patreon.The podcast is made in partnership with The Nation. Production is by Eric Wickham. Transcripts are by Brigitte Pawliw-Fry.Also mentioned in this episode:Read an excerpt of Dark Wire at Wired.Joseph wrote about the revelation that Lithuania hosted the Anom interception server and provided the intercepted messages to the FBI.Support the Show.
International criminal organizations are more concerned about message security than the average citizen. The end-to-end encryption of WhatsApp or Signal is great, but drug traffickers are looking for a little extra. Enter services like Anom, EncroChat, Sky, and Phantom Secure— discrete messaging services that charged big bucks and promised criminals a chat experience free from the prying eyes of law enforcement. But the cops always find a way. And one of those services was actually purpose built by the FBI to act as a spying tool on the world's criminals.In Dark Wire, investigative journalist Joseph Cox tells the story of how the FBI built and maintained a phone service just for criminals. He's on Angry Plant today to tell us all about it.Buy DARK WIRE here.You could have heard an early, and commercial free, version of this episode. Sign up for the Angry Planet newsletter to get started.Support this show http://supporter.acast.com/warcollege. Hosted on Acast. See acast.com/privacy for more information.
I maj 2026 kommer nästan två tredjedelar av alla som dömdes efter avlyssningen av Encrochat vara ute på gatan igen – och en tredjedel är redan frisläppta. Det visar Kvartals granskning av polisens interna dokumentation. Nu varnar flera tunga bedömare för att Sveriges problem med gängbrottslighet riskerar att förvärras. – Analyserna är tyvärr väldigt oroväckande, säger Jale Poljarevius, underrättelsechef i polisregion Mitt. Av Petter Ljunggren och Johan Frisk Inläsare: Magnus Thorén
Ever since a French police operation in 2020 which compromised the highly encrypted telecommunications network, EncroChat, organised crime bosses across Europe have been looking over their shoulders. Law enforcement agencies were granted access to a treasure trove of evidence – hundreds of millions of messages – and it has led to arrests and convictions on an unprecedented scale.Now, the BBC has gained access to 10,000 messages which contributed to the downfall of one of the UK's most feared families. On today's episode, Katya speaks to investigative reporter Bronagh Munro, who reveals how this secretive organised crime group were stopped, as they sought revenge for a daring challenge to their authority.Listeners in the UK can watch the full BBC Panorama episode ‘The Crime Bosses who Terrorised a City' here: https://www.bbc.co.uk/iplayer/episode/m001ysrj/panorama-the-crime-bosses-who-terrorised-a-city Or for more on EncroChat, search for the six-part BBC series ‘Gangster Presents... Catching the Kingpins' wherever you get your podcasts.The Global Story brings you trusted insights from BBC journalists worldwide. We're keen to hear from you, wherever you are in the world. We want your ideas, stories and experiences to help us understand and tell The Global Story. Email us at theglobalstory@bbc.com You can also message us or leave a voice note via WhatsApp on +44 330 123 9480. #TheGlobalStory.The Global Story is part of the BBC News Podcasts family. The team that makes The Global Story also makes several other podcasts, such as Americast and Ukrainecast, which cover US news and the war in Ukraine. If you enjoy The Global Story, then we think that you will enjoy some of our other podcasts too. To find them, simply search on your favourite podcast app.This episode was made by Laurie Kalus and Alix Pickles. The technical producers were Hannah Montgomery and Gareth Jones. The assistant editor is Sergi Forcada Freixas and the senior news editor is Sam Bonham.
Bauer, Max www.deutschlandfunk.de, Das war der Tag
Michael O'Loughlin was arrested in Co Down in 2020 as part of a Europe-wide crackdown on organised crime. He was one of the first criminals arrested in the Encrochat hacking scandal. But why is the career criminal now pleading guilty to the charges against him? Host: Fionnán Sheahan, Guest: Allison Morris Hosted on Acast. See acast.com/privacy for more information.
Galwayman Michael O'Loughlin was arrested in Co Down in 2020 as part of a Europe-wide crackdown on organised crime. He was one of the first criminals arrested in the Encrochat hacking scandal. But why is the career criminal now pleading guilty to the charges against him? Host: Fionnán Sheahan, Guest: Allison Morris Indo Daily: Head to www.mypodcastfeedback.com, pop in code INDO and fill out the short survey to be in with the chance of winning a €500 OneforAll voucher.See omnystudio.com/listener for privacy information.
En svensk pensionär ska korsa Atlanten med segelbåt. Målet är att frakta hem hundratals kilo kokain. P3 Krim den här veckan om Operation Moby Dick och kokainet från kartellen. Lyssna på alla avsnitt i Sveriges Radio Play. Vi börjar den här historien hösten 2019. Då köper två svenska män, ”Kaptenen” och ”Styrmannen”, en stor segelbåt i Turkiet. De betalar kontant och båten får namnet Moby Dick. ”Kaptenen och Styrmannen får ett tydligt uppdrag och det är att ta sig till Brasilien och där skapa kontakt med företrädare för den här drogkartellen, som ska förse dem med narkotika”, säger polisen Åsa som, för att skydda sin identitet, bara medverkar med förnamn.De två svenskarna ska alltså segla över Atlanten till Brasilien och köpa kokain. Enligt polis och åklagare handlar det om 290 kilo. Samtidigt finns männens kompanjoner med i bakgrunden och ger instruktioner via krypterade chattar.När svenskarna har hämtat kokainet i Brasilien ska de lasta det på segelbåten och segla tillbaka till Europa. En stor del av bevisningen i målet bygger på krypterade chattar som blev tillgängliga när fransk polis knäckte kommunikationstjänsten Encrochat sommaren 2020. I december dömdes flera av de inblandade, mot sitt nekande, till fleråriga fängelsestraff. I mitten av februari ska hovrätten pröva fallet.Programledare: Linus Lindahl och Mariela Quintana MelinProducent: Jenny HellströmReporter: David OhlssonLjudtekniker: Johan HörnqvistKontakt: p3krim@sverigesradio.seTipstelefon: 0734-61 29 15 (samma på Signal)
Nick Harvey, a former Detective Inspector in the Metropolitan Police, discusses his transition from law enforcement to his current role as a Customer Success Manager at Cellebrite. He describes his experience in tackling county lines, a form of organized crime in the UK where drug dealers set up operations in smaller towns and cities to expand their business. He also discusses the role of mobile phones in criminal investigations and how data-driven approaches can expedite the justice process. Nick goes on to highlight the challenges of explaining digital evidence to judges and juries and the potential impact of artificial intelligence in forensic investigations. He also emphasizes the importance of communication between digital forensics units and investigators and the need for tools that can handle large data sets and provide actionable insights. Nick shares his thoughts on the impact of regulations on forensic processes and the need for a balance between oversight and efficiency. He concludes by advising investigators to be open to new approaches and to focus on the objectives of their investigations. 00:00 – Introduction to Nick Harvey, Customer Success Manager at Cellebrite 02:40 – Data driven approach to tackling county lines crimes 07:50 – Changing landscape of mobile forensics 11:45 – Operation Venetic and EncroChat crime 15:20 – Ensuring admissibility of evidence 19:50 – Machine learning in crimes and crime detection 24:00 – Machine learning in Cellebrite's tools 27:10 – Working at Cellebrite 31:30 – Managing large volumes of data 34:40 – Training tool users and empowering investigators to get the most from data 36:00 – Regulations and compliance frameworks 39:55 – Advice for digital investigators
Lauren Layfield introduces Catching the Kingpins on the podcast recommendation podcast - Your Next Podcast. A 6-part true crime podcast documenting the biggest organised crime bust in British policing history. It happens in 2020 when police in France penetrate an encrypted phone network called EncroChat. According to police, the phones were used exclusively by criminals. For over two months, police forces across Europe were reading the secret communications of major league criminal networks. The Metropolitan Police, working with the National Crime Agency and other forces, used this information to uncover the workings of organised crime groups. “It was like being in a room with them and they are talking freely, and they don't see you there,” says DCI Driss Hayoukane, the Senior Investigating Officer who led the Met's EncroChat operation. Police went public about the EncroChat hack in July 2020. This is the first time that the inside story of some of the Met's biggest EncroChat cases has been told to a broadcaster. Talking exclusively to BBC Sounds, police officers reveal how they used the gangsters' messages to uncover arms dealing and expose murder plots as well as major drug trafficking and money laundering operations.You can Follow Catching the Kingpins and listen to all of the episodes on BBC Sounds, Apple Podcasts, Spotify, Amazon Music or wherever you get your podcasts.
Katarina Stensson är partiledare för Piratpartiet sedan 2019, civilingenjör och lärare. Frågor om yttrandefrihet, integritet och delandet av kunskap och kultur har blivit viktigare än någonsin för människor runtom i världen och i Europa. Med Chat Control, som kränker FN:s mänskliga rättigheter, och övervakningsoperationerna mot krypterade apparna EncroChat, Anom och Sky ECC så har även svenskar blivit direkt påverkade av internationella myndigheter. Trots det går samtliga riksdagspartier mer åt det mer auktoritära och integritetskränkande hållet, både retoriskt och politikiskt. Så hur viktigt är integritet och yttrandefrihetsfrågor för svenskar egentligen? Och hur ska Piratpartiet sätta frågorna på agendan inför EU-valet 2024 och nästa riksdagsval 2026? Katarina pratar om piratrörelsens början, upphovsrättsfrågorna som kom att definiera partiet efter millennieskiftet och de stora framgångarna runtom i Europa som b.la. har lett till ett politiskt och kulturellt paradigmskifte på Island. Bör och kan Sverige göra en liknande resa? Vi pratar om att stärka individens egenmakt, frihet och skapa ett mer direkt och vardagligt deltagande i den demokratiska processen i Sverige. Och hur har Vänsterpartiet kommit att bli det mest frihetliga partiet i riksdagen? Välkommen till det mest piratiga avsnittet i loungens historia med Piratpartiets Katarina Stensson! Det här är inte hela avsnittet. Vill du få tillgång till hela avsnittet, före alla andra och helt reklamfritt, behöver du bli betalande prenumerant på Patreon: https://www.patreon.com/taimaz ❤️ Tack för ditt stöd! ❤️ Du kan också ge stöd på Swish: 0761 401 401 Mer info på https://www.loungepodden.se Följ Taimaz Instagram: https://www.instagram.com/taimazghaffari/ Twitter: https://twitter.com/TaimazGhaffari Linkedin: https://se.linkedin.com/in/taimaz-ghaffari-22789b21 Youtube: https://www.youtube.com/channel/UCLKiCeQSPOfRmhXA_1m9M2A Allt om CHAT CONTROL med Karl Emil Nikka: https://www.loungepodden.se/podcast/205-chat-control-ashton-kutcher-ylva-johansson-varldens-storsta-massovervakning-karl-emil-nikka/ Allt om EncroChat, Anom och Sky ECC operationerna med advokat Thomas Olsson: https://www.loungepodden.se/podcast/196-thomas-olsson-forsvarsadvokat-starka-intressen-vill-lagga-locket-pa/ Grävreportagen om Ylva Johansson och Chat Control https://balkaninsight.com/2023/09/25/who-benefits-inside-the-eus-fight-over-scanning-for-child-sex-content/ https://balkaninsight.com/2023/09/29/europol-sought-unlimited-data-access-in-online-child-sexual-abuse-regulation/ Amerikanska kongressförhör 1 om myndigheter och regeringens påverkan på Sociala medie-bolagen: https://www.c-span.org/video/?526578-1/hearing-twitter-documents-content-moderation-decisions Amerikanska kongressförhör 2 om myndigheter och regeringens påverkan på Sociala medie-bolagen: https://judiciary.house.gov/committee-activity/hearings/hearing-weaponization-federal-government-4
In this podcast Adam Boileau and Tom Uren talk about Microsoft's Secure Future Initiative. It's been likened to the company's 2002 Trustworthy Computing initiative, but compared to that it is a massive disappointment. They also discuss how the European-wide police operation against EncroChat unravelled when a UK intelligence analyst warned her friends with criminal links that the service had been compromised.
När den krypterade chatappen ”Encrochat” knäcktes öppnade sig en hel värld för poliser och åklagare. Helt plötsligt gick det att läsa kriminellas mordbeställningar och diskussioner om knarksmuggling. Journalisten Diamant Salihu berättar i sin bok När ingen lyssnar om vad poliserna upptäckte och hur de använde sig av informationen. Han samtalar med Adam Cwejman om hur den organiserade brottsligheten i Sverige kunnat växa och bli så brutal.
Japón suspende bus autónomo rural / Vacuna biotech contra la cocaína / El ataque de Daguestán podría ser el final de Telegram / Ok judicial a los hackeos de Encrochat Esta semana no tengo patrocinador. Apúntate al Patreon o algo. Yo que sé. Japón suspende bus autónomo rural / Vacuna biotech contra la cocaína / El ataque de Daguestán podría ser el final de Telegram / Ok judicial a los hackeos de Encrochat
Scientists claim to have developed a simple reliable test that can determine whether there is, or was, life on other planets.More than 400 criminals have been jailed in an “unprecedented" operation targeting the encrypted messaging platform EncroChat.Deepfakes of Sir Keir Starmer released during the Labour Party conference highlight dangers of technology when it comes to politics. Also in this episode:Study reveals gingers have been around for 10 million yearsEdinburgh to host supercomputer system that may advance medicine, AI and energyScientists find a sixth basic taste detected by the tongueBiggest ever solar storm identified using ancient tree ringsWhy everyone seems to be entering ‘monk mode' Hosted on Acast. See acast.com/privacy for more information.
This week Aaran Leyland subs in to discuss: Cold Fusion Flaw, EncroChat, sneaky Amazon and Google, Spoofing Apple devices, Telsa data breach, Space and Jason Wood on this episode of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/swn-320
Cold Fusion Flaw, EncroChat, sneaky Amazon and Google, Spoofing Apple devices, Telsa data breach, Space and Jason Wood on this episode of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-320
This week Aaran Leyland subs in to discuss: Cold Fusion Flaw, EncroChat, sneaky Amazon and Google, Spoofing Apple devices, Telsa data breach, Space and Jason Wood on this episode of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/swn-320
Cold Fusion Flaw, EncroChat, sneaky Amazon and Google, Spoofing Apple devices, Telsa data breach, Space and Jason Wood on this episode of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-320
ANOM, en app som skapades 2018 i hemlighet av FBI, massövervakade miljontals meddelanden från tusentals svenska medborgare i Operation Trojan Shield. Ett par år senare avlyssnades över 100 miljoner meddelanden, hundratusentals bilder och 60 000 människor genom kommunikationstjänsten EncroChat. I samma veva avlyssnades den tredje kommunikationstjänsten Sky ECC i en massövervakning som har samlat så många skickade meddelanden, video, bilder och dokument mellan medborgare i Sverige och Europa att myndighetspersonal i hela EU inte kommer hinna undersöka materialet under en hel livstid. Operationerna har nästan uteslutande beskrivits som framgångsrika kampanjer mot brottsligheten i Europa. Men hur har allting gått till när enskilda myndighetspersoner i Sverige har gett främmande stater fria händer att läsa svenska medborgares kommunikation? Var det lagligt? Har regler kringgåtts? Hur påverkar det oskyldiga människors integritet? Vilka är dom som har övervakats men inte åtalats? Har skyddade yrkesgrupper som journalister eller poltiker varit del av massavlyssningen? Och varför har operationerna inte granskats trots kritik från sakkunniga experter? Har det handlat om pragmatisk, inkompetens eller är andra makter i spel? Thomas har en uppfattning att det finns starka intressen som helst lägger locket på. Thomas Olsson är en av Sveriges bästa försvarsadvokater och har haft några av landets mest kända fall senaste 30 åren som Thomas Quick, Al-Barakat, Fallet Kevin och Martin Schibbye & Johan Perssons i Etiopien. Thomas ingår i ett nätverk av europeiska advokater som kritiserat och undersökt lagligheten i operationerna. Han gästar loungen för att prata ingående om det och den missinformation som florerat i media kring tillvägagångsätten. Just nu diskuteras också "Chat Control", ett lagförslag i Europaparlamentet, som kan möjliggöra den största massövervakningen någonsin på 500 miljoner europeiska medborgare. Om lagen vinner lagakraft skulle det innebära ett paradigmskifte i hur europeiska länder förhåller sig till människors personliga integritet och fri- och rättigheter på internet. Det väcker ytterligare frågor. Hur ska svenskar förhålla sig till detta? Hur påverkar det vanliga medborgares yttrande- och åsiktsfrihet? Riskerar det att öka journalisters, politikers, NGO:s, advokaters och forskares nivå av självcensur? Ett otroligt intressant samtal med en av Sveriges vassaste advokater om ett ämne som blir allt viktigare i vanliga människors liv. Nu när meddelandetjänster, sociala medier, internet- och molnlagring, mobilen och AI blivit en oundviklig del av allas vardag. Sprida gärna avsnittet okrypterat och okontrollerat, till vänner familj och okända, på alla sociala medier och meddelandetjänster du kan hitta. Det här är inte hela avsnittet. Vill du få tillgång till hela avsnittet, före alla andra och helt reklamfritt, behöver du bli betalande prenumerant på Patreon: https://www.patreon.com/taimaz ❤️ Tack för ditt stöd! ❤️ Du kan också ge stöd på Swish: 0761 401 401 Mer info på https://www.loungepodden.se Följ Taimaz Instagram: https://www.instagram.com/taimazghaffari/ Linkedin: https://se.linkedin.com/in/taimaz-ghaffari-22789b21 Youtube: https://www.youtube.com/channel/UCLKiCeQSPOfRmhXA_1m9M2A
On this week's show Patrick Gray and Adam Boileau discuss the week's security news. They cover: The SEC is targeting SolarWinds executives UK to make banks liable for fraud NSA issues advice on UEFI trojan Microsoft blocks 100+ dodgy drivers The US IC knew what Prihozhin was up to. But what FSB doing? Much, much more This week's show is brought to you by Netwrix. Martin Cannard, Netwrix's VP of Product Strategy, is this week's sponsor guest. He talks about why zero standing privilege is a worthy goal. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes SEC notifies SolarWinds CISO and CFO of possible action in cyber investigation | Cybersecurity Dive While Australian banks refuse most scam victims refunds, the UK is making them mandatory - ABC News New law could allow GCHQ to monitor UK internet logs in real-time to tackle fraud Federal incentives could help utilities overcome major cybersecurity hurdle: money | CyberScoop Major Japanese port suspends operation following ransomware attack Petro-Canada reports service restoration after suspected Suncor breach | Cybersecurity Dive Chinese state-backed hackers accidentally infected a European hospital with malware Hackers exploit gaping Windows loophole to give their malware kernel access | Ars Technica 336,000 servers remain unpatched against critical Fortigate vulnerability | Ars Technica CISA says latest VMware analytics bug being exploited MOVEit vulnerability snags almost 200 victims, more expected | Cybersecurity Dive Actively exploited vulnerability threatens hundreds of solar power stations | Ars Technica U.S. intelligence learned in mid-June Prigozhin was plotting uprising - The Washington Post Russian election-meddling ‘troll factory' reportedly shut down after Wagner revolt Russian telecom confirms hack after group backing Wagner boasted about an attack | CyberScoop Hackers claim to take down Russian satellite communications provider Russian railway site allegedly taken down by Ukrainian hackers Several US states investigating ‘SiegedSec' hacking campaign Hacking crew targeting states over transition bans claims cyberattack hitting global satellite systems | CyberScoop Hacktivists steal government files from Texas city Fort Worth | TechCrunch Belarusian hacktivists сlaim to breach country's leading state university British prosecutors say teen Lapsus$ member was behind hacks on Uber, Rockstar Silk Road's Second-in-Command, Variety Jones, Gets 20 Years in Prison | WIRED Russian cyber expert arrested in Kazakhstan, triggering a showdown between US and Moscow More than 6,500 arrested since French and Dutch police's EncroChat hack BreachForums seized by FBI three months after arrest of alleged admin BreachForums replacement emerges as robust forum for criminal hackers to trade their spoils | CyberScoop Genesis Market gang tries to sell platform after FBI disruption Hackers using TrueBot malware for phishing attacks in US, Canada, officials warn | Cybersecurity Dive CSI_BlackLotus_Mitigation_Guide.PDF Hacks targeting British exam boards raise fears of students cheating More than $125 million taken from crypto platform Multichain Twitter's chaotic weekend of outages and rate limits leaves more questions than answers Mastodon fixes critical “TootRoot” vulnerability allowing node hijacking | Ars Technica
On this week's show Patrick Gray and Adam Boileau discuss the week's security news. They cover: The SEC is targeting SolarWinds executives UK to make banks liable for fraud NSA issues advice on UEFI trojan Microsoft blocks 100+ dodgy drivers The US IC knew what Prihozhin was up to. But what FSB doing? Much, much more This week's show is brought to you by Netwrix. Martin Cannard, Netwrix's VP of Product Strategy, is this week's sponsor guest. He talks about why zero standing privilege is a worthy goal. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes SEC notifies SolarWinds CISO and CFO of possible action in cyber investigation | Cybersecurity Dive While Australian banks refuse most scam victims refunds, the UK is making them mandatory - ABC News New law could allow GCHQ to monitor UK internet logs in real-time to tackle fraud Federal incentives could help utilities overcome major cybersecurity hurdle: money | CyberScoop Major Japanese port suspends operation following ransomware attack Petro-Canada reports service restoration after suspected Suncor breach | Cybersecurity Dive Chinese state-backed hackers accidentally infected a European hospital with malware Hackers exploit gaping Windows loophole to give their malware kernel access | Ars Technica 336,000 servers remain unpatched against critical Fortigate vulnerability | Ars Technica CISA says latest VMware analytics bug being exploited MOVEit vulnerability snags almost 200 victims, more expected | Cybersecurity Dive Actively exploited vulnerability threatens hundreds of solar power stations | Ars Technica U.S. intelligence learned in mid-June Prigozhin was plotting uprising - The Washington Post Russian election-meddling ‘troll factory' reportedly shut down after Wagner revolt Russian telecom confirms hack after group backing Wagner boasted about an attack | CyberScoop Hackers claim to take down Russian satellite communications provider Russian railway site allegedly taken down by Ukrainian hackers Several US states investigating ‘SiegedSec' hacking campaign Hacking crew targeting states over transition bans claims cyberattack hitting global satellite systems | CyberScoop Hacktivists steal government files from Texas city Fort Worth | TechCrunch Belarusian hacktivists сlaim to breach country's leading state university British prosecutors say teen Lapsus$ member was behind hacks on Uber, Rockstar Silk Road's Second-in-Command, Variety Jones, Gets 20 Years in Prison | WIRED Russian cyber expert arrested in Kazakhstan, triggering a showdown between US and Moscow More than 6,500 arrested since French and Dutch police's EncroChat hack BreachForums seized by FBI three months after arrest of alleged admin BreachForums replacement emerges as robust forum for criminal hackers to trade their spoils | CyberScoop Genesis Market gang tries to sell platform after FBI disruption Hackers using TrueBot malware for phishing attacks in US, Canada, officials warn | Cybersecurity Dive CSI_BlackLotus_Mitigation_Guide.PDF Hacks targeting British exam boards raise fears of students cheating More than $125 million taken from crypto platform Multichain Twitter's chaotic weekend of outages and rate limits leaves more questions than answers Mastodon fixes critical “TootRoot” vulnerability allowing node hijacking | Ars Technica
Thanks to today's episode sponsor, AppOmni Over provisioned users could expose your organization's most sensitive data. Just a single attack on one of those users may compromise your entire SaaS estate. With AppOmni's identity and threat detection capabilities, you can detect and respond to suspicious activities within your SaaS environment. Gain visibility into over provisioned users, the SaaS data they have access to, and receive guided remediation. Get started at AppOmni.com. For the stories behind the headlines, visit CISOseries.com.
Welcome to Cyber Briefing, the newsletter that informs you about the latest cybersecurity advisories, alerts, incidents and news every weekday.
In today's podcast we cover four crucial cyber and technology topics, including: 1. Microsoft outage leaves many without email access 2. Europol highlights 2020 operation netting 6000+ arrests 3. Latitude being sued after data breach for failure to secure 4. Awareness, criticality of undersea cables increases risk I'd love feedback, feel free to send your comments and feedback to | cyberandtechwithmike@gmail.com
Ciaran Bradley speaks to Michael O'Toole about a busy week reporting on Irish crime. We look at the fallout from the arrest of the Kinahan cartel's Liam Byrne, updates on the murder of Catherine Henry, the break-ins by a teenager at Dáil Éireann and the role of encrochat. Shattered Lives is produced for Reach Ireland by Ciaran Bradley. Learn more about your ad choices. Visit megaphone.fm/adchoices
On this week's show Patrick Gray and Adam Boileau discuss the week's security news. They cover: Wazawaka charged, sanctioned PlugwalkJoe extradited, pleads guilty BlackBerry thinks Cuba ransomware is a front for Russian intelligence Anonymous Sudan pops up in Israel Microsoft's Outlook patch fail Much, much more This week's show is brought to you by Bloodhound Enterprise. Andy Robbins is this week's sponsor guest. He talks about how graph theory could help us to uncover more lolbins. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes Alleged Babuk ransomware gang leader ‘Wazawaka' indicted, sanctioned by US Who is the Network Access Broker ‘Wazawaka?' – Krebs on Security British man involved in Twitter hack extradited to US, pleads guilty to numerous cybercrimes Cybercriminals who targeted Ukraine are actually Russian government hackers, researchers say | TechCrunch Slapdash attempt to hack rocket sirens may be cause for serious alarm about Iran | The Times of Israel Twitter's Encrypted DMs Are Deeply Inferior to Signal and WhatsApp | WIRED Twitter under fire for restricting content before Turkish presidential election - CBS News Three opposition media outlets hit by cyber attack Patrick Gray on Twitter: "https://t.co/n5b7wPjI6Y https://t.co/UmDbHbhEcS" / Twitter (1) Patrick Gray on Twitter: "Switched to a domain validated username at the other place. Very easy. https://t.co/U46zABPnJl" / Twitter Emerging ransomware group quickly hits 4 critical infrastructure providers | Cybersecurity Dive A ransomware source code leak spawned at least 10 ‘Babuk' imitators, researchers say Philadelphia Inquirer unable to go to print due to ‘cyber incident' Hackers attempt to extort Dragos and its executives in suspected ransomware attempt | CyberScoop Dallas says it 'will likely take weeks to get back to full functionality' after ransomware attack Swiss tech giant ABB confirms ‘IT security incident' CISA: Bl00dy Ransomware Gang using printer vulnerability to attack schools Capita says responding to ransomware attack will cost up to £20 million National Gallery of Canada recovering from ransomware incident Yum Brands faces class action suits from employees after ransomware attack | Cybersecurity Dive Knocking down Hive: How the FBI ran its own ransomware decryption operation Leak of MSI UEFI signing keys stokes fears of “doomsday” supply chain attack | Ars Technica FBI nukes Russian Snake data theft malware with self-destruct command The FBI's New Malware Eradication Service Is on Thin Legal Ice Cisco warns of new ‘Greatness' phishing-as-a-service tool seen in the wild VMware's ‘target-rich environment' is growing more volatile, CrowdStrike warns | Cybersecurity Dive UK's National Crime Agency wins major legal challenge over Encrochat hack Inside the Italian Mafia's Encrypted Phone of Choice Microsoft releases fix for patched Outlook issue exploited by Russian hackers Scammer Made Thousands Selling 'Leaked' Frank Ocean Tracks That Were Fake, AI-Generated
On this week's show Patrick Gray and Adam Boileau discuss the week's security news. They cover: Wazawaka charged, sanctioned PlugwalkJoe extradited, pleads guilty BlackBerry thinks Cuba ransomware is a front for Russian intelligence Anonymous Sudan pops up in Israel Microsoft's Outlook patch fail Much, much more This week's show is brought to you by Bloodhound Enterprise. Andy Robbins is this week's sponsor guest. He talks about how graph theory could help us to uncover more lolbins. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes Alleged Babuk ransomware gang leader ‘Wazawaka' indicted, sanctioned by US Who is the Network Access Broker ‘Wazawaka?' – Krebs on Security British man involved in Twitter hack extradited to US, pleads guilty to numerous cybercrimes Cybercriminals who targeted Ukraine are actually Russian government hackers, researchers say | TechCrunch Slapdash attempt to hack rocket sirens may be cause for serious alarm about Iran | The Times of Israel Twitter's Encrypted DMs Are Deeply Inferior to Signal and WhatsApp | WIRED Twitter under fire for restricting content before Turkish presidential election - CBS News Three opposition media outlets hit by cyber attack Patrick Gray on Twitter: "https://t.co/n5b7wPjI6Y https://t.co/UmDbHbhEcS" / Twitter (1) Patrick Gray on Twitter: "Switched to a domain validated username at the other place. Very easy. https://t.co/U46zABPnJl" / Twitter Emerging ransomware group quickly hits 4 critical infrastructure providers | Cybersecurity Dive A ransomware source code leak spawned at least 10 ‘Babuk' imitators, researchers say Philadelphia Inquirer unable to go to print due to ‘cyber incident' Hackers attempt to extort Dragos and its executives in suspected ransomware attempt | CyberScoop Dallas says it 'will likely take weeks to get back to full functionality' after ransomware attack Swiss tech giant ABB confirms ‘IT security incident' CISA: Bl00dy Ransomware Gang using printer vulnerability to attack schools Capita says responding to ransomware attack will cost up to £20 million National Gallery of Canada recovering from ransomware incident Yum Brands faces class action suits from employees after ransomware attack | Cybersecurity Dive Knocking down Hive: How the FBI ran its own ransomware decryption operation Leak of MSI UEFI signing keys stokes fears of “doomsday” supply chain attack | Ars Technica FBI nukes Russian Snake data theft malware with self-destruct command The FBI's New Malware Eradication Service Is on Thin Legal Ice Cisco warns of new ‘Greatness' phishing-as-a-service tool seen in the wild VMware's ‘target-rich environment' is growing more volatile, CrowdStrike warns | Cybersecurity Dive UK's National Crime Agency wins major legal challenge over Encrochat hack Inside the Italian Mafia's Encrypted Phone of Choice Microsoft releases fix for patched Outlook issue exploited by Russian hackers Scammer Made Thousands Selling 'Leaked' Frank Ocean Tracks That Were Fake, AI-Generated
Maury Shenk opens this episode with an exploration of three efforts to overcome notable gaps in the performance of large language AI models. OpenAI has developed a tool meant to address the models' lack of explainability. It uses, naturally, another large language model to identify what makes individual neurons fire the way they do. Maury is skeptical that this is a path forward, but it's nice to see someone trying. The other effort, Anthropic's creation of an explicit “constitution” of rules for its models, is more familiar and perhaps more likely to succeed. We also look at the use of “open source” principles to overcome the massive cost of developing new models and then training them. That has proved to be a surprisingly successful fast-follower strategy thanks to a few publicly available models and datasets. The question is whether those resources will continue to be available as competition heats up. The European Union has to hope that open source will succeed, because the entire continent is a desert when it comes to big institutions making the big investments that look necessary to compete in the field. Despite (or maybe because) it has no AI companies to speak of, the EU is moving forward with its AI Act, an attempt to do for AI what the EU did for privacy with GDPR. Maury and I doubt the AI Act will have the same impact, at least outside Europe. Partly that's because Europe doesn't have the same jurisdictional hooks in AI as in data protection. It is essentially regulating what AI can be sold inside the EU, and companies are quite willing to develop their products for the rest of the world and bolt on European use restrictions as an afterthought. In addition, the AI Act, which started life as a coherent if aggressive policy about high risk models, has collapsed into a welter of half-thought-out improvisations in response to the unanticipated success of ChatGPT. Anne-Gabrielle Haie is more friendly to the EU's data protection policies, and she takes us through a group of legal rulings that will shape liability for data protection violations. She also notes the potentially protectionist impact of a recent EU proposal to say that U.S. companies cannot offer secure cloud computing in Europe unless they partner with a European cloud provider. Paul Rosenzweig introduces us to one of the U.S. government's most impressive technical achievements in cyberdefense—tracking down, reverse engineering, and then killing Snake, one of Russia's best hacking tools. Paul and I chew over China's most recent self-inflicted wound in attracting global investment—the raid on Capvision. I agree that it's going to discourage investors who need information before they part with their cash. But I offer a lukewarm justification for China's fear that Capvision's business model encourages leaks. Maury reviews Chinese tech giant Baidu's ChatGPT-like search add-on. I ask whether we can ever trust models like ChatGPT for search, given their love affair with plausible falsehoods. Paul reviews the technology that will be needed to meet what's looking like a national trend to require social media age verification. Maury reviews the ruling upholding the lawfulness of the UK's interception of Encrochat users. And Paul describes the latest crimeware for phones, this time centered in Italy. Finally, in quick hits: I note that both the director and the career deputy director are likely to leave NSA in the next several months. And Maury and I both enthuse over Google's new “passkey” technology. Download the 457th Episode (mp3) You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@gmail.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.
Maury Shenk opens this episode with an exploration of three efforts to overcome notable gaps in the performance of large language AI models. OpenAI has developed a tool meant to address the models' lack of explainability. It uses, naturally, another large language model to identify what makes individual neurons fire the way they do. Maury is skeptical that this is a path forward, but it's nice to see someone trying. The other effort, Anthropic's creation of an explicit “constitution” of rules for its models, is more familiar and perhaps more likely to succeed. We also look at the use of “open source” principles to overcome the massive cost of developing new models and then training them. That has proved to be a surprisingly successful fast-follower strategy thanks to a few publicly available models and datasets. The question is whether those resources will continue to be available as competition heats up. The European Union has to hope that open source will succeed, because the entire continent is a desert when it comes to big institutions making the big investments that look necessary to compete in the field. Despite (or maybe because) it has no AI companies to speak of, the EU is moving forward with its AI Act, an attempt to do for AI what the EU did for privacy with GDPR. Maury and I doubt the AI Act will have the same impact, at least outside Europe. Partly that's because Europe doesn't have the same jurisdictional hooks in AI as in data protection. It is essentially regulating what AI can be sold inside the EU, and companies are quite willing to develop their products for the rest of the world and bolt on European use restrictions as an afterthought. In addition, the AI Act, which started life as a coherent if aggressive policy about high risk models, has collapsed into a welter of half-thought-out improvisations in response to the unanticipated success of ChatGPT. Anne-Gabrielle Haie is more friendly to the EU's data protection policies, and she takes us through a group of legal rulings that will shape liability for data protection violations. She also notes the potentially protectionist impact of a recent EU proposal to say that U.S. companies cannot offer secure cloud computing in Europe unless they partner with a European cloud provider. Paul Rosenzweig introduces us to one of the U.S. government's most impressive technical achievements in cyberdefense—tracking down, reverse engineering, and then killing Snake, one of Russia's best hacking tools. Paul and I chew over China's most recent self-inflicted wound in attracting global investment—the raid on Capvision. I agree that it's going to discourage investors who need information before they part with their cash. But I offer a lukewarm justification for China's fear that Capvision's business model encourages leaks. Maury reviews Chinese tech giant Baidu's ChatGPT-like search add-on. I ask whether we can ever trust models like ChatGPT for search, given their love affair with plausible falsehoods. Paul reviews the technology that will be needed to meet what's looking like a national trend to require social media age verification. Maury reviews the ruling upholding the lawfulness of the UK's interception of Encrochat users. And Paul describes the latest crimeware for phones, this time centered in Italy. Finally, in quick hits: I note that both the director and the career deputy director are likely to leave NSA in the next several months. And Maury and I both enthuse over Google's new “passkey” technology. Download the 457th Episode (mp3) You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@gmail.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.
I sin förra bok Tills alla dör (Mondial 2021) fokuserade Diamant Salihu, till vardags journalist på SVT, på de utsatta områdena på Järvafältet, och särskilt konflikten mellan Dödspatrullen och Shottaz. I den nya boken – När ingen lyssnar (Mondial) – ligger fokus på vad som skedde när man lyckades knäcka de krypterade tjänsterna Encrochat, Anom och Sky ECC. Nätverken såg annorlunda ut än vad man hade trott, och mängden narkotika som smugglades in i landet var tio gånger större än vad polisen uppskattat. Efterfrågan är uppenbarligen hög. Över 400 personer har hittills dömts med bevisning från de krypterade tjänsterna, men en paradoxal konsekvens har varit ökat våld och kaos. Hur hänger det ihop?I dagens podd pratar vi om detta och mycket mer. Och det är särskilt roligt att ha Diamant Salihu som gäst, eftersom han faktiskt var Rak högers allra första poddgäst för ett par år sedan. Min förra intervju med Diamant Salihu:Utgivaren ansvarar inte för kommentarsfältet. (Myndigheten för press, radio och tv (MPRT) vill att jag skriver ovanstående för att visa att det inte är jag, utan den som kommenterar, som ansvarar för innehållet i det som skrivs i kommentarsfältet.) This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.enrakhoger.se/subscribe
Linnea Wikblad och David Druid om sina minnen från skolsjuksköterskan och om fasan att hen skulle känna på bollarna. David berättar om sin morfars bästa sextips. Jack Werner recapar grannfejden mellan före detta statsministern Göran Persson och grannen Kaj som skildras i en ny SvD-dokumentär. Diamant Salihu om sin nya bok som handlar om hur polisen hackade Encrochat -och vilka konsekvenser det fått för gängen. P3 Nyheters Babs Drougge berättar om ett mässlingsfall i Stockholm. Programledare: David Druid och Linnea Wikblad
VEM: Diamant Salihu.YRKE: Journalist och författare.AVSNITT: 569.OM: Att få en kula hemskickad till sin hemadress, vem som sköt Einar, varför Sverige har mest gängkriminalitet i Skandinavien, hur narkotikamarknaden styrs utomlands av knarkbossar, rotlöshet hos många invandrare, varför polisen skulle förberett sig på maktvakuum när man knäckte EncroChat, hur tufft det är att sitta inne med fulla restriktioner, när våldsvågen är över och givetvis en hel del om att få pris tillsammans med Viktor NorénKöp Diamants nya bok ''När ingen lyssnar'' här.SAMTALSLEDARE: Kristoffer TriumfPRODUCENT: Ninni WestinDISTRIBUTION: AcastKONTAKT: MAIL och INSTAGRAM (https://www.instagram.com/varvet/) Hosted on Acast. See acast.com/privacy for more information.
VEM: Diamant Salihu.YRKE: Journalist och författare.AVSNITT: 569.OM: Att få en kula hemskickad till sin hemadress, vem som sköt Einar, varför Sverige har mest gängkriminalitet i Skandinavien, hur narkotikamarknaden styrs utomlands av knarkbossar, rotlöshet hos många invandrare, varför polisen skulle förberett sig på maktvakuum när man knäckte EncroChat, hur tufft det är att sitta inne med fulla restriktioner, när våldsvågen är över och givetvis en hel del om att få pris tillsammans med Viktor NorénKöp Diamants nya bok ''När ingen lyssnar'' här.SAMTALSLEDARE: Kristoffer TriumfPRODUCENT: Ninni WestinDISTRIBUTION: AcastKONTAKT: MAIL och INSTAGRAM (https://www.instagram.com/varvet/) Hosted on Acast. See acast.com/privacy for more information.
Denna veckan har vi Diamant Salihu tillbaka i Ångestpodden. Den prisbelönte journalisten som tidigare skrivit boken "Tills alla dör" och som nu skrivit boken "När ingen lyssnar" som tar sin början där den förra boken slutade, kan man säga. Om när polisen lyckades knäcka encrochat och det paradoxala i hur gängkonflikterna eskalerade efter att chanserna spreds, när alla trodde att man äntligen skulle få kontroll på våldet. Om tjejerna som ofta glöms bort i gängkriminaliteten, narkotikahandeln och om fel fokus i debatten. Hosted on Acast. See acast.com/privacy for more information.
Drug dealers come unstuck while using the Encrochat encrypted-messaging app, and we put the Lensa AI avatar-generation tool under the microscope.All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault.Plus - don't miss our featured interview with Rico Acosta, IT manager at Bitwarden.Warning: This podcast may contain nuts, adult themes, and rude language.Episode links:Smashing Security 229: Dating leaks, right to repair, and a stinky bishop - Smashing Security.Hard cheese: Stilton snap shared via EncroChat leads to drug dealer's downfall - The Register.Operation Venetic: Pet dog and accidental selfies help convict international drugs traffickers - NCA.What does the Lensa AI app do with my self-portraits and why has it gone viral? - The Guardian. Lensa, the AI portrait app, has soared in popularity. But many artists question the ethics of AI art - NBC News.I Uploaded Photos of Myself to the New Lensa A.I. Portrait Generator. The Results Were Stunning, Strange… and Super Creepy - Artnet.People keep sharing their AI-generated portraits: What to know about Lensa, and why some push back on it - USA Today.How Is Everyone Making Those A.I. Selfies? - New York Times. Lensa AI: Security concerns regarding app behind colourful selfies on social media - The National News. ‘Magic Avatar' App Lensa Generated Nudes From My Childhood Photos - Wired. Celebrities Are Obsessed With This Amazing New AI Portrait App - Hello Giggles. This AI Self-Portrait App is Taking Over the Internet - Medium.Wednesday Shows Off Her Moves - YouTube.