<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Glitch Cat]]></title><description><![CDATA[Every publication needs a name, this is mine.]]></description><link>https://www.glitchcat.xyz</link><image><url>https://substackcdn.com/image/fetch/$s_!RlV2!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72b1048c-277c-4909-ba80-c26781ab2053_491x491.png</url><title>Glitch Cat</title><link>https://www.glitchcat.xyz</link></image><generator>Substack</generator><lastBuildDate>Wed, 29 Apr 2026 21:58:28 GMT</lastBuildDate><atom:link href="https://www.glitchcat.xyz/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Runa Sandvik]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[runasand@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[runasand@substack.com]]></itunes:email><itunes:name><![CDATA[Runa Sandvik]]></itunes:name></itunes:owner><itunes:author><![CDATA[Runa Sandvik]]></itunes:author><googleplay:owner><![CDATA[runasand@substack.com]]></googleplay:owner><googleplay:email><![CDATA[runasand@substack.com]]></googleplay:email><googleplay:author><![CDATA[Runa Sandvik]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Introduction to digital security for activists, journalists, lawyers, and anyone else doing at-risk work]]></title><description><![CDATA[I wrote a very timely introduction to digital security for investigative journalists for the Global Investigative Journalism Network. This guidance also applies to activists, lawyers, and anyone else doing at-risk work these days.Glitch Cat is a reader-supported publication.]]></description><link>https://www.glitchcat.xyz/p/introduction-to-digital-security</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/introduction-to-digital-security</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Wed, 27 Nov 2024 21:29:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!LDVT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f512f45-07eb-407b-a0b4-bb45e47392a3_771x514.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LDVT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f512f45-07eb-407b-a0b4-bb45e47392a3_771x514.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LDVT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f512f45-07eb-407b-a0b4-bb45e47392a3_771x514.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LDVT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f512f45-07eb-407b-a0b4-bb45e47392a3_771x514.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LDVT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f512f45-07eb-407b-a0b4-bb45e47392a3_771x514.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LDVT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f512f45-07eb-407b-a0b4-bb45e47392a3_771x514.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LDVT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f512f45-07eb-407b-a0b4-bb45e47392a3_771x514.jpeg" width="771" height="514" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6f512f45-07eb-407b-a0b4-bb45e47392a3_771x514.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:514,&quot;width&quot;:771,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LDVT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f512f45-07eb-407b-a0b4-bb45e47392a3_771x514.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LDVT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f512f45-07eb-407b-a0b4-bb45e47392a3_771x514.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LDVT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f512f45-07eb-407b-a0b4-bb45e47392a3_771x514.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LDVT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f512f45-07eb-407b-a0b4-bb45e47392a3_771x514.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo: from the Global Investigative Journalism Network</figcaption></figure></div><p>I wrote a very timely <a href="https://gijn.org/resource/introduction-investigative-journalism-digital-security">introduction to digital security</a> for investigative journalists for the <a href="https://gijn.org/">Global Investigative Journalism Network</a>. This guidance also applies to activists, lawyers, and anyone else doing at-risk work these days.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Delegating access to email, social media may make your accounts less secure]]></title><description><![CDATA[The UK&#8217;s National Cyber Security Centre recently published cybersecurity guidance for high-risk individuals.]]></description><link>https://www.glitchcat.xyz/p/delegating-access-to-email-social</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/delegating-access-to-email-social</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Fri, 12 Apr 2024 22:56:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SBQ9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c14fc02-ddae-4dcb-9b5e-da144ca4d78c_1200x800.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SBQ9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c14fc02-ddae-4dcb-9b5e-da144ca4d78c_1200x800.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SBQ9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c14fc02-ddae-4dcb-9b5e-da144ca4d78c_1200x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!SBQ9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c14fc02-ddae-4dcb-9b5e-da144ca4d78c_1200x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!SBQ9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c14fc02-ddae-4dcb-9b5e-da144ca4d78c_1200x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!SBQ9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c14fc02-ddae-4dcb-9b5e-da144ca4d78c_1200x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SBQ9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c14fc02-ddae-4dcb-9b5e-da144ca4d78c_1200x800.jpeg" width="1200" height="800" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3c14fc02-ddae-4dcb-9b5e-da144ca4d78c_1200x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;wood, chain, steel, green, color, blue, gate, door, padlock, wooden, closed, lock, keyhole, links, locked, protected&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="wood, chain, steel, green, color, blue, gate, door, padlock, wooden, closed, lock, keyhole, links, locked, protected" title="wood, chain, steel, green, color, blue, gate, door, padlock, wooden, closed, lock, keyhole, links, locked, protected" srcset="https://substackcdn.com/image/fetch/$s_!SBQ9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c14fc02-ddae-4dcb-9b5e-da144ca4d78c_1200x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!SBQ9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c14fc02-ddae-4dcb-9b5e-da144ca4d78c_1200x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!SBQ9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c14fc02-ddae-4dcb-9b5e-da144ca4d78c_1200x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!SBQ9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c14fc02-ddae-4dcb-9b5e-da144ca4d78c_1200x800.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The UK&#8217;s National Cyber Security Centre recently published cybersecurity <a href="https://www.ncsc.gov.uk/collection/defending-democracy">guidance</a> for high-risk individuals. I looked at the guidance last week and shared my thoughts <a href="https://www.glitchcat.xyz/p/a-look-at-the-uks-cybersecurity-guidance">here</a>, but I wanted to say a bit more about NCSC&#8217;s suggestion for managing access to shared accounts.</p><p>According to the guidance, you should &#8220;consider using a social media management service&#8221; for &#8220;any public social media accounts that you use in a professional context.&#8221; The idea here is that the service allows your team members to create posts for you, without you having to share the password. But in reality, the service may leave your account less secure than before because it changes how your team members log in.</p><p>Let&#8217;s say that you want to give Alice and Bob access to manage your account on X. You have secured the account with a good password and two-factor authentication. Maybe you&#8217;ve even set up a <a href="https://www.malwarebytes.com/blog/news/2023/02/how-to-set-up-two-factor-authentication-on-twitter-using-a-hardware-key">security key</a>. You can then share your password and two-factor authentication; use a social media management service; or try out X&#8217;s new <a href="https://help.twitter.com/en/managing-your-account/how-to-use-the-delegate-feature">Delegate</a> feature.</p><p>If you share your password and two-factor authentication, you give Alice and Bob full control over your account. Not only can they create posts for you, they can also hijack your account. Not ideal.&nbsp;</p><p>If you use a social media management service, you first create an account with the service and secure it with a good password and two-factor authentication. You then link the service to your account on X. Alice and Bob create accounts with the service too. From there, you give Alice and Bob permission to create posts for you <em>through</em> the service. Rather than log in on x.com, they log in to the service and access your account there. And because their access is limited, they will not be able to hijack your account.</p><p>Sounds great, right? Well, here&#8217;s the catch.&nbsp;</p><p>Your account on X still has a good password and two-factor authentication. But it&#8217;s now possible to log in another way&#8212;using the social media management service&#8212;and that is protected by your account, Alice&#8217;s account, and Bob&#8217;s account. If Bob has the password &#8220;password&#8221; and no two-factor authentication, that weakens the security of your account. While Bob can&#8217;t hijack your account, he&#8212;or someone using his account with the service&#8212;can create all sorts of embarrassing posts for you.</p><p>X launched the Delegate feature last year to make it easier for teams to collaborate on a single account. The concept is similar to using a social media management service, but without using a third-party platform. If you use this feature, you give Alice and Bob permission to create posts for you through their own X accounts. Your account still has a good password and two-factor authentication. But, as with the service, your account is now protected by your account, Alice&#8217;s account, and Bob&#8217;s account. If Bob does not secure his own account, then he also leaves your account less secure than it was before you gave him access.</p><p>In an ideal world, X should allow you to require that delegates match the security that you have on your account. If you have two-factor authentication, they should have that too. This challenge is not unique to X, however, or to social media. Earlier this week, I discovered that you can delegate access to a Google account enrolled in the <a href="https://www.glitchcat.xyz/p/googles-advanced-protection-program">Advanced Protection Program</a> to a Google account with no two-factor at all. Turns out securing shared access is hard, no matter the platform.&nbsp;</p><p>Last week, I wrote that &#8220;[w]hen considering a social media management service, I recommend that you look for one which&#8211;at the very least&#8211;supports two-factor authentication.&#8221; You want to make sure that your account remains secure, regardless of how you share access. That may mean sharing your password and two-factor authentication; using a service which allows you to require two-factor authentication; or using X&#8217;s new Delegate feature and trusting your team members to keep their own accounts secure&#8212;just like you do. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[A look at the UK's cybersecurity guidance for high-risk individuals]]></title><description><![CDATA[In December, the UK National Cyber Security Centre published guidance to raise awareness of digital threats to high-risk individuals, democratic processes, and institutions.]]></description><link>https://www.glitchcat.xyz/p/a-look-at-the-uks-cybersecurity-guidance</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/a-look-at-the-uks-cybersecurity-guidance</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Thu, 04 Apr 2024 07:14:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1kgo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf326788-4232-4144-b25e-f8e21eb3ef28_4500x2531.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1kgo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf326788-4232-4144-b25e-f8e21eb3ef28_4500x2531.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1kgo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf326788-4232-4144-b25e-f8e21eb3ef28_4500x2531.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1kgo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf326788-4232-4144-b25e-f8e21eb3ef28_4500x2531.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1kgo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf326788-4232-4144-b25e-f8e21eb3ef28_4500x2531.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1kgo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf326788-4232-4144-b25e-f8e21eb3ef28_4500x2531.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1kgo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf326788-4232-4144-b25e-f8e21eb3ef28_4500x2531.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bf326788-4232-4144-b25e-f8e21eb3ef28_4500x2531.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:317295,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1kgo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf326788-4232-4144-b25e-f8e21eb3ef28_4500x2531.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1kgo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf326788-4232-4144-b25e-f8e21eb3ef28_4500x2531.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1kgo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf326788-4232-4144-b25e-f8e21eb3ef28_4500x2531.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1kgo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf326788-4232-4144-b25e-f8e21eb3ef28_4500x2531.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo: Timon Schneider / Alamy Stock Photo.</figcaption></figure></div><p>In December, the UK National Cyber Security Centre <a href="https://www.ncsc.gov.uk/collection/defending-democracy">published</a> guidance to raise awareness of digital threats to high-risk individuals, democratic processes, and institutions. At the same time, the agency <a href="https://www.ncsc.gov.uk/news/star-blizzard-continues-spear-phishing-campaigns">published</a> an advisory warning that Star Blizzard, a hacking group linked to Russia, continues to target high-risk individuals and organizations with tailored phishing attacks. The Guardian <a href="https://www.theguardian.com/world/2023/dec/07/russian-star-blizzard-hackers-linked-to-efforts-to-hamper-war-crimes-investigation">reported</a> that Star Blizzard &#8220;is part of an aggressive FSB unit that sought to stoke scandal over Brexit, and hamper European NGOs investigating war crimes in Ukraine.&#8221; The guidance is part of the UK&#8217;s <a href="https://www.cisa.gov/news-events/news/jcdc-working-and-collaborating-build-cyber-defense-civil-society-and-high-risk-communities">efforts</a> to advance the cybersecurity of civil society and support the communities at highest risk. The Cybersecurity and Infrastructure Security Agency, NCSC&#8217;s counterpart in the U.S., <a href="https://www.cisa.gov/audiences/high-risk-communities">launched</a> its high-risk communities webpage earlier this week.&nbsp;</p><p>Crafting good security guidance is hard, especially for a large and diverse audience. You want to strike the right balance between giving the reader enough information to take action, but not so much that they become overwhelmed and give up. The guidance from NCSC is brief and to the point, covering best practices without being too technical or too scary. I appreciate that the agency highlights the importance of securing personal accounts; after all, securing a high-risk individual means securing a person and how they work, not just their corporate accounts and devices. There&#8217;s even a mention of Apple&#8217;s <a href="https://www.glitchcat.xyz/p/four-things-to-know-about-lockdown">Lockdown Mode</a>, a security feature designed to protect devices against sophisticated attacks&#8211;such as the use of commercial spyware.&nbsp;</p><p>The guidance for high-risk individuals has a total of nine steps, split into protections for accounts and devices. Rather than aim to be as comprehensive as possible, NCSC prioritizes mitigations that are likely to make the biggest difference for someone&#8217;s personal security. I&#8217;m a bit confused as to why disk encryption is missing from the guide, though. The feature provides an extra layer of security by ensuring someone cannot gain access to the data on your computer without first entering the password. Disk encryption is especially helpful in the event your computer is lost, stolen, or seized. Also missing are any mentions of encrypted phone backups for Android and iOS; end-to-end encryption for <a href="https://support.apple.com/en-us/108756">iCloud</a>; and end-to-end encryption for <a href="https://faq.whatsapp.com/1246476872801203/">WhatsApp</a> backups.</p><p>NCSC opted to recommend the password manager functions built into Android and iOS. These are easy and convenient options, but sadly lack features you&#8217;ll find in other password manager solutions&#8211;such as secure notes and the ability to securely share passwords. I think it would be helpful for this high-risk guidance to also mention that other solutions with more features exist, and perhaps elaborate on those features as well. 1Password is one such option which provides discounts to <a href="https://1password.com/for-journalism/">journalists</a> and <a href="https://1password.com/for-good/">others</a> helping to make the world a better place.&nbsp;</p><p>For two-factor authentication, the agency is clear about authentication apps being &#8220;more secure and convenient than SMS.&#8221; The agency recommends using Google Authenticator and Microsoft Authenticator: two apps which sync to the cloud. I think NCSC ought to stress that if you do back up your two-factor codes with these apps, you must secure these accounts with two-factor authentication as well. NCSC should also include Google&#8217;s <a href="https://landing.google.com/advancedprotection/">Advanced Protection Program</a> (and Google <a href="https://www.glitchcat.xyz/p/googles-advanced-protection-program">should</a> mention it more too). The program enables two-factor with security keys and is designed with high-risk individuals in mind.</p><p>For sharing access to a social media account, NCSC suggests that you &#8220;consider using a social media management service.&#8221; The idea is that using such a service allows your team members to create posts for you, without you having to share your password. The downside is that many (most?) focus solely on making scheduling and posting easier, without ensuring multiple individuals can securely share access to an account. When considering a social media management service, I recommend that you look for one which&#8211;at the very least&#8211;supports two-factor authentication.&nbsp;</p><p>Overall, I think the guidance from NCSC is a good start and worth a read. I&#8217;m really looking forward to seeing what else the agency adds throughout the year. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[What high-risk communities should take away from this year’s Norwegian threat assessments]]></title><description><![CDATA[The Norwegian Intelligence Service, the Police Security Service, and the Norwegian National Security Authority recently published their threat and risk assessments for 2024.]]></description><link>https://www.glitchcat.xyz/p/what-high-risk-communities-should</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/what-high-risk-communities-should</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Tue, 02 Apr 2024 10:01:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ageC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e51dc0e-8125-4a05-a094-0e9bcdf2e150_4818x2710.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ageC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e51dc0e-8125-4a05-a094-0e9bcdf2e150_4818x2710.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ageC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e51dc0e-8125-4a05-a094-0e9bcdf2e150_4818x2710.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ageC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e51dc0e-8125-4a05-a094-0e9bcdf2e150_4818x2710.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ageC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e51dc0e-8125-4a05-a094-0e9bcdf2e150_4818x2710.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ageC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e51dc0e-8125-4a05-a094-0e9bcdf2e150_4818x2710.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ageC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e51dc0e-8125-4a05-a094-0e9bcdf2e150_4818x2710.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0e51dc0e-8125-4a05-a094-0e9bcdf2e150_4818x2710.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:8470803,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ageC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e51dc0e-8125-4a05-a094-0e9bcdf2e150_4818x2710.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ageC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e51dc0e-8125-4a05-a094-0e9bcdf2e150_4818x2710.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ageC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e51dc0e-8125-4a05-a094-0e9bcdf2e150_4818x2710.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ageC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e51dc0e-8125-4a05-a094-0e9bcdf2e150_4818x2710.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo: Stortinget by Ryan Hodnett.</figcaption></figure></div><p>The Norwegian Intelligence Service, the Police Security Service, and the Norwegian National Security Authority recently published their <a href="https://www.regjeringen.no/en/aktuelt/arets-trussel-og-risikovurderingar-er-kunngjord/id3025253/">threat and risk assessments</a> for 2024. The reports cover a range of different threats, including cyberattacks, disinformation, espionage, sabotage, and terrorism. The three agencies call out China, Iran, North-Korea, and Russia, in addition to Islamic and right-wing extremists. At the <a href="https://www.regjeringen.no/no/aktuelt/felles-framlegging-av-trussel-og-risikovurderingar/id3024729/">press conference</a> in February, Minister of Justice and Public Security Emilie Mehl stressed the need for a whole-of-nation approach to defense that spans all stakeholders&#8211;both civilian and military. With that in mind, here are my takeaways for high-risk people and organizations&#8211;in Norway and elsewhere.&nbsp;</p><p><strong>Activists, dissidents, and refugees in Norway are likely to be targeted by authoritarian regimes in 2024.</strong> This may also include their family members back home. Prominent people, such as elected officials and high-net-worth individuals, are vulnerable too. The reports don&#8217;t mention news media or journalists, but I think it&#8217;s reasonable to assume that these two groups are&#8211;or can become&#8211;targets of state actors as well.&nbsp;</p><p><strong>Authoritarian regimes will attempt to identify, surveil, and silence individuals with tactics of fear and repression.</strong> According to the Police Security Service, such surveillance may occur at protests and on social media. Individuals, as well as their family members, are likely to face pressure, threats, and harassment&#8211;both online and offline. I think it&#8217;s worth adding that online attacks may include sophisticated, targeted phishing; relentless social media trolling; mis- and disinformation campaigns; and use of commercial spyware. I highly recommend using Apple&#8217;s <a href="https://support.apple.com/en-us/105120">Lockdown Mode</a> and Google&#8217;s <a href="https://landing.google.com/advancedprotection/">Advanced Protection Program</a>.</p><p><strong>China and Iran will continue to stifle criticism of its policies and actions, both online and offline.</strong> In November, I <a href="https://www.glitchcat.xyz/p/how-china-targets-civil-society-abroad">wrote</a> about how China targets civil society abroad with impersonation; intimidation; mis- and disinformation; attacks using DDoS, phishing, and malware; and even fake bomb threats in <a href="https://www.aftenposten.no/verden/i/Momb1M/da-telefonen-ringte-fra-oslo-ble-21-aaringen-satt-ut-de-sier-at-du-har-en-bombe">Oslo</a> and The Hague. Last week, the U.S. Department of Justice <a href="https://www.justice.gov/opa/pr/seven-hackers-associated-chinese-government-charged-computer-intrusions-targeting-perceived">charged</a> seven members of the Chinese hacking group APT31 with &#8220;targeting U.S. and foreign critics, businesses, and political officials&#8221; for 14 years. The <a href="https://www.justice.gov/opa/media/1345141/dl?inline">indictment</a> also describes how the group in 2018 targeted the Norwegian <a href="https://pst.no/alle-artikler/pressemeldinger/etterforskningen-av-datanettverksoperasjonen-mot-fylkesmannsembetene-er-avsluttet/">government</a> and <a href="https://borsen.dagbladet.no/nyheter/angrep-norge-tiltalt-i-usa/81177199">Visma</a>, a managed service provider, in response to U.S. lawmakers <a href="https://www.theguardian.com/world/2018/feb/01/nobel-peace-prize-us-lawmakers-nominate-hong-kong-protesters">nominating</a> Hong Kong&#8217;s Umbrella Movement for the Nobel Peace Prize.&nbsp;</p><p><strong>Elected officials will remain targets of foreign intelligence services, they are also likely to face threats and harassment throughout the year.</strong> Last month, VG <a href="https://www.vg.no/nyheter/i/bg3MRg/listhaug-ble-fotfulgt-av-aktivister-ekkelt-og-truende">reported</a> that a group of pro-Palestine activists had confronted the leader of the Progress Party, Sylvi Listhaug, outside her place of work. The group, unhappy with Listhaug&#8217;s support for Israel, had shouted &#8220;shame on you&#8221; and &#8220;children in Gaza are dying.&#8221; The Police Security Service is currently <a href="https://www.vg.no/nyheter/i/nQ5wna/pst-til-dagbladet-har-startet-etterforskning-etter-at-listhaug-ble-forfulgt-av-aktivister">investigating</a> the incident. A week later, <a href="https://www.nrk.no/vestfoldogtelemark/angrep-journalist-under-demonstrasjon-i-skien-1.16822524">NRK</a> and <a href="https://www.tv2.no/nyheter/innenriks/tv-2-team-ble-angrepet-under-demonstrasjon-de-gikk-amok/16568163/">TV2</a> reported that their journalists had been attacked and prevented from covering a pro-Palestine rally in Skien. The Committee to Protect Journalists has published <a href="https://cpj.org/2018/09/physical-safety-civil-disorder/">guidelines</a> on how reporters can stay safe while covering marches and rallies.</p><p><strong>Pro-Russian hacktivists will continue to target Norwegian websites with denial-of-service attacks over Norway&#8217;s support to Ukraine.</strong> While past attacks have had limited success, the Norwegian Intelligence Service warns that future attacks may cast doubt on the ability of public institutions to deliver services. Earlier this year, Prime Minister Jonas Gahr St&#248;re <a href="https://www.regjeringen.no/en/aktuelt/norways-support-to-ukraine-is-of-vital-importance/id3023773/">reiterated</a> that Norway&#8217;s &#8220;support to Ukraine is a long-term commitment.&#8221; <a href="https://www.cloudflare.com/galileo/">Cloudflare</a> and <a href="https://projectshield.withgoogle.com/landing">Google</a> both offer free services that defend news, human rights, and elections-related sites from this type of attack.</p><p><strong>The Norwegian National Security Authority warns about the impact of rapid technological change, including the use of AI to create mis- and disinformation.</strong> The agency highlights a 2023 <a href="https://www.cnn.com/2024/02/01/politics/election-deepfake-threats-invs/index.html">incident</a> in Slovakia where fact-checkers scrambled to deal with a fake audio recording of a political candidate days before the election. False information shared at the right time, in the right way, can shape public opinion. With more than 50 countries holding high-stakes elections throughout the year, it&#8217;s even more crucial that we support fact-checking organizations such as <a href="https://www.faktisk.no/">Faktisk.no</a>.&nbsp;</p><p>Other interesting mentions include: Russia&#8217;s <a href="https://thebarentsobserver.com/en/arctic/2023/10/ghost-town-pyramiden-will-be-home-russias-planned-international-svalbard-science">desire</a> to build a science center in <a href="https://thebarentsobserver.com/en/node/4450">Pyramiden</a>, the world&#8217;s northernmost ghost town; the <a href="https://www.reuters.com/world/norway-takes-over-arctic-council-leadership-russia-2023-05-11/">transition</a> of the Arctic Council leadership from Russia to Norway; and threat actors <a href="https://www.cisa.gov/news-events/alerts/2023/08/01/cisa-and-international-partner-ncsc-no-release-joint-cybersecurity-advisory-threat-actors-exploiting">exploiting</a> zero-days in Ivanti last summer to <a href="https://www.regjeringen.no/en/aktuelt/ministries-hit-by-cyber-attacks/id2990098/">target</a> the online platform used by 12 different ministries.&nbsp;</p><p>I plan to write more about security for journalists and other high-risk communities this year, as part of my work with <a href="https://techcrunch.com/2022/07/15/granitt-journalist-security/">Granitt</a>. (Feedback and ideas are always welcome!) If you have questions about how to best protect yourself and your organization, please do get in <a href="https://granitt.io/">touch</a>.&nbsp;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Lessons learned from the 2021 arrest of two Norwegian journalists in Qatar]]></title><description><![CDATA[In November 2021, two Norwegian journalists investigating conditions for migrant workers in Qatar ahead of the 2022 FIFA World Cup were arrested and detained for more than 30 hours shortly before their flight home.]]></description><link>https://www.glitchcat.xyz/p/lessons-learned-from-the-2021-arrest</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/lessons-learned-from-the-2021-arrest</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Mon, 25 Mar 2024 13:31:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!G71s!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad45c0f3-073f-48f0-b6af-f97d24836c99_4300x2867.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G71s!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad45c0f3-073f-48f0-b6af-f97d24836c99_4300x2867.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G71s!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad45c0f3-073f-48f0-b6af-f97d24836c99_4300x2867.jpeg 424w, https://substackcdn.com/image/fetch/$s_!G71s!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad45c0f3-073f-48f0-b6af-f97d24836c99_4300x2867.jpeg 848w, https://substackcdn.com/image/fetch/$s_!G71s!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad45c0f3-073f-48f0-b6af-f97d24836c99_4300x2867.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!G71s!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad45c0f3-073f-48f0-b6af-f97d24836c99_4300x2867.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G71s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad45c0f3-073f-48f0-b6af-f97d24836c99_4300x2867.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ad45c0f3-073f-48f0-b6af-f97d24836c99_4300x2867.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3208846,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!G71s!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad45c0f3-073f-48f0-b6af-f97d24836c99_4300x2867.jpeg 424w, https://substackcdn.com/image/fetch/$s_!G71s!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad45c0f3-073f-48f0-b6af-f97d24836c99_4300x2867.jpeg 848w, https://substackcdn.com/image/fetch/$s_!G71s!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad45c0f3-073f-48f0-b6af-f97d24836c99_4300x2867.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!G71s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad45c0f3-073f-48f0-b6af-f97d24836c99_4300x2867.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo: Khalifa International Stadium by Joerg Boethling / Alamy Stock Photo. </figcaption></figure></div><p>In November 2021, two Norwegian journalists investigating conditions for migrant workers in Qatar ahead of the 2022 FIFA World Cup were <a href="https://www.nrk.no/urix/arrested-after-interviewing-the-world-cup-manager-1.15744167">arrested</a> and detained for more than 30 hours shortly before their flight home. The authorities <a href="https://web.archive.org/web/20220710220352/https://www.gco.gov.qa/en/2021/11/24/government-communications-office-statement-in-response-to-the-nrk-incident/">said</a> the journalists, Halvor Ekeland and Lokman Ghorbani with the Norwegian Broadcasting Corporation (NRK), were detained &#8220;for trespassing on private property and filming without a permit.&#8221; The journalists were questioned for eight hours in separate rooms, while their equipment was <a href="https://www.nrk.no/norge/nrk-journalister-i-norge_-_-veldig-godt-a-vaere-hjemme-1.15742778">seized</a> and thoroughly searched. When the authorities finally returned the equipment three weeks later, the photos and videos had been <a href="https://www.nrk.no/norge/qatar-sletta-alle-opptaka-etter-at-nrk-journalistar-blei-arrestert-1.15775565">deleted</a> and the memory cards had been formatted.&nbsp;</p><p>Norwegian Prime Minister Jonas Gahr St&#248;re <a href="https://twitter.com/jonasgahrstore/status/1463434459705974789?s=20">tweeted</a> that the arrest was &#8220;unacceptable&#8221; and that &#8220;a free press is crucial to a functioning democracy.&#8221; In a perfect world, the arrest would not have happened; the equipment would not have been seized; the material would not have been deleted. But journalism is inherently risky work, and these are just some of the challenges that reporters around the world face on a daily basis. There&#8217;s a lot we can learn from this incident in Qatar, especially around digital security and source protection. I have previously used this story as a case study in my course on threat modeling for the <a href="https://tcij.org/source-protection-programme/spp/">Source Protection Programme</a> together with the <a href="https://tcij.org/">Centre for Investigative Journalism</a> and the <a href="https://freedom.press/">Freedom of the Press Foundation</a>.</p><p>Ekeland and Ghorbani transferred some data to Norway prior to their arrest, but lost most of the raw material when their equipment was seized. The <a href="https://www.nrk.no/sport/sendte-denne-sms-en-_-sa-startet-nrk-journalistenes-qatar-mareritt-1.15743490">timeline</a> provided by NRK suggests the two had a slow morning on the day of the arrest, though it&#8217;s unclear if they had time to transfer more material before heading out for another interview. Transferring material can be an easy process, assuming you have a strong and stable internet connection, but it can be quite time consuming. Not to mention the time spent confirming the transfer was successful, then finding and deleting any sensitive material stored on your memory card. But this step could have helped the journalists <a href="https://www.journalisten.no/fengslede-journalister-fotball-vm-halvor-ekeland/32-timer-i-qatarsk-fengsel--vet-fremdeles-ikke-hva-vi-har-signert-pa/491122">protect</a> the subjects they <a href="https://www.nrk.no/sport/disse-32-sekundene-opprorte-politiet-i-qatar-1.15752112">interviewed</a> in the labor camp.&nbsp;</p><p>In 2016, the Freedom of the Press Foundation published a <a href="https://www.documentcloud.org/documents/3238288-Camera-Encryption-Letter.html">letter</a> to leading camera manufacturers, including Canon, Nikon, and Sony, asking them &#8220;to build encryption features&#8221; into their products to help protect the journalists who use them. The letter was signed by over 150 filmmakers and photojournalists from around the world, including award winners such as Lynsey Addario, Laura Poitras, and Brian Knappenberger. Sadly not much has happened since then.&nbsp;</p><p>Journalists often carry multiple memory cards with them on assignment, some swapping cards around when they film or photograph specific people and places. If you are not able to transfer the material, you can at least move it from the memory card to a folder on your computer or an external drive. You can then encrypt the folder or the drive using FileVault on macOS or BitLocker on Windows. A more technical option is VeraCrypt, which supports the creation of <a href="https://veracrypt.eu/en/Hidden%20Volume.html">hidden volumes</a> and allows you to access the encrypted material on both macOS and Windows. This can be an easy process, assuming you have the folder or drive ready to go. You should still spend some time finding and deleting any sensitive material stored on your memory card.</p><p>According to NRK, Ekeland and Ghorbani followed a communications plan while in Qatar and checked in with colleagues in Oslo twice a day, once in the morning and once in the evening. It&#8217;s unclear if they developed a similar plan for how they would secure the material they were gathering. This would of course not have prevented the arrest or the seizure of their equipment, but could have helped keep their material confidential and their sources safe. It seems the main challenge here was not the lack of tools, but the lack of process.&nbsp;&nbsp;</p><p>In my threat modeling course, I often stress that a good plan for any high-risk assignment must account for physical, digital, legal, and emotional risk. You need to identify the right tools to use, when to use them, and how to use them. If your plan to rely on the hotel internet falls apart, you want to make sure you know how to encrypt a folder to store your material in. After all, it&#8217;s this plan that will help you safely do the work you set out to do &#8211; and allow you to be flexible in how you do it. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Google's Advanced Protection Program is great, it's a shame the company rarely mentions it]]></title><description><![CDATA[It&#8217;s been more than six years since Google launched the Advanced Protection Program, a free security feature designed for high-risk individuals.]]></description><link>https://www.glitchcat.xyz/p/googles-advanced-protection-program</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/googles-advanced-protection-program</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Wed, 20 Mar 2024 15:12:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!eGVO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45076ccc-c435-4654-96f6-592158751259_6720x4480.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eGVO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45076ccc-c435-4654-96f6-592158751259_6720x4480.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eGVO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45076ccc-c435-4654-96f6-592158751259_6720x4480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eGVO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45076ccc-c435-4654-96f6-592158751259_6720x4480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eGVO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45076ccc-c435-4654-96f6-592158751259_6720x4480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eGVO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45076ccc-c435-4654-96f6-592158751259_6720x4480.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eGVO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45076ccc-c435-4654-96f6-592158751259_6720x4480.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/45076ccc-c435-4654-96f6-592158751259_6720x4480.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2413508,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eGVO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45076ccc-c435-4654-96f6-592158751259_6720x4480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eGVO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45076ccc-c435-4654-96f6-592158751259_6720x4480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eGVO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45076ccc-c435-4654-96f6-592158751259_6720x4480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eGVO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45076ccc-c435-4654-96f6-592158751259_6720x4480.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo: Formatoriginal / Alamy Stock Photo.</figcaption></figure></div><p>It&#8217;s been more than six years since Google launched the <a href="https://landing.google.com/advancedprotection/">Advanced Protection Program</a>, a free security feature designed for high-risk individuals. The goal of the program, which anyone can sign up for, is to make it harder for an attacker to gain access to your account. To achieve this, Google requires that you use physical keys for two-factor authentication, such as the <a href="https://www.yubico.com/products/yubikey-5-overview/">YubiKey</a>. The use of physical keys helps defend against phishing too, since there&#8217;s no SMS message or notification that you can be tricked into sharing or taking action on. The program <a href="https://support.google.com/accounts/answer/7519408?hl=en&amp;ref_topic=9264881&amp;sjid=12268987911905165842-EU">also</a> provides extra protection from harmful files, malicious third-party apps, and impersonation attempts.&nbsp;</p><p>The Advanced Protection Program is great. It&#8217;s a shame Google rarely mentions it.</p><p>When I worked for The New York Times in 2017, I <a href="https://www.nytimes.com/2017/10/25/technology/personaltech/google-keys-advanced-protection-program.html">told</a> a journalist that &#8220;I don&#8217;t see a reason why you shouldn&#8217;t turn this on.&#8221; I stand by that. The program is especially helpful for people targeted by government-based attackers. Meduza, a Russian independent media outlet exiled in Europe, <a href="https://meduza.io/en/feature/2024/03/12/meduza-is-facing-the-most-intense-cyberattack-campaign-in-its-history">shared</a> last week that Google recently alerted staff of multiple, targeted attempts to compromise their accounts. In September, <a href="https://www.accessnow.org/publication/hacking-meduza-pegasus-spyware-used-to-target-putins-critic/">Access Now</a> and <a href="https://citizenlab.ca/2023/09/pegasus-infection-of-galina-timchenko-exiled-russian-journalist-and-publisher/">Citizen Lab</a> reported that Meduza&#8217;s co-founder and publisher, Galina Timchenko, had been targeted with the Pegasus spyware, though neither attributed the attack to a specific government.</p><p>I <a href="https://www.glitchcat.xyz/p/too-many-articles-about-spyware-lack">think</a> too many articles about spyware lack guidance for high-risk communities. The same can be said about posts from Google&#8217;s <a href="https://blog.google/threat-analysis-group/">Threat Analysis Group</a>. Don&#8217;t get me wrong, the research is good, but the posts often stop short of recommending any defensive measures. For example, it would have been easy for Google to mention Apple&#8217;s <a href="https://www.glitchcat.xyz/p/four-things-to-know-about-lockdown">Lockdown Mode</a> in <a href="https://blog.google/threat-analysis-group/0-days-exploited-by-commercial-surveillance-vendor-in-egypt/">this</a> post about 0-days exploited by a surveillance vendor in Egypt. Or mention the Advanced Protection Program in <a href="https://blog.google/threat-analysis-group/google-tag-coldriver-russian-phishing-malware/">this</a> post about a Russian actor focused on phishing against high-profile individuals in NGOs. I think both are missed opportunities to raise awareness of these features.&nbsp;</p><p>One could argue that the Threat Analysis Group writes for a technical audience: the analysts, researchers, and technologists whose job it is to stay informed and suggest next steps in their own organizations. But, as I argued in my <a href="https://www.youtube.com/watch?v=U1T0GHMSlWE">keynote</a> at MITRE&#8217;s ATT&amp;CKcon last year, the challenge is that high-risk individuals and communities often don&#8217;t have these people. It falls to the individuals themselves to learn about potential threats and necessary mitigations, on top of doing their day jobs. That&#8217;s an incredibly difficult task.</p><p>Those who risk harassment by government-based attackers would greatly benefit from learning about Lockdown Mode and the Advanced Protection Program, ideally before they are first targeted. I&#8217;d love to see Google consider these people part of the audience that they write for and include not just the technical nitty gritty, but also information about the very good, very usable defenses that exist today. I&#8217;m confident that&#8217;ll go a long way in helping high-risk individuals secure themselves and continue to do their work safely. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[New report provides recommendations for CISA's High-Risk Community Protection initiative]]></title><description><![CDATA[Last year, the U.S.]]></description><link>https://www.glitchcat.xyz/p/new-report-provides-recommendations</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/new-report-provides-recommendations</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Wed, 21 Feb 2024 20:07:08 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a3383d5b-9aee-4006-88a7-1d9e8e2670a4_399x267.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IyqY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f7cf-6ec2-48a5-98ff-4eefe4449e4e_3046x2036.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IyqY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f7cf-6ec2-48a5-98ff-4eefe4449e4e_3046x2036.jpeg 424w, https://substackcdn.com/image/fetch/$s_!IyqY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f7cf-6ec2-48a5-98ff-4eefe4449e4e_3046x2036.jpeg 848w, https://substackcdn.com/image/fetch/$s_!IyqY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f7cf-6ec2-48a5-98ff-4eefe4449e4e_3046x2036.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!IyqY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f7cf-6ec2-48a5-98ff-4eefe4449e4e_3046x2036.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IyqY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f7cf-6ec2-48a5-98ff-4eefe4449e4e_3046x2036.jpeg" width="1456" height="973" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c113f7cf-6ec2-48a5-98ff-4eefe4449e4e_3046x2036.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:973,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1989366,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IyqY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f7cf-6ec2-48a5-98ff-4eefe4449e4e_3046x2036.jpeg 424w, https://substackcdn.com/image/fetch/$s_!IyqY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f7cf-6ec2-48a5-98ff-4eefe4449e4e_3046x2036.jpeg 848w, https://substackcdn.com/image/fetch/$s_!IyqY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f7cf-6ec2-48a5-98ff-4eefe4449e4e_3046x2036.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!IyqY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc113f7cf-6ec2-48a5-98ff-4eefe4449e4e_3046x2036.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo: The United States Capitol by Wally Gobetz.</figcaption></figure></div><p>Last year, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) asked the <a href="https://www.cisa.gov/resources-tools/groups/cisa-cybersecurity-advisory-committee">Cybersecurity Advisory Committee</a> (CSAC) and the <a href="https://www.cisa.gov/sites/default/files/2023-06/CSAC_Subcommittee_Fact-Sheet_2023-06-27_508.pdf">Technical Advisory Council</a> (TAC) subcommittee, chaired by Jeff Moss, to write a report with recommendations for its <a href="https://www.dhs.gov/news/2023/03/30/secretary-mayorkas-discusses-new-us-efforts-counter-spread-digital-authoritarianism">High-Risk Community Protection</a> initiative. I&#8217;ve been part of the Technical Advisory Council since 2022 and contributed to the report, which you can read <a href="https://www.cisa.gov/sites/default/files/2023-09/CSAC_TAC-Recommendations_20230913_508_0.pdf">here</a>. Earlier this month, I <a href="https://www.glitchcat.xyz/p/norway-stands-up-for-high-risk-communities">wrote</a> about how CISA&#8217;s partner in Norway, the Norwegian National Security Authority (NSM), supports high-risk communities through a project called Operation Pro Bono. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Norway stands up for high-risk communities with Operation Pro Bono]]></title><description><![CDATA[Over the last few years, Norway has actively participated in domestic and international efforts to combat election interference; prevent the proliferation of commercial spyware; and defend civil society groups under threat of transnational repression]]></description><link>https://www.glitchcat.xyz/p/norway-stands-up-for-high-risk-communities</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/norway-stands-up-for-high-risk-communities</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Sun, 11 Feb 2024 16:37:03 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/63bc0c5b-3011-4ab3-9c1c-686c6c2ca717_1050x663.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ttAK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70aacb13-e356-4ba9-b568-7f53426c6a21_1653x1006.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ttAK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70aacb13-e356-4ba9-b568-7f53426c6a21_1653x1006.png 424w, https://substackcdn.com/image/fetch/$s_!ttAK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70aacb13-e356-4ba9-b568-7f53426c6a21_1653x1006.png 848w, https://substackcdn.com/image/fetch/$s_!ttAK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70aacb13-e356-4ba9-b568-7f53426c6a21_1653x1006.png 1272w, https://substackcdn.com/image/fetch/$s_!ttAK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70aacb13-e356-4ba9-b568-7f53426c6a21_1653x1006.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ttAK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70aacb13-e356-4ba9-b568-7f53426c6a21_1653x1006.png" width="1456" height="886" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/70aacb13-e356-4ba9-b568-7f53426c6a21_1653x1006.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:886,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3552688,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ttAK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70aacb13-e356-4ba9-b568-7f53426c6a21_1653x1006.png 424w, https://substackcdn.com/image/fetch/$s_!ttAK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70aacb13-e356-4ba9-b568-7f53426c6a21_1653x1006.png 848w, https://substackcdn.com/image/fetch/$s_!ttAK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70aacb13-e356-4ba9-b568-7f53426c6a21_1653x1006.png 1272w, https://substackcdn.com/image/fetch/$s_!ttAK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70aacb13-e356-4ba9-b568-7f53426c6a21_1653x1006.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo: copied from NSM&#8217;s Facebook page w/<a href="https://www.facebook.com/photo/?fbid=494793159356618&amp;set=ecnf.100064778136906">episode</a> about Operation Pro Bono.</figcaption></figure></div><p>Over the last few years, Norway has actively participated in domestic and international efforts to combat <a href="https://www.regjeringen.no/no/dokumentarkiv/regjeringen-solberg/aktuelt-regjeringen-solberg/kmd/pressemeldinger/2021/tiltak-for-a-hindre-uonsket-pavirkning-i-valget/id2854721/">election interference</a>; prevent the proliferation of <a href="https://www.state.gov/export-controls-and-human-rights-initiative-code-of-conduct-released-at-the-summit-for-democracy/">commercial spyware</a>; and defend civil society groups under threat of <a href="https://www.cisa.gov/news-events/news/joint-statement-strategic-dialogue-cybersecurity-civil-society-under-threat-transnational-repression">transnational repression</a>. Documents obtained through a public records request last week illustrate how the Norwegian National Security Authority (NSM) has supported elected officials, political parties, and non-profit organizations since early 2017.&nbsp;</p><p>In an email to the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in September, following a discussion about existing initiatives to protect high-risk communities, NSM detailed its own efforts and takeaways NSM reached out to elected officials and political parties ahead of the general election in 2017. The purpose of the outreach, according to NSM, was not to tell anyone what to do or how to work, but simply to offer guidance on digital security, general risks and threats, and to raise awareness. The agency has had &#8220;an ongoing dialogue with the parties&#8221; since then, with &#8220;an extra effort ahead of the elections in 2019 and 2021.&#8221; (And in <a href="https://www.regjeringen.no/no/aktuelt/regjeringa-lanserer-tiltaksplan-for-a-sikre-valet/id2983730/">2024</a>.)</p><p>In March 2021, NSM launched a new effort dedicated to civil society organizations titled &#8220;Operation Pro Bono.&#8221; The agency modeled this project after the election dialogues, with the same focus on security best practice and awareness. Sharing how the agency selected which organizations to reach out to, NSM wrote &#8220;[t]he main criterion for the selection was voluntary organizations which are of great importance to society and which must be expected to be of interest to foreign state threat actors.&#8221;</p><p>NSM said it received &#8220;an immediate and positive response&#8221; from 16 organizations.</p><p>The agency wrote that &#8220;all organizations wanted to meet&#8221; and &#8220;there has been a consistently light and free tone, even though the themes are of course serious.&#8221; The topics covered include information about NSM, general risks and threats, security culture and behavior, travel, mobile, and social media. (I hope this project continues with a <a href="https://www.glitchcat.xyz/p/how-china-targets-civil-society-abroad">holistic approach</a> and mention of free tools for high-risk individuals, such as Apple&#8217;s <a href="https://www.glitchcat.xyz/p/four-things-to-know-about-lockdown">Lockdown Mode</a>.)</p><p>In early September, CISA&#8217;s advisory council/committee delivered a <a href="https://www.cisa.gov/sites/default/files/2023-09/CSAC_TAC-Recommendations_20230913_508_0.pdf">report</a> with recommendations for the agency&#8217;s High-Risk Community Protection (HRCP) initiative. (I contributed to this report.) Among other things, the report encourages CISA to engage directly with high-risk communities, individuals who have been targeted by nation states, and those who support them. Doing so will help CISA learn more about their concerns and needs &#8211; and how the agency can best assist them. NSM told CISA that its outreach helped convince a board to prioritize the implementation of two-factor authentication.</p><p>Reflecting on the impact of Operation Pro Bono, NSM said that &#8220;[m]any of the organizations have been surprisingly open about their security challenges. In one case, the general manager was able to say that our planned visit was what made the board finally agree that the organization should adopt multi-factor authentication. Professionals in the organization had recommended this for a long time, but did not gain traction.&#8221;</p><p>NSM found that while &#8220;safety is high on the agenda,&#8221; the organizations &#8220;have varying degrees of resources and expertise to improve security.&#8221; I&#8217;m not surprised, I&#8217;ve seen the same in <a href="https://techcrunch.com/2022/07/15/granitt-journalist-security/">my work</a> with high-risk groups over the years. Civil society organizations frequently have to do a whole lot with very little. (I&#8217;ve also <a href="https://www.glitchcat.xyz/p/too-many-articles-about-spyware-lack">written</a> about the need for more guidance for high-risk communities.)</p><p>In a statement published in late September, CISA highlighted that the U.S., U.K., and Norway have all established initiatives dedicated to securing high-risk communities. Other nations have invested in security awareness campaigns and training materials for society as a whole. According to the agency, <a href="https://www.itvaatlik.ee/">Estonia</a>, Canada, <a href="https://www.ownyouronline.govt.nz/">New Zealand</a>, and Australia aim to reach high-risk communities &#8220;by translating materials into multiple languages which reflect the diversity of each country.&#8221;&nbsp;</p><p>NSM, for its part, concluded that its outreach in Norway was a success.&nbsp;</p><p>&#8220;Operation Pro-Bono is a low-cost offer from NSM which, judging by the feedback, provides significant value for the organizations we have visited.&#8221; </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Death in Ice Valley: an unidentified body, abandoned suitcases, and unmarked cosmetics]]></title><description><![CDATA[The story of the woman found dead in Isdalen near Bergen, Norway in November 1970 has been told through countless articles, a documentary, and a podcast. The body, found by two young girls and their father out on a Sunday hike, had been exposed to strong heat and had considerable burns. The labels on her clothes had been removed and trademarks scrubbed from items at the scene. When police located her suitcases three days later, they found more of the same: clothes without tags, cosmetics without labels. The investigation also turned up a]]></description><link>https://www.glitchcat.xyz/p/death-in-ice-valley-an-unidentified</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/death-in-ice-valley-an-unidentified</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Wed, 07 Feb 2024 19:58:57 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b960318b-19da-46d1-be51-6741f55f8b96_857x809.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pRZI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11d091ac-24c1-43b9-9827-0c633c53d02a_1092x1097.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pRZI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11d091ac-24c1-43b9-9827-0c633c53d02a_1092x1097.png 424w, https://substackcdn.com/image/fetch/$s_!pRZI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11d091ac-24c1-43b9-9827-0c633c53d02a_1092x1097.png 848w, https://substackcdn.com/image/fetch/$s_!pRZI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11d091ac-24c1-43b9-9827-0c633c53d02a_1092x1097.png 1272w, https://substackcdn.com/image/fetch/$s_!pRZI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11d091ac-24c1-43b9-9827-0c633c53d02a_1092x1097.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pRZI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11d091ac-24c1-43b9-9827-0c633c53d02a_1092x1097.png" width="1092" height="1097" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/11d091ac-24c1-43b9-9827-0c633c53d02a_1092x1097.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1097,&quot;width&quot;:1092,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:716182,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pRZI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11d091ac-24c1-43b9-9827-0c633c53d02a_1092x1097.png 424w, https://substackcdn.com/image/fetch/$s_!pRZI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11d091ac-24c1-43b9-9827-0c633c53d02a_1092x1097.png 848w, https://substackcdn.com/image/fetch/$s_!pRZI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11d091ac-24c1-43b9-9827-0c633c53d02a_1092x1097.png 1272w, https://substackcdn.com/image/fetch/$s_!pRZI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11d091ac-24c1-43b9-9827-0c633c53d02a_1092x1097.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo obtained by Runa Sandvik through the Freedom of Information Act.</figcaption></figure></div><p>The story of the woman found dead in Isdalen near Bergen, Norway in November 1970 has been told through countless <a href="https://www.nrk.no/isdal/">articles</a>, a <a href="https://tv.nrk.no/serie/gaaten-i-isdalen">documentary</a>, and a <a href="https://www.bbc.co.uk/programmes/p060ms2h">podcast</a>. The body, found by two young girls and their father out on a Sunday hike, had been exposed to strong heat and had considerable burns. The labels on her clothes had been removed and trademarks scrubbed from items at the scene. When police located her suitcases three days later, they found more of the same: clothes without tags, cosmetics without labels. The investigation also turned up a <a href="https://www.bbc.co.uk/programmes/articles/1DWWslfP8RKW5TpBfXg67q2/the-coded-notepad">coded notepad</a> and <a href="https://www.bbc.co.uk/programmes/articles/3WRb0vGRSrgpZXW8nvskB11/the-isdal-womans-many-identities">multiple identities</a>, some <a href="https://www.nrk.no/dokumentar/xl/her-er-den-hemmelige-isdals-mappen-1.13191844">wondered</a> if she may have been a spy.</p><p>More than 50 years later, the authorities still don&#8217;t know who she was or what she was doing in Bergen. But records obtained through the Freedom of Information Act last month show that the police in Oslo requested assistance from the U.S. Federal Bureau of Investigation in identifying the unmarked cosmetics found in the woman&#8217;s suitcase.&nbsp;</p><p>Two months into the investigation, the Central Criminal Police in Oslo wrote a letter to the FBI with background information and &#8220;two photographs of cosmetic tubes found in the luggage of the unknown subject.&#8221; The response, sent a few weeks later, was disappointing: &#8220;[e]fforts were made to identify the cosmetic containers shown in the color photographs by examination of the photographs and by exhibiting them to cosmetics buyers in the three largest Washington, D.C. department stores. None of the individuals contacted were able to identify the containers.&#8221;</p><p>But one of the buyers pointed out that many cosmetic products are packaged by firms in New York. Perhaps the bureau could speak to someone there? &#8220;It was suggested that the company of the magazine &#8216;Beauty Fashion&#8217; at 60 East 42nd Street, New York, should be able to furnish information regarding the companies that do packaging for cosmetic products since many of these companies advertise in this magazine.&#8221;</p><p>And so the the two color photographs and a copy of the letter from Oslo was sent from Washington, D.C. to New York.</p><p>In early March 1971, New York reported that contacts were made at Beauty Fashion, Garrett Hewitt International, and Kolmar Cosmetic Specialities. &#8220;The results were negative.&#8221; A special agent spoke with two individuals at Beauty Fashion and Kolmar who &#8220;advised that, in their opinion, the cosmetics in question were not produced in the United States.&#8221; They both &#8220;expressed their puzzlement as to why the labels were scratched&#8221; off.&nbsp;</p><p>A third individual said their &#8220;reaction upon seeing that the labels were removed was that the victim may have had a business interest in cosmetics and was given the cosmetics as samples for analysis.&#8221; The individual from Kolmar &#8220;advanced the theory that possibly the victim removed the labels to avoid having it become known that she had been in a particular country, perhaps one behind the Iron Curtain.&#8221;&nbsp;</p><p>The origins of the cosmetics remains unknown, though plenty of theories have surfaced in the <a href="https://www.facebook.com/groups/548643892172164/">Death in Ice Valley</a> group on Facebook. Perhaps the bottles are from an airline or a hotel? If you happen to know more, I&#8217;d love to hear about it.&nbsp;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Spyware are still having a ‘ball’ despite a decade of warnings]]></title><description><![CDATA[On November 7, Binding Hook published an article by Sophie in &#8216;t Veld arguing that spyware is a clear and present danger to our democracies.]]></description><link>https://www.glitchcat.xyz/p/spyware-are-still-having-a-ball-despite</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/spyware-are-still-having-a-ball-despite</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Tue, 28 Nov 2023 13:28:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lj-E!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2419615f-0b6d-42b3-bf2c-f3cd526a460c_922x922.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lj-E!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2419615f-0b6d-42b3-bf2c-f3cd526a460c_922x922.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lj-E!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2419615f-0b6d-42b3-bf2c-f3cd526a460c_922x922.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lj-E!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2419615f-0b6d-42b3-bf2c-f3cd526a460c_922x922.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lj-E!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2419615f-0b6d-42b3-bf2c-f3cd526a460c_922x922.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lj-E!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2419615f-0b6d-42b3-bf2c-f3cd526a460c_922x922.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lj-E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2419615f-0b6d-42b3-bf2c-f3cd526a460c_922x922.jpeg" width="922" height="922" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2419615f-0b6d-42b3-bf2c-f3cd526a460c_922x922.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:922,&quot;width&quot;:922,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:89382,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lj-E!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2419615f-0b6d-42b3-bf2c-f3cd526a460c_922x922.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lj-E!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2419615f-0b6d-42b3-bf2c-f3cd526a460c_922x922.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lj-E!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2419615f-0b6d-42b3-bf2c-f3cd526a460c_922x922.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lj-E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2419615f-0b6d-42b3-bf2c-f3cd526a460c_922x922.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by Binding Hook, created with the assistance of Midjourney.</figcaption></figure></div><p>On November 7, Binding Hook published an <a href="https://bindinghook.com/articles-binding-edge/spyware-could-destroy-our-democracies/">article</a> by Sophie in &#8216;t Veld arguing that spyware is a clear and present danger to our democracies. Having led the European Parliament&#8217;s yearlong <a href="https://www.europarl.europa.eu/committees/en/pega/home/highlights">investigation</a> into spyware, in &#8216;t Veld is well acquainted with the tools and their impact on victims around the world, not to mention the vendors, the NGOs who expose them, and the actors who knowingly spread disinformation about their research. </p><p>In &#8216;t Veld says that the only upside to this spyware debacle &#8220;is that it is covered with the correct amount of urgency by some of the finest journalists in Europe.&#8221;</p><p>&#8220;With many parliaments unaware of the problem and courts too slow or unable to push back, much now depends on the Fourth Estate. It is up to the press to keep the fire burning until more politicians wake up to the danger&#8221;, she writes.</p><p>But the fire has been burning for over a decade and not much has been done to curb the threat, despite the efforts of numerous journalists, technologists, and security researchers. I wrote more about that in an article for Binding Hook, published this morning. You can read it <a href="https://bindinghook.com/articles-hooked-on-trends/spyware-are-still-having-a-ball-despite-a-decade-of-warnings/">here</a>. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[NSO continues its outreach to U.S. officials, including Secretary of State Antony Blinken]]></title><description><![CDATA[On November 10, The Intercept reported that NSO Group is demanding an urgent meeting with U.S.]]></description><link>https://www.glitchcat.xyz/p/nso-continues-its-outreach-to-us</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/nso-continues-its-outreach-to-us</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Thu, 16 Nov 2023 17:26:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!VVo_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37142388-1da2-47c6-a1a9-f3446f9e0393_3840x2160.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VVo_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37142388-1da2-47c6-a1a9-f3446f9e0393_3840x2160.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VVo_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37142388-1da2-47c6-a1a9-f3446f9e0393_3840x2160.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VVo_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37142388-1da2-47c6-a1a9-f3446f9e0393_3840x2160.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VVo_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37142388-1da2-47c6-a1a9-f3446f9e0393_3840x2160.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VVo_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37142388-1da2-47c6-a1a9-f3446f9e0393_3840x2160.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VVo_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37142388-1da2-47c6-a1a9-f3446f9e0393_3840x2160.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/37142388-1da2-47c6-a1a9-f3446f9e0393_3840x2160.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1009051,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VVo_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37142388-1da2-47c6-a1a9-f3446f9e0393_3840x2160.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VVo_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37142388-1da2-47c6-a1a9-f3446f9e0393_3840x2160.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VVo_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37142388-1da2-47c6-a1a9-f3446f9e0393_3840x2160.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VVo_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37142388-1da2-47c6-a1a9-f3446f9e0393_3840x2160.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo: Eddie Gerald / Alamy Stock Photo.</figcaption></figure></div><p>On November 10, The Intercept <a href="https://theintercept.com/2023/11/10/nso-group-israel-gaza-blacklist/">reported</a> that NSO Group is demanding an urgent meeting with U.S. Secretary of State Antony Blinken. Days earlier, Timothy Dickinson &#8211; a partner with the Los Angeles-based law firm Paul Hastings which represents NSO Group &#8211; sent an email and a letter to State Department officials, <a href="https://www.documentcloud.org/documents/24149725-paul-hastings-november-7-2023-urgent-request-for-meeting-with-antony-blinken">saying</a> he wants &#8220;to reaffirm the importance of NSO&#8217;s technology&#8221; and discuss &#8220;the importance of cyber intelligence technology in the wake of the grave security threats posed by the recent Hamas terrorist attacks in Israel and their aftermath.&#8221;</p><p>Dickinson, unsurprisingly, argues that &#8220;NSO&#8217;s technology is supporting the current global fight against terrorism in any and all forms.&#8221; There is no mention of the <a href="https://github.com/GranittHQ/data-pegasus-victims/blob/main/data-pegasus-victims.csv">hundreds</a> of cases of abuse of the company&#8217;s Pegasus spyware, though Dickinson touts the company&#8217;s &#8220;comprehensive, industry-leading human rights compliance program. In June 2021, NSO Group <a href="https://www.nsogroup.com/wp-content/uploads/2021/06/ReportBooklet.pdf">published</a> its &#8220;first annual transparency and responsibility report&#8221; &#8211; it appears to be the only one to date. (A month later, the company published a laughable response to the <a href="https://forbiddenstories.org/case/the-pegasus-project/">Pegasus Project</a>, a large-scale investigation into abuse of the Pegasus spyware, saying <a href="https://www.vice.com/en/article/v7exdx/nso-says-enough-is-enough-will-no-longer-talk-to-the-press-about-damning-reports">enough is enough</a>.)</p><p>In November 2021, the U.S. Commerce Department <a href="https://www.washingtonpost.com/technology/2021/11/03/pegasus-nso-entity-list-spyware/">blacklisted</a> NSO Group by adding it to the Entity List. Companies on this list are not completely prohibited from doing business in the U.S., but the designation makes it more difficult to do. The move came four years after Citizen Lab first <a href="https://citizenlab.ca/2017/06/reckless-exploit-mexico-nso/">reported</a> that Stephanie Brewer, an American lawyer in Mexico, had been targeted with the company&#8217;s Pegasus spyware.&nbsp;</p><p>The Commerce Department&#8217;s list was further enhanced with the <a href="https://www.washingtonpost.com/national-security/2023/07/18/entity-list-spyware-intellexa-cytrox/">addition</a> of Intellexa and Cytrox this summer. The two companies are known for developing and selling Predator, sophisticated spyware which, like Pegasus, has been <a href="https://github.com/GranittHQ/data-predator-victims/blob/main/data-predator-victims.csv">used</a> against journalists and politicians around the world. In March, The New York Times <a href="https://www.nytimes.com/2023/03/20/world/europe/greece-spyware-hacking-meta.html">reported</a> that Predator had been used to target Artemis Seaford, a dual U.S.-Greek national working for Meta at the time of the attack.&nbsp;</p><p>In December 2021, at the first <a href="https://www.state.gov/summit-for-democracy/">Summit for Democracy</a>, the United States, Australia, Denmark and Norway announced the <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2021/12/10/fact-sheet-export-controls-and-human-rights-initiative-launched-at-the-summit-for-democracy/">Export Controls and Human Rights Initiative</a> to counter misuse of technology that violates human rights. In a joint <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2021/12/10/joint-statement-on-the-export-controls-and-human-rights-initiative/">statement</a>, the countries committed to &#8220;establish a voluntary, nonbinding written code of conduct around which like-minded states could politically pledge to use export control tools to prevent the proliferation of software and other technologies used to enable serious human rights abuses.&#8221;</p><p>The first version of the <a href="https://www.state.gov/export-controls-and-human-rights-initiative-code-of-conduct-released-at-the-summit-for-democracy/">code of conduct</a> was released in March, endorsed by more than twenty governments. (As I noted in <a href="https://www.glitchcat.xyz/p/north-macedonia-endorses-human-rights">June</a>, this includes North Macedonia &#8211; home to Cytrox and the Predator spyware.) At the same time, President Biden signed an <a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2023/03/27/executive-order-on-prohibition-on-use-by-the-united-states-government-of-commercial-spyware-that-poses-risks-to-national-security/">Executive Order</a> restricting American government use of commercial spyware that could pose national security risks or be misused to imperil human rights globally.</p><p>Last week, Eileen C. Donaho, the State Department's Special Envoy and Coordinator for Digital Freedom in the Bureau of Cyberspace and Digital Policy, participated in an event at the Paris Peace Forum titled &#8220;Unpacking the Cyber Mercenaries' Phenomenon." On X, the department <a href="https://twitter.com/StateCDP/status/1724173818124456190">said</a> Donaho &#8220;laid out the &#127482;&#127480;&#8217;s unprecedented, government-wide effort to counter the misuse and proliferation of commercial spyware.&#8221;</p><p>Ever since the first Summit for Democracy, lawyers for NSO Group have argued &#8211; to lawmakers in both the U.S. and the <a href="https://www.whatdotheyknow.com/request/communications_with_nso_group_re#incoming-2419878">U.K.</a> &#8211; that the company &#8220;has much to contribute to policy discussions.&#8221;&nbsp;</p><p>When Politico asked me if it&#8217;s morally dubious or wrong for NSO to be leveraging the war to ask the U.S. for sanctions relief, I <a href="https://www.politico.com/newsletters/politico-influence/2023/11/15/blacklisted-spyware-firm-gaza-00127445">said</a> the company &#8220;will use every chance it gets to lobby&#8221; and &#8220;it should come as no surprise that the company is now leveraging the war for this purpose.&#8221;&nbsp;</p><p>In response to my comment, an unnamed person &#8220;working with NSO Group&#8221; said it was &#8220;frankly offensive.&#8221; But what&#8217;s offensive is the company&#8217;s continued collaboration with authorities which repeatedly abuse Pegasus to target civil society &#8211; individuals who have no recourse and little to no ability to defend themselves.&nbsp;</p><p>NSO likes to think of itself as an upstanding surveillance vendor, but has shown no desire to reckon with the harms it has caused since at least since 2014. A senior administration official told Politico that &#8220;revelations of misuse, specifically of NSO group software, have &#8230; continued unabated&#8221; since the Executive Order. At this rate, it&#8217;s looking like the company will remain on the government&#8217;s naughty list for quite some time.&nbsp;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[11 states offer address confidentiality to abortion providers, patients, and their family members]]></title><description><![CDATA[A number of states expanded protections for abortion providers and patients in the past year, following the June 2022 U.S.]]></description><link>https://www.glitchcat.xyz/p/11-states-offer-address-confidentiality</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/11-states-offer-address-confidentiality</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Wed, 15 Nov 2023 15:23:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!TvLF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb228a507-7b3c-4621-a65c-4151a1fc1f50_4302x2868.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TvLF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb228a507-7b3c-4621-a65c-4151a1fc1f50_4302x2868.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TvLF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb228a507-7b3c-4621-a65c-4151a1fc1f50_4302x2868.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TvLF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb228a507-7b3c-4621-a65c-4151a1fc1f50_4302x2868.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TvLF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb228a507-7b3c-4621-a65c-4151a1fc1f50_4302x2868.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TvLF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb228a507-7b3c-4621-a65c-4151a1fc1f50_4302x2868.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TvLF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb228a507-7b3c-4621-a65c-4151a1fc1f50_4302x2868.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b228a507-7b3c-4621-a65c-4151a1fc1f50_4302x2868.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1071017,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TvLF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb228a507-7b3c-4621-a65c-4151a1fc1f50_4302x2868.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TvLF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb228a507-7b3c-4621-a65c-4151a1fc1f50_4302x2868.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TvLF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb228a507-7b3c-4621-a65c-4151a1fc1f50_4302x2868.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TvLF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb228a507-7b3c-4621-a65c-4151a1fc1f50_4302x2868.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">New York Governor Kathy Hochul, June 2022, NurPhoto SRL / Alamy Stock Photo.</figcaption></figure></div><p>A number of states expanded protections for abortion providers and patients in the past year, following the June 2022 U.S. Supreme Court decision which removed the constitutional right to abortion. While shield laws to protect doctors and abortion medication have received plenty of attention, as noted by <a href="https://jessica.substack.com/">Abortion, Every Day</a>, a seemingly underreported development is the expansion of address confidentiality programs to include those providing and receiving reproductive or gender-affirming care &#8211; as well as their family members.</p><p>Address confidentiality programs allow eligible participants to receive mail at a confidential address, while keeping their actual address undisclosed. This protects not only your driver&#8217;s license, but your voter registration too. A review of programs across the U.S. shows that 11 states offer address confidentiality to at least some groups of protected healthcare providers and patients: <a href="https://www.sos.ca.gov/registries/safe-home/applicants">California</a>, <a href="https://delcode.delaware.gov/title11/c096/sc02/index.html">Delaware</a>, <a href="https://sos.maryland.gov/ACP/Pages/default.aspx">Maryland</a>, <a href="https://www.sec.state.ma.us/divisions/acp/address-confidentiality-program.htm">Massachusetts</a>, <a href="https://www.michigan.gov/ag/initiatives/address-confidentiality">Michigan</a>, <a href="https://www.sos.state.mn.us/safe-at-home/enroll-in-safe-at-home/eligibility/">Minnesota</a>, <a href="https://www.nj.gov/dcf/women/acp/">New Jersey</a>, <a href="https://www.governor.ny.gov/news/governor-hochul-signs-nation-leading-legislative-package-protect-abortion-and-reproductive">New York</a>, <a href="https://sos.vermont.gov/secretary-of-state-services/safe-at-home/">Vermont</a>, <a href="https://www.atg.wa.gov/reproductive-and-gender-affirming-care-shielding-providers-seekers-and-helpers-out-state-legal">Washington</a>, and <a href="https://www.doj.state.wi.us/ocvs/safe-home">Wisconsin</a>.&nbsp;</p><p>While some states specifically mention address confidentiality for those providing or seeking reproductive or gender-affirming health care services, others are more broad and stating that the program is available to &#8220;those who simply fear for their physical safety.&#8221; A few offer protections for election workers too.&nbsp;</p><p>Earlier this year, the National Abortion Federation <a href="https://prochoice.org/wp-content/uploads/2022-VD-Report-FINAL.pdf">reported</a> seeing a &#8220;sharp increase&#8221; in violence at abortion clinics in 2022, the year when Roe v. Wade was overturned. The federation said that &#8220;a disproportionate increase occurred in states that protect abortion rights.&#8221; Some attacks result in prosecutions by the Justice Department, which has a web <a href="https://www.justice.gov/crt/recent-cases-violence-against-reproductive-health-care-providers">page</a> dedicated to recent cases on violence against reproductive health care providers.&nbsp;</p><p>Justin Sherman spoke at length about the links between public records, data brokers, stalking and gendered violence on the <a href="https://www.lawfaremedia.org/article/the-lawfare-podcast-data-brokers-public-records-and-violence-with-justin-sherman">Lawfare Podcast</a> earlier this month. While such records have helped the online <a href="https://www.hachettebookgroup.com/titles/ryan-j-reilly/sedition-hunters/9781541701809/">sleuths</a> tracking down participants in the January 6th attack, they present a significant risk to the safety of doctors, nurses, election workers, and journalists. Female journalists have shared on social media that they don&#8217;t vote because doing so would make their home address available on people search sites. </p><p>I truly hope lawmakers soon wake up to the threat posed to at-risk individuals by data brokers, including the availability of voter registration records. In the meantime, let&#8217;s make sure those who qualify for existing address confidentiality programs are aware of their existence.&nbsp;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[How China targets civil society abroad]]></title><description><![CDATA[Last month, the U.S.]]></description><link>https://www.glitchcat.xyz/p/how-china-targets-civil-society-abroad</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/how-china-targets-civil-society-abroad</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Mon, 13 Nov 2023 13:04:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!OzKN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8868616a-0f75-4048-8510-6fd5c2c1c378_4992x3328.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OzKN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8868616a-0f75-4048-8510-6fd5c2c1c378_4992x3328.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OzKN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8868616a-0f75-4048-8510-6fd5c2c1c378_4992x3328.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OzKN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8868616a-0f75-4048-8510-6fd5c2c1c378_4992x3328.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OzKN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8868616a-0f75-4048-8510-6fd5c2c1c378_4992x3328.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OzKN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8868616a-0f75-4048-8510-6fd5c2c1c378_4992x3328.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OzKN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8868616a-0f75-4048-8510-6fd5c2c1c378_4992x3328.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8868616a-0f75-4048-8510-6fd5c2c1c378_4992x3328.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2748338,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OzKN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8868616a-0f75-4048-8510-6fd5c2c1c378_4992x3328.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OzKN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8868616a-0f75-4048-8510-6fd5c2c1c378_4992x3328.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OzKN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8868616a-0f75-4048-8510-6fd5c2c1c378_4992x3328.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OzKN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8868616a-0f75-4048-8510-6fd5c2c1c378_4992x3328.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Free Hong Kong student protest, London, 2019. Stephen Power / Alamy Stock Photo.</figcaption></figure></div><p>Last month, the U.S. Department of Defense released its <a href="https://media.defense.gov/2023/Oct/19/2003323409/-1/-1/1/2023-MILITARY-AND-SECURITY-DEVELOPMENTS-INVOLVING-THE-PEOPLES-REPUBLIC-OF-CHINA.PDF">annual report</a> on China&#8217;s military and its role in China&#8217;s broader foreign policy. The 212-page report details developments in the past year, such as <a href="https://www.washingtonpost.com/national-security/2023/10/19/china-military-power-report-nuclear/">rapid advances</a> in Beijing&#8217;s plan to build a nuclear weapons arsenal. But, as The Washington Post <a href="https://www.washingtonpost.com/politics/2023/10/20/what-chinese-invasion-taiwan-could-look-like-cyberspace/">noted</a>, the report &#8220;also gives significant attention to China&#8217;s cyber capabilities&#8221; and what this could mean for a potential invasion of Taiwan.</p><p>The Defense Department said the People&#8217;s Republic of China (PRC) &#8220;has publicly identified cyberspace as a critical domain for national security and declared its intent to expedite the development of its cyber forces.&#8221;&nbsp;</p><p>The department went on to stress that China&#8217;s armed forces, the People&#8217;s Liberation Army (PLA) &#8220;could also conduct a range of cyberspace, blockade, and kinetic campaigns designed to force Taiwan to capitulate to unification or compel Taiwan&#8217;s leadership to the negotiation table on the PRC&#8217;s terms.&#8221;</p><p>Sadly, neither the Defense Department&#8217;s report nor The Post&#8217;s newsletter said much about how these developments may impact civil society abroad.</p><p>A lot has been written about China&#8217;s high-tech oppression of its own people, including constant <a href="https://citizenlab.ca/2020/05/we-chat-they-watch/">monitoring</a> and <a href="https://www.politico.com/news/magazine/2020/09/01/china-great-firewall-generation-405385">control</a> of digital communications, persistent <a href="https://www.nytimes.com/interactive/2019/11/16/world/asia/china-xinjiang-documents.html">crackdown of ethnic minorities</a> with <a href="https://www.technologyreview.com/2021/05/06/1024621/china-apple-spy-uyghur-hacker-tianfu/">sophisticated exploits</a> and <a href="https://theintercept.com/2021/01/29/china-uyghur-muslim-surveillance-police/">suffocating surveillance</a>, and <a href="https://www.wsj.com/articles/china-is-now-sending-twitter-users-to-prison-for-posts-most-chinese-cant-see-11611932917">mass arrests</a> of those who use social media to criticize Chinese leader Xi Jinping and his government.</p><p>But what do we know about China&#8217;s tactics beyond its borders? As it turns out, quite a bit.</p><p>The Chinese government demonstrated sophistication, skill, and appetite for revenge when its hackers persistently <a href="https://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html">attacked</a> The New York Times in 2012, following an <a href="https://www.nytimes.com/2012/10/26/business/global/family-of-wen-jiabao-holds-a-hidden-fortune-in-china.html">investigation</a> into the financial wherewithal of the Chinese prime minister&#8217;s family. In the days following The Times&#8217;s article about the hack, Bloomberg News, <a href="https://www.nytimes.com/2013/02/01/technology/wall-street-journal-reports-attack-by-china-hackers.html">The Wall Street Journal</a>, and <a href="https://www.washingtonpost.com/business/technology/chinese-hackers-suspected-in-attack-on-the-posts-computers/2013/02/01/d5a44fde-6cb1-11e2-bd36-c0fe61a205f6_story.html">The Washington Post</a> all said they too had been attacked by China. (Less than two months later, Mandiant published its now infamous <a href="https://www.lawfaremedia.org/article/mandiant-report-apt1">report</a> on APT1, a cyber espionage group linked to the PLA.)</p><p>In the years since, the threats against civil society have increased in both severity and scope. Attacks which were once reserved for China&#8217;s long-term, strategic goals may now be launched against anyone criticizing Beijing from anywhere in the world &#8211; impacting their physical, digital, emotional, and legal safety. In the past three years alone, China has targeted people outside of the country with impersonation, intimidation, mis- and disinformation, and attacks using DDoS, phishing, and malware.</p><p>Earlier this year, Reuters <a href="https://www.reuters.com/business/media-telecom/reuters-reporters-online-accounts-faked-approach-china-activists-2023-02-28/">reported</a> that someone was impersonating two of its journalists on social media to engage with Chinese activists. The accounts, which first appeared on Instagram and Telegram in November, posed as Shanghai bureau chief Brenda Goh and Hong Kong-based correspondent Jessie Pang. In at least one instance, the impersonator attempted to build trust by sharing a photo of Pang&#8217;s expired press ID. While Reuters said it &#8220;could not ascertain who was behind the fake journalist personas,&#8221; an administrator of Citizens Daily, a pro-democracy social media account, said they &#8220;suspected Chinese state involvement in the impersonations.&#8221;</p><p>Not long after, three journalists working for The New York Times and The Wall Street Journal reported that someone had registered Telegram accounts with their Chinese phone numbers. While it&#8217;s not clear who created accounts for <a href="https://twitter.com/LiYuan6/status/1649290353172946944">Li Yuan</a>, <a href="https://twitter.com/Lingling_Wei/status/1649474285130465281">Lingling Wei</a> and <a href="https://twitter.com/xinwenfan/status/1649216416359526402">Wenxin Fan</a>, or what they did next, it shows that journalists reporting from and on China should keep an eye out for accounts posing as them on social media.</p><p>Last summer, London's Metropolitan Police briefly detained <a href="https://time.com/6205128/australian-activist-china-embassy-bomb-hoax-drew-pavlou/">Drew Pavlou</a>, an Australian student and human rights activist, for &#8220;communicating false information to make a bomb hoax.&#8221; Pavlou told TIME &#8220;the bomb hoax email came from the drewpavlou99@protonmail.me email address.&#8221; That email prefix &#8220;is identical to an account he has with gmail, which he says was hacked in January 2021 by someone using a Chinese IP address.&#8221;&nbsp;</p><p>In January, police officers in Melbourne arrested Andrew Phelan, a high-profile China watcher and commentator, after a woman said that she&#8217;d received an email from him threatening to rape and kill her. He hadn&#8217;t, but someone clearly wanted to send a message. </p><p>Jemimah Steinfeld, the editor-in-chief of Index on Censorship, <a href="https://newlinesmag.com/reportage/critics-of-beijing-face-increasing-impersonation-attacks/">wrote</a> that &#8220;Phelan is part of a new and growing club of people whose names and identities are being hijacked and used for nefarious purposes. It&#8217;s a disparate group stretching across the globe and contains activists, journalists, academics and lawyers. All are tied together by one common thread &#8212; they criticize China.&#8221;</p><p>In April, Volkskrant journalist Marije Vlaskamp <a href="https://www.volkskrant.nl/kijkverder/v/2023/how-a-volkskrant-reporter-became-the-target-of-chinese-intimidation~v691100/">shared</a> an even more elaborate impersonation plot. Bomb scares at Chinese embassies were made in her name in multiple European cities, including <a href="https://www.aftenposten.no/verden/i/Momb1M/da-telefonen-ringte-fra-oslo-ble-21-aaringen-satt-ut-de-sier-at-du-har-en-bombe">Oslo</a> and The Hague. The areas were cordoned off and traffic diverted to keep cars, buses, and trams away. The newspaper said this may be &#8220;the first time that unknown persons are intimidating a Dutch journalist outside China on behalf of the Chinese state.&#8221;</p><p>Vlaskamp reported that someone attempted to use her phone number &#8220;to create various new accounts on Telegram and WhatsApp.&#8221; Threatening messages were sent to her source too, demanding that he shut down his social media and stop giving interviews.</p><p>Vlaskamp, a correspondent in Beijing for 18 years, said that she&#8217;s &#8220;learned enough to know how the Chinese operate if they want someone to shut up.&#8221;&nbsp;</p><p>There have been reports of Chinese actors impersonating organizations as well. Recorded Future spent three years tracking a long-running phishing campaign targeting humanitarian, think tank, and government organizations. The 11-page <a href="https://go.recordedfuture.com/hubfs/reports/ta-2022-0816.pdf">report</a>, published last year, said the actor had been &#8220;registering and weaponizing hundreds of domains spoofing organizations,&#8221; including Amnesty International and Radio Free Asia.</p><p>Recorded Future also highlighted that the actor has &#8220;displayed a particular interest in spoofing political, government, and think tank organizations in Taiwan,&#8221; such as the American Institute in Taiwan&#8211;the de facto U.S. embassy in Taipei.</p><p>In August 2020, authorities <a href="https://www.nytimes.com/2020/08/09/world/asia/hong-kong-arrests-lai-national-security-law.html">arrested</a> Jimmy Lai, founder of the now shut pro-democracy paper Apple Daily, for alleged collusion with foreign powers under the new national security law, as well as fraud. While preparing for his trial, Lai&#8217;s lawyers from British Doughty Street Chambers <a href="https://www.reuters.com/world/china/british-lawyers-defending-hong-kong-tycoon-say-they-receive-threats-2022-07-07/">said</a> they &#8220;received anonymous e-mails warning them against travelling to the city to defend him.&#8221; The messages, which were sent &#8220;from a generic Gmail address,&#8221; warned that the lawyers &#8220;could be extradited&#8230;from other jurisdictions&#8221; if they refused &#8220;to abide by the laws of the Hong Kong Special Administrative Region (HKSAR).&#8221;&nbsp;</p><p>"Threatening journalists, campaigners and lawyers within Hong Kong has been happening for some time," the lawyers told Reuters in an email.</p><p>A Hong Kong court <a href="https://www.cnn.com/2022/12/10/asia/jimmy-lai-hong-kong-prison-intl-hnk/index.html">sentenced</a> Lai to 69 months in prison for fraud last December. His trial on national security charges is still pending.</p><p>In September, Doughty Street Chambers <a href="https://www.doughtystreet.co.uk/news/un-secretary-general-uk-and-us-raise-concern-over-chinas-reprisals-against-jimmy-lais-son-and">shared</a> that while representing Jimmy Lai and his son Sebastian, its staff has been subjected to: &#8220;attempted online surveillance,&#8221; &#8220;repeated attempts to hack their e-mail accounts, devices and bank accounts, as well as impersonation e-mails &#8230; and emails threatening prosecution and extradition to HKSAR,&#8221; and &#8220;death threats, rape threats and threats to family members.&#8221;</p><p>A sarcastic <a href="https://twitter.com/GarlandNixon/status/1625945743000276995">post</a> on X about President Biden&#8217;s supposed &#8220;plan for the destruction of Taiwan&#8221; sparked a wave of misinformation in February when it was amplified by Chinese authorities and supporters of unification with China. The Wire <a href="https://www.thewirechina.com/2023/03/26/the-plan-to-destroy-taiwan-want-want-china-times-media-group/">said</a> that &#8220;a surprising number of people in Taiwan became utterly convinced that America is planning to destroy their island home.&#8221; The Ministry of Foreign Affairs even <a href="https://www.taipeitimes.com/News/taiwan/archives/2023/02/23/2003794893">commented</a>, saying &#8220;people should beware of false information designed to erode confidence in US commitments to defend Taiwan and damage Taiwan-US ties.&#8221;</p><p>Vincent Chao, a Taiwanese politician and former diplomat, <a href="https://podcast.silverado.org/episodes/why-taiwans-military-modernization-is-moving-too-slowly-eX41sPYe">told</a> Dmitri Alperovitch on Geopolitics Decanted that &#8220;it just became this whole layered approach to disinformation that allowed this whole thing to proliferate in Taiwanese society for days if not weeks.&#8221;&nbsp;</p><p>&#8220;These are things that happen all the time here in Taiwan,&#8221; Chao said, adding that &#8220;they exploit the free press, they exploit free speech, they exploit this idea of attaching nonsensical claims to people with purported legitimacy.&#8221;</p><p>Last year, Meta <a href="https://about.fb.com/wp-content/uploads/2022/10/CIB-Report_-China-Russia_Sept-2022-1-1.pdf">said</a> it had removed coordinated inauthentic behavior from China. The operation &#8220;targeted primarily the US and the Czech Republic.&#8221; The company said that this was the first network it disrupted &#8220;that focused on US domestic politics ahead of the midterm elections and Czechia&#8217;s foreign policy toward China and Ukraine.&#8221;&nbsp;</p><p>In January, Google <a href="https://blog.google/threat-analysis-group/over-50000-instances-of-dragonbridge-activity-disrupted-in-2022/">said</a> it &#8220;disrupted over 50,000 instances&#8221; of &#8220;a spammy influence network linked to China that has a presence across multiple platforms.&#8221; Microsoft later <a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW1aFyW">reported</a> seeing an increase in &#8220;effective audience engagement&#8221; from Chinese influence operations.</p><p>While big tech companies focus on shutting down accounts used for influence operations, the task of fact-checking and calling out mis- and disinformation often falls to journalists.&nbsp;</p><p>Marianna Spring, the BBC&#8217;s first disinformation correspondent, has <a href="https://www.theguardian.com/society/2023/sep/04/bbc-marianna-spring-violent-rhetoric-conspiracyland">openly shared</a> that in return for her work, she&#8217;s been &#8220;abused, slandered, threatened&#8221; (and, to be clear, she&#8217;s not alone.) In some cases, the online abuse hurled at her &#8220;contain physical threats,&#8221; which the BBC flag for further assessment. (Spring&#8217;s forthcoming book, <a href="https://atlantic-books.co.uk/book/among-the-trolls/">Among the Trolls: Notes from the Disinformation War</a>, elaborates on the risks that come with investigating mis- and disinformation.)</p><p>Ahead of House Speaker Nancy Pelosi&#8217;s visit to Taiwan in August last year, a series of DDoS attacks were launched at four key websites in the country, attempting to knock them offline: those of President Tsai Ing-wen, the National Defense Ministry, the Foreign Affairs Ministry and the country&#8217;s largest airport, Taiwan Taoyuan International. Doug Madory, director of internet analysis at Kentik, <a href="https://www.nbcnews.com/tech/security/taiwanese-websites-hit-ddos-attacks-pelosi-begins-visit-rcna41144">told</a> NBC News the attacks were &#8220;big enough to be effective but not record-breaking.&#8221; Researchers <a href="https://www.reuters.com/world/attacks-taiwan-websites-likely-work-chinese-hacktivists-researchers-2022-08-02/">said</a> the attacks were likely launched by Chinese activists rather than the Chinese government.&nbsp;</p><p>In July 2022, Proofpoint <a href="https://www.proofpoint.com/us/blog/threat-insight/above-fold-and-your-inbox-tracing-state-aligned-activity-targeting-journalists">reported</a> on how different state actors &#8211; including multiple Chinese actors &#8211; use phishing emails to target U.S. journalists. The researchers found that some of the emails contain web beacons designed to gather information about a journalist&#8217;s web browser and IP address, while others contain file attachments with malware. The report noted that one of the actors kicked off 2021 with targeting those covering U.S. politics, then &#8211; in the second half of the year &#8211; switched to targeting those &#8220;working cybersecurity, surveillance, and privacy issues with a focus on China.&#8221;</p><p>When China hacked The New York Times in 2012, it leveraged malware &#8220;that enabled them to gain entry to any computer on The Times&#8217;s network,&#8221; &#8220;stole the corporate passwords for every Times employee and used those to gain access to the personal computers of 53 employees.&#8221; China&#8217;s penchant for malware has only increased since then, <a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/">aided</a> by a law &#8211; passed two years ago &#8211; that requires discovered vulnerabilities to be reported to the federal government within 48 hours.</p><p>More recently, Volexity <a href="https://www.volexity.com/blog/2023/09/22/evilbamboo-targets-mobile-devices-in-multi-year-campaign/">identified</a> several long-running campaigns by a Chinese actor targeting Taiwanese individuals and organizations with fake Android applications containing malware. In August, ESET <a href="https://www.welivesecurity.com/en/eset-research/badbazaar-espionage-tool-targets-android-users-trojanized-signal-telegram-apps/">disclosed</a> that a Chinese actor had distributed &#8220;espionage code through the Google Play store, Samsung Galaxy Store, and dedicated websites representing the malicious apps Signal Plus Messenger and FlyGram.&#8221; ESET researcher Lukas Stefanko <a href="https://www.forbes.com/sites/thomasbrewster/2023/08/30/malicious-signal-app-planted-on-google-play-by-china-linked-cyber-spies/">told</a> Forbes that the fake Signal app was designed to &#8220;spy on communications of the real app.&#8221;</p><p>&#8220;The PRC is sitting on a stockpile of zero-day vulnerabilities,&#8221; Morgan Adamski, the director of the NSA&#8217;s Cybersecurity Collaboration Center, <a href="https://www.washingtonpost.com/politics/2023/11/10/nsa-officials-call-out-chinese-hackers-stealthy-off-limits-hacks/">told</a> the audience at CYBERWARCON last week.&nbsp;</p><p>&#8220;We know, through operations the last couple of years, that we are seeing an uptick in the amount of Chinese use of zero-day vulnerabilities to get into U.S. infrastructure, software and capabilities that we care about,&#8221; Adamski said.&nbsp;</p><p>In my <a href="https://drive.google.com/file/d/1c0xB35K8YDa7eroSiUUsl9sZN8RAkALI/view?usp=drivesdk">keynote</a> at ATT&amp;CKcon last month, I <a href="https://twitter.com/runasand/status/1720499099407925252">spoke</a> about cybersecurity for civil society and the needs of both high-risk individuals and organizations. The U.S. Cybersecurity and Infrastructure Security Agency <a href="https://www.cisa.gov/sites/default/files/2023-10/CSAC_September-Quarterly-Meeting_Open-Session-Summary_20230913_508.pdf">defines</a> high-risk communities as ones targeted by advanced persistent threat actors; have limited capacity to provide for their own defense; and receive limited assistance from the U.S. government. The cases presented here certainly qualify.&nbsp;</p><p>As these examples show, securing high-risk individuals and organizations requires a holistic approach &#8211; not just a focus on one type of threat or a set of corporate assets. To fully support high-risk communities, we must focus on securing <em>identities</em> &#8212; accounting for the devices and systems and workflows these people use every single day. With this in mind, we can begin to share guidance that is truly fit for purpose.&nbsp;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Four things to know about Lockdown Mode]]></title><description><![CDATA[Earlier this week, Apple notified a number of individuals that state-sponsored actors may be targeting their iPhones.]]></description><link>https://www.glitchcat.xyz/p/four-things-to-know-about-lockdown</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/four-things-to-know-about-lockdown</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Thu, 02 Nov 2023 18:20:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Xmuv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058a41cd-f7bd-4164-83f4-f263292ee94b_4032x2688.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Xmuv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058a41cd-f7bd-4164-83f4-f263292ee94b_4032x2688.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Xmuv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058a41cd-f7bd-4164-83f4-f263292ee94b_4032x2688.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Xmuv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058a41cd-f7bd-4164-83f4-f263292ee94b_4032x2688.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Xmuv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058a41cd-f7bd-4164-83f4-f263292ee94b_4032x2688.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Xmuv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058a41cd-f7bd-4164-83f4-f263292ee94b_4032x2688.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Xmuv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058a41cd-f7bd-4164-83f4-f263292ee94b_4032x2688.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/058a41cd-f7bd-4164-83f4-f263292ee94b_4032x2688.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:383345,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Xmuv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058a41cd-f7bd-4164-83f4-f263292ee94b_4032x2688.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Xmuv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058a41cd-f7bd-4164-83f4-f263292ee94b_4032x2688.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Xmuv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058a41cd-f7bd-4164-83f4-f263292ee94b_4032x2688.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Xmuv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F058a41cd-f7bd-4164-83f4-f263292ee94b_4032x2688.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo: Sipa USA / Alamy Stock Photo.</figcaption></figure></div><p>Earlier this week, Apple notified a number of individuals that state-sponsored actors may be targeting their iPhones. Some <a href="https://twitter.com/akhmxt1/status/1719223259672326153">shared</a> <a href="https://twitter.com/sachiinv7/status/1719279556501418424">their</a> alerts on X, including journalists and politicians in India. Apple <a href="https://elfaro.net/es/202111/el_salvador/25861/Apple-env%C3%ADa-alerta-de-espionaje-patrocinado-por-el-Estado-a-12-miembros-de-El-Faro.htm">has</a> <a href="https://www.reuters.com/technology/apple-warns-thai-activists-state-sponsored-attackers-may-have-targeted-iphones-2021-11-24/">previously</a> <a href="https://meduza.io/en/feature/2023/09/13/the-million-dollar-reporter">sent</a> alerts about targeting with NSO Group&#8217;s Pegasus spyware, though we don&#8217;t yet know what the recent notifications refer to or when the targeting took place. If you received an alert and want to know if your phone has been compromised, contact <a href="https://www.accessnow.org/help/">Access Now</a>, <a href="https://securitylab.amnesty.org/contact-us/">Amnesty International</a>, or <a href="https://citizenlab.ca/">Citizen Lab</a> for assistance.</p><p>Apple&#8217;s <a href="https://support.apple.com/en-us/102174">threat notifications</a> provide additional steps that people can take to protect their devices, including enabling <a href="https://support.apple.com/en-us/HT212650">Lockdown Mode</a>. This feature was introduced in the fall of 2022, and is now available on your Apple phone, tablet, laptop, and watch. Since Lockdown Mode is still relatively new, here are four things you should know about it:</p><p><strong>Lockdown Mode is not extreme</strong>, even if <a href="https://www.glitchcat.xyz/p/apples-security-marketing-is-pushing">Apple says so</a>. I think it&#8217;s more accurate to say the feature provides protection against extreme attacks, such as the targeting of an iPhone with sophisticated spyware. It&#8217;s easy to turn on and try: go to Settings, Privacy &amp; Security, and tap Lockdown Mode. Your phone will restart and Lockdown Mode will be on. The feature will not delete any data.&nbsp;</p><p><strong>Lockdown Mode works</strong>, as long as you leave it on. Lockdown Mode is the best defense we have today against Pegasus and Predator. I <a href="https://github.com/GranittHQ">have not seen</a> any reports suggesting they can bypass this feature. Last month, Citizen Lab said Lockdown Mode <a href="https://citizenlab.ca/2023/09/predator-in-the-wires-ahmed-eltantawy-targeted-with-predator-spyware-after-announcing-presidential-ambitions/">would have blocked</a> a recent attack with Predator in Egypt. </p><p><strong>You can exclude apps and sites from Lockdown Mode</strong>, if needed. Some apps and sites may look different; perhaps icons appear as empty boxes or images don&#8217;t display as normal. Do not turn Lockdown Mode off, but <a href="https://support.apple.com/en-us/HT212650">exclude that specific app or website</a> instead. If you have to do this, only exclude apps and sites you are familiar with.&nbsp;</p><p><strong>Turn Lockdown Mode on after restoring a backup</strong>, if needed. After <a href="https://support.apple.com/en-us/HT204184">restoring a backup</a>, double-check that your phone is running the latest version of iOS and that Lockdown Mode is on.</p><p><strong>Lockdown Mode works on a managed device</strong>, but you need to install the profile before you turn the mode on. If Lockdown Mode is already on, you need to turn it off; install the profile; then turn it back on again. <em>(Bonus item added on April 11, 2024.)</em></p><p>If you try Lockdown Mode and find that it does not work for you, I&#8217;d love to hear about it. It may be that we can provide feedback to Apple and/or the creator of a specific app or site. Send me an email on <a href="mailto:runa@granitt.io">runa@granitt.io</a>.&nbsp;&nbsp;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[North Macedonia endorses human rights initiative, still allows development of Predator spyware]]></title><description><![CDATA[In December 2021, at the first Summit for Democracy, the United States, Australia, Denmark and Norway announced the Export Controls and Human Rights Initiative to counter misuse of technology that violates human rights.]]></description><link>https://www.glitchcat.xyz/p/north-macedonia-endorses-human-rights</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/north-macedonia-endorses-human-rights</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Tue, 13 Jun 2023 19:54:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!cuzI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fbc4750-e07a-4c6e-9d2a-d0968b40e513_5616x3744.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cuzI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fbc4750-e07a-4c6e-9d2a-d0968b40e513_5616x3744.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cuzI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fbc4750-e07a-4c6e-9d2a-d0968b40e513_5616x3744.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cuzI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fbc4750-e07a-4c6e-9d2a-d0968b40e513_5616x3744.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cuzI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fbc4750-e07a-4c6e-9d2a-d0968b40e513_5616x3744.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cuzI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fbc4750-e07a-4c6e-9d2a-d0968b40e513_5616x3744.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cuzI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fbc4750-e07a-4c6e-9d2a-d0968b40e513_5616x3744.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0fbc4750-e07a-4c6e-9d2a-d0968b40e513_5616x3744.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cuzI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fbc4750-e07a-4c6e-9d2a-d0968b40e513_5616x3744.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cuzI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fbc4750-e07a-4c6e-9d2a-d0968b40e513_5616x3744.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cuzI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fbc4750-e07a-4c6e-9d2a-d0968b40e513_5616x3744.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cuzI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fbc4750-e07a-4c6e-9d2a-d0968b40e513_5616x3744.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo: Martin Williams / Alamy Stock Photo.</figcaption></figure></div><p>In December 2021, at the first <a href="https://www.state.gov/summit-for-democracy/">Summit for Democracy</a>, the United States, Australia, Denmark and Norway announced the <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2021/12/10/fact-sheet-export-controls-and-human-rights-initiative-launched-at-the-summit-for-democracy/">Export Controls and Human Rights Initiative</a> to counter misuse of technology that violates human rights. In a joint statement, the four governments committed to:</p><blockquote><p>&#8220;... establish a voluntary, nonbinding written code of conduct around which like-minded states could politically pledge to use export control tools to prevent the proliferation of software and other technologies used to enable serious human rights abuses.&#8221;</p></blockquote><p>Canada, France, the Netherlands, and the United Kingdom also expressed support.</p><p>The United States released the first version of the <a href="https://www.state.gov/export-controls-and-human-rights-initiative-code-of-conduct-released-at-the-summit-for-democracy/">code of conduct</a> this past March, at the second Summit for Democracy. Among other things, the code of conduct calls for governments to:</p><blockquote><p>&#8220;Take human rights into account when reviewing potential exports of dual-use goods, software, or technologies that could be misused for the purposes of serious violations or abuses of human rights.&#8221;</p></blockquote><p>Sounds great, right?</p><p>Well, here&#8217;s where things get interesting.</p><p>More than twenty governments have endorsed this code of conduct, including North Macedonia. The same North Macedonia which allows Cytrox to develop and sell its Predator spyware, <a href="https://citizenlab.ca/2021/12/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware/">despite research showing</a> it has been used to target human rights defenders, journalists, and politicians in at least two countries since 2021.</p><p>Ten days before the release of the code of conduct, The New York Times <a href="https://www.nytimes.com/2023/03/20/world/europe/greece-spyware-hacking-meta.html">reported</a> that a former trust and safety manager with Meta, Artemis Seaford, had been targeted with Predator in September 2021. Seaford, a U.S.-Greek national, is <a href="https://github.com/GranittHQ/data-predator-victims/blob/main/data-predator-victims.csv">one of dozens</a> of alleged victims of Predator in Greece.</p><p>In <a href="https://multimedia.europarl.europa.eu/en/webstreaming/committee-of-inquiry-to-investigate-use-of-pegasus-and-equivalent-surveillance-spyware_20230420-0900-COMMITTEE-PEGA">her testimony</a> to the European Parliament committee set up to investigate use of spyware, Seaford emphasized that victims still have no clear path to accountability. Speaking about the unfolding <a href="https://www.macropolis.gr/?i=portal.en.the-agora.12407">spyware scandal in Greece</a>, Seaford said the victims have &#8220;no incentive to speak out, they have everything to lose and very little to gain."</p><p>Last year, <a href="https://www.nytimes.com/2022/12/08/us/politics/spyware-nso-pegasus-paragon.html">The New York Times</a> and <a href="https://insidestory.gr/article/flight-predator">Inside Story</a> reported that Predator had been sold to Madagascar and Sudan, both countries with a history of repression. And in April, Inside Story <a href="https://insidestory.gr/article/predators-control-centre-has-its-roots-skopje">wrote</a> that &#8220;local regulators in North Macedonia have turned a blind eye to Predator&#8217;s development in the country.&#8221; Turns out one of the owners of Cytrox, Ivo Malinkovski, is a member of a family well-known for making wine &#8211; and dealing arms.&nbsp;</p><p>I have yet to see any meaningful response from other governments, though members of the European Parliament are <a href="https://www.euractiv.com/section/politics/news/greek-government-admits-exporting-predator-to-sudan/">asking questions</a> about how the spyware ended up in Sudan. At the very least, I&#8217;d expect the four countries which created this human rights initiative to discuss the issue with their partners in North Macedonia.</p><p>While we wait for, let&#8217;s be honest&#8212;the next article about yet another Predator victim, here are some <a href="https://blog.talosintelligence.com/mercenary-intellexa-predator/">technical details</a> about the Predator spyware from Cisco Talos for us to dig into.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Apple's security marketing is pushing people away]]></title><description><![CDATA[When Apple announced a handful of new security features last year, I was excited.]]></description><link>https://www.glitchcat.xyz/p/apples-security-marketing-is-pushing</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/apples-security-marketing-is-pushing</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Fri, 02 Jun 2023 17:48:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!JWPJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd790dc1d-8979-4cfc-8fec-6426424a75f2_4500x3000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JWPJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd790dc1d-8979-4cfc-8fec-6426424a75f2_4500x3000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JWPJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd790dc1d-8979-4cfc-8fec-6426424a75f2_4500x3000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JWPJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd790dc1d-8979-4cfc-8fec-6426424a75f2_4500x3000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JWPJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd790dc1d-8979-4cfc-8fec-6426424a75f2_4500x3000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JWPJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd790dc1d-8979-4cfc-8fec-6426424a75f2_4500x3000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JWPJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd790dc1d-8979-4cfc-8fec-6426424a75f2_4500x3000.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d790dc1d-8979-4cfc-8fec-6426424a75f2_4500x3000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1018482,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JWPJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd790dc1d-8979-4cfc-8fec-6426424a75f2_4500x3000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JWPJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd790dc1d-8979-4cfc-8fec-6426424a75f2_4500x3000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JWPJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd790dc1d-8979-4cfc-8fec-6426424a75f2_4500x3000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JWPJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd790dc1d-8979-4cfc-8fec-6426424a75f2_4500x3000.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo: Ink Drop / Alamy Stock Photo.</figcaption></figure></div><p>When Apple announced a handful of new security features last year, I was excited. Very excited. We can make it more difficult to attack our phones, the messages we send our friends, and our Apple accounts and iCloud backups. The features are optional to use, which is fine considering the chaos that would ensue if Apple just turned them on. But lately <a href="https://twitter.com/runasand/status/1660717717257592839">I&#8217;ve been thinking</a> that the language Apple is using to describe these features is pushing away the people who may need them the most.&nbsp;</p><p>In October, Apple announced <a href="https://support.apple.com/en-us/HT212650">Lockdown Mode</a> to help &#8220;protect devices against extremely rare and highly sophisticated cyber attacks.&#8221; No doubt in response to years of reporting on attacks against civil society with commercial spyware, such as Pegasus and Predator. Lockdown Mode does not guarantee that your device will never be hacked, but it does make attacks harder by reducing the attack surface.&nbsp;</p><p>Apple has always described Lockdown Mode as &#8220;optional, extreme protection that&#8217;s designed for the very few individuals who, because of who they are or what they do, might be personally targeted by some of the most sophisticated digital threats.&#8221; It&#8217;s not wrong, but it doesn&#8217;t tell the whole story: that sometimes the people <em>around</em> these individuals are targeted too. Like <a href="https://citizenlab.ca/2017/06/reckless-exploit-mexico-nso/">the son</a> of journalist Carmen Aristegui, the <a href="https://www.washingtonpost.com/nation/interactive/2021/hanan-elatr-phone-pegasus/">two</a> <a href="https://www.theguardian.com/world/2021/jul/18/nso-spyware-used-to-target-family-of-jamal-khashoggi-leaked-data-shows-saudis-pegasus">partners</a> of slain journalist Jamal Khashoggi, the go-to <a href="https://www.cbc.ca/radio/asithappens/as-it-happens-the-tuesday-edition-1.6110062/journalist-targeted-by-pegasus-spyware-says-her-sources-and-her-loved-ones-are-at-risk-1.6110063">taxi driver</a> of journalist Khadija Ismayilova.</p><p>Apple says &#8220;most people are never targeted by attacks of this nature,&#8221; and I agree. But calling Lockdown Mode &#8220;extreme&#8221; does not serve those who could benefit from using it&#8211;or the people who support them.</p><p>When Apple announced end-to-end encryption for iCloud in December, it called the feature <a href="https://www.apple.com/newsroom/2022/12/apple-advances-user-security-with-powerful-new-data-protections/">Advanced Data Protection</a> for your &#8220;most sensitive iCloud data.&#8221; When Google announced a <a href="https://security.googleblog.com/2018/10/google-and-android-have-your-back-by.html">similar feature</a> for Android five years ago, it simply promised to &#8220;have your back by protecting your backups.&#8221; When WhatsApp announced <a href="https://blog.whatsapp.com/end-to-end-encrypted-backups-on-whatsapp">end-to-end encryption for backups</a> in 2021, it just wanted to give people &#8220;an extra, optional layer of security to protect&#8221; their data.&nbsp;</p><p>Don&#8217;t get me wrong, Advanced Data Protection is great. But we don&#8217;t need to call it &#8220;advanced&#8221; or describe it as something limited to your &#8220;most sensitive&#8221; data. After all, <a href="https://signal.org/">Signal</a>, <a href="https://www.facebook.com/help/messenger-app/1084673321594605">Facebook</a>, and <a href="https://blog.whatsapp.com/end-to-end-encryption">WhatsApp</a> describe end-to-end encryption as the technology that protects calls and messages, and allows people to speak freely. It doesn&#8217;t have to be more complicated than that.&nbsp;</p><p>In that same December announcement, Apple said Security Keys will soon be supported for two-factor authentication when logging into your Apple account. Unfortunately, it also said this feature was &#8220;designed for users who, often due to their public profile, face concerted threats to their online accounts, such as celebrities, journalists, and members of government.&#8221; Meanwhile <a href="https://support.google.com/accounts/answer/6103523">Google</a>, <a href="https://blog.twitter.com/en_us/topics/product/2020/stronger-security-for-your-twitter-account">Twitter</a>, and <a href="https://www.facebook.com/help/401566786855239">Facebook</a> just say it&#8217;s another way for people to keep hackers out of their accounts.</p><p>Supporting journalists and other at-risk groups requires proactive, contextual guidance. I even <a href="https://techcrunch.com/2022/07/15/granitt-journalist-security/">started a company</a> last year to focus on that work. It&#8217;s hard to make this guidance land when Apple&#8217;s marketing language includes words like &#8220;extreme,&#8221; &#8220;most sensitive,&#8221; and &#8220;concerned threats.&#8221; To help those who support at-risk people, Apple should instead reframe its marketing to focus on what all these features enable: a way for everyone to enhance, improve, and level up their personal security. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Too many articles about spyware lack guidance for at-risk communities]]></title><description><![CDATA[Last week, Access Now, Amnesty International, Citizen Lab, and CyberHUB-AM jointly reported that members of civil society in Armenia had been hacked with NSO Group&#8217;s Pegasus spyware.]]></description><link>https://www.glitchcat.xyz/p/too-many-articles-about-spyware-lack</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/too-many-articles-about-spyware-lack</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Wed, 31 May 2023 14:13:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0UJP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd93ebdf-974f-4207-989b-67ae8634aa61_4500x3001.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0UJP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd93ebdf-974f-4207-989b-67ae8634aa61_4500x3001.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0UJP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd93ebdf-974f-4207-989b-67ae8634aa61_4500x3001.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0UJP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd93ebdf-974f-4207-989b-67ae8634aa61_4500x3001.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0UJP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd93ebdf-974f-4207-989b-67ae8634aa61_4500x3001.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0UJP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd93ebdf-974f-4207-989b-67ae8634aa61_4500x3001.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0UJP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd93ebdf-974f-4207-989b-67ae8634aa61_4500x3001.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fd93ebdf-974f-4207-989b-67ae8634aa61_4500x3001.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:525442,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0UJP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd93ebdf-974f-4207-989b-67ae8634aa61_4500x3001.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0UJP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd93ebdf-974f-4207-989b-67ae8634aa61_4500x3001.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0UJP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd93ebdf-974f-4207-989b-67ae8634aa61_4500x3001.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0UJP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd93ebdf-974f-4207-989b-67ae8634aa61_4500x3001.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo: mundissima / Alamy Stock Photo.</figcaption></figure></div><p>Last week, <a href="https://www.accessnow.org/publication/armenia-spyware-victims-pegasus-hacking-in-war/">Access Now</a>, <a href="https://www.amnesty.org/en/latest/news/2023/05/armenia-azerbaijan-pegasus-spyware-targeted-armenian-public-figures-amid-conflict/">Amnesty International</a>, <a href="https://citizenlab.ca/2023/05/cr1-armenia-pegasus/">Citizen Lab</a>, and CyberHUB-AM jointly reported that members of civil society in Armenia had been hacked with NSO Group&#8217;s Pegasus spyware. The victims include human rights defenders, a United Nations official, and journalists with Radio Free Europe/Radio Liberty. The reports were quickly picked up and shared by numerous news outlets, including <a href="https://www.forbes.com/sites/thomasbrewster/2023/05/25/iphone-hacks-in-armenia-show-nso-spyware-in-warzone/?sh=52ee81f51a56">Forbes</a>, <a href="https://www.theguardian.com/technology/2023/may/25/nso-group-spyware-armenia-war">the Guardian</a>, <a href="https://www.nbcnews.com/tech/security/nso-spyware-used-armenia-azerbaijan-conflict-report-finds-rcna84035">NBC</a>, <a href="https://www.reuters.com/world/researchers-find-israeli-made-spyware-deployed-across-armenia-2023-05-25/">Reuters</a>, <a href="https://techcrunch.com/2023/05/25/researchers-say-they-found-spyware-used-in-war-for-the-first-time/">TechCrunch</a>, and <a href="https://www.wired.com/story/pegasus-spyware-war-zone-first-time/">Wired</a>. But sadly, the articles did not contain much guidance for at-risk communities.</p><p>And that&#8217;s a problem.</p><p>Journalists have written about the use of sophisticated spyware and hacking tools to target civil society for over a decade. Yet information about how to protect yourself against these attacks is frequently missing, leaving at-risk communities to figure things for themselves. That&#8217;s assuming they even know they&#8217;re at-risk, but that&#8217;s a topic for another day.</p><p>Maybe we are so focused on <em>preventing</em> attacks, or simply reporting on them, that we forget we can make attacks <em>harder</em> to achieve; <em>notify</em> victims they may have been targeted; and provide <em>support</em> to those who need it.</p><p>At least three of Citizen Lab&#8217;s spyware investigations began with victims reaching out to Access Now&#8217;s <a href="https://www.accessnow.org/help/">digital security helpline</a>&#8211;<a href="https://citizenlab.ca/2017/02/bittersweet-nso-mexico-spyware/">Mexico</a>, <a href="https://citizenlab.ca/2022/01/project-torogoz-extensive-hacking-media-civil-society-el-salvador-pegasus-spyware/">El Salvador</a>, and <a href="https://citizenlab.ca/2023/05/cr1-armenia-pegasus/">Armenia</a>. In one of those investigations, the victims reached out to Access Now after first testing their devices with the <a href="https://docs.mvt.re/en/latest/">Mobile Verification Toolkit</a> released by Amnesty International <a href="https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/">as part of </a>the Pegasus Project in 2021. Considering the value provided by the helpline&#8211;for free, around-the-clock, since 2009&#8211;I&#8217;m surprised it does not get more attention.</p><p>This latest investigation into spyware in Armenia began when Apple sent <a href="https://support.apple.com/en-us/HT212960">threat notifications</a> to victims in November 2021. Examples of notifications are easy to find on Twitter and Facebook; they <a href="https://twitter.com/NPetrossian/status/1631539636395728896">look like this</a>. Apple sent one to <a href="https://twitter.com/lamamfakih/status/1486206453195190275?s=20">Lama Fakih</a> with Human Rights Watch too. The notification did not say how she was targeted, with what, or by whom. But that message, and frankly that awareness, helped start an investigation. Together with Amnesty International, Human Rights Watch determined that Fakih, a U.S.-Lebanese national, <a href="https://www.hrw.org/news/2022/01/26/human-rights-watch-among-pegasus-spyware-targets">had been targeted with Pegasus</a> five times between April and August 2021.&nbsp;</p><p>Last year, Apple introduced a new, opt-in security feature for macOS, iOS, and iPadOS called <a href="https://support.apple.com/en-us/HT212650">Lockdown Mode</a>. While the feature does not guarantee that your device will never be hacked, it reduces the attack surface that could be exploited by sophisticated spyware. In short, Lockdown Mode makes attacks harder to achieve. When asked, Citizen Lab said it has not seen any cases of spyware compromising a device with Lockdown Mode on &#8220;with zero-click attacks,&#8221; suggesting the feature really does provide additional protection.&nbsp;</p><p>We may not be able to prevent these attacks from happening. And if it&#8217;s not Pegasus, it will likely be something else. A part of that ongoing arms race between technology giants and spyware makers. But I believe there&#8217;s tremendous value in sharing what we <em>do</em> know with the people who need it the most. After all, isn&#8217;t that what journalism is all about? </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Greek intelligence bill ignores government use of spyware]]></title><description><![CDATA[The New York Times reported on Monday that Artemis Seaford, a former trust and safety manager at Meta, had been infected with the Predator spyware in the fall of 2021.]]></description><link>https://www.glitchcat.xyz/p/greek-intelligence-bill-ignores-government</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/greek-intelligence-bill-ignores-government</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Tue, 21 Mar 2023 15:13:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!OxuS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae73b267-b468-4733-afa0-3a94e6e46a39_960x600.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OxuS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae73b267-b468-4733-afa0-3a94e6e46a39_960x600.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OxuS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae73b267-b468-4733-afa0-3a94e6e46a39_960x600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OxuS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae73b267-b468-4733-afa0-3a94e6e46a39_960x600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OxuS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae73b267-b468-4733-afa0-3a94e6e46a39_960x600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OxuS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae73b267-b468-4733-afa0-3a94e6e46a39_960x600.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OxuS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae73b267-b468-4733-afa0-3a94e6e46a39_960x600.jpeg" width="960" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ae73b267-b468-4733-afa0-3a94e6e46a39_960x600.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:239310,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OxuS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae73b267-b468-4733-afa0-3a94e6e46a39_960x600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OxuS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae73b267-b468-4733-afa0-3a94e6e46a39_960x600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OxuS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae73b267-b468-4733-afa0-3a94e6e46a39_960x600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OxuS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae73b267-b468-4733-afa0-3a94e6e46a39_960x600.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A view of the inside of the Greek Parliament.</figcaption></figure></div><p>The New York Times <a href="https://www.nytimes.com/2023/03/20/world/europe/greece-spyware-hacking-meta.html?unlocked_article_code=XJpLk0SR6InNMDOK2PaiCGEeSU-BiTMKY5Fv_utMOlWz9MaPN_Z9jvxX_88_DQYTiXGZ9wd4tCyMYEiVH7aKNtb9ckRKH_TSmS0hik2hqLgNWhObUKNnIs8OrMNGHpi5cZUGODW4EdTzuQ6RH86S7A0u8nn1895swXN3p51aZLNEkhWeSfR0NBa5qVSDx3EE3x3sxdLhsaKtNjznLHL-N08JkbbPYovgy8fpTmM95VqV94B8IJ9Vd0pc-siJLHCJ8blWIIX9ke448H7vRGQRtUIedOVcwdnf_1-haHXiueLkm7hwsnkuKGhouSOnByIjP51wtbREJmcchQE8-KbZbHL075XTh9OndIA&amp;smid=url-share">reported</a> on Monday that Artemis Seaford, a former trust and safety manager at Meta, had been infected with the <a href="https://techcrunch.com/2021/12/16/cytrox-predator-phone-hacking-meta/">Predator</a> spyware in the fall of 2021. Seaford, a dual U.S.-Greek national, was also under a yearlong wiretap by the Greek national intelligence service. Citizen Lab <a href="https://twitter.com/citizenlab/status/1637841290413875202?s=20">said</a> Seaford&#8217;s phone had been hacked &#8220;for at least two months,&#8221; making her one of at least 38 individuals named as <a href="https://github.com/GranittHQ/data-predator-victims">victims</a> of Predator. This disclosure is the latest in a long and still unfolding surveillance <a href="https://www.macropolis.gr/?i=portal.en.the-agora.12407">scandal</a> in Greece.</p><p>The Greek government has denied using Predator, and the article does not attribute the attack to any specific country or operator. In 2021, Citizen Lab <a href="https://citizenlab.ca/2021/12/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware/">said</a> it &#8220;found likely Predator customers&#8221; in Armenia, Egypt, Greece, and a few other countries. Last year, The New York Times <a href="https://www.nytimes.com/2022/08/12/world/europe/greece-surveillance-europe-kyriakos-mitsotakis.html">reported</a> that the &#8220;spyware-detecting lab in Brussels at the European Parliament&#8221; found that MEP Nikos Androulakis had been targeted with Predator. &#8220;I never expected the Greek government to put me under surveillance,&#8221; Androulakis told The Times.</p><p>The Hellenic Data Protection Authority, an independent public authority, is investigating reports that Greek politicians and journalists have been targeted with spyware. Citizen Lab confirmed it &#8220;had a meeting with the Hellenic Data Protection Authority in November 2022 at their request.&#8221; Earlier this year, the head of the authority <a href="https://www.ekathimerini.com/news/1205611/new-evidence-emerges-in-spyware-probe/">told</a> the European Parliament&#8217;s <a href="https://www.europarl.europa.eu/committees/en/pega/home/highlights">PEGA Committee</a> that it had &#8220;identified at least 300 text messages containing spyware-infected links&#8230;sent to around 100 individuals.&#8221;</p><p>In Monday&#8217;s article, Giannis Oikonomou, the government spokesman, is quoted as saying that &#8220;Greece was among the first countries in Europe that passed legislation banning the sale, use and possession of malware in December 2022.&#8221; What&#8217;s more interesting is what he&#8217;s <em>not</em> saying: that the legislation <a href="https://www.theguardian.com/world/2022/dec/09/greece-passes-intelligence-bill-banning-the-sale-of-spyware">refers</a> to the &#8220;private use of spyware,&#8221; but <a href="https://www.hrw.org/news/2022/12/08/greece-problematic-surveillance-bill">appears</a> to legitimize the purchase or use by government agencies. And while the legislation <a href="https://www.nytimes.com/2022/11/07/world/europe/greece-spyware-ban.html">bans</a> &#8220;the sale of spyware,&#8221; it&#8217;s not clear how it would apply to Intellexa&#8212;the company behind Predator.</p><p>Oikonomou told The Times that &#8220;the alleged use of this software by nongovernmental parties is under ongoing judicial investigation.&#8221; Intellexa, for its part, <a href="https://www.euractiv.com/section/politics/news/greek-watergate-meps-fume-after-receiving-provocative-legal-notice/">sent</a> a strongly worded legal notice to the PEGA Committee last month following its inquiries into use of the Predator spyware. Sophie in 't Veld, who sits on the Committee, <a href="https://twitter.com/SophieintVeld/status/1628502602177470466">tweeted</a> that she is &#8220;very much looking forward to the exchange with Intellexa,&#8221; adding &#8220;plenty more new questions have arisen since&#8221; PEGA&#8217;s letters to the company last summer. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[What the Online Safety Bill is really about]]></title><description><![CDATA[If you have followed technology news for a while, you will have heard of the Online Safety Bill in the UK.]]></description><link>https://www.glitchcat.xyz/p/what-the-online-safety-bill-is-really</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/what-the-online-safety-bill-is-really</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Sun, 12 Mar 2023 10:52:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ytsa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1569a89d-b180-495b-b7dc-44fef95430bf_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ytsa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1569a89d-b180-495b-b7dc-44fef95430bf_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ytsa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1569a89d-b180-495b-b7dc-44fef95430bf_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ytsa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1569a89d-b180-495b-b7dc-44fef95430bf_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ytsa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1569a89d-b180-495b-b7dc-44fef95430bf_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ytsa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1569a89d-b180-495b-b7dc-44fef95430bf_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ytsa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1569a89d-b180-495b-b7dc-44fef95430bf_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1569a89d-b180-495b-b7dc-44fef95430bf_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2218679,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ytsa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1569a89d-b180-495b-b7dc-44fef95430bf_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ytsa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1569a89d-b180-495b-b7dc-44fef95430bf_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ytsa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1569a89d-b180-495b-b7dc-44fef95430bf_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ytsa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1569a89d-b180-495b-b7dc-44fef95430bf_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo: generated with AI, of course.</figcaption></figure></div><p>If you have followed technology news for a while, you will have heard of the <a href="https://en.wikipedia.org/wiki/Online_Safety_Bill">Online Safety Bill</a> in the UK. This bill, <a href="https://www.gov.uk/guidance/a-guide-to-the-online-safety-bill">framed</a> as &#8220;a new set of laws to protect children and adults online,&#8221; will make &#8220;social media companies more responsible&#8221; for what we see via their platforms. <a href="https://www.gov.uk/government/news/landmark-laws-to-keep-children-safe-stop-racial-hate-and-protect-democracy-online-published">Introduced</a> in the spring of 2021, the bill has been <a href="https://www.theguardian.com/society/2022/feb/08/porn-sites-in-uk-will-have-to-check-ages-in-planned-update-to-online-safety-bill">altered</a>, altered <a href="https://www.theguardian.com/money/2022/mar/08/internet-scams-now-included-in-uk-online-safety-bill">again</a>, put on <a href="https://www.bbc.com/news/uk-62158287">hold</a>, put on hold a <a href="https://techcrunch.com/2022/10/27/online-safety-bill-second-delay/">second</a> time, then <a href="https://www.theguardian.com/technology/2022/nov/29/changes-to-online-safety-bill-tread-line-between-safety-and-appearing-woke">altered</a> some more. <a href="https://www.globalencryption.org/2022/11/70-organizations-cyber-security-experts-and-elected-officials-sign-open-letter-expressing-dangers-of-the-uks-online-safety-bill/">Experts</a> have repeatedly <a href="https://www.eff.org/deeplinks/2022/11/experts-condemn-uk-online-safety-bill-harmful-privacy-and-encryption">condemned</a> the bill, <a href="https://www.openrightsgroup.org/campaign/online-safety-bill-campaign-hub/">arguing</a> that it <a href="https://www.article19.org/resources/uk-online-safety-bill-serious-threat-to-human-rights-online/">represents</a> a threat to internet safety.&nbsp;</p><p>In short: it&#8217;s a disaster.</p><p>For example, the BBC <a href="https://www.bbc.com/news/technology-64863448">recently</a> quoted the UK government as saying:&nbsp;</p><p><em>"The Online Safety Bill does not represent a ban on end-to-end encryption.&#8221;&nbsp;</em></p><p>This is <strong>misleading</strong>. The Online Safety Bill does not &#8220;ban&#8221; <a href="https://alecmuffett.com/alecm/e2e-primer/e2e-primer-web.html">end-to-end encryption</a>. But it forces technology companies to <a href="https://www.indexoncensorship.org/wp-content/uploads/2022/11/Surveilled-Exposed-Index-on-Censorship-report-Nov-2022.pdf">change</a> how their applications work, circumventing the end-to-end security that this encryption provides. Both <a href="https://signal.org/blog/uk-online-safety-bill/">Signal</a> and <a href="https://www.theguardian.com/technology/2023/mar/09/whatsapp-end-to-end-encryption-online-safety-bill">WhatsApp</a>, which provide end-to-end encrypted calls and messages, have said that complying with the bill would require them to weaken the overall security of their apps. </p><p>You cannot have both end-to-end security and government oversight. You are either surveilled, or you are not.</p><p>In the same article, the UK government goes on to say that:</p><p><em>"It is not a choice between privacy or child safety - we can and we must have both."</em></p><p>This is also <strong>misleading</strong>. The bill <a href="https://proton.me/blog/online-safety-bill">forces</a> technology companies to weaken the security of their applications which presents a risk to online privacy; this in turn endangers child safety, not to mention the safety of the adults these children will grow up to become. The government is arguing that we will be more safe <em>without</em> the protections afforded to us by end-to-end security, and rather than give us privacy <strong>and</strong> child safety, the government is forcing us to compromise on both. </p><p>Let&#8217;s be clear; this bill was never about improving internet safety, but about the expansion of government control.&nbsp;</p><p>Much of the recent debate about the Online Safety Bill has focused on technology, encryption, and how companies are responding. WhatsApp will <a href="https://www.theverge.com/2023/3/10/23633601/uk-online-safety-bill-encryption-whatsapp-leave">leave</a>, Signal will <a href="https://www.bbc.com/news/technology-64584001">walk</a>, Tutanota will <a href="https://tutanota.com/blog/posts/uk-undermine-encryption">wait</a> for it to be blocked. Yes, this bill threatens encryption: it defeats what the encryption is meant to achieve. But we really need to talk more about what we &#8212; the adults and children &#8212; will be left <em>without</em> if this bill passes.</p><p>Alec Muffett <a href="https://alecmuffett.com/article/16471">wrote</a> last year that the Online Safety Bill would leave his young daughter without &#8220;the kinds of privacy, assurance and integrity that to date we have all taken for granted.&#8221; Yes, the bill &#8212; and its peers in other countries, such as <a href="https://mobile.twitter.com/matthew_d_green/status/1634252397919739921">ChatControl in the EU</a> &#8212; would impact journalists and their sources; lawyers and their clients; and activists and their missions. But it also leaves future generations without the tools to safely explore, learn, grow, and change the world as they see fit. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.glitchcat.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Glitch Cat is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Green Lambert and ATT&CK]]></title><description><![CDATA[MITRE ATT&CK]]></description><link>https://www.glitchcat.xyz/p/green-lambert-and-attack</link><guid isPermaLink="false">https://www.glitchcat.xyz/p/green-lambert-and-attack</guid><dc:creator><![CDATA[Runa Sandvik]]></dc:creator><pubDate>Mon, 18 Oct 2021 14:27:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!F_TJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20c2c90d-ccc1-42a5-b259-ebc5bf979eec_635x480.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!F_TJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20c2c90d-ccc1-42a5-b259-ebc5bf979eec_635x480.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!F_TJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20c2c90d-ccc1-42a5-b259-ebc5bf979eec_635x480.png 424w, https://substackcdn.com/image/fetch/$s_!F_TJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20c2c90d-ccc1-42a5-b259-ebc5bf979eec_635x480.png 848w, https://substackcdn.com/image/fetch/$s_!F_TJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20c2c90d-ccc1-42a5-b259-ebc5bf979eec_635x480.png 1272w, https://substackcdn.com/image/fetch/$s_!F_TJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20c2c90d-ccc1-42a5-b259-ebc5bf979eec_635x480.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!F_TJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20c2c90d-ccc1-42a5-b259-ebc5bf979eec_635x480.png" width="635" height="480" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/20c2c90d-ccc1-42a5-b259-ebc5bf979eec_635x480.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:480,&quot;width&quot;:635,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;MITRE - Talon Cyber Security&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="MITRE - Talon Cyber Security" title="MITRE - Talon Cyber Security" srcset="https://substackcdn.com/image/fetch/$s_!F_TJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20c2c90d-ccc1-42a5-b259-ebc5bf979eec_635x480.png 424w, https://substackcdn.com/image/fetch/$s_!F_TJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20c2c90d-ccc1-42a5-b259-ebc5bf979eec_635x480.png 848w, https://substackcdn.com/image/fetch/$s_!F_TJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20c2c90d-ccc1-42a5-b259-ebc5bf979eec_635x480.png 1272w, https://substackcdn.com/image/fetch/$s_!F_TJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20c2c90d-ccc1-42a5-b259-ebc5bf979eec_635x480.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">MITRE ATT&amp;CK is a collection of real-world adversary tactics and techniques.</figcaption></figure></div><h3>MITRE ATT&amp;CK</h3><p>The <a href="https://attack.mitre.org/">MITRE ATT&amp;CK</a> framework is a great way to document adversary tactics and techniques based on real-world observations. In writing this blog post, I also found that it's a helpful way to identify what you know and don't know about an adversary and/or a piece of malware. If you haven&#8217;t used ATT&amp;CK before, check out the resources from <a href="https://us-cert.cisa.gov/best-practices-mitre-attckr-mapping">CISA</a> and <a href="https://attack.mitre.org/resources/getting-started/">MITRE</a>.</p><h4>Initial Access</h4><p>The first tactic in the matrix is <a href="https://attack.mitre.org/tactics/TA0001/">Initial Access</a>, which consists of techniques used to gain entry to a system. As I wrote in the <a href="https://objective-see.com/blog/blog_0x68.html">post</a> for Objective-See, "we don't know how this implant makes it onto a target system; the type of system it&#8217;s used on; or the geographical location of a typical target." For that reason, we'll leave this blank.</p><h4>Execution</h4><p>The next tactic, <a href="https://attack.mitre.org/tactics/TA0002/">Execution</a>, focuses on techniques used to run the implant on the target system. Comparing MITRE's list with my post on Objective-See, we find that Green Lambert can:</p><ul><li><p>Use shell scripts for execution (Command and Scripting Interpreter: Unix Shell <a href="">[T1059.004]</a>)</p></li><li><p>Use <code>Launchd</code> for initial and recurring execution (Scheduled Task/Job: Launchd <a href="https://attack.mitre.org/techniques/T1053/004/">[T1053.004]</a>)</p></li></ul><h4>Persistence</h4><p><a href="https://attack.mitre.org/tactics/TA0003/">Persistence</a> is all about retaining access to the system across restarts, changed credentials, and other interruptions. If we look at the section about Entry Points in the Objective-See post, we find that Green Lambert can:</p><ul><li><p>Persist via a <code>LoginItem</code> (Boot or Logon Autostart Execution: Plist Modification <a href="https://attack.mitre.org/techniques/T1547/011/">[T1547.011]</a>)</p></li><li><p>Persist via RC scripts (Boot or Logon Initialization Scripts: RC Scripts <a href="https://attack.mitre.org/techniques/T1037/004/">[T1037.004]</a>)</p></li><li><p>Persist via <code>LaunchAgent</code> (Create or Modify System Process: Launch Agent <a href="">[T1543.001]</a>)</p></li><li><p>Persist via <code>LaunchDaemon</code> (Create or Modify System Process: Launch Daemon <a href="https://attack.mitre.org/techniques/T1543/004/">[T1543.004]</a>)</p></li><li><p>Persist via shells (Event Triggered Execution: Unix Shell Configuration Modification <a href="https://attack.mitre.org/techniques/T1546/004">[T1546.004]</a>)</p></li><li><p>Use <code>Launchd</code> for initial and recurring execution (Scheduled Task/Job: Launchd <a href="https://attack.mitre.org/techniques/T1053/004/">[T1053.004]</a>)</p></li></ul><h4>Privilege Escalation</h4><p>We have not seen Green Lambert gain elevated access, so we'll leave <a href="https://attack.mitre.org/tactics/TA0004/">Privilege Escalation</a> blank.</p><h4>Defense Evasion</h4><p>The <a href="https://attack.mitre.org/tactics/TA0005/">Defense Evasion</a> tactic looks at how an adversary avoids detection. In this case, that means:</p><ul><li><p>Use of custom routines to decrypt strings (Deobfuscate/Decode Files or Information <a href="https://attack.mitre.org/techniques/T1140/">[T1140]</a>)</p></li><li><p>Ability to self-delete once installed (Indicator Removal on Host: File Deletion <a href="https://attack.mitre.org/techniques/T1070/004/">[T1070.004]</a>)</p></li><li><p>Masquerade as <code>GrowlHelper</code> (Masquerading: Masquerade Task or Service <a href="https://attack.mitre.org/techniques/T1036/004">[T1036.004]</a>)</p></li><li><p>And as <code>Software Update Check</code> (Masquerading: Masquerade Task or Service <a href="https://attack.mitre.org/techniques/T1036/004">[T1036.004]</a>)</p></li><li><p>Decrypt strings in-memory, per <a href="https://wikileaks.org/ciav7p1/cms/page_14587109.html">CIA guidelines</a> (Obfuscated Files or Information <a href="https://attack.mitre.org/techniques/T1027/">[T1027]</a>)</p></li></ul><h4>Credential Access</h4><p><a href="https://attack.mitre.org/tactics/TA0006/">Credential Access</a> looks at techniques used to steal credentials, such as account names and passwords. During initial triage of Green Lambert, we found a string that (at least) suggests the following technique.</p><ul><li><p>Use of <code>SecKeychainFindInternet&#8230;</code> (Credentials from Password Stores: Keychain <a href="https://attack.mitre.org/techniques/T1555/001">[T1555.001]</a>)</p></li></ul><h4>Discovery</h4><p>For <a href="https://attack.mitre.org/tactics/TA0007/">Discovery</a>, we'll look for ways that Green Lambert gains knowledge about the system. We don't have a lot of information to go on, just a few clues from our initial triage and what appears to be a configuration file and/or system survey. Green Lambert can:</p><ul><li><p>Determine the Linux version and system uptime (System Information Discovery <a href="https://attack.mitre.org/techniques/T1082/">[T1082]</a>)</p></li><li><p>Determine proxy settings (System Network Configuration Discovery <a href="https://attack.mitre.org/techniques/T1016/">[T1016]</a>)</p></li><li><p>Determine the current date and time (System Time Discovery <a href="https://attack.mitre.org/techniques/T1124/">[T1124]</a>)</p></li></ul><h4>Lateral Movement</h4><p>We have not seen Green Lambert access remote systems, so we'll leave <a href="https://attack.mitre.org/tactics/TA0008/">Lateral Movement</a> blank.</p><h4>Collection</h4><p>We don't know how Green Lambert treats collected data, so we'll leave <a href="https://attack.mitre.org/tactics/TA0009/">Collection</a> blank.</p><h4>Command and Control</h4><p><a href="https://attack.mitre.org/tactics/TA0011/">Command and Control</a> consists of techniques used for communication. Green Lambert can:</p><ul><li><p>Make a DNS request (Application Layer Protocol: DNS <a href="https://attack.mitre.org/techniques/T1071/004/">[T1071.004]</a>)</p></li><li><p>Communicate with hostname and IP address (Fallback Channels <a href="https://attack.mitre.org/techniques/T1008/">[T1008]</a>)</p></li><li><p>Use a proxy for communications (Proxy <a href="https://attack.mitre.org/techniques/T1090/">[T1090]</a>)</p></li></ul><h4>Exfiltration</h4><p>We don't know how Green Lambert steals data from the system, so we'll leave <a href="https://attack.mitre.org/tactics/TA0010/">Exfiltration</a> blank.</p><h4>Impact</h4><p>We don't have any data to suggest Green Lambert destroys the target, so we'll leave <a href="https://attack.mitre.org/tactics/TA0040/">Impact</a> blank.</p><h3>Let's visualize it!</h3><p>Plugging (almost all) the information gathered into the <a href="https://mitre-attack.github.io/attack-navigator/">ATT&amp;CK Navigator</a>, we get this visualization.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!giGG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3560834e-7903-46bb-92e6-70243e96b43c_1000x772.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!giGG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3560834e-7903-46bb-92e6-70243e96b43c_1000x772.png 424w, https://substackcdn.com/image/fetch/$s_!giGG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3560834e-7903-46bb-92e6-70243e96b43c_1000x772.png 848w, https://substackcdn.com/image/fetch/$s_!giGG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3560834e-7903-46bb-92e6-70243e96b43c_1000x772.png 1272w, https://substackcdn.com/image/fetch/$s_!giGG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3560834e-7903-46bb-92e6-70243e96b43c_1000x772.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!giGG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3560834e-7903-46bb-92e6-70243e96b43c_1000x772.png" width="728" height="562.016" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3560834e-7903-46bb-92e6-70243e96b43c_1000x772.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:772,&quot;width&quot;:1000,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Screen Shot 2021-10-18 at 10.14.24 AM.png&quot;,&quot;title&quot;:&quot;Screen Shot 2021-10-18 at 10.14.24 AM.png&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Screen Shot 2021-10-18 at 10.14.24 AM.png" title="Screen Shot 2021-10-18 at 10.14.24 AM.png" srcset="https://substackcdn.com/image/fetch/$s_!giGG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3560834e-7903-46bb-92e6-70243e96b43c_1000x772.png 424w, https://substackcdn.com/image/fetch/$s_!giGG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3560834e-7903-46bb-92e6-70243e96b43c_1000x772.png 848w, https://substackcdn.com/image/fetch/$s_!giGG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3560834e-7903-46bb-92e6-70243e96b43c_1000x772.png 1272w, https://substackcdn.com/image/fetch/$s_!giGG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3560834e-7903-46bb-92e6-70243e96b43c_1000x772.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Conclusion</h3><p>That's it! (I think. Please let me know if I've missed anything.) As the visualization above shows, there's a lot more to dig into here. For example, you can use <a href="https://twitter.com/osxreverser">@osxreverser</a>'s <a href="https://github.com/gdbinit/delambert">Delambert</a> plugin to decrypt more strings. Or you can take a closer look at command line arguments. Or how the Green Lambert generates the victim ID. Or what the implant collects and how it exfiltrates data.</p><p>Happy hunting!</p>]]></content:encoded></item></channel></rss>