The 139-page presentation, dated 2019, was created by the FBI Cellular Analytics Team.
Motherboard journalists managed to get acquainted with documents The FBI, which describes in unusual detail how bureaus and other law enforcement agencies obtain information from telecommunications companies about the location of mobile devices.
Most of the information presented in the documents is already known to the general public, for example, about how law enforcement agencies can obtain data from telecom operators’ subscribers using special court orders. However, the docs also shed light on exactly what information each operator collects and how long certain types of data are retained. Moreover, they provide screenshots of the tools the FBI provides to law enforcement agencies throughout the United States for analyzing data from cellular base stations.
The documents were provided to the publication by Ryan Shapiro, executive director of the non-profit organization Property of the People, who received them upon request for information from open sources. The 139-page presentation, dated 2019, was created by the FBI’s Cellular Analysis Survey Team (CAST).
According to the presentation, CAST is helping the FBI, as well as federal and local law enforcement and judicial authorities, in forensic data on phone calls from base stations. In particular, the team is engaged in obtaining data from telecommunications companies, analyzing data from base stations showing which phones were in a specified location at a specified time, examining testimony of witnesses and verifying the actual coverage of base stations.
“When necessary, CAST uses industry standard equipment to determine the true geographic coverage of the cellular sector,” the presentation said.
CAST provides law enforcement with its own phone data visualization software tool called CASTViz for free.
“CASTViz can quickly and accurately record call data and base station data for lead generation and investigations,” the presentation said.
The presentation even contains screenshots of instructions for using CASTViz.
The document explains how requests for disposable phone location data from virtual carriers (carriers using the existing infrastructure of another carrier, but selling services under their own brand) are made. It also describes how to get information from the General Motors OnStar vehicle system, and presents the cost of some of the data.
In terms of the period during which telecom operators store phone call data, AT&T is 7 years, T-Mobile is 2 years, and Verizon is 1 year. AT&T stores web browsing data for 1 year.
4 TB of security from Samsung. External SSD T7 Shield is now available in a new version for 420 euros
Samsung has decided to release a new version of its secure external SSD T7 Shield.
The device was introduced almost a year ago in 1 and 2 TB versions. Now, a 4 TB modification is entering the market.
In Europe, they ask for 420 euros for such an SSD. For comparison, the prices for the younger versions are 135 and 220 euros.
Recall, T7 Shield offers a good level of protection. There is also protection against water and moisture (IP65), and protection against falls from a height of up to 3 meters. Actually, since this is a solid state drive, it is likely that it will survive a much more serious fall.
The device is equipped with a USB-C 3.2 Gen 2 interface and offers read and write speeds of 1050 and 1000 MB/s, respectively. The device weighs only about 100 g.
ChatGPT can be used to write viruses and ransomware – this was confirmed by information security specialists
Network resources reported that examples appeared on the network of how the popular chat bot ChatGPT writes code for viruses. Network security company Check Point Research discovered this and said that the use of AI increases the danger from hackers. On the thematic forums, the first information about the successful writing of viruses using ChatGPT has already appeared.
One example was a program that, after refinement, can be turned into “extortionist”. It can encrypt data on the user’s PC and will require payment for decryption. In a more advanced version of the program, penetration into the target server is provided, from where hackers already gain access to all the data of the victim
In addition, the neural network can write phishing emails – this has already been checked by Check Point Research specialists themselves. The letter also contained an Excel file with an embedded macro that was launched when the file was opened.
However, this is not all. Experts were able to get AI to create scripts for scanning network ports and other tools.
At the same time, Check Point Research believes that it is too early to say that ChatGPT has become a new tool for hackers, but the attacker community has already become interested in it. Note that earlier the system was already able to pretend to be a Linux machine, as well as write a number of programs and websites.
“Germany has not taken seriously the security threat posed by China.” The country has increased dependence on Huawei
Despite the huge number of sanctions imposed by the US and other countries against Huawei, Germany has only increased its dependence on this Chinese company.
According to a recent Strand Consult report cited by Reuters, Germany has become even more dependent on Huawei to build 5G infrastructure than it was when building 4G networks. More specifically, Huawei accounts for 59% of all 5G network equipment in Germany. We are talking about base stations and related equipment. For comparison, in the case of 4G networks, Huawei’s share in Germany is 57%. What’s interesting is the fact that Huawei’s share in this area is higher in Berlin than in Beijing, where the company faces serious competition from ZTE.
According to the report, there are signs that Germany has not taken seriously the security threat posed by China. At the same time, Huawei equipment is simply cheaper than analogues of European players in this market, which is why a number of countries, including Germany, continue to purchase Huawei products.
Intel has started the process of retiring processors that were less than two years old. Rocket Lake will ship for another year
The 11th generation Intel Core processors are relatively recent by market standards, but the company has already begun the end-of-life...
“Ural” is working on a new “razdatka” for heavy all-wheel drive trucks. Its resource will be 600 thousand km
According to Quto.ru, the Ural Automobile Plant is working on new transfer boxes for heavy trucks weighing up to 34...
Mozilla is developing a Firefox browser for iOS that violates Apple’s requirements
Mozilla is working on a Firefox browser for iOS that will be based on the Gecko engine rather than the...
One of the most compact versions of the Radeon RX 79900 XTX for maximum overclocking. PowerColor showed RX 7900 XTX Liquid Devil
PowerColor has unveiled the liquid-cooled Radeon RX 7900 XTX Liquid Devil graphics card. The manufacturer himself says that this is...
News4 days ago
Now the actors are not needed? Google introduced the Dreamix neural network, which creates and edits videos from text, images and other videos
Phones4 days ago
200 megapixels – a new level of macro photography. Samsung Galaxy S23 Ultra users can capture macro images using the main module of the phone
Software6 days ago
I want to believe: an application has been presented that will allow you to fix UFOs
Electric Cars5 days ago
Mazda is preparing another flagship seven-seater crossover. Mazda CX-80 will receive an in-line 6-cylinder engine