From Digital Age to Nano Age. WorldWide.

Tag: desk

Robotic Automations

Bill to strengthen national tipline for missing and exploited children heads to Biden's desk | TechCrunch


A bipartisan bill designed to protect children from online sexual exploitation is headed to President Biden’s desk.

Proposed by Senators Jon Ossoff (D-GA) and Marsha Blackburn (R-SC), the bill aims to strengthen the National Center for Missing and Exploited Children’s (NCMEC) CyberTipline. When an online service provider detects child sexual abuse material (CSAM), the platform is legally required to report it to the CyberTipline. Then, NCMEC works with law enforcement to investigate the crime.

The problem is that NCMEC is understaffed and running on outdated tech. According to a report from The Wall Street Journal and the Stanford Internet Observatory, platforms mail CDs and thumb drives containing CSAM to NCMEC, where it’s manually uploaded into the nonprofit’s database. And as AI-generated CSAM becomes increasingly prevalent, the deluge of reports will only make it more difficult for NCMEC to investigate urgent threats of child sexual exploitation in a timely manner. Currently, per Stanford’s research, only 5 to 8% of reports lead to arrests, due to funding shortages, inefficient technology, and other constraints. That’s especially staggering considering that the CyberTipline received over 36 million reports last year — when the tipline was created in 1998, it handled 4,450 reports.

“NCMEC faces resource constraints and lower salaries, leading to difficulties in retaining personnel who are often poached by industry trust and safety teams,” Stanford’s report reads. “While there has been progress in report deconfliction — identifying connections between reports, such as identical offenders — the pace of improvement has been considered slow.”

This bill won’t solve all of these issues, but it will allow providers to preserve the contents of reports for up to a year, rather than just 90 days — which gives law enforcement more time to investigate crimes. Instead of relying on decades-old storage methods, the bill also carves out a way for NCMEC to legally store data using commercial cloud computing services, which could make the process of assessing reports more efficient. Providers will also face steeper fines if they don’t report suspected violations to NCMEC — for platforms with over 100 million users, a first time offense yields a fine of $850,000, up from $150,000. In addition to their requirement to report CSAM, platforms will also be obligated to report the enticement of children.

“At a time of such division in Congress, we are bringing Republicans and Democrats together to protect kids on the internet,” said Senator Ossoff in a statement.


Software Development in Sri Lanka

Robotic Automations

Ransomware gang's new extortion trick? Calling the front desk | TechCrunch


When a hacker called the company that his gang claimed to breach, he felt the same way that most of us feel when calling the front desk: frustrated.

The phone call between the hacker, who claims to represent the ransomware gang DragonForce, and the victim company employee was posted by the ransomware gang on its dark web site in an apparent attempt to put pressure on the company to pay a ransom demand. In reality, the call recording just shows a somewhat hilarious and failed attempt to extort and intimidate a company’s rank-and-file employees.

The recording also shows how ransomware gangs are always looking for different ways to intimidate the companies they hack.

“It’s increasingly common for threat actors to make contact via telephone, and this should be factored into organizations’ response plans. Do we engage or not? Who should engage? You don’t want to be making these decisions while the threat actor is listening to your hold music,” said Brett Callow, a threat analyst at Emsisoft.

In the call, the hacker asks to speak with the “management team.” Instead, two different employees put him on hold until Beth, from HR, answers the call.

“Hi, Beth, how are you doing?” the hacker said.

After a minute in which the two have trouble hearing each other, Beth tells the hacker that she is not familiar with the data breach that the hacker claimed. When the hacker attempts to explain what’s going on, Beth interrupts him and asks: “Now, why would you attack us?”

“Is there a reason why you chose us?” Beth insists.

“No need to interrupt me, OK? I’m just trying to help you,” the hacker responds, growing increasingly frustrated.

The hacker then proceeds to explain to Beth that the company she works for only has eight hours to negotiate before the ransomware gang will release the company’s stolen data.

“It will be published for public access, and it will be used for fraudulent activities and for terrorism by criminals,” the hacker says.

“Oh, OK,” says Beth, apparently nonplussed, and not understanding where the data is going to be.

“So it will be on X?” Beth asks. “So is that Dragonforce.com?”

The hacker then threatens Beth, saying they will start calling the company’s clients, employees and partners. The hacker adds that they have already contacted the media and provided a recording of a previous call with one of her colleagues, which is also on the gang’s dark web site.

“So that includes a conversation with Patricia? Because you know, that’s illegal in Ohio,” Beth says.

“Excuse me?” the hacker responds.

“You can’t do that in Ohio. Did you record Patricia?” Beth continues.

“Ma’am, I am a hacker. I don’t care about the law,” responds the hacker, growing even more frustrated.

Then the hacker tries one more time to convince Beth to negotiate, to no avail.

“I would never negotiate with a terrorist or a hacker as you call yourself,” Beth responds, asking the hacker to confirm a good phone number to call them back.

When the hacker says they “got no phone number,” Beth has had enough.

“Alright, well then I’m just gonna go ahead and end this phone call now,” she says. “I think we spent enough time and energy on this.”

“Well, good luck,” Beth says.

“Thank you, take care,” the hacker says.

The company that was allegedly hacked in this incident, which TechCrunch is not naming as to not help the hackers extort the company, did not respond to a request for comment.

Read more on TechCrunch:


Software Development in Sri Lanka

Back
WhatsApp
Messenger
Viber