A collection point
...and some of my own.
‘Brushers’ Come Into Focus as Officials Test Packages of Mysterious Seeds https://www.wsj.com/articles/brushers-arrange-fake-online-sales-to-enhance-sellers-reputations-11596046717?campaign_id=158&emc=edit_ot_20201215&instance_id=25065&nl=on-tech-with-shira-ovide®i_id=92962940&segment_id=47014&te=1&user_id=639ecbd1dcee768ced398ce2ec94b3bb Now that your holiday shopping is, for the most part, over and the plethora of fake reviews are behind you, we thought we would bring up a new scam called "brushing". Brushing involves using fake transactions to enhance the reputations of online merchants. It began attracting attention in the U.S. about five years ago. Planting Reviews High sales volume and good reviews help vendors move up in search results and attract shoppers. Some vendors turn to “brushers” who place fake orders for products. How brushing works The vendor 1. Pays a brusher the cost of the products they’ll be ordering, and a fee The brusher 2. Places orders for the vendor’s products The vendor 3. Ships parcels that are empty or contain low-value merchandise that may go to strangers overseas The brusher 4. Writes good reviews, leading to the vendor’s products being ranked higher A Wall Street Journal article at the time reported that brushing in China helped vendors artificially increase their sales and boost their standing on online marketplaces, which typically give more prominence to high-volume sellers with good customer reviews. In a typical brushing scheme, vendors pay fees to operators known as brushers. The brushers order products, and vendors ship packages, sometimes to people uninvolved in the scheme, that are empty or filled with trinkets to create the illusion of a real transaction. Some brushers post glowing reviews. Considered a form of false advertising, such schemes are prohibited in the U.S. and China. Why would brushers ship packages to strangers overseas? Ron Schlecht Jr., a managing partner at BTB Security, a cybersecurity consulting firm in Philadelphia, said auditors at e-commerce platforms may examine every part of a transaction to make sure it looks legitimate. Sending a bunch of items to just a few addresses wouldn’t look right. “People go to those lengths so that it looks from one end to the other like a true transaction,” Mr. Schlecht said. A 2015 study by Haitao Xu of the College of William and Mary and others, focused more attention on a problem then believed to be confined mostly to Chinese online marketplaces. Dr. Xu, who earned a Ph.D. in computer science in 2015, explored an underground market in what he called seller-reputation escalation. Some of his insights came from an internship he had at China’s Alibaba Group Holding Ltd. , where he focused on fraud protection. His 2015 study found that vendors using brushing services could boost their online reputations at least 10 times faster than legitimate sellers. Without fake transactions, a vendor of hair clips and costume jewelry told the Journal, “your product will end up at the very back of the search results, and people will never be able to find it.” Facebook: Removing Coordinated Inauthentic Behavior from France and Russia https://about.fb.com/news/2020/12/removing-coordinated-inauthentic-behavior-france-russia/? Facebook reports on politically motivated campaigns originating in one country against another Today we removed three separate networks for violating our policy against foreign or government interference which is coordinated inauthentic behavior (CIB) on behalf of a foreign or government entity. These networks originated in France and Russia and targeted multiple countries in North Africa and the Middle East. In each case, the people behind this activity coordinated with one another and used fake accounts as a central part of their operations to mislead people about who they are and what they are doing, and that was the basis for our action. It appears that this Russian network was an attempt to rebuild their operations after our October 2019 takedown, which also coincided with a notable shift in focus of the French campaign to begin to post about Russia’s manipulation campaigns in Africa. Unlike the operation from France, both Russia-linked networks relied on local nationals in the countries they targeted to generate content and manage their activity across internet services. This is consistent with cases we exposed in the past, including in Ghana and the US, where we saw the Russian campaigns co-opt authentic voices to join their influence operations, likely to avoid detection and help appear more authentic. What We Found 1. We removed 84 Facebook accounts, 6 Pages, 9 Groups and 14 Instagram accounts for violating our policy against coordinated inauthentic behavior. This activity originated in France and targeted primarily the Central African Republic and Mali, and to a lesser extent Niger, Burkina Faso, Algeria, Cote d’Ivoire and Chad. 2. We also removed 63 Facebook accounts, 29 Pages, 7 Groups and 1 Instagram account for coordinated inauthentic behavior. This network originated in Russia and focused primarily on the Central African Republic (CAR), and to a lesser extent on Madagascar, Cameroon, Equatorial Guinea, Mozambique, South Africa and the CAR diaspora in France. 3. We also removed 211 Facebook accounts, 126 Page, 16 Groups and 17 Instagram accounts for coordinated inauthentic behavior. This network originated in Russia and focused primarily on Libya, Sudan and Syria. Revealed: China suspected of spying on Americans via Caribbean phone networks https://www.theguardian.com/us-news/2020/dec/15/revealed-china-suspected-of-spying-on-americans-via-caribbean-phone-networks? China appears to have used mobile phone networks in the Caribbean to surveil US mobile phone subscribers as part of its espionage campaign against Americans, according to a mobile network security expert who has analysed sensitive signals data. The findings paint an alarming picture of how China has allegedly exploited decades-old vulnerabilities in the global telecommunications network to route “active” surveillance attacks through telecoms operators. The alleged attacks appear to be enabling China to target, track, and intercept phone communications of US phone subscribers, according to research and analysis by Gary Miller, a Washington state-based former mobile network security executive. Miller, who has spent years analysing mobile threat intelligence reports and observations of signalling traffic between foreign and US mobile operators, said in some cases China appeared to have used networks in the Caribbean to conduct its surveillance. At the heart of the allegations are claims that China, using a state-controlled mobile phone operator, is directing signalling messages to US subscribers, usually while they are traveling abroad. Signaling messages are commands that are sent by a telecoms operators across the global network, unbeknownst to a mobile phone user. They allow operators to locate mobile phones, connect mobile phone users to one another, and assess roaming charges. But some signalling messages can be used for illegitimate purposes, such as tracking, monitoring, or intercepting communications. Miller focused his research on messages that he said did not appear legitimate, either because they were “unauthorised” by the GSMA, an international standard-setting body for the telecommunications industry, or because the messages were sent from a location that did not match where a user was travelling. “Government agencies and Congress have been aware of public mobile network vulnerabilities for years,” he said. “Security recommendations made by our government have not been followed and are not sufficient to stop attackers.” He added: “No one in the industry wants the public to know the severity of ongoing surveillance attacks. I want the public to know about it.” “Once you get into the tens of thousands, the attacks qualify as mass surveillance, which is primarily for intelligence collection and not necessarily targeting high-profile targets. It might be that there are locations of interest, and these occur primarily while people are abroad,” Miller said. In other words, Miller said he believed the messages were indicative of surveillance of mass movement patterns and communication of US travellers. Miller also found what he called unique cases in which the same mobile phone users who appear to have been targeted via China Unicom also appear to have been targeted simultaneously through two Caribbean operators: Cable & Wireless Communications (Flow) in Barbados and Bahamas Telecommunications Company (BTC). “We have an illusion of security when we talk on our mobile phones,” said James Lewis, the director of the Strategic Technologies Program at the Center for Strategic and International Studies (CSIS). “People don’t realise that we are under a sustained espionage attack on anything that connects to a network, and that this is just another example of a really aggressive and pretty sophisticated campaign.” Trump's Twitter account was hacked, Dutch ministry confirms https://www.theguardian.com/us-news/2020/dec/16/trumps-twitter-account-was-hacked-dutch-ministry-affirms Dutch prosecutors have confirmed that Donald Trump’s Twitter account was hacked in October despite denials from Washington and the company, but said the “ethical hacker” would not face charges. The hacker, named as Victor Gevers, broke into Trump’s account @realDonaldTrump on 16 October by guessing the US president’s password, Dutch media reports said. Both the White House and Twitter strenuously denied reports that the account had been hacked. Gevers, 44, disclosed the hack immediately, saying the password he guessed was “maga2020!”, referring to the Trump slogan “Make America Great Again”. 2000 Parents Call on McGraw-Hill Publishing to End Partnership with Proctorio https://www.fightforthefuture.org/news/2020-12-17-2000-parents-call-on-mcgraw-hill-publishing-to-end/ Schooling from home comes with its own challenges, some of which have been addressed by algorithmic proctoring software running on the child's computer, that ID the student, check head and eye movements, check surroundings and then report back a fail if any of the checks come back negative. Six US Senators recently asked Proctorio and other online proctoring companies to "address the alarmingly long list of equity, accessibility, & privacy issues students are facing on their exam platforms." Proctorio's response has been legal action against critics and actions to remove negative comments about them on social networking platforms. Erik Johnson, a freshman at Ohio’s Miami University, posted his concerns about Proctorio and his analysis of their code online earlier this year, and received intimidating messages from Proctorio’s CEO, among other retaliation. Writing for the MIT Technology Review, a librarian at UC Denver shared the following story: "A Black woman at my university told me that whenever she used Proctorio’s test proctoring software, it always prompted her to shine more light on her face. The software couldn’t validate her identity and she was denied access to tests so often that she had to go to her professor to make other arrangements. Her white peers never had this problem." In an open letter to Simon Allen, CEO of McGraw Hill Publishing, and Terri Walker, head of Inclusion and Diversity at McGraw Hill Publishing from 2000 parents, they quote the McGraw Hill Publishing Inclusion & Diversity statement: "Our focus on inclusion and diversity will ensure that our team members, products, and customer experiences are relevant and represent the diverse population of customers we serve.” The 2000+ parents demanded that McGraw Hill Publishing cease its performative allyship and end its peddling of racially-biased, invasive surveillance technology immediately.
calvin
2/24/2021 07:03:27 am
We Bring To You Good News From OfficialBlankAtmServices...Have you been trying to get a real blank ATM Card and it has been a problem trying to get one? Here is OfficialBlankAtmServices easy and affordable. You can get a real blank atm card from us and it will be delivered to you within 24hrs after you have made your order from us at [email protected]
Reply
calvin
2/24/2021 07:11:30 am
INSTEAD OF GETTING A LOAN,, I GOT SOMETHING NEW.
Reply
Leave a Reply. |
Linking the world
Sharing is caring Archives
May 2024
Categories |