×
Government

US, UK Announce Sanctions Over China-Linked Election Hacks (pbs.org) 29

Earlier today, the U.S. and U.K. accused hackers linked to the Chinese state of being behind "malicious" cyber campaigns targeting political figures. The U.K. government also blamed China for a 2021 cyberattack that compromised the personal information of millions of U.K. voters. In response, PBS reports that the U.S. and British government announced sanctions against a company and two people linked to the Chinese government. From the report: Officials said those sanctioned are responsible for a hack that may have gained access to information on tens of millions of U.K. voters held by the Electoral Commission, as well as for cyberespionage targeting lawmakers who have been outspoken about the China threat. The Foreign Office said the hack of the election registers "has not had an impact on electoral processes, has not affected the rights or access to the democratic process of any individual, nor has it affected electoral registration." The Electoral Commission said in August that it identified a breach of its system in October 2022, though it added that "hostile actors" had first been able to access its servers since 2021. At the time, the watchdog said the data included the names and addresses of registered voters. But it said that much of the information was already in the public domain.

In Washington, the Treasury Department said it sanctioned Wuhan Xiaoruizhi Science and Technology Company Ltd., which it calls a Chinese Ministry of State Security front company that has "served as cover for multiple malicious cyberoperations." It named two Chinese nationals, Zhao Guangzong and Ni Gaobin, affiliated with the Wuhan company, for cyberoperations that targeted U.S. critical infrastructure sectors, "directly endangering U.S. national security." Separately, British cybersecurity officials said that Chinese government-affiliated hackers "conducted reconnaissance activity" against British parliamentarians who are critical of Beijing in 2021. They said no parliamentary accounts were successfully compromised.

Three lawmakers, including former Conservative Party leader Iain Duncan Smith, told reporters Monday they have been "subjected to harassment, impersonation and attempted hacking from China for some time." Duncan Smith said in one example, hackers impersonating him used fake email addresses to write to his contacts. The politicians are members of the Inter-Parliamentary Alliance on China, an international pressure group focused on countering Beijing's growing influence and calling out alleged rights abuses by the Chinese government.

China

UK Blames China for Massive Breach of Voter Data (techcrunch.com) 21

The U.K. government has blamed China for a 2021 cyberattack that compromised the personal information of millions of U.K. voters. From a report: In a statement to lawmakers in Parliament on Monday, U.K. deputy prime minister Oliver Dowden attributed the 2021 data breach at the Electoral Commission to hackers working for the Chinese government. Dowden told lawmakers that the U.K. government "will not hesitate to take swift and robust actions wherever the Chinese government threatens the United Kingdom's interests."

It's the first time the United Kingdom has attributed the breach since the cyberattack was first disclosed in 2023. The Electoral Commission, which maintains copies of the U.K. register of citizens eligible to vote, said at the time hackers took the names and addresses of an estimated 40 million U.K. citizens, including those who were registered to vote between 2014 and 2022 and overseas voters. The data breach began as early as 2021 but wasn't detected until a year later. In a statement Monday, the U.K. National Cyber Security Centre (NCSC) said it is "highly likely" that the Chinese hackers accessed and exfiltrated emails and data from the electoral register during the hack.

Security

Chinese Spies Sell Access into Top US, UK Networks (theregister.com) 16

An anonymous reader shared this report from The Register: Chinese spies exploited a couple of critical-severity bugs in F5 and ConnectWise equipment earlier this year to sell access to compromised U.S. defense organizations, UK government agencies, and hundreds of other entities, according to Mandiant.

The Google-owned threat hunters said they assess, "with moderate confidence," that a crew they track as UNC5174 was behind the exploitation of CVE-2023-46747, a 9.8-out-of-10-CVSS-rated remote code execution bug in the F5 BIG-IP Traffic Management User Interface, and CVE-2024-1709, a path traversal flaw in ConnectWise ScreenConnect that scored a perfect 10 out of 10 CVSS severity rating.

UNC5174 uses the online persona Uteus, and has bragged about its links to China's Ministry of State Security (MSS) — boasts that may well be true. The gang focuses on gaining initial access into victim organizations and then reselling access to valuable targets... Just last month, Mandiant noticed the same combination of tools, believed to be unique to this particular Chinese gang, being used to exploit the ConnectWise flaw and compromise "hundreds" or entities, mostly in the U.S. and Canada. Also between October 2023 and February 2024, UNC5174 exploited CVE-2023-22518 in Atlassian Confluence, CVE-2022-0185 in Linux kernels, and CVE-2022-3052, a Zyxel Firewall OS command injection vulnerability, according to Mandiant.

These campaigns included "extensive reconnaissance, web application fuzzing, and aggressive scanning for vulnerabilities on internet-facing systems belonging to prominent universities in the U.S., Oceania, and Hong Kong regions," the threat intel team noted.

More details from The Record. "One of the strangest things the researchers found was that UNC5174 would create backdoors into compromised systems and then patch the vulnerability they used to break in. Mandiant said it believes this was an 'attempt to limit subsequent exploitation of the system by additional unrelated threat actors attempting to access the appliance.'"
Databases

Database For UK Nurse Registration 'Completely Unacceptable' (theregister.com) 42

Lindsay Clark reports via The Register: The UK Information Commissioner's Office has received a complaint detailing the mismanagement of personal data at the Nursing and Midwifery Council (NMC), the regulator that oversees worker registration. Employment as a nurse or midwife depends on enrollment with the NMC in the UK. According to whistleblower evidence seen by The Register, the databases on which the personal information is held lack rudimentary technical standards and practices. The NMC said its data was secure with a high level of quality, allowing it to fulfill its regulatory role, although it was on "a journey of improvement." But without basic documentation, or the primary keys or foreign keys common in database management, the Microsoft SQL Server databases -- holding information about 800,000 registered professionals -- are difficult to query and manage, making assurances on governance nearly impossible, the whistleblower told us.

The databases have no version control systems. Important fields for identifying individuals were used inconsistently -- for example, containing junk data, test data, or null data. Although the tech team used workarounds to compensate for the lack of basic technical standards, they were ad hoc and known by only a handful of individuals, creating business continuity risks should they leave the organization, according to the whistleblower. Despite having been warned of the issues of basic technical practice internally, the NMC failed to acknowledge the problems. Only after exhausting other avenues did the whistleblower raise concern externally with the ICO and The Register. The NMC stores sensitive data on behalf of the professionals that it registers, including gender, sexual orientation, gender identity, ethnicity and nationality, disability details, marital status, as well as other personal information.

The whistleblower's complaint claims the NMC falls well short of [the standards required under current UK law for data protection and the EU's General Data Protection Regulation (GDPR)]. The statement alleges that the NMC's "data management and data retrieval practices were completely unacceptable." "There is not even much by way of internal structure of the databases for self-documentation, such as primary keys, foreign keys (with a few honorable exceptions), check constraints and table constraints. Even fields that should not be null are nullable. This is frankly astonishing and not the practice of a mature, professional organization," the statement says. For example, the databases contain a unique ten-digit number (or PRN) to identify individuals registered to the NMC. However, the fields for PRNs sometimes contain individuals' names, start with a letter or other invalid data, or are simply null. The whistleblower's complaint says that the PRN problem, and other database design deficiencies, meant that it was nearly impossible to produce "accurate, correct, business critical reports ... because frankly no one knows where the correct data is to be found."
A spokesperson for the NMC said the register was "organized and documented" in the SQL Server database. "For clarity, the register of all our nurses, midwives and nursing practitioners is held within Dynamics 365 which is our system of record. This solution and the data held within it, is secure and well documented. It does not rely on any SQL database. The SQL database referenced by the whistleblower relates to our data warehouse which we are in the process of modernizing as previously shared."
Bitcoin

Woman With $2.5 Billion In Bitcoin Convicted of Money Laundering (bbc.co.uk) 70

mrspoonsi shares a report from the BBC: A former takeaway worker found with Bitcoin worth more than $2.5 billion has been convicted at Southwark Crown Court of a crime linked to money laundering. Jian Wen, 42, from Hendon in north London, was involved in converting the currency into assets including multi-million-pound houses and jewelry. On Monday she was convicted of entering into or becoming concerned in a money laundering arrangement. The Met said the seizure is the largest of its kind in the UK.

Although Wen was living in a flat above a Chinese restaurant in Leeds when she became involved in the criminal activity, her new lifestyle saw her move into a six-bedroom house in north London in 2017 which was rented for more than $21,000 per month. She posed as an employee of an international jewelry business and moved her son to the UK to attend private school, the Crown Prosecution Service (CPS) said. That same year, Wen tried to buy a string of expensive houses in London, but struggled to pass money-laundering checks and her claims she had earned millions legitimately mining Bitcoin were not believed. She later travelled abroad, buying jewelry worth tens of thousands of pounds in Zurich, and purchasing properties in Dubai in 2019.

Another suspect is thought to be behind the fraud but they remain at large. The Met said it carried out a large scale investigation as part of the case - searching several addresses, reviewing 48 electronic devices, and examining thousands of digital files including many which were translated from Mandarin. The CPS has obtained a freezing order from the High Court, while it carries out a civil recovery investigation that could lead to the forfeiture of the Bitcoin. The value of the Bitcoin was worth around $2.5 billion at the time of initial estimates -- but due to the fluctuation in the currency's value, it has since increased to around $4.3 billion.

Businesses

Job Boards Are Rife With 'Ghost Jobs' (bbc.com) 75

"Job openings across the country are seemingly endless," writes longtime Slashdot reader smooth wombat. "Millions of jobs are listed, but are they real? Companies may post job openings with no intent to ever fill it. These are known as ghost jobs and there are more than most people realize. The BBC reports: Clarify Capital, a New York-based business loan provider, surveyed 1,000 hiring managers, and found nearly seven in 10 jobs stay open for more than 30 days, with 10% unfilled for more than half a year. Half the respondents reported they keep job listings open indefinitely because they "always open to new people." More than one in three respondents said they kept the listings active to build a pool of applicants in case of turnover -- not because a role needs to be filled in a timely manner.

The posted roles are more than just a talent vacuum sucking up resumes from applicants. They are also a tool for shaping perception inside and outside of the company. More than 40% of hiring managers said they list jobs they aren't actively trying to fill to give the impression that the company is growing. A similar share said the job listings are made to motivate employees, while 34% said the jobs are posted to placate overworked staff who may be hoping for additional help to be brought on.

"Ghost jobs are everywhere," says Geoffrey Scott, senior content manager and hiring manager at Resume Genius, a US company that helps workers design their resumes. "We discovered a massive 1.7 million potential ghost job openings on LinkedIn just in the US," says Scott. In the UK, StandOut CV, a London-based career resources company, found more than a third of job listings in 2023 were ghost jobs, defined as listings posted for more than 30 days.
"Experts caution not every posting that seems like a ghost job is one," notes the report. "Still, whether these postings are ghost jobs -- or simply look and feel like them -- the result is similar. Jobseekers end up discouraged and burnt out."
United Kingdom

Nicholas Hawkes, 39, Becomes First in England To Be Jailed for Cyber Flashing (sky.com) 159

A man has been sentenced for cyber flashing in England for the first time. From a report: Nicholas Hawkes, 39, from Basildon in Essex, was jailed for 66 weeks at Southend Crown Court today after he sent unsolicited photos of his erect penis to a 15-year-old girl and a woman on 9 February. The older victim took screenshots of the offending image on WhatsApp and reported Hawkes to the police the same day.

Cyber flashing became a criminal offence in England with the passage of the Online Safety Act on 31 January. It has been a crime in Scotland since 2010. The offence covers the sending of an unsolicited sexual image to people via social media, dating apps, text message or data-sharing services such as Bluetooth and AirDrop. Victims of cyber flashing get lifelong anonymity from the time they report the offence, as it also falls under the Sexual Offences Act.

Mozilla

Mozilla Ends its Privacy-Friendly GPS-Style Location Service (omgubuntu.co.uk) 17

Mozilla Location Service offered "a free, open way to offer GPS-style location detection features" for developers on devices without GPS hardware, remembers the Linux blog OMG Ubuntu. It used signals like Wi-Fi access points and Bluetooth beacons "without any of the privacy implications most competing geolocation services have."

But Friday they reported that Mozilla "has announced it is ending access to Mozilla Location Service (MLS), which provides accurate, privacy-respecting, and crowdsourced geolocation data." Developers and 3rd-party projects that use MLS to detect a users' location, such as the freedesktop.org location framework GeoClue, which is used by apps like GNOME Maps and Weather, have only a few months left to continue using the service... In late March, POST data submissions will return 403 responses. Finally, on June 12, all 3rd-party API keys will be removed and MLS data only accessible by Mozilla...

MLS' accuracy has declined in recent years. Patent infringement claims in 2019 saw Mozilla reach a settlement to avoid litigation. As part of that settlement it was forced to make changes to MLS that impacted its ability to invest in (commercially exploit?) and improve the service.

The article notes that GeoClue "already supports multiple location detection methods, including IP-based ones," so it should continue operating.

"But the sad reality is that there just aren't a lot of free, open, privacy-friendly, accurate, and (rather importantly for a framework built in to Linux desktops) reliable alternatives to Mozilla Location Services, which has built up a colossal 'signal map' from which to pinpoint locations."

"We are grateful for the contributions of the community to MLS to both the code and the dataset," a Mozilla senior engineering manager said in a statement.
Transportation

Tiny Sea Creatures Could Help Unravel Flight MH370's Mysterious Disappearance. (wionews.com) 28

After the mysterious disappearance of Malaysia Airlines Flight MH370, barnacles offer "a potential breakthrough" in the search for its wreckage, reports WION: These barnacles were discovered clinging to the initial piece of debris conclusively linked to MH370 — a flaperon bearing the distinctive marking "657 BB," which washed ashore on Reunion Island, situated off the coast of Africa, a year following the event...

Scientists now posit that barnacles could provide invaluable insights into solving this mystery. These small creatures offer a unique biological record akin to the growth rings found in trees. Researchers speculate that by deciphering this information, it may be feasible to retrace the barnacles' trajectory along the flaperon, potentially leading investigators to the crash site.

This week the Independent also reported a new theory from a British pilot: Simon Hardy believes that the Malaysian Airlines flight plan and technical log reveal last-minute changes to the cargo including an additional 3,000kg of fuel and extra oxygen that indicate Captain Zaharie Ahmad Shah directed the plane "to oblivion... It's a strange coincidence that the last engineering task that was done before it headed off to oblivion was topping up crew oxygen which is only for the cockpit, not for the cabin crew...."

Hardy also said that the flaperon found on Reunion Island indicates there was an active pilot until the end of the flight: "If the flaps were down, there is a liquid fuel, then someone is moving a lever and it's someone who knows what they are doing. It all points to the same scenario."

In a kind of rebuttal, long-time Slashdot reader Maury Markowitz suggests there's more innocent explanations for the extra fuel and oxygen, arguing that Hardy's theory "sounds like yet more balonium from someone who likes being in the newspapers."

Thanks to Slashdot reader Press2ToContinue for sharing the news.
IT

McDonald's IT Systems Outage Shuts Some Restaurants Globally (bleepingcomputer.com) 32

An anonymous reader quotes a report from BleepingComputer: McDonald's restaurants are suffering global IT outages that prevent employees from taking orders and accepting payments, causing some stores to close for the day. The outages started overnight and are impacting restaurants globally, including those in the USA, Japan, Australia, Canada, the Netherlands, Italy, New Zealand, and the UK. "We are aware of a technology outage, which impacted our restaurants; the issue is now being resolved," McDonald's said in a statement to BleepingComputer. "We thank customers for their patience and apologize for any inconvenience this may have caused. Notably, the issue is not related to a cybersecurity event." In an updated statement, McDonald's says that the outage was caused by a third-party provider during a configuration change. "Many markets are back online, and the rest are in the process of coming back online. This issue was not directly caused by a cybersecurity event; rather, it was caused by a third-party provider during a configuration change."
Bitcoin

Craig Wright Is Not Bitcoin Creator Satoshi Nakamoto, Judge Declares (wired.com) 112

A judge in the UK High Court has declared that Australian computer scientist Craig Wright is not Satoshi Nakamoto, the creator of Bitcoin, marking the end of a years-long debate. From a report: "The evidence is overwhelming," said Honourable Mr. Justice James Mellor, delivering a surprise ruling at the close of the trial. "Dr. Wright is not the author of the Bitcoin white paper. Dr. Wright is not the person that operated under the pseudonym Satoshi Nakamoto. Dr. Wright is not the person that created the Bitcoin system. Nor is Dr. Wright the author of the Bitcoin software," he said.

The ruling brings to a close a six-week trial, in which the Crypto Open Patent Alliance, a nonprofit consortium of crypto companies, asked the court to declare that Wright is not Satoshi on the basis that he had allegedly fabricated his evidence and contorted his story repeatedly as new inconsistencies came to light. "After all the evidence in this remarkable trial, it is clear beyond doubt that Craig Wright is not Satoshi Nakamoto," claimed Jonathan Hough, legal counsel for COPA, as he began his closing submissions on Tuesday. "Wright has lied, and lied, and lied."

Microsoft

Trying Out Microsoft's Pre-Release OS/2 2.0 (theregister.com) 98

Last month, the only known surviving copy of 32-bit OS/2 from Microsoft was purchased for $650. "Now, two of the internet's experts in getting early PC operating systems running today have managed to fire it up, and you can see the results," reports The Register. From the report: Why such interest in this nearly third-of-a-century old, unreleased OS? Because this is the way the PC industry very nearly went. This SDK came out in June 1990, just one month after Windows 3.0. If 32-bit OS/2 had launched as planned, Windows 3 would have been the last version before it was absorbed into OS/2 and disappeared. There would never have been any 32-bit versions: no Windows NT, no Windows 95; no Explorer, no Start menu or taskbars. That, in turn, might well have killed off Apple as well. No iPod, no iPhone, no fondleslabs. Twenty-first century computers would be unimaginably different. The surprise here is that we can see a glimpse of this world that never happened. The discovery of this pre-release OS shows how very nearly ready it was in 1990. IBM didn't release its solo version until April 1992, the same month as Windows 3.1 -- but now, we can see it was nearly ready two years earlier.

That's why Michal Necasek of the OS/2 Museum called his look The Future That Never Was. He uncovered a couple of significant bugs, but more impressively, he found workarounds for both, and got both features working fine. OS/2 2 could run multiple DOS VMs at once, but in the preview, they wouldn't open -- due to use of an undocumented instruction which Intel did implement in the Pentium MMX and later processors. Secondly, the bundled network client wouldn't install -- but removing a single file got that working fine. That alone is a significant difference between Microsoft's OS/2 2.0 and IBM's version: Big Blue didn't include networking until Warp Connect 3 in 1995.

His verdict: "The 6.78 build of OS/2 2.0 feels surprisingly stable and complete. The cover letter that came with the SDK stressed that Microsoft developers had been using the OS/2 pre-release for day-to-day work." Over at Virtually Fun, Neozeed also took an actual look at Microsoft OS/2 2.0, carefully recreating that screenshot from PC Magazine in May 1990. He even managed to get some Windows 2 programs running, although this preview release did not yet have a Windows subsystem. On his Internet Archive page, he has disk images and downloadable virtual machines so that you can run this yourself under VMware or 86Box.

Youtube

Spotify To Test Full Music Videos in Potential YouTube Faceoff (reuters.com) 20

Swedish music streaming company Spotify is rolling out full-length music videos in a limited beta launch for premium subscribers, venturing into an arena that YouTube has dominated for nearly two decades. From a report: Music videos will be available to premium users in the UK, Germany, Italy, Netherlands, Poland, Sweden, Brazil, Colombia, Philippines, Indonesia, and Kenya, in beta starting on Wednesday, the company said, as it attempts to grow its user base. While it aims to reach 1 billion users by 2030, Spotify's new plan faces competition from Apple Music and Alphabet's YouTube, which allows users to watch music videos for free.
Space

'Larger Than Everest' Comet Could Become Visible To Naked Eye This Month 54

12P/Pons-Brooks, a Halley-type comet larger than Mount Everest and with a 71.3-year orbit, is expected to become visible to the naked eye in the coming weeks as it makes its closest approach to the sun on April 21. The Guardian reports: While some reports suggest 12P/Pons-Brooks was spotted as far back as the 14th century, it is named after the French astronomer Jean-Louis Pons who discovered it in 1812 and the British-American astronomer William Robert Brooks who observed it on its next orbit in 1883. Thought to have a nucleus about 30km (20 miles) in diameter, it is classed as a cryovolcanic comet, meaning it erupts with dust, gases and ice when pressure builds inside as it is heated. One such outburst last year caused it to brighten a hundredfold and garnered it the sobriquet of "the Devil Comet" after the haze that surrounds it formed a horned shape.

While the comet -- and its green tinge -- has already been spotted in the night sky, experts say it is expected to become even brighter in the coming weeks. "The comet is expected to reach a magnitude of 4.5 which means it ought to be visible from a dark location in the UK," said Dr Paul Strom, an astrophysicist at the University of Warwick. "The comet moves from the constellation of Andromeda to Pisces. As it does so it passes by bright stars which will make it easier to spot on certain dates. In particular, on March 31 12P/Pons-Brooks will be only 0.5 a degree from the bright star called Hamal," he said. But Dr Robert Massey, the deputy executive director of the Royal Astronomical Society, said even if the comet did become brighter it could still be difficult to see, adding that basic instruments such as small telescopes would greatly help.

"If you have a half-decent pair of binoculars, certainly attempt to look for it with those," said Massey, adding that apps that map the sky were also useful. The best views of the comet are currently to be found in the northern hemisphere. Massey said those who wanted to catch a glimpse should venture out on a clear evening and look low in the west-north-west as twilight came to an end. "You want to avoid haze, you want to avoid moonlight, you want to avoid light pollution."
Earth

No Big North Sea Fossil Fuel Country Has Plan To Stop Drilling in Time For 1.5C Goal (theguardian.com) 151

None of the big oil and gas producers surrounding the North Sea plan to stop drilling soon enough to meet the 1.5C (2.7F) global heating target, a report has found. From a report: The five countries -- the UK, Germany, the Netherlands, Norway and Denmark -- have failed to align their oil and gas policies with their climate promises under the Paris agreement, according to the campaign group Oil Change International.

North Sea governments must act urgently, said Silje Ask Lundberg from Oil Change International, who co-wrote the report. "Failure to address these issues not only undermines international climate goals, but also jeopardises the liveability of our planet." The report found that policies in Norway and the UK were furthest from the Paris climate agreement because the countries were "aggressively" exploring and licensing new oil and gas fields. In 2021, the International Energy Agency found there was no room for new oil exploration in its pathway to net zero emissions.

Medicine

Surgeons Perform UK's First Operation Using Apple's Vision Pro Headset 47

Surgeons in the United Kingdom have performed the first operation in the country using Apple's Vision Pro headset. TechSpot reports: During a recent operation to repair a patient's spine at the private Cromwell Hospital in London, a scrub nurse working alongside the surgeon used the Vision Pro to help prepare, keep track of the procedure, and choose the right tools, reports the Daily Mail. This marked the first operation in the UK where the Vision Pro was used. The software running on Apple's headset during the operation comes from US company eXeX, which has made similar programs for Microsoft's HoloLens. It offers nurses and technicians both holographic and touch-free access to the surgical setup and the procedural guides from within the sterile field of the operating room, according to the press release. The software also tracks each stage of an operation and can measure how well the op went compared to previous procedures performed by other surgeons.

"It eliminates human error and eliminates the guesswork," said Suvi Verho, lead scrub nurse at London Independent Hospital. "It gives you confidence in surgery." While this marked the first time that the Vision Pro was used during a UK surgery, the first-ever time the device was used in an operating room was last month, just three days after its release, when Orlando resident and world-renowned Neurosurgeon Dr. Robert Masson wore it during several spine reconstruction surgeries. "We are in a new era of surgery, and for the first time, our surgical teams have the brilliance of visual holographic guidance and maps, improving visuospatial and temporal orientation for each surgical team and for each surgery in all specialties," said Masson.
AI

Public Trust In AI Is Sinking Across the Board 105

Trust in AI technology and the companies that develop it is dropping, in both the U.S. and around the world, according to new data from Edelman shared first with Axios. Axios reports: Globally, trust in AI companies has dropped to 53%, down from 61% five years ago. In the U.S., trust has dropped 15 percentage points (from 50% to 35%) over the same period. Trust in AI is low across political lines. Democrats trust in AI companies is 38%, independents are at 25% and Republicans at 24%. Tech is losing its lead as the most trusted sector. Eight years ago, technology was the leading industry in trust in 90% of the countries Edelman studies. Today, it is the most trusted in only half of countries.

People in developing countries are more likely to embrace AI than those in developed ones. Respondents in France, Canada, Ireland, UK, U.S., Germany, Australia, the Netherlands and Sweden reject the growing use of AI by a three-to-one margin, Edelman said. By contrast, acceptance outpaces resistance by a wide margin in developing markets such as Saudi Arabia, India, China, Kenya, Nigeria and Thailand.
"When it comes to AI regulation, the public's response is pretty clear: 'What regulation?'," said Edelman global technology chair Justin Westcott. "There's a clear and urgent call for regulators to meet the public's expectations head on."
Security

Fidelity Customers' Financial Info Feared Stolen In Suspected Ransomware Attack (theregister.com) 22

An anonymous reader quotes a report from The Register: Criminals have probably stolen nearly 30,000 Fidelity Investments Life Insurance customers' personal and financial information -- including bank account and routing numbers, credit card numbers and security or access codes -- after breaking into Infosys' IT systems in the fall. According to Fidelity, in documents filed with the Maine attorney general's office, miscreants "likely acquired" information about 28,268 people's life insurance policies after infiltrating Infosys.

"At this point, [Infosys] are unable to determine with certainty what personal information was accessed as a result of this incident," the insurer noted in a letter [PDF] sent to customers. However, the US-headquartered firm says it "believes" the data included: names, Social Security numbers, states of residence, bank accounts and routing numbers, or credit/debit card numbers in combination with access code, password, and PIN for the account, and dates of birth. In other words: Potentially everything needed to drain a ton of people's bank accounts, pull off any number of identity theft-related scams -- or at least go on a massive online shopping spree.

LockBit claimed to be behind the Infosys intrusion in November, shortly after the Indian tech services titan disclosed the "cybersecurity incident" affecting its US subsidiary, Infosys McCamish Systems aka IMS. It reported that the intrusion shuttered some of its applications and IT systems [PDF]. This was before law enforcement shut down at least some of LockBit's infrastructure in December, although that's never a guarantee that the gang will slink off into obscurity -- as we're already seen.
"Since learning of this event, we have been engaged with IMS to understand IMS's actions to investigate and contain the event, implement remedial measures, and safely restore its services," Fidelity assured its customers. "In addition, we remain engaged with IMS as they continue their investigation of this incident and its impact on the data they maintain."
United States

Wildfires Threaten Nuclear Weapons Plant In Texas (independent.co.uk) 68

An anonymous reader quotes a report from The Independent: Wildfires sweeping across Texas briefly forced the evacuation of America's main nuclear weapons facility as strong winds, dry grass and unseasonably warm temperatures fed the blaze. Pantex Plant, the main facility that assembles and disassembles America's nuclear arsenal, shut down its operations on Tuesday night as the Windy Deuce fire roared towards the Potter County location. Pantex re-opened and resumed operations as normal on Wednesday morning. Pantex is about 17 miles (27.36 kilometers) northeast of Amarillo and some 320 miles (515 kilometers) northwest of Dallas. Since 1975 it has been the US's main assembly and disassembly site for its atomic bombs. It assembled the last new bomb in 1991. "We have evacuated our personnel, non-essential personnel from the site, just in an abundance of caution," said Laef Pendergraft, a spokesperson for National Nuclear Security Administration's Production Office at Pantex. "But we do have a well-equipped fire department that has trained for these scenarios, that is on-site and watching and ready should any kind of real emergency arise on the plant site."
United States

US Leading Global Alliance To Counter Foreign Government Disinformation (theguardian.com) 122

An anonymous reader quotes a report from The Guardian: A global coalition of democracies is being formed to protect their societies from disinformation campaigns by foreign governments, the US special envoy on the issue has said. James Rubin, the special envoy for non-state propaganda and disinformation efforts at the US state department's global engagement centre (GEC), said the coalition hoped to agree on "definitions for information manipulation versus plain old opinions that other governments are entitled to have even if we disagree with them." The US, UK and Canada have already signed up to a formal framework agreement, and Washington hopes more countries will join.

The GEC focuses solely on disinformation by foreign powers. Apart from trying to develop global strategies, it works to expose specific covert disinformation operations, such as a Russian operation in Africa to discredit US health services. The US, UK and Canada signed the framework to counter foreign state manipulation this month with the aim of addressing disinformation as a national security threat that requires coordinated government and civil society responses. "Now is the time for a collective approach to the foreign information manipulation threat that builds a coalition of like-minded countries committed to strengthening resilience and response to information manipulation," the framework says. It also encourages information-sharing and joint data analysis tools to identify covert foreign disinformation.

A hugely experienced US official and journalist who has worked with diplomats such as Madeleine Albright in the past, Rubin admitted his first year as special envoy had been one of his most intellectually taxing because of the complex definitions surrounding disinformation. In the continuum between hostile opinion and disinformation, he has tried to identify where and how governments can intervene without limiting free speech. The principle on which he has alighted is deception by foreign powers. "In principle every government should be free to convey their views, but they should have to admit who they are," he said an interview. "We want to promote more fact-based information, but at the same time find ways to label those information operations that are generated by the Chinese government or the Kremlin but to which they don't admit. "In the end that is all I know we can do right now without interfering with a free press. We are not asking for such covert disinformation to be taken down but a way to be found for the source to be labelled."

Slashdot Top Deals