18.3 C
London
Tuesday, August 22, 2017
Home Tags ABC News

Tag: ABC News

Welch searched for a “corrupt system that kidnaps, tortures, and rapes babies.”
No other Flex 2 devices have reportedly had this problem.
Specific date/time and source suggest a highly technical breakdown is forthcoming.
Kali Kanongataa broadcast his partner going into labor on Facebook Live.

Monday's "temporary outage" leaves thousands of international travelers stranded.

A nationwide Customs and Border Protection system outage stranded thousands of travelers at airports on Monday.

Folks trying to enter the US via a handful of cities were met with long lines and excessive delays as customs officers manually processed international passengers.

Issues were reported in Atlanta, Ft. Lauderdale, Los Angeles, Miami, and Washington, D.C., as well as Baltimore, Boston, Newark, and San Francisco. All airports came back online Monday night, following what CBP called "a temporary outage" of its processing systems.

"US Customs and Border Protection is experiencing a temporary outage with its processing systems at various air ports of entry and taking immediate action to address the technology disruption," the agency said in a statement to ABC News.

"CBP officers continue to process international travelers using alternative procedures until systems are back online," it continued. "Travelers at some ports of entry are experiencing longer than usual wait times and CBP officers are working to process travelers as quickly as possible while maintaining the highest levels of security."

US Customs and Border Protection did not immediately respond to PCMag's request for comment. According to a tweet, however, there is no indication the disruption was malicious.

According to social media accounts, conditions at Miami International Airport were particularly harsh: an army of angry, hungry people crowded the hallways for three-plus hours as rising temperatures caused fainting and vomiting.

@cnnbrk please let US Customs know the Miami airport could use a little help. Thousands of us waiting in a "line". pic.twitter.com/VGLUOUiaoP

— Garret Prather (@garretp) January 3, 2017

@wsvn immigration @ M.I.A. Hundreds waiting, system has been down for hours pic.twitter.com/kuyR9u7boO

— Reza (@EGerami) January 3, 2017

Nightmare at the #Miami airport for all incoming int'l flights: all systems were down at immigration. Hours of wait #miamiairport pic.twitter.com/MOorFyfv9x

— Sarah (@iLoveSassou) January 3, 2017

Similar scenes were depicted at Washington Dulles International Airport, where Twitter user Richard Walker documented "36 unusable passport express kiosks, 20 unused global entry" stalls, eight agents, and a one-hour wait.

Organization for Security Cooperation in Europe confirms data breach but does not name perpetrator. The Organization for Security Cooperation in Europe (OSCE), a group that monitors the Russian-fomented Ukraine conflict, has confirmed that a breach of its network was discovered last month, ABC News reports.

An investigation identified the method of attack and “some of the external communication destinations” but not the perpetrator. This attack is seen as an extension of the ongoing Ukrainian conflict, with the war having moved to cyberspace after a major power outage in the country last December was attributed to hackers.

Cybersecurity company FireEye has said a Russia-linked hack group Sandworm was responsible for the blackout, using malware BlackEnergy3. Some sources allege the attack on OSCE was possibly conducted by hacking group Fancy Bear (a.k.a.

APT28, Sofacy, and Pawn Storm), which is reportedly linked to Russian military unit GRU. “Fancy Bear’s profile closely mirrors the strategic interests of the Russian government,” says cybersecurity firm CrowdStrike, alleging it was one of the two groups behind the Democratic National Committee breach in June. Read more on ABC News. Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events.

For more information from the original source of the news item, please follow the link provided in this article.
View Full Bio More Insights
Enlarge / Edgar Maddison Welch, 28, is arrested outside the Comet Ping Pong restaurant December 4 in Washington, DC.ABC News/YouTube reader comments 58 Share this story Last week, we brought you the bizarre tale of a gunman who drove from his North Carolina home to Washington, DC, to "self-investigate" a pizza restaurant at the center of a whacko fake news conspiracy called "Pizzagate." The story began when DC's Metropolitan Police Department arrested 28-year-old Edgar Maddison Welch on allegations of assault with a dangerous weapon.

The feds took over the case on Tuesday and have charged Welch with Interstate Transportation of a Firearm with Intent to Commit an Offense, which carries a maximum 5-year term. Welch appeared in federal court in Washington, DC, on Tuesday and asked for a lawyer. He remains jailed until at least Friday, when a detention hearing is scheduled. According to a federal agent's affidavit, Welch went into the Comet Ping Pong restaurant December 4 armed with a loaded AR-15 assault-style rifle and carrying a loaded .38-caliber revolver. WELCH entered the restaurant carrying the AR-15 across his chest, in a manner that instilled fear in everyone who saw him.

As WELCH moved towards the back of the restaurant, customers and employees fled the building, fearing for their lives. While WELCH was inside the restaurant, he fired the AR-15 multiple times.
Shortly after that, when an unaware employee walked through a rear door into the restaurant, WELCH turned towards the employee, such that his rifle was pointed in the direction of the employee, who immediately fled in fear. (PDF) But why would Welch allegedly do this? According to FBI agent Justin Holgate: As set forth below, WELCH appears to have been motivated, in part, by unfounded rumors concerning a child sex-trafficking ring that was being perpetrated by high-profile individuals at the Comet Ping Pong restaurant.

According to evidence obtained from his cellphone, it appears that WELCH had been contemplating a violent confrontation at the restaurant since at least December 1, 2016.

The evidence from WELCH's cellphone also suggests that WELCH attempted to recruit at least two other people to join him. For the uninitiated, Agent Holgate is describing "Pizzagate," which is a baseless conspiracy theory about a secret pedophile group, the Comet Ping Pong restaurant, and Hillary Clinton's campaign chief, John Podesta.

The Pizzagate conspiracy names Comet Ping Pong as the secret headquarters of a non-existent child sex-trafficking ring run by Clinton and members of her inner circle. James Alefantis, the restaurant's owner, said he has received hundreds of death threats.

The Pizzagate theory is believed to have been fostered by a white supremacist's tweets, the 4chan message board, Reddit, Donald Trump supporters, right-wing blogs, and Michael G.

Flynn, a recently-fired member of President-elect Donald Trump's transition team and the son of Lt.

Gen. Michael T.

Flynn, Trump's choice for national security adviser. At the restaurant, according to the FBI agent: [Welch] searched for evidence of hidden rooms or tunnels or child sex-trafficking of any kind. WELCH stated that, at one point, he encountered a locked door. When he was unable to open the door, WELCH became suspicious and attempted to force it open with a butter knife and then by shooting the lock. WELCH said that he fired shots at the lock using his AR-15. The agent wrote that the defendant was watching YouTube videos on December 1 when he texted his girlfriend about his research into Pizzagate. He said it made him "sick." He texted another person identified as "B" to "Watch 'PIZZAGATE: The bigger Picture' on YouTube." Another text on December 2 to somebody identified as "C" in court papers asked if that person was "down for the cause." According to the affidavit: Raiding a pedo ring, possibly sacraficing [sic] the lives of a few for the lives of many.
Standing up against a corrupt system that kidnaps, tortures, and rapes babies and children in our own backyard... defending the next generation of kids, our kids, from ever having to experience this kind of evil themselves[.] I'm sorry bro, but I'm tired of turning the channel and hoping someone does something and being thankful it's not my family. One day it will be our families.

The world is too afraid to act and I'm too stubborn not to[.] Hours before the incident, the authorities said he recorded a video on his mobile phone. The phone camera was aimed at WELCH, who looked into the camera and told family members that he loved them; that he hoped that he had "showed it;" and that he hoped that he would be able to "tell [them] again." "And if not," he told them "don’t ever forget it." The agent said that, when the authorities arrived at the restaurant, customers were fleeing from the restaurant. Minutes later, Welch exited the building with his hands in the air.

The agent said the AR-15 had one round in the chamber and 22 rounds in the magazine.

The authorities also found shell casings, which was "consistent with the audible evidence that WELCH had discharged the AR-15 multiple times inside the restaurant. "WELCH claimed that, after he found no evidence of child sex-trafficking, he exited the restaurant and surrendered himself to police officers that were already on-scene," the agent wrote.
Enlarge / Edgar Maddison Welch, 28, arrested outside the Comet Ping Pong pizzeria in Washington, DC.ABC News/YouTube reader comments 346 Share this story A rifle-wielding North Carolina man was arrested Sunday in Washington, DC for carrying his weapon into a pizzeria that sits at the center of the fake news conspiracy theory known as "Pizzagate," authorities said Monday. DC's Metropolitan Police Department said it had arrested 28-year-old Edgar Maddison Welch on allegations of assault with a dangerous weapon. "During a post arrest interview this evening, the suspect revealed that he came to the establishment to self-investigate 'Pizza Gate' (a fictitious online conspiracy theory)," the agency said in a statement. Welch was arrested without incident. According to police, the suspect entered the Comet Ping Pong restaurant in DC around 3pm and pointed the firearm at an employee. He then discharged it without anybody getting hurt. Witnesses said restaurant patrons scattered from the venue. "Pizzagate" concerns a baseless conspiracy theory about a secret pedophile group, the Comet Ping Pong restaurant, and Hillary Clinton's campaign chief, John Podesta.

The Pizzagate conspiracy names Comet Ping Pong as the secret headquarters of a non-existent child sex-trafficking ring run by Clinton and members of her inner circle. James Alefantis, the restaurant's owner, said he has received hundreds of death threats.

According to Buzzfeed,the Pizzagate theory is believed to have been fostered by a white supremacist's tweets, the 4chan message board, Reddit, Donald Trump supporters, and right-wing blogs. The day before Thanksgiving, Reddit banned a "Pizzagate" conspiracy board from the site because of a policy about posting personal information of others. Reddit CEO Steve Huffman—who was facing vitriolic online fire for the move—altered Reddit comments directed at him. Huffman's move prompted him to apologize and to take more proactive steps to clean up the Reddit online community, which he said was "not sustainable" in its current form. After the latest incident at the Comet Ping Pong, the Metropolitan Police Department said in a statement that it was "monitoring the situation and aware of general threats being made against this establishment." A fake story based on the conspiracy theory even received fuel by General Mike Flynn, Donald Trump's national security advisor pick.

Days before the election, he tweeted a fake news story about it and said "U decide" and "MUST READ!" Alefantis, the pizzeria's owner, told CNN, "What happened today demonstrates that promoting false and reckless conspiracy theories comes with consequences.
I hope that those involved in fanning these flames will take a moment to contemplate what happened here today, and stop promoting these falsehoods right away." The police said two weapons were found in the pizzeria.

Another weapon was discovered in the suspect's vehicle, the authorities said. Welch is expected to appear in a local court Monday afternoon.
Every time there's an election, the topic of hacking one comes to the surface.

During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some sort of vote hacking coverage.

But can you really hack an election? Maybe, but that depends on your goals. The topic of election hacking is different this year, and that's because someone is actually hacking political targets.

Adding fuel to the fire, on Aug. 12, 2016, during an event in Pennsylvania, Donald Trump warned the crowd that if he loses the battleground state, it's because the vote was rigged. "The only way we can lose, in my opinion -- and I really mean this, Pennsylvania -- is if cheating goes on," Trump said.

This was no random remark either, Pennsylvania voting has been called in to question before.
Such was the case when Republican supporters claimed Mitt Romney lost the state in 2008 due to fraud. When it comes to hacking elections, most people imagine voting machines compromised in such a way that a vote for candidate 'A' actually counts as a vote for candidate 'B' – or the votes just disappear. However, security experts who have tackled the topic of election hacking often come to a single conclusion, while the machines that process votes are riddled with vulnerabilities – 278 disclosed historically, none with a CVE ID assignment – they're not the problem.

The real attack surface is the way voters are processed. In a recent Privacy XChange Forum survey including 2,004 people, nearly 40 percent of those questioned said they were concerned about the amount of personal data in the possession of political parties and campaigns. Earlier this year, CSO Online's Salted Hash, working alongside researcher Chris Vickery, broke the news that 191 million voter records were exposed due to database configuration issues. Q&A: The myths and realities of hacking an election | See the entire series of stories focusing on election hacking A week later Salted Hash broke the news that a second database, holding details on 56 million voters, was exposed by similar database configuration breakdowns.

Compounding the problem further, this second database contained targeted, issues-based details on 18 million people. Dave Lewis, security advocate for Akamai All of the information in the two databases came from the political parties, local election boards, and the voters themselves – who submitted it as part of a focused Q&A, donation questionnaire, or the data was collected from data brokers and public records. Records like the ones exposed earlier this year are collected, sorted, sold, and shared among political operatives and campaigns; yet, every single record started out as a basic voter registration form. This is where the problem, and the reality of hacking an election, begins to unfold. Target the systems running the vote "The biggest obstacle for hackers seeking to rig the vote count is the lack of standardization for electronic voting mechanisms across states, which may have very different systems," said Rook Security's Security Operations Leader, Mat Gangwer. "The decentralization of a common voting standard contains the damage if attackers were to compromise a particular system.
In order to be successful enough to influence a national election, hackers must carefully select where and what to attack.

At a macro level, hackers only need to focus on the handful of battleground states that are likely to influence the winner." Another key element would be the need to focus on areas that lack an auditable trail of paper ballots and large population centers that could conceivably “experience” a swing in votes large enough to matter at the state level.

An election with high-expected voter turnout would also serve as cover. A sad fact, referenced by the FBI, is that the election process is secured by obscurity.
It's so "clunky and dispersed" that hacking the infrastructure directly makes the task of hacking an election nearly impossible. Target the campaigns directly "It is no small feat to steal an election but, it is not beyond the realm of possibility," said Dave Lewis, security advocate for Akamai, and CSO Online blogger. No matter what, he added, the effort would require a prolonged campaign to collect information on their target. "The attackers would probe the defenses of the other party looking for any low-hanging fruit such as poorly secured systems. Once the homework has been done, they will attempt to comprise systems listed from their research," Lewis said. "The goal here will be to collect as much information as they can gather from the other campaign such as campaign strategies, voter lists, emails.

The point here is to be able to counter the moves of the opposite candidate on the political stage. Knowing the game plan in advance would not hurt for the attackers.

As well, being able to leak internal communications can be used in an attempt to discredit the target candidate." In addition to all of that, the attackers would also need to run a focused social media campaign to help sway public opinion. "We have seen that sort of activity in the current US election as well as in the elections of other countries," Lewis added. Polling data can also be a source of influence as a means to compromise an election. "If I were a hacker, I wouldn't hack the voting systems.
I'd wait until the data were aggregated from the polls and then hack that data. Leading up to the elections a lot of attention is on polls - if the data on the polls can be manipulated or lost, it would create chaos in the campaigns and reduce trust in the final election outcome," said Amol Kabe, vice president of product management at Netskope. Soft targets As mentioned, the topic of election hacking is usually only discussed during election season, but this year is different, because someone is actually hacking political targets, including Hilary Clinton and voter registration databases. In August, someone leaked an Amber TLP memo from the FBI, this was unusual because advisories such as this rarely go public. The leaked memo cites details released by MS-ISAC (Multi-State Information Sharing Analysis Center), stating that foreign actors are using common scanning tools to locate and compromise vulnerable election systems in Illinois and Arizona.
Salted Hash covered the memo at length, including all of the technical details released by MS-ISAC and the FBI. Recently, reports of two additional voter registration system compromises have started to circulate online. However, these rumors are only supported by anonymous sources cited by ABC News. One of the suspected states, Florida, denied that there were any problems. On September 28 FBI Director James Comey told the House Judiciary Committee "there's no doubt that some bad actors have been poking around" on voter registration systems.  "There have been a variety of scanning activities, which is a preamble for potential intrusion activities as well as some attempted intrusions at voter registration databases beyond those we knew about in July and August. We are urging the states just to make sure that their deadbolts are thrown and their locks are on, and to get the best information they can from DHS just to make sure their systems are secure," Comey said in response to questions. "And again, these are the voter registration systems.

This is very different than the vote system in the United States, which is very, very hard for someone to hack into because it's so clunky and dispersed – it's Marry and Fred putting a machine under the basketball hoop at the gym.

Those things are not connected to the internet, but the voter registration systems are." Twenty-four hours earlier, on Sept. 27, Jeh C. Johnson, Secretary of the U.S.

Department of Homeland Security, told the Senate Committee on Homeland Security and Governmental Affairs, his agency has reached out with offers of assistance to state and election officials. The DHS offer includes remotely conducted cyber hygiene scans on internet-facing systems; on-site risk and vulnerability assessments; access to the NCCIC 24x7 incident response center; sharing of relevant information on cyber incidents and best practices; and access to field-based cybersecurity and protective security advisers. "To date, 18 states have requested our assistance," Johnson said. It's important to remember that the registration databases in Arizona and Illinois were targeted and compromised via common tools and methods.

The attackers, whoever they were, didn't need to be advanced or highly skilled, they just needed to know how to click a button and download results. Moreover, the DHS protection is basic, focusing on best practices and a checklist mentality for security – something experts disagree with, because attack surfaces are unique and can change from network to network. It's about influence, not voting machines: In an interview with CSO Online, Carson Sweet, CTO of CloudPassage, mirrored Lewis' and Gangwer's opinions – influencing the outcome of the voting process by compromising voting machines is improbable, but not impossible. "We're not on the brink of democracy's digital implosion, but we have a lot of work left to do.
In any case, it's about much more than just the voting machines, so let's not get myopic and lose track of the bigger picture," Sweet said. According to ballotpedia.org, most of the voting technology used these days is either mostly paper-based or uses a paper backup to direct recording electronic (DRE) systems. About 14 percent of electoral votes are in swing states where some percentage of voting machines are DRE without a paper backup – specifically Florida, Virginia, and Pennsylvania.

But even in those cases, some districts use paper ballots and DRE with paper backups. Only one state, Louisiana, uses DRE with no paper backup at all. "This means that irregularities in vote counts, either by compromising the voting machine or election management software (the "back-end" to voting machines) would be recognized in spot-checks or manual verification counts, which many states still perform," Sweet said. "Keep in mind that just compromising a few machines is not enough, unless you could see into the future to know exactly where those extra 500 votes would matter. You would have to compromise enough machines to guarantee a win; otherwise, what's the point?" Sweet says that if he were to construct a scenario in which he could impact a vote, the approach would be to disrupt voting in the swing states and other key voting areas. So how would he do this? "By compromising online voter databases well before the election," he explains. "Federal law requiring that voter records be unified online actually make this easier for an attacker since there's only one place to go per state (e.g.

California's VoteCal system)," Sweet added. Imagine what would happen if an attacker were able to dissociate physical signatures from voter records. Or perhaps the attacker could randomly scramble the last six digits of someone's Social Security number; mark a significant number of voters as deceased - or some combination of all of the above. If done too broadly, Sweet explained, it would cause pandemonium at a voting site. Yet, if done with just the right amount and with consistency, the blame might likely land on bad administration or voters who incorrectly registered. "By invalidating the ability for my opponent's voters to cast their ballots, I could significantly and broadly disrupt voting and their overall voting count," Sweet said. "I mean let's face it, have you logged in to verify that all your voter registration data is correct?" This story, "Hacking an election is about influence and disruption, not voting machines" was originally published by CSO.

reader comments 175 Share this story UPDATE 5:20pm PDT: The lawyer representing the victim's family said that, after watching the footage, he could not tell whether the victim was holding a weapon.

The attorney, Justin Bamberg, said the family wants the video footage released to the public. ORIGINAL STORY: A day after North Carolina's governor declared a state of emergency amid violent protests following the police killing of a black man, Charlotte's police chief said Thursday the agency will not publicly release video footage of Keith Lamont Scott's death. A black officer from the Charlotte Mecklenburg Police Department killed Scott, 43, on Tuesday outside an apartment complex while serving a warrant on somebody else.

The officer, who has been placed on administrative leave, said Scott had a handgun as he got out of a vehicle and did not follow orders to drop it.

Friends and family members maintain Scott was carrying a book—an assertion flatly denied by Kerr Putney, the police chief.

At a press conference, he said the authorities retrieved a handgun Scott "was holding in his hand when he got out of the vehicle." Shooting victim Keith Lamont Scott. Facebook The chief is currently investigating the incident, which is yet another instance of police shooting a black man in the US.

According to various watchdog sources—the Washington Post, The Guardian and the Killed by Cops database—between 706 and 844 people have been killed by US cops in 2016. Of that total, the North Carolina ACLU notes there were 194 deceased black Americans. Chief Putney said Thursday that footage from the Scott shooting does not show "absolute, definitive visual evidence that could confirm that a person is pointing a gun.
I didn’t see that in the videos I saw." Still, Putney told the news conference that he'll only show the footage to the victim's family, not the public. The chief said the agency only publicly releases video of shootings "when we believe there is a compelling reason." He said the department wants to be as transparent as possible, "but I never said full transparency." "If you think we should display a family’s worst day for public consumption, that is not the transparency we’re speaking of," Putney said. The chief's comments come a week before a North Carolina law goes into effect that would require a court order to disclose police footage to the public. Members of Congress, the NAACP, the American Civil Liberties Union, and others have called for the department to release the video. "In the interest of transparency and accountability, and particularly in light of conflicting accounts about the shooting, the Charlotte-Mecklenburg Police Department should quickly release any and all footage it has of the events leading up to the shooting, as well as the shooting itself," said Karen Anderson, the ACLU of North Carolina executive director. The Charlotte police agency requires officers to wear body cams.

At least three officers on the scene were wearing body cams. Officer Brentley Vinson, the shooter, was not wearing one at the time of the incident. Listing image by ABC News/YouTube