美国联邦调查局(FBI)寻求“近乎实时”访问美国车牌识别系统。
The FBI Wants 'Near Real-Time' Access to US License Plate Readers

原始链接: https://www.wired.com/story/security-news-this-week-fbi-license-plate-reader-real-time-access/

本周新闻重点关注了隐私、安全及执法技术领域的重大进展。主要更新包括《移除法案》(Take It Down Act)的颁布,该法案旨在帮助受害者移除未经同意的私密照片;此外,针对数据经纪商操纵性退订流程的打击力度也在加大。同时,美国联邦贸易委员会(FTC)就无效的“主动监听”广告技术与多家营销公司达成和解。 在监控领域,争议不断:尽管一些立法者试图限制该技术的使用,联邦调查局(FBI)仍寻求数百万美元资金,以获取全国范围内的实时车牌识别(ALPR)数据。在网络安全方面,GitHub 遭遇了 TeamPCP 组织的攻击;谷歌则意外泄露了一个尚未修复的重大 Chromium 漏洞,该漏洞允许攻击者劫持浏览器进行持续监控或开展僵尸网络活动。 其他值得关注的新闻还包括:针对一名前警官为美国移民及海关执法局(ICE)提供枪支训练的调查,一名警察与麦迪逊广场花园之间的法律纠纷,以及欧洲国家寻求“无美国参与”的技术替代方案。此外,特朗普政府与硅谷之间的纠葛持续影响着全球科技政策。

近期的一场 Hacker News 讨论引发了人们对美国联邦调查局(FBI)寻求获取国内车牌识别系统“近乎实时”数据的担忧。 评论者认为,物理监控的扩大正在形成一个“全面监控国家”,从而损害个人隐私。尽管一些参与者起初怀疑地方官员是否有权阻止联邦倡议,但另一些人则反驳称,地方和州政府拥有巨大的影响力。 主张地方抵制的人士认为,市长和州参议员可以通过取消供应商合同、拒绝合作以及建立类似于芝加哥学区针对美国移民与海关执法局(ICE)的“庇护”政策,来有效阻碍监控。用户还指出,与步行相比,对汽车的依赖(汽车本身就充当了追踪信标)削弱了公民自由。讨论达成的共识强调,参与“基层”地方政治是抵制联邦越权的一种可行且高效的策略,因为地方集体的拒绝合作可以为联邦机构制造重重障碍。
相关文章

原文

A WIRED investigation this week found that a former Phoenix police officer who owns a company that offers firearms training to Immigration and Customs enforcement was involved in six shootings, four of which were deadly. Meanwhile, a New York police officer’s lawyer has been banned from Madison Square Garden amid a lawsuit the cop filed over injuries sustained during a boxing match at an MSG venue.

The Take It Down Act went into effect in the United States this week, allowing people to demand that websites and other platforms remove their nonconsensual nudes. WIRED reached out to more than a dozen companies to give you a rundown on how to take action. If you’re trying to opt out of having your data collected by data brokers and other companies, however, the process might not be so simple. New research claims that many major companies used manipulative tactics to keep people from opting out.

The Federal Trade Commission this week announced a settlement with three marketing firms—not because they sold “Active Listening” technology for serving targeted advertising, but because the technology allegedly did not work.

A bipartisan pair of US lawmakers this week took an initial stab at cracking down on automatic license plate readers, or ALPRs. Their legislation would have effectively prevented state and local governments from using the surveillance tech for police tracking.

GitHub, the popular Microsoft-owned code repository, suffered a data breach this week. The attack is part of a never-before-seen string of similar breaches carried out by the cybercrime group TeamPCP.

Finally, as the Trump administration and US tech companies have grown increasingly intertwined, European nations are looking for US-free alternatives, with France leading the charge.

And that’s not all. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

While US lawmakers stealthily proposed to prohibit the use of automated license plate readers across the country this week, it has also been revealed that the Federal Bureau of Investigation is planning to buy nationwide access to the cameras and access “near real time” data about vehicle movements.

First reported by 404 Media, recently published procurement records for the FBI Directorate of Intelligence show the agency gearing up to pay millions for access to data captured by roadside ALPR data. These cameras take images of every passing vehicle, adding their license plate, location, time and data, into searchable databases that are often accessed by local law enforcement agencies and some federal agencies.

“The FBI has a crucial need for accessible LPRs to provide a diverse and reliable range of collections across the United States,” a statement of work says. “This data should be available across major highways and in an array of locations for maximum usefulness to law enforcement.” Further documents said the access to data must be provided in “near real time.”

Google this week made public a working proof-of-concept for an unfixed vulnerability in Chromium, the open source codebase underpinning Chrome, Microsoft Edge, Brave, Opera, Vivaldi, and Arc, reported Ars Technica. The flaw was originally reported to the company 42 months ago by independent researcher Lyra Rebane, who initially assumed Wednesday's posting to the project's bug tracker meant a patch had finally shipped. It hadn't. Google pulled the disclosure after the error became apparent, but the exploit code is already mirrored on archival sites.

The bug abuses the Browser Fetch API, a feature meant to handle large background downloads, allowing any website a target visits to spin up a persistent service worker on the device. The resulting connection can be used to monitor browsing activity, route traffic through the victim's machine, or pull the device into a proxied DDoS network—connections that survive browser restarts and, in some cases, reboots. On Edge, telltale signs are minimal. Chrome users may see an unexplained downloads dropdown.

联系我们 contact @ memedata.com