| https://twitter.com/justinschuh | |
| Github | https://github.com/jschuh |
| Bluesky | https://bsky.app/profile/justinschuh.com |
| https://twitter.com/justinschuh | |
| Github | https://github.com/jschuh |
| Bluesky | https://bsky.app/profile/justinschuh.com |
Gmail account appears to be fine, but the Amazon account has definitely been hijacked. Looks like the attacker texted a link that the neighbor clicked on this morning, and that completed some sort of account ownership transfer. Neighbor assures me they just clicked the link and didn't enter anything. They just landed on an Amazon page that said their account had been successfully transferred to someone else (they have a screenshot of the hijacker's email address).
They've been on the phone with Amazon trying to get it resolved, but if the description is correct it sure seems like there's a vulnerability on Amazon's end here.
At exactly the same time the SMS was sent the neighbor's Gmail account got hit with a firehose of thousands of spam messages persisting for several hours, which is why they thought the Gmail account was hacked (and also why they clicked the Amazon phishing link from the SMS).
Does this sort of thing sound familiar to anyone?
I just determined that plus addressing on email forwards broke with the transition from Google Domains to Squarespace (i.e. forwarding [email protected] to [email protected] used to also forward [email protected] to [email protected]). This means I'm now missing a bunch of emails, because as a general rule I would create a custom plus address with a relevant tag anytime I registered an email.
So now I'm wondering if anyone has thoughts on a way to get this working in Squarespace. I added a wildcard email rule as a stopgap, but even that requires 24-48 hours to take effect.
Alternatively, does anyone have any good recommendations on domain hosting providers that support email forwarding with plus addressing?
Anyone familiar with truv.com for employment verification? All I know so far is that it bootstraps off an HTTP URL with a massive unique identifier (of course you get a cert error if you try to force HTTPS). That just takes you to a landing page, which requires installing an app to do literally anything.
Seems kinda concerning that a one-time event like employment verification would require installing an app. And then there's the obvious question of why they have an app at all, since you're not going to be pinging payroll providers from on-device.
The whole thing just seems insanely sketchy.
Attached: 1 image Today's story: Why Your Wi-Fi Router Doubles as an Apple AirTag Apple and the satellite-based broadband service Starlink each recently took steps to address new research into the potential security and privacy implications of how their services geo-locate devices. Researchers from the University of Maryland say they relied on publicly available data from Apple to track the location of billions of devices globally -- including non-Apple devices like Starlink systems -- and found they could use this data to monitor the destruction of Gaza, as well as the movements and in many cases identities of Russian and Ukrainian troops. https://krebsonsecurity.com/2024/05/why-your-wi-fi-router-doubles-as-an-apple-airtag/
Big day for the V8 Sandbox:
* Now included in the Chrome VRP: http://g.co/chrome/vrp/#v8-sandbox-bypass-rewards
* Motivation & goals discussed in a new technical blog post: http://v8.dev/blog/sandbox
If there is ever a Sandbox "beta" release, this is it!
Hey Google friends, I wanted to cloud host a static site and the first search result was for a Google hosted tutorial that links to malware. I don't know who to bug about it, but I thought someone here might be able to help:
https://github.com/googlecodelabs/monolith-to-microservices/issues/71
On the plus side, I reported the malicious extension that the site tried to trick me into installing and that got taken down almost immediately (after being up for only a few weeks and having a very low user count). So kudos to @parkern and friends.
The Host a Static Website in Google Cloud with Cloud Storage tutorial includes links to cookingincloudhipster.com. When I clicked on one of these links I was redirected to a site that attempted to ...
I wonder how long it's going to be before someone uses this same trick at the microarchitectural level, racing ILP execution units to hit some externally observeable condition in some distinguishable way.
(Zenbleed on AMD wasn't far off, but that bug was about a register rename messing up z-bit flag rollback in the register file during mispredicted speculative execution of the vzeroupper instruction, so a race condition wasn't really required there)
The Difference Between How Trump, Biden, Pence, and Clinton Mishandled Classified Information
I should first state where I’m coming from (because #IANAL). I served in the US intelligence community from 1996-2004, first as an enlisted Marine, and then as a federal employee at NSA and later CIA. I worked on watchfloors and did ops, but most of that career was spent managing and/or securing classified systems. I was trained at the Fort Washington¹ facility in qualifying SCIFs², had my classified courier card for years, and in my time saw a few classified mishandling cases up close.
Next is a bit of background on how classified information handling works. In the 99.99% case, classified docs are only ever handled in SCIFs (which have fence-lines and armed guards). Printed documents are marked with their classification level, and when not in use everything is locked in a properly rated safe, managed with access logs. Classified computer systems are rated to the maximum level of classified allowed, and also secured when not in use. Systems at different classification levels are air-gapped to prevent leakage (technically it’s more complicated, but accurate for this discussion).
The last bit of background is the legal framework for classified document handling. There actually is no law defining classified information or handling processes. Rather, there’s the 1917 Espionage Act³, plus 100 years of legal precedent and executive orders (most recently EO 13526⁴). The Espionage Act refers to a very broad category of “information respecting the national defense” and makes illegal the dissemination of this information through either “willful intent” or “gross negligence.”
The key point is that the law applies to a broad category of information, and the EOs build a framework for identifying such information and how to securely handle it. This is also the main basis that the courts use to delineate violations of the law, which is why classified mishandling is prosecuted under the Espionage Act.
With all of that out of the way, it’s time to look at each of these cases of classified mishandling. I’ll start with Clinton’s case first, because it’s the weirdest, in that it only barely involves classified data handling. That might seem confusing given all the press coverage in 2016, but the most accurate description of what Clinton did is that she forwarded emails from her official DoS (Department of State) email account to a personal account. The critical thing here is that because her DoS account was on a FOUO (For Official Use Only⁵) system, directly connected to the public Internet, those emails never should have contained any classified information. FOUO systems may contain sensitive information, but are explicitly not for handling classified information.
Accepting that, sometimes classified information leaks to a FOUO system. This tends to happen one of two ways, the first of which is usually in preparing briefings/reports for a lower classification level. It’s common to pull some of that information from classified documents, declassify as needed, and then transfer that to a lower classification system. Sometimes mistakes are made in this process and (now invalid) classification markings are left in the downgraded document. That explains the classification markings found in a few of Clinton’s emails⁶.
Classified information can also leak without being marked, if the substance of discussion simply includes information that would be considered classified. This is why it was reported that Clinton had 2,100 classified email threads⁷. Because, all of her emails were sent to the classification authorities at all of the intelligence agencies, and they reviewed everything, flagging anything they would have viewed as classified. FWIW, I doubt that any senior national security official’s FOUO inbox would make it through this process without coming away similarly flagged (but that's its own very long discussion).
With that context, here’s the first critical thing to understand about Clinton’s emails: The classified information leak was independent of her forwarding her official email to her personal email address. This is because any classified information she received was already leaked on the FOUO systems that the emails were coming from. So, the classified mishandling situation is the same regardless of whether Clinton’s email had remained on the FOUO DoS server or on a machine in Clinton’s basement. Neither are authorized for handling classified information.
So, then what was wrong with Clinton forwarding her FOUO emails to a personal address? Mainly it comes down to the government’s obligations regarding records retention and the mandatory security baseline for the systems they manage. Those are both extremely good reasons for why Clinton shouldn’t have forwarded her emails, but they don’t really have anything to do with classified information handling.
And to be fair to Clinton, since she was using a FOUO system, she had a reasonable expectation that she wasn’t receiving any emails containing classified information. So, unless she personally introduced the classified information into the discussions that got retroactively flagged, it’s entirely possible that she never even mishandled classified herself. Rather, she may have simply had additional copies of emails that had already leaked to FOUO systems. (FWIW, I don’t expect to ever find out the answer to this.)
This gets to the legal repercussions of what Clinton did. Once again, IANAL, but I did see cases of similar infractions. And as long as the offending party cooperated, there was very little in the way of repercussions. About the worst case would be junior enlisted getting slapped with non-judicial punishment⁸ because their commander wanted to make an example of them. But outside of that, pretty much anyone else in the same situation would just be told to stop, or at worst get a minor slap on the wrist.
Either way, I cannot imagine what grounds someone could even be prosecuted over if they're simply forwarding emails from a FOUO account, to their personal account, for the purposes of accessing their email from another device. Moreover, the scope and depth of the Clinton investigation would normally have been reserved for someone stealing actual marked classified information or otherwise bridging classification levels between systems. Clinton genuinely received more scrutiny and greater repercussions than pretty much anyone else in her situation would have. None of this is to say that what Clinton did was a good thing, but it genuinely was far less than it's usually made out to be.
Now, on to Biden and Pence, which are nearly identical cases of classified mishandling. Remember several paragraphs back about the 99.99% case? Well, that’s not the White House, because that place is just weird. It has a mess of spaces cleared for handling classified, and uncleared people endlessly circulating about—some of whom literally live there! The whole thing is a security nightmare, and they should ban printed classified just as a precautionary measure.
That’s why I’m not surprised that Biden and Pence wound up with marked classified papers mixed in with their other documents. TBH I’m surprised it doesn’t happen more often. But that sort of thing is also why the statute sets the bar at “willfully” or “negligent.” Both Biden and Pence did exactly the right thing in notifying the appropriate custodian of the mistake, turning over everything, and complying fully with investigations. It was all by the book, and no one would ever be charged for something like this.
Finally, we get to Trump. His case is highly unusual, but not at all complicated. The indictment⁹ provides mounds of evidence that he “willfully” took large quantities of classified material with him when he left the White House. After NARA (National Archives and Records Administration) contacted him about returning the missing classified material, he chose to lie, evade, and then turn over only some of the stolen documents. Eventually the FBI had to raid Mar-a-Lago to recover 300+ additional classified documents, and it’s still unclear whether everything has been recovered.
The whole point here is that the Trump case is genuinely unprecedented in just how crazy it is. The volume and scope of the theft puts it in league with espionage cases that land people in prison for decades. Even worse, the whole crime is documented with recordings, corroborating witnesses, and pretty much everything a prosecutor could dream of.
While I'm at it I should also quickly knock out some of the more common attempts I’ve seen to dismiss the criminality of Trump’s situation, so here goes:
Are the classified documents in fact Trump’s property? No. The Presidential Records Act is entirely clear on this¹⁰.
Could Trump have declassified these documents already as president? No. EO 13526 sets out the classification process, and if he wanted to expand it to include psychic declassification he had to write a superseding EO laying out such a process.
Does it matter that Trump doesn’t appear to be an agent of a foreign power? No. Just ask Petraeus¹¹ or Schulte¹²; you break the law when you willfully take the information and risk dissemination to those not cleared for access.
Does it matter that Trump stored the information in a locked room? Accepting that a resort with random people ambling about is laughably unsafe, the fact is that there are clear regulations for storage and transport of classified material, and Trump was so far outside the bounds of those that the tiny measures he took are immaterial.
TL;DR: Literally anyone else who did what Trump did would already be sitting in federal prison for at least a decade. Trump is getting an unheard of level of special treatment—entirely to his own benefit! There’s simply no comparison to what Clinton, Biden, or Pence did. The most appropriate comparisons for Trump’s case all involve people currently serving long federal prison sentences… or people who already died in prison.
_
¹ https://en.wikipedia.org/wiki/Interagency_Training_Center
² https://en.wikipedia.org/wiki/Sensitive_compartmented_information_facility
³ https://en.wikipedia.org/wiki/Espionage_Act_of_1917
⁴ https://en.wikipedia.org/wiki/Executive_Order_13526
⁵ https://en.wikipedia.org/wiki/For_Official_Use_Only
⁶ https://www.politico.com/blogs/under-the-radar/2016/07/hillary-clinton-classified-emails-error-225194
⁷ https://www.usnews.com/news/politics/articles/2016-02-29/state-dept-wins-dispute-over-clinton-email-on-north-korea
⁸ https://en.wikipedia.org/wiki/Non-judicial_punishment
⁹ https://www.justice.gov/storage/US_v_Trump-Nauta_23-80101.pdf
¹⁰ https://en.wikipedia.org/wiki/Presidential_Records_Act
¹¹ https://en.wikipedia.org/wiki/David_Petraeus#Criminal_charges_and_probation
¹² https://en.wikipedia.org/wiki/Joshua_Schulte