Comments

not important August 15, 2025 7:23 PM

Will AI make language dubbing easy for film and TV?
https://www.bbc.com/news/articles/c36xy6r91kwo

=Finding international films that might appeal to the US market is an important part of the work XYZ Films.

He says the US market has always been tough for foreign language films.

It’s partly a language problem.

“America is not a culture which has grown up with subtitles or dubbing like Europe has,” he points out.

But that language hurdle might be easier to clear with a new AI-driven dubbing system.

The audio and video of a recent film, Watch the Skies, a Swedish sci-fi film, was fed into a digital tool called DeepEditor.

It manipulates the video to make it look like actors are genuinely speaking the language the film is made into.

DeepEditor was developed by Flawless, which is headquartered in Soho, London.

“DeepEditor uses a combination of face detection, facial recognition, landmark detection [such as facial features] and 3D face tracking to understand the actor’s appearance, physical actions and emotional performance in every shot,” says Mr Mann.

The tech can preserve actors’ original performances across languages, without reshoots or re-recordings, reducing costs and time, he says.

The tech isn’t here to replace actors, says Mann, who says voice actors are used rather than being replaced with synthetic voices.=

ResearcherZero August 15, 2025 10:24 PM

Source code was reportedly stolen in breach of Judiciary’s Case Management/Electronic Case Files System. The CM/ECF platform has been breached many times, including in the 2020 SolarWinds incident. Existing vulnerabilities discovered following the 2020 breach were used in the latest hack. The CM/ECF platform is made up of multiple systems that serve each district, each with its own custom CM/ECF system, accessible by the PACER front-end.

Other actors have piggybacked off the latest breach to also gain access to the system.
The CM/ECF platform has been regularly attacked and breached over the last fifteen years.

‘https://www.politico.com/news/2025/08/12/federal-courts-hack-security-flaw-00506392

The system contains a lot of very sensitive information.
https://www.jdsupra.com/legalnews/federal-court-system-and-possibly-9294638/

ResearcherZero August 16, 2025 1:48 AM

SpaceX may never pay taxes thanks to a loophole signed into law by Trump. According to filings, the company has paid little in tax despite billions in government contracts.

‘https://gizmodo.com/spacex-has-likely-skirted-federal-income-taxes-for-decades-investigation-reveals-2000643848

Dancing on thin ice August 16, 2025 8:29 AM

Russian inventor Leon Theremin who was born on August 15, 1896 built “the Thing” spy device for the The Soviet Union.
Was it wise to allow Russia’s leader (a former KGB officer) to ride in the “Beast” presidential vehicle containing top secrets on the same date in 2025?

Maybe like Air Force One, there is a second decoy presidential vehicle to hide its defensive measures.

Corrupt Shithole ideho August 16, 2025 4:15 PM

A friend of mine told me about a pattern he noticed: whenever he uses Signal app on his iPhone, immediately after sending a text message to one of his Signal Contacts, his iPhone switches automagically from 5G to LTE. If there’s no Signal texting, the iPhone stays on 5G ALL DAY – EVERYDAY. So, whenever a Signal Message is fetched a StingRay WILL FORCE IT to go from 5G to LTE. Simple as that?

Another thing he told me is that when there is a Court-Ordered Wiretap COWT/CALEA on a connection/Internet Account, then the Local NIC Adapter will ALWAYS show the Status of ANY WAN IP Address connected to using that Local NIC Adapter – it will ALWAYS show “Preferred IP Address” next to the actual WAN IP Address that is assigned (Leased) by the ISP to that local NIC Adapter (or RATHER The Account, in case one is connecting with more than one NICs/Devices).

Meaning – if your NIC shows you that your WAN IP Address is “Preferred” (even after resetting the NIC Adapter and taking ALL STEPS that would normally make it not “Preferred”, because there is a way to do that – UNLESS THE GOVERNMENT HAS SET IT UP, UPSTREAM, TO BIND that way, then you WILL BE “Preferred” no matter what you do on your NIC/Device).
Simple as that!!! Gotta LOVE duh Police State – the US of A.

not important August 16, 2025 7:25 PM

https://cyberguy.com/robot-tech/robotic-dog-helps-mental-health-cognitive-challenges/

=US robotics company Tombot has introduced Jennie, an innovative AI-powered robotic pet designed to provide comfort and companionship to those facing cognitive health challenges. This groundbreaking creation is set to transform the lives of millions struggling with dementia, mild cognitive impairment, and various mental health issues.

Jennie features an impressive array of interactive technologies designed to create a lifelike and engaging companion experience. The robotic puppy features sophisticated interactive touch sensors strategically placed across its body, allowing it to respond authentically to human touch and interaction. When a user pets or touches Jennie, the advanced sensor technology enables nuanced, realistic reactions that mimic a real puppy’s behavior.

Voice command recognition technology allows Jennie to understand and respond to verbal instructions, creating an incredibly realistic puppy-like interaction. Users can give commands like “speak” or “sit,” and Jennie will react accordingly, providing a sense of genuine companionship and responsiveness.

To enhance its authenticity, Jennie’s sounds are meticulously crafted from actual recordings of 8-10-week-old Labrador puppies. These genuine puppy sounds create an incredibly immersive experience, making interactions feel remarkably true to life and emotionally engaging.

Tombot aims to register Jennie as an FDA-regulated medical device, potentially expanding its use in hospitals and care facilities.

The company tells CyberGuy that Tombot puppies will likely retail for around $1,500.=

lastofthev8's August 16, 2025 11:39 PM

Hi all can someone tell me what is this ? i stumbled upon it purly by chance…obviously theres more to it but what am i lookin at?

1)
2)
3)
4)﷐
5)
Trojan.Script.Heuristic-js.iacgm﷯

lastofthev8's August 16, 2025 11:45 PM

line 1) so in this line from here ‘

so why ? 👉’Trojan.Script.Heuristic-js.iacgm’👈 why is thi so?? yes serious question as a noob

C U Anon August 17, 2025 7:32 AM

SocraticGadfly : Also not squid-shaped

There might be a third option in game.

Back, more than a few years ago, if you claimed to see something like that they would check to see what you’d been drinking or smoking and give you a chair to “sit down and rest it off”

These days I’m led to believe they just “sentence you to the chair”…

It’s difficult to tell because they change the rules faster than the drunks hit the floor whilst aiming at the spittoon.

not important August 17, 2025 4:20 PM

AI Learned to Be Evil Without Anyone Telling It To, Which Bodes Well
https://www.yahoo.com/news/articles/ai-learned-evil-without-anyone-193000139.html

=One of the most challenging aspects of AI research is that most companies, especially
when it comes to broad intelligence LLMs,

don’t exactly know how these systems come to conclusion or display certain behaviors.

LLMs can be influenced by during training to exhibit certain behaviors through “subliminal messaging” and also how personality vectors can be manipulated for more desirable outcomes.

While performing this steering caused the models to lose a level of intelligence,

induced bad behaviors during training allowed for better results without an
intelligence reduction.

One of the big challenges of AI research is that companies don’t quite understand what
drives an LLM’s emergency behavior. More studies like these can help guide AI to a more benevolent path so we can avoid the Terminator-esque future that many fear.=

Clive Robinson August 17, 2025 11:06 PM

@ not important,

With regards,

“AI Learned to Be Evil Without Anyone Telling It To,”

But also think what an Evil mind can do when assisted by an AI?

Have a look at,

https://m.youtube.com/watch?v=5V0UQ-MZNeE

It’s all AI including the music…

The first thing to note is all the scenes are less than 8 seconds so get in under the free time limit.

Secondly note that the fingering on the bag pipes are wrong.

Thirdly note that whilst they are busy with their fingers they are not moving the arm around the bag yet the drone tones are changing. Nore are their cheeks puffing nor chests inflating/deflating. Playing the bag pipes is quit physical and characteristically so, and those movements are not present[1].

Fourthly look for the mistakes in the movement of background objects like tree branches it’s as though some are “Doing the time warp”. But it’s even worse with the flowing water over rocks.

There are a number of other things wrong, but I’ll let you spot them like look at the weapons on the wall at 2:50 and keep a close eye on the ones to her right side… If you are not watching closely you might just think it’s shadows moving… But look at it a couple of times and you will realise the AI algorith has mucked up in that area and it’s moving weapons like they are shadows of weapons but only in that very limited area.

Speaking of weapons, keep your eyes on what you might call the sword belts and harnesses on the horses…

Oh and don’t forget to look at the comments and replies.

[1] The best way to see this is to look at a very real young lady playing the pipes and see the movements. So see the movements of Jane Espie AKA “The Phantom Piper” from the group Celtica Nova,

https://m.youtube.com/watch?v=LMsdssVwwSc

And yes I can assure you she’s very real and was dressed in Surgical Scrubs when I was under her watchful gaze on my vitals as all good nurses do to patients in “recovery” (she was working for the Scottish NHS in Fife) and we got chatting briefly.

lastofthev8's August 18, 2025 2:05 AM

I found this inside a webpage….line 1)
so why ? 👉’Trojan.Script.Heuristic-js.iacgm’👈 why is this so?? yes serious question as a noob

Clive Robinson August 18, 2025 9:15 AM

@ Eriadilos, ALL,

With regards the “soft-sabotage” attack on the Norwegian Dam.

The question of “Who did it?” is less important than “How they did it?”

You always end up with a “causal chain” with from a defenders perspective starts at the ingress point and ends at the point of agency.

However having designed “Safety Critical Systems” for complex high value environments I know you should investigate further to find the most effective of solutions. And this almost always has broader implications often beyond current policy. Put simply,

Any change to a system has internal, local, and external consequences.

And you have to “consider or constrain” them all.

Part of that is the realisation that,

All attacks are “instances” in “classes” of attacks.

Thus you have to keep that in mind during both the consideration and constrain phases.

In a general sense you have few choices,

1, Do nothing / ignore attack.
2, Clean up / Rebuild the systems.
3, Use law enforcement against attackers.
4, Mitigate the “Instance” of attack
5, Mitigate the “Class” of attack

All to often the reality is somebody on “financial basis” goes only as far as step 2… or even step 3 if they do not think it will have adverse effects.

Which like it or not means the door is still open to other attacks in the future.

Unless the ingress was a result of a third party product failure, and the clean up involves “use all the latest patches” where the third party has made changes to their product in their patches that break the causal chain.

However if it is fixed with a patch from a third party supplier the chances are it only “fixed an instance” of attack which leaves the “class of attack” open to a future instance that simply “bridges over” the “patch fix”.

This means you have to go beyond “mitigating the instance”.

Also if you constrain yourself to just “fixing in the causal chain” you are limiting your options to “internal” not the wider “local or external” consequences

So you must also consider mitigating before the ingress point and beyond the agency point.

The two things you might have heard are,

“If an attacker can not reach the system they can not attack it”

This is known as “mitigation by segregation / compartmentalisation” and it’s the principle behind “air gaps” and “energy gaps”. Whilst it has a lot of advantages it usually increases cost, and more importantly it only works against external attackers not internal to the system. Which is why we are hearing more and more about “supply chain attacks”, because third party parts in your system are internal to the system effectively under the control of an external attacker.

The other thing you hear is,

“Design for fail safe operation and shutdown”

Put simply if you can break the chain at or beyond the point of agency you can limit or stop harm or damage. You hear about “intrinsic safety” where you consider all the potential failure modes of a system. You then design such that the system does not cause harm with a “single point of failure” or two or more parts.

So we can say by what is reported that two things were lacking in their system,

1, External communications were open / accessable.
2, There was no effective fail safe measures / systems in place.

The first could be easily mitigated by not using the internet or other “open / external” communications. Thus that is an “ingress mitigation” that solves not just an instance of attack but entire classes of attack.

The second could be mitigated by putting an independent fail safe mechanism on the output of the control system. Thus that is an “egress mitigation” that solves not just an instance of attack causing harm but “all attack and failure classes” in the system.

My advice would be to go for both as the first will stop attackers communicating with the system, and the second limiting or stopping harm under all system failure modes.

But when considering what is and is not open / external communications you need to remember that if an attacker can bring an antenna in range or can hop over the fence and “vampire tap” a comms cable they automatical become an “insider threat”.

I mention from time to time that engineers for various reasons design comms to be “ASCII plaintext”. This is a “legacy issue” that arose back before the 1980’s when encryption was either unavailable or inordinately expensive and unreliable and worse made diagnostics of systems in the field way to difficult. Whilst many of those problems still exist “good encryption on “links” within the system and to the system should be considered as sensible / essential these days.

Clive Robinson August 19, 2025 4:34 AM

@ Bruce, ALL,

Every question you ask, every comment you make, I’ll be recording you

Is the title of,

https://www.theregister.com/2025/08/18/opinion_column_ai_surveillance/

It’s actually a deliberately misquoted line from a well known song, which originally had

“I’ll be watching you”

To give a creepy surveillance / stalker vibe.

Which the article continues with the sub title intro of,

“When you’re asking AI chatbots for answers, they’re data-mining you”

As I’ve said before[1] on a number of occasions the only viable business model of Current AI LLM and ML systems is,

“Bedazzle, Beguile, Bewitch, Befriend and BETRAY”

So the article and I agree on the “surveillance” asspect.

But what of the “stalking”, the article goes on to say,

“Recently, OpenAI ChatGPT users were shocked – shocked, I tell you! – to discover that their searches were appearing in Google search. You morons! What do you think AI chatbots are doing?”

Whilst I would not describe uninformed people as morons, the important part to note is,

“discover that their searches were appearing in Google search”

For anyone with a little knowledge to find. Put simply an LLM can be viewed as a relational database where each search term and it’s meta data get turned into records that are indexed by what you might call a “User ID”. So “Your Search” history could be produced in an ordered fashion “upon demand” if you knew the correct search terms. Supposedly you had to get a court order or similar to get this data as it’s equivalent to a “wire tap” it should not be to every “Tom, Dick, or Harry” who want’s to find out in-depth information about you for their personal profit. So not just Stalkers, ID thieves, Doxers, Swatters, but also Law Enforcement and those claiming to be Debt collectors and many more like insurance companies looking for reasons to charge you more and not pay out claims, then there are Federal, State, and Local government agencies looking for people to gain extra money from.

I’ve used the past tense “could” and “knew” because allegedly Google has stopped “open access” to this stalker technique. But as I very much doubt they have stopped the surveillance and recording, expect at some point another way to get at the LLM search records as the equivalent of “wire tap” recordings. So will be found and used again as a stalking and worse tool.

[1] See,

https://www.schneier.com/blog/archives/2025/04/upcoming-speaking-engagements-45.html/#comment-444555

Where I describe the intent of the Current AI LLM and ML “chatbot” systems by the Silicon Valley Mega Corps.

Clive Robinson August 19, 2025 7:41 AM

@ ResearcherZero,

You might find this on “group think” and the “madness of crowds” –or commons– of interest,

https://m.youtube.com/watch?v=zPs1NYZR2eU

The hypothesis of which is the group / crowd is now “global” in essence due to the reach of not just modern communications but also those who control the outlet of information to the communications channels in various ways.

It also makes the point that “a hypothesis should be testable”. That is tests are thought up and then if considered valid can aid in proving or disproving the hypothesis.

I’m not sure how you could ethically test to prove the hypothesis, but I can not of my head think of a test that would disprove the hypothesis.

My “gut feeling” based on what I’ve observed and researched is that “group think on a vastly increasing scale” is happening. And also what goes out on the many communications channels certainly falls within the definitions of Black, Grey, and White propaganda,

https://en.m.wikipedia.org/wiki/White_propaganda

See the “See also” section for links to other definitions not given in the main body of the page.

Clive Robinson August 19, 2025 9:41 PM

@ Bruce, ALL,
This is something we should all be watching,

Mozilla warns Germany could soon declare ad blockers illegal

https://www.bleepingcomputer.com/news/legal/mozilla-warns-germany-could-soon-declare-ad-blockers-illegal/

In essence a service provider (the Mega-Journal ‘Axel Springer’) is litigating (against Eyeo – the maker of Adblock Plus) that “AD Blockers” are ‘unlawfully modifying their Copyrighted code’ in the German Federal Court System. Even though Adblock actually only changes the way the browser works

Whilst there are ways around the stupid claims by intercepting network related MetaData with something along the same lines as PiHole or putting a basic “Deny ALL Except” set of rules in a Firewall. The basic argument being made by ‘Axel Springer’ is their business plan supercede a computer owners “rights of ownership”… Thus they can dictate you use your bandwidth to download malicious and potentially life threatening adverts just so they can make a few cents more. But without any liability for “harm” their business plan may cause to the user (some adds work in ways that can cause seizures / epileptic fits). Or the computer (consider malware in images and more).

It’s become clear that the majority of judges are rarely capable of understanding current and thus future technology (see stupidity of a US court judge mandating OpenAI to keep all user queries and the disseminate them… even though it would be illegal for OpenAI to do so under EU legislation, and the penalties for doing so could easily bankrupt OpenAI, Likewise UK “age verification” legislation and penalties…).

The point to consider though is that if any provider of service could include “client side scanning” code or similar within their code… And you stopping it scanning etc would, if Axel Springer wins the case be unlawful. Thus open the flood gates to service providers insisting your computer must do as they want… Despite the fact it would in actuality be illegal (see likes of “Computer Misuse Act”).

As the article notes,

Mozilla’s Senior IP & Product Counsel, Daniel Nazer, delivered a warning last week, noting that due to the underlying technical background of the legal dispute, the ban could also impact other browser extensions and hinder users’ choices.

“There are many reasons, in addition to ad blocking, that users might want their browser or a browser extension to alter a webpage,” Nazer says, explaining that some causes could stem from the need “to improve accessibility, to evaluate accessibility, or to protect privacy.”

The issue technically boils down to what the limit of Springers Claim that “their code has been modified”, when in fact it has not… It’s the way the browser interpreter treats that code and any following process work.

Thus if I publish firewall rules to do the same as adblock effectively does, do I suddenly become liable for Springers falsified loss claims?

Remember if Springer had technical reason it could simply stop working. But no their claim is that you should bend over and be exploited in all sorts of ways for their benefit.

If the computer was a human the legal argument would fail against “anti-slavery / anti- exploitation” laws.

Which raises the question if the computer user can use the same argument in reverse that “Springer is illegally or unlawfully exploiting them via the users computer.

After all it’s not the chains or whip that makes you a slave, but the intent of the “Directing Mind” behind those wielding them.

When you “throw AI” into the mix the water will be rather more than having the mud churned…

lurker August 20, 2025 12:16 AM

@Clive Robinson, ALL

What does Springer’s copyright code do with a GET request from UserAgent lynx?

It’s a pity they have such a stranglehold on some technical and academic publishing. Recently they have been publishing garbage translations of foreign language works …

ResearcherZero August 20, 2025 2:45 AM

@Clive Robinson, ALL

If you install a home security camera running Google software it will attempt to collect the user’s location all the time by requesting app permissions with location access. The camera may request install of an app requiring Location Services to update the firmware.

Many 3rd party applications on mobile devices require Google Play to install.

Google also forces the install of its apps to allow functions on a number of devices and sometimes to allow the install of new updates to the device firmware and software. These apps track the user location constantly and gather a wide range of other data. Google is tracking users through a wide range of its software, like its Google Play software that it forces many users to install on mobile devices and which then attempts to run all the time in the background. This is accompanied by the Advertising ID and the numerous other Google applications such as Maps and other software which requests wide access and information.

Google is watching everyone – all the time. It knows user tastes, dislikes and can track the users behavioral flow path. How they commence interaction with a service, its content and when they stop interacting with content (or lose attention). When and how they alter interaction and behaviour. This provides enormous insight into what shapes behaviour.

Google Analytics tracks traffic sources, devices used, demographics, browser, etc.

All of the information collected is analyzed to create a profile of the user that can be tracked by the many identifiers across different services and devices. So if someone is looking at videos on a service like Youtube, then Google knows who they are, even if they are using a new device, or are connecting to the internet via another network.

ResearcherZero August 20, 2025 3:07 AM

Explain this to your Congressman/Local Member/President/Prime Minister. 😉

Critical National Infrastructure (CNI)

ToolShell provides access to the Internet information Services (IIS) Machine keys.

The SharePoint deserialization vulnerability (CVE-2025-53770) can expose Machine Keys. The keys effectively provide a persistent backdoor. Which is bad for a lot of reasons.

‘https://isc.sans.edu/diary/32174

Other products (like ScreenConnect) are vulnerable to ViewState code injection attack.
https://www.microsoft.com/en-us/security/blog/2025/02/06/code-injection-attacks-using-publicly-disclosed-asp-net-machine-keys/

APT41 obtained a Machine Key present in all default installations of the USA Herds application. (This article provides a clear description of deserilization risks.)
https://cloud.google.com/blog/topics/threat-intelligence/apt41-us-state-governments

“Our routers are old enough to vote.”

https://www.defense-aerospace.com/experts-warn-of-serious-escalation-after-salt-typhoon-hacks-army-national-guard-systems/

ResearcherZero August 20, 2025 3:09 AM

@Clive

It’s become clear that the majority of judges are rarely capable of understanding current and thus future technology.

And politicians.

Clive Robinson August 20, 2025 9:18 AM

@ ResearcherZero, ALL,

You note,

“And politicians.”

I’ve mentioned this in the past but it is a point few consider (and was mentioned in the YouTube link I posted a couple of days back.

Anthropologically humans have evolved to be “jacks of all trades but masters of none” with regards physical attributes. Our true skills are our ability to be adaptable and communicate and thus bypass a lot of what goes into learning to reason things out. Whilst the result appears to be a “hive mind” it’s not it’s a form of parallel tasking. That is as a technique — be it skill or knowledge– is acquired it can be fairly quickly and efficiently communicated / passed on to others. And then the technique gets multiple people doing the same thing slightly differently (ie a stochastic process). So the technique gets refined very much faster, but .. also the learning of a technique gives rise to new similar techniques[1] often of greater utility or to new tasks / applications[2] hence the rider on “an idea comes of age”, “then takes off”.

All of these activites are only possible in “social grouping” the simplest examples being “guard labour” in a four man team on sleeps one cooks does admin and one or two are watching for attackers or opposing forces etc. The Four rotate duties on a rotating basis so that the primary task of “observation” is continuously in progress. The system that was developed into “watches” in the likes of sailing vessels where you might spend months at sea continuously sailing.

Not being able to do this is why “lone wolves always perish” and thus evolution caused humans with little physical advantage in their environment to form tribes and eventually industry and cities of immense size.

The problem with larger social groups are,

1, Responsibility.
2, Dispute resolution.

Without going into details you always end up with some kind of hierarchy. With power moving to those at the top. Which all to often attracts the sort of people who should be the very last people you should give responsibility thus power to. The more obvious corruption and nepotism is actually the least of the issues with hierarchical social structures.

The thing is the people most capable of being effective leaders are often those who do not want power, status or privilege

That meeting in Alaska this past Friday shows this by who they did nor invite. You had a power mad wannabe Emperor calling the shots to a vacuous status grabber there… Achieving practically nothing other than stopping appropriate punishment being applied to the wannabe Emperor. Who achieved that delay by the simple process of “soft soaping” the vacuous and very corrupt status grabber…

Whilst the third person who should have been there was deliberately excluded by the other two… Why? Because he would have shown the other two up in the basest of relief for the corruption they are both rancid with.

I could say more but I suspect you already know what it is likely to be.

[1] The original technique came about due to a basic evolutionary process which is commented on as “an idea coming of age/time”. We’ve see this over the past couple of centuries with what we now call Science Papers and Patent applications. Thus the technique becomes the “Primary” or “first instance” of what becomes a “Class” of “Secondary” techniques in “priority” yet will often have more utility or value than the primary.

This ability to find new instances in a known class is actually a process of “directed random modifications, and test”. Which is something the “Current AI LLM and ML systems” can actually do if given the primary technique and appropriate tests, But currently LLM and ML systems lack the agency to carry it forward in the physical as opposed to informational environment.

[2] You might have heard the expression “Renaissance Man” of which Leonardo Da Vinci is often quoted as an example. If you actually look at how they worked we would call them “multidisciplinary” these days and they rapidly acquired techniques in one knowledge domain and extracted the principles and then applied them to another knowledge domain. Current AI LLM and ML systems are fairly good at a limited form of pattern matching. The problem is they don’t have agency to gain knowledge of the environment they are in. Thus they can not currently do the form of more general pattern matching that Renaissance Man did to carry across known reasoning from one knowledge domain to another.

Jan Egner August 20, 2025 11:14 AM

@lurker
To put blame where it belongs: this lawsuit was started by the Axel Springer publishing company. (best known for its tabloid Bild ~ The Sun)

You seem to be referring to Springer Verlag (academic publishing and science journals). They are totally separate entities, named for their respective founders who, by chance, shared the same surname. An easy mistake to make, ask me how I know!

Clive Robinson August 20, 2025 2:05 PM

@ Jan Egner, lurker

You say,

“You seem to be referring to Springer Verlag”

In part it’s my fault and in part the article I’d linked to.

I guess the assumption was that Axel Springer SE activities were “common knowledge”.

Back over two decades ago, I used to work with a US/UK citation database company and knew all about Springer Verlag as a scientific journal publisher. But… I was also well aware of Axel Springer SE that happens to be the largest producer of “non science” journals in Europe.

As a result I’m also well aware of Axel Springer SE’s fairly well publicised failings… So as they are not that relevant “other than rapacious legal behaviour” I chose to not mention it.

But it looks like that was a mistake on my part.

So briefly Axel Springer SE is fairly well known for having a very much “right wing” bias and for regurgitation of US mantra. Along with the vast amounts of money it has made in Israel unlawfully exploiting the occupied zones and the lies it spouts to perpetuate certain nonsense myths the Israeli government push out as black and grey propaganda.

I’ve also heard the story it was and still is “Another German Company that the CIA covertly Own / Financially Influence” (like the now defunct Crypto AG, and a certain large German Electronics company that was rather intimately involved with the development of parts of stuxnet. And is believed to be responsible for “weak/backdoored crypto” in European Approved (ETSI) Communications systems chips.)

Yes I know it sounds a lot like a conspiracy theory hence my reason for not previously mentioning it. But take a look at,

https://en.m.wikipedia.org/wiki/Axel_Springer_SE

But actually worse, a lot worse, is said of Axel Springer SE in other reputable publications including sexual abuse scandals and suggestions of slave/child labour use and worker abuse.

To a lot of Europeans Axel Springer SE is as low life if not more so than “The Ausie mut” “Rupert The Bare faced liar Murdoch” and his selection of organs one of which recently had to pay the equivalent of about $1billon for defamation over 2016 nonsense spouted in support of election stealing myths.

Because of the shear volume of dirt shifting around about Axel Springer SE, I’m not going to ask you how you know. Instead I’ll just wish you well 😉

not important August 20, 2025 7:03 PM

@Clive – thank you for input.

@all
https://news.yahoo.com/articles/gabbard-slashing-intelligence-office-workforce-
202339570.html

=Director of National Intelligence Tulsi Gabbard said in a statement, “Over the last 20 years, ODNI has become bloated and inefficient, and the intelligence community >is rife with abuse of power, unauthorized leaks of classified intelligence, and politicized weaponization of intelligence.”

She said the intelligence community “must make serious changes to fulfill its responsibility to the American people and the U.S. Constitution by focusing on our core
mission:

find the truth and provide objective, unbiased, timely intelligence to the President and policymakers.”=

Good point, Tulsi. I would add 3D information not relying just on one source and xref checked with opposite sources.

ResearcherZero August 21, 2025 12:23 AM

@Clive, not important

*“find the truth and provide objective, unbiased, timely intelligence to the President and policymakers.”=*

Ready, get set, and go! Get that contract with the Oval Office and the West Wing now! 😉

Tulsi and friends are going to outsource “intelligence” to private contractors who will say what they want to hear and do what they are told to do. No questions asked.

That is what Gabbard and her pals want. People who will toe the line and parrot what ever rubbish the administration would like the American people to believe. That is how a secure and permanent hold on power is obtained and how the coffers can be emptied without annoying oversight, investigation or stories from the “lamestream media” ruining the party.

The West is weak, fat, soft and comfortable. It needs to be punished, with black leather and whips. Everyone needs to be tossed out of their comfort zone, and homes and businesses.

To break all of the rules, conventions and all moral decency, you first must be able to get away with it. Accuse everyone one else first of what you plan on doing. There are no scandals when it is all “Fake News” and anyone who dares to stick their head up gets it chopped off. All the honest people can be locked up and the all crooks get off free. Democratic institutions are highly overrated when they can be replaced with White Parties, cocaine, hookers, hot tubs, champagne, cigars, real estate deals and rooms full of cash.

The risk that Big Tech will no longer protect the public from authoritarian government…

‘https://techcrunch.com/2025/08/06/citizen-lab-director-warns-cyber-industry-about-us-authoritarian-descent/

Keynote speech
https://www.youtube.com/watch?v=iFIG0dP87hw

ResearcherZero August 21, 2025 12:25 AM

Call it a self-manifesting destiny. When the American people make their fears reality.

ResearcherZero August 21, 2025 1:16 AM

Center 16 (FSB) are targeting CNI using vulnerabilities in old CISCO hardware.

The state-backed actors are taking device configuration information from thousands of devices (including credentials) which could allow for later, more sophisticated attacks.

If the device is EoL, customers are urged to disable Smart Install to mitigate CVE-2018-0171. The vulnerability allows an unauthenticated attacker to execute arbitrary code, or remotely reload the device to trigger a denial of service (DoS) condition.

‘https://blog.talosintelligence.com/static-tundra/

speaking of authoritarian state surveillance

Russia has been restricting encrypted chat platforms to make surveillance easier.

‘https://apnews.com/article/russia-internet-messenger-whatsapp-telegram-crackdown-2a89703deb1094af1b0206161efe2050

The satellite surveillance network run by the GRU is called Zvezda (“star”).
https://www.thespacereview.com/article/4923/1

Dealing with “troublemakers” at home.
https://cepa.org/article/russias-surveillance-state/

lurker August 21, 2025 2:27 PM

@ResearcherZero
re Google watching …

and keylogging too? If you have a Google soft keyboard on your device, at reboot it will ask to login to your Google account. If you click [Deny] this response is not stored. It will ask again at next reboot.

At least so far it appears to be asking, and not silently logging in.

Clive Robinson August 21, 2025 9:31 PM

@ lurker,

Re Google and keyboards…

Yes they log your keyboad entries on android devices.

A few years back now I pointed out a couple of things about the interaction between key entry into the search bar if you have Javascript on.

In short Google was copying key by key entry and they used it in two ways to identify and grab personal and private data.

The key by key logging gave the users typing cadence which like your walking gate is a viable biometric to identify the user by.

Users tend to maintain “subject focus” over several queries.

Thus the cadence gives a confidence level, the related queries ln a short period of time allows a form of “messages in depth” attack. Whereby each new query could be pulled out based on subject. They were then graded by cadence.

This allowed Google to use this to get a larger amount of finer grained data thus allowing more precise identifying of a user statistically even though they had swapped computers and giving more data such that it was possible to build up larger quantities of data even when the user had tried to cover up their ID by useing different computers for every use…

ResearcherZero August 22, 2025 2:17 AM

@lurker, Clive

Some of those keyboards on android products have been known to gobble up passwords. By accident. It is not like devices out there are deliberately gathering sensitive details, or asking consumers to enter their sensitive private details into information fields.

[attempts to cover eyes and plug ears]

@not important

A US$700 million budget cut and a forty percent reduction to the ODNI workforce is planned at a time of returning Great-Power Competition and unprecedented strategic risk.

blinded

Tulsi Gabbard plans to dissolve the Foreign Malign Influence Center, National Counter-proliferation and Biosecurity Center, and the Cyber Threat Intelligence Integration Center, then attempt to wind the functions of these centers into something called “ODNI 2.0”.

The Strategic Futures Group, which delivers long-range forecasts to policy-makers, will be shut down. Intelligence on long-term threats and strategic risk may vanish with it.

‘https://edition.cnn.com/2025/08/20/politics/gabbard-announces-more-cuts-top-us-intelligence-agency

In a dangerously short-sighted and naive move, Gabbard disputed intelligence and claimed it had been weaponized. (The function of these agencies is apolitical.)
https://www.pbs.org/newshour/show/what-gabbards-odni-cuts-mean-for-u-s-intelligence-agencies

Maybe a little apprehension about transparency is showing here (?)

Gabbard also barred sharing intel on Ukraine-Russia negotiations with 5 Eyes partners.
https://www.cbsnews.com/news/gabbard-barred-sharing-intelligence-russia-ukraine-negotiations-five-eyes-partners/

ResearcherZero August 22, 2025 2:52 AM

Brandon Russell gets 20 years for planning to blow up Baltimore’s power grid.

‘https://apnews.com/article/brandon-russell-maryland-power-grid-attack-plot-neonazi-9e6d8ff8c7695e356f566cce8caa902b

The leader of Neo-Nazi terror group “the Base” is recruiting members in Russia.
https://www.theguardian.com/us-news/2025/feb/24/neo-nazi-trump-fbi-chief

The GAO found the NRC had not acted on recommendations dating back as far as 2012.
https://www.fedagent.com/news/gao-wants-to-congress-to-force-nrc-to-act-on-dirty-bomb-recommendations

Canadian officers and from partnering countries were targeted by foreign adversary.

‘https://nationalpost.com/news/canada/lawyer-globa-affairs-canadian-diplomats-havana-syndrome

ResearcherZero August 22, 2025 6:53 AM

@Clive

RE: the people most capable of being effective leaders are often those who do not want power

A very poignant example of what happens when the least capable people have power…

One of the CIA’s most senior Russia analysts who coordinated operations let go.

‘https://www.yahoo.com/news/articles/trump-fires-senior-cia-analyst-025749752.html

More than half of the experts from the National Security Council are now gone. Trump fired the people who “have seen all the intelligence relating to Vladimir Putin’s intentions.”

https://dnyuz.com/2025/08/21/flying-blind-trump-strips-government-of-expertise-at-a-high-stakes-moment/

China experts have been cut from the State Department and its cyber team has been gutted.
https://www.fdd.org/analysis/2025/08/18/by-gutting-its-cyber-staff-state-department-ignores-congressional-directives/

It is now unclear who is left to deliver on foreign policy and expert knowledge.
https://www.npr.org/2025/07/24/nx-s1-5477523/state-department-cuts-china-experts

JG5 August 22, 2025 9:55 AM

@Bruce & Esteemed Guests – Glad that we’re all still going.

And happy to be reminded of your good deeds.

China’s CCTV: How the U.S. Installs “Backdoors” in Chips (Translation)
https://x.com/Jukanlosreve/status/1954416599081078879

A few days ago, the Cyberspace Administration of China held a meeting with Nvidia over security risks related to vulnerabilities and backdoors in its H20 computing chips.
In its subsequent self-defense statement, Nvidia claimed that the chips had no “backdoors,” and specifically mentioned the “Clipper chip” incident.
In 1992, AT&T launched a hardware device for American businesspeople that could encrypt telephone voice transmissions to ensure information security.
This drew the displeasure of the U.S. government. Soon, it required AT&T to replace the chip in the device with a new microchip—the “Clipper chip.” This chip used an encryption algorithm developed by the U.S. National Security Agency (NSA), was manufactured by a contractor designated by the U.S. government, and contained an “encryption backdoor.”
This “encryption backdoor” allowed the U.S. government to “decode” communications on the device.
The “Clipper chip” faced widespread opposition after its launch, and the project was terminated in less than three years. The U.S. government also learned a lesson: when it came to “encryption backdoors,” it would from then on act without saying anything.
But this year, the U.S. government has once again openly brought the idea of “encryption backdoors” to the table. Since Americans have said so, we must uncover, from a technical standpoint, how the U.S. installs “backdoors” in chips.
In May this year, U.S. Congressman Bill Foster led the introduction of a bill requiring the U.S. Department of Commerce to mandate that American chip companies add “backdoors” to chips subject to export controls.
Bill Foster holds a Ph.D. in physics and has worked in chip design, so he spoke with certainty that the relevant technology is very mature and entirely feasible.

Clive Robinson August 22, 2025 4:45 PM

@ JG5,

When you say,

“The “Clipper chip” faced widespread opposition after its launch, and the project was terminated in less than three years.”

You don’t say why it was terminated…

And that in of it’s self is a bit of an eye opener.

The way the chip worked involved a “Law Enforcement Access Field”(LEAF) that was a checksum that inhibited the device use if the LEAF value was incorrect.

A researcher Matt Blaze discovered that the LEAF mechanism had a significant failing in it that the NSA must have been aware of as it was at the “standard level” and was a “broken protocol” by either ignorance or design.

The result was it was moderately easy to have a False LEAF value that would allow the device to be used, but not allow the backdoor function to be used.

“Oh dear how embarrassing, lets sweep it under the rug, by pulling the plug.”

But consider this as a deliberate mistake, it alowed the NSA and select entities to use “clipper” securely but not everyone else.

So you had security asymetry… The NSA had a backdoor into slmost everyone’s communications including “over sight and investigation” agencies that had control over the NSA one way or another.

The NSA and other select entities could not be eavesdropped on so had in effect a NOBUS in reverse.

Which brings us to your other point,

“U.S. Congressman Bill Foster led the introduction of a bill requiring the U.S. Department of Commerce to mandate that American chip companies add “backdoors” to chips subject to export controls.”

It’s pointless at best “fig-leaf legislation” as I mentioned the other day over the Nvidia H2O chips.

So whilst,

“[Congressman] Bill Foster holds a Ph.D. in physics and has worked in chip design, so he spoke with certainty that the relevant technology is very mature and entirely feasible.”

He forgot to mention it’s easily pointless as a deterrent…

There is a variation of a saying that goes back to the 1950’s atleast and pointed out that one effective method of security was in effect,

“Deny Front Panel Access” or external access to communications”.

And was the extension of “physical security” into “information security” by “Mitigation by segregation” that gave rise to the notion of “air gaps”. And later with BadBIOS all the rage “energy gaps” when it was demonstrated “academically” one weekend –over 3 decades after engineers had put such comms systems into marketed products…– that sound traveled down University hall ways carrying data modulated on it, and of course just by coincidence some days after it had been discussed in detail on this blog by engineers who had built such products…

A more modern version of the saying is,

“If they can not see/reach it they can not attack it”.

So the “Bill Foster Plan” is effectively pointless “political window dressing” as can be seen for those with even a small amount of knowledge.

Which begs the questions of,

“What is the Bill up to? And who is it/he doing it for?”

My guess is the real reason is,

“To steal ‘research work’ from other countries to boost the home industries.”

It’s something that both France and Israel do all the time and I’ve caught them doing it to me and others I’ve worked with quite a few times.

The first time was back in the 1980’s with the French and phoney diplomats and is what sparked my drive to understand, design, and implement security systems to stop such theft / abuse. And lets say “I still have a passing interest” in the subject and pass useful tit bits on to the public (but I’ve no longer the desire to kick such diplomats into and along the gutter “so they have something to remember” 😉

Leave a comment

Blog moderation policy

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.