Daily Drop (490): CCP Worst Abusers of Human Rights, Uncovered Backdoor, PharMerica 6 million patients leaked, India-China Standoff, Iran & Russia Military Ties, CCP UW Capabilities
05-16-2023
Tuesday, May 16, 2023 // (IG): BB // Cloak & Dagger// Coffee for Bob
China cracks down on AI-generated news anchors
Analyst Comments: China's efforts to combat fake news through its campaign and AI media law highlight the government's increasing concern over the spread of false information and the potential impact on public opinion. By targeting specific methods employed to generate and distribute fake news, such as AI-generated content and clickbait tactics, China aims to regulate online communication and maintain control over information flows. The detention of an individual using ChatGPT demonstrates the government's commitment to enforcing the AI media law and holding individuals accountable for spreading false information. However, the regulation of communication and the potential for service providers to be held responsible for the misuse of AI algorithms raise concerns about freedom of expression and the potential for censorship.
FROM THE MEDIA: China's State Cyberspace Administration (CAC) has launched a campaign to tackle fake news by regulating communication on key online platforms. The crackdown targets various methods used to spread false information, including AI-generated virtual anchors, forged studio scenes, and clickbait content. The CAC claims to have already taken action against thousands of counterfeit news accounts and fake anchors, as well as removing a significant number of false information pieces. In a related incident, Chinese police detained an individual who used the ChatGPT AI language model to create and disseminate fake news. This is the first known use of China's AI media law, which aims to combat fake news and address the misuse of AI-generated content.
READ THE STORY: The Register
With an eye on Ukraine, top Chinese general calls for unconventional warfare capabilities
Analyst Comments: General Wang's statements reflect China's determination to enhance its military capabilities and readiness, particularly in light of regional tensions and potential conflicts with the West, such as the situation involving Taiwan. China's focus on integrating AI and other emerging technologies into its military strategy aligns with its broader efforts to become a global leader in cutting-edge technologies. The reference to the Ukraine conflict underscores China's analysis of hybrid warfare tactics and the need to adapt to evolving threats. The emphasis on maintaining the ability to win indicates China's ambitions to project power and protect its national interests. As China continues its military modernization, neighboring countries, including Taiwan, as well as the United States and its allies, will closely monitor these developments and assess their implications for regional security dynamics.
FROM THE MEDIA: General Wang Haijiang, commander of the People's Liberation Army's Western Theatre Command, has called for greater integration of novel capabilities, including artificial intelligence (AI), with conventional warfare tactics in preparation for potential confrontations with the West. He highlighted the emergence of a new genre of hybrid warfare, combining political, financial, technological, cyber, and cognitive warfare, as observed in the Ukraine conflict. China continues to prioritize national security preparations despite the economic slowdown and the COVID-19 pandemic, with defense spending expected to rise for the eighth consecutive year in 2023. General Wang emphasized the need to maintain the ability to win in order to uphold national security. China's military readiness, particularly in relation to Taiwan, has attracted close attention from the international community. China aims to develop military advantages through investments in AI, information networks, aviation, and space capabilities. Lessons learned from the Ukraine conflict also highlight the importance of improving situational awareness on the battlefield.
READ THE STORY: Reuters
Industrial Cellular Routers at Risk: 11 New Vulnerabilities Expose OT Networks
Analyst Comments: The disclosed vulnerabilities in the cloud management platforms of industrial cellular router vendors pose significant risks to operational technology networks. Organizations that use these devices should promptly apply security patches and updates provided by the vendors. They should also conduct security assessments to identify and remediate any potential vulnerabilities. In addition, implementing strong network segmentation, access controls, and monitoring solutions can help mitigate the impact of any successful exploitation. Regular security training and awareness programs for employees are crucial to prevent social engineering attacks that could exploit these vulnerabilities. As the popularity of industrial Internet of Things (IIoT) devices and cloud management platforms increases, it is essential to recognize the potential targeting of these platforms by threat actors and implement robust security measures to protect critical infrastructure.
FROM THE MEDIA: Israeli industrial cybersecurity firm OTORIO has disclosed 11 security vulnerabilities in cloud management platforms associated with three industrial cellular router vendors: Sierra Wireless, Teltonika Networks, and InHand Networks. The vulnerabilities allow for remote code execution and full control over devices and operational technology (OT) networks, even if the devices are not actively configured to use the cloud. Exploiting these vulnerabilities could enable attackers to bypass security layers, exfiltrate sensitive information, and execute malicious operations on internal networks. The vulnerabilities involve weak asset registration mechanisms, flaws in security configurations, and issues with external APIs and interfaces. Successful exploitation could result in unauthorized access to devices, code execution, shutdown with elevated permissions, and other malicious activities. The vulnerabilities highlight the supply-chain risk associated with cloud-managed devices, as a compromise in a single vendor's platform can provide backdoor access to multiple OT networks.
READ THE STORY: THN
Communist China One of World’s ‘Worst Abusers of Human Rights and Religious Freedom’: State Department Report
Analyst Comments: The report underscores the severity of religious persecution in China, with numerous instances of believers facing harsh punishment for practicing their faith. The CCP's actions, including the banning of domestically generated online religious content and the prohibition of overseas organizations from operating virtual religious information services in China, further demonstrate the regime's systematic suppression of religious freedom. The US's stance on this issue is clear, with the State Department taking significant steps to address these human rights abuses. The effectiveness of these measures remains to be seen, given the CCP's persistent disregard for international norms and human rights.
FROM THE MEDIA: The State Department's annual report on international religious freedom has highlighted China as one of the worst abusers of human rights and religious freedom globally. The Chinese regime continues to engage in genocide and crimes against humanity, particularly targeting Uyghurs, Tibetan Buddhists, Protestants, Catholics, Falun Gong practitioners, and Hui Muslims. The situation is reportedly worsening, with the Chinese Communist Party (CCP) mastering the art of religious persecution. The US remains deeply concerned about these human rights abuses and has taken several actions to hold violators accountable, including financial sanctions, visa restrictions, and collaboration with international allies.
READ THE STORY: The Epoch Times
Researchers Uncover Powerful Backdoor and Custom Implant in Year-Long Cyber Campaign
Analyst Comments: The emergence of Lancefly and its highly targeted campaign underscores the persistent and evolving threat of cyber espionage. The group's use of sophisticated tools and its selective targeting strategy indicates a high level of skill and strategic planning. The links to Chinese state-sponsored actors, while not definitive, suggest potential state backing or at least a shared toolkit. This development highlights the need for robust cybersecurity measures, particularly in sectors dealing with sensitive information. The attribution challenge also underscores the complexity of cyber threat intelligence and the need for continued vigilance and cooperation among cybersecurity entities.
FROM THE MEDIA: A new hacking group, dubbed Lancefly by Symantec, has been targeting government, aviation, education, and telecom sectors in South and Southeast Asia since mid-2022. The group uses a powerful backdoor called Merdoor for intelligence gathering. The initial intrusion vector is unclear, but phishing lures, SSH brute-forcing, or exploitation of internet-exposed servers are suspected. The group also uses an updated version of the ZXShell rootkit, which has been linked to Chinese actors in the past. Lancefly's intrusions have also been identified as employing PlugX and its successor ShadowPad, both associated with Chinese state-sponsored actors.
READ THE STORY: THN
India-China Military Standoff Enters Fourth Year Without Sign of Thaw
Analyst Comments: The ongoing standoff between India and China underscores the deep-seated territorial disputes between the two countries. The recent developments in Arunachal Pradesh indicate a potential escalation of tensions. China's renaming of places in the disputed territory is seen as an attempt to assert its claim, while India's infrastructure development is a response to China's activities on its side of the border. The failure of high-level dialogues to resolve the conflict suggests that both sides are entrenched in their positions. This situation is likely to continue to strain bilateral relations and could potentially lead to further confrontations. The standoff is also pushing India closer to the United States, indicating a potential shift in regional alliances.
FROM THE MEDIA: The military standoff between India and China along their disputed 3,500-kilometer-long boundary has entered its fourth year with no resolution in sight. A new flashpoint has emerged in India’s northeastern state of Arunachal Pradesh, a territory also claimed by China. Last month, China renamed 11 places in Arunachal Pradesh, a move rejected by India. New Delhi is building infrastructure in the state, including a tunnel for troop movement to the border areas, and has unveiled a $570 million program to develop nearly 3,000 border villages in the northeast. India has also accelerated a program to modernize its armed forces. High-level political and military dialogues have failed to achieve a breakthrough as both countries have adopted different positions in their approach to resolving the conflict.
READ THE STORY: VOA
Pharmacy giant PharMerica says medical info of nearly 6 million patients leaked
Analyst Comments: The data breach at PharMerica is a significant cybersecurity incident due to the sensitivity of the compromised data and the large number of individuals affected. The breach highlights the ongoing vulnerability of healthcare organizations to cyberattacks, which can have severe implications for patient privacy and trust in healthcare providers. The fact that the breach involved the potential exploitation of deceased individuals' information adds an additional layer of concern. The company's response, including the immediate investigation and the provision of identity protection services, is a positive step, but it will be crucial for PharMerica to further strengthen its cybersecurity measures to prevent future breaches.
FROM THE MEDIA: PharMerica, one of the world's largest pharmacy companies, has reported a data breach affecting nearly six million people. The company discovered the breach on March 14, 2023, and found that an unknown third party had accessed its computer system for two days, on March 12 and 13. The compromised data includes names, addresses, dates of birth, Social Security numbers, medications, and health insurance information. The company has notified regulators in Maine that over 5.8 million individuals were affected by the incident. The breach notification also included a warning about the potential exploitation of the information of deceased victims. The company is offering one year's access to Experian identity protection services to the victims.
READ THE STORY: The Record
The continuation of Russia’s participation in the activities of the Arctic Council will hardly be possible
Analyst Comments: The comments by Korchunov reflect Russia's growing concerns about NATO's activities in the Arctic region. The Arctic has become a region of strategic importance due to its rich natural resources and potential new shipping routes as the ice melts due to climate change. Russia's warning about a potential escalation in the region indicates its intent to protect its interests in the Arctic. This could lead to increased tensions between Russia and NATO, particularly if Russia perceives that its rights as a member of the Arctic Council are being violated.
FROM THE MEDIA: In an interview with TASS, Russian Foreign Ministry ambassador-at-large Nikolay Korchunov warned that NATO's actions could lead to an escalation in the Arctic Region. He noted that NATO's expansion in the region, the increasing scope of its military exercises, and the growing military potential of its non-Arctic member states are concerning. Korchunov also criticized Western countries for promoting their own interests in the Arctic at the expense of other countries. He further warned that if Russia is not invited to events organized during the Norwegian presidency of the Arctic Council, it could mean a violation of its rights as a member state, potentially leading to Russia discontinuing its participation in the organization.
READ THE STORY: Modern Diplomacy
US Says Iran, Russia Are Expanding Military Ties
Analyst Comments: The alleged military cooperation between Russia and Iran could have significant implications for regional security dynamics. If true, this development could potentially escalate the conflict in Ukraine and further destabilize the region. It also suggests a strengthening of ties between Russia and Iran, which could have broader geopolitical implications. This development is likely to heighten concerns among Western countries and could lead to increased pressure on both Russia and Iran.
FROM THE MEDIA: The United States has expressed concern over signs of expanding military cooperation between Russia and Iran. State Department spokesperson Vedant Patel stated that Iran continues to be Russia's top military backer, providing artillery and tank rounds for use in Ukraine. Since August, Iran has supplied Russia with over 400 Unmanned Aerial Vehicles (UAVs), primarily of the Shahid variety, which Russia has used to target Ukrainian critical infrastructure. The deepening of this cooperation is seen as a threat to Ukraine, Russia's and Iran's neighbors, and the international community at large.
READ THE STORY: VOA
Monitoring organizations report widespread internet outages in Sudan, Pakistan
Analyst Comments: The internet outages in Sudan and Pakistan highlight the vulnerability of digital infrastructure in times of political unrest and conflict. In Sudan, the damage to infrastructure due to the conflict presents a significant challenge to restoring full connectivity. The situation in Pakistan underscores the government's control over digital communication channels and the economic implications of such shutdowns. These incidents serve as a reminder of the crucial role of internet access in modern societies, not just for communication but also for economic activities.
FROM THE MEDIA: Internet outages in Sudan and Pakistan have raised concerns among experts, as both countries are currently experiencing political turmoil. In Sudan, the outages are linked to an ongoing military conflict, with internet access almost entirely cut off. Despite attempts to restore service, the country's connectivity is at 1% of normal levels. The outages are believed to be due to power outages and damage to infrastructure caused by the conflict. In Pakistan, internet shutdowns have occurred following the arrest of former Prime Minister Imran Khan on corruption charges. Widespread social media blocking and mobile internet shutdowns have been reported, significantly impacting the country's economy and affecting gig workers and freelancers who rely on mobile connectivity.
READ THE STORY: The Record
New Ransomware Gang RA Group Hits U.S. and South Korean Organizations
Analyst Comments: The emergence of RA Group and its use of the Babuk source code highlights the ongoing threat posed by ransomware operators. The use of stolen or leaked ransomware code allows threat actors to accelerate their operations and develop customized variants. Organizations must remain vigilant and implement robust security measures to protect against ransomware attacks. This includes regularly patching systems, deploying strong access controls, implementing multi-factor authentication, conducting regular backups, and educating employees about phishing and other social engineering tactics. Additionally, organizations should develop an incident response plan and regularly test it to ensure readiness in the event of a ransomware attack.
FROM THE MEDIA: A new ransomware group called RA Group has emerged, leveraging the leaked Babuk ransomware source code to develop its own locker variant. The group has been active since at least April 2023 and has targeted organizations in the United States and South Korea across various industries, including manufacturing, wealth management, insurance, and pharmaceuticals. RA Group follows the common tactic of double extortion, encrypting files and threatening to leak them if the victim does not pay the ransom. Notably, the group sells the exfiltrated data on its leak portal hosted on a secured TOR site. The use of Babuk source code by different threat actors continues to grow, indicating an increasing trend of adopting and modifying the code to develop new ransomware variants. Other recent ransomware strains based on the Babuk code include AstraLocker, Nokoyawa, Rancoz, and BlackSuit.
READ THE STORY: THN
Why Countries are Accelerating ‘De-Dollarization’?
Analyst Comments: The trend of de-dollarization reflects a shift in global economic dynamics, with countries seeking to reduce their reliance on the US dollar and explore alternatives for international trade. This trend is driven by a combination of economic, political, and strategic factors, including the desire to mitigate the impact of US sanctions, maintain balance in foreign exchange reserves, and preserve economic sovereignty. The rise of LCT and the increasing acceptance of currencies like the Yuan in international trade indicate a diversification of the global financial system. However, the US dollar still holds the largest share in the global market, suggesting that the process of de-dollarization is still in its early stages.
FROM THE MEDIA: Local Currency Trade (LCT) is gaining popularity as a method of de-dollarization, with countries like Russia, Bangladesh, and India opting for bilateral LCT agreements. The process of de-dollarization refers to the shift away from the use of the US dollar in international trade, a trend that has been growing due to fluctuating foreign exchange reserves, geopolitical rivalry, and dwindling confidence in the dollar. LCT and trade in third currencies are popular methods of de-dollarization, with countries like Brazil and China planning to trade in Yuan. There are also proposals for creating new currencies to replace dollar trading, such as the "sur" in Latin America and a new currency by BRICS nations. The shift away from the dollar has been a long-term process, with the percentage of global reserves held in dollars decreasing from 73% in 2001 to 58% by 2023.
READ THE STORY: Modern Diplomacy
The US subjects Rockwell Automation’s China operations to cyber risk probe
Analyst Comments: The investigation into Rockwell Automation's Chinese facility highlights concerns regarding potential risks associated with foreign involvement in critical infrastructure and sensitive systems. The specific focus on Chinese nationals raises questions about access and control over crucial technologies. The outcome of the investigation will provide insight into the effectiveness of Rockwell Automation's security measures and the extent of any potential compromise. This case underscores the broader context of ongoing concerns about cybersecurity threats and foreign influence in critical sectors, particularly in relation to U.S.-China relations. The situation emphasizes the importance of robust security protocols and thorough vetting processes for personnel involved in critical infrastructure projects.
FROM THE MEDIA: The U.S. Department of Justice, Department of Defense, and Department of Energy have initiated an investigation into Rockwell Automation's software facility in Dalian, China, following allegations made by a whistleblower. The whistleblower claimed that Chinese workers at the facility had access to code that could potentially jeopardize U.S. national security, including the power grid and various government agencies. Rockwell Automation has stated that it has not been informed about the investigation but will cooperate fully, emphasizing its strong security protocols. The company asserts that there have been no indications of breaches or intentional compromises of its products.
READ THE STORY: SCMAG
New 'MichaelKors' Ransomware-as-a-Service Targeting Linux and VMware ESXi Systems
Analyst Comments: The emergence of MichaelKors RaaS targeting ESXi systems underscores the evolving tactics employed by ransomware operators. By focusing on hypervisors, attackers can potentially compromise multiple virtual machines and disrupt entire virtualized environments. Organizations that rely on ESXi should prioritize the security of their hypervisor infrastructure and adopt best practices to protect against such attacks. This includes implementing strong access controls, regularly updating software and firmware, monitoring suspicious activities, and ensuring robust backups are in place. Additionally, organizations should consider network segmentation to limit the impact of a potential breach.
FROM THE MEDIA: A new ransomware-as-a-service (RaaS) operation called MichaelKors has emerged, targeting Linux and VMware ESXi systems. This development highlights a growing trend of cybercriminals focusing on ESXi hypervisors, which are widely used for virtualization and management. The ability to target ESXi hypervisors is particularly attractive to attackers because they run directly on physical servers, providing them with access to underlying resources. Several ransomware groups have adopted this technique, referred to as "hypervisor jackpotting," to launch attacks. The lack of security tools, network segmentation, and known vulnerabilities in ESXi environments make them a target-rich environment for threat actors. Mitigation measures include avoiding direct access to ESXi hosts, implementing two-factor authentication, conducting regular backups, applying security updates, and performing security posture reviews.
READ THE STORY: THN
A New Lawsuit Puts the Online White Supremacy Pipeline on Trial
Analyst Comments: The investigation into Rockwell Automation's software facility in China underscores the concerns related to potential security risks associated with foreign involvement in critical infrastructure and sensitive systems. The involvement of Chinese nationals in the development and maintenance of code raises questions about access and control over key technologies. The investigation highlights the importance of robust security protocols and thorough vetting procedures for personnel working on critical infrastructure projects. The outcome of the investigation will provide insights into the efficacy of Rockwell Automation's security measures and the extent of any potential compromise.
FROM THE MEDIA: The U.S. Department of Justice, Department of Defense, and Department of Energy have initiated an investigation into Rockwell Automation's software facility in Dalian, China, following claims made by a whistleblower. The whistleblower alleged that Chinese nationals working at the facility had access to code that could potentially compromise U.S. national security, including access to the power grid, Navy, Coast Guard, and other federal government agencies. Rockwell Automation stated that it has not received any information about the investigation and emphasized its robust security protocols, stating that there have been no breaches or intentional compromises of its products.
READ THE STORY: Wired
CLR SqlShell Malware Targets MS SQL Servers for Crypto Mining and Ransomware
Analyst Comments: The discovery of this campaign highlights the ongoing threat to poorly managed MS SQL servers and the importance of proper security measures. Attackers are continuously finding new methods to exploit vulnerabilities and gain unauthorized access. Organizations that use MS SQL servers should ensure they are properly secured and updated with the latest patches. It is essential to implement strong access controls, monitor for suspicious activities, and regularly audit and review server configurations. Additionally, educating employees about best practices for securing and managing SQL servers can help prevent successful attacks. As threat actors continue to target vulnerable systems, organizations must remain vigilant and proactive in their defense against SQL server-related threats.
FROM THE MEDIA: A new campaign targeting poorly managed Microsoft SQL (MS SQL) servers have been discovered, utilizing a malware strain called CLR SqlShell. The malware is designed to facilitate the deployment of cryptocurrency miners and ransomware. CLR SqlShell is installed on MS SQL servers and enables threat actors to execute commands and carry out malicious activities. The attack method involves the use of CLR stored procedures, which are written in .NET languages such as C# or Visual Basic. This approach is being used alongside other methods like the xp_cmdshell command to exploit internet-exposed MS SQL servers. Attackers leverage CLR SqlShell to download next-stage payloads, including Metasploit and various cryptocurrency miners. Different adversaries have utilized variants of SqlShell to escalate privileges, launch ransomware attacks, and conduct reconnaissance activities in targeted networks.
READ THE STORY: THN
Hackers Using Golang Variant of Cobalt Strike to Target Apple macOS Systems
Analyst Comments: The emergence of Geacon as a Golang implementation of Cobalt Strike highlights the evolving threat landscape for macOS systems. Security teams should prioritize the implementation of strong endpoint protection solutions, conduct regular vulnerability assessments and patch management, and employ network monitoring and detection capabilities to identify and respond to potential Geacon attacks. Additionally, user education and awareness programs can help mitigate the risk of social engineering tactics used to deliver Geacon payloads.
FROM THE MEDIA: The emergence of a Golang implementation of a Cobalt Strike called Geacon has caught the attention of security researchers at SentinelOne. Geacon is a variant of Cobalt Strike, a popular red teaming and adversary simulation tool. While attacks associated with Cobalt Strike have primarily targeted Windows systems, Geacon is likely to draw the attention of threat actors looking to target Apple macOS systems. Geacon payloads have been observed on VirusTotal, and while some may be red-teaming operations, others exhibit characteristics of genuine malicious attacks. Geacon is a Go variant of Cobalt Strike that has been available on GitHub since February 2020. Recent samples trace back to two Geacon variants, geacon_plus, and geacon_pro, developed by anonymous Chinese developers. Geacon allows attackers to download payloads, exfiltrate data, and facilitate network communications. The emergence of Geacon underscores the need for security teams to pay attention to this tool and ensure appropriate protections are in place for macOS systems.
READ THE STORY: THN
Cops crack gang that used bots to book and resell immigration appointments
Analyst Comments: The arrest of individuals involved in the scheme to exploit Spain's immigration appointment system highlights the vulnerabilities and challenges faced by vulnerable migrants. The use of bots to secure appointments and then sell them for profit not only disrupted the system but also exploited the desperation of individuals in need of immigration services. The involvement of lawyers, advisors, and intermediaries demonstrates the complexity of the operation and the extent to which individuals were willing to profit from the vulnerabilities of others. The tactics employed to evade detection, such as bypassing CAPTCHA and using VPNs, indicate a level of sophistication and organization within the criminal network. This case underscores the importance of maintaining robust systems and security measures to protect against fraudulent activities targeting vulnerable populations.
FROM THE MEDIA: Spanish police have arrested 69 individuals involved in a scheme that used bots to book nearly all available appointments with immigration officials and then sold those slots to migrants for prices ranging from €30 to €200. The bots overwhelmed the online booking system, causing disruptions. Among those arrested were the alleged leaders of the crime ring, as well as lawyers, advisors, and intermediaries who profited from the sale of immigration appointments. The suspects used various tactics to avoid detection, including bypassing CAPTCHA challenges and using virtual private networks (VPNs) to hide their IP addresses. The scam targeted vulnerable individuals seeking asylum who had no other option but to pay for an appointment. Police seized computers, documents, and cash during the arrests.
READ THE STORY: The Register
A former employee of US consulate was charged by Russia with espionage
Analyst Comments: The charges against Robert Shonov indicate a further deterioration in US-Russian relations and an increase in tensions between the two countries. This comes in the context of ongoing disputes, including Russia's invasion of Ukraine and subsequent US sanctions. The detention and charging of a former US consulate employee suggest heightened suspicion and scrutiny of individuals with ties to the US government. The closure of the US consulate in Vladivostok further limits diplomatic engagement between the two countries.
FROM THE MEDIA: Russia's FSB security service has charged a former employee of the US consulate in Vladivostok, Robert Shonov, with illegal covert collaboration with foreigners. Shonov was detained and charged under Article 275.1 of the Russian Criminal Code, which pertains to cooperation with a foreign state or organization. The charges carry a potential prison sentence of up to eight years. Shonov is being held in Moscow's Lefortovo prison, known for serious crimes and espionage cases. The US embassy in Moscow acknowledged the reports but provided no further details. This comes amid strained US-Russian relations due to Russia's actions in Ukraine, including the US response to economic sanctions and military support to Kyiv. The US consulate in Vladivostok has been closed since December 2020.
READ THE STORY: The Guardian
Items of interest
The Fanfic Sex Trope That Caught a Plundering AI Red-Handed
Analyst Comments: The use of AI in this context raises several issues. First, there is the question of copyright. While fanfiction authors do not own the content on which they’re basing their pieces of fiction, they do own anything original they contribute through their work. This includes things like any original characters an author added, the plot structure, and the particular word choices. So, it is possible in some situations to file for copyright protection for works of fanfiction. Be aware there is the issue of attribution. The culture of fanfiction is all about attribution—writers link and nod to other people who’ve influenced them or helped them. This is not simply difficult to do with AI systems but is in fact nearly impossible. Many of these models are black boxes, and it would be impossible to spit out a list of influences that contributed to something specific ChatGPT wrote.
FROM THE MEDIA: Generative AI systems like Stable Diffusion, Midjourney, and ChatGPT have been making significant strides in creating art, writing books, and composing poetry. However, this advancement has raised concerns among artists and authors about the legal rights they have when their work is used by these tools. The Writers Guild of America (WGA) has even gone on strike over the potential use of AI to write scripts, referring to such systems as “plagiarism machines.” Visual artists have also voiced their concerns, denouncing the use of AI to replace illustrators and calling it “the greatest art heist in history.” One particular area of concern is the use of AI in the realm of fanfiction, specifically a sexual trope known as “the Omegaverse.” This trope, which originated in the fandom for the TV series Supernatural, has specific terms and phrases associated with it that are unique to fanfiction. This makes it an ideal test case for how generative AI systems are scraping the web.
READ THE STORY: Wired
Constructing a High-Speed Anti-Censorship Router: A Narrative from Behind the Great Firewall (Video)
FROM THE MEDIA: Reversing GFW (Great FireWALLl) is not a new topic, but it evolved over the years. Especially these past 3 years, things have changed and the WALL has become greater and stronger. As a person staying in China since 28th Jan 2020, this talk is to share the knowledge behind and over the WALL. The final goal is to reach the full capacity of the ISP and to gain access to the world.
How Influencers Cover Up Crimes Against Humanity (Video)
FROM THE MEDIA: This video discusses the phenomenon of Uighur influencers on platforms like YouTube and how they are being used to cover up crimes against humanity committed by the Chinese government. The speaker, Daria Impiombato, a China analyst at the Australian Strategic Policy Institute, explains that these influencers appear genuine in their content, focusing on everyday topics like puppies, travel, and makeup. However, hidden within their lifestyle content are subtle propaganda messages aimed at whitewashing the human rights abuses against Uighurs and other Muslim minorities in China.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.