The other members include Illinois Rep. Rodney Davis, a moderate who serves as the top Republican on the House Administration Committee; Ohio Rep. Jim Jordan, the top Republican on the House Judiciary Committee; Rep. Kelly Armstrong (R-N.D.), a lawyer by trade who served on the House Judiciary Committee during the first Trump impeachment; and freshman Rep. Troy Nehls (R-Texas), a former sheriff who supported Capitol Police in turning back rioters who tried to break into the House floor during the siege.

McCarthy said he wanted to “make sure you get the best people on the committee,” touting Davis’ work on the administration panel and Nehls’ years in law enforcement.

McCarthy’s appointments come days before the select panel is set to hold its first hearing, featuring witnesses from the U.S. Capitol Police Department and Metropolitan Police Department. Among the Democratic-named members of the committee is Rep. Liz Cheney (R-Wyo.), a McCarthy critic ousted from House GOP leadership for her condemnation of Trump.

The investigation is expected to be highly contentious, as both parties wrestle to pin blame for the security failures on Jan. 6 that led to scores of law enforcement injuries as Trump supporters rioted to try to disrupt Congress from certifying his loss to President Joe Biden. Three out of McCarthy’s five expected selections for the Republican side of the select panel voted in favor of challenges to certification of Biden’s victory.

Jordan declined Monday to say whether he has been asked by McCarthy to serve on the panel. When asked whether he is willing, the Ohio Republican said the decision is “totally up to Kevin” but that he would join the roster if asked.

Source Article from https://www.politico.com/news/2021/07/19/mccarthy-zeroes-in-on-five-gop-members-for-jan-6-select-committee-500201

Utility equipment from Pacific Gas & Electric Co. may have sparked the Dixie fire, which has scorched more than 30,000 acres in Butte and Plumas counties over the past week, according to a report the utility company filed Sunday.

PG&E said in the report submitted to the California Public Utilities Commission that an employee responding to an outage Tuesday noticed a blown fuse at Cresta Dam in a heavily forested area of Butte County around the Feather River Canyon. The worker approached the pole about 4:40 p.m. and found two blown fuses and a tree leaning into a power lines conductor, “which was still intact and suspended on the poles,” the report said. “He also observed a fire on the ground near the base of the tree.”

The worker removed a third fuse that hadn’t blown, reported the fire, and his supervisor called 911, according to the document.

California Department of Forestry and Fire Protection officials quickly swarmed the area, dropping fire retardant and water. But by 8 a.m. Wednesday, the blaze had grown to 500 acres. Dangerous fire weather conditions followed, with gusty winds and low humidity, leading Cal Fire to issue a red flag warning. By Wednesday evening, the fire — by then dubbed the Dixie fire — had reached 2,200 acres and was 0% contained.

By Monday morning, the fire had ballooned to 30,074 acres and was 15% contained, according to Cal Fire.

“The information PG&E submitted is preliminary, and the company submitted this report in an abundance of caution given Cal Fire’s collection of PG&E facilities in connection with its investigation,” PG&E spokesman Matt Nauman said in a statement. “PG&E is cooperating with Cal Fire’s investigation.”

Evacuation orders are in place for Plumas County, the High Lakes and the Jonesville and Philbrook parts of Butte County, officials said.

Firefighters have been challenged in battling the Dixie fire, which is spreading in remote, hard-to-access areas with difficult terrain. It is also burning close to the scar of two other recent record-breaking fires in Butte County: the devastating Camp fire from 2018, which killed at least 85 people and wiped out much of the town of Paradise, and last year’s North Complex fire, among the deadliest in California history, killing at least 16 people and decimating the communities of Berry Creek and Feather Falls.

PG&E has come under increased scrutiny in recent years as its equipment has been targeted as the source of several fires. A trust representing more than 80,000 wildfire victims sued nearly two dozen of the utility’s former executives and board members earlier this year, claiming their neglect led to several fires. To avoid sparking incidents, the company has ramped up power safety shut-offs during California’s fire season.

Source Article from https://www.latimes.com/california/story/2021-07-19/pg-e-says-its-equipment-may-have-sparked-dixie-fire

In this image from U.S. Capitol Police video, Paul Hodgkins of Tampa, Fla., stands in the well on the floor of the U.S. Senate on Jan. 6. On Monday, he was sentenced to eight months in prison.

U.S. Capitol Police via AP


hide caption

toggle caption

U.S. Capitol Police via AP

In this image from U.S. Capitol Police video, Paul Hodgkins of Tampa, Fla., stands in the well on the floor of the U.S. Senate on Jan. 6. On Monday, he was sentenced to eight months in prison.

U.S. Capitol Police via AP

A Florida crane operator who walked onto the Senate floor during the Jan. 6 attack on the U.S. Capitol has been sentenced to eight months in federal prison and two years of supervised release.

Paul Hodgkins’ sentencing is the first in a felony case stemming from the deadly assault on the U.S. Capitol by a mob of Trump supporters. It is viewed as a potential bellwether for how other Capitol defendants charged with similar offenses are likely to be treated.

Hodgkins pleaded guilty last month to a single count of obstructing an official proceeding. On Jan. 6, he marched from then-President Donald Trump’s rally near the White House to the Capitol, where he walked inside and onto the floor of the Senate while carrying a red “Trump 2020” flag.

In court Monday, Hodgkins, dressed in a dark suit with his hair pulled back in a pony tail, said he was “truly remorseful and regretful” for his actions on Jan. 6.

“I say this not because I face consequence, but because of the damage that day’s incident caused, the way this country that I love has been hurt,” he told U.S. District Judge Randolph Moss.

Hodgkins said he traveled to Washington, D.C., from Florida to support Trump, and he had no idea the crowd would later storm the Capitol. He said he got caught up in the passion of the day and entered the Capitol and walked onto the Senate floor.

“This was a foolish decision on my part that I take full responsibility for,” Hodgkins said. “I do not nor will not make any excuse.”

In Hodgkins’ case, the sentencing guidelines range was calculated at 15 to 21 months. Hodgkins’ attorney, Patrick Leduc, asked the court for no prison time. The Justice Department, in contrast, recommended 18 months, in part to send a strong deterrent signal to anyone pondering a future assault on the country’s democratic institutions.

The judge explained in court how he decided on a sentence in between those recommendations.

“It’s essential to send a message that this type of conduct is utterly unacceptable and that grave damage was done to our country that day,” Moss said. “But at the same time, I do not believe that Mr. Hodgkins, other than having made some very bad decisions that day … that he is a threat.”

Moss noted that Hodgkins did not previously have a criminal record. He did not engage in violence on Jan. 6 or destroy property, and he was in the Capitol for less than 30 minutes. But his presence at the Capitol, Moss made clear, did contribute to the mob’s ability to achieve its goal of disrupting the certification of the 2020 presidential election.

“Although Mr. Hodgkins was only one member of a larger mob, he actively and intentionally participated in an event that threatened not only the security of the Capitol but democracy itself,” Moss said.

“Because of the actions of Mr. Hodgkins and others that day, members of U.S. Congress were forced to flee their respective chambers,” he added. “I think it’s worth pausing for a moment to think about that — that is an extraordinary event under any circumstances that the members of the United States Congress are forced to flee the building fearing for their physical safety.”

The judge said the damage the rioters caused “will persist in this country for several decades.” He said it will make it harder for the government to promote democracy abroad and harder to convince young Americans that democracy stands as the foundation of this nation.

Source Article from https://www.npr.org/2021/07/19/1017916061/capitol-rioter-who-walked-on-senate-floor-on-jan-6-sentenced-to-8-months-in-pris

Fox News contributor Joe Concha called out hypocrisy surrounding Jen Psaki and the White House for trying to dictate what is and what isn’t deemed “misinformation” on social media. Concha remarked on “America’s Newsroom,” Monday, that the White House Press Secretary shouldn’t be able to weigh in on censorship when she posted incorrect information on Twitter

JOE CONCHA: Well, it may sound hyperbolic, but it’s really not when you think about it; when you have the government, an administration, a presidential administration, working with a private company — a powerful one, maybe the most powerful communications platform in the world — determining what is misinformation and what isn’t. And when Ted Cruz just said he was talking about White House Press Secretary Jen Psaki, who declared that those putting misinformation on social media should be banned across all platforms, if banned by one. 

TWITTER EXPLODES AFTER PSAKI URGES BIG TECH TO UNITE ON BANS FOR ‘MISINFORMATION’ SPREADERS

This is the same Jen Psaki who posted misinformation about Russian bounties on US troops. That’s when she was with CNN before she joined the Biden administration. This is back in 2020… She called that misinformation, called it, a dubious report, factual, and that was debunked. She also said that Hunter Biden’s laptop, that was the product of Russian disinformation. That was another tweet. So based on Jen Psaki s own rules, she should have been banned from social media because she was posting misinformation. So for the White House to try to determine what is misinformation and what isn’t, their track record and Facebook’s backtracking track record in terms of fact-checking ain’t too good, guys.

WATCH THE FULL INTERVIEW HERE:

 

Source Article from https://www.foxnews.com/media/jen-psaki-should-have-been-banned-on-social-media-for-misinformation-joe-concha

Vice President Kamala Harris tested negative for COVID-19 after meeting with several Texas House Democratic lawmakers who recently contracted the virus, White House Press Secretary Jen Psaki confirmed on Monday.

“I think the vice president’s office put out that she was tested and there was no detection of COVID-19,” Psaki said. “They also put out some specific details about their proximity to the individuals who tested positive as well. We take these precautions incredibly seriously and abide by the guidance of our help and medical experts.”

Five of the Texas House Democrats who traveled to Washington D.C. have tested positive for COVID-19 in recent days. Harris met with the Texas lawmakers last Tuesday.

When asked whether the White House was disappointed that the lawmakers did not wear masks on their flight to the nation’s capital, Psaki declined to directly respond.

REP. RONNY JACKSON HITS TEXAS DEMOCRATS ON MASK HYPOCRISY, SAYS THEY SHOULDN’T BE TAKE SERIOUSLY

“I don’t think I’m going to be in a position here to assess what safety precautions they may or may not have taken. Obviously, these individuals were out there trying to elevate the issue of an individual’s right to vote,” Psaki said.

“What’s important for everybody to know is that the vice president was tested,” she added. “She, of course, takes these precautions seriously and we would follow any advice our public health officials give us.”

Psaki said “no additional precautions” were being taken to separate Harris from President Biden following her meeting with the lawmakers.

Harris went to Walter Reed Medical Center on Sunday for what her office described as a routine doctor’s appointment. Officials said Harris was not in close contact with the infected lawmakers and would not need to quarantine.

CLICK HERE TO GET THE FOX NEWS APP

Psaki told reporters that Harris’ appointment was already scheduled before the meeting.

“It was a visit that was scheduled for several weeks, long before the visit of the Texas legislators, a routine appointment which she had, again, scheduled several weeks ago,” Psaki said.

Source Article from https://www.foxnews.com/politics/vp-harris-tested-negative-covid-19-meeting-texas-democrats

The Centers for Disease Control and Prevention and the State Department on Monday said to avoid travel to the U.K. as the delta variant of Covid-19 continues to spread.

The warnings are “Level 4,” the CDC and State Department’s highest. While not binding, they come after airline executives and other members of the travel industry have pressed the Biden administration to loosen existing Covid travel restrictions that have devastated demand for international bookings.

The United States has had an entry ban in place for non-U.S. citizens from the EU, U.K. and other countries for much of the coronavirus pandemic, though several European nations have recently opened their doors to international visitors. Canada, however, said Monday it will allow fully vaccinated U.S. citizens into the country for nonessential travel starting Aug. 9.

The White House and the British Embassy in Washington didn’t immediately respond to a request for comment.

The CDC said if individuals must travel to the U.K., they should be fully vaccinated against Covid. Meanwhile, England lifted remaining Covid-19 restrictions on Monday, allowing for indoor gatherings and the reopening of nightclubs.

But Covid infections remain high across the U.K. with 316,691 cases reported over the last seven days, up by about 43% from the previous seven-day period, according to a CNBC analysis of data compiled by Johns Hopkins University.

U.S. airline stocks fell sharply on Monday as an increasing number of Covid cases raised concerns about the economic recovery and the potential impact on the recent resurgence in travel demand after a slump for much of the past year.

Covid cases in the U.S. have jumped by about 66% in the past week to a seven-day average of about 32,300 new cases per day, according to Johns Hopkins data.

— CNBC’s Holly Ellyatt contributed to this article.

Source Article from https://www.cnbc.com/2021/07/19/cdc-tells-individuals-to-avoid-travel-to-the-uk-as-covid-cases-rise.html

Haiti’s interim Prime Minister Claude Joseph gives a press conference in Port-au-Prince on July 16, the week after the assassination of Haitian President Jovenel Moïse’s on July 7.

Joseph Odelyn/AP


hide caption

toggle caption

Joseph Odelyn/AP

Haiti’s interim Prime Minister Claude Joseph gives a press conference in Port-au-Prince on July 16, the week after the assassination of Haitian President Jovenel Moïse’s on July 7.

Joseph Odelyn/AP

PORT-AU-PRINCE, Haiti — Haiti’s designated Prime Minister Ariel Henry will replace the country’s interim prime minister to honor the wishes of the country’s slain president, an official told The Associated Press on Monday.

It wasn’t immediately clear how quickly interim Prime Minister Claude Joseph, who has been leading Haiti with the backing of police and the military since the July 7 assassination of President Jovenel Moïse, would step down.

“Negotiations are still in course,” Haiti Elections Minister Mathias Pierre said, adding that Joseph would go back to being minister of foreign affairs.

Joseph could not be immediately reached for comment, and Henry did not return a message for comment. However, he released an audio recording in which he referred to himself as prime minister and called for unity.

Henry said he would soon announce the members of what he called a provisional consensus government that would lead the country until elections are held.

“I present my compliments to the Haitian people who have shown political maturity in the face of what can be considered a coup. … Our Haitian brothers gave peace a chance, while leaving the possibility that the truth could one day be restored,” Henry said.

“Now it is up to all the national leaders to walk together in unity, towards the same goal, to show that they are responsible.”

The political turnover followed a statement Saturday from a key group of international diplomats that appeared to snub Joseph as it called for the creation of “a consensual and inclusive government.”

“To this end, it strongly encourages the designated Prime Minister Ariel Henry to continue the mission entrusted to him to form such a government,” the statement from the Core Group said.

The Core Group is composed of ambassadors from Germany, Brazil, Canada, Spain, the U.S., France, the European Union and representatives from the United Nations and the Organization of American States.

Monique Clesca, a Haitian writer, activist and former U.N. official, said she doesn’t anticipate any changes under Henry, whom she expects to carry on Moïse’s legacy. But she warned Henry might be viewed as tainted because of the Core Group’s involvement.

“If he accepts this, there is not only a perception, but the reality that he has been put there by the international community, and I think that’s his burden to carry,” she said.

“What we’re calling for is for Haitians to really say this is unacceptable. We do not want the international community stating who ought to be in power and what ought to be done. It is up to us.”

The U.S. Embassy issued a brief statement saying it encouraged civil society to play an active role in building consensus in Haiti, adding that it was essential to strengthening democracy.

The Core Group statement was issued hours after Moïse’s wife, Martine, arrived in Haiti on Saturday aboard a private jet clad in black and wearing a bulletproof vest after being released from a hospital in Miami. She has not issued a statement or spoken publicly since her return to Haiti as the government prepares for the July 23 funeral that will be held in the northern city of Cap-Haitien. Other events to honor Moïse are planned this week in the capital of Port-au-Prince ahead of the funeral.

Moïse designated Henry as prime minister shortly before he was killed, but he had not been sworn in. The neurosurgeon was previously minister of social affairs and interior minister. He has belonged to several political parties including Inite, which was founded by former President René Préval.

The upcoming change in leadership comes as authorities continue to investigate the July 7 attack at Moïse’s private home with high-powered rifles that seriously wounded his wife.

Authorities say more than 20 suspects directly involved in the killing have been arrested. The majority of them are former Colombian soldiers, most of whom Colombian officials say were duped. Another three suspects were killed, with police still seeking additional ones, including an ex-Haitian rebel leader and a former Haitian senator.

Source Article from https://www.npr.org/2021/07/19/1017884122/haiti-interim-prime-minister-to-step-down

An alert on a suspected attack by state-backed Chinese hackers from the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency in April.

Jon Elswick/AP


hide caption

toggle caption

Jon Elswick/AP

An alert on a suspected attack by state-backed Chinese hackers from the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency in April.

Jon Elswick/AP

The White House is publicly blaming China for an attack on Microsoft’s Exchange email server software that compromised tens of thousands of computers worldwide, allowing hackers to gain access to troves of sensitive data.

Separately, the Department of Justice announced Monday that a federal grand jury in May had indicted Chinese nationals accused of working with official sanction from Beijing to break into computer systems belonging to U.S. companies, universities and governments.

The cyberattack on Microsoft, which is believed to have begun in January, reportedly injected computers with malware that secretly monitored systems belonging to small businesses, local and state governments and some military contractors.

As part of the attack, an unidentified American company was also hit with a high-dollar ransom demand, according to a senior Biden administration official.

U.S. allies are also blaming China for cyberattacks

The official, who briefed reporters late Sunday, said the U.S. would be joined by the European Union, the United Kingdom, Australia, Canada, New Zealand, Japan and NATO in condemning Beijing’s Ministry of State Security for the malicious cyberattacks.

EU policy chief Josep Borrell in a statement on Monday said the hacking was “conducted from the territory of China for the purpose of intellectual property theft and espionage.”

U.K. Foreign Secretary Dominic Raab said China’s actions represent “a reckless but familiar pattern of behavior.”

“The Chinese Government must end this systematic cyber sabotage and can expect to be held [to] account if it does not,” Raab said in a statement.

In a tweet, NATO Secretary General Jens Stoltenberg said that the alliance “stands in solidarity with all those affected by malicious cyber activities, including the Microsoft Exchange Server compromise. We call on all states, including China, to uphold their international obligations & act responsibly.”

The announcements follow heightened concern over ransomware attacks that the White House has blamed on Russian hackers and highlights how the West’s traditional Cold War rivals have stepped up pressure in cyberspace in recent years.

The White House says China worked with criminal contract hackers

The Biden administration official said that China’s Ministry of State Security employed criminal contract hackers “to conduct unsanctioned cyber operations globally, including for their own personal profit.”

Although the U.S. says criminal gangs of hackers with links to Russian intelligence carried out such audacious ransomware attacks as the one that caused Colonial Pipeline – a major U.S. petroleum distribution network – to shut down temporarily, China’s outright hiring of contract hackers is “distinct,” the official said.

“The United States has long been concerned about the People’s Republic of China’s irresponsible and destabilizing behavior in cyberspace,” the official said. Such hacks pose a serious economic and national security threat to the U.S. and its allies, the official said.

“Their operations include criminal activities, such as cyber-enabled extortion, crypto-jacking and theft from victims around the world for financial gain. In some cases, we’re aware of reports that PRC government-affiliated cyber operators have conducted ransomware operations against private companies that have included ransom demands of millions of dollars,” the official said.

Although no sanctions against China have been announced, the U.S. has “raised its concerns” with Beijing, the official said. “The first important piece is the publicly calling out the pattern of irresponsible malicious cyberactivity, and doing it with allies and partners.”

Previously, a spokesperson for China’s Foreign Ministry has said that Beijing “firmly opposes and combats cyber-attacks and cyber theft in all forms” and cautioned against “groundless accusations” that China is involved in such attacks, according to The Associated Press.

Four Chinese nationals have been indicted

However, on Monday, the Department of Justice said in a statement that a federal grand jury in San Diego had indicted four nationals and residents of China with “a campaign to hack into the computer systems of dozens of victim companies, universities and government entities in the United States and abroad between 2011 and 2018.”

The indictment, unsealed Friday, alleges a conspiracy to steal data with a “significant economic benefit to China’s companies and commercial sectors, including information that would allow the circumvention of lengthy and resource-intensive research and development processes.”

The four individuals worked with China’s Hainan State Security Department “to obfuscate the Chinese government’s role in such theft by establishing a front company, Hainan Xiandun Technology Development Co., Ltd.,” which has since been dismantled, the Justice Department said.

The FBI, National Security Agency and the U.S. Cybersecurity and Infrastructure Security Agency issued a joint advisory Monday laying out ways that government agencies and businesses could protect themselves from such attacks.

Source Article from https://www.npr.org/2021/07/19/1017844801/biden-administration-accuses-china-microsoft-hack

Joseph had previously claimed that Ariel Henry, the 71-year old neurosurgeon who was appointed prime minister by Moïse two days before the killing, had not yet been sworn into the job and had no right to act as interim leader. Joseph, who was Moïse’s foreign minister, had served as acting prime minister before Moïse named Henry, which he had said made him Haiti’s rightful interim leader following the slaying.

Source Article from https://www.washingtonpost.com/world/2021/07/19/haiti-claude-joseph-ariel-henry/

Governments must impose a global moratorium on the international spyware trade or face a world in which no mobile phone is safe from state-sponsored hackers, Edward Snowden has warned in the wake of revelations about the clients of NSO Group.

Snowden, who in 2013 blew the whistle on the secret mass surveillance programmes of the US National Security Agency, described for-profit malware developers as “an industry that should not exist”.

He made the comments in an interview with the Guardian after the first revelations from the Pegasus project, a journalistic investigation by a consortium of international media organisations into the NSO Group and its clients.

Quick Guide

What is in the Pegasus project data?

Show

What is in the data leak?

The data leak is a list of more than 50,000 phone numbers that, since 2016, are believed to have been selected as those of people of interest by government clients of NSO Group, which sells surveillance software. The data also contains the time and date that numbers were selected, or entered on to a system. Forbidden Stories, a Paris-based nonprofit journalism organisation, and Amnesty International initially had access to the list and shared access with 16 media organisations including the Guardian. More than 80 journalists have worked together over several months as part of the Pegasus project. Amnesty’s Security Lab, a technical partner on the project, did the forensic analyses.

What does the leak indicate?

The consortium believes the data indicates the potential targets NSO’s government clients identified in advance of possible surveillance. While the data is an indication of intent, the presence of a number in the data does not reveal whether there was an attempt to infect the phone with spyware such as Pegasus, the company’s signature surveillance tool, or whether any attempt succeeded. The presence in the data of a very small number of landlines and US numbers, which NSO says are “technically impossible” to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus. However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity – in some cases as little as a few seconds.

What did forensic analysis reveal?

Amnesty examined 67 smartphones where attacks were suspected. Of those, 23 were successfully infected and 14 showed signs of attempted penetration. For the remaining 30, the tests were inconclusive, in several cases because the handsets had been replaced. Fifteen of the phones were Android devices, none of which showed evidence of successful infection. However, unlike iPhones, phones that use Android do not log the kinds of information required for Amnesty’s detective work. Three Android phones showed signs of targeting, such as Pegasus-linked SMS messages.

Amnesty shared “backup copies” of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection. Citizen Lab also conducted a peer review of Amnesty’s forensic methods, and found them to be sound.

Which NSO clients were selecting numbers?

While the data is organised into clusters, indicative of individual NSO clients, it does not say which NSO client was responsible for selecting any given number. NSO claims to sell its tools to 60 clients in 40 countries, but refuses to identify them. By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates. Citizen Lab has also found evidence of all 10 being clients of NSO.

What does NSO Group say?

You can read NSO Group’s full statement here. The company has always said it does not have access to the data of its customers’ targets. Through its lawyers, NSO said the consortium had made “incorrect assumptions” about which clients use the company’s technology. It said the 50,000 number was “exaggerated” and the list could not be a list of numbers “targeted by governments using Pegasus”. The lawyers said NSO had reason to believe the list accessed by the consortium “is not a list of numbers targeted by governments using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes”. After further questions, the lawyers said the consortium was basing its findings “on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers’ targets of Pegasus or any other NSO products … we still do not see any correlation of these lists to anything related to use of NSO Group technologies”.

What is HLR lookup data?

The term HLR, or home location register, refers to a database that is essential to operating mobile phone networks. Such registers keep records on the networks of phone users and their general locations, along with other identifying information that is used routinely in routing calls and texts. Telecoms and surveillance experts say HLR data can sometimes be used in the early phase of a surveillance attempt, when identifying whether it is possible to connect to a phone. The consortium understands NSO clients have the capability through an interface on the Pegasus system to conduct HLR lookup inquiries. It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons – unrelated to Pegasus – for conducting HLR lookups via an NSO system.

NSO Group manufactures and sells to governments advanced spyware, branded as Pegasus, that can secretly infect a mobile phone and harvest its information. Emails, texts, contact books, location data, photos and videos can all be extracted, and a phone’s microphone and camera can be activated to covertly record the user.

The consortium analysed a leaked dataset of 50,000 phone numbers that, it is believed, were identified as belonging to persons of interest to NSO’s customers. Forensic analysis of a sample of the mobile phones found dozens of cases of successful and attempted Pegasus infections.

NSO Group says it takes ethical considerations seriously, is regulated by the export control regimes of Israel, Cyprus and Bulgaria and only sells to vetted government clients. But its customers have included repressive regimes, including Saudi Arabia, the United Arab Emirates and Azerbaijan.

Speaking in an interview with the Guardian, Snowden said the consortium’s findings illustrated how commercial malware had made it possible for repressive regimes to place vastly more people under the most invasive types of surveillance.

Pegasus: the spyware technology that threatens democracy – video

For traditional police operations to plant bugs or wiretap a suspect’s phone, law enforcement would need to “break into somebody’s house, or go to their car, or go to their office, and we’d like to think they’ll probably get a warrant”, he said.

But commercial spyware made it cost-efficient for targeted surveillance against vastly more people. “If they can do the same thing from a distance, with little cost and no risk, they begin to do it all the time, against everyone who’s even marginally of interest,” he said.

“If you don’t do anything to stop the sale of this technology, it’s not just going to be 50,000 targets. It’s going to be 50 million targets, and it’s going to happen much more quickly than any of us expect.”

Part of the problem arose from the fact that different people’s mobile phones were functionally identical to one another, he said. “When we’re talking about something like an iPhone, they’re all running the same software around the world. So if they find a way to hack one iPhone, they’ve found a way to hack all of them.”

He compared companies commercialising vulnerabilities in widely used mobile phone models to an industry of “infectioneers” deliberately trying to develop new strains of disease.

“It’s like an industry where the only thing they did was create custom variants of Covid to dodge vaccines,” he said. “Their only products are infection vectors. They’re not security products. They’re not providing any kind of protection, any kind of prophylactic. They don’t make vaccines – the only thing they sell is the virus.”

Snowden said commercial malware such as Pegasus was so powerful that ordinary people could in effect do nothing to stop it. Asked how people could protect themselves, he said: “What can people do to protect themselves from nuclear weapons?

“There are certain industries, certain sectors, from which there is no protection, and that’s why we try to limit the proliferation of these technologies. We don’t allow a commercial market in nuclear weapons.”

He said the only viable solution to the threat of commercial malware was an international moratorium on its sale. “What the Pegasus project reveals is the NSO Group is really representative of a new malware market, where this is a for-profit business,” he said. “The only reason NSO is doing this is not to save the world, it’s to make money.”

He said a global ban on the trade in infection vectors would prevent commercial abuse of vulnerabilities in mobile phones, while still allowing researchers to identify and fix them.

“The solution here for ordinary people is to work collectively. This is not a problem that we want to try and solve individually, because it’s you versus a billion dollar company,” he said. “If you want to protect yourself you have to change the game, and the way we do that is by ending this trade.”

NSO Group said in a series of statements that it rejected “false claims” about the company and its clients, and said it did not have visibility over its clients use of Pegasus spyware. It said it only sold the software to vetted government clients, and that its technology had helped to prevent terrorism and serious crime.

Following the launch of the Pegasus project, Shalev Hulio, the founder and chief executive of NSO, said he continued to dispute that the leaked data “has any relevance to NSO”, but added that he was “very concerned” about the reports and promised to investigate them all. “We understand that in some circumstances our customers might misuse the system,” he said.

Source Article from https://www.theguardian.com/news/2021/jul/19/edward-snowden-calls-spyware-trade-ban-pegasus-revelations

The National Weather Service’s Sacramento office shared a video on Twitter of the massive pyrocumulus clouds that formed over the Dixie Fire in Plumas County on Sunday, sending a towering smoke column into the atmosphere and signaling the extreme fire activity on the ground.

“The ongoing #DixieFire continues to burn in Plumas County,” the weather service wrote. “This video is from around 5:20 pm today, July 18th.”

The Pyrocumulus clouds — literally translated as “fire clouds” — complicated containment efforts Sunday, where flames spread in remote areas with steep terrain crews can’t easily reach, officials said. New mandatory evacuation orders were issued in rural communities near the Feather River Canyon including Bucks Lake and Meadow Valley. (See evacuation information here.)


The Dixie Fire grew over 10,000 acres overnight and covered 30,074 acres as of Monday morning. It was 15% contained. The fire is northeast of the town of Paradise, California, and survivors of that horrific fire that killed 85 people watched warily as the blaze burned.

Flames broke out above the Cresta Dam in the Feather River Canyon on July 14


The blaze had significant activity on Sunday and overnight, Cal Fire said, and flames continued to push southeast toward Bucks Lake.

A portion of State Route 70 was closed to all traffic due to the fire. 

An evacuation center was set up at Quincy High School (across from Safeway) for people under mandatory evacuation.

Plumas News reported on a Sunday night briefing from Operations Section Chief Tony Burnell who said fire activity Sunday picked up on the east side, jumping the Feather River and running all the way down to Tobin. The fire was burning west and north of Bucks Lake. 

“We want to keep it out of Bucks Lake and the Meadow Valley area,” Burnell said.

The Associated Press contributed to this story.

Source Article from https://www.sfgate.com/california-wildfires/article/Dixie-Fire-pyrocumulous-clouds-video-Plumas-16323985.php

WASHINGTON—The Biden administration Monday publicly blamed hackers affiliated with China’s main intelligence service for a far-reaching cyberattack on Microsoft Corp. email software this year, senior administration officials said, part of a global effort to condemn Beijing’s malicious cyber activities.

In addition, four Chinese nationals, including three intelligence officers, were indicted over separate hacking activity.

The U.S. government has “high confidence” that hackers tied to the Ministry of State Security, or MSS, carried out the unusually indiscriminate hack of Microsoft Exchange Server software that emerged in March, senior officials said.

“The United States and countries around the world are holding the People’s Republic of China (PRC) accountable for its pattern of irresponsible, disruptive, and destabilizing behavior in cyberspace, which poses a major threat to our economic and national security,” Secretary of State Antony Blinken said. The MSS, he added, had “fostered an ecosystem of criminal contract hackers who carry out both state-sponsored activities and cybercrime for their own financial gain.”

The U.K. and European Union joined in the attribution of the hacking activity, which rendered an estimated hundreds of thousands of mostly small businesses and organizations vulnerable to cyber intrusion.

Source Article from https://www.wsj.com/articles/biden-administration-to-blame-hackers-tied-to-china-for-microsoft-cyberattack-spree-11626692401