destroy ugly, create beautiful

allowing good while stopping the bad

Hippogriff takes pride in having the skills available to protect and promote the Human Right to privacy. Illegal actions against individuals and companies are not only carried out by criminal cells, but also state-sponsored agencies and their non-governmental contracted propagators. Hippogriff is able to grant System Protection, Continuity, and Contingency Planning - along with Network Security Testing and Evaluation capabilities to slow down and make unlawful espionage against innocents more difficult. Legitimate business operations are being affected by such revelations; this means profits will continue to be hampered if economic activity isn't left alone by the misuse of information technology systems.

Hippogriff is available to fill the demand of exponential technological growth; a need for Cyber Security services is paramount. Too many companies are unaware of the dangerous that await them as they navigate the global economy. Most organizations at this time are infected at different levels of their network infrastructure. Most organizations employ an ill-equipped internal IT department or outsourced IT services that DO NOT specialize in the areas that Hippogriff is currently assisting in. The future will be even more hectic than things are now. Make sure your organization's systems are prepared to deal with emerging threats and changes to infrastructure.


Key Takeaways from the California Consumer Privacy Act of 2018

As drafted, the CCPA affords California residents the right to: (1) know what personal information is being collected about them, (2) know whether their personal information is sold or disclosed and to whom, (3) say no to the sale of personal information, (4) access their personal information, and (5) receive equal service and price, even if they exercise their privacy rights.

Subject to a number of exceptions, the CCPA includes a broadly worded right for consumers to request that their personal information be deleted. Upon request, the business must delete the consumer's personal information and direct any service providers (entities that process information on behalf of a business) to delete the consumer's personal information from their records. However, the bill lacks clarity on, among other things, what a consumer must include in the request, what specific information the consumer can request the company to delete, and how and the extent to which the information must be deleted.

The CCPA also prohibits third party collectors of customer information from selling such information unless the consumer has received explicit notice and was provided an opportunity to opt-out.


U.K. Security Officials Warn of "New Risks" from Huawei

The Chinese company, which sells smartphones and telecommunications equipment around the world, is monitored in the United Kingdom by a government oversight panel called the Huawei Cyber Security Evaluation Center.

In an annual report published on Thursday, the panel warned that "shortcomings in Huawei's engineering processes have exposed new risks in the U.K. telecommunication networks."

"The Oversight Board can provide only limited assurance that any risks to U.K. national security from Huawei's involvement in the U.K.'s critical networks have been sufficiently mitigated," it added.

Huawei has repeatedly come under fire from lawmakers and government officials in the United States who accuse it of working under the influence of the Chinese government.


Apple Transfers Chinese Users' iCloud Data to State-Controlled Data Centers

Apple's Chinese data center partner has transferred iCloud data, belonging to 130 million China-based users, to a cloud storage service managed by a state-owned mobile telecom provider — raising concerns about privacy.

Back in February this year, Apple moved the encryption keys and data of its Chinese iCloud users from its US servers to local servers on Chinese soil to comply with the new regulation of the Chinese government, despite concerns from human rights activists.

For this Apple controversially signed a deal with Guizhou-Cloud Big Data (GCBD), a Chinese company who gained operation control over Apple's iCloud business in China earlier this year.

Now, that sensitive data, which includes users' emails, text messages, pictures, and the encryption keys that protect it, has been passed on to Tianyi cloud storage service, a business venture managed by government-owned mobile operator China Telecom.


Judge Slams FBI for Improper Cellphone Search, Stingray Use

A federal judge in San Francisco recently excoriated the government over its improper methods in searching one suspect's cell phone and in the use of a stingray to find an alleged co-conspirator.

Prosecutors say the two men, Donnell Artis and Chanta Hopkins, were engaged in credit card fraud and also illegally possessed firearms, among other pending charges that also involve four other people.

The crux of the issue is that, in April 2016, an FBI agent sought and obtained two warrants from an Alameda County Superior Court judge: one to search Artis' phone and another to deploy a stingray to locate Hopkins.

Once deployed, stingrays intercept data from the target phone along with information from other phones within the vicinity — up to and including full calls and text messages. At times, police have falsely claimed that information gathered from a stingray has instead come from a confidential informant.


World Powers Equip, Train Other Countries for Surveillance

Privacy International has released a report that looks at how powerful governments are financing, training and equipping countries with surveillance capabilities.

Countries with powerful security agencies are spending literally billions to equip, finance, and train security and surveillance agencies around the world  —  including authoritarian regimes. This is resulting in entrenched authoritarianism, further facilitation of abuse against people, and diversion of resources from long-term development programs.