en.osm.town is one of the many independent Mastodon servers you can use to participate in the fediverse.
An independent, community of OpenStreetMap people on the Fediverse/Mastodon. Funding graciously provided by the OpenStreetMap Foundation.

Server stats:

250
active users

#SIMSwap

0 posts0 participants0 posts today
BiyteLüm<p>📵 Your phone number is your weakest link.</p><p>Hackers use SIM swap attacks to steal your number, reset your accounts, and bypass 2FA. It happens more than you think.</p><p>💡 Protect yourself:<br>✔ Remove your number from important accounts (email, banking)<br>✔ Use app-based 2FA (Aegis, YubiKey, OTP)—NEVER SMS<br>✔ Ask your carrier for a port-out PIN</p><p>📌 Your phone number shouldn’t be your identity.</p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a> <a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a></p>
The New Oil<p>Hacker pleads guilty to <a href="https://mastodon.thenewoil.org/tags/SIMswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMswap</span></a> attack on <a href="https://mastodon.thenewoil.org/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> <a href="https://mastodon.thenewoil.org/tags/SEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SEC</span></a> <a href="https://mastodon.thenewoil.org/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a> account</p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-pleads-guilty-to-sim-swap-attack-on-us-sec-x-account/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hacker-pleads-guilty-to-sim-swap-attack-on-us-sec-x-account/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/Twitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Twitter</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a></p>
BrianKrebs<p>Feds Charge Five Men in 'Scattered Spider' Roundup</p><p>Federal prosecutors in Los Angeles this week unsealed criminal charges against five men alleged to be members of a hacking group responsible for dozens of cyber intrusions at major U.S. technology companies between 2021 and 2023, including LastPass, MailChimp, Okta, T-Mobile and Twilio.</p><p>Two of the accused I've written about extensively already. Today's story looks at how several of these guys were caught. For example:</p><p>"The phishing kits used for these campaigns featured a hidden Telegram instant message bot that forwarded any submitted credentials in real-time. </p><p>In August 2022, multiple security firms gained access to the server that was receiving data from that Telegram bot, which on several occasions leaked the Telegram ID and handle of its developer, who used the nickname "Joeleoli."</p><p><a href="https://krebsonsecurity.com/2024/11/feds-charge-five-men-in-scattered-spider-roundup/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2024/11/fe</span><span class="invisible">ds-charge-five-men-in-scattered-spider-roundup/</span></a></p><p><a href="https://infosec.exchange/tags/scatteredspider" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scatteredspider</span></a> <a href="https://infosec.exchange/tags/fbi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fbi</span></a> <a href="https://infosec.exchange/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a></p>
Droppie [loma] 🐨♀🌈🐧​🦘<p>Recently my mobile phone company was subsumed into another. Today i setup my new online account portal. Upon entry i scoured it for any sign of a way to create a security Q&amp;A to prevent hacker SIM-swapping theft, but nah, nothing. So i initiated a Livechat &amp; said that's what i wanna do, &amp; voila tis now done. So in theory, from here on, any <code>Not Me Peep</code> wot impersonates me [poor deluded saps, sigh, but anyway] &amp; contacts them to sim-swap, should be unable to proceed sans first answering my nonsensical Q with its random-words complex A.</p><p>In theory. <i>Well, that is my theory, which is mine, &amp; nobody else's. Ahem. Ahhemmm hemmm hemmmmmmmmmmmm</i>.</p><p>No, the A is neither <i>Ann Elk</i>, nor <i>Brontosaurus</i>.</p><p><a href="https://loma.ml/search?tag=MobilePhone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobilePhone</span></a> <a href="https://loma.ml/search?tag=Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://loma.ml/search?tag=SIMswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMswap</span></a> <a href="https://loma.ml/search?tag=SIMswapping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMswapping</span></a></p>
ChiefGyk3D<p>Well this is disturbing, albeit not surprising. <a href="https://www.theregister.com/2024/05/07/ransomware_evolves_from_mere_extortion/?td=keepreading" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2024/05/07/ran</span><span class="invisible">somware_evolves_from_mere_extortion/?td=keepreading</span></a></p><p><a href="https://social.chiefgyk3d.com/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://social.chiefgyk3d.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.chiefgyk3d.com/tags/SimSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SimSwap</span></a></p>
Avoid the Hack! :donor:<p>T-Mobile Employees Across The Country Receive Cash Offers To Illegally Swap SIMs</p><p>I still stand by this: if <a href="https://infosec.exchange/tags/sms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sms</span></a> <a href="https://infosec.exchange/tags/mfa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mfa</span></a> wasn’t still massively used (especially by the financial sector), sim swaps would be less attractive to sim swappers.</p><p>It’s also crazy so much trust is placed in telecoms guarding your phone number and MFA factor for your bank. 🫨</p><p><a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a></p><p><a href="https://tmo.report/2024/04/t-mobile-employees-across-the-country-receive-cash-offers-to-illegally-swap-sims/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tmo.report/2024/04/t-mobile-em</span><span class="invisible">ployees-across-the-country-receive-cash-offers-to-illegally-swap-sims/</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/SIMswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMswap</span></a> hijacking <a href="https://hachyderm.io/tags/phone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phone</span></a> numbers in <a href="https://hachyderm.io/tags/eSIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eSIM</span></a> attacks<br>Russian <a href="https://hachyderm.io/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> firm <a href="https://hachyderm.io/tags/FACCT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FACCT</span></a> reports that <a href="https://hachyderm.io/tags/SIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIM</span></a> swappers in the country and worldwide have been taking advantage of this shift to eSIMs to hijack phone numbers and bypass protections to access bank accounts. Now, attackers breach a user's mobile account with stolen, brute-forced, or leaked credentials and initiate porting the victim's number to another device on their own.<br><a href="https://www.bleepingcomputer.com/news/security/sim-swappers-hijacking-phone-numbers-in-esim-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/sim-swappers-hijacking-phone-numbers-in-esim-attacks/</span></a></p>
Avoid the Hack! :donor:<p>US insurance firms sound alarm after 66,000 individuals impacted by SIM swap attack</p><p>What will it take to phase out SMS-based MFA? Even widespread implementation of TOTP (especially at financial or finance-adjacent organizations) will make SIM-swapping far less attractive…</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a> </p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/us-insurance-firms-sound-alarm-after-66-000-individuals-impacted-by-sim-swap-attack/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bitdefender.com/blog/hotforsec</span><span class="invisible">urity/us-insurance-firms-sound-alarm-after-66-000-individuals-impacted-by-sim-swap-attack/</span></a></p>
Graham Cluley<p>US insurance firms sound alarm after 66,000 individuals impacted by SIM swap attack.</p><p>Read more in my article on the Bitdefender blog: <a href="https://www.bitdefender.com/blog/hotforsecurity/us-insurance-firms-sound-alarm-after-66-000-individuals-impacted-by-sim-swap-attack/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bitdefender.com/blog/hotforsec</span><span class="invisible">urity/us-insurance-firms-sound-alarm-after-66-000-individuals-impacted-by-sim-swap-attack/</span></a></p><p><a href="https://mastodon.green/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.green/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> <a href="https://mastodon.green/tags/insurance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>insurance</span></a> <a href="https://mastodon.green/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a></p>
dispatch<p>SEC Twitter hack blamed on SIM swap attack <a href="https://www.bitdefender.com/blog/hotforsecurity/sec-twitter-hack-blamed-on-sim-swap-attack/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bitdefender.com/blog/hotforsec</span><span class="invisible">urity/sec-twitter-hack-blamed-on-sim-swap-attack/</span></a> <a href="https://ioc.exchange/tags/Guestblog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Guestblog</span></a> <a href="https://ioc.exchange/tags/Twitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Twitter</span></a> <a href="https://ioc.exchange/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a></p>
Graham Cluley<p>The SEC 'fesses up. Its Twitter account was hacked due to a SIM swap attack.</p><p>Read more in my article on the Bitdefender blog:</p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/sec-twitter-hack-blamed-on-sim-swap-attack/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bitdefender.com/blog/hotforsec</span><span class="invisible">urity/sec-twitter-hack-blamed-on-sim-swap-attack/</span></a></p><p><a href="https://mastodon.green/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.green/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a> <a href="https://mastodon.green/tags/sec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sec</span></a> <a href="https://mastodon.green/tags/twitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>twitter</span></a> <a href="https://mastodon.green/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptocurrency</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/SEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SEC</span></a> confirms X account was hacked in <a href="https://hachyderm.io/tags/SIMswapping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMswapping</span></a> attack<br>"Two days after the incident, in consultation with the SEC's telecom carrier, the SEC determined that the unauthorized party obtained control of the SEC cell phone number associated with the account in an apparent 'SIM swap' attack."<br>In a <a href="https://hachyderm.io/tags/SIMswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMswap</span></a> attack, threat actors trick a victim's wireless carrier into porting a customer's phone number to a device under the attacker's control. <a href="https://www.bleepingcomputer.com/news/security/sec-confirms-x-account-was-hacked-in-sim-swapping-attack/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/sec-confirms-x-account-was-hacked-in-sim-swapping-attack/</span></a> <a href="https://hachyderm.io/tags/Bitcoin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bitcoin</span></a> <a href="https://hachyderm.io/tags/BitcoinETF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BitcoinETF</span></a></p>
Graham Cluley<p>Twitter says, It’s not our fault the SEC’s account got hacked, and Investigation reveals SEC account did not have 2FA enabled. Wuh??</p><p><a href="https://grahamcluley.com/twitter-says-its-not-our-fault-the-secs-account-got-hacked/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">grahamcluley.com/twitter-says-</span><span class="invisible">its-not-our-fault-the-secs-account-got-hacked/</span></a></p><p><a href="https://mastodon.green/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.green/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.green/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a> <a href="https://mastodon.green/tags/twitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>twitter</span></a> <a href="https://mastodon.green/tags/sec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sec</span></a> <a href="https://mastodon.green/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptocurrency</span></a></p>
Avoid the Hack! :donor:<p><a href="https://infosec.exchange/tags/FCC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FCC</span></a> reminds mobile phone carriers they must do more to prevent SIM swaps</p><p>That's true and all, but maybe institutions and other service providers should move away from using SMS as <a href="https://infosec.exchange/tags/MFA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MFA</span></a>/#2fa... it would help to make SIM swapping less attractive in the first place.</p><p>(Not saying the telecoms are off the hook, but SMS for MFA has been subpar security practice for quite a while.)</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a></p><p><a href="https://therecord.media/fcc-sim-swapping-reminder-telecoms-consumer-protection" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/fcc-sim-swappi</span><span class="invisible">ng-reminder-telecoms-consumer-protection</span></a></p>
Avoid the Hack! :donor:<p>FCC adopts new rules to protect consumers from SIM-swapping attacks</p><p>FCC mandates wireless service providers adopt "secure methods" for authenticating a users before transferring out phone numbers.</p><p>Services (financial sector, I am looking at you) should also do their part... make SIM-swapping even less attractive by moving to TOTP <a href="https://infosec.exchange/tags/MFA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MFA</span></a> / <a href="https://infosec.exchange/tags/2fa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2fa</span></a> or supporting hardware keys / <a href="https://infosec.exchange/tags/passkeys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passkeys</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/opsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opsec</span></a> <a href="https://infosec.exchange/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/fcc-adopts-new-rules-to-protect-consumers-from-sim-swapping-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/fcc-adopts-new-rules-to-protect-consumers-from-sim-swapping-attacks/</span></a></p>
Avoid the Hack! :donor:<p>How SIM Swappers Straight-Up Rob T-Mobile Stores</p><p>From <span class="h-card" translate="no"><a href="https://mastodon.social/@404mediaco" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>404mediaco</span></a></span></p><p>Apparently this practice isn't common anymore, but these lengths goes to show how simswapping is... an issue.</p><p>My opinion is if financial institutions didn't almost solely rely on MFA/2FA via SMS, simswapping in general wouldn't continue to be such an issue. Like come on - we have passkeys now. Watch the financial institutions take a decade to adopt them. :ablobcatgoogly:</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/tmobile" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tmobile</span></a></p><p><a href="https://www.404media.co/how-hackers-straight-up-steal-t-mobile-tablets-to-sim-swap/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">404media.co/how-hackers-straig</span><span class="invisible">ht-up-steal-t-mobile-tablets-to-sim-swap/</span></a></p>
Cory Doctorow<p><a href="https://mamot.fr/tags/5yrsago" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>5yrsago</span></a> Fraudsters offers thousands to low-waged telco employees for help with <a href="https://mamot.fr/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a> scams <a href="https://www.vice.com/en/article/3ky5a5/criminals-recruit-telecom-employees-sim-swapping-port-out-scam" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">vice.com/en/article/3ky5a5/cri</span><span class="invisible">minals-recruit-telecom-employees-sim-swapping-port-out-scam</span></a></p><p><a href="https://mamot.fr/tags/5yrsago" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>5yrsago</span></a> Border <a href="https://mamot.fr/tags/FamilySeparation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FamilySeparation</span></a> isn’t “zero tolerance” – CBP looked for parents to charge so they could kidnap kids <a href="https://theintercept.com/2018/08/03/zero-tolerance-family-separations-trump-immigration-family-separation/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">theintercept.com/2018/08/03/ze</span><span class="invisible">ro-tolerance-family-separations-trump-immigration-family-separation/</span></a></p><p>7/</p>