Anna Kendrick, Brooke Burns, Kelli Garner Hacked?

Anna Kendrick, Brooke Burns, Kelli Garner Hacked?
Jennifer Lawrence seen at the Hunger Games: Mockingjay - Part 1 party at the 67th international film festival, Cannes, southern France, Saturday, May 17, 2014. Arthur Mola/Invision/AP
Jack Phillips
Updated:

More alleged nude photos of Jennifer Lawrence have apparently leaked online via The Fappening subreddits.

Cara Delevingne and Anna Kendrick also may have been victimized in the hack. According to reports, the photos of Kendrick show her clothed but the outfits are revealing. There’s a few dozen photos of Lawrence.

On Friday, download links appeared on 4chan and Reddit.

Misty May-Treanor, an Olympic gold medalist, and soap opera actress Alexandra Chando were also allegedly part of the leak, the Daily Beast reported. 

Actresses Misty May-Treanor, Kelli Garner, Lauren O'Neil, and Briana Evigan were also named.

None of the stars have issued statements about the matter yet, and it’s unclear if the photos are actually of them.

During the first wave of photos, Kendrick responded. “Don’t worry bro, it would just be photos of food and other people’s dogs anyway,” she wrote on Twitter Sept. 1.

Story is developing...

---

THE ASSOCIATED PRESS Update:

FBI chief: Apple, Google phone encryption perilous 

WASHINGTON (AP) — The FBI director on Thursday criticized the decision by Apple and Google to encrypt smartphones data so it can be inaccessible to law enforcement, even with a court order.

James Comey told reporters at FBI headquarters that U.S. officials are in talks with the two companies, which he accused of marketing products that would let people put themselves beyond the law’s reach.

Comey cited child-kidnapping and terrorism cases as two examples of situations where quick access by authorities to information on cellphones can save lives. Comey did not cite specific past cases that would have been more difficult for the FBI to investigate under the new policies, which only involve physical access to a suspect’s or victim’s phone when the owner is unable or unwilling to unlock it for authorities.

“What concerns me about this is companies marketing something expressly to allow people to hold themselves beyond the law,” Comey said. At another point, he said he feared a moment when “when people with tears in their eyes look at me and say, ‘What do you mean you can’t?’”

Comey said he was gathering more information about the issue and would have more to say about it later.

An FBI spokesman Thursday was not able to immediately amplify Comey’s remarks.

Both Apple and Google announced last week that their new operating systems will be encrypted, or rendered in code, by default. Law enforcement officials could still intercept conversations but might not be able to access call data, contacts, photos and email stored on the phone.

Even under the new policies, law enforcement could still access a person’s cellphone data that has been backed up to the companies’ online-storage services. They could also still retrieve real-time phone records and logs of text messages to see whom a suspect was calling or texting, and they could still obtain wiretaps to eavesdrop on all calls made with the phones.

Apple, in an explanation of its new policy, says on its website that on devices running its new operating system, “your personal data such as photos, messages (including attachments), email, contacts, call history, iTunes content, notes and reminders is placed under the protection of your passcode. Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data. So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession.”

Comey’s criticism closely tracked complaints earlier this week by Ronald T. Hosko, a former FBI assistant criminal division director who wrote in The Washington Post that Google’s and Apple’s policies would have resulted in the death of a hostage in a recent North Carolina kidnapping.

The newspaper subsequently corrected Hosko’s claims after concluding that the new encryption systems would not have hindered the FBI’s rescue of the kidnap victim in Wake Forest, North Carolina. In that case, the FBIpulled telephone records associated with the number used to contact the victim’s family for the ransom demand, retrieved other connected toll records and eventually obtained a traditional wiretap to eavesdrop on the kidnappers’ conversations and locate and rescue the victim.

The only telephone physically seized in the North Carolina case belonged to a woman accused in the plot, after the hostage was already rescued. Authorities had tried to seize the cellphone from one of the alleged plotters, Kevin Melton, but he smashed it to pieces inside his prison cell on April 9, roughly four hours before the FBIrescued the victim in an Atlanta apartment.

Commenting on Comey’s remarks Thursday, Matt Blaze, a computer security researcher and professor at the University of Pennsylvania, said, “It’s disappointing that the FBI has chosen to focus on examples where encryption might potentially slow hypothetical investigations, while ignoring the fact that strong, reliable encryption is the only way we have to prevent a wide range of very real and very serious crimes.”

“We rely on smartphones to manage and protect more and more aspects of our business, personal and financial lives,” Blaze added.

A spokeswoman for Apple and spokesman for Google did not immediately return phone messages from The Associated Press. Google previously said in a statement that its Android phones have offered encryption for three years, but it was being turned on by default in the next release of its operating system.

 

Jack Phillips
Jack Phillips
Breaking News Reporter
Jack Phillips is a breaking news reporter with 15 years experience who started as a local New York City reporter. Having joined The Epoch Times' news team in 2009, Jack was born and raised near Modesto in California's Central Valley. Follow him on X: https://twitter.com/jackphillips5
twitter