Meet the men who spy on women through their webcams

Aurich Lawson / Thinkstock “See! That shit keeps popping up on my fucking computer!” says a blond woman as she leans back on a couch, bottle-feeding a baby on her lap. The woman is visible from thousands of miles away on a hacker’s computer. The hacker has infected her machine with a remote administration tool (RAT) that gives him access to the woman’s screen, to her webcam, to her files, to her microphone. He watches her and the baby through a small control window open on his Windows PC, then he decides to have a little fun. He enters a series of shock and pornographic websites and watches them appear on the woman’s computer. The woman is startled. “Did it scare you?” she asks someone off camera. A young man steps into the webcam frame. “Yes,” he says. Both stare at the computer in horrified fascination. A picture of old naked men appears in their Web browser, then vanishes as a McAfee security product blocks a “dangerous site.” Read 65 remaining paragraphs | Comments

More:
Meet the men who spy on women through their webcams

Gorgeous Photography of The Elements

Bismuth (Image: fluor_doublet/R. Tanaka/Flickr ) We all know the periodic table of the elements from high school chemistry, but have you ever wondered what the actual chemical elements look like? Japanese chemist and photographer R. Tanaka is on a mission to photograph the world’s most photogenic elements and we dare say he succeeded with flying colors. Check out his website and Flickr page to see more wonderful images of the elements. Osmium Palladium Monoclinic sulfur Oxidized arsenic Gold crystal Lead Platinum Ruthenium Tellurium Oxidized vanadium View more over at R. Tanaka’s Flickr set: The Elements – via Visual News

See more here:
Gorgeous Photography of The Elements

Which Encryption Apps Are Strong Enough to Help You Take Down a Government?

It seems like these days I can’t eat breakfast without reading about some new encryption app that will (supposedly) revolutionize our communications — while making tyrannical regimes fall like cheap confetti. More »

More:
Which Encryption Apps Are Strong Enough to Help You Take Down a Government?

Investigating leaks, Harvard secretly searched deans’ email accounts

The Boston Globe today broke the news that administrators at Harvard University secretly searched the e-mail accounts of 16 resident deans last fall, in an attempt to determine the source of “a leak to the media about the school’s sprawling cheating case.” [The Boston Globe]

Continue reading here:
Investigating leaks, Harvard secretly searched deans’ email accounts

US Ninth Circuit says forensic laptop searches at the border without suspicion are unconstitional

An en banc (all the judges together) decision from the 9th Circuit has affirmed that you have the right to expect that your laptop and other devices will not be forensically examined without suspicion at the US border. It’s the first time that a US court has upheld electronic privacy rights at the border, and the court also said that using an encrypted device that can’t be casually searched is not grounds for suspicion. The judges also note that the prevalence of cloud computing means that searching at the border gives cops access to servers located all over the world. At TechDirt, Mike Masnick has some great analysis of this welcome turn of events: The ruling is pretty careful to strike the right balance on the issues. It notes that a cursory review at the border is reasonable: Officer Alvarado turned on the devices and opened and viewed image files while the Cottermans waited to enter the country. It was, in principle, akin to the search in Seljan, where we concluded that a suspicionless cursory scan of a package in international transit was not unreasonable. But going deeper raises more questions. Looking stuff over, no problem. Performing a forensic analysis? That goes too far and triggers the 4th Amendment. They note that the location of the search is meaningless to this analysis (the actual search happened 170 miles inside the country after the laptop was sent by border agents to somewhere else for analysis). So it’s still a border search, but that border search requires a 4th Amendment analysis, according to the court. It is the comprehensive and intrusive nature of a forensic examination—not the location of the examination—that is the key factor triggering the requirement of reasonable suspicion here…. Notwithstanding a traveler’s diminished expectation of privacy at the border, the search is still measured against the Fourth Amendment’s reasonableness requirement, which considers the nature and scope of the search. Significantly, the Supreme Court has recognized that the “dignity and privacy interests of the person being searched” at the border will on occasion demand “some level of suspicion in the case of highly intrusive searches of the person.” Flores-Montano, 541 U.S. at 152. Likewise, the Court has explained that “some searches of property are so destructive,” “particularly offensive,” or overly intrusive in the manner in which they are carried out as to require particularized suspicion. Id. at 152, 154 n.2, 155–56; Montoya de Hernandez, 473 U.S. at 541. The Court has never defined the precise dimensions of a reasonable border search, instead pointing to the necessity of a case-by-case analysis…. The court is led by Chief Judge Alex Kozinski, who is a fan of my book Little Brother (which features a scene where DHS officials force a suspect to decrypt his devices, on the grounds that his encryption itself is suspicious), and was kind enough to write me a blurb for the new edition of the book. I’m not saying that Little Brother inspired Kozinski to issue this decision, but I’m delighted to discover that something I’ve been pushing through fiction since 2008 has made it into law in 2013. 9th Circuit Appeals Court: 4th Amendment Applies At The Border; Also: Password Protected Files Shouldn’t Arouse Suspicion

View the original here:
US Ninth Circuit says forensic laptop searches at the border without suspicion are unconstitional

Netflix changes its public API program by ending it, will no longer issue new dev keys

Once upon a time, Netflix was proud enough of its public API which enabled third-party services and apps to serve up its data and content in different ways that it opened a gallery to display them. Unfortunately, times have changed since 2009 — the old App Gallery is gone and now, so is public API access for new developers. A blog post indicates the API is now focused on supporting Netflix’s official clients on the many devices its customers use to stream movies, not hobbyist projects for managing ones queue or finding new movies to watch. While those already in place should still work since existing keys will remain active, the developer forums are being set to read-only, no new keys are being issued and new partners are no longer being accepted. The move is reminiscent of recent changes by Twitter , where as each company has grown it’s decided having control over the user experience through its own official apps outweighs allowing the community to build and extend access as it sees fit. We’re sad to see the program go, as many of these tools assisted Netflix members in ways the official website and apps either never did, or no longer do after the features were removed . Even though Netflix relies on its own secret sauce for recommendations, we’ve always found it hard to beat InstantWatcher’s curated lists (by year, Rotten Tomatoes rating, critic’s picks, titles most recently added by other users and more) to find a video, and FeedFliks was indispensable for monitoring exactly how valuable the service is until its features were cut down by API changes. They provided an edge the competition like Amazon Prime and Redbox couldn’t match, but we’ll have to wait and see if this change is noticed by enough subscribers to matter — we’ve seen how that can go . Filed under: Home Entertainment , HD Comments Via: TechCrunch Source: Netflix Developer Blog

Read More:
Netflix changes its public API program by ending it, will no longer issue new dev keys

Court: 4th Amendment Applies At Border, Password Protected Files Not Suspiscious

An anonymous reader sends this Techdirt report on a welcome ruling from the 9th Circuit Court of Appeals: “”Here’s a surprise ruling. For many years we’ve written about how troubling it is that Homeland Security agents are able to search the contents of electronic devices, such as computers and phones at the border, without any reason. The 4th Amendment only allows reasonable searches, usually with a warrant. But the general argument has long been that, when you’re at the border, you’re not in the country and the 4th Amendment doesn’t apply. This rule has been stretched at times, including the ability to take your computer and devices into the country and search it there, while still considering it a “border search,” for which the lower standards apply. Just about a month ago, we noted that Homeland Security saw no reason to change this policy. Well, now they might have to. In a somewhat surprising 9th Circuit ruling (en banc, or in front of the entire set of judges), the court ruled that the 4th Amendment does apply at the border, that agents do need to recognize there’s an expectation of privacy, and cannot do a search without reason. Furthermore, they noted that merely encrypting a file with a password is not enough to trigger suspicion.” Read more of this story at Slashdot.

Taken from:
Court: 4th Amendment Applies At Border, Password Protected Files Not Suspiscious