FBI seizes 20 boxes of documents on LAUSD iPad program

On Monday morning, the FBI seized 20 boxes of documents pertaining to a $1.3 billion iPad program from the Los Angeles Unified School District (LAUSD), according to the Los Angeles Times . The program, which was intended to give iPads to every student, teacher, and campus administrator of the nation’s second-largest school district, has met with many catastrophic difficulties, and this latest federal investigation led the new superintendent of the school system to shelve the project indefinitely on Tuesday. The program first hit a bump in the road back in 2013 when a number of students “hacked” the iPads —which is to say they deleted profile information that designated the user as a student, thus letting the student browse the Internet unencumbered by the filter restrictions enforced by the school district. At the same time, many teachers reported that they felt ill-equipped to use and teach with the iPads. In October, the LAUSD Superintendent John Deasy resigned amid allegations of malfeasance , although he claimed no wrongdoing. Deasy drew attention after the disclosure of his ties to Apple and curriculum-provider Pearson. On Tuesday, Deasy told the Los Angeles Times that he had had no contact with the FBI, nor did he know what the investigation was about. Ars contacted the FBI for more details about the investigation, but a spokesperson said she could not comment. Read 2 remaining paragraphs | Comments

Read More:
FBI seizes 20 boxes of documents on LAUSD iPad program

Feds want Apple’s help to defeat encrypted phones, new legal case shows

OAKLAND, CA—Newly discovered court documents from two federal criminal cases in New York and California that remain otherwise sealed suggest that the Department of Justice (DOJ) is pursuing an unusual legal strategy to compel cellphone makers to assist investigations. In both cases, the seized phones—one of which is an iPhone 5S—are encrypted and cannot be cracked by federal authorities. Prosecutors have now invoked the All Writs Act , an 18th-century federal law that simply allows courts to issue a writ, or order, which compels a person or company to do something. Some legal experts are concerned that these rarely made public examples of the lengths the government is willing to go in defeating encrypted phones raise new questions as to how far the government can compel a private company to aid a criminal investigation. Read 29 remaining paragraphs | Comments

Continue Reading:
Feds want Apple’s help to defeat encrypted phones, new legal case shows

Google Glass isn’t dead; Intel-powered hardware reportedly due in 2015

It’s been easy to believe Google Glass is dead given all the problems that have popped up lately. The device was introduced to the world more than two years ago, but it never came close to the original concept . The project’s founder left Google to work at Amazon, and monthly updates from Google have slowed from important feature releases to sometimes single-sentence changelogs . App developers are giving up on the platform, and Twitter recently pulled support for its Glass app. The official forums , once a bustling hive of optimism, now mostly discuss  declining usage  or low morale among remaining Glass users. And unless something happens in the next 30 days, Google will miss its original plans for a consumer release. Glass is not dead, though. A report from The Wall Street Journal   claims that a new version of Google Glass is on the way, and unlike the  minor revision  that Google released last year, it has totally overhauled internals. According to the report, Glass will switch from its dead Texas Instruments SoC to a processor built by Intel and will get a full hardware refresh. Google Glass has had a rough life thanks to its choice of SoC. The original unit (and the revision) used a Texas Instruments chip, but shortly after the launch of Glass, TI quit the smartphone business and ended support for many of its products. That was a big problem for Glass since, as early as this year, the device was still based on Android 4.0—an OS originally released in 2011. Glass was missing out on some big wearable-specific enhancements in later versions of Android like notification APIs, Bluetooth LE, and lower memory usage. Read 4 remaining paragraphs | Comments

Original post:
Google Glass isn’t dead; Intel-powered hardware reportedly due in 2015

New battery composed of lots of nanobatteries

Shalini Saxena We’re increasingly dependent upon our batteries, so finding ways of building ones with enhanced lifetimes would make a lot of people happy. Research on batteries has ranged from trying new materials to changing the configuration of key components. Now, researchers have managed to restructure the materials in a nano-battery, then bundle lots of these individual batteries into a larger device. Batteries rely on two electrodes to create separate currents of electrons and ions, generating electricity. Nanostructured electrodes have useful properties, such as large surface area and short ion transport time, which enables a high storage capacity and enhanced lifetimes—these batteries hold charge longer and can undergo more charge-discharge cycles. 3-D connectivity and organization of nanostructured electrodes could further improve these devices. Previously, researchers had developed 3-D nanostructured batteries by placing two electrodes within a nanopore (made of anodic aluminum oxide) and using ultrathin electrical insulating material to separate them. While this system had improved power and energy density, use of such thin electrical insulators limits charge retention and requires complex circuits to shift current between them—it’s difficult to retain the benefits of the 3-D nano-architecture due to spatial constraints of the material. Read 6 remaining paragraphs | Comments

Excerpt from:
New battery composed of lots of nanobatteries

Here’s how to run homebrew on your 3DS

A video showing off Smealum’s Ninjhax homebrew exploit in action. Earlier this week, hacker Jordan “Smealum” Rabet announced that obscure 2011 3DS platformer Cubic Ninja held the key to unlocking the 3DS hardware to run homebrew code, causing an immediate run on the hard-to-find game . Now, Smealum has published the details of his hack , along with the instructions and tools needed to unlock the system. What Smealum is calling “Ninjhax” exploits an error in Cubic Ninja ‘s level creation and sharing function, which passes created level data via generated QR codes. Scanning a specifically manufactured QR code, generated by a tool on Smealum’s site to match any current 3DS hardware/firmware combination, causes the game to run a boot file loaded on the SD card. At that point, the bootloader downloads additional code over Wi-Fi and installs and runs a front-end channel that can run other homebrew software stored on the SD card. After that initial QR code scan, the homebrew menu can be loaded simply by accessing the save game file through Cubic Ninja . Read 3 remaining paragraphs | Comments

More here:
Here’s how to run homebrew on your 3DS

Local judge unseals hundreds of highly secret cell tracking court records

Scott A judge in Charlotte, North Carolina, has unsealed a set of 529 court documents in hundreds of criminal cases detailing the use of a stingray, or cell-site simulator, by local police. This move, which took place earlier this week, marks a rare example of a court opening up a vast trove of applications made by police to a judge, who authorized each use of the powerful and potentially invasive device. According to the Charlotte Observer , the records seem to suggest that judges likely did not fully understand what they were authorizing. Law enforcement agencies nationwide have taken extraordinary steps to preserve stingray secrecy. As recently as this week, prosecutors in a Baltimore robbery case dropped key evidence that stemmed from stingray use rather than fully disclose how the device was used. The newspaper also reported on Friday that the Mecklenburg County District Attorney’s office, which astonishingly had also never previously seen the applications filed by the Charlotte-Mecklenburg Police Department (CMPD), will now review them and determine which records also need to be shared with defense attorneys. Criminals could potentially file new claims challenging their convictions on the grounds that not all evidence was disclosed to them at the time. Read 13 remaining paragraphs | Comments

Follow this link:
Local judge unseals hundreds of highly secret cell tracking court records

Gorilla Glass 4 promises to save your phone from street drops

This video screencap comes after a Gorilla Glass 4 device fell for a full meter and landed directly onto a sandpaper-coated surface. Look: no breakage, no shattering. Corning On Thursday, Corning Incorporated, the creators of Gorilla Glass, unveiled the fourth generation of its thin, durable glass technology for use in smartphones, tablets, and other mobile electronics. Gorilla Glass 4 is already being advertised as “up to two times stronger” than any “competitive” mobile screen, with a specific focus on surviving everyday drops in the real world. Corning confirmed to Ars Technica that the upgraded glass will reach consumer devices “this quarter.” Global marketing director David Velasquez was unwilling to reveal “what we did to the glass to make it better,” but he talked at length about one major change to the company’s lab testing: a single sheet of sandpaper. After analyzing “thousands upon thousands” of screens broken in the real world, Corning confirmed that a major contributor to common breakage was dropping a phone on “rough surfaces like asphalt and concrete.” That might seem like a head-smackingly obvious issue, but Velasquez insists that the smartphone glass-making industry, which hasn’t even existed for a full decade, has “no standard” for such testing. Most drop tests employ surfaces like stainless steel or granite, which replicate surfaces in a home. “The best way to approximate what asphalt does [to a phone screen] is 180-grit sandpaper,” Velasquez said. That can more consistently reproduce the microscopic breakage of a rough surface than even a giant sheet of asphalt (which, Corning learned after a few tests, actually smooths out at a point of contact after a few drops). Read 2 remaining paragraphs | Comments

More:
Gorilla Glass 4 promises to save your phone from street drops

Lync rebranded as “Skype for Business” in 2015 release

Microsoft’s Lync communications server is to be rebranded. The next version, due to be released next year, will be named instead Skype for Business . It will retain Lync’s infrastructure—the ability to use on-premises servers, optional federation with external communications networks, and so on and so forth—but the branding and client design will closely match those of Microsoft’s consumer communication platform. The Skype and Lync development teams have been working together since shortly after Microsoft bought the popular Skype platform for $8.5 billion in 2011. Skype for Business will further improve interoperability with regular Skype. While voice and instant messaging are already interoperable between Lync and Skype, the next version will add video messaging and access to the Skype user directory. This will mean that, should administrators choose to enable it, the Skype for Business client software will serve as a fairly fully featured Skype client, too. Read 1 remaining paragraphs | Comments

See original article:
Lync rebranded as “Skype for Business” in 2015 release

“DarkHotel” uses bogus crypto certificates to snare Wi-Fi-connected execs

DeviantArt user: Tincho555 Researchers have uncovered a seven-year-old malware operation that combines advanced cryptographic attacks, zero-day exploits, and well-developed keyloggers to target elite executives staying in luxury hotels during business trips. The attackers behind “DarkHotel,” as the advanced persistent threat has been dubbed, appear to know in advance when a targeted exec will check in and check out of a hotel. Victims are infected through a variety of methods, including bogus software updates for Adobe Flash, Google Toolbar, or other trusted software that are presented when the exec uses the hotel’s Wi-Fi or wired Internet access. In many cases, the attack code is signed with a trusted digital certificate that the attackers were able to clone by factoring the underlying 512-bit private key. While factoring weak 512-bit keys has been practical for several years, the crypto attack nonetheless is an “advanced” capability, particularly a few years ago. Taken together, the characteristics are an indication the operators have some sophistication, said researchers from Kaspersky Lab, the Russia-based security firm that disclosed the campaign. “The fact that most of the time the victims are top executives indicates the attackers have knowledge of their victims whereabouts, including name and place of stay,” the researchers wrote in a report published Monday . “This paints a dark, dangerous web in which unsuspecting travelers can easily fall. While the exact reason why some hotels function as an attacker vector are unknown, certain suspicions exist, indicating possibly a much larger compromise. We are still investigating this aspect of the operation and will publish more information in the future.” Read 6 remaining paragraphs | Comments

See the original article here:
“DarkHotel” uses bogus crypto certificates to snare Wi-Fi-connected execs

37,000-year-old Russian skeleton has Neanderthal DNA that’s gone missing

Stew Dean Another week, another ancient human genome. We just recently covered the oldest modern human genome yet described . Now, another paper takes a look at the DNA from a different modern human genome and comes to similar conclusions: interbreeding with Neanderthals was already deep in the past as of 37,000 years ago. But researchers were able to find stretches of the Neanderthal genome that are no longer present in any modern human populations that we’ve sampled. The skeleton in this case comes from the European area of Russia; it was found at a site called Kostenki-Borshchevo north of the Black Sea. The team behind the new paper (which does not include Svante Pääbo, who has pioneered ancient genomics) was only able to get a rough draft of the individual’s genome, on average sequencing every base 2.4 times. Thus, the sequence is likely to include a large number of errors and gaps. These make the conclusions a bit more tenuous than previous work but shouldn’t bias them in any particular direction. One thing the results make clear is that humanity’s migration out of Africa was complicated. K-14, as the skeleton is called, shares very few of the DNA differences that are associated with East Asian populations, as has been the case with the Siberian modern human skeletons we’ve looked at. All of which suggests that East Asians and Eurasians split off early and may even have engaged in separate migrations out of Africa or the Middle East. K-14 also lacks common variants found in Native Americans, leaving a single Siberian skeleton as the only one that has an affinity to them. Read 8 remaining paragraphs | Comments

Read More:
37,000-year-old Russian skeleton has Neanderthal DNA that’s gone missing