How WWII Jeeps Were Crated for Shipping

During World War II, America cranked out some 640, 000 Jeeps produced by both Willys-Overland and Ford. Once assembled, they could be stacked for transport with the assistance of intermediary pallets: However, to get them onto ships for transport across the Atlantic and Pacific, they were broken down and crated for greater space efficiency. Look how small they were able to get these crates: Now you know why the windshields were designed to be folded down. The color photos are obviously of replicas. The giveaway is the American knock-off of the German “jerry-can” design , which would not appear until late into the war. Here’s a video that shows both original production footage from the 1940s, as well as two modern-day mechanics assembling one of the replicas: An even more impressive demonstration is below. Watch these fellows at a Jeep festival completely tear the car down— and put it back together— in under four minutes: I had a devil of a time tracking down where these replicas are produced, but it appears that they’re manufactured by Philippines-based fabrication firm MD Juan and distributed by the France-based Jeep Village company that produced the first video above.

Continue reading here:
How WWII Jeeps Were Crated for Shipping

Apple and Facebook helped bust the world’s biggest torrent site

When you’re the owner of the world’s biggest torrent-sharing site, the last thing you’d expect to land you in trouble would be a totally legitimate (and legal) purchase via iTunes. But that’s what happened to 30-year-old Ukrainian Artem Vaulin a.k.a “tirm, ” owner and operator of KickassTorrents (KAT), who was yesterday arrested and charged in Poland for criminal copyright infringement and money laundering. He’s been accused of illegally reproducing and distributing hundreds of millions of copies of movies, video games, TV shows and music albums totalling more than $1 billion. The US is now waiting to extradite him. Founded in 2008, the site has slowly grown to become the biggest torrent-sharing website in the world. It finally took the mantle in 2015 after The Pirate Bay experienced multiple raids , battled lengthy spells of downtime and its three founders were arrested . KAT counts more than 50 million unique monthly visitors and is estimated to be the 68th most frequently visited website on the internet — according to Alexa. In a 48-page criminal complaint (PDF) filed with the U.S. District Court in Chicago, the U.S. Attorney’s Office reveals how it was able to track Vaulin. Jared Der-Yeghiayan, a special agent with the US Department of Homeland Security, was tasked with tracking the man behind KAT and it’s his report that attempts to prove beyond any reasonable doubt that Vaulin should be brought to justice. This is how it played out. The fake ad From November 2015, an undercover IRS Special Agent spoke with a KAT representative about hosting an advertisement that would direct visitors to an undercover site. An agreement was made and the ad, which purportedly advertised a program to study in the United States, would be placed on individual torrent listings for $300 per day. When it finally went live on March 14th 2016, a link appeared underneath the torrent download buttons for five days. It was a short campaign, but it was enough to link KAT to a Latvian bank account, one that received €28 million ($31 million) in deposits — mainly from advertising payments — between August 2015 and March 2016. This back-and-forth also enabled investigators to identify an important point of contact: the email address pr@kat.cr . Not only was it linked to website enquiries, it was the email associated with KAT’s social media presences such as Facebook. Agents were able to obtain records from Facebook that showed the “official.KAT.fanclub.” page was almost certainly associated with KAT. Apple’s involvement Using basic website-tracking services, Der-Yeghiayan was able to uncover (via a reverse DNS search) the hosts of seven apparent KAT website domains: kickasstorrents.com, kat.cr, kickass.to, kat.ph, kastatic.com, thekat.tv and kickass.cr . This dug up two Chicago IP addresses, which were used as KAT name servers for more than four years. Agents were then able to legally gain a copy of the server’s access logs (explaining why it was federal authorities in Chicago that eventually charged Vaulin with his alleged crimes). Using similar tools, Homeland Security investigators also performed something called a WHOIS lookup on a domain that redirected people to the main KAT site. A WHOIS search can provide the name, address, email and phone number of a website registrant. In the case of kickasstorrents.biz, that was Artem Vaulin from Kharkiv, Ukraine. Der-Yeghiayan was able to link the email address found in the WHOIS lookup to an Apple email address that Vaulin purportedly used to operate KAT. It’s this Apple account that appears to tie all of pieces of Vaulin’s alleged involvement together. On July 31st 2015, records provided by Apple show that the me.com account was used to purchase something on iTunes. The logs show that the same IP address was used on the same day to access the KAT Facebook page. After KAT began accepting Bitcoin donations in 2012, $72, 767 was moved into a Coinbase account in Vaulin’s name. That Bitcoin wallet was registered with the same me.com email address. What happens now? Homeland Security has already asked that the seven KAT domains named in the complaint are forfeited for their role in facilitating piracy. Verisign is expected to seize the .com and .tv domains, while Mutual Legal Assistance Treaty (MLAT) requests will be sent to registrars in Costa Rica, Tonga and the Philippines. Homeland Security then expects those sites to be redirected to a server of its choosing. Right now, KickassTorrents appears to still be up, at least via the numerous proxy services that support it. However, it’s probably only a matter of time until it becomes a lot harder to find. While investigators already had a lot of evidence before they added the iTunes transaction to the mix, the idea that a legal media purchase could be the undoing of a piracy king kinda breaks the irony meter. Via: TechCrunch Source: Justice.gov , Criminal Complaint (PDF)

Originally posted here:
Apple and Facebook helped bust the world’s biggest torrent site

Sony Leaks Reveal Hollywood Is Trying To Break DNS

schwit1 sends this report from The Verge: Most anti-piracy tools take one of two paths: they either target the server that’s sharing the files (pulling videos off YouTube or taking down sites like The Pirate Bay) or they make it harder to find (delisting offshore sites that share infringing content). But leaked documents reveal a frightening line of attack that’s currently being considered by the MPAA: What if you simply erased any record that the site was there in the first place? To do that, the MPAA’s lawyers would target the Domain Name System that directs traffic across the internet. The tactic was first proposed as part of the Stop Online Piracy Act (SOPA) in 2011, but three years after the law failed in Congress, the MPAA has been looking for legal justification for the practice in existing law and working with ISPs like Comcast to examine how a system might work technically. If a takedown notice could blacklist a site from every available DNS provider, the URL would be effectively erased from the internet. No one’s ever tried to issue a takedown notice like that, but this latest memo suggests the MPAA is looking into it as a potentially powerful new tool in the fight against piracy. Read more of this story at Slashdot.

Continue Reading:
Sony Leaks Reveal Hollywood Is Trying To Break DNS

FCC Proposes $48,000 Fine To Man Jamming Cellphones On Florida Interstate

New submitter freddieb writes: “An individual who had been jamming cellphone traffic on interstate 4 in Florida was located by FCC agents with the assistance of Hillsborough County Sheriff’s Deputies. The individual had reportedly been jamming cellphone traffic on I-4 for two years. The FCC is now proposing a $48, 000 fine for his actions. They say the jamming ‘could and may have had disastrous consequences by precluding the use of cell phones to reach life-saving 9-1-1 services provided by police, ambulance, and fire departments.'” Read more of this story at Slashdot.

More here:
FCC Proposes $48,000 Fine To Man Jamming Cellphones On Florida Interstate

The Performance Benefits of Discrete Video Cards (Even for Non-Gamers)

If you’re a PC gamer, you know that upgrading your computer’s video card will give you the best gaming performance boost . PCWorld argues, however, that a discrete graphics card belongs in most people’s desktop PCs—not just gamers. Read more…

View original post here:
The Performance Benefits of Discrete Video Cards (Even for Non-Gamers)

How Medical Nanotech Will Change Humanity Forever

Futurists have long speculated that nanotechnology — the engineering of materials and devices at the molecular scale — will revolutionize virtually every field it touches, medicine being no exception. Here’s what to expect when you have fleets of molecule-sized robots coursing through your veins. Read more…        

Continue Reading:
How Medical Nanotech Will Change Humanity Forever

China Behind 96% of All Cyber-Espionage Data Breaches, Verizon Report Claims

colinneagle writes “Verizon’s 2013 Data Breach Investigation Report is out and includes data gathered by its own forensics team and data breach info from 19 partner organizations worldwide. China was involved in 96% of all espionage data-breach incidents, most often targeting manufacturing, professional and transportation industries, the report claims. The assets China targeted within those industries included laptop/desktop, file server, mail server and directory server, in order to steal credentials, internal organization data, trade secrets and system info. A whopping 95% of the attacks started with phishing to get a toehold into their victim’s systems. The report states, ‘Phishing techniques have become much more sophisticated, often targeting specific individuals (spear phishing) and using tactics that are harder for IT to control. For example, now that people are suspicious of email, phishers are using phone calls and social networking.’ It is unknown who the nation-state actors were in the other 4% of breaches, which the report says ‘may mean that other threat groups perform their activities with greater stealth and subterfuge. But it could also mean that China is, in fact, the most active source of national and industrial espionage in the world today.'” The report also notes that financially-motivated incidents primarily came from the U.S. and various Eastern European countries. Read more of this story at Slashdot.

Read the article:
China Behind 96% of All Cyber-Espionage Data Breaches, Verizon Report Claims