Feds gather phone data from the sky with aircraft-mimicking cell towers

Aleksander Markin On Thursday afternoon, the Wall Street Journal published a report saying that the US Marshals Service (USMS) was using small, fixed-wing Cessnas equipped with so-called “dirtboxes”—receivers that act like cellphone towers—to gather data from citizens’ phones below. The purpose of such collection is to target and spy on criminal suspects, but the data from any citizen’s phone is collected by such devices. Sources told the WSJ that USMS operated these planes from five major airports in the US and that the program had a flying range “covering most of the US population.” The devices on the planes can capture unique identifying information from “tens of thousands” of cellphones on the ground. Using that information, federal authorities can pinpoint a cellphone user’s location from “within three meters or within a specific room in a building,” the WSJ said. Individuals with knowledge of the matter told the news outlet that the plane flyovers were targeted at “fugitives and criminals” and that non-target phone data is “let go” as it is gathered. The dirtboxes are described as higher-grade Stingrays, which police use  on the ground to collect International Mobile Subscriber Numbers (IMSI). Read 8 remaining paragraphs | Comments

Continued here:
Feds gather phone data from the sky with aircraft-mimicking cell towers

Lync rebranded as “Skype for Business” in 2015 release

Microsoft’s Lync communications server is to be rebranded. The next version, due to be released next year, will be named instead Skype for Business . It will retain Lync’s infrastructure—the ability to use on-premises servers, optional federation with external communications networks, and so on and so forth—but the branding and client design will closely match those of Microsoft’s consumer communication platform. The Skype and Lync development teams have been working together since shortly after Microsoft bought the popular Skype platform for $8.5 billion in 2011. Skype for Business will further improve interoperability with regular Skype. While voice and instant messaging are already interoperable between Lync and Skype, the next version will add video messaging and access to the Skype user directory. This will mean that, should administrators choose to enable it, the Skype for Business client software will serve as a fairly fully featured Skype client, too. Read 1 remaining paragraphs | Comments

See original article:
Lync rebranded as “Skype for Business” in 2015 release

“DarkHotel” uses bogus crypto certificates to snare Wi-Fi-connected execs

DeviantArt user: Tincho555 Researchers have uncovered a seven-year-old malware operation that combines advanced cryptographic attacks, zero-day exploits, and well-developed keyloggers to target elite executives staying in luxury hotels during business trips. The attackers behind “DarkHotel,” as the advanced persistent threat has been dubbed, appear to know in advance when a targeted exec will check in and check out of a hotel. Victims are infected through a variety of methods, including bogus software updates for Adobe Flash, Google Toolbar, or other trusted software that are presented when the exec uses the hotel’s Wi-Fi or wired Internet access. In many cases, the attack code is signed with a trusted digital certificate that the attackers were able to clone by factoring the underlying 512-bit private key. While factoring weak 512-bit keys has been practical for several years, the crypto attack nonetheless is an “advanced” capability, particularly a few years ago. Taken together, the characteristics are an indication the operators have some sophistication, said researchers from Kaspersky Lab, the Russia-based security firm that disclosed the campaign. “The fact that most of the time the victims are top executives indicates the attackers have knowledge of their victims whereabouts, including name and place of stay,” the researchers wrote in a report published Monday . “This paints a dark, dangerous web in which unsuspecting travelers can easily fall. While the exact reason why some hotels function as an attacker vector are unknown, certain suspicions exist, indicating possibly a much larger compromise. We are still investigating this aspect of the operation and will publish more information in the future.” Read 6 remaining paragraphs | Comments

See the original article here:
“DarkHotel” uses bogus crypto certificates to snare Wi-Fi-connected execs

All US Postal Service employees’ personal data exposed by hackers

Barbara Krawcowicz All United States Postal Service (USPS) employees’ personal data—including names, addresses, social security numbers—has been exposed as the result of a hack believed to have originated from China. According to its own tally, USPS employs over 600,000 people. “We began investigating this incident as soon as we learned of it, and we are cooperating with the investigation, which is ongoing,” David Partenheimer, a USPS spokesman, wrote in a statement (PDF) on Monday. “The investigation is being led by the Federal Bureau of Investigation and joined by other federal and postal investigatory agencies. The intrusion is limited in scope and all operations of the Postal Service are functioning normally.” The USPS does not believe that in-store customer data was exposed, but customers who contacted the agency via e-mail or phone between January 1 and August 16, 2014 may have been. Read 4 remaining paragraphs | Comments

Continue reading here:
All US Postal Service employees’ personal data exposed by hackers

WTF, Russia’s domestic Internet traffic mysteriously passes through Chinese routers

Dyn Research Domestic Internet traffic traveling inside the borders of Russia has repeatedly been rerouted outside of the country under an unexplained series of events that degrades performance and could compromise the security of Russian communications. The finding, reported Thursday in a blog post published by Internet monitoring service Renesys , underscores the fragility of the border gateway protocol (BGP), which forms the underpinning of the Internet’s global routing system. In this case, domestic Russian traffic was repeatedly routed to routers operated by China Telecom, a firm with close ties to that county’s government. When huge amounts of traffic are diverted to far-away regions before ultimately reaching their final destination, it increases the chances hackers with the ability to monitor the connections have monitored or even altered some of the communications. A similar concern emerged last year, when Renesys found big chunks of traffic belonging to US banks, government agencies, and network service providers had been improperly routed through Belarusian or Icelandic service providers . The hijacking of Russian traffic is linked to last year’s peering agreement between Russian mobile provider Vimpelcom and China Telecom. The pact allowed the firms to save money by having some of their traffic carried over the other’s network rather than through a more expensive transit operator. On multiple occasions since then, according to Renesys, communications destined for Russia has followed extremely round-about routes that take the traffic into China before sending it on to its final stop. Doug Madory, director of internet analysis in Renesys research arm Dyn wrote: Read 2 remaining paragraphs | Comments

Follow this link:
WTF, Russia’s domestic Internet traffic mysteriously passes through Chinese routers

NYPD officers charged after video catches teen getting pistol whipped

“The video speaks for itself, doesn’t it?” Brooklyn District Attorney Kenneth Thompson said Wednesday about a brief video recording that led to two New York Police Department cops being charged in connection to the pistol-whipping assault of a 16-year-old Brooklyn boy. The boy, who was arrested for marijuana possession, ended up with broken teeth and bruises. The officers charged in Brooklyn Supreme Court on Wednesday are David Afanador, 33, and Tyrane Isaac, 36, both nine-year veterans. The 82-second video of the teen’s August 29 beating—widely available on the Internet—was captured by a local Crown Heights business. The tape shows the boy running before eventually stopping and raising his hands, after which he is pummeled and taken to the ground. Read 6 remaining paragraphs | Comments

Originally posted here:
NYPD officers charged after video catches teen getting pistol whipped

37,000-year-old Russian skeleton has Neanderthal DNA that’s gone missing

Stew Dean Another week, another ancient human genome. We just recently covered the oldest modern human genome yet described . Now, another paper takes a look at the DNA from a different modern human genome and comes to similar conclusions: interbreeding with Neanderthals was already deep in the past as of 37,000 years ago. But researchers were able to find stretches of the Neanderthal genome that are no longer present in any modern human populations that we’ve sampled. The skeleton in this case comes from the European area of Russia; it was found at a site called Kostenki-Borshchevo north of the Black Sea. The team behind the new paper (which does not include Svante Pääbo, who has pioneered ancient genomics) was only able to get a rough draft of the individual’s genome, on average sequencing every base 2.4 times. Thus, the sequence is likely to include a large number of errors and gaps. These make the conclusions a bit more tenuous than previous work but shouldn’t bias them in any particular direction. One thing the results make clear is that humanity’s migration out of Africa was complicated. K-14, as the skeleton is called, shares very few of the DNA differences that are associated with East Asian populations, as has been the case with the Siberian modern human skeletons we’ve looked at. All of which suggests that East Asians and Eurasians split off early and may even have engaged in separate migrations out of Africa or the Middle East. K-14 also lacks common variants found in Native Americans, leaving a single Siberian skeleton as the only one that has an affinity to them. Read 8 remaining paragraphs | Comments

Read More:
37,000-year-old Russian skeleton has Neanderthal DNA that’s gone missing

Comcast to issue discounts for days-long outage caused by bad update

Even this DSL-loving turtle thought Comcast’s service was too slow this week. Comcast Comcast attempted to update its X1 cable platform this week, but it ended up causing a lengthy outage for many customers. The company apologized yesterday and promised to issue credits to compensate customers for the time they weren’t able to use their TV service. Customer reports suggest that Internet service went down as well. “We know some of our customers may have missed their favorite shows off and on over the past few days and were unable to easily reach our customer care representatives for assistance… and we’re really sorry,” Comcast Senior VP Charlie Herrin wrote . Herrin’s new job is fixing Comcast’s disappointing customer service. His announcement yesterday, titled, “Our mistake: making it right for customers,” continues: In the process of upgrading the X1 platform with new services and features, a technical issue arose that caused problems for our customers. We’re working now to identify the customers who were impacted to personally apologize and proactively give them credits which we plan to have out to them within the next two weeks. This issue was our fault and we want to make it right. So what happened? While we were deploying an upgrade to the X1 platform, we discovered an issue in the way the software that updates X1 was configured. We immediately stopped the deployment, and our engineers began working to identify the root cause and fix the issue. While service has returned to normal for most X1 customers, our engineers are now going back over this issue and taking extra steps to prevent it from happening again. The fix we’ve put in place should be automatic—customers don’t need to do anything (such as rebooting or unplugging the box). Thanks to our customers who have been patient with us, and to our employees who have been working around the clock on this. Outages were reported  in Philadelphia, Chicago, New York, and other cities. According to customer reports at DownDetector.com, more customers experienced Internet outages than TV outages, with 10 percent reporting a “total blackout.” We’ve asked Comcast whether the faulty update also caused Internet outages but haven’t received an answer yet. Read 2 remaining paragraphs | Comments

View article:
Comcast to issue discounts for days-long outage caused by bad update

GM’s next-gen infotainment system to run Android—not Android Auto—in 2016

The 2015 Cadillac ATS coupe with integrated LTE. It’s basically a big red smartphone. Ron Amadeo Harman International, the car infotainment manufacturer, recently spilled the beans on a “next-gen” infotainment system it is building for General Motors.  Automotive News  has quotes from the company’s CEO, Dinesh Paliwal, who describes an Android-based system with an app store and “instant” boot up. The report says that Harman is “working closely” with Google to make the system a reality. This system isn’t Android Auto. Unlike regular Android, Android Wear, and Android TV, Android Auto isn’t an operating system. It doesn’t live on the car’s computer, it doesn’t control peripherals, and it doesn’t have an app store. Like Apple’s CarPlay, Android Auto is just a “casted” interface. Your plugged-in smartphone sends a custom interface to the car’s screen and receives touch events, but the car still has to run some other operating system. Harman won a $900 million contract from GM to build the system, and judging by the Harman CEO’s description, this is an actual embedded Android system that will power the entire infotainment setup. That typically includes the audio system, air conditioning, navigation, voice recognition, phone calls, reverse cameras, and Internet access. Read 3 remaining paragraphs | Comments

Visit site:
GM’s next-gen infotainment system to run Android—not Android Auto—in 2016

LED bulb efficiency clearly pulling ahead of compact fluorescents

US EIA A few years back, when I got my first LED-based lightbulb, it seemed natural to stick it into a wattmeter to get a sense of its efficiency. At under 15 Watts of power drawn, it clearly beat any incandescent bulbs I’d ever put into the same lamp. But I was disappointed to find that it wasn’t any better than a compact fluorescent bulb. Based on the graph shown above, my experience was hardly unique; in fact, it was decidedly average. Although the technology behind LEDs had the potential to be far more efficient than any other lighting source, the complete LED bulb package wasn’t doing that much better at the time than the far more mature fluorescent bulbs, which output roughly 60 lumens for every Watt put in. After some small boosts in 2013, however, a new generation of more efficient LEDs hit the market this year, raising the typical efficiency to nearly 100 lumens per Watt. The increased efficiency is coming at a time when prices for the bulbs continue to drop; given their expected lifetimes, they’re now far and away the most economical choice for most uses. Read 1 remaining paragraphs | Comments

See original article:
LED bulb efficiency clearly pulling ahead of compact fluorescents