Verizon technician sold calling, location data for thousands of dollars

Enlarge (credit: Bloomberg via Getty Images) An Alabama man who worked as a Verizon Wireless technician has agreed to plead guilty to a federal hacking charge in connection to his illegal use of the company’s computers to acquire customer calling and location data. The man, Daniel Eugene Traeger, faces a maximum five years in prison next month. He admitted Thursday that he sold customer data—from 2009 to 2014—to a private investigator whom the authorities have not named. According to the man’s signed plea deal  (PDF): At some point in 2009, the Defendant met a private investigator (“the PI”) who wanted to buy Verizon customer information from the Defendant. The Defendant accepted the PI’s offer. The defendant used Verizon computer systems and facilities to access customer call records and customer location data that he knew he was not authorized to access, and provided that information to the PI even though the Defendant knew that he was not authorized to provide it to a third party. The Defendant accessed customer call records by logging into Verizon’s MARS system. The Defendant then compiled the data in spreadsheets, which the Defendant provided to the PI, including by e-mail. The Defendant accessed customer location data using a Verizon system called Real Time Tool. Using RTT, the Defendant “pinged” cellular telephones on Verizon’s network and provided location data for those telephones to the PI. The plea agreement said that Traeger began making $50 monthly in 2009, when he sold two records a month. By mid-2013, he was earning $750 each month by selling 10 to 15 records. In all, the plea deal says he made more than $10,000 over a five-year period. Read 2 remaining paragraphs | Comments

View the original here:
Verizon technician sold calling, location data for thousands of dollars

Conspiracy! The Reddit rundown on the man who deleted Clinton e-mails

Bleach those bits away. (credit: Adina Firestone ) A system administrator with Platte River Networks, the company that took over hosting Hillary Clinton’s mail server after it was moved out of her basement in Chappaqua, has been the target of a crowdsourced investigation on Reddit into whether he took part in a conspiracy to cover up Clinton’s e-mails. Paul Combetta, an employee of Platte River Networks who was granted immunity from prosecution by the Justice Department in exchange for cooperation with the FBI’s investigation of Clinton’s e-mails, apparently went to Reddit for help with a sticky problem related to the e-mail investigation by the House Select Committee on Benghazi—scrubbing the e-mails of Clinton’s personal address. While the post doesn’t provide evidence that Clinton herself instructed Combetta to erase her e-mails, it does suggest that his staff wanted to excise her private e-mail address from the archives to be turned over to the State Department—ånd in turn, to the House Select Committee. The later destruction of the e-mails during the continuing investigation was apparently, as Combetta told investigators, an “oh-shit moment.” Read 8 remaining paragraphs | Comments

More here:
Conspiracy! The Reddit rundown on the man who deleted Clinton e-mails

After 23 years, the Apple II gets another OS update

Hello, old friend Yesterday, software developer John Brooks released what is clearly a work of pure love: the first update to an operating system for the Apple II computer family since 1993. ProDOS 2.4, released on the 30 th anniversary of the introduction of the Apple II GS, brings the enhanced operating system to even older Apple II systems, including the original Apple ][ and ][+. Which is pretty remarkable, considering the Apple ][ and ][+ don’t even support lower-case characters. You can test-drive ProDOS 2.4 in a Web-based emulator set up by computer historian Jason Scott on the Internet Archive. The release includes Bitsy Bye, a menu-driven program launcher that allows for navigation through files on multiple floppy (or hacked USB) drives. Bitsy Bye is an example of highly efficient code: it runs in less than 1 kilobyte of RAM. There’s also a boot utility that is under 400 bytes—taking up a single block of storage on a disk. Read 2 remaining paragraphs | Comments

More:
After 23 years, the Apple II gets another OS update

Police IT staff checked wrong box, deleted 25% of body cam footage

Enlarge (credit: Justin Sullivan / Getty Images News) One quarter of all body-worn camera footage from the Oakland, Calif. police was accidentally deleted in October 2014, according to the head of the relevant unit. As per the San Francisco Chronicle , Sgt. Dave Burke testified on Tuesday at a murder trial that this was, in fact, a mistake. This incident marks yet another setback in the efforts to roll out body-worn cameras to police agencies nationwide. Read 7 remaining paragraphs | Comments

Read more here:
Police IT staff checked wrong box, deleted 25% of body cam footage

Why Bezos’ rocket is unprecedented—and worth taking seriously

Enlarge / Jeff Bezos, founder and Chief Executive of Amazon.com, in May, (credit: Alex Wong/Getty Images) We can say this much for Jeff Bezos, the founder of Amazon.com and Blue Origin—he does not lack ambition. First Bezos founded an online bookstore that became the largest retailer in the western world, and now he plans to self-fund a New Glenn rocket that is nearly as tall as the Saturn V launch vehicle and more than half as powerful. As wild as Bezos’ idea sounds, Blue Origin might be able to get the job done. And if Bezos and Blue Origin can fly their massive orbital rocket in the next three to four years, it would be a remarkable, unprecedented achievement in a number of ways that could radically remake spaceflight. Proof of concept First, a few words about why this might really be viable. It is true that all Blue Origin has flown so far is a propulsion module, powered by a single BE-3 engine, and a capsule on a suborbital flight. The company’s New Shepard spacecraft is designed to carry six passengers on 10- to 15-minute hops up to about 100km before bringing them back down to Earth. This is not dissimilar to the first Mercury flights in the early 1960s, hence the moniker New Shepard, named after pioneering astronaut Alan Shepard. Read 12 remaining paragraphs | Comments

Read the article:
Why Bezos’ rocket is unprecedented—and worth taking seriously

5,300 Wells Fargo employees fired after 2 million fake accounts discovered

(credit: Mike Mozart ) Since at least 2011, Wells Fargo employees have been creating fake accounts using customers’ identities to boost their sales numbers, federal regulators said on Thursday. The Consumer Financial Protection Bureau (CFPB) fined the bank $100 million after a third-party consulting firm found that 2 million fake deposit and credit card accounts had been made without the consent of the person whose name was on the account. According to CNN Money, the bank fired 5,300 employees for taking part in the scheme, which constitutes about 1 percent of the bank’s payroll. In order to boost their sales numbers, employees opened 1.5 million deposit accounts and 565,000 credit card accounts on customers’ behalf but without authorization from those customers. “Employees then transferred funds from consumers’ authorized accounts to temporarily fund the new, unauthorized accounts,” the CFPB wrote. “This widespread practice gave the employees credit for opening the new accounts, allowing them to earn additional compensation and to meet the bank’s sales goals.” Read 7 remaining paragraphs | Comments

Read More:
5,300 Wells Fargo employees fired after 2 million fake accounts discovered

Stealing login credentials from a locked PC or Mac just got easier

Enlarge Snatching the login credentials of a locked computer just got easier and faster, thanks to a technique that requires only $50 worth of hardware and takes less than 30 seconds to carry out. Rob Fuller, a principal security engineer at R5 Industries, said the hack works reliably on Windows devices and has also succeeded on OS X, although he’s working with others to determine if it’s just his setup that’s vulnerable. The hack works by plugging a flash-sized minicomputer into an unattended computer that’s logged in but currently locked. In about 20 seconds, the USB device will obtain the user name and password hash used to log into the computer. Fuller, who is better known by his hacker handle mubix, said the technique works using both the Hak5 Turtle ($50) and USB Armory ($155) , both of which are USB-mounted computers that run Linux. “First off, this is dead simple and shouldn’t work, but it does,” mubix wrote in a blog post published Tuesday . “Also, there is no possible way that I’m the first one that has identified this, but here it is (trust me, I tested it so many ways to confirm it because I couldn’t believe it was true).” Read 5 remaining paragraphs | Comments

See more here:
Stealing login credentials from a locked PC or Mac just got easier

Android 7.0 Nougat review—Do more on your gigantic smartphone

The unveiling of the Nougat statue. After a lengthy Developer Preview program starting in March, the final version of Android 7.0 (codenamed “Nougat”) is finally launching today. The OS update will slowly begin to rollout to devices over the next few weeks. This year, Google is adding even more form factors to the world’s most popular operating system. After tackling watches, phones, tablets, TVs, and cars, Nougat brings platform improvements aimed at virtual reality headsets and—with some help from Chrome OS—also targets laptops and desktops. For Android’s primary platform (still phones and tablets), there’s a myriad of improvements. Nougat brings a new multitasking split screen mode, a redesigned notification panel, an adjustable UI scale, and fresh emoji. Nougat also sports numerous under-the-hood improvements, like changes to the Android Runtime, updates to the battery saving “Doze” mode, and developer goodies like Vulkan and Java 8 support. As usual, we’ll be covering Google’s Android package as a whole without worrying about what technically counts as part of the “OS” versus an app in the Play Store. Android is a platform not just for third-parties, but for Google as well, so we’re diving into everything that typically ships on a new Android smartphone. Read 154 remaining paragraphs | Comments

Read this article:
Android 7.0 Nougat review—Do more on your gigantic smartphone

As promised, Aetna is pulling out of Obamacare after DOJ blocked its merger

Enlarge (credit: Getty | Bloomberg ) Aetna announced Monday that due to grave financial losses, it will dramatically slash its participation in public insurance marketplaces set up by the Affordable Care Act. In 2017, Aetna will only offer insurance policies in 242 counties scattered across four states—that’s a nearly 70-percent decrease from its 2016 offerings in 778 counties across 15 states. The deep cuts have largely been seen as a blow to the sustainability of the healthcare law, which has seen other big insurers also pull out, namely UnitedHealth group and Humana. But the explanation that Aetna was forced to scale back due to heavy profit cuts doesn’t square with previous statements by the company. In April, Mark Bertolini, the chairman and chief executive of Aetna, told investors that the insurance giant anticipated losses and could weather them, even calling participation in the marketplaces during the rocky first years “a good investment.” And in a July 5 letter (PDF) to the Department of Justice, obtained by the Huffington Post by a Freedom of Information Act request, Bertolini explicitly threatened that Aetna would back out of the marketplace if the department tried to block its planned $37 billion merger with Humana. Read 4 remaining paragraphs | Comments

Originally posted here:
As promised, Aetna is pulling out of Obamacare after DOJ blocked its merger

Group claims to hack NSA-tied hackers, posts exploits as proof

(credit: Shadow Brokers ) In what security experts say is either a one-of-a-kind breach or an elaborate hoax, an anonymous group has published what it claims are sophisticated software tools belonging to an elite team of hackers tied to the US National Security Agency. In a recently published blog post, the group calling itself Shadow Brokers claims the leaked set of exploits were obtained after members hacked Equation Group (the post has since been removed from Tumblr). Last year, Kaspersky Lab researchers described Equation Group as one of the world’s most advanced hacking groups , with ties to both the Stuxnet and Flame espionage malware platforms. The compressed data accompanying the Shadow Broker post is slightly bigger than 256 megabytes and purports to contain a series of hacking tools dating back to 2010. While it wasn’t immediately possible for outsiders to prove the posted data—mostly batch scripts and poorly coded python scripts—belonged to Equation Group, there was little doubt the data have origins with some advanced hacking group. Not fully fake “These files are not fully fake for sure,” Bencsáth Boldizsár, a researcher with Hungary-based CrySyS who is widely credited with discovering Flame, told Ars in an e-mail. “Most likely they are part of the NSA toolset, judging just by the volume and peeps into the samples. At first glance it is sound that these are important attack related files, and yes, the first guess would be Equation Group.” Read 6 remaining paragraphs | Comments

Read More:
Group claims to hack NSA-tied hackers, posts exploits as proof