8,500 Verizon Customers Disconnected Because of ‘Substantial’ Data Use

An anonymous reader quotes a report from Ars Technica: Verizon is disconnecting another 8, 500 rural customers from its wireless network, saying that roaming charges have made certain customer accounts unprofitable for the carrier. The 8, 500 customers have 19, 000 lines and live in 13 states (Alaska, Idaho, Iowa, Indiana, Kentucky, Maine, Michigan, Missouri, Montana, North Carolina, Oklahoma, Utah, and Wisconsin), a Verizon Wireless spokesperson told Ars today. They received notices of disconnection this month and will lose access to Verizon service on October 17. Verizon said in June that it was only disconnecting “a small group of customers” who were “using vast amounts of data — some as much as a terabyte or more a month — outside of our network footprint.” But one customer, who contacted Ars this week about being disconnected, said her family never used more than 50GB of data across four lines despite having an “unlimited” data plan. We asked Verizon whether 50GB a month is a normal cut-off point in its disconnections of rural customers, but the company did not provide a specific answer. “These customers live outside of areas where Verizon operates our own network, ” Verizon said. “Many of the affected consumer lines use a substantial amount of data while roaming on other providers’ networks and the roaming costs generated by these lines exceed what these consumers pay us each month. We sent these notices in advance so customers have plenty of time to choose another wireless provider.” Read more of this story at Slashdot.

Read this article:
8,500 Verizon Customers Disconnected Because of ‘Substantial’ Data Use

This admin helped music pirates pilfer 1 billion copyrighted tracks

Enlarge / ShareBeast piracy site visitors are greeted with this FBI anti-piracy warning today. The admin for a prolific file-sharing site that helped pirates score more than 1 billion tracks now faces five years in prison after pleading guilty to a single count of criminal copyright infringement. Artur Sargsyan, the 29-year-old owner and operator of ShareBeast, is to be sentenced in Atlanta federal court in December for operating  (PDF) what the Recording Industry Association of America said was the most prolific US-based file-sharing site. The defendant also forfeited $185,000 in ill-gotten gains, the government said. The authorities in 2015 seized the ShareBeast domain and a few others connected to the site, which regularly allowed users to score pre-release music. Sargsyan was charged last month. Read 5 remaining paragraphs | Comments

View post:
This admin helped music pirates pilfer 1 billion copyrighted tracks

Hackers Have Penetrated Energy Grid, Symantec Warns

An anonymous reader quotes a report from Fortune: Hackers have been burrowing their way inside the critical infrastructure of energy and other companies in the U.S. and elsewhere, warns cybersecurity giant Symantec. In a new report, Symantec claims that the threat of cyberattack-induced power outages in the west has elevated from a theoretical concern to a legitimate one in recent months. “We’re talking about activity we’re seeing on actual operational networks that control the actual power grid, ” Eric Chien, technical director of security technology and response at Symantec, told Fortune on a call. Reports surfaced over the summer of hackers targeting staff at nuclear energy facilities with phishing attacks, designed to steal login credentials or install malware on machines. The extent of the campaign as well as the question of whether the attackers had breached operational IT networks, rather than merely administrative ones, was unclear at the time. Symantec is now erasing all doubt. “There are no more technical hurdles for them to cause some sort of disruption, ” Chien said of the hackers. “All that’s left is really motivation.” Symantec detailed its findings in a report released Wednesday morning. The paper tracks the exploits of a hacker group that Symantec has dubbed DragonFly 2.0, an outfit that the company says it has linked to an earlier series of attacks perpetrated between 2011 and 2014 by a group it dubbed DragonFly. Read more of this story at Slashdot.

Read the original:
Hackers Have Penetrated Energy Grid, Symantec Warns

The IRS Decides Who To Audit By Data Mining Social Media

In America the Internal Revenue Service used to pick who got audited based on math mistakes or discrepancies with W-2 forms — but not any more. schwit1 shares an article from the Vanderbilt Journal of Entertainment and Technology Law describing their new technique: The IRS is now engaging in data mining of public and commercial data pools (including social media) and creating highly detailed profiles of taxpayers upon which to run data analytics. This article argues that current IRS practices, mostly unknown to the general public, are violating fair information practices. This lack of transparency and accountability not only violates federal law regarding the government’s data collection activities and use of predictive algorithms, but may also result in discrimination. While the potential efficiencies that big data analytics provides may appear to be a panacea for the IRS’s budget woes, unchecked these activities are a significant threat to privacy [PDF]. Other concerns regarding the IRS’s entrée into big data are raised including the potential for political targeting, data breaches, and the misuse of such information. While tax evasion cost the U.S.$3 trillion between 2000 and 2009, one of the report’s authors argues that people should be aware âoethat what they say and do onlineâ could be used against them. Read more of this story at Slashdot.

View original post here:
The IRS Decides Who To Audit By Data Mining Social Media

How the NSA Identified Satoshi Nakamoto

An anonymous reader shares a report: The ‘creator’ of Bitcoin, Satoshi Nakamoto, is the world’s most elusive billionaire. Very few people outside of the Department of Homeland Security know Satoshi’s real name. In fact, DHS will not publicly confirm that even THEY know the billionaire’s identity. Satoshi has taken great care to keep his identity secret employing the latest encryption and obfuscation methods in his communications. Despite these efforts (according to my source at the DHS) Satoshi Nakamoto gave investigators the only tool they needed to find him — his own words. Using stylometry one is able to compare texts to determine authorship of a particular work. Throughout the years Satoshi wrote thousands of posts and emails and most of which are publicly available. According to my source, the NSA was able to the use the ‘writer invariant’ method of stylometry to compare Satoshi’s ‘known’ writings with trillions of writing samples from people across the globe. By taking Satoshi’s texts and finding the 50 most common words, the NSA was able to break down his text into 5, 000 word chunks and analyse each to find the frequency of those 50 words. This would result in a unique 50-number identifier for each chunk. The NSA then placed each of these numbers into a 50-dimensional space and flatten them into a plane using principal components analysis. The result is a ‘fingerprint’ for anything written by Satoshi that could easily be compared to any other writing. The NSA then took bulk emails and texts collected from their mass surveillance efforts. First through PRISM and then through MUSCULAR, the NSA was able to place trillions of writings from more than a billion people in the same plane as Satoshi’s writings to find his true identity. The effort took less than a month and resulted in positive match. Read more of this story at Slashdot.

Visit site:
How the NSA Identified Satoshi Nakamoto

Germany, in a First, Shuts Down Left-Wing Extremist Website

An anonymous reader shares a report: An influential website linked to violence at the Group of 20 summit meeting in Hamburg last month has been ordered to shut down, in the first such move against left-wing extremists in the country (alternative source), the authorities in Germany said on Friday. Thomas de Maiziere, the interior minister, said that the unrest in Hamburg, during which more than 20, 000 police officers were deployed and more than 400 people arrested or detained, had been stirred up on the website and showed the “serious consequences” of left-wing extremism. “The prelude to the G-20 summit in Hamburg was not the only time that violent actions and attacks on infrastructural facilities were mobilized on linksunten.indymedia, ” he said, referring to the website. The order on Friday was the latest move in a long battle against extremism in Germany. It comes in the wake of the violence in Charlottesville, Va., this month and amid worries about “antifa” factions that use violence to combat the far-right in the United States. Read more of this story at Slashdot.

Read more here:
Germany, in a First, Shuts Down Left-Wing Extremist Website

Semi-autonomous truck convoys due to hit UK roads next year

Convoys of semi-autonomous trucks are expected to be tested on public roads in the UK before the end of next year, the government announced today . The Department for Transport and Highways England have rustled up £8.1 million in funding between them to pass on to the Transport Research Laboratory (TRL), the independent organisation that’ll conduct the trials. TRL will start with simulation studies and driver training before moving onto a test track and finally, public roads by the end of 2018. Platooning, as it’s known, is one of the simpler ways of harnessing self-driving technology. While the truck at the front of a convoy remains under human control, trailing vehicles follow its lead autonomously. Wireless connections (aka vehicle-to-vehicle communication) keep all trucks talking to each other so the self-driving members of the conga line can immediately respond to changes in the lead lorry’s direction and speed. With software managing the distance between vehicles, it should be possible to create a much tighter convoy than would be safe if human limbs were in charge of the wheel and pedals. This has the potential to ease congestion, but more importantly reduces drag on the trailing trucks, meaning better fuel efficiency and lower emissions. TRL has already done some preliminary feasibility studies on the government’s instruction. In fact, platooning trials on UK motorways were originally due to start in late 2016 , but the project has been delayed for one reason or another. At the time, the Financial Times reported that various manufacturers of heavy goods vehicles were just not particularly keen on taking part. Several real-world trials of semi-autonomous convoys are taking place elsewhere , and TRL is looking at how these are addressing the technical and practical challenges of public platooning tests. There’s no substitute for conducting your own in situ , though, which is why TRL will investigate everything from fuel efficiency to safety, acceptance by drivers and the public, the suitability of UK infrastructure and future, commercial viability. Source: Department for Transport

See original article:
Semi-autonomous truck convoys due to hit UK roads next year

Wisconsin Lawmakers Vote To Pay Foxconn $3 Billion To Get New Factory

An anonymous reader quotes a report from Ars Technica: The Wisconsin Assembly voted 59-30 on Thursday to approve a bill to give incentives worth $3 billion to Taiwan-based Foxconn so that the company would open its first U.S. plant in the state. Foxconn, best known for supplying parts of Apple’s iPhones, will open the $10 billion liquid-crystal display plant in 2020, according to Reuters. The bill still has to be approved by a joint finance committee and the state Senate. Both houses of Wisconsin’s legislature are controlled by Republicans, and the deal is supported by Wisconsin Governor Scott Walker, a Republican who negotiated the deal. The vote was largely, but not entirely, along party lines. Three Democrats joined 56 Republicans in supporting the deal. Two Republicans and 28 Democrats voted against it. Opponents said the deal wasn’t a good use of taxpayer funds. The $3 billion incentives package includes about $2.85 billion in cash payments from taxpayers and tax breaks valued at about $150 million. The state is also waiving certain environmental rules. Read more of this story at Slashdot.

Read More:
Wisconsin Lawmakers Vote To Pay Foxconn $3 Billion To Get New Factory

Russian Group That Hacked DNC Used NSA Attack Code In Attack On Hotels

An anonymous reader quotes a report from Ars Technica: A Russian government-sponsored group accused of hacking the Democratic National Committee last year has likely been infecting other targets of interest with the help of a potent Windows exploit developed by, and later stolen from, the National Security Agency, researchers said Friday. Eternal Blue, as the exploit is code-named, is one of scores of advanced NSA attacks that have been released over the past year by a mysterious group calling itself the Shadow Brokers. It was published in April in the group’s most damaging release to date. Its ability to spread from computer to computer without any user action was the engine that allowed the WCry ransomware worm, which appropriated the leaked exploit, to shut down computers worldwide in May. Eternal Blue also played a role in the spread of NotPetya, a follow-on worm that caused major disruptions in June. Now, researchers at security firm FireEye say they’re moderately confident the Russian hacking group known as Fancy Bear, APT 28, and other names has also used Eternal Blue, this time in a campaign that targeted people of interest as they connected to hotel Wi-Fi networks. In July, the campaign started using Eternal Blue to spread from computer to computer inside various staff and guest networks, company researchers Lindsay Smith and Ben Read wrote in a blog post. While the researchers didn’t directly observe those attacks being used to infect guest computers connected to the network, they said a related campaign from last year used the control of hotel Wi-Fi services to obtain login credentials from guest devices. Read more of this story at Slashdot.

More:
Russian Group That Hacked DNC Used NSA Attack Code In Attack On Hotels

N. Korean defectors show locations of mass graves using Google Earth

Much of what happens in North Korea remains hidden from the outside world. But commercial satellite imagery and Google Earth mapping software are helping a human-rights organization take inventory of the worst offenses of the North Korean regime and identify sites for future investigation of crimes against humanity. A new report from the South Korea-based Transitional Justice Working Group (TJWG) —a non-governmental organization that tracks human-rights abuses and crimes against humanity by the world’s most oppressive regimes—details how the organization’s researchers used Google Earth in interviews with defectors from North Korea to identify sites associated with mass killings by the North Korean regime. Google Earth imagery was used to help witnesses to killings and mass burials orient themselves and precisely point out the locations of those events. Entitled “Mapping Crimes Against Humanity in North Korea: Mass Graves, Killing Sites and Documentary Evidence,” the report does not include the actual locations of what the researchers deemed to be sensitive sites out of concern that the North Korean regime would move evidence from those sites. But it does provide location data of other sites with potential documentary evidence of crimes, including police stations and other government facilities that may have records of atrocities. Read 5 remaining paragraphs | Comments

View article:
N. Korean defectors show locations of mass graves using Google Earth