DOJ Threatens To Seize iOS Source Code

An anonymous reader writes from an article posted on iDownloadBlog: The DoJ is demanding that Apple create a special version of iOS with removed security features that would permit the FBI to run brute-force passcode attempts on the San Bernardino shooter’s iPhone 5c. Meanwhile, President Barack Obama has made public where he stands on the Apple vs. FBI case, which has quickly become a heated national debate. In the court papers, DoJ calls Apple’s rhetoric in the San Bernardino standoff as “false” and “corrosive” because the Cupertino firm dared suggest that the FBI’s court order could lead to a “police state.” Footnote Nine of DoJ’s filing reads: For the reasons discussed above, the FBI cannot itself modify the software on the San Bernardino shooter’s iPhone without access to the source code and Apple’s private electronic signature. The government did not seek to compel Apple to turn those over because it believed such a request would be less palatable to Apple. If Apple would prefer that course, however, that may provide an alternative that requires less labor by Apple programmers. As Fortune’s Philip-Elmer DeWitt rightfully pointed out, that’s a classic police threat. “We can do this [the] easy way or the hard way. Give us the little thing we’re asking for — a way to bypass your security software — or we’ll take [the] whole thing: your crown jewels and the royal seal too, ” DeWitt wrote. “With Apple’s source code, the FBI could, in theory, create its own version of iOS with the security features stripped out. Stamped with Apple’s electronic signature, the Bureau’s versions of iOS could pass for the real thing, ” he added. Read more of this story at Slashdot.

Read the article:
DOJ Threatens To Seize iOS Source Code

Kremlin Falls For Its Own Fake Satellite Imagery

An anonymous reader writes: The Turkish downing of the Russian SU-24 jet last November saw a predictable series of statements from each side claiming complete innocence and blaming the other entirely. Social media was a key battleground for both sides — the Turkish and Russian governments, along with their supporters — as each tried to establish a dominant narrative explanation for what had just happened. In the midst of the online competition, a little-observed, funhouse mirror of an online hoax was brilliantly perpetrated, one with consequences likely exceeding the expectation of the hoaxster. The Russian Ministry of Defense was duped by a fake image that Russian state media itself had circulated more than a year earlier, as a way to deny Moscow’s involvement in the downing of Malaysia Airlines Flight 17. Read more of this story at Slashdot.

See the original article here:
Kremlin Falls For Its Own Fake Satellite Imagery

DoD Announces New Bug Bounty Program Called Hack the Pentagon

Quince alPillan writes: Announcing what it calls “the first cyber bug bounty program in the history of the federal government, ” the Department of Defense says it’s inviting vetted hackers to test the security of its web pages and networks. Vetted hackers will need to pass a background check and will be attacking a predetermined system that is not a part of critical operations. This program is being put together by the Digital Defense Service, launched last fall. Read more of this story at Slashdot.

More:
DoD Announces New Bug Bounty Program Called Hack the Pentagon

German Police Allowed To Use Its Own "Federal Trojan"

An anonymous reader writes: The German Interior Ministry has approved for investigative use a spying Trojan developed by the German Federal Criminal Police (a so-called “federal Trojan”). In fact, it could end up being used as early as this week. The police will have to get a court order to use the spyware, and prove that the suspect is involved in a crime threatening citizens’ “life, limb or liberty”. The malware has been developed in-house, and has been available since autumn 2015. It is supposed to be used only for so-called telecommunication surveillance at the source, i.e. to read emails, chats and wiretap phone calls made by the target via his or her computer or smartphone, and not to access files, steal passwords, or set up video or audio surveillance via the device. Read more of this story at Slashdot.

More here:
German Police Allowed To Use Its Own "Federal Trojan"

President Obama Unveils $19 Billion Plan To Overhaul U.S. Cybersecurity

erier2003 writes: President Obama on Tuesday unveiled an expansive plan to bolster government and private-sector cybersecurity by establishing a federal coordinator for cyber efforts, proposing a commission to study future work, and asking Congress for funds to overhaul dangerously obsolete computer systems. His newly signed executive orders contain initiatives to better prepare college students for cybersecurity careers, streamline federal computer networks, and certify Internet-connected devices as secure. The Cybersecurity National Action Plan also establishes a Federal Privacy Council (to review how the government stores Americans’ personal information), creates the post of Chief Information Security Officer, and establishes a Commission on Enhancing National Cybersecurity. Read more of this story at Slashdot.

Link:
President Obama Unveils $19 Billion Plan To Overhaul U.S. Cybersecurity

Botched database leaks records for 191 million voters

Did you vote in a US election sometime this century? If so, your personal info may be out in the open. Researcher Chris Vickery has discovered that a badly configured database exposed the voter registration info for 191 million Americans, including addresses, party affiliations and state voter IDs. It’s not clear who originally managed the data, but Vickery and Databreaches.net are reaching out to everyone from online services to Congressional political action committees. The two are also contacting law enforcement in hopes of shutting down the leak, although it’s not certain that officials are taking action. The consequences of this database falling into the wrong hands could be severe, as you might have guessed. Less-than-scrupulous marketers and political campaigns could exploit the data, and criminals could combine it with other info to commit fraud or theft. It’s a particularly big problem for people who need to keep their details secret, such as stalking victims and police. Beyond this, the leak illustrates the need for stricter, consistent security standards around voter data — while states like California and South Dakota have sharp limits on where records go and what they’re used for, other states (including Alaska, Arkansas and Colorado) have no real restrictions. There’s a real possibility that this kind of incident could happen again. [Image credit: Getty Images] Via: CSO , Forbes Source: Databreaches.net

Excerpt from:
Botched database leaks records for 191 million voters

Universal Remote Desktop Coming To Windows 10 Soon

jones_supa writes: For those using the Continuum feature of Windows and who work from home or in the office, you’ll be pleased to know that the Remote Desktop Universal app is not only happening but will be released soon as a Technical Preview. This follows up on the Remote Desktop preview, which is already available for PC. The news came from Jason of the Microsoft Continuum team: “We’ve heard a lot of buzz around being able to connect to a remote desktop from Continuum for phone. We are excited to share that the Remote Desktop Universal Windows Platform (UWP) app will be released very soon in Technical Preview.” Read more of this story at Slashdot.

View original post here:
Universal Remote Desktop Coming To Windows 10 Soon

DHS Deployed Plane Above San Bernardino To Scoop Up All Phone Calls After Attack

schwit1 writes: Federal investigators looking into the San Bernardino massacre deployed a spy plane overhead after the attacks in an apparent attempt to find additional suspects. The Department of Homeland Security is said to have put up the single engine craft over the California city and ordered it to make repeated circles overhead. The craft would likely have been equipped with Dirtbox technology which can scan tens of thousands of phones in one go to identify suspects. The report adds to the intrigue about whether or not there were accomplices in the San Bernardino attacks, which took place last Wednesday and were the worst terrorist attack on American soil since 9/11. Read more of this story at Slashdot.

See the article here:
DHS Deployed Plane Above San Bernardino To Scoop Up All Phone Calls After Attack