Prosecutors drop key evidence at trial to avoid explaining “stingray” use

p | m In a Baltimore trial courtroom on Monday, a local judge threatened to hold a police detective in contempt of court for refusing to disclose how police located a 16-year-old robbery suspect’s phone. Once the Baltimore Police were able to locate Shemar Taylor’s phone, they then searched his house and found a gun as well. But rather than disclose the possible use of a stingray, also known as a cell site simulator, Detective John L. Haley cited a non-disclosure agreement, likely with the Harris Corporation, since the company is one of the dominant manufacturers of such devices. Stingrays can be used to determine a phone’s location, and they can also intercept calls and text messages. Baltimore Circuit Judge Barry G. Williams retorted, “You don’t have a nondisclosure agreement with the court,” according to the Baltimore Sun . Read 8 remaining paragraphs | Comments

See original article:
Prosecutors drop key evidence at trial to avoid explaining “stingray” use

High-res Rosetta pics catch little Philae lander bouncing across comet

The European Space Agency’s decade-old Rosetta mission managed to do what no mission has done before—successfully rendezvous a probe with a comet and then land on it . Even if things didn’t go entirely as planned with the landing, the lion’s share of the mission’s science was always slated to be carried out by the Rosetta probe itself rather than by the Philae lander, so plenty of experiments will still be carried out over the next year. A mosaic assembled by ESA scientists showing Philae’s first bounce across Comet 67P. ESA In fact, one of the Rosetta probe’s instruments managed to capture some remarkable imagery last week during Philae’s landing. In a blog post that went live this morning, the  ESA posted pictures from the spacecraft’s OSIRIS imager (that’s Optical, Spectroscopic, and Infrared Remote Imaging System) showing Philae’s initial approach and first “bounce” off of Comet 67P/Churyumov–Gerasimenko on November 12. Philae was supposed to have anchored itself to Comet 67P with a pair of harpoons, but those harpoons didn’t fire on touchdown. Philae actually rebounded away from the comet (67P has a small but appreciable amount of gravity, although its escape velocity is only 0.5 meters per second). It was during the first of two “bounces” that Rosetta’s OSIRIS imager captured a series of frames showing the lander’s parabolic journey across the comet’s face. The exact location of Philae’s final resting place remains as yet undetermined. Read 1 remaining paragraphs | Comments

Read More:
High-res Rosetta pics catch little Philae lander bouncing across comet

One of world’s largest landslide deposits discovered in Utah

The Markagrunt gravity slide in Utah includes most of the area between Beaver, Cedar City, and Panguitch. Google Earth Some things can be too big to notice, as our flat-Earth-believing ancestors can attest, having failed to work out that the surface of the Earth curves around a sphere. Or, as the saying goes, you can focus on the details of some fascinating trees and miss interesting facts about the forest as a whole. In southwest Utah, geologists had noticed some pretty cool “trees.” The area had been volcanically active between 21 and 31 million years ago, building up a host of steep, volcanic peaks. A number of huge blocks of rock from these peaks, up to 2.5 square kilometers in area and 200 meters thick, are obviously out of place—they’ve been interpreted by geologists as the result of many landslides around the volcanoes. In a recent paper in Geology , David Hacker , Robert Biek , and Peter Rowley show that rather than being the result of many individual landslides, these are actually all part of one jaw-droppingly large event. The deposit, called the Markagunt gravity slide, covers an area about 90 kilometers long and 40 kilometers wide and is hundreds of meters thick. During the event, all of this slid 30 kilometers or more. The scale puts run-of-the-mill landslides—as terrifying and deadly as they can be—to shame. Read 7 remaining paragraphs | Comments

Read More:
One of world’s largest landslide deposits discovered in Utah

Feds gather phone data from the sky with aircraft-mimicking cell towers

Aleksander Markin On Thursday afternoon, the Wall Street Journal published a report saying that the US Marshals Service (USMS) was using small, fixed-wing Cessnas equipped with so-called “dirtboxes”—receivers that act like cellphone towers—to gather data from citizens’ phones below. The purpose of such collection is to target and spy on criminal suspects, but the data from any citizen’s phone is collected by such devices. Sources told the WSJ that USMS operated these planes from five major airports in the US and that the program had a flying range “covering most of the US population.” The devices on the planes can capture unique identifying information from “tens of thousands” of cellphones on the ground. Using that information, federal authorities can pinpoint a cellphone user’s location from “within three meters or within a specific room in a building,” the WSJ said. Individuals with knowledge of the matter told the news outlet that the plane flyovers were targeted at “fugitives and criminals” and that non-target phone data is “let go” as it is gathered. The dirtboxes are described as higher-grade Stingrays, which police use  on the ground to collect International Mobile Subscriber Numbers (IMSI). Read 8 remaining paragraphs | Comments

Continued here:
Feds gather phone data from the sky with aircraft-mimicking cell towers

“DarkHotel” uses bogus crypto certificates to snare Wi-Fi-connected execs

DeviantArt user: Tincho555 Researchers have uncovered a seven-year-old malware operation that combines advanced cryptographic attacks, zero-day exploits, and well-developed keyloggers to target elite executives staying in luxury hotels during business trips. The attackers behind “DarkHotel,” as the advanced persistent threat has been dubbed, appear to know in advance when a targeted exec will check in and check out of a hotel. Victims are infected through a variety of methods, including bogus software updates for Adobe Flash, Google Toolbar, or other trusted software that are presented when the exec uses the hotel’s Wi-Fi or wired Internet access. In many cases, the attack code is signed with a trusted digital certificate that the attackers were able to clone by factoring the underlying 512-bit private key. While factoring weak 512-bit keys has been practical for several years, the crypto attack nonetheless is an “advanced” capability, particularly a few years ago. Taken together, the characteristics are an indication the operators have some sophistication, said researchers from Kaspersky Lab, the Russia-based security firm that disclosed the campaign. “The fact that most of the time the victims are top executives indicates the attackers have knowledge of their victims whereabouts, including name and place of stay,” the researchers wrote in a report published Monday . “This paints a dark, dangerous web in which unsuspecting travelers can easily fall. While the exact reason why some hotels function as an attacker vector are unknown, certain suspicions exist, indicating possibly a much larger compromise. We are still investigating this aspect of the operation and will publish more information in the future.” Read 6 remaining paragraphs | Comments

See the original article here:
“DarkHotel” uses bogus crypto certificates to snare Wi-Fi-connected execs

All US Postal Service employees’ personal data exposed by hackers

Barbara Krawcowicz All United States Postal Service (USPS) employees’ personal data—including names, addresses, social security numbers—has been exposed as the result of a hack believed to have originated from China. According to its own tally, USPS employs over 600,000 people. “We began investigating this incident as soon as we learned of it, and we are cooperating with the investigation, which is ongoing,” David Partenheimer, a USPS spokesman, wrote in a statement (PDF) on Monday. “The investigation is being led by the Federal Bureau of Investigation and joined by other federal and postal investigatory agencies. The intrusion is limited in scope and all operations of the Postal Service are functioning normally.” The USPS does not believe that in-store customer data was exposed, but customers who contacted the agency via e-mail or phone between January 1 and August 16, 2014 may have been. Read 4 remaining paragraphs | Comments

Continue reading here:
All US Postal Service employees’ personal data exposed by hackers

WTF, Russia’s domestic Internet traffic mysteriously passes through Chinese routers

Dyn Research Domestic Internet traffic traveling inside the borders of Russia has repeatedly been rerouted outside of the country under an unexplained series of events that degrades performance and could compromise the security of Russian communications. The finding, reported Thursday in a blog post published by Internet monitoring service Renesys , underscores the fragility of the border gateway protocol (BGP), which forms the underpinning of the Internet’s global routing system. In this case, domestic Russian traffic was repeatedly routed to routers operated by China Telecom, a firm with close ties to that county’s government. When huge amounts of traffic are diverted to far-away regions before ultimately reaching their final destination, it increases the chances hackers with the ability to monitor the connections have monitored or even altered some of the communications. A similar concern emerged last year, when Renesys found big chunks of traffic belonging to US banks, government agencies, and network service providers had been improperly routed through Belarusian or Icelandic service providers . The hijacking of Russian traffic is linked to last year’s peering agreement between Russian mobile provider Vimpelcom and China Telecom. The pact allowed the firms to save money by having some of their traffic carried over the other’s network rather than through a more expensive transit operator. On multiple occasions since then, according to Renesys, communications destined for Russia has followed extremely round-about routes that take the traffic into China before sending it on to its final stop. Doug Madory, director of internet analysis in Renesys research arm Dyn wrote: Read 2 remaining paragraphs | Comments

Follow this link:
WTF, Russia’s domestic Internet traffic mysteriously passes through Chinese routers

400 Tor-anonymized domains tracked down and seized in global crackdown

Thursday’s takedown of the Silk Road 2.0 drug website was part of a much bigger crackdown by police in a dozen countries that seized more than 400 darknet domains, it was widely reported Friday. Operation Onymous, as the coordinated international effort was dubbed, confiscated $1 million in bitcoins, $250,000 in cash, and a variety of drugs, gold, and silver, the Associated Press reported . In all, according to Wired , police seized 414 .onion domains, the Web addresses that use the Tor anonymity service to hide the physical location where they’re hosted. At least 17 people were arrested. Sites besides Silk Road 2.0 that were taken down included Hydra, Cloud Nine, Pandora, and Blue Sky. In all, some 55 different markets will be shut down once Operation Onymous is completed. Sites Agora and Evolution aren’t among them. The rise of underground bazaars selling illicit drugs and services has continued despite last year’s arrest of Ross William Ulbricht, the alleged mastermind of the original Silk Road who has pleaded not guilty and continues to fight the criminal charges in court. Read 1 remaining paragraphs | Comments

Link:
400 Tor-anonymized domains tracked down and seized in global crackdown

NYPD officers charged after video catches teen getting pistol whipped

“The video speaks for itself, doesn’t it?” Brooklyn District Attorney Kenneth Thompson said Wednesday about a brief video recording that led to two New York Police Department cops being charged in connection to the pistol-whipping assault of a 16-year-old Brooklyn boy. The boy, who was arrested for marijuana possession, ended up with broken teeth and bruises. The officers charged in Brooklyn Supreme Court on Wednesday are David Afanador, 33, and Tyrane Isaac, 36, both nine-year veterans. The 82-second video of the teen’s August 29 beating—widely available on the Internet—was captured by a local Crown Heights business. The tape shows the boy running before eventually stopping and raising his hands, after which he is pummeled and taken to the ground. Read 6 remaining paragraphs | Comments

Originally posted here:
NYPD officers charged after video catches teen getting pistol whipped

37,000-year-old Russian skeleton has Neanderthal DNA that’s gone missing

Stew Dean Another week, another ancient human genome. We just recently covered the oldest modern human genome yet described . Now, another paper takes a look at the DNA from a different modern human genome and comes to similar conclusions: interbreeding with Neanderthals was already deep in the past as of 37,000 years ago. But researchers were able to find stretches of the Neanderthal genome that are no longer present in any modern human populations that we’ve sampled. The skeleton in this case comes from the European area of Russia; it was found at a site called Kostenki-Borshchevo north of the Black Sea. The team behind the new paper (which does not include Svante Pääbo, who has pioneered ancient genomics) was only able to get a rough draft of the individual’s genome, on average sequencing every base 2.4 times. Thus, the sequence is likely to include a large number of errors and gaps. These make the conclusions a bit more tenuous than previous work but shouldn’t bias them in any particular direction. One thing the results make clear is that humanity’s migration out of Africa was complicated. K-14, as the skeleton is called, shares very few of the DNA differences that are associated with East Asian populations, as has been the case with the Siberian modern human skeletons we’ve looked at. All of which suggests that East Asians and Eurasians split off early and may even have engaged in separate migrations out of Africa or the Middle East. K-14 also lacks common variants found in Native Americans, leaving a single Siberian skeleton as the only one that has an affinity to them. Read 8 remaining paragraphs | Comments

Read More:
37,000-year-old Russian skeleton has Neanderthal DNA that’s gone missing