Pirate Bay outs porno copyright trolls: they’re the ones pirating their own files

Yesterday, I wrote about an expert witness’s report on Prenda Law ( previously ), the notorious porno copyright trolls (they send you letters accusing you of downloading porn and demand money on pain of being sued and forever having your name linked with embarrassing pornography). The witness said that he believed that Prenda — and its principle, John Steele — had been responsible for seeding and sharing the files they accused others of pirating. After hearing about this, the administrators for The Pirate Bay dug through their logs and published a damning selection of log entries showing that many of the files that Steele and his firm accused others of pirating were uploaded by Steele himself, or someone with access to his home PC. The Pirate Bay logs not only link Prenda to the sharing of their own files on BitTorrent, but also tie them directly to the Sharkmp4 user and the uploads of the actual torrent files. The IP-address 75.72.88.156 was previously used by someone with access to John Steele’s GoDaddy account and was also used by Sharkmp4 to upload various torrents. Several of the other IP-addresses in the log resolve to the Mullvad VPN and are associated with Prenda-related comments on the previously mentioned anti-copyright troll blogs. The logs provided by The Pirate Bay can be seen as the missing link in the evidence chain, undoubtedly linking Sharkmp4 to Prenda and John Steele. Needless to say, considering the stack of evidence above it’s not outrageous to conclude that the honeypot theory is viable. While this is certainly not the first time that a copyright troll has been accused of operating a honeypot, the evidence compiled against Prenda and Steel is some of the most damning we’ve seen thus far. The Pirate Bay Helps to Expose Copyright Troll Honeypot [Ernesto/TorrentFreak]        

View the original here:
Pirate Bay outs porno copyright trolls: they’re the ones pirating their own files

NYPD Detective Accused of Hiring Email Hackers

An anonymous reader writes “Edwin Vargas, a detective with the New York City Police Department, was arrested on Tuesday for computer hacking crimes. According to the complaint unsealed in Manhattan federal court, between March 2011 and October 2012, Vargas, an NYPD detective assigned to a precinct in the Bronx, hired an e-mail hacking service to obtain log-in credentials, such as the password and username, for certain e-mail accounts. In total, he purchased access to at least 43 personal e-mail accounts belonging to 30 different individuals, including at least 19 who are affiliated with the NYPD.” Read more of this story at Slashdot.

Follow this link:
NYPD Detective Accused of Hiring Email Hackers

Over 100 Hours of Video Uploaded To YouTube Every Minute

jones_supa writes “Google’s YouTube is celebrating its 8-year birthday, and at the same time they reveal some interesting numbers. ‘Today, more than 100 hours of video are uploaded to YouTube every minute. That’s more than four days of video uploaded each minute! Every month, more than 1 billion people come to YouTube to access news, answer questions and have a little fun. That’s almost one out of every two people on the Internet. Millions of partners are creating content for YouTube and more than 1,000 companies worldwide have mandated a one-hour mid-day break to watch nothing but funny YouTube videos. Well, we made that last stat up, but that would be cool (the other stats are true).'” Read more of this story at Slashdot.

View article:
Over 100 Hours of Video Uploaded To YouTube Every Minute

Fed. Appeals Court Says Police Need Warrant to Search Phone

An anonymous reader writes “In a decision that’s almost certainly going to result in this issue heading up to the Supreme Court, the Federal 1st Circuit Court of Appeals [Friday] ruled that police can’t search your phone when they arrest you without a warrant. That’s contrary to most courts’ previous findings in these kinds of cases where judges have allowed warrantless searches through cell phones.” (But in line with the recently mentioned decision in Florida, and seemingly with common sense.) Read more of this story at Slashdot.

More:
Fed. Appeals Court Says Police Need Warrant to Search Phone

Apple can decrypt iPhones for cops; Google can remotely “reset password” for Android devices

Apple apparently has the power to decrypt iPhone storage in response to law-enforcement requests, though they won’t say how. Google can remotely “reset the password” for a phone for cops, too: Last year, leaked training materials prepared by the Sacramento sheriff’s office included a form that would require Apple to “assist law enforcement agents” with “bypassing the cell phone user’s passcode so that the agents may search the iPhone.” Google takes a more privacy-protective approach: it “resets the password and further provides the reset password to law enforcement,” the materials say, which has the side effect of notifying the user that his or her cell phone has been compromised. Ginger Colbrun, ATF’s public affairs chief, told CNET that “ATF cannot discuss specifics of ongoing investigations or litigation. ATF follows federal law and DOJ/department-wide policy on access to all communication devices.” …The ATF’s Maynard said in an affidavit for the Kentucky case that Apple “has the capabilities to bypass the security software” and “download the contents of the phone to an external memory device.” Chang, the Apple legal specialist, told him that “once the Apple analyst bypasses the passcode, the data will be downloaded onto a USB external drive” and delivered to the ATF. It’s not clear whether that means Apple has created a backdoor for police — which has been the topic of speculation in the past — whether the company has custom hardware that’s faster at decryption, or whether it simply is more skilled at using the same procedures available to the government. Apple declined to discuss its law enforcement policies when contacted this week by CNET. It’s not clear to me from the above whether Google “resetting the password” for Android devices merely bypasses the lock-screen or actually decrypts the mass storage on the phone if it has been encrypted. I also wonder if the “decryption” Apple undertakes relies on people habitually using short passwords for their phones — the alternative being a lot of screen-typing in order to place a call. Apple deluged by police demands to decrypt iPhones [Declan McCullagh/CNet] ( via /. )        

Visit link:
Apple can decrypt iPhones for cops; Google can remotely “reset password” for Android devices

Undercover cops’ devious new method to stop iPhone theft

Police in San Francisco decide on a new tactic to stop iPhone theft. Undercover officers are walking down streets offering to sell iPhones they claim are stolen. The idea is to kill the market for stolen phones. [Read more]        

Read the article:
Undercover cops’ devious new method to stop iPhone theft

NYC Police Comm’r: Privacy Is ‘Off the Table’ After Boston Bombs

An anonymous reader writes “New York City Police Commissioner Ray Kelly thinks that now is a great time to install even more surveillance cameras hither and yon around the Big Apple. After the Boston Marathon bombing, the Tsarnaev brothers were famously captured on security camera footage and thereby identified. That just may soften up Americans to the idea of the all-seeing glass eye. ‘I think the privacy issue has really been taken off the table,’ Kelly gloats.” Read more of this story at Slashdot.

Link:
NYC Police Comm’r: Privacy Is ‘Off the Table’ After Boston Bombs

Court: 4th Amendment Applies At Border, Password Protected Files Not Suspiscious

An anonymous reader sends this Techdirt report on a welcome ruling from the 9th Circuit Court of Appeals: “”Here’s a surprise ruling. For many years we’ve written about how troubling it is that Homeland Security agents are able to search the contents of electronic devices, such as computers and phones at the border, without any reason. The 4th Amendment only allows reasonable searches, usually with a warrant. But the general argument has long been that, when you’re at the border, you’re not in the country and the 4th Amendment doesn’t apply. This rule has been stretched at times, including the ability to take your computer and devices into the country and search it there, while still considering it a “border search,” for which the lower standards apply. Just about a month ago, we noted that Homeland Security saw no reason to change this policy. Well, now they might have to. In a somewhat surprising 9th Circuit ruling (en banc, or in front of the entire set of judges), the court ruled that the 4th Amendment does apply at the border, that agents do need to recognize there’s an expectation of privacy, and cannot do a search without reason. Furthermore, they noted that merely encrypting a file with a password is not enough to trigger suspicion.” Read more of this story at Slashdot.

Taken from:
Court: 4th Amendment Applies At Border, Password Protected Files Not Suspiscious

New Nanocapsule Medicine Could Sober You Up in Seconds

Anyone who’s ever had a couple of drinks knows that as fun as it can be, sometimes it’d be nice if you could just make all that haze go away, right away. There’s no solution for your average drunk yet, but researchers at MIT have managed to put together an injection that can turn a party mouse into a stone-cold sober one practically on the spot. More »

Read More:
New Nanocapsule Medicine Could Sober You Up in Seconds