EFF: Feds can’t get around Fourth Amendment via automated data capture

OAKLAND, Calif.—A federal judge spent over four hours on Friday questioning lawyers from the Electronic Frontier Foundation (EFF) and from the Department of Justice in an ongoing digital surveillance-related lawsuit that has dragged on for more than six years. During the hearing, US District Judge Jeffrey White heard arguments from both sides in his attempt to wrestle with the plaintiffs’ July 2014 motion for partial summary judgment . He went back and forth between the two sides, hearing answers to his list of 12 questions that were published earlier this week in a court filing. That July 2014 motion asks the court to find that the government is “violating the Fourth Amendment by their ongoing seizures and searches of plaintiffs’ Internet communications.” The motion specifically doesn’t deal with allegations of past government wrongdoing, nor other issues in the broader case. Read 17 remaining paragraphs | Comments

See original article:
EFF: Feds can’t get around Fourth Amendment via automated data capture

Computer intrusion inflicts massive damage on German steel factory

A German steel factory suffered significant damage after attackers gained unauthorized access to computerized systems that help control its blast furnace, according to a report published Friday by IDG News. The attackers took control of the factory’s production network through a spear phishing campaign, IDG said, citing a report published Wednesday by the German government’s Federal Office for Information Security. Once the attackers compromised the network, individual components or possibly entire systems failed. IDG reporter Loek Essers wrote: Due to these failures, one of the plant’s blast furnaces could not be shut down in a controlled manner, which resulted in “massive damage to plant,” the BSI said, describing the technical skills of the attacker as “very advanced.” The attack involved the compromise of a variety of different internal systems and industrial components, BSI said, noting that not only was there evidence of a strong knowledge of IT security but also extended know-how of the industrial control and production process. The incident is notable because it’s one of the few computer intrusions to cause physical damage. The Stuxnet worm that targeted Iran’s uranium enrichment program has been dubbed the world’s first digital weapon, destroying an estimated 1,000 centrifuges. Last week, Bloomberg News reported that a fiery blast in 2008 that hit a Turkish oil pipeline was the result of hacking , although it’s not clear if the attackers relied on physical access to computerized controllers to pull it off. The suspected sabotage of a Siberian pipeline in 1982 is believed to have used a logic bomb. Critics have long argued that much of the world’s factories and critical infrastructure aren’t properly protected against hackers. Read on Ars Technica | Comments

Visit link:
Computer intrusion inflicts massive damage on German steel factory

T-Mobile gives up fight over cramming fees, will pay $90M back to customers

T-Mobile US has given up its fight against a lawsuit filed by the US government, agreeing  today to refund $90 million or more to customers who were charged premium text message fees without their consent. The Federal Trade Commission alleged that T-Mobile made hundreds of millions of dollars off the practice of passing along third-party charges to customers without their authorization and taking a commission on each charge. T-Mobile could end up paying much more than $90 million. “The settlement requires that they provide full refunds to consumers, with a total of ‘at least’ $90 million,” an FTC spokesperson explained. “The $90 million is a floor. If they receive refund requests of more than that, they have to provide them.” In addition to everything it pays back customers, T-Mobile will pay $18 million in fines and penalties to state attorneys general and $4.5 million to the Federal Communications Commission. If T-Mobile receives less than $90 million worth of refund requests, the extra fines can be counted toward the minimum payment of $90 million. If the payment is still under $90 million, “the balance must be remitted to the FTC for additional consumer redress, consumer education, or other uses,” the FTC said. Read 5 remaining paragraphs | Comments

Original post:
T-Mobile gives up fight over cramming fees, will pay $90M back to customers

FBI claims North Korean involvement in Sony Pictures attack

The Federal Bureau of Investigation’s Washington press office has issued an update on the investigation into the cyber attack on Sony Pictures Entertainment, including the conclusion that North Korea was behind it. “As a result of our investigation, and in close collaboration with other US government departments and agencies, the FBI now has enough information to conclude that the North Korean government is responsible for these actions,” the office said in a statement. However, the information cited by the FBI’s update may not be as conclusive as many would like. Other hints at the attribution were provided to news organizations off-the-record, but the FBI’s public statements are far from definitive. Read 9 remaining paragraphs | Comments

View original post here:
FBI claims North Korean involvement in Sony Pictures attack

Apple ceases online sales in Russia due to extreme ruble fluctuations

Bloomberg reported on Tuesday that Apple has ceased all online sales in Russia as the country has been unable to keep its currency from fluctuating dramatically. In the last month, Apple had already increased the price of its iPhone 6 in that country by 25 percent due to currency uncertainties. “Our online store in Russia is currently unavailable while we review pricing,” Alan Hely, a spokesman for the Cupertino, California-based company, told Bloomberg. “We apologize to customers for any inconvenience.” It is uncertain when Apple will reinstate its operations in Russia. Bloomberg noted that the Ruble sank 19 percent today, “with a surprise interest-rate increase failing to stem a run on the currency.” At one point during the day, the ruble sank to 80 on the dollar. Read 3 remaining paragraphs | Comments

View the original here:
Apple ceases online sales in Russia due to extreme ruble fluctuations

Feds used Adobe Flash to identify Tor users visiting child porn sites

A little more than 16 months ago, word emerged that the FBI exploited a recently patched Firefox vulnerability to unmask Tor users visiting a notorious child pornography site. It turns out that the feds had waged an even broader uncloaking campaign a year earlier by using a long-abandoned part of the open source Metasploit exploit framework to identify Tor-using suspects. According to Wired , “Operation Torpedo,” as the FBI sting operation was dubbed, targeted users of three darknet child porn sites. It came to light only after Omaha defense attorney Joseph Gross challenged the accuracy of evidence it uncovered against a Rochester, New York-based IT worker who claims he was falsely implicated in the campaign. Operation Torpedo used the Metasploit Decloaking Engine to identify careless suspects who were hiding behind Tor, a free service used by good and bad guys alike to shield their point of entry to the Internet. The Decloaking Engine went live in 2006 and used five separate methods to break anonymization systems. One method was an Adobe Flash application that initiated a direct connection with the end user, bypassing Tor protections and giving up the user’s IP address. Tor Project officials have long been aware of the vulnerability and strenuously advise against installing Flash. According to Wired: Read 1 remaining paragraphs | Comments

View article:
Feds used Adobe Flash to identify Tor users visiting child porn sites

Oakland cops disciplined 24 times for failing to turn on body-worn cameras

OAKLAND, Calif.—Over the last two years, the Oakland Police Department (OPD) has disciplined police officers on 24 occasions  for disabling or failing to activate body-worn cameras, newly released public records show. The City of Oakland did not provide any records prior to 2013, and the OPD did not immediately respond to Ars’ request for comment. The records show that on November 8, 2013 one officer was terminated after failing to activate his camera. Less than two weeks later, another resigned for improperly removing the camera from his or her uniform. However, most officers received minor discipline in comparison. The OPD has used Portable Digital Recording Devices (PDRDs) since late 2010 . According to the department’s  own policy , patrol officers are required to wear the cameras during a number of outlined situations, including detentions, arrests, and serving a warrant. At present, the city has about 700 officers . Read 9 remaining paragraphs | Comments

See original article:
Oakland cops disciplined 24 times for failing to turn on body-worn cameras

4 seconds of body cam video can reveal a biometric fingerprint, study says

Researchers say they can have computers examine body camera video footage and accurately identify a person wearing a body-mounted device in about four seconds, according to a recently released paper . The authors of the study had their software look at biometric characteristics like height, stride length, and walking speed to find the identity of the person shooting the footage. As they point out, this could have both positive and negative implications for civilians, law enforcement, and military personnel if they’re using body-mounted cameras. (It’s important to note that this research paper,  Egocentric Video Biometrics , was posted  to the arXiv repository . As such, it’s not considered a final, peer-reviewed work.) Using static, mounted cameras to match a person’s height and gait is a relatively common and well-researched vector for narrowing down the identity of people caught in videos. The authors said that, to get an accurate read of the biometric data of the person wearing the body cam, the footage has to be from a camera secured to one point on a person’s body (handheld cameras don’t work), and it has to have at least four seconds of video of the camera-wearer walking. Despite these restrictions, the two researchers from The Hebrew University in Jerusalem noted that once the necessary information had been gathered, “the identity of the user can be determined quite reliably from a few seconds of video.” “This is like a fingerprint,” Shmuel Peleg, one of the paper’s authors, told The Verge. “In order to find the person you have to have their fingerprint beforehand. But we can compare two people and say whether two videos were shot by the same person or not.” Read 4 remaining paragraphs | Comments

More:
4 seconds of body cam video can reveal a biometric fingerprint, study says

Judge says reporter can’t get public records about cops’ “stingray” use

A local judge in Arizona ruled Friday that the Tucson Police Department (TPD) does not have to disclose records related to the use of stingrays, also known as cell-site simulators, under the state’s public records act. According to a Saturday report from Capitol Media Services , a state news wire, complying with reporter Beau Hodai ’s public records request “would give criminals a road map for how to defeat the device, which is used not only by Tucson but other local and national police agencies.” Hodai sued the TPD and the City of Tucson in March 2014 to force them to hand over such records. The devices are often used covertly by local and federal law enforcement to locate target cellphones and their respective owners. However, stingrays also sweep up cell data of innocent people nearby who have no idea that such collection is taking place. Stingrays can be used to intercept voice calls and text messages as well. Read 9 remaining paragraphs | Comments

Link:
Judge says reporter can’t get public records about cops’ “stingray” use

Steam’s first “Holiday Auction” halted after dupe bug ruins market [Updated]

Update:  Valve has updated its auction site to note that the Gem auctions will return “shortly” and that “an issue with Gems… means we need to reset and start again.” Specifically: All gems created by you will be returned to your Inventory. All Gem purchases from the Community Market will be reimbursed. All Auction bids have been canceled and the Auction will be reset. Trades involving Gems are being investigated on a case-by-case basis. Original Story The virtual “Holiday Auction” Steam first announced yesterday evening seemed like a cute idea at the time. For a limited time, users would be able to trade in unused or unwanted Steam Inventory items for “gems,” which could in turn, starting Monday, be used to bid against others on codes for 2,000 Steam games, 200,000 copies in all. Read 4 remaining paragraphs | Comments

Visit site:
Steam’s first “Holiday Auction” halted after dupe bug ruins market [Updated]