Whole Human Brain Mapped In 3D

ananyo writes “An international group of neuroscientists has sliced, imaged and analysed the brain of a 65-year-old woman to create the most detailed map yet of a human brain in its entirety. The atlas, called ‘BigBrain,’ shows the organization of neurons with microscopic precision, which could help to clarify or even redefine the structure of brain regions obtained from decades-old anatomical studies (abstract). The atlas was compiled from 7,400 brain slices, each thinner than a human hair. Imaging the sections by microscope took a combined 1,000 hours and generated 10 terabytes of data. Supercomputers in Canada and Germany churned away for years reconstructing a three-dimensional volume from the images, and correcting for tears and wrinkles in individual sheets of tissue.” Read more of this story at Slashdot.

Continue reading here:
Whole Human Brain Mapped In 3D

Edward Snowden answers your questions

On the Guardian right now NSA whistleblower Edward Snowden is answering live questions from the world at large. 1) First, the US Government, just as they did with other whistleblowers, immediately and predictably destroyed any possibility of a fair trial at home, openly declaring me guilty of treason and that the disclosure of secret, criminal, and even unconstitutional acts is an unforgivable crime. That’s not justice, and it would be foolish to volunteer yourself to it if you can do more good outside of prison than in it. Second, let’s be clear: I did not reveal any US operations against legitimate military targets. I pointed out where the NSA has hacked civilian infrastructure such as universities, hospitals, and private businesses because it is dangerous. These nakedly, aggressively criminal acts are wrong no matter the target. Not only that, when NSA makes a technical mistake during an exploitation operation, critical systems crash. Congress hasn’t declared war on the countries – the majority of them are our allies – but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we’re not even fighting? So we can potentially reveal a potential terrorist with the potential to kill fewer Americans than our own Police? No, the public needs to know the kinds of things a government does in its name, or the “consent of the governed” is meaningless. The whistleblower behind the biggest intelligence leak in NSA history will be live online at 11am ET/4pm BST to answer your questions about the NSA surveillance revelations        

Read More:
Edward Snowden answers your questions

DHS on border laptop searches: we can’t tell you why this is legal, and we won’t limit searches to reasonable suspicion

The DHS has responded to a Freedom of Information Act request filed by the ACLU asking when and how it decides whose laptop to search at the border. It explained its legal rationale for conducting these searches with a blank page: On Page 18 of the 52-page document under the section entitled “First Amendment,” several paragraphs are completely blacked out. They simply end with the sentence: “The laptop border searches in the [Immigration and Customs Enforcement] and [Customs and Border Protection] do not violate travelers’ First Amendment rights as defined by the courts.” More excellence from “the most transparent administration in American history.” Also, the DHS rejected claims that it should limit searches to situations where it had reasonable grounds for suspicion, because then they would have to explain their suspicion: First, commonplace decisions to search electronic devices might be opened to litigation challenging the reasons for the search. In addition to interfering with a carefully constructed border security system, the litigation could directly undermine national security by requiring the government to produce sensitive investigative and national security information to justify some of the most critical searches. Even a policy change entirely unenforceable by courts might be problematic; we have been presented with some noteworthy CBP and ICE success stories based on hard-to-articulate intuitions or hunches based on officer experience and judgment. Under a reasonable suspicion requirement, officers might hesitate to search an individual’s device without the presence of articulable factors capable of being formally defended, despite having an intuition or hunch based on experience that justified a search. Feds say they can search your laptop at the border but won’t say why [Cyrus Farivar/Ars Technica]        

Read More:
DHS on border laptop searches: we can’t tell you why this is legal, and we won’t limit searches to reasonable suspicion

Pirate Bay outs porno copyright trolls: they’re the ones pirating their own files

Yesterday, I wrote about an expert witness’s report on Prenda Law ( previously ), the notorious porno copyright trolls (they send you letters accusing you of downloading porn and demand money on pain of being sued and forever having your name linked with embarrassing pornography). The witness said that he believed that Prenda — and its principle, John Steele — had been responsible for seeding and sharing the files they accused others of pirating. After hearing about this, the administrators for The Pirate Bay dug through their logs and published a damning selection of log entries showing that many of the files that Steele and his firm accused others of pirating were uploaded by Steele himself, or someone with access to his home PC. The Pirate Bay logs not only link Prenda to the sharing of their own files on BitTorrent, but also tie them directly to the Sharkmp4 user and the uploads of the actual torrent files. The IP-address 75.72.88.156 was previously used by someone with access to John Steele’s GoDaddy account and was also used by Sharkmp4 to upload various torrents. Several of the other IP-addresses in the log resolve to the Mullvad VPN and are associated with Prenda-related comments on the previously mentioned anti-copyright troll blogs. The logs provided by The Pirate Bay can be seen as the missing link in the evidence chain, undoubtedly linking Sharkmp4 to Prenda and John Steele. Needless to say, considering the stack of evidence above it’s not outrageous to conclude that the honeypot theory is viable. While this is certainly not the first time that a copyright troll has been accused of operating a honeypot, the evidence compiled against Prenda and Steel is some of the most damning we’ve seen thus far. The Pirate Bay Helps to Expose Copyright Troll Honeypot [Ernesto/TorrentFreak]        

View the original here:
Pirate Bay outs porno copyright trolls: they’re the ones pirating their own files

How ransomware creeps cash out their payments

Brian Krebs offers an in-depth look at a “cashout” service used by ransomware crooks to get money from their victims. Ransomware is malicious software that encrypts your personal files and demands that you pay a ransom for the key to decrypt them; the crooks who run the attacks demand that their victims buy prepaid MoneyPak cards and send the numbers for them by way of payment. But converting MoneyPaks to cash is tricky — one laundry, which pipes the money through a horse/dog-track betting service — charges a 60% premium. * The ransomware victims who agree to purchase MoneyPak vouchers to regain control over their PCs. * The guys operating the botnets that are pushing ransomware, locking up victim PCs, and extracting MoneyPak voucher codes from victims. * The guy(s) running this cashout service. * The “cashiers” or “cashers” on the back end who are taking the Moneypak codes submitted to the cashing service, linking those codes to fraudulently-obtained prepaid debit cards, and then withdrawing the funds via ATMs and wiring the proceeds back to the cashing service, minus their commission. The cashing service then credits a percentage of the MoneyPak voucher code values to the ransomware peddler’s account. How much does the cashout service charge for all this work? More than half of the value of the MoneyPaks, it would seem. When a user logs in to the criminal service, he is greeted with the following message: “Dear clients, due to decrease of infection rate on exploits we are forced to lift the price. The price is now 0.6. And also, I explained the rules for returns many times, we return only cheques which return on my side if you cash them out after then we lock the account! There are many clients who don’t return anything, and I will work only with these people now. I warn you.” Cashout Service for Ransomware Scammers        

View article:
How ransomware creeps cash out their payments

Ergonomic advice from the 17th century

The 1611 treatise ” A Nevv Booke, containing all sorts of hands vsvally written at this day in Christendome, as the English and French Secretary, the Roman, Italian, French, Spanish, high and low Dutch, Court and Chancerie hands: with Examples of each of them in their proper tongue and Letter. Also an Example of the true and iust proportion of the Romane Capitals. Collected by the best approued writers in these languages” is archived at the Folger Shakespeare Library and features extensive, cutting-edge 17th century advice on penmanship and ergonomics: Place your body right forward, as it shall be most seemly and easie for you: and tourne not you head too much aside, nor bed it downe too lowe, for auoyding of wearines and paine: and for such as haue occasion to sit long, I would wish them to sit soft, for their better enduring to write … Let not your pen be too full of inke, for feare of blotting: and when it writeth not cleane, or is ouer worne, either wipe it, or mend it: If you should write smaller, tourne your pen a little more a side, and write with the lower neb thereof. ‘Hovv Yov Ovght to Hold Your Penne’        

See more here:
Ergonomic advice from the 17th century

Small batch artisanal high-fructose corn syrup

Matt sez, “Maya Weinstein is an artist who just finished her MFA at Parsons, with the awesomest thesis ever: a DIY kit for making your own High-Fructose Corn Syrup , the industrial sweetener that is, well, let’s say problematic these days. “Amazingly, HFCS is not available for consumers to buy, and as Weinstein discovered, making it yourself requires some pretty unusual (and expensive) components, like Glucose Isomerase. But it’s a totally fascinating process, and only the first in what Weinstein hopes will be a series of ‘citizen food science’ kits.” DIY High-Fructose Corn Syrup by Artist Maya Weinstein        

Read More:
Small batch artisanal high-fructose corn syrup

UK film industry requisitions cops for massive raid on suspected pirate, get to question him at police station

In the UK, the movie industry’s lobby group gets to requisition huge numbers of police officers to raid peoples’ houses, solely on their say-so. Here’s the story of one man who was raided by ten cops, who arrived in five cars, along with representatives from FACT (the horribly named Federation Against Copyright Theft). The FACT agents directed the arrest of a 24-year-old man, along with the seizure of all his computers and storage media, on the basis of an “emergency” search-warrant. The FACT agents conducted the bulk of his questioning at the police station, with the cops acting as stenographers. When the man was bailed, the bail sheet specified that he had been arrested for a “miscellaneous offense.” He has been banned from entering any cinemas in England or Wales as a condition of bail. As TorrentFreak notes, FACT offers cash bounties to cinema workers who disrupt people thought to be “cammers” who are recording movies in cinemas. They paid more than a dozen such bounties last year, but did not have a single successful prosecution. “This morning I was arrested at my home under suspicion of recording and distributing Fast and Furious 6 and a few other titles,” the arrested man told TorrentFreak. Mp> After seizing numerous items including three servers, a desktop computer, blank hard drives and blank media, police detained the 24-year-old and transported him to a nearby police station. Despite the ‘emergency’ nature of the raid, no movie recording equipment was found. “At the police station I was interviewed by the police together with FACT (Federation Against Copyright and Theft). During questioning they asked me about Fast and Furious 6, where I obtained a copy from and if I was the one who went and recorded it at the cinema.” Despite police involvement, as in previous cases it appears they were only present in order to gain access to the victim’s property, sit on the sidelines taking notes, and for their powers when it comes to presenting crimes for prosecution. “I was detained for 3 hrs 12 minutes, out of that I was questioned for approximately 40 minutes. One police officer and two FACT officers conducted the interview. The police officer sat back and let FACT do all the questioning, so FACT were running the show,” the man reports. Five Undercover Police Cars Sent To Arrest Single Alleged Movie Pirate [Andy/TorentFreak]        

Read the original:
UK film industry requisitions cops for massive raid on suspected pirate, get to question him at police station

Anatomy of a password-crack, part II

Ars Technica’s Nate Anderson Dan Goodin follows up on Nate Anderson’s excellent piece on the nuts and bolts of password cracking with a further attempt to decrypt an encrypted password file leaked from LivingSocial, this time with the aid of experts. The password file they were working on was encrypted with the relatively weak (and now deprecated) SHA1 hashing algorithm, and they were only attacking it with a single GPU on a commodity PC, and were able to extract over 90% of the passwords in the file. The discussion of the guesswork and refinement techniques used in extracting passwords is absolutely fascinating and really is a must-read. However, the whole exercise is still a bit inconclusive — in the end, we know that a badly encrypted password file is vulnerable to an underpowered password-cracking device. But what we need to know is whether a well-encrypted password file will stand up to a good password-cracking system. The specific type of hybrid attack that cracked that password is known as a combinator attack. It combines each word in a dictionary with every other word in the dictionary. Because these attacks are capable of generating a huge number of guesses—the square of the number of words in the dict—crackers often work with smaller word lists or simply terminate a run in progress once things start slowing down. Other times, they combine words from one big dictionary with words from a smaller one. Steube was able to crack “momof3g8kids” because he had “momof3g” in his 111 million dict and “8kids” in a smaller dict… What was remarkable about all three cracking sessions were the types of plains that got revealed. They included passcodes such as “k1araj0hns0n,” “Sh1a-labe0uf,” “Apr!l221973,” “Qbesancon321,” “DG091101%,” “@Yourmom69,” “ilovetofunot,” “windermere2313,” “tmdmmj17,” and “BandGeek2014.” Also included in the list: “all of the lights” (yes, spaces are allowed on many sites), “i hate hackers,” “allineedislove,” “ilovemySister31,” “iloveyousomuch,” “Philippians4:13,” “Philippians4:6-7,” and “qeadzcwrsfxv1331.” “gonefishing1125” was another password Steube saw appear on his computer screen. Seconds after it was cracked, he noted, “You won’t ever find it using brute force.” Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”        

See the article here:
Anatomy of a password-crack, part II

Computer scientists to FBI: don’t require all our devices to have backdoors for spies

In an urgent, important blog post, computer scientist and security expert Ed Felten lays out the case against rules requiring manufacturers to put wiretapping backdoors in their communications tools. Since the early 1990s, manufacturers of telephone switching equipment have had to follow a US law called CALEA that says that phone switches have to have a deliberate back-door that cops can use to secretly listen in on phone calls without having to physically attach anything to them. This has already been a huge security problem — through much of the 1990s, AT&T’s CALEA controls went through a Solaris machine that was thoroughly compromised by hackers, meaning that criminals could listen in on any call; during the 2005/6 Olympic bid, spies used the CALEA backdoors on the Greek phone company’s switches to listen in on the highest levels of government. But now, thanks to the widespread adoption of cryptographically secured messaging services, law enforcement is finding that its CALEA backdoors are of declining utility — it doesn’t matter if you can intercept someone else’s phone calls or network traffic if the data you’re captured is unbreakably scrambled. In response, the FBI has floated the idea of “CALEA II”: a mandate to put wiretapping capabilities in computers, phones, and software. As Felten points out, this is a terrible idea. If your phone is designed to secretly record you or stream video, location data, and messages to an adverse party, and to stop you from discovering that it’s doing this, it puts you at huge risk when that facility is hijacked by criminals. It doesn’t matter if you trust the government not to abuse this power (though, for the record, I don’t — especially since anything mandated by the US government would also be present in devices used in China, Belarus and Iran) — deliberately weakening device security makes you vulnerable to everyone, including the worst criminals: Our report argues that mandating a virtual wiretap port in endpoint systems is harmful. The port makes it easier for attackers to capture the very same data that law enforcement wants. Intruders want to capture everything that happens on a compromised computer. They will be happy to see a built-in tool for capturing and extracting large amounts of audio, video, and text traffic. Better yet (for the intruder), the capability will be stealthy by design, making it difficult for the user to tell that anything is amiss. Beyond this, the mandate would make it harder for users to understand, monitor, and fix their own systems—which is bad for security. If a system’s design is too simple or its operation too transparent or too easy to monitor, then wiretaps will be evident. So a wiretappability mandate will push providers toward complex, obfuscated designs that are harder to secure and raise the total cost of building and operating the system. Finally, our report argues that it will not be possible to block non-compliant implementations. Many of today’s communication tools are open source, and there is no way to hide a capability within an open source code base, nor to prevent people from simply removing or disabling an undesired feature. Even closed source systems are routinely modified by users—as with jailbreaking of phones—and users will find ways to disable features they don’t want. Criminals will want to disable these features. Ordinary users will also want to disable them, to mitigate their security risks. Felten’s remarks summarize a report [PDF] signed by 20 distinguished computer scientists criticizing the FBI’s proposal. It’s an important read — maybe the most important thing you’ll read all month. If you can’t trust your devices, you face enormous danger. CALEA II: Risks of wiretap modifications to endpoints        

Read more here:
Computer scientists to FBI: don’t require all our devices to have backdoors for spies