Former US cybersecurity official gets 25 years for child porn charges

On Monday, a federal judge in Nebraska sentenced the former acting director of cybersecurity for the US Department of Health and Human Services to 25 years in prison on child porn charges. Timothy DeFoggi, who was convicted back in August 2014, is the sixth person to be convicted in relations to a Nebraska-based child porn Tor-enable website known as PedoBook. That site’s administrator, Aaron McGrath, was sentenced to 20 years last year by the same judge. McGrath famously did not have an administrator password, a mistake that federal investigators were easily able to make use of. DeFoggi’s attorneys did not immediately respond to Ars’ request for comment, but he was almost certainly unmasked via an FBI-created malware exploit designed to expose him and other PedoBook users. Read 3 remaining paragraphs | Comments

View original post here:
Former US cybersecurity official gets 25 years for child porn charges

Comcast just upped its cable modem rental fee from $8 to $10 per month

Comcast users in various parts of the country have already gotten (or may soon get) a lovely holiday present from their ISP—a seemingly inexplicable increase in the cable modem rental fee, from $8 to $10 per month. Eric Studley, of Boston, who posts on reddit as Slayer0606, first pointed out the increase on Tuesday. After reading Studley’s post, Ars encouraged readers who rent Comcast modems to check their bills and found that the increases seem to have taken place as far back as October 2014, while others took effect as of December 20, 2014 and January 1, 2015. The company did not immediately respond to Ars’ request for comment. Read 18 remaining paragraphs | Comments

View article:
Comcast just upped its cable modem rental fee from $8 to $10 per month

California DMV will miss its deadline for driverless car regulations

This week, California’s Department of Motor Vehicles (DMV) announced that it will miss a state Senate deadline to establish public regulations for self-driving cars by January 1, 2015. The Los Angeles Times reports safety concerns are the main motivation behind the delay. Possible regulations will now be discussed at a public workshop in Sacramento in late January, and the DMV will gather feedback from industry, academic, and consumer groups in the meantime.  The   LA Times  notes  ” there are currently no federal safety standards or independent organizations that test the safety of these vehicles.” So according to  USA Today , that leaves the state’s DMV essentially with three courses of action: follow the current US system (manufacturers self-certifying vehicles), opt for a European system (independent companies provide verification), or get into the Herculean task of providing its own testing. Despite the lack of standards for the public, 2014 was a banner year for the advancement of driverless cars. In May, Google publicly revealed the prototype for its in-house built self-driving car , which initially did not include traditional components like a steering wheel, accelerator, brakes, mirrors, or soundsystem. The cars were capped at 25mph and did not allow humans to take over piloting. (Google revealed the first genuine build of its prototype last Monday in a blog post.) Read 2 remaining paragraphs | Comments

Read the article:
California DMV will miss its deadline for driverless car regulations

Watching lava fight with snow in Kamchatka

Depending on the context, volcanic eruptions are either terrifying or transfixing—sometimes both, but rarely neither. The opportunity to safely view the otherworldly spectacle of lava rarely fails to ignite a child-like, giddy wonder. The damage currently being done by a lava flows in the Cape Verde Islands , on the other hand, is heart-breaking. We study these things because they are both lovely and terrible. We want to see a lava flow spill across a snowfield out of curiosity, and we want to better understand the hazards surrounding snow-capped volcanoes out of caution. Benjamin Edwards of Dickinson College and Alexander Belousov and Marina Belousova of Russia’s Institute of Volcanology and Seismology got the opportunity to witness one of these events last year in Russia’s Kamchatka Peninsula. For nine months, Tolbachik spewed basaltic lava flows that ultimately covered 40 square kilometers, reaching as far as 17 kilometers from their source. The lava flows came in two flavors , known to geologists by Hawaiian names. (While frozen Kamchatka doesn’t exactly evoke coconuts and grass skirts, these lavas are similar to those of the Hawaiian volcanoes.) First there’s ‘a’a (pronounced as a staccato “AH-ah”), which ends up a chunky, blocky crumble of basalt. The other is pahoehoe (roughly “puh-HOY-hoy”, which is how volcanologists answer the phone), which flows more like thick batter and can solidify into a surface resembling a pile of ropes. Read 8 remaining paragraphs | Comments

See the article here:
Watching lava fight with snow in Kamchatka

EFF: Feds can’t get around Fourth Amendment via automated data capture

OAKLAND, Calif.—A federal judge spent over four hours on Friday questioning lawyers from the Electronic Frontier Foundation (EFF) and from the Department of Justice in an ongoing digital surveillance-related lawsuit that has dragged on for more than six years. During the hearing, US District Judge Jeffrey White heard arguments from both sides in his attempt to wrestle with the plaintiffs’ July 2014 motion for partial summary judgment . He went back and forth between the two sides, hearing answers to his list of 12 questions that were published earlier this week in a court filing. That July 2014 motion asks the court to find that the government is “violating the Fourth Amendment by their ongoing seizures and searches of plaintiffs’ Internet communications.” The motion specifically doesn’t deal with allegations of past government wrongdoing, nor other issues in the broader case. Read 17 remaining paragraphs | Comments

See original article:
EFF: Feds can’t get around Fourth Amendment via automated data capture

Computer intrusion inflicts massive damage on German steel factory

A German steel factory suffered significant damage after attackers gained unauthorized access to computerized systems that help control its blast furnace, according to a report published Friday by IDG News. The attackers took control of the factory’s production network through a spear phishing campaign, IDG said, citing a report published Wednesday by the German government’s Federal Office for Information Security. Once the attackers compromised the network, individual components or possibly entire systems failed. IDG reporter Loek Essers wrote: Due to these failures, one of the plant’s blast furnaces could not be shut down in a controlled manner, which resulted in “massive damage to plant,” the BSI said, describing the technical skills of the attacker as “very advanced.” The attack involved the compromise of a variety of different internal systems and industrial components, BSI said, noting that not only was there evidence of a strong knowledge of IT security but also extended know-how of the industrial control and production process. The incident is notable because it’s one of the few computer intrusions to cause physical damage. The Stuxnet worm that targeted Iran’s uranium enrichment program has been dubbed the world’s first digital weapon, destroying an estimated 1,000 centrifuges. Last week, Bloomberg News reported that a fiery blast in 2008 that hit a Turkish oil pipeline was the result of hacking , although it’s not clear if the attackers relied on physical access to computerized controllers to pull it off. The suspected sabotage of a Siberian pipeline in 1982 is believed to have used a logic bomb. Critics have long argued that much of the world’s factories and critical infrastructure aren’t properly protected against hackers. Read on Ars Technica | Comments

Visit link:
Computer intrusion inflicts massive damage on German steel factory

NASA just e-mailed a wrench to space

When International Space Station  Commander Barry Wilmore needed a wrench,  NASA  knew just what to do. They “e-mailed” him one. This is the first time an object has been designed on Earth and then transmitted to space for manufacture. Made In Space, the California company that designed the 3D printer aboard the ISS, overheard Wilmore mentioning the need for a ratcheting socket wrench and decided to create one.  Previously, if an astronaut needed a specific tool it would have to be flown up on the next mission to the ISS , which could take months. This isn’t the first 3D-printed object made in space , but it is the first created to meet the needs of an astronaut. In November astronauts aboard the ISS printed a replacement part for the recently installed 3D printer. A total of 21 objects have now been printed in space, all of which will be brought back to Earth for testing. Read 4 remaining paragraphs | Comments

More:
NASA just e-mailed a wrench to space

T-Mobile gives up fight over cramming fees, will pay $90M back to customers

T-Mobile US has given up its fight against a lawsuit filed by the US government, agreeing  today to refund $90 million or more to customers who were charged premium text message fees without their consent. The Federal Trade Commission alleged that T-Mobile made hundreds of millions of dollars off the practice of passing along third-party charges to customers without their authorization and taking a commission on each charge. T-Mobile could end up paying much more than $90 million. “The settlement requires that they provide full refunds to consumers, with a total of ‘at least’ $90 million,” an FTC spokesperson explained. “The $90 million is a floor. If they receive refund requests of more than that, they have to provide them.” In addition to everything it pays back customers, T-Mobile will pay $18 million in fines and penalties to state attorneys general and $4.5 million to the Federal Communications Commission. If T-Mobile receives less than $90 million worth of refund requests, the extra fines can be counted toward the minimum payment of $90 million. If the payment is still under $90 million, “the balance must be remitted to the FTC for additional consumer redress, consumer education, or other uses,” the FTC said. Read 5 remaining paragraphs | Comments

Original post:
T-Mobile gives up fight over cramming fees, will pay $90M back to customers

Activist group sues San Diego Police Department over “stingray” records

A legal advocacy group has sued the San Diego Police Department (SDPD) and the city of San Diego in an attempt to force the release of public records relating to stingrays, also known as cell-site simulators. Stingrays are often used covertly by local and federal law enforcement to locate target cellphones and their respective owners. However, stingrays also sweep up cell data of innocent people nearby who have no idea that such collection is taking place. Stingrays can be used to intercept voice calls and text messages as well. Earlier this week, a local judge in Arizona ruled that a local reporter could not receive similar stingray documents from the Tucson Police Department because disclosure “would give criminals a road map for how to defeat the device, which is used not only by Tucson but other local and national police agencies.” Read 5 remaining paragraphs | Comments

Originally posted here:
Activist group sues San Diego Police Department over “stingray” records

ICANN e-mail accounts, zone database breached in spearphishing attack

Unknown attackers used a spearphishing campaign to compromise sensitive systems operated by the Internet Corporation for Assigned Names and Numbers (ICANN), a coup that allowed them to take control of employee e-mail accounts and access personal information of people doing business with the group. ICANN, which oversees the Internet’s address system, said in a release published Tuesday that the breach also gave attackers administrative access to all files stored in its centralized zone data system , as well as the names, postal addresses, e-mail addresses, fax and phone numbers, user names, and cryptographically hashed passwords of account holders who used the system. Domain registries use the database to help manage the current allocation of hundreds of new generic top level domains (gTLDs) currently underway. Attackers also gained unauthorized access to the content management systems of several ICANN blogs. “We believe a ‘spear phishing’ attack was initiated in late November 2014,” Tuesday’s press release stated. “It involved email messages that were crafted to appear to come from our own domain being sent to members of our staff. The attack resulted in the compromise of the email credentials of several ICANN staff members.” Read 4 remaining paragraphs | Comments

Original post:
ICANN e-mail accounts, zone database breached in spearphishing attack