Cellphones

Police Can Obtain Cellphone Location Records Without a Warrant 142

Posted by Soulskill
from the your-data-is-our-data dept.
mi writes: A new ruling from the 11th Circuit Court of Appeals found by a margin of 9-2 that law enforcement does not need to get a warrant to grab your cell phone's location records. The justices ruled that there is no expectation of privacy for your location when you're using a cell phone. This decision (PDF) was based on a case in which a man was convicted of robbery after months of location data was given to authorities by his cell phone carrier, MetroPCS. Police got the information using a court order, rather than a warrant, because there were less stringent requirements involved. One of the judges wrote: "We find no reason to conclude that cellphone users lack facts about the functions of cell towers or about telephone providers' recording cell tower usage."
Communications

How the NSA Converts Spoken Words Into Searchable Text 146

Posted by timothy
from the message-could-not-be-lawfullly-transcribed dept.
Presto Vivace writes: Dan Froomkin reports at The Intercept: "Though perfect transcription of natural conversation apparently remains the Intelligence Community's 'holy grail,' the Snowden documents describe extensive use of keyword searching as well as computer programs designed to analyze and 'extract' the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest." I am torn between admiration of the technical brilliance of building software like this and horror as to how it is being used. It can't just be my brother and me who like to salt all phone conversations with interesting keywords.
Businesses

Appeals Judge Calls Prenda an "Ingenious Crooked Extortionate Operation" 64

Posted by timothy
from the bad-actor-seems-a-fair-description dept.
ktetch-pirate ("pirate politician" Andrew Norton) writes with this news from his blog: [Monday] was the long-awaited appeals court hearing in the ongoing Prenda copyright troll saga. Almost exactly two years after Judge Otis Wright went sci-fi on Prenda and its principles, the 9th Circuit Court of Appeals held an appeals hearing requested by Prenda on the sanctions, and it was not a pretty day for Prenda. Highlights included Senior Judge Pregerson calling Prenda's operation an "Ingenious Crooked Extortionate Operation" after describing in detail how they operate.

Prenda also astonished the judges by welcoming the idea of a criminal contempt hearing, which Legal blog Popehat thinks is likely to happen, on top of the sanctions being sustained.
Windows

Single Verizon IP Address Used For Hundreds of Windows 7 Activations 295

Posted by samzenpus
from the you-might-want-to-tone-it-down-a-little dept.
An anonymous reader writes with this story from TorrentFreak: A presumed pirate with an unusually large appetite for activating Windows 7 has incurred the wrath of Microsoft. In a lawsuit filed [in] a Washington court, Microsoft said that it logged hundreds of suspicious product activations from a single Verizon IP address and is now seeking damages. ... Who he, she or they are behind address 74.111.202.30 is unknown at this point, but according to Microsoft they're responsible for some serious Windows pirating. "As part of its cyberforensic methods, Microsoft analyzes product key activation data voluntarily provided by users when they activate Microsoft software, including the IP address from which a given product key is activated," the lawsuit reads. The company says that its forensic tools allow the company to analyze billions of activations of software and identify patterns "that make it more likely than not" that an IP address associated with activations is one through which pirated software is being activated.
Programming

Singapore's Prime Minister Shares His C++ Sudoku Solver Code 222

Posted by samzenpus
from the prime-programmer dept.
itwbennett writes: Several weeks ago, during a speech at the Founders Forum Smart Nation Singapore Reception, Singapore's prime minister Lee Hsien Loong said that he used to enjoy programming, and that the last program he wrote was a Sudoku solver in C++. To back that up, earlier today he announced (on Facebook and Twitter) that his code is available to download. He wrote on Facebook that he wrote the program 'several years ago' and that the code does 'a backtrack search, choosing the next cell to guess which minimises the fanout.'
Privacy

Researchers Detect Android Apps That Connect to User Tracking and Ad Sites 68

Posted by samzenpus
from the don't-track-me-bro dept.
An anonymous reader writes: A group of European researchers has developed software that tracks the URLs to which cellphone apps connect. After downloading 2,000+ free apps from Google Play, they indexed all the sites those apps connected to, and compared them to a list of known advertising and user tracking sites. "In total, the apps connect to a mind-boggling 250,000 different URLs across almost 2,000 top level domains. And while most attempt to connect to just a handful of ad and tracking sites, some are much more prolific. Vigneri and co give as an example "Music Volume Eq," an app designed to control volume, a task that does not require a connection to any external urls. And yet the app makes many connections. 'We find the app Music Volume EQ connects to almost 2,000 distinct URLs,' they say. [Another major offender] is an app called Eurosport Player which connects to 810 different user tracking sites." The researchers plan to publish their software for users to try out on Google Play soon.
China

China Takes Its Already Strict Internet Regulations One Step Further 48

Posted by samzenpus
from the watch-what-you-say dept.
New submitter DaveS7 writes with this story about new regulations from the Chinese government designed to further crack down on online media. Chinese authorities have released a new set of regulations for online media, raising concerns about tightening control over freedom of expression by the Communist regime. Contained in the ordinance, released on April 28 by the Cyberspace Administration of China, is a clause saying that persons responsible for managing flagged sites will be summoned by state personnel in case of violations. Internet censorship in China is mostly managed by individual websites, which are encouraged to toe the Party line before the Party steps in to rectify things for them. The new ordinance increases the number of conditions that, if met by online media, result in automatic state intervention.
Privacy

US Gov't Will Reveal More About Its Secret Cellphone Tracking Devices 94

Posted by Soulskill
from the they-also-say-you-should-call-your-mom-more dept.
An anonymous reader writes: The U.S. Department of Justice has launched a major review of how law enforcement around the country uses cellphone tracking technology, and they will also begin sharing more information about how it works. So-called "Stingray" devices have been in the news a lot recently, as privacy activists try to piece together how they're used. Police and federal agencies have been notably resistant to sharing how they use this tool, even after we learned that they often don't bother with warrants and may have been drastically overusing it. Still, they're not going to reveal everything about the Stingrays: "Officials said they don't want to reveal so much that it gives criminals clues about how to defeat the devices. Law-enforcement officials also don't want to reveal information that would give new ammunition to defense lawyers in prosecutions where warrants weren't used, according to officials involved in the discussions."
China

Uber Office Raided By Police In China, Accused of Running 'Illegal' Car Business 174

Posted by timothy
from the didn't-ask-enough-permission dept.
albert555 writes: Uber's curse keeps on striking after Uber's office in the southern Chinese city of Guangzhou was raided by authorities on the 30th of April 2015. Uber is accused of running an 'illegal' transport service, according to the Guangzhou Daily. Uber has been implanted in China since August 2013 and is suspected of not having the proper qualifications to run a private car business in the city. Following the recent German court ban two weeks ago, who will win the fight for private transportation? Long-term, established transportation companies with powerful lobbying arms or the newcomer making use of disruptive technology? Does Schumpeter's creative destruction also apply to the transportation sector?
Communications

WikiLeaks' Anonymous Leak Submission System Is Back After Nearly 5 Years 26

Posted by timothy
from the drop-'em-a-line dept.
Sparrowvsrevolution writes: On Friday, WikiLeaks announced that it has finally relaunched a beta version of its leak submission system after a 4.5 year hiatus. That file-upload site, which once served as a central tool in WIkiLeaks' leak-collecting mission, runs on the anonymity software Tor to allow uploaders to share documents and tips while protecting their identity from any network eavesdropper, and even from WikiLeaks itself. In 2010 the original submission system went down amid infighting between WikiLeaks' leaders and several of its disenchanted staffers, including several who left to create their own soon-to-fail project called OpenLeaks. WikiLeaks founder Julian Assange says that the new system, which was delayed by his legal troubles and the banking industry blockade against the group, is the final result of "four competing research projects" WikiLeaks launched in recent years. He adds that it has several less-visible submission systems in addition to the one it's now revealed. "Currently, we have one public-facing and several private-facing submission systems in operation, cryptographically, operationally and legally secured with national security sourcing in mind," Assange writes.
Censorship

Two Gunman Killed Outside "Draw the Prophet" Event In Texas 1047

Posted by timothy
from the unspeakable-acts-undrawable-subjects dept.
cosm writes: ABC news reports that two armed gunman were shot and killed outside a "Draw the Prophet" event hosted in Garland Texas. From the article: "The event, sponsored by the American Freedom Defense Initiative, featured cartoons of the Prophet Muhammad, and scheduled speakers included Dutch MP Geert Wilders, who has campaigned to have the Quran banned in the Netherlands. The winner of the contest was to receive $10,000." In light of the Charlie Hebdo terrorist attacks, the Lars Vilks Muhammad drawing controversies, and the American show South Park's satirical depiction of the state of Muhammad phobia in the US and elsewhere, is there an end in sight to the madness associated with the representation of this religious figure?
Communications

VA Tech Student Arrested For Posting Perceived Threat Via Yik Yak 250

Posted by timothy
from the how-to-win-friends-and-influence-people dept.
ememisya writes: I wonder if I posted, "There will be another 12/7 tomorrow, just a warning." around December, would people associate it with Pearl Harbor and I would find myself arrested, or has enough time passed for people to not look at the numbers 12 and 7 and take a knee jerk reaction? A student was arrested for "Harassment by Computer" (a class 1 misdemeanor in the state of Virginia) due to his post on an "anonymous" website [Yik Yak]. Although the post in and of itself doesn't mean anything to most people in the nation, it managed to scare enough people locally for law enforcement agencies to issue a warrant for his arrest. "Moon, a 21-year-old senior majoring in business information technology, is being charged with Harassment by Computer, which is a class one misdemeanor. Tuesday night, April 28, a threat to the Virginia Tech community was posted on the anonymous social media app Yik Yak. Around 11:15 p.m., an unknown user posted 'Another 4.16 moment is going to happen tomorrow. Just a warning (sic).' The Virginia Tech Police Department released a crime alert statement Wednesday morning via email informing students that VTPD was conducting an investigation throughout the night in conjunction with the Blacksburg Police Department."
The Media

Statues of Assange, Snowden and Manning Go Up In Berlin 157

Posted by timothy
from the and-there-they-are dept.
HughPickens.com writes: RT Times reports that Alexanderplatz square in Berlin has become the stage for a provocative art piece which celebrates whistleblowers and encourages ordinary citizens to speak out. "They have lost their freedom for the truth, so they remind us how important it is to know the truth," says sculptor Davide Dormino. The life-sized statues of the three whistleblowers stand upon three chairs, as if speaking in an impromptu public meeting. Next to them is a fourth, empty chair. "The fourth chair is open to anyone here in Berlin who wants to get up and say anything they want," says the artist. Dormino, who came up with the idea together with the US journalist Charles Glass, specifically chose a classical bronze statue for his depiction – and not an installation or abstract piece – since statues are usually made of establishment figures. According to Domino while men who order others to their deaths get immortalized, those who resist are often forgotten, so "the statue pays homage to three who said no to war, to the lies that lead to war and to the intrusion into private life that helps to perpetuate war." Activists and members of Germany's Green party unveiled the life-size bronze statues on May Day.
Education

Unable To Hack Into Grading System, Georgia Student Torches Computer Lab 244

Posted by timothy
from the our-son dept.
McGruber writes: A 15 year-old Douglas County, Georgia high school student has been charged with five felonies, including burglary and arson, after sheriff's deputies caught him while responding to a 1 AM fire at Alexander High School. The boy admitted to investigators that he set fire to a computer after trying, unsuccessfully, to hack into the school computer system to change his grade on a failed test. "It's very sad and tragic. He could have very easily come to one of his counselors and asked for help," said Lt. Glenn Daniel with the Douglas County Sheriff's Department. "From what we can tell, (the student) was mad and frustrated because he could not hack into the system." Lt. Daniel said the charges could land the young man in prison for several years. The computer lab was cleaned up and re-opened in time for the start of that day's classes.
Privacy

Hacking the US Prescription System 78

Posted by timothy
from the quite-a-dose-you're-taking dept.
An anonymous reader writes: It appears that most pharmacies in the US are interconnected, and a breach in one leads to access to the other ones. A security advisory released [Friday] shows how a vulnerability in an online pharmacy granted access to prescription history for any US person with just their name and date of birth. From the description linked above: During the signup process, PillPack.com prompts users for their identifying information. In the end of the signup rocess, the user is shown a list of their existing prescriptions in all other pharmacies in order to make the process of transferring them to PillPack.com easier. ... To replicate this issue, an attacker would be directed to the PillPack.com website and choose the signup option. As long as the full name and the date of birth entered during signup match the target, the attacker will gain access to the target's full prescription history.
Crime

In Second Trial, Ex-Goldman Sachs Programmer Convicted of Code Theft 84

Posted by timothy
from the ok-that-information-did-not-want-to-be-free dept.
Ars Technica reports that A former Goldman Sachs programmer—featured in the book Flash Boys—was convicted on Friday for stealing high-speed trading code from the bank. Sergey Aleynikov, 45, was also acquitted on one count of unlawful duplication, according to Reuters. The New York state jury could not come to a verdict on another count of unlawful use of secret scientific material. Sergey Aleynikov was also acquitted of unlawful duplication. This was the second trial for Aleynikov in five years. He could face up to four years in prison.
Space

NASA Gets Its Marching Orders: Look Up! Look Out! 179

Posted by timothy
from the well-those-might-be-more-like-suggestions dept.
TheRealHocusLocus writes: HR 2039: the National Aeronautics and Space Administration Authorization Act for 2016 and 2017 (press release, full text, and as a pretty RGB bitmap) is in the House. In $18B of goodies we see things that actually resemble a space program. The ~20,000 word document is even a good read, especially the parts about decadal cadence. There is more focus on launch systems and manned exploration, also to "expand the Administration's Near-Earth Object Program to include the detection, tracking, cataloguing, and characterization of potentially hazardous near-Earth objects less than 140 meters in diameter." I find it awesome that the fate of the dinosaurs is explicitly mentioned in this bill. If it passes we will have a law with dinosaurs in it. Someone read the T-shirt. There is also a very specific six month review of NASA's "Earth science global datasets for the purpose of identifying those datasets that are useful for understanding regional changes and variability, and for informing applied science research." Could this be an emerging Earth Sciences turf war between NOAA and NASA? Lately it seems more of a National Atmospheric Space Administration. Mission creep, much?
Government

Bernie Sanders, Presidential Candidate and H-1B Skeptic 391

Posted by timothy
from the never-eat-or-hire-or-grow-fruit-outside-your-zipcode dept.
Presto Vivace writes: The H-1B visa issue rarely surfaces during presidential races, and that's what makes the entrance by Sen. Bernie Sanders (I-Vt.) into the 2016 presidential race so interesting. ... ...Sanders is very skeptical of the H-1B program, and has lambasted tech firms for hiring visa workers at the same time they're cutting staff. He's especially critical of the visa's use in offshore outsourcing.
United States

Inside the Military-Police Center That Spies On Baltimore's Rioters 200

Posted by timothy
from the cynics-were-optimists dept.
Lasrick writes: Adam Weinstein on a program designed to catch terrorists attacking Baltimore that is now being used to spy on protesters: 'On Ambassador Road, just off I-695 around the corner from the FBI, nearly 100 employees sit in a high-tech suite and wait for terrorists to attack Baltimore. They've waited 11 years. But they still have plenty of work to do, like using the intel community's toys to target this week's street protests.' Great read.
Graphics

My High School CS Homework Is the Centerfold 609

Posted by timothy
from the awfully-thin-skin dept.
theodp writes: To paraphrase the J. Geils Band, Maddie Zug's high school computer science homework is the centerfold. In a Washington Post op-ed, Zug, a student at the top-ranked Thomas Jefferson High School for Science and Technology, argues that a centerfold does not belong in the classroom. "I first saw a picture of Playboy magazine's Miss November 1972 a year ago as a junior at TJ," Zug explains. "My artificial intelligence teacher told our class to search Google for Lena Soderberg (not the full image, though!) and use her picture to test our latest coding assignment...Soderberg has a history with computer science. In the 1970s, male programmers at the University of Southern California needed to test their image-processing algorithm. They scanned what they had handy: the centerfold of a Playboy magazine. Before long, the image became a convention in industry and academia." (Wikipedia has a nice background, too.)