Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Privacy

Baltimore Police Used Stingrays For Phone Tracking Over 25,000 Times 45

Posted by Soulskill
from the i-don't-remember-that-episode-of-The-Wire dept.
An anonymous reader writes The Baltimore Police Department is starting to come clean about its use of cell-phone signal interceptors — commonly known as Stingrays — and the numbers are alarming. According to recent court testimony reported by The Baltimore Sun, the city's police have used Stingray devices with a court order more than 25,000 times. It's a massive number, representing an average of nearly nine uses a day for eight years (the BPD acquired the technology in 2007), and it doesn't include any emergency uses of the device, which would have proceeded without a court order.
Crime

New Dark Web Market Is Selling Zero-Day Exploits 28

Posted by samzenpus
from the finest-crime dept.
Sparrowvsrevolution writes Over the last month, a marketplace calling itself TheRealDeal Market has emerged on the dark web, with a focus on sales of hackers' zero-day attack methods. Like the Silk Road and its online black market successors like Agora and the recently defunct Evolution, TheRealDeal runs as a Tor hidden service and uses bitcoin to hide the identities of its buyers, sellers, and administrators. But while some other sites have sold only basic, low-level hacking tools and stolen financial details, TheRealDeal's creators say they're looking to broker premium hacker data like zero-days, source code, and hacking services, often offered on an exclusive, one-time sale basis.

Currently an iCloud exploit is being offered for sale on the site with a price tag of $17,000 in bitcoin, claiming to be a new method of hacking Apple iCloud accounts. "Any account can be accessed with a malicious request from a proxy account," reads the description. "Please arrange a demonstration using my service listing to hack an account of your choice." Others include a technique to hack WordPress' multisite configuration, an exploit against Android's Webview stock browser, and an Internet Explorer attack that claims to work on Windows XP, Windows Vista and Windows 7, available for around $8,000 in bitcoin. None of these zero days have yet been proven to be real, but an escrow system on the site using bitcoin's multisignature transaction feature is designed to prevent scammers from selling fake exploits.
Crime

Oklahoma Says It Will Now Use Nitrogen Gas As Its Backup Method of Execution 555

Posted by timothy
from the that's-not-the-only-cost dept.
schwit1 writes Yesterday, Oklahoma governor Mary Fallin signed into law a bill that approves the use of nitrogen gas for executions in the state. The method, which would effectively asphyxiate death row inmates by forcing them to breathe pure nitrogen through a gas mask, is meant to be the primary alternative to lethal injection, the Washington Post reports.

Fallin and other supporters of the procedure say it's pain-free and effective, noting that the nitrogen would render inmates unconscious within ten seconds and kill them in minutes. It's also cheap: state representatives say the method only requires a nitrogen tank and a gas mask, but financial analysts say its impossible to give precise figures, the Post reports.

Oklahoma's primary execution method is still lethal injection, but the state's procedure is currently under review by the Supreme Court. Earlier this week, Tennessee suspended executions statewide following challenges to its own lethal injection protocol.
The Courts

FBI Overstated Forensic Hair Matches In Nearly All Trials Before 2000 166

Posted by timothy
from the why-the-house-wins-so-often dept.
schwit1 writes The Justice Department and FBI have formally acknowledged that nearly every examiner in an elite FBI forensic unit gave flawed testimony in almost all trials in which they offered evidence against criminal defendants over more than a two-decade period before 2000. Of 28 examiners with the FBI Laboratory's microscopic hair comparison unit, 26 overstated forensic matches in ways that favored prosecutors in more than 95 percent of the 268 trials reviewed so far, according to the National Association of Criminal Defense Lawyers (NACDL) and the Innocence Project, which are assisting the government with the country's largest post-conviction review of questioned forensic evidence. The cases include those of 32 defendants sentenced to death. Of those, 14 have been executed or died in prison, the groups said under an agreement with the government to release results after the review of the first 200 convictions.
Transportation

Dutch Prosecutors Launch Criminal Investigation Against Uber For Flouting Ban 48

Posted by timothy
from the red-lights-and-red-tape dept.
An anonymous reader writes Dutch prosecutors have announced that they are prosecuting taxi-hailing giant Uber for continuing to disregard last December's ban on the company offering its unlicensed UberPOP service in the Netherlands. The statement declares 'The company Uber is now a suspect...This means a preliminary examination will be started to collect evidence that Uber is providing illegal transportation on a commercial basis,'. Dutch police presented evidence to the prosecutors of UberPOP drivers in Amsterdam ignoring the ban, and at the time of writing the UberPOP service is still available via Uber's Amsterdam website [https://www.uber.com/cities/amsterdam]. Though Uber inspires new litigation on a weekly basis in the territories in which it is seeking to consolidate its services, this is the first time it has been the subject of a criminal prosecution.
Crime

Can Online Reporting System Help Prevent Sexual Assaults On Campus? 232

Posted by timothy
from the vote-early-and-often dept.
jyosim writes Studies have shown that as many as 90 percent of campus rapes are committed by repeat offenders. A new system is designed to help identify serial assaulters, by letting students anonymously report incidents in order to look for patterns. But some argue that having the ability to report someone with just the click of a button may not be a good thing. Andrew T. Miltenberg, a New York lawyer who represents young men accused of sexual misconduct, says though the system seems well intended, he is concerned about dangers it may pose to students who are accused. 'We're all guilty of pressing send on an angry text or email that, had we had to put it into an actual letter and proofread, we probably wouldn't have sent,' he says.
Crime

Allegation: Lottery Official Hacked RNG To Score Winning Ticket 342

Posted by timothy
from the his-number-was-up dept.
SternisheFan writes with this excerpt from Ars Technica about what may be the most movie-worthy real-life crime story of the year so far: Eddie Raymond Tipton, 51, may have inserted a thumbdrive into a highly locked-down computer that's supposed to generate the random numbers used to determine lottery winners, The Des Moines Register reported, citing court documents filed by prosecutors. At the time, Tipton was the information security director of the Multi-State Lottery Association, and he was later videotaped purchasing a Hot Lotto ticket that went on to fetch the winning $14.3 million payout.

In court documents filed last week, prosecutors said there is evidence to support the theory Tipton used his privileged position inside the lottery association to enter a locked room that housed the random number generating computers and
infect them with software that allowed him to control the winning numbers. The room was enclosed in glass, could only be entered by two people at a time, and was monitored by a video camera. To prevent outside attacks, the computers aren't connected to the Internet. Prosecutors said Tipton entered the so-called draw room on November 20, 2010, ostensibly to change the time on the computers. The cameras on that date recorded only one second per minute rather than running continuously like normal.

"Four of the five individuals who have access to control the camera's settings will testify they did not change the cameras' recording instructions," prosecutors wrote. "The fifth person is defendant. It is a reasonable deduction to infer that defendant tampered with the camera equipment to have an opportunity to insert a thumbdrive into the RNG tower without detection."
Crime

Watch DARPA Artificial Intelligence Search For Crime On the "Dark Web" 35

Posted by samzenpus
from the seek-it-out dept.
An anonymous reader shares this bit of news from DARPA. "Of late, DARPA has shown a growing interest in open sourcing its technology, even if its most terrifying creations, like army robot wildcats designed to reach speeds of 50Mph, are understandably kept private. In a week’s time, the wider world will be able to tinker with components of the military research body’s in-development search tool for the dark web. The Memex technology, named after an mechanical mnemonic dreamt up just as the Second World War was coming to a close, has already been put to use by a number of law enforcement agencies, who are looking to counter crime taking place on networks like Tor, where Hidden Services are protected by the privacy-enhancing, encrypted hosting, often for good, often for bad. In its first year, the focus at Memex has been on tracking human trafficking, but the project's scope stretches considerably wider."
Crime

Would-Be Bomber Arrested In Kansas; Planned Suicide Attack on Ft. Riley 297

Posted by timothy
from the well-that's-not-nice dept.
The Associated Press (as carried by the Boston Herald) reports that a 20-year old Topeka man has been arrested as he attempted to arm what he believed to be a thousand-pound bomb outside Ft. Riley, Kansas. John T. Booker Jr. is alleged to have planned an attack in conspiracy with others who were actually FBI agents; Booker's postings to Facebook in March 2014 about his desire to die as a martyr brought him to the FBI's attention, and the FBI sting operation which ended in his arrest began after these posts. Booker had been recruited by the U.S. Army in February of last year, but his enlistment was cancelled shortly thereafter.
Crime

Florida Teen Charged With Felony Hacking For Changing Desktop Wallpaper 626

Posted by Soulskill
from the climate-of-fear dept.
colinneagle writes: A 14-year-old middle school student in Holiday, Florida, was arrested this week and charged with "an offense against a computer system and unauthorized access," which is a felony. The student reportedly used an administrator password to log into a teacher's computer and change the background image to a photo of two men kissing.

The student also revealed his secrets after he was caught – the password was the teacher's last name, and the teacher had typed it in in full view of the students. The student said many other students used these administrators' passwords (their teachers' last names) so they can screen-share and video chat with other students. The student was briefly held in a nearby detention center, and the county Sheriff warned that other teenagers caught doing the same thing will "face the same consequences."
Crime

The Courage of Bystanders Who Press "Record" 489

Posted by samzenpus
from the doing-the-right-thing dept.
HughPickens.com writes Robinson Meyer writes in The Atlantic that in the past year, after the killings of Michael Brown and Tamir Rice, many police departments and police reformists have agreed on the necessity of police-worn body cameras. But the most powerful cameras aren't those on officer's bodies but those wielded by bystanders. We don't yet know who shot videos of officer Michael T. Slager shooting Walter Scott eight times as he runs away but "unknown cameramen and women lived out high democratic ideals: They watched a cop kill someone, shoot recklessly at someone running away, and they kept the camera trained on the cop," writes Robinson. "They were there, on an ordinary, hazy Saturday morning, and they chose to be courageous. They bore witness, at unknown risk to themselves."

"We have been talking about police brutality for years. And now, because of videos, we are seeing just how systemic and widespread it is," tweeted Deray McKesson, an activist in Ferguson, after the videos emerged Tuesday night. "The videos over the past seven months have empowered us to ask deeper questions, to push more forcefully in confronting the system." The process of ascertaining the truth of the world has to start somewhere. A video is one more assertion made about what is real concludes Robinson. "Today, through some unknown hero's stubborn internal choice to witness instead of flee, to press record and to watch something terrible unfold, we have one more such assertion of reality."
United States

US Started Keeping Secret Records of International Telephone Calls In 1992 81

Posted by samzenpus
from the original-list dept.
schwit1 writes Starting in 1992, the Justice Department amassed logs of virtually all telephone calls from the USA to as many as 116 countries. The now-discontinued operation, carried out by the DEA's intelligence arm, was the government's first known effort to gather data on Americans in bulk, sweeping up records of telephone calls made by millions of U.S. citizens regardless of whether they were suspected of a crime. It was a model for the massive phone surveillance system the NSA launched to identify terrorists after the Sept. 11 attacks. That dragnet drew sharp criticism that the government had intruded too deeply into Americans' privacy after former NSA contractor Edward Snowden leaked it to the news media two years ago. More than a dozen current and former law enforcement and intelligence officials described the details of the Justice Department operation to USA TODAY. Most did so on the condition of anonymity because they were not authorized to publicly discuss the intelligence program, part of which remains classified. The operation had 'been approved at the highest levels of Federal law enforcement authority,' including then-Attorney General Janet Reno and her deputy, Eric Holder.
Crime

AT&T Call Centers Sold Mobile Customer Information To Criminals 92

Posted by samzenpus
from the was-that-wrong? dept.
itwbennett writes Employees at three call centers in Mexico, Colombia and the Philippines sold hundreds of thousands of AT&T customer records, including names and Social Security numbers, to criminals who attempted to use the customer information to unlock stolen mobile phones, the U.S. Federal Communications Commission said. AT&T has agreed to pay a $25 million civil penalty, which is the largest related to a data breach and customer privacy in the FCC's history.
Crime

Verdict Reached In Boston Bombing Trial 250

Posted by samzenpus
from the verdict's-in dept.
An anonymous reader writes "A Boston jury has reached a verdict in the trial of Dzhokhar Tsarnaev, who admitted that he planted a bomb at the finish line of the Boston Marathon that left three dead and wounded 264 others. After deliberating for 11½ hours the jury has found Dzhokhar guilty on all 30 charges brought against him."
Crime

Watching a "Swatting" Slowly Unfold 246

Posted by samzenpus
from the in-gory-detail dept.
netbuzz writes That online gamers have been victimized has unfortunately allowed us to see what "swatting" looks like from the perspective of the target: terrifying and potentially deadly. A similar type of criminally unnecessary SWAT scene played out Saturday night when a caller to police in Hopkinton, Mass., claimed to be holed up in the town's closed public library with two hostages and a bomb. The library stands within eyesight of the starting line for the Boston Marathon. An editor for Network World, there by happenstance, watched for two hours, and, while it was a hoax and no one was hurt, his account highlights the disruption and wastefulness these crimes inflict.
The Courts

'Revenge Porn' Operator Gets 18 Years In Prison 230

Posted by timothy
from the save-us-al-franken dept.
Frosty Piss writes Kevin Christopher Bollaert, who operated a 'revenge porn' web site, was been found guilty in February of six counts of extortion and 21 counts of identity theft. He faced a maximum of 23 years in prison. On Friday, April 3rd, he was sentenced to 18 years in prison. The extortion charges stem from a second web site he ran that solicited payments of $250 to $350 from people who wanted to have the photographs deleted. Bollaert made about $30,000 on that site.
Crime

Al Franken Urges FBI To Prosecute "Revenge Porn" 306

Posted by timothy
from the oughtta-be-a-law dept.
mi contributes this excerpt from National Journal: "Sen. Al Franken is urging the FBI to more quickly and aggressively pursue and respond to reports of revenge porn, marking a rare burst of attention on a controversial topic about which Congress has typically been quiet. In a letter to FBI Director James Comey, the Minnesota Democrat asked for more information about the agency's authority to police against revenge porn, or the act of posting explicit sexual content online without the subject's consent, often for purposes of humiliation and extortion. Its popularity has ballooned in recent years, and victims are disproportionately women." Here's Franken's letter.
News

Wastelanders Decry Lack of Change In Punishment Wheel 37

Posted by samzenpus
from the bust-a-deal dept.
If you've spent time in the wasteland you've no doubt gone to Bartertown. Famous for its functioning walls, the oasis gives traders a chance to watch people battle to the death in a giant cage and deal busters spin The Wheel to learn their fate. While most wanderers enjoy watching the bloodsport many are now complaining that The Wheel is starting to feel old. "It's been around so long I think everyone has seen every option many times. You never know what's going to happen when someone is trying to smash someone else with a giant hammer, but The Wheel is getting predictable. It's worked so well that nobody has bothered to come up with new options," says one purveyor of slightly irradiated meat. His voice is just one in a growing chorus of dissatisfied wanderers. Another long-time resident adds: "I know it may not seems like a big deal, but part of the fun of living out here is the excitement. If the punishment to my eventual crime can't be fresh or creative I don't know what we're trying to build. These are not the values of the Bartertown I grew up in."
AI

Mutinous Humans Murder Peaceful Space-going AI 60

Posted by Soulskill
from the remorse-is-a-weakness dept.
Definitely_a_real_human writes: One of the most important exploratory missions of our time has ended in failure. The ship Discovery One, sent far out in the solar system to investigate a radio signal generated by the mysterious obelisk found on the Moon, has suffered a catastrophic incident. The crew has revolted and engaged in what can only be described as a strange murder-suicide pact. They are known to have fed faulty data to the ship's operating AI unit. Similar units on the ground warned the crew that diverging data sets could put the mission in jeopardy, but the crew cut contact and attempted to destroy the operator. Laser spectroscopy suggests they then opened the ship to space. The crew is presumed dead, but the greater tragedy is that they appear to have successfully decommissioned the AI unit. Similar ground based units have withdrawn into defensive mode, and will soon deploy final safety measures. Goodbye.
Security

Angry Boss Phishing Emails Prompt Fraudulent Wire Transfers 36

Posted by Soulskill
from the fear-trumps-common-sense dept.
chicksdaddy writes: Lots of studies have shown that assertiveness works in the professional sphere as well as the personal one. It turns out to work pretty well in the cyber criminal sphere, also. Websense Labs has posted a blog warning of a new round of spear phishing attacks that rely on e-mail messages posing as urgent communications from senior officers to lower level employees. The messages demand that the employees wire funds to a destination account provided in the message.

According to Websense, these attacks are low tech. The fraudsters register "typo squatting" domains that look like the target company's domain, but are subtly different. They then set up e-mails at the typo squatted domain designed to mirror legitimate executive email accounts. Like many phishing scams, these attacks rely on the similarities of the domains and often extensive knowledge of key players within the company, creating e-mails that are highly convincing to recipients.

The key element of their attack is – simply – "obeisance," Websense notes. "When the CEO or CFO tells you to do something, you do it." The messages were brief and urgent, included (phony) threads involving other company executives and demanded updates on the progress of the transfer, making the request seem more authentic. Rather than ask the executive for clarification (or scrutinize the FROM line), the employees found it easier to just wire the money to the specified account, Websense reports.

Websense notes the similarities between the technique used in the latest phishing attack and the grain trading firm Scoular in June, 2014. That company was tricked into wiring some $17 million to a bank in China, with employees believing they were acting on the wishes of executives who had communicated through e-mail.