Skip to main content

Home/ Indie Nation/ Group items matching "ares" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
John Lemke

Bad Police Info Led Spies To Monitor Dotcom, Govt. Suppressed Information | TorrentFreak - 0 views

  • On Monday, Prime Minister John Key announced that he had requested an inquiry by the Inspector-General of Intelligence and Security after it was revealed that the Government Communications Security Bureau (GSCB) illegally intercepted the communications of individuals in the Megaupload case.
  • GCSB is an intelligence agency of the New Zealand government responsible for spying on external entities. It is forbidden by law from conducting surveillance on its own citizens or permanent residents in the country. Now it has been revealed that incorrect information supplied by the police’s Organized and Financial Crime Agency (OFCANZ) led the GCSB to spy on Kim Dotcom and Bram van der Kolk.
  • During an earlier hearing, Detective Inspector Grant Wormald of OFCANZ said that apart from surveillance carried out by the police, no other surveillance had been carried out against Dotcom. But with the revelation that GCSB had indeed been monitoring the Megaupload founder at the behest of OFCANZ, questions are now being raised about this apparent inconsistency, not least since Wormald previously acknowledged that a secret government unit had been involved in a pre-raid planning meeting in January.
John Lemke

Bad Police Info Led Spies To Monitor Dotcom, Govt. Suppressed Information | TorrentFreak - 0 views

  • Court documents have revealed how information supplied by New Zealand’s Organised and Financial Crime Agency led to Kim Dotcom and his associates being illegally monitored by GCSB, the Kiwi spy agency comparable to the United States’ CIA. Today a High Court judge expressed concern at the situation, with Dotcom’ legal team calling for an independent inquiry into the fiasco. Meanwhile, pressure continues to mount on Prime Minister John Key as it’s revealed the government issued an information suppression order.
  • According to court documents, GCSB checked with OFCANZ that both Dotcom and der Kolk were indeed foreign nationals. OFCANZ said they were, but in fact neither should have been spied on by GCSB. The monitoring went ahead anyway. In the High Court today, Justice Helen Winkelmann asked lawyers how it could be possible that GCSB hadn’t known about Dotcom’s New Zealand residency.
  • During an earlier hearing, Detective Inspector Grant Wormald of OFCANZ said that apart from surveillance carried out by the police, no other surveillance had been carried out against Dotcom. But with the revelation that GCSB had indeed been monitoring the Megaupload founder at the behest of OFCANZ, questions are now being raised about this apparent inconsistency, not least since Wormald previously acknowledged that a secret government unit had been involved in a pre-raid planning meeting in January.
John Lemke

DNA from maggot guts used to identify corpse in criminal case | Ars Technica - 0 views

  • It had already been suggested by other researchers that the gastrointestinal contents of maggots could be used to identify the subjects they feed on. However, never before has the theory been trialed in a legal, criminal case. Pathologists at Autonomous University of Nuevo León in San Nicolás, Mexico, led by María de Lourdes Chávez-Briones and Marta Ortega-Martínez, carried out short tandem repeat typing tests (a common method of DNA profiling) on the matter extracted from three dissected maggots found on the victim's face and neck, and separately on the alleged father of the missing woman. Preliminary results showed that the body was female, and the final outcome was a 99.685 percent probability of positive paternity—the victim had been identified.
  •  
    "It had already been suggested by other researchers that the gastrointestinal contents of maggots could be used to identify the subjects they feed on. However, never before has the theory been trialed in a legal, criminal case. Pathologists at Autonomous University of Nuevo León in San Nicolás, Mexico, led by María de Lourdes Chávez-Briones and Marta Ortega-Martínez, carried out short tandem repeat typing tests (a common method of DNA profiling) on the matter extracted from three dissected maggots found on the victim's face and neck, and separately on the alleged father of the missing woman. Preliminary results showed that the body was female, and the final outcome was a 99.685 percent probability of positive paternity-the victim had been identified."
John Lemke

Toyota shows off all solid state lithium superionic conductor based prototype battery - 0 views

  • last year the company described a prototype solid state lithium superionic conductor battery in an article in the journal Nature Materials that was based on a three dimensional framework. And just this month the company announced plans to introduce several new lines of hybrid and all electric vehicles over the next three years (after also announcing that the Prius hybrid now accounts for ten percent of all sales). The sticking point has been and remains, the batteries used in such vehicles which can account for up to half their cost to consumers.
  • The new battery, first described last year, uses Li10GeP2S12 in a layered three dimensional framework where cells are sandwiched together to create a stack of seven tiers with each having a voltage of four volts for a total of twenty eight at normal temperatures. The result, they say is a battery with five times the output density of previous varieties. To demonstrate its progress in refining the battery, the prototype was demonstrated recently to a group attending a green technology seminar as a power source for an electric scooter.
John Lemke

Cambodia Wants Mandatory Surveillance Cameras In Internet Cafes | Techdirt - 0 views

  • All telecommunications operators, sales outlets and distributors are obliged to register their business at local authorities. Meanwhile, all locations serving telephone services and Internet shall be equipped with closed circuit television camera and shall store footage data of users for at least 03 months. Telephone service corporation owners along public roads shall record National Identity Cards of any subscriber.
John Lemke

Rent-to-own PCs surreptitiously captured users' most intimate moments | Ars Technica - 0 views

  • The software, known as PC Rental Agent, was developed by Pennsylvania-based DesignerWare. It was licensed by more than 1,617 rent-to-own stores in the US, Canada, and Australia to report the physical location of rented PCs. A feature known as Detective Mode also allowed licensees to surreptitiously monitor the activities of computer users. Managers of rent-to-own stores could use the feature to turn on webcams so anyone in front of the machine would secretly be recorded. Managers could also use the software to log keystrokes and take screen captures.
  • In some cases, webcam activations captured images of children, individuals not fully clothed, and people engaged in sexual activities, the complaint alleged. Rental agreements never disclosed the information that was collected, FTC lawyers said.
  • PC Rental Agent also had the capability to display fake registration pages for Microsoft Windows, Internet Explorer, Microsoft Office, and Yahoo Messenger. When customers entered their names, addresses, and other personal information in the forms, the data was sent to DesignerWare servers and then e-mailed to the rent-to-own licensees.
John Lemke

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices | Ars Technica - 0 views

  • takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June. The security bug is present on Java 7 u21 and earlier. Once the bot has infected a computer, it copies itself to the autostart directory of its respective platform to ensure it runs whenever the machine is turned on. Compromised computers then report to an Internet relay chat channel that acts as a command and control server.
  • The botnet is designed to conduct distributed denial-of-service attacks on targets of the attackers' choice. Commands issued in the IRC channel allow the attackers to specify the IP address, port number, intensity, and duration of attacks.
John Lemke

Snowden Keeps Outwitting U.S. Spies - The Daily Beast - 0 views

  • First, it assumes that Snowden’s master file includes data from every network he ever scanned. Second, it assumes that this file is already in or will end up in the hands of America’s adversaries. If these assumptions turn out to be true, then the alarm raised in the last week will be warranted. The key word here is “if.”
    • John Lemke
       
      The two asumptions
  • One U.S. intelligence official briefed on the report said the DIA concluded that Snowden visited classified facilities outside the NSA station where he worked in Hawaii while he was downloading the documents he would eventually leak to journalists Glenn Greenwald and Barton Gellman. On Tuesday, Clapper himself estimated that less than 10 percent of the documents Snowden took were from the NSA.
    • John Lemke
       
      Seems not many of the documents were actually NSA documents.
  • assume
  • ...10 more annotations...
  • DIA director Gen. Michael Flynn put it this way on Tuesday in testimony before the House Permanent Select Committee on Intelligence: “We
  • that Snowden, everything that he touched, we assume that he took, stole.”
  • The U.S. intelligence official briefed on the report said the DIA was able to retrace the steps Snowden took inside the military’s classified systems to find every site where he rummaged around. “Snowden had a very limited amount of time before he would be detected when he did this, so we
  • assume
  • he zipped up the files and left,” this official said.
  • Bruce Schneier, a cybersecurity expert and cryptographer who Greenwald has consulted on the Snowden archive, said it was prudent to
  • assume
  • that lest some of Snowden’s documents could wind up in the hands of a foreign government.
  • In June, Greenwald told the Daily Beast that he did not know whether or not Snowden had additional documents beyond the ones he gave him. “I believe he does. He was clear he did not want to give to journalists things he did not think should be published.”
    • John Lemke
       
      He is not willing to release stuff he felt that journalist should not publish...
  • Snowden, however, has implied that he does not have control over the files he took. “No intelligence service—not even our own—has the capacity to compromise the secrets I continue to protect,” he wrote in July in a letter to former New Hampshire Republican senator Gordon Humphrey. “While it has not been reported in the media, one of my specializations was to teach our people at DIA how to keep such information from being compromised even in the highest threat counter-intelligence environments (i.e. China). You may rest easy knowing I cannot be coerced into revealing that information, even under torture.”
John Lemke

F-Secure: Android accounted for 97% of all mobile malware in 2013, but only 0.1% of those were on Google Play - The Next Web - 0 views

  • Android threats are primarily a non-US problem
  • F-Secure believes it would be incorrect to say that “Google hasn’t been actively making efforts to increase the security of the Android platform.”
  • At the very bottom of the list was Google Play itself, with the lowest percentage of malware in the gathered samples: 0.1 percent. F-Secure also noted that “the Play Store is most likely to promptly remove nefarious applications, so malware encountered there tends to have a short shelf life.”
John Lemke

Keurig Will Use DRM In New Coffee Maker To Lock Out Refill Market | Techdirt - 0 views

  • The plan was confirmed by Keurig's CEO who stated on a recent earnings call that the new maker indeed won't work with "unlicensed" pods as part of an effort to deliver "game-changing performance." "Keurig 2.0" is expected to launch this fall. French Press and pour-over manufacturers like Chemex have plenty of time to get their thank you notes to Keurig in the mail ahead of time as users are hopefully nudged toward the realization they could be drinking much better coffee anyway
John Lemke

Google launches the Android-based Open Automotive Alliance with Audi, Honda, GM, and more | The Verge - 0 views

  • GM, Honda, Audi, Hyundai, and chipmaker Nvidia, and will focus on bringing the successful mobile operating system to in-car entertainment systems
  • planned for launch by the end of 2014.
  • Sync system found in Fords is based on Microsoft technology
  • ...1 more annotation...
  • Car companies don't appear to be choosing just one partner either — Honda is already involved in Apple's efforts, while, Chevrolet, a division of Google's newly announced partner GM, recently demonstrated an app store and in-car interface for its 2015 lineup.
John Lemke

US Court Secretly Lets Government Share Megaupload Evidence With Copyright Industry | Techdirt - 0 views

  • Apparently part of the issue for the original filing to reveal this information was that some copyright holders are getting antsy that as the case drags on, they won't also be able to file civil cases against Megaupload before the three-year statute of limitations expires. However, as Megaupload's lawyers point out, there is no urgency here since the government itself made no move to share this information over the past two years. If it really wanted to share the information it had ample time to make the request and allow Megaupload's lawyers to review and take part in the process, rather than trying to route around them entirely. I'm guessing the recent successes against IsoHunt and Hotfile may have contributed to the timing as well. The MPAA pretty clearly thinks it can use those two cases to go after Megaupload as well, outside of the criminal case which will continue.
John Lemke

NSA reportedly 'piggybacking' on Google advertising cookies to home in on surveillance targets | The Verge - 0 views

  • US surveillance agency may be using Google's advertising cookies to track and "pinpoint" targets for government hacking and location-tracking. According to Snowden's leaked presentation slides, both the NSA and the British equivalent, the GCHQ, are using a Google-specific ad cookie (know as "PREF") as a way of homing in on specific surveillance targets. While Google's cookie doesn't contain personal information like a name or email address, it does contain numeric codes that uniquely identify a user's browser.
  • The report notes that the NSA doesn't use this technique to find suspicious activity amidst the massive flood of internet communication that takes place every day — instead, it uses it to home in on targets already under suspicion.
John Lemke

Petition Launched To Get The White House To Open Source Healthcare.gov Code | Techdirt - 0 views

  • Of course, there are a few issues with this. First of all, while things created by government employees is automatically public domain, works created by contractors is not. So while conceptually we can argue that the code should be open sourced, it's not required by law. Second, and more importantly, it's a lot harder to take proprietary code and then release it as open source, than it is to build code from the ground up to be open source (and it's even more difficult to make sure that code is actually useful for anything). Indeed, if the code had been open sourced from the beginning, perhaps they wouldn't make embarrassing mistakes like violating other open source licenses.
  • By this point, open sourcing the code isn't going to fix things, but if more attention is put on the issue of closed vs. open code in government projects, hopefully it means that government officials will recognize that it should be open source from the beginning for the next big government web project.
  • After the disastrous technological launch of the healthcare.gov website, built by political cronies rather than companies who understand the internet, there has been plenty of discussion as to why the code wasn't open sourced. At that link, there's a good discussion from On the Media, with Paul Ford, discussing what a big mistake it was that the government decided not to open source the code and be much more transparent about the process. It discusses the usual attacks on open source and why they almost certainly don't apply to this situation.
John Lemke

FireChat: The internet-free messaging app that's sweeping the world - News - Gadgets and Tech - The Independent - 0 views

  • t's a messaging app for iOS.
  • based on peer-to-peer “mesh networking” and connects to nearby phones using Bluetooth and WiFi, with connectivity increasing as more people use it in an area.
  • In Hong Kong mostly, where pro-democracy protesters are using it to communicate amid fears of network shutdowns. It's also been used by Iraqis and Taiwanese students during their anti-Beijing Sunflower Movement. Aside from not being reliant on the internet (which some governments restrict), it is more clandestine and less traceable.
John Lemke

FBI Arrested CEO of 'StealthGenie' for Selling Mobile Spyware Apps - 0 views

  • The Federal Bureau of Investigation (FBI) has arrested the CEO of a UK-based company for allegedly advertising and selling a spyware app to individuals who suspect their romantic partners of cheating on them.
  • The dodgy cell phone spyware application, dubbed as StealthGenie, monitors victims’ phone calls, text messages, videos, emails and other communications "without detection" when it is installed on a target's phone, according to the Department of Justice.
  • Once installed on the phone, it allows conversations to be monitored as they take place, enables the purchaser to call the phone and activate it at any time to monitor all surrounding conversations within a 15-foot radius, and collects the user’s incoming and outgoing email and SMS messages, incoming voicemail, address book, calendar, photographs, and videos. All of these functions are enabled without the knowledge of the user of the phone.
  • ...1 more annotation...
  • Akbar was charged with conspiracy, sale of a surreptitious interception device, advertisement of a known interception device and advertising a device as a surreptitious interception device in US District Court for the Eastern District of Virginia.
John Lemke

Hackers charged with stealing Xbox, 'Call of Duty,' and US Army secrets worth over $100 million | The Verge - 0 views

  • Four hackers have been jointly charged with conspiracies to commit computer fraud, copyright infringement, wire fraud, mail fraud, identity theft, and theft of trade secrets. Individually, they have been charged with counts of aggravated identity theft, unauthorized computer access, copyright infringement, and wire fraud.
  • The defendants, aged between 18 and 28, are believed to have stolen more than $100 million in intellectual property and other proprietary data from the likes of Microsoft Corporation, Epic Games, Valve, and even the US Army. This includes pre-release versions of Gears of War 3 and Call of Duty: Modern Warfare 3, Apache helicopter simulation software developed for the US army, and information about the Xbox One console. Two of the suspects have pleaded guilty, one of which is 22-year old David Pokora. His plea represents what may be the first conviction of a foreign-based individual for hacking into US businesses to steal trade secret information.
  • 18-count superseding indictment
John Lemke

Force of nature gave life its asymmetry : Nature News & Comment - 0 views

  • In an experiment that took 13 years to perfect1, the researchers have found that these electrons tend to destroy certain organic molecules slightly more often than they destroy their mirror images.
  • The weak nuclear force, which is involved in nuclear decay, is the only force of nature known to have a handedness preference: electrons created in the subatomic process known as β decay are always 'left-handed'. This means that their spin — a quantum property analogous to the magnetization of a bar magnet — is always opposite in direction to the electron's motion.
  • In all cases the asymmetry was tiny, but consistent, like flipping a not-quite-fair coin. “The scale of the asymmetry is as though we flip 20,000 coins again and again, and on average, 10,003 of them land on heads while 9,997 land on tails,” says Dreiling.
« First ‹ Previous 81 - 100 of 120 Next ›
Showing 20 items per page