A Three Rivers, Michigan, teenager is both the victim and perpetrator of a sex crime. He might land on the sex offender registry, and face criminal charges, all because he took an inappropriate photo—of himself.
The boy is unnamed in local news reporters, which note that he is under 15 years of age. He allegedly took a nude photo of himself on a girl’s cell phone. That girl sent the picture to another girl, who sent it to another. Preliminary charges are pending for all three—the boy was charged with manufacturing child porn, and the girls with distributing it. A prosecutor is still weighing whether to pursue the charges.
Hopefully, the prosecutor will realize that pursuing the suggested charges could ruin a few teens' lives. The police detective working the case seems to want to destroy these kids' lives for the good of other teens, or something.
This proves that a lot of people don’t read the permission list (or their lust of installing the app prevails the need to protect their privacy).
OpenSSH was previously announced last year by the very forward looking PowerShell team: https://blogs.msdn.microsoft.c...
Called SafeZone, and also known as Avastium, Avast's custom browser is offered as a bundled download for all who purchase or upgrade to a paid version of Avast Antivirus 2016. This poor excuse of a browser was allowing attackers to access files on the user's filesystem just by clicking on malicious links. The browser wouldn't even have to be opened, and the malicious link could be clicked in "any" browser.
The US Department of Defense (DoD) wants contractors to mine your social media posts to develop new ways for the US government to infer what you’re really thinking and feeling—and to predict what you’ll do next.
Pentagon documents released over the last few months identify ongoing classified research in this area that the federal government plans to expand, by investing millions more dollars.
The unclassified documents, which call on external scientists, institutions and companies to submit proposals for research projects, not only catalogue how far US military capabilities have come, but also reveal the Pentagon’s goals: building the US intelligence community’s capacity to forecast population behavior at home and abroad, especially groups involved in political activism.
They throw light on the extent to which the Pentagon’s classified pre-crime R&D has advanced, and how the US military intends to deploy it in operations around the world.
Their asprations don't stop there, however:
...will help the Department of Defense better understand what drives individuals and groups to mobilize for change and the mechanisms of that mobilization, particularly when violent tactics are adopted. This research will inform understanding of where organized violence may erupt, what factors might explain its spread, and how one might mitigate its effects.
Ultimately, then, this is not simply about predicting the behavior of diverse populations and social groups.
The Pentagon wants the ability to use this predictive capacity to manipulate human behavior, and thereby win wars.
“Sadly, this particular developer certificate (assigned to a Maksim Noskov) has been used for probably two years in similar attacks,” said Johannes Ullrich, dean of research of the SANS Institute’s Internet Storm Center, which on Thursday publicly disclosed the campaign. “So far, it apparently hasn’t been revoked by Apple.”
The bot is called the Jolly Roger Telephone Company, and it’s the work of Roger Anderson, a veteran of the phone industry himself who had grown tired of the repeated harassment from telemarketers and robocallers. Anderson started out by building a system that sat in front of his home landlines and would tell human callers to press a key to ring through to his actual phone line; robocallers were routed directly to an answering system. He would then white-list the numbers of humans who got through.
Sometimes the Jolly Roger bot will press buttons to be transferred to a human agent and other times it will just talk back if a human is on the other end of the line to begin with.