Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission + - FBI Raids Dental Software Researcher Who Found Patient Records On Public Server

blottsie writes: Yet another security researcher is facing possible prosecution under the CFAA for accessing data on a publicly accessible server. The FBI on Tuesday raided Texas-based dental software security researcher Justin Shafer, who found the protected health records of 22,000 patients stored on an anonymous FTP.

“This is a troubling development. I hope the government doesn't think that accessing unsecured files on a public FTP server counts as an unauthorized access under the CFAA,” Orin Kerr, a George Washington University law professor and CFAA scholar told the Daily Dot. “If that turns out to be the government's theory—which we don't know yet, as we only have the warrant so far—it will be a significant overreach that raises the same issues as were briefed but not resolved in [Andrew 'weev' Auernheimer's] case. I'll be watching this closely.”

Submission + - It's Trivially Easy To Identify You Based On Records Of Your Calls And Texts

erier2003 writes: Contrary to the claims of America's top spies, the details of your phone calls and text messages—including when they took place and whom they involved—are no less revealing than the actual contents of those communications.

In a study published online Monday in the journal Proceedings of the National Academy of Sciences, Stanford University researchers demonstrated how they used publicly available sources—like Google searches and the paid background-check service Intelius—to identify "the overwhelming majority" of their 823 volunteers based only on their anonymized call and SMS metadata.

Submission + - The company that poached the FBI's entire Silk Road investigation team (dailydot.com)

Patrick O'Neill writes: The FBI team that brought down Silk Road has a new home. After headline-grabbing investigations, arrests, and prosecutions on some of America's highest-profile cybercriminals, five of U.S. law enforcement’s most prized cybercrime aces have all left government service for greener pastures—a titan consulting firm called Berkeley Research Group (BRG).

BRG's newly hired gang of five includes former federal prosecutor Thomas Brown, as well as former FBI agents Christopher Tarbell, Thomas Kiernan, and Ilhwan Yum—names that punctuated many of the biggest cybercrime stories of the last decade including Silk Road, LulzSec, Liberty Reserve, as well as the hacks of Citibank, PNC Bank, Société Générale, and more.

Submission + - Top Security Experts Say Anti-Encryption Bill Authors Are 'Woefully Ignorant'

blottsie writes: In a Wall Street Journal editorial titled "Encryption Without Tears," Sens. Richard Burr (R-N.C.) and Dianne Feinstein (D-Calif.) pushed back on widespread condemnation of their Compliance with Court Orders Act, which would require tech companies to provide authorities with user data in an "intelligible" format if served with a warrant.

But security experts Bruce Schneir, Matthew Green, and others say the lawmakers entirely misunderstand the issue. "On a weekly basis we see gigabytes of that information dumped to the Internet," Green told the Daily Dot. "This is the whole problem that encryption is intended to solve." He added: "You can't hold out the current flaws in the Internet as a justification for why the Internet shouldn't be made secure."

Submission + - 'Crypto Wars' Timeline: A Complete History Of The New Encryption Debate

blottsie writes: The latest debate over encryption did not begin with a court order demanding Apple help the FBI unlock a dead terrorist's iPhone. The new "Crypto Wars," chronicled in an comprehensive timeline by Eric Geller of the Daily Dot, dates back to at least 2003, with the introduction of "Patriot Act II." The battle over privacy and personal security versus crime-fighting and national security has, however, become a mainstream debate in recent months.

Submission + - Why ISIS Is Winning The Online Propaganda War

blottsie writes: The U.S. government has been unable to fight the Islamic State on the one battlefield it currently commands: the Internet. Exemplified by an August 2014 video produced by the State Department, the U.S. remains ineffective at combating violent extremism online. This definitive report by the Daily Dot explores how ISIS succeeds in spreading its message and recruiting new militants and why the U.S. government continues to fail in its efforts to stop ISIS online.

Submission + - French bill carries 5-year jail sentence for company refusals to decrypt data fo (dailydot.com)

Patrick O'Neill writes: Employees of companies in France that refuse to decrypt data for police can go to prison for five years under new legislation from conservative legislators. The punishment for refusing to hand over access to encrypted data is a five year jail sentence and $380,000 fine. Telecom companies would face their own penalties, including up to two years in jail. French politicians criticized American companies in particular: "They deliberately use the argument of public freedoms to make money knowing full well that the encryption used to drug traffickers, to serious [criminals] and especially to terrorists. It is unacceptable that the state loses any control over encryption and, in fact, be the subject of manipulation by U.S. multinationals.”

Submission + - ISIS Supporters Abandon American Encryption As Apple–FBI Fight Rages In U.

blottsie writes: Islamic State militants and supporters are promoting strong encryption tools from outside the United States that the American government cannot touch with legislation.

In the last month, Islamic State supporters have promoted security software from Finland, Romania, America, France, the Czech Republic, Canada, Panama, Germany, Switzerland, Saint Kitts and Nevis, and other nations, a Daily Dot review found.

The international availability of encryption technology, of which Islamic State militants are well aware, underscores FBI Director James Comey's long-held desire to build an international legal regime to deal with the problems posed by encryption, what he calls “going dark.”

Submission + - EFF Exec. Director Cindy Cohn: Why 'Code Is Speech' Is Key To 'Apple vs. FBI'

blottsie writes: In a series of court battles in the late 1990s and early 2000s, Cindy Cohn represented plaintiffs challenging restrictions on DVD copying and the publication of cryptographic code. In all three cases—Bernstein v. United States, Universal City Studios v. Reimerdes, and Junger v. Daley—federal courts held that computer code merited protection under the First Amendment. Cohn, now the executive director of the Electronic Frontier Foundation, endorsed Apple's repeated citations of her cases in its fight against a court order to unlock a terrorism suspect's iPhone for the FBI. But she said that the controversial iPhone-unlocking order impinged even further on Apple's free-speech rights than the restrictions in her cases.

Submission + - Why Are Apple's Competitors Staying Silent On The iPhone Unlocking Fight?

erier2003 writes: A court order forcing Apple to help the FBI access a terrorism suspect's iPhone has drawn responses from leading tech companies, newspaper editorial boards, and security experts. But one major faction is staying largely silent: the computer and smartphone manufacturers who compete with Apple for business and could be subject to similar orders in the future if the company loses its high-profile case.

Silicon Valley software firms have universally backed Apple in its fight against the Justice Department, which won a ruling Tuesday from a California magistrate judge compelling Apple to design custom software to bypass security features on an iPhone used by one of the San Bernardino shooters. But Apple's hardware competitors are staying on the sidelines.

Submission + - Congressman: Court ordering Apple to hack iPhone has far reaching implications (dailydot.com)

Patrick O'Neill writes: Hours after Apple was ordered to help the FBI access the San Bernardino Shooters' iPhone, Rep. Ted Lieu (D-Calif.), a Stanford University computer-science graduate, wondered where the use of the All Writs Act—on which the magistrate judge based her ruling—might lead. "Can courts compel Facebook to provide analytics of who might be a criminal?" Lieu said in an email to the Daily Dot. "Or Google to give a list of names of people who searched for the term ISIS? At what point does this stop?"

Submission + - How Shari Steele Plans To Take Tor Mainstream

blottsie writes: Over her career, Shari Steel has taken on United States Department of Justice, the National Security Agency, and the Federal Bureau of Investigation. She built the Electronic Frontier Foundation into an international powerhouse for protecting online rights.

Today, she has a new mission, perhaps her heaviest challenge yet: Take the Internet’s most powerful privacy tool mainstream.

Submission + - Hackers Break Into Ringo Starr's Twitter Account With Simple Password Reset

blottsie writes: Ringo Starr’s account was compromised by a hacker operating under the username “af,” who spoke to the Daily Dot about the breach. The hacker says he gained access to an email account associated with Doug Brasch, senior director of digital marketing at Universal Music Group, who managed Starr’s Twitter account. He simply used an email password reset to gain access.

Submission + - As elections approach, Iran uses "far more advanced" Internet censorship (dailydot.com)

Patrick O'Neill writes: Election time in Iran means increased censorship for the country's tens of millions of Internet users. But this months parliamentary election, experts say, comes with a new level of aggressive censorship from a government notorious for authoritarianism in cyberspace. “What’s happening [right now] is far more advanced than anything we’ve seen before,” said Karl Kathuria, CEO of Psiphon Inc., the company behind the widely popular encryption and circumvention tool Psiphon. “It’s a lot more concentrated attempt to stop these services from working.”

Submission + - U.S. encryption ban would only send the market overseas (dailydot.com)

Patrick O'Neill writes: A U.S. legislatures posture toward legally mandating backdoored encryption, a new Harvard study suggests that a ban would push the market overseas because most encryption products come from over non-U.S. tech companies. “Cryptography is very much a worldwide academic discipline, as evidenced by the quantity and quality of research papers and academic conferences from countries other than the U.S.," the researchers wrote.

Slashdot Top Deals

Message from Our Sponsor on ttyTV at 13:58 ...

Working...