Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×
Crime

Bank Heists - Another Profession That Technology Is Killing Off 131

HughPickens.com writes: In 1992 there were 847 bank robberies in the UK; by 2011 that had dropped to just 66. Now Lawrence Dobbs writes in the Telegraph about how technology is killing off this age old profession. "The development of more sophisticated alarm systems and CCTV, as well as supporting forensic developments such as DNA analysis and facial recognition software, all serve to assist police," says Jim Dickie, a former detective who spent more than 30 years with the Metropolitan Police. Those who do try are either feckless opportunists or "serial offenders" who have already served time and are easily found on police databases. "Hands-on heists are a dying art, because those who have a background in it are literally dying off."

In 2015 a gang of aging jewel thieves pulled off one last spectacular job. Using a diamond-tipped drill and a 10-ton hydraulic ram, they broke into the Hatton Garden Safe Deposit Ltd vault and made off with at least £14million in precious stones, gems, bullion and jewelry in the largest burglary in English history. But the Hatton Garden burglars were caught because they used one of their own cars within view of a security camera. According to David Kelly, it's CCTV which has changed things most. "It's now virtually impossible to travel through any public space in a major metropolitan area without being captured. They're everywhere, the image quality is better, and the ability to store images for longer has increased." Then there are your physical alarm devices: motion sensors, window monitors which detect glass shattering, or devices which trigger when a door is opened. "These devices can now be deployed wirelessly – in an older building, where you might not have wires in place," says Kelly. "There are also tools at the disposal of the private sector, in cooperation with the public sector, which are perhaps not matters of common knowledge, and there's a tactical advantage to our clients in them remaining that way." Add to this the various technologies used to protect or track the loot itself – dye packs hiding inside stacks of banknotes, which explode when they leave a certain range; GPS tracking on security vans and inside cash containers – and you can see why even a hardened criminal might prefer to stay in bed.
Crime

Cyber-Scammers Steal €50 Million From Austrian Airplane Manufacturer (softpedia.com) 39

An anonymous reader writes: FACC Operations GmbH, an Austrian company that produces various airplane parts for companies like Airbus and Boeing, has announced a cyber-incident during which cyber-fraudsters managed to steal around €50 million from their bank accounts. While CEO Fraud attacks manage to steal a few thousand dollars here and there, never has a company lost so much cash liquidity in one incident. Stock price took a tumble immediately.
Bitcoin

10 People Arrested In the Netherlands For Bitcoin Laundering (reuters.com) 44

New submitter Incadenza writes: 10 people were arrested in the Netherlands today according to the Public Prosecution Service (In Dutch). The arrests were said to be part of an international investigation, including requests from the USA, Morocco, Australia and Lithuania. Apparently the investigators followed the trace from 'Bitcoin-cashers' (who convert the Bitcoin profits to old money) back to Bitcoin transactions on the Dark Web. How successful this was is yet to be seen, since all the main suspects are said to be 'cashers', not traders.
The Internet

Google Exec Says Isis Must Be Locked Out of the Open Web (theguardian.com) 208

An anonymous reader writes with this story about Director of Google Ideas Jared Cohen and his talk with the Royal Institute of International Affairs about stopping terrorists online. Cohen contends that the best way to fight them online is to keep them confined to the dark web. The Guardian reports: "Google's head of ideas, tasked with building tools to fight oppression, has said that to stop Isis being able to publicize itself on the internet requires forcing Isis from the open web. During a talk with the Royal Institute of International Affairs at Chatham House, Jared Cohen said that it will not be possible to stop terrorists such as Isis from using Tor and the dark web. The key to stopping the terrorist group from propagating online is therefore to hound them from the traditional web – that which can be indexed by search engines. Cohen said: 'What is new is that they're operating without being pushed back in the same internet we all enjoy. So success looks like Isis being contained to the dark web.'"
The Courts

Police Department Charging TV News Network $36,000 For Body Cam Footage (arstechnica.com) 186

An anonymous reader writes with news that the NYPD charged a local television station $36k to view police body camera footage. Ars reports: "As body cams continue to flourish in police departments across the nation, an ongoing debate has ensued about how much, if any, of that footage should be made public under state open-access laws. An overlooked twist to that debate, however, has now become front and center: How much should the public have to pay for the footage if the police agree to release it? News network NY1, a Time Warner Cable News operation, was billed $36,000 by the NYPD for roughly 190 hours of footage it requested under the state's Freedom of Information Law (FOIL). Now the network is suing (PDF) the police department in New York state court, complaining that the price tag is too steep. The network said the bill runs 'counter to both the public policy of openness underlying FOIL, as well as the purported transparency supposedly fostered by the BWC (body worn camera) program itself.'"
Bitcoin

"DDoS-For-Bitcoin" Blackmailers Arrested (softpedia.com) 27

An anonymous reader writes: The DDoSing outfit that spawned the trend of "DDoS-for-Bitcoin" has been arrested by Europol in Bosnia Herzegovina last month. DD4BC first appeared in September 2015, when Akamai blew the lid on their activities. Since then almost any script kiddie that can launch DDoS attacks has followed their business model by blackmailing companies for Bitcoin.
Android

Android Banking Malware SlemBunk Part of Well-Organized Campaign (fireeye.com) 35

itwbennett writes: Researchers from FireEye first documented the SlemBunk Android Trojan that targets mobile banking users in December. Once installed, it starts monitoring the processes running on the device and when it detects that a mobile banking app is launched, it displays a fake user interface on top of it to trick users into inputting their credentials. The Trojan can spoof the user interfaces of apps from at least 31 banks from across the world and two mobile payment service providers. The attack is more complicated than it appears at first glance, because the APK (Android application package) that users first download does not contain any malicious functionality, making it hard for antivirus apps and even Android's built-in app scanner to detect it.
Crime

Sweden Makes Another Request To Ecuador For Permission To Question Assange (thelocal.se) 133

cold fjord writes: Thelocal.se reports that Sweden's state prosecutor's office said today that it has formally asked Ecuador in writing for permission to interrogate Julian Assange. They don't know when Ecuador will reply. The request follows the signing of an agreement in December on general legal cooperation between the two countries. Ecuador required the agreement before it would consent to an interview of Assange. The Swedish prosecutors want to question Assange regarding rape allegations that have a statute of limitations that run till 2020. The statue of limitations for other sex crimes Assange has been accused of have expired while Assange has been in hiding. Sweden had previously asked to question Assange in the embassy, but Ecuador declined permission. In another peculiar twist to the case, RTE.ie is reporting that Ecuadorian Foreign Minister Ricardo Patino has stated that the exact procedures that will be used are not known, but that Ecuadorian prosecutors will be the ones actually questioning Assange although Swedish officials can be present. Sweden's view on this is unclear.
Security

Smartwatches Can Be Used To Spy On Your Card's PIN Code (softpedia.com) 50

An anonymous reader writes: A researcher has developed a smartwatch app that can interpret hand motions and translate the movements to specific keystrokes on 12-key keypads, like the ones used at ATMs. The app sends the data to a nearby smartphone, which then relays it to a server, for analysis. The whole AI algorithm on which it's built has a 73% accuracy for touchlogging events, and 59% for keylogging. The entire code is on GitHub, along with his research paper, and a YouTube video.
Crime

Police Agencies Using Software To Generate "Threat Scores" of Suspects (washingtonpost.com) 148

Koreantoast writes: It's no secret that governments across the globe have been taking advantage of new technologies to create stronger surveillance systems on citizens. While many have focused on the actions of intelligence agencies, local police departments continue to create more sophisticated systems as well. A recent article highlights one new system deployed by the Fresno, California police department, Intrado's Beware. The system scours police data, public records, social media, and public Internet data to provide a "threat level" of a potential suspect or residency. The software is part of a broader trend of military counterinsurgency tools and algorithms being repurposed for civil use. While these tools can help police manage actively dangerous situations, providing valuable intel when responding to calls, the analysis also raises serious civil liberties questions both in privacy (where the data comes from) and accuracy (is the data valid, was the analysis done correctly). Also worrying are the long term ramifications to such technologies: there has already been some speculation about "citizen scores," could a criminal threat score be something similar? At very least, as Matt Cagle of the ACLU noted, "there needs to be a meaningful debate... there needs to be safeguards and oversight."
Crime

Man Arrested For Hacking 130 Celebrities (softpedia.com) 82

An anonymous reader writes: A man was arrested after trying to sell Hollywood movie scripts and social security numbers to an undercover DHS agent. The hacker known online as Jeff Moxey managed to hack the computers of 130 celebrities, from where he stole, besides scripts, nude pics and sexually-explicit videos. "The scope of the crime here is potentially quite large," Assistant U.S. Attorney Kristy Greenberg said, adding that the investigation began a few weeks ago.
Crime

Investigation Into Security Director Who Hacked the Lottery Expands (bgr.com) 167

An anonymous reader sends the latest update on Eddie Tipton, the man who worked for the Multi-State Lottery Association who was convicted of rigging a lottery game so he could win a $14 million jackpot. BGR reports: "Not too long ago, Eddie Tipton was convicted of hacking into the Multi-State Lottery Association's computer system in order to rig a nearly $17 million jackpot in Iowa. Now comes word that an investigation into Tipton's hacking activities is expanding to include a number of other states. Thus far, lottery officials from Colorado, Wisconsin and Oklahoma have indicated that Tipton may have also gamed lottery jackpots in their respective states. What makes this saga all the more interesting is that Tipton actually used to work at the Multi-State Lottery Association as a security director. In that capacity, Tipton allegedly installed a rootkit onto his company's computer system that influenced the manner in which 'random' numbers were generated. As a result, Tipton was able to calculate and gain access to winning lotto numbers before their public unveiling. With the numbers in tow, authorities claim that Tipton would reveal the winning numbers to friends who would then buy 'winning' lotto tickets and then collect on big paydays."
Crime

Drug Case In Ireland Has Fingerprints of Carnegie Mellon's Attack On Tor 72

blottsie writes: Newly released evidence shows that Irish detectives who worked the case of two convicted drug dealers may have also used data obtained through CMU's Software Engineering Institute's methods. Mannion and O'Connor were arrested on Nov. 5, 2014, according to a database of Dark Net arrests created by independent researcher Gwern Branwen. That's the same day that the owner of Silk Road 2.0, the replacement for the infamous drug marketplace Silk Road, was arrested. The IP addresses of Silk Road 2.0 were provided to the FBI by a "source of information," according to a search warrant in another case impacted by the attack on Tor, which court documents later confirmed was a university-based research institute.
Crime

Currency Exchange Website Accused of Cyber Terrorism By Venezuelan Government (arstechnica.com) 104

braindrainbahrain writes: A U.S.-based website that covers the unofficial exchange rate between the U.S. dollar and the Bolivar, the Venezuelan currency, has been accused of cyber terrorism in a civil complaint. Venezuela, suffering from ever increasing inflation, maintains very tight controls on currency exchange, and accuses the website operators of racketeering and conspiracy. In an earlier speech, Venezuelan President Nicola Maduro stated he would ask the President of the United States to hunt down the operators of the DT Site and extradite them to Venezuela to be tried as criminals.
Crime

FBI Admits It Uses Stingrays, Zero-Day Exploits (arstechnica.com) 79

An anonymous reader writes: Amy Hess, the head of the FBI's science and technology division has admitted that the FBI sometimes exploits zero-day vulnerabilities and uses stingrays to catch bad guys. Ars reports: "The admission came in a profile published Tuesday of Amy Hess, the FBI's executive assistant director for science and technology who oversees the bureau's Operational Technology Division. Besides touching on the use of zero-days—that is, attack code that exploits vulnerabilities that remain unpatched, and in most cases are unknown by the company or organization that designs the product—Tuesday's Washington Post article also makes passing mention of another hot-button controversy: the FBI's use of stingrays."

Slashdot Top Deals

"What if" is a trademark of Hewlett Packard, so stop using it in your sentences without permission, or risk being sued.

Working...