One warrant used to target thousands of child porn suspects in 120 countries

Yet another Playpen suspect challenges FBI’s use of “network investigative technique.”

Enlarge (credit: North Charleston)

A newly released federal court hearing transcript reveals that one warrant issued as part of a massive child porn investigation in the US was also used to authorize government malware that targeted more than 8,000 users across 120 countries, including a “satellite provider.”

As Vice Motherboard first reported, the remarks came from the November 1 hearing in the case of United States v. Tippens and two other related cases, which are ongoing in Tacoma, Washington. These cases, and more than 100 others like them, are part of a global effort to target people suspected of accessing the now-defunct Tor-hidden child porn site known as “Playpen.”

As Colin Fieman, a federal public defender who represents David Tippens and other Playpen defendants in that area, said during the November 1 hearing in Tacoma:

Read 11 remaining paragraphs | Comments

4shared: Copyright Holders Abuse Google’s DMCA Takedown System

Popular file-hosting service 4shared is a true piracy haven, according to some copyright holders. Following numerous complaints the site has had more than 50 million of its URLs removed from Google’s search index. However, according to 4shared many of these are the result of abusive takedown requests.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

4sharedAs one of the largest online file-sharing services, 4shared is closely watched by copyright holders whose work is made available on the site.

The site itself has a DMCA takedown procedure in place so rightsholders can remove files directly, but interestingly, most complaints about the site are directed at Google’s search index.

Over the past several years the search engine has received a mind-boggling 50 million takedown requests for 4shared URLs, more than any other website out there.

An unusually high amount, especially considering that 4shared only has about 2 million pages indexed.

TorrentFreak had a chance to speak with 4shared, which isn’t proud of this record. However, the company believes that the numbers are massively inflated due to various dubious takedown practices.

One of the issues that was brought up first, is the question why rightsholders would target Google at all if they can remove infringing files directly from the site itself.

According to 4shared, the top reporting agencies know very well that 4shared has a strict removal policy. In fact, some even have direct delete access, allowing them to remove files from the site straight away.

“Complaining to Google is not effective if your goal is to remove a file asap,” 4shared’s Mike tells us. “It only removes the link from search results in Google, while sending a complaint directly means a quick block of the link itself.”

According to 4shared, the high number of takedown requests is in part driven by bogus reports. The company used the Lumen Database to review several takedown notices and quickly realized that many reported links are pointing to the same files, or none at all.

“What we can see is that numerous complaints provide a redundant volume of links that look like some machine-built template as well as a large amount of non-informative links to various parts of the 4shared website,” Mike says.

“The organization APDIF do Brasil, which is the top reporter, submits absolutely meaningless complaints where obviously a bot cycles some keyword through all possible variations of search requests without leading to any specific file which may be copyright-protected.”

One of the examples 4shared mentions (among many) is this link, which simply points to a 4shared search for the keyword “video.”

APDIF do Brasil alone is responsible for 35 million of the reported 4shared links Google received, so their submissions weigh heavily on the total number.

“In other words, 70% of delisting requests were sent by this organization and apparently numerous requests, if not all, contain meaningless links artificially increasing the volume of complaints in terms of links included,” Mike notes.

These automated claims are not new of course. At TorrentFreak we also repeatedly report on similar examples, where non-existent files or dead sites are targeted by copyright claims.

4shared says that broad or inflated request are rather common, highlighting several other reporting agencies such as Digimarc and Muso. The latter repeatedly targets links that ultimately point to the same file, such as in this notice.

musorequest

“It includes numerous links to exactly the same 4shared’s page in one claim (#8). These are the same page because each page (file) has its unique ID. And in this example it is H8HJ_FJXce. Yes, links look different but this is the same page with parameter variations,” Mike says.

4shared believes that this is the result of automated takedown templates. Not least because files can only be in one category, not in multiple ones, as is the case here.

Perhaps just as strange, Muso has access to a direct removal account on 4shared, so in theory there shouldn’t be any reason to target Google. After all, they can easily remove the source file directly.

However, Muso informs TorrentFreak that they prefer to do both. The 4shared files that are reported to Google are also removed directly. According to the company, they do this to prevent people from finding other infringing content on the site.

Whether that’s what the DMCA reporting system is intended for is doubtful.

All in all, 4shared believes that some copyright holders abuse Google’s system. The 50 million record should, therefore, be taken with a grain of salt, or a spoonful.

“Taking into account that duplicates for our examples were found relatively easy makes us think that copyright owners substantially abuse Google’s DMCA reporting system,” Mike says.

Instead of bombarding Google with dubious requests, 4shared encourages rightsholders to reach out to them directly.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

How one F1 team uses cybersecurity to keep the crown jewels under lock and key

An F1 team’s data is a gold mine that needs to be exploited and protected.

Enlarge (credit: Glenn Dunbar/Williams)

As is the case for so many industries in recent years, Formula 1 has been transformed by data. Each team designs and tests its cars in silico, with vast server farms competing with onsite wind tunnels to see which can use more electricity. Up to 300 sensors per car constantly measure every parameter, beaming that info back to the garage—and in turn to home base—each lap. It's a far cry from the garagiste days of drawing boards and pens or even the active suspension era and its rugged 286 laptops. It's a highly competitive sport, for the financial rewards for success are many, and so that data represents a gold mine for each team.

Under CIO Greame Hackland, Williams Martini Racing provides an illuminating example of how an F1 team can use that data and the steps it has to take to protect it. And while some of the challenges are unique to Formula 1, many of them might be familiar to anyone working in a large IP-heavy organization.

"When I joined Williams in 2014, 70 percent of our race strategists' time was spent getting data and putting it into spreadsheets, whether that was at the track or back at the factory," Hackland told Ars. To help find a way around this, the team started working with Avanade (a joint venture between Microsoft and Accenture), which brought fresh viewpoints to bear on old problems. "The last year and half has been a huge transformation. We can't allow an engineer who's been in F1 for 25 years to dictate how the tools we use look," Hackland told us.

Read 9 remaining paragraphs | Comments

Blog-Software: Gravierender Fehler in WordPress Auto-Update gefunden

Weil der zentrale Update-Server von Wordpress unsichere Hashfunktionen zulässt, hätten Angreifer Code ausführen und massenhaft Wordpress-Installationen angreifen können. Die Sicherheitslücke wurde mittlerweile geschlossen. (Wordpress, Blog)

Weil der zentrale Update-Server von Wordpress unsichere Hashfunktionen zulässt, hätten Angreifer Code ausführen und massenhaft Wordpress-Installationen angreifen können. Die Sicherheitslücke wurde mittlerweile geschlossen. (Wordpress, Blog)

Bundestag: Merkel startet den Kampf gegen gefälschte Nachrichten

Angela Merkel spricht im Bundestag über Fake News und wie sie einen Wahlkampf vergiften können. Die Kanzlerin sucht nach Antworten, was nun zu tun ist. (Digitalisierung, Soziales Netz)

Angela Merkel spricht im Bundestag über Fake News und wie sie einen Wahlkampf vergiften können. Die Kanzlerin sucht nach Antworten, was nun zu tun ist. (Digitalisierung, Soziales Netz)

Drop a grand on diamonds, get a free Xbox One S?

Holiday season promotions are here, and this one is a bit of an oddity.

Mine your own diamonds, I guess.

Mine your own diamonds, I guess.

I was watching Dota 2 videos on YouTube last night when I was shown perhaps one of the most peculiar promotions I've ever seen. Jeweler Helzberg Diamonds, which specializes in selling overpriced lumps of carbon, has an extraordinary offer: spend $999 or more on jewelry and, for a limited time only, you'll get a free Xbox One S.

Any inferences about what this implies about the margins on diamond jewelry are left to the reader.

I suppose it makes a little sense; diamonds are mined, one of the $299 Xbox One S bundles includes Minecraft, and one of the things you can mine in Minecraft are diamonds... but still, games consoles and diamond rings aren't the most obvious of companions.

Read 2 remaining paragraphs | Comments

Acer Spin 5 and Spin 7 convertible laptops now available

Acer Spin 5 and Spin 7 convertible laptops now available

Acer unveiled a new line of convertible notebooks under the Acer Spin name this summer, and now several of the first models are available in the United States.

Prices for the 13.3 inch Acer Spin 5 start at $599, while the thinner, lighter Spin 7 with a 14 inch display sells for about $1200.

The Spin 7 is a svelte laptop which measures 0.43 inches thick and weighs less than 2.7 pounds.

Continue reading Acer Spin 5 and Spin 7 convertible laptops now available at Liliputing.

Acer Spin 5 and Spin 7 convertible laptops now available

Acer unveiled a new line of convertible notebooks under the Acer Spin name this summer, and now several of the first models are available in the United States.

Prices for the 13.3 inch Acer Spin 5 start at $599, while the thinner, lighter Spin 7 with a 14 inch display sells for about $1200.

The Spin 7 is a svelte laptop which measures 0.43 inches thick and weighs less than 2.7 pounds.

Continue reading Acer Spin 5 and Spin 7 convertible laptops now available at Liliputing.

After Scott Kelly’s flight, NASA plans five more one-year missions

Missions of 12 months seen as a good compromise of science and logistics.

Enlarge / Cosmonaut Mikhail Kornienko climbs the stairs to enter the Soyuz TMA-16M spacecraft during the final check of the spacecraft, with NASA Astronaut Scott Kelly. (credit: NASA)

Eight months have passed since NASA astronaut Scott Kelly and Russian cosmonaut Mikhail Kornienko returned to Earth from a nearly year-long mission aboard the International Space Station. During that time, the long-duration fliers completed a battery of follow-up tests, and US and Russian scientists have busily crunched away at data collected before, during, and after the extended space mission. Researchers plan to present preliminary results at a scientific meeting in January.

The one-year mission was just the beginning, however. NASA’s Human Research Program, which supports safe and productive space travel, has begun devising follow-up missions to ensure it knows enough about prolonged stays in microgravity before astronauts venture into deep space for extended periods of time. And as important as Kelly's and Kornienko’s data is, a study with just two participants doesn’t allow scientists to draw meaningful conclusions.

“It’s just not enough,” said William Paloski, the director of the Human Research Program at NASA’s Johnson Space Center. “To extrapolate we need to have more time in space, and more observations. We started working on additional missions two years ago.” The question is how best to collect that additional data.

Read 8 remaining paragraphs | Comments

Forschung: Googles KI schlägt menschlichen Lippenleser

Zusammen mit der Universität Oxford forschen Google-Wissenschaftler an einem Algorithmus, der automatisiertes Lippenlesen ermöglichen soll. Die bisherigen Ergebnisse sind sehr vielversprechend: Die Erkennungsrate der KI ist weitaus höher als die eines menschlichen Lippenlesers. (Google, KI)

Zusammen mit der Universität Oxford forschen Google-Wissenschaftler an einem Algorithmus, der automatisiertes Lippenlesen ermöglichen soll. Die bisherigen Ergebnisse sind sehr vielversprechend: Die Erkennungsrate der KI ist weitaus höher als die eines menschlichen Lippenlesers. (Google, KI)

Intractable conflicts produce an empathy gap in teens

Adolescents’ brains are still developing, and conflict can shape that development.

Enlarge (credit: Steve Evans)

Intergroup conflict, also called civil conflict, is one of the world’s most serious problems, as warfare has shifted from the battlefield toward something enmeshed within civilian life. The constant exposure to high-stress conflict situations affects everyone, but it may have an outsized influence on developing adolescent brains. A recent study published in PNAS found that adolescents who grow up in protracted civil conflicts end up more empathetic and cognitively attuned to the people within their own group and less sensitive to pain felt by others.

The researchers who conducted this study recruited 85 adolescents from a conflict-ridden region in Israel. They categorized the participants as identifying either as Arab-Palestinian or Jewish-Israeli. The participants were shown a set of well-validated photographs of other people who clearly belonged to one of these groups, either in painful or non-painful conditions. During this task, each participant's brain activity was measured using MEG (magnetoencephalography), a functional neuroimaging technique that tracks the magnetic effects of currents moving through neurons to visualize brain activity.

The authors found that adolescents from both groups (Arab and Jewish) responded differently to ingroup and outgroup images. All the subjects showed significant brain activation in pain-empathy regions when the pain images contained in-group characters. But when an outgroup figure was shown, there was no difference in the response, regardless of whether that figure was experiencing pain. So all participants could have an empathetic response, but only to members of their own group

Read 4 remaining paragraphs | Comments