Dashcam footage of cop tasing, dragging, and dropping teen is unsealed

Officer drags tased 17-year-old like a sack of potatoes then drops him face first.

Graphic footage of the 2014 abuse of a 17-year-old by a suburban Kansas City, Missouri police officer. Officer Timothy Runnels received four years in prison after the incident was captured on the officer’s dashcam

A federal judge on Monday unsealed disturbing dashcam footage of a suburban Kansas City, Missouri police officer tasering a 17-year-old motorist who became brain damaged after what was billed as a routine traffic stop. That stop subsequently turned into an event of excessive force—resulting in a four-year prison sentence for Officer Timothy Runnels of the Independence Police Department.

The video shows Runnels tase and yank Bryce Masters out of the car and down on the street as Masters howls. The boy was filming the officer with his mobile phone, which the officer flings to the street. "Am I under arrest? Am I under arrest?" the teen is overheard saying before he is stunned and grabbed from the vehicle.

The officer drags the boy on the street like a sack of potatoes then drops him face first to the ground. During the brief 2014 incident, the boy, who was going to play Xbox with a friend, went into cardiac arrest and now suffers from brain damage. The traffic stop was based on a warrant from Kansas City, which turned out to be a mistake connected to the license plate on the vehicle the boy was driving. The officer claimed he also smelled marijuana and that the teen was being uncooperative.

Read 9 remaining paragraphs | Comments

British people are getting laid a lot–just not in Britain

British sexual habit studies reveal vacation hookups are part of a risky health pattern.

British people have been going to Italy to hook up for more than a century. (credit: A Room with a View)

Vacation flings are the stuff of bad romance movies and unhappy trips to the clinic, but now they are also the subject of two studies published in a British Medical Journal publication called Sexually Transmitted Infections. Two groups of researchers analyzed surveys of what British people do when they travel abroad and found that sex is high on the list.

One study, authored by population health researcher Clare Tanton and her colleagues, was an examination of 12,530 people who took part in the British National Survey of Sexual Attitudes and Lifestyles between 2010 and 2012. The group was composed of people from 16-74 years old, who reported having at least one sexual partner in the past five years. Out of this group, 9.2 percent of men and 5.3 percent of women said they found one or more new sexual partners while outside England. And out of those groups, according to Tanton and her colleagues, there was a lot of "disassortative sexual mixing," meaning cross-nationality intermingling.

In total, 72 percent of men said their overseas hookups were with non-UK residents, while 58 percent of women said the same. Interestingly, the study states that "men were less likely than women to report having partners from the Middle East/North Africa (2.4 percent vs 5.7 percent)." People who had sex with non-UK residents were also less likely to identify themselves by ticking the box for "White (British)" on the survey form.

Read 5 remaining paragraphs | Comments

FBI seeks expanded National Security Letter to include browser history and more

Activists oppose adding “Electronic Communication Transactional Records” to law.

(credit: Dave Newman)

Major tech companies, advocacy groups, and at least one senator have publicly proclaimed their opposition to two bills currently working their way through Congress. The two pieces of proposed legislation would each significantly expand use of National Security Letters to include "Electronic Communication Transactional Records"—better known as metadata.

As Ars has reported previously, federal investigators issue tens of thousands of NSLs each year to banks, ISPs, car dealers, insurance companies, doctors, and others in terrorism and espionage investigations. The letters demand personal information, and they don't need a judge's signature, much less a showing of probable cause. They also come with a default gag to the recipient that forbids the disclosure of the NSL to the public or the target.

On Thursday, the Senate Judiciary Committee is set to vote on one of those provisions as an amendment to a bill called the Electronic Communications Privacy Act Amendments Act of 2015 (S. 356). The provision would allow NSLs to target "account number, login history, length of service (including start date)…Internet Protocol address…routing, or transmission information…" and more.

Read 6 remaining paragraphs | Comments

FTC’s chief technologist gets her mobile phone number hijacked by ID thief

If it can happen to her, chances are it can happen to lots of people.

(credit: GotCredit)

In a scenario that's growing increasingly common, the chief technologist of the US Federal Trade Commission recently lost control of her smartphone after someone posing as her walked into a mobile phone store and hijacked her number.

Details of the incident were provided by the FTC's Lorrie Cranor in a blog post published Tuesday morning with the headline "Your mobile phone account could be hijacked by an identity thief." In it, Cranor wrote:

A few weeks ago an unknown person walked into a mobile phone store, claimed to be me, asked to upgrade my mobile phones, and walked out with two brand new iPhones assigned to my telephone numbers. My phones immediately stopped receiving calls, and I was left with a large bill and the anxiety and fear of financial injury that spring from identity theft. This post describes my experiences as a victim of ID theft, explains the growing problem of phone account hijacking, and suggests ways consumers and mobile phone carriers can help combat these scams.

My Experiences as a Victim of ID Theft

One evening my mobile phone stopped working mid call. After discovering that another phone on my account also had no signal, I called my mobile carrier on a landline phone. The customer service representative explained that my account had been updated to include new iPhones, and in the process the SIM cards in my Android phones had been deactivated. She assumed it was a mistake, and told me to take my phones to one of my mobile carrier’s retail stores.

The store replaced my SIM cards and got my phones working again. A store employee explained that a thief claiming to be me had gone into a phone store and “upgraded” my two phones to the most expensive iPhone models available and transferred my phone numbers to the new iPhones.

I called my mobile carrier’s fraud department and reported what happened. The representative agreed to remove the charges, but blamed the theft on me. When I asked how the store authenticated the thief, he told me that employees of stores owned by the mobile carrier would have asked for the account holder’s photo ID and the last four digits of their social security number, but if the theft occurred at another retailer, that might not have happened.

I logged in to my online account, changed the password, and added an extra security PIN recommended by the fraud department. I then logged on to the Federal Trade Commission’s identitytheft.gov website to report the theft and learn how to protect myself. Identitytheft.gov is a one-stop resource for identity theft victims. It includes step-by-step instructions and sample letters to guide victims through the recovery process. Following the Identitytheft.gov checklist, I placed a fraud alert and obtained a free credit report. I also prepared an identity theft complaint affidavit, which I later printed and took with me to my local police station when I filed a police report.

The FTC chief technologist went on to invoke federal law to force the unnamed carrier to provide the paperwork filed by the identity thief who hijacked her account. Cranor discovered that the thief used a fake ID that showed Cranor's name and the thief's photo. The thief acquired the iPhones at a retail store in Ohio hundreds of miles from Cranor's home and charged them to Cranor's account on an installment plan.

Read 3 remaining paragraphs | Comments

KickassTorrents Enters The Dark Web, Adds Official Tor Address

KickassTorrents, the world’s most popular torrent index, is pushing back against the increasing number of ISP blockades. To make it easier for its users to bypass local censorship efforts, KAT’s operators have added a dark web address, hiding the site in the Tor network.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

kickassWith millions of visitors per day KickassTorrents (KAT) is currently the most visited torrent site on the Internet.

As a result, copyright holders have taken aim at the site in recent years, resulting in ISP blockades in the UK, Finland and elsewhere. Soon, even Australia may be added to this list.

While these blocks are somewhat effective, there are also plenty of ways to circumvent them. KAT itself is operating various proxy sites, for example, and today it steps up its unblocking efforts by joining the dark web.

Through a newly launched domain KAT users can now access their favorite site on the Tor network. Tor, which stands for The Onion Router, is an encrypted anonymity network that can’t be easily blocked by ISPs.

“Good news for those who have difficulties accessing KAT due to the site block in their country, now you can always access KAT via this address lsuzvpko6w6hzpnn.onion on a TOR network,” Mr. White announces.

kattor

Tor users can access regular websites, but also dedicated Tor sites that use an .onion address. People who want to access these addresses have to be connected to the Tor network, through the special Tor browser for example.

TorrentFreak spoke to KAT’s Mr. White who informs us that an .onion address was added by popular request, making it easier for users to bypass even the strictest blockades.

KAT is not the first torrent site to become active on the Tor network. The Pirate Bay has had an .onion address for several years already. In addition, there are also several smaller torrent and warez communities active on the dark web.

Thus far the response from KAT users has been mostly positive, with many welcoming bridge to the dark web.

“This is fantastic news. I had quite some difficulties trying to log in. Now no more,” one user notes. Another one adds, “welcome to Tor KAT family, nothing beats sailing on the dark net.”

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

What are the coolest features your smartphone has… that you don’t use?

What are the coolest features your smartphone has… that you don’t use?

These days you can ask most smartphones questions as if you were speaking to another person, use your phone as a GPS navigation device, tap a button on your phone to instantly get contextual information about whatever’s on the screen, and do a whole bunch of other cool things.

But a recent study from Creative Strategies suggesting that most people don’t actually use one of the coolest features on their phones (voice assistant software like Siri, Cortana, or OK Google), got me thinking about some of the things I know my phone can do… but which I don’t find all that useful.

Continue reading What are the coolest features your smartphone has… that you don’t use? at Liliputing.

What are the coolest features your smartphone has… that you don’t use?

These days you can ask most smartphones questions as if you were speaking to another person, use your phone as a GPS navigation device, tap a button on your phone to instantly get contextual information about whatever’s on the screen, and do a whole bunch of other cool things.

But a recent study from Creative Strategies suggesting that most people don’t actually use one of the coolest features on their phones (voice assistant software like Siri, Cortana, or OK Google), got me thinking about some of the things I know my phone can do… but which I don’t find all that useful.

Continue reading What are the coolest features your smartphone has… that you don’t use? at Liliputing.

Canada looks to delay tricky F-35 decision by buying Super Hornets

New PM promised no F-35 purchases, and Boeing offers the Super Hornet as an out.

US Navy F/A-18F Super Hornets stack up for refueling over Afghanistan in 2010. Canada is looking to the latest Super Hornet as a way to put off buying F-35s. (credit: US Air Force)

While campaigning for office, Canadian Prime Minister Justin Trudeau promised that his government would never buy the controversial, increasingly expensive F-35 Joint Strike Fighter for his country's air force. That declaration came despite the previous administration's commitment to purchase 65 of those planes from Lockheed Martin. Now, however, it appears Trudeau's government has found a way to fulfill his campaign promise and avoid any potential legal headaches that would result from Canada dropping its commitment with Lockheed. Trudeau's solution? Buy more fighters from Boeing now, delay an F-35 decision 'til later.

At last week's CANSEC defense trade show in Ottawa, Canadian Defence Minister Harjit Sajjan said that the Canadian Air Force's aging CF-18 Hornet fighter fleet would present a "growing capability gap" over the next decade that would make it difficult for Canada to meet its commitment to NATO. "This I find unacceptable, and it's one thing that we plan to fix," Sajjan said.

And as Defense News reports, the fix Sajjan and the Trudeau government will implement was proposed by Boeing. Instead of waiting for the F-35 to become available, Canada would buy a new version of Boeing's F/A-18 Super Hornet—and thus push the need to make a decision on an F-35 purchase into the late 2020s. The "interim" acquisition plan was reportedly presented to the Canadian government by Boeing with a very warm reception.

Read 3 remaining paragraphs | Comments

Which E3 rumors should you believe? An Ars analysis

From Dead Rising 4 to a new Red Dead Redemption, we try to glean truth from leaks.

As usual, next week's Electronic Entertainment Expo will be home to dozens of new game announcements from the industry's biggest publishers. This week, though, is when a lot of those announcements actually leak out publicly before their official, splashy reveals at the show. There's only one problem: amid the credible rumors about upcoming games are a bunch of completely wild guesses from a hyped-up gaming public.

How do you separate the reliable information from the uninformed conjecture? That's what we're here for! Below, we take a look at some of the most interesting E3 rumors floating around and analyze the available evidence to determine just how likely these murmurings are. (This list doesn't include the many games at the show that have already been announced or shown previously.) Take a look, and keep an eye out when we cover all the official announcements from the E3 show floor next week.

The Rumor: Watch Dogs 2

Read 26 remaining paragraphs | Comments

Researchers testing a glaucoma therapy based on engineered stem cells

The stem cells appear to activate the eye’s own repair system.

The trabecular meshwork (between the cornea and iris) helps fluid move from the eye into a drainage system, as shown by the red arrows. (credit: U of Miami Atomic Force Microscopy Lab)

Your eye may seem like a fairly static object, but it actually has an elaborate plumbing system. Tissues inside it constantly produce fluid (termed "aqueous humor") that then has to be drained to keep things in balance.

Like our man-made plumbing systems, the ones in our eyes can get backed up. When more fluid is produced than can be drained, pressure can build up in the eye, producing a condition called glaucoma. Over time, this can cause damage to sensitive eye tissue. Of the 60 million people around the globe thought to suffer from glaucoma, 7 million are blind as a result.

There are drugs and surgical means of reducing the pressure within the eye, but none is consistently effective. Now, some researchers in Iowa have found what might be an alternative approach: get the eye to repair the drainage system. They key to doing this? Stem cells.

Read 9 remaining paragraphs | Comments

Lisa Pathfinder: Die Technik zur Gravitationswellenmessung funktioniert

Es kann losgehen mit dem Messen der Gravitationswellen im Weltall: Die Technik funktioniert besser als gedacht, wie die Testmission ergeben hat. Allerdings ist dennoch Geduld gefragt. (Wissenschaft, ESA)

Es kann losgehen mit dem Messen der Gravitationswellen im Weltall: Die Technik funktioniert besser als gedacht, wie die Testmission ergeben hat. Allerdings ist dennoch Geduld gefragt. (Wissenschaft, ESA)