Crime

Allegation: Philly Cops Leaned Suspect Over Balcony To Obtain Password 210

Posted by timothy
from the forget-it-jake-it's-the-city-of-brotherly-love dept.
An anonymous reader writes with this news from Ars Technica: If you want access to encrypted data on a drug dealer's digital device, you might try to break the crypto—or you might just try to break the man.

According to testimony from a police corruption trial currently roiling the city of Philadelphia, officers from an undercover drug squad took the latter route back in November 2007. After arresting their suspect, Michael Cascioli, in the hallway outside his 18th floor apartment, the officers took Cascioli back inside. Although they lacked a search warrant, the cops searched Cascioli's rooms anyway. According to a federal indictment (PDF), the officers 'repeatedly assaulted and threatened [Cascioli] during the search to obtain information about the location of money, drugs, and drug suppliers.'
That included, according to Cascioli, lifting him over the edge of his balcony to try to frighten out of him the password to his Palm Pilot. That sounds like a good time for a duress password.
Censorship

Irish Legislator Proposes Law That Would Make Annoying People Online a Crime 110

Posted by Soulskill
from the turn-yourselves-in-at-the-local-pub dept.
An anonymous reader sends this report from TechDirt: Is Ireland looking to pass a law that would "outlaw ebooks and jail people for annoying others?" Well, no, not really, but that's the sort of unintended consequences that follow when laws are updated for the 21st century using little more than a word swap. Ireland has had long-standing laws against harassment via snail mail, telephones and (as of 2007) SMS messages. A 2014 report by the government's somewhat troublingly-named "Internet Content Governance Advisory Group" recommended updating this section of the law to cover email, social media and other internet-related transmissions. ... The broad language -- if read literally -- could make emailing an ebook to someone a criminal offense. Works of fiction are, by definition, false. ... It's the vestigial language from previous iterations of the law -- words meant to target scam artists and aggressive telemarketers -- that is problematic. Simply appending the words "electronic communications" to an old law doesn't address the perceived problem (cyberbullying is cited in the governance group's report). It just creates new problems.
Crime

Gen. Petraeus To Be Sentenced To Two Years Probation and Fine 94

Posted by samzenpus
from the standing-tall-before-the-man dept.
An anonymous reader writes: Petraeus, a now-retired U.S. Army General, has already agreed to plead guilty to a criminal misdemeanor charge of unauthorized removal and retention of classified material. As part of the agreement with prosecutors filed in March, the government will not seek any prison time. Instead, Petraeus will agree to pay a $40,000 fine and receive two years of probation, according to court documents. The recommendations are not binding on the federal judge who will preside at the hearing Thursday afternoon in Charlotte.
United States

Drone Killed Hostages From U.S. and Italy, Drawing Obama Apology 332

Posted by timothy
from the tragic-events dept.
HughPickens.com writes: The NYT reports that President Obama has offered an emotional apology for the accidental killing of two hostages held by Al Qaeda, one of them American, in a United States government counterterrorism operation in January, saying he takes "full responsibility" for their deaths. "As president and as commander in chief, I take full responsibility for all our counterterrorism operations," including the one that inadvertently took the lives of the two captives, a grim-faced Obama said in a statement to reporters in the White House briefing room. The White House earlier released an extraordinary statement revealing that intelligence officials had confirmed that Warren Weinstein, an American held by Al Qaeda since 2011, and Giovanni Lo Porto, an Italian held since 2012, died during the operation. Gunmen abducted Warren Weinstein in 2011 from his home in Lahore, Pakistan. They posed as neighbors, offered food and then pistol-whipped the American aid worker and tied up his guards, according to his daughter Alisa Weinstein.

The White House did not explain why it has taken three months to disclose the episode. Obama said that the operation was conducted after hundreds of hours of surveillance had convinced American officials that they were targeting an Al Qaeda compound where no civilians were present, and that "capturing these terrorists was not possible." The White House said the operation that killed the two hostages "was lawful and conducted consistent with our counterterrorism policies" but nonetheless the government is conducting a "thorough independent review" to determine what happened and how such casualties could be avoided in the future.
Communications

Traffic App Waze To Alert L.A. Drivers of Kidnappings and Hit-and-Runs 81

Posted by timothy
from the target-audience-is-rubberneckers dept.
An anonymous reader writes: Traffic-alert app Waze has announced a partnership with Los Angeles to share information on hit-and-runs and kidnappings taking place across the city, alongside traffic data and road closure updates. The deal forms part of a data-sharing agreement between L.A. authorities and the Google-owned tech startup detailed yesterday by the city's mayor Eric Garcetti. He assured that the data provided to the city by Waze would be "aggregated" and completely anonymous. According to the councillor the collaboration was mutually confirmed on Monday following a "very good meeting" between Waze and LAPD chief officer Charlie Beck. This move signals a considerable turn of events after Beck argued at the end of last year that the traffic alert app posed a danger to police due to its ability to track their location. The complaint followed the shooting of two police officers in New York after the shooter used the app to track his targets.
Australia

Wellness App Author Lied About Cancer Diagnosis 255

Posted by timothy
from the but-this-was-my-whole-health-plan dept.
Freshly Exhumed writes: Wellness advocate Belle Gibson, who translated her high profile as a cancer survivor into publishing success, has admitted her cancer diagnosis was not real. Ms Gibson, 23, who claimed to have healed terminal brain cancer by eating wholefoods, made the admission in an interview with the Australian Women's Weekly. The success of Gibson's book, The Whole Pantry, and her smartphone application, which advocates natural therapies, has been largely dependent on her high-profile as a cancer survivor. Sadly, we've seen this sort of behaviour before. It would seem that Belle Gibson has emulated Dr. Andrew Wakefield in knowingly decieving the public in ways that could possibly be dangerous to the health of believers.
Crime

Futures Trader Arrested For Causing 2010 'Flash Crash' 305

Posted by Soulskill
from the moving-at-the-speed-of-government dept.
New submitter dfsmith writes: Apparently the "Flash Crash" of the stock market in May 2010 was perpetrated by a futures trader in the UK. The US Justice Department alleges that he used a "dynamic layering scheme" of large-volume sell orders to confuse other buyers, hence winning big in his futures trades. "By allegedly placing multiple, simultaneous, large-volume sell orders at different price points—a technique known as 'layering'—Sarao created the appearance of substantial supply in the market. As part of the scheme, Sarao allegedly modified these orders frequently so that they remained close to the market price, and typically canceled the orders without executing them. When prices fell as a result of this activity, Sarao allegedly sold futures contracts only to buy them back at a lower price. Conversely, when the market moved back upward as the market activity ceased, Sarao allegedly bought contracts only to sell them at a higher price."
Privacy

Baltimore Police Used Stingrays For Phone Tracking Over 25,000 Times 81

Posted by Soulskill
from the i-don't-remember-that-episode-of-The-Wire dept.
An anonymous reader writes The Baltimore Police Department is starting to come clean about its use of cell-phone signal interceptors — commonly known as Stingrays — and the numbers are alarming. According to recent court testimony reported by The Baltimore Sun, the city's police have used Stingray devices with a court order more than 25,000 times. It's a massive number, representing an average of nearly nine uses a day for eight years (the BPD acquired the technology in 2007), and it doesn't include any emergency uses of the device, which would have proceeded without a court order.
Crime

New Dark Web Market Is Selling Zero-Day Exploits 30

Posted by samzenpus
from the finest-crime dept.
Sparrowvsrevolution writes Over the last month, a marketplace calling itself TheRealDeal Market has emerged on the dark web, with a focus on sales of hackers' zero-day attack methods. Like the Silk Road and its online black market successors like Agora and the recently defunct Evolution, TheRealDeal runs as a Tor hidden service and uses bitcoin to hide the identities of its buyers, sellers, and administrators. But while some other sites have sold only basic, low-level hacking tools and stolen financial details, TheRealDeal's creators say they're looking to broker premium hacker data like zero-days, source code, and hacking services, often offered on an exclusive, one-time sale basis.

Currently an iCloud exploit is being offered for sale on the site with a price tag of $17,000 in bitcoin, claiming to be a new method of hacking Apple iCloud accounts. "Any account can be accessed with a malicious request from a proxy account," reads the description. "Please arrange a demonstration using my service listing to hack an account of your choice." Others include a technique to hack WordPress' multisite configuration, an exploit against Android's Webview stock browser, and an Internet Explorer attack that claims to work on Windows XP, Windows Vista and Windows 7, available for around $8,000 in bitcoin. None of these zero days have yet been proven to be real, but an escrow system on the site using bitcoin's multisignature transaction feature is designed to prevent scammers from selling fake exploits.
Crime

Oklahoma Says It Will Now Use Nitrogen Gas As Its Backup Method of Execution 590

Posted by timothy
from the that's-not-the-only-cost dept.
schwit1 writes Yesterday, Oklahoma governor Mary Fallin signed into law a bill that approves the use of nitrogen gas for executions in the state. The method, which would effectively asphyxiate death row inmates by forcing them to breathe pure nitrogen through a gas mask, is meant to be the primary alternative to lethal injection, the Washington Post reports.

Fallin and other supporters of the procedure say it's pain-free and effective, noting that the nitrogen would render inmates unconscious within ten seconds and kill them in minutes. It's also cheap: state representatives say the method only requires a nitrogen tank and a gas mask, but financial analysts say its impossible to give precise figures, the Post reports.

Oklahoma's primary execution method is still lethal injection, but the state's procedure is currently under review by the Supreme Court. Earlier this week, Tennessee suspended executions statewide following challenges to its own lethal injection protocol.
The Courts

FBI Overstated Forensic Hair Matches In Nearly All Trials Before 2000 173

Posted by timothy
from the why-the-house-wins-so-often dept.
schwit1 writes The Justice Department and FBI have formally acknowledged that nearly every examiner in an elite FBI forensic unit gave flawed testimony in almost all trials in which they offered evidence against criminal defendants over more than a two-decade period before 2000. Of 28 examiners with the FBI Laboratory's microscopic hair comparison unit, 26 overstated forensic matches in ways that favored prosecutors in more than 95 percent of the 268 trials reviewed so far, according to the National Association of Criminal Defense Lawyers (NACDL) and the Innocence Project, which are assisting the government with the country's largest post-conviction review of questioned forensic evidence. The cases include those of 32 defendants sentenced to death. Of those, 14 have been executed or died in prison, the groups said under an agreement with the government to release results after the review of the first 200 convictions.
Transportation

Dutch Prosecutors Launch Criminal Investigation Against Uber For Flouting Ban 48

Posted by timothy
from the red-lights-and-red-tape dept.
An anonymous reader writes Dutch prosecutors have announced that they are prosecuting taxi-hailing giant Uber for continuing to disregard last December's ban on the company offering its unlicensed UberPOP service in the Netherlands. The statement declares 'The company Uber is now a suspect...This means a preliminary examination will be started to collect evidence that Uber is providing illegal transportation on a commercial basis,'. Dutch police presented evidence to the prosecutors of UberPOP drivers in Amsterdam ignoring the ban, and at the time of writing the UberPOP service is still available via Uber's Amsterdam website [https://www.uber.com/cities/amsterdam]. Though Uber inspires new litigation on a weekly basis in the territories in which it is seeking to consolidate its services, this is the first time it has been the subject of a criminal prosecution.
Crime

Can Online Reporting System Help Prevent Sexual Assaults On Campus? 234

Posted by timothy
from the vote-early-and-often dept.
jyosim writes Studies have shown that as many as 90 percent of campus rapes are committed by repeat offenders. A new system is designed to help identify serial assaulters, by letting students anonymously report incidents in order to look for patterns. But some argue that having the ability to report someone with just the click of a button may not be a good thing. Andrew T. Miltenberg, a New York lawyer who represents young men accused of sexual misconduct, says though the system seems well intended, he is concerned about dangers it may pose to students who are accused. 'We're all guilty of pressing send on an angry text or email that, had we had to put it into an actual letter and proofread, we probably wouldn't have sent,' he says.
Crime

Allegation: Lottery Official Hacked RNG To Score Winning Ticket 342

Posted by timothy
from the his-number-was-up dept.
SternisheFan writes with this excerpt from Ars Technica about what may be the most movie-worthy real-life crime story of the year so far: Eddie Raymond Tipton, 51, may have inserted a thumbdrive into a highly locked-down computer that's supposed to generate the random numbers used to determine lottery winners, The Des Moines Register reported, citing court documents filed by prosecutors. At the time, Tipton was the information security director of the Multi-State Lottery Association, and he was later videotaped purchasing a Hot Lotto ticket that went on to fetch the winning $14.3 million payout.

In court documents filed last week, prosecutors said there is evidence to support the theory Tipton used his privileged position inside the lottery association to enter a locked room that housed the random number generating computers and
infect them with software that allowed him to control the winning numbers. The room was enclosed in glass, could only be entered by two people at a time, and was monitored by a video camera. To prevent outside attacks, the computers aren't connected to the Internet. Prosecutors said Tipton entered the so-called draw room on November 20, 2010, ostensibly to change the time on the computers. The cameras on that date recorded only one second per minute rather than running continuously like normal.

"Four of the five individuals who have access to control the camera's settings will testify they did not change the cameras' recording instructions," prosecutors wrote. "The fifth person is defendant. It is a reasonable deduction to infer that defendant tampered with the camera equipment to have an opportunity to insert a thumbdrive into the RNG tower without detection."
Crime

Watch DARPA Artificial Intelligence Search For Crime On the "Dark Web" 35

Posted by samzenpus
from the seek-it-out dept.
An anonymous reader shares this bit of news from DARPA. "Of late, DARPA has shown a growing interest in open sourcing its technology, even if its most terrifying creations, like army robot wildcats designed to reach speeds of 50Mph, are understandably kept private. In a week’s time, the wider world will be able to tinker with components of the military research body’s in-development search tool for the dark web. The Memex technology, named after an mechanical mnemonic dreamt up just as the Second World War was coming to a close, has already been put to use by a number of law enforcement agencies, who are looking to counter crime taking place on networks like Tor, where Hidden Services are protected by the privacy-enhancing, encrypted hosting, often for good, often for bad. In its first year, the focus at Memex has been on tracking human trafficking, but the project's scope stretches considerably wider."
Crime

Would-Be Bomber Arrested In Kansas; Planned Suicide Attack on Ft. Riley 297

Posted by timothy
from the well-that's-not-nice dept.
The Associated Press (as carried by the Boston Herald) reports that a 20-year old Topeka man has been arrested as he attempted to arm what he believed to be a thousand-pound bomb outside Ft. Riley, Kansas. John T. Booker Jr. is alleged to have planned an attack in conspiracy with others who were actually FBI agents; Booker's postings to Facebook in March 2014 about his desire to die as a martyr brought him to the FBI's attention, and the FBI sting operation which ended in his arrest began after these posts. Booker had been recruited by the U.S. Army in February of last year, but his enlistment was cancelled shortly thereafter.
Crime

Florida Teen Charged With Felony Hacking For Changing Desktop Wallpaper 629

Posted by Soulskill
from the climate-of-fear dept.
colinneagle writes: A 14-year-old middle school student in Holiday, Florida, was arrested this week and charged with "an offense against a computer system and unauthorized access," which is a felony. The student reportedly used an administrator password to log into a teacher's computer and change the background image to a photo of two men kissing.

The student also revealed his secrets after he was caught – the password was the teacher's last name, and the teacher had typed it in in full view of the students. The student said many other students used these administrators' passwords (their teachers' last names) so they can screen-share and video chat with other students. The student was briefly held in a nearby detention center, and the county Sheriff warned that other teenagers caught doing the same thing will "face the same consequences."
Crime

The Courage of Bystanders Who Press "Record" 489

Posted by samzenpus
from the doing-the-right-thing dept.
HughPickens.com writes Robinson Meyer writes in The Atlantic that in the past year, after the killings of Michael Brown and Tamir Rice, many police departments and police reformists have agreed on the necessity of police-worn body cameras. But the most powerful cameras aren't those on officer's bodies but those wielded by bystanders. We don't yet know who shot videos of officer Michael T. Slager shooting Walter Scott eight times as he runs away but "unknown cameramen and women lived out high democratic ideals: They watched a cop kill someone, shoot recklessly at someone running away, and they kept the camera trained on the cop," writes Robinson. "They were there, on an ordinary, hazy Saturday morning, and they chose to be courageous. They bore witness, at unknown risk to themselves."

"We have been talking about police brutality for years. And now, because of videos, we are seeing just how systemic and widespread it is," tweeted Deray McKesson, an activist in Ferguson, after the videos emerged Tuesday night. "The videos over the past seven months have empowered us to ask deeper questions, to push more forcefully in confronting the system." The process of ascertaining the truth of the world has to start somewhere. A video is one more assertion made about what is real concludes Robinson. "Today, through some unknown hero's stubborn internal choice to witness instead of flee, to press record and to watch something terrible unfold, we have one more such assertion of reality."
United States

US Started Keeping Secret Records of International Telephone Calls In 1992 81

Posted by samzenpus
from the original-list dept.
schwit1 writes Starting in 1992, the Justice Department amassed logs of virtually all telephone calls from the USA to as many as 116 countries. The now-discontinued operation, carried out by the DEA's intelligence arm, was the government's first known effort to gather data on Americans in bulk, sweeping up records of telephone calls made by millions of U.S. citizens regardless of whether they were suspected of a crime. It was a model for the massive phone surveillance system the NSA launched to identify terrorists after the Sept. 11 attacks. That dragnet drew sharp criticism that the government had intruded too deeply into Americans' privacy after former NSA contractor Edward Snowden leaked it to the news media two years ago. More than a dozen current and former law enforcement and intelligence officials described the details of the Justice Department operation to USA TODAY. Most did so on the condition of anonymity because they were not authorized to publicly discuss the intelligence program, part of which remains classified. The operation had 'been approved at the highest levels of Federal law enforcement authority,' including then-Attorney General Janet Reno and her deputy, Eric Holder.
Crime

AT&T Call Centers Sold Mobile Customer Information To Criminals 92

Posted by samzenpus
from the was-that-wrong? dept.
itwbennett writes Employees at three call centers in Mexico, Colombia and the Philippines sold hundreds of thousands of AT&T customer records, including names and Social Security numbers, to criminals who attempted to use the customer information to unlock stolen mobile phones, the U.S. Federal Communications Commission said. AT&T has agreed to pay a $25 million civil penalty, which is the largest related to a data breach and customer privacy in the FCC's history.