FBI Had REvil’s Kaseya Ransomware Decryption Key for Weeks

The Kaseya ransomware attack, which occurred in July and affected as many as 1,500 companies worldwide, was a big, destructive mess—one of the largest and most unwieldy of its kind in recent memory. But new information shows the FBI could have lightened the blow victims suffered but chose not to.

A new report from the Washington Post shows that, shortly after the attack, the FBI came into possession of a decryption key that could unlock victims’ data—thus allowing them to get their businesses back up and running. However, instead of sharing it with them or Kaseya, the IT firm targeted by the attack, the bureau kept it a secret for approximately three weeks.

The feds reportedly did this because they were planning an operation to “disrupt” the hacker gang behind the attack—the Russia-based ransomware provider REvil—and didn’t want to tip their hand. However, before the FBI could put its plan into action, the gang mysteriously disappeared. The bureau finally shared the decryption key with Kaseya on July 21—about a week after the gang had vanished.

[…]

Source: FBI Had REvil’s Kaseya Ransomware Decryption Key for Weeks: Report

Database containing 106m Thailand travelers’ details over the past decade leaked

A database containing personal information on 106 million international travelers to Thailand was exposed to the public internet this year, a Brit biz claimed this week.

Bob Diachenko, head of cybersecurity research at product-comparison website Comparitech, said the Elasticsearch data store contained visitors’ full names, passport numbers, arrival dates, visa types, residency status, and more. It was indexed by search engine Censys on August 20, and spotted by Diachenko two days later. There were no credentials in the database, which is said to have held records dating back a decade.

[…]

Diachenko said he alerted the operator of the database, which led to the Thai authorities finding out about it, who “were quick to acknowledge the incident and swiftly secured the data,” Comparitech reported. We’re told that the IP address of the exposed database, hidden from sight a day after Diachenko raised the alarm, is still live, though connecting to it reports that the box is now a honeypot.

[…]

We’ve contacted the Thai embassy in the US for further comment. Diachenko told The Register a “server misconfiguration” by an IT outsourcer caused the database to be exposed to the whole world.

[…]

Additionally, it’s possible that if you’ve traveled to Thailand and stayed there during the pandemic, you’ve already been leaked. A government website used to sign foreigners up for COVID-19 vaccines spilled names and passport numbers in June.

Additionally, last month, Bangkok Airways was hit by ransomware group LockBit resulting in the publishing of passenger data. And in 2018, TrueMove H, the biggest 4G mobile operator in Thailand, suffered a database breach of around 46,000 records.

Comparitech said the database it found contained several assets, in addition to the 106 million records, making the total leaked information come to around 200 GB.

Source: Database containing 106m Thailand travelers’ details leaked • The Register

India antitrust probe finds Google abused Android dominance

NEW DELHI, Sept 18 (Reuters) – Google abused the dominant position of its Android operating system in India, using its “huge financial muscle” to illegally hurt competitors, the country’s antitrust authority found in a report on its two-year probe seen by Reuters.

Alphabet Inc’s (GOOGL.O) Google reduced “the ability and incentive of device manufacturers to develop and sell devices operating on alternative versions of Android,” says the June report by the Competition Commission of India’s (CCI) investigations unit.

[…]

Its findings are the latest antitrust setback for Google in India, where it faces several probes in the payments app and smart television markets. The company has been investigated in Europe, the United States and elsewhere. This week, South Korea’s antitrust regulator fined Google $180 million for blocking customised versions of Android.

‘VAGUE, BIASED AND ARBITRARY’

Google submitted at least 24 responses during the probe, defending itself and arguing it was not hurting competition, the report says.

Microsoft Corp (MSFT.O), Amazon.com Inc (AMZN.O), Apple Inc (AAPL.O), as well as smartphone makers like Samsung and Xiaomi, were among 62 entities that responded to CCI questions during its Google investigation, the report says.

Android powers 98% of India’s 520 million smartphones, according to Counterpoint Research.

When the CCI ordered the probe in 2019, it said Google appeared to have leveraged its dominance to reduce device makers’ ability to opt for alternate versions of its mobile operating system and force them to pre-install Google apps.

The 750-page report finds the mandatory pre-installation of apps “amounts to imposition of unfair condition on the device manufacturers” in violation of India’s competition law, while the company leveraged the position of its Play Store app store to protect its dominance.

Play Store policies were “one-sided, ambiguous, vague, biased and arbitrary”, while Android has been “enjoying its dominant position” in licensable operating systems for smartphones and tablets since 2011, the report says.

The probe was triggered in 2019 after two Indian junior antitrust research associates and a law student filed a complaint, Reuters reported.

[…]

Source: India antitrust probe finds Google abused Android dominance, report shows | Reuters

MoD apologises after Afghan interpreters’ personal data exposed (yes the ones still in Afghanistan)

The UK’s Ministry of Defence has launched an internal investigation after committing the classic CC-instead-of-BCC email error – but with the names and contact details of Afghan interpreters trapped in the Taliban-controlled nation.

The horrendous data breach took place yesterday, with Defence Secretary Ben Wallace promising an immediate investigation, according to the BBC.

Included in the breach were profile pictures associated with some email accounts, according to the state-owned broadcaster. The initial email was followed up by a second message urging people who had received the first one to delete it – a way of drawing close attention to an otherwise routine missive.

The email was reportedly sent by the British government’s Afghan Relocations and Assistance Policy (ARAP) unit, urging the interpreters not to put themselves or their families at risk. The ministry was said to have apologised for the “unacceptable breach.”

“This mistake could cost the life of interpreters, especially for those who are still in Afghanistan,” one source told the Beeb.

Since the US-led military coalition pulled out of Afghanistan at the end of August, there have been distressing scenes in the country as the ruling Taliban impose Islamic Sharia law – while hunting down and punishing those who helped the Western militaries. Some interpreters have reportedly been murdered, with others fearing for their lives and the well-being of their families.

[…]

Source: MoD apologises after Afghan interpreters’ data exposed • The Register

Facebook Documents Show It Fumbled the Fight Over Vaccines

he Wall Street Journal has had something of a banner week tearing down Facebook. Its series on a trove of internal company documents obtained by the paper has unveiled Facebook’s secret system for treating certain users as above the rules, company research showing how harmful Instagram is for young girls, how the site’s algorithmic solutions to toxic content have backfired, and that Facebook executives are slow to respond to reports of organized criminal activity. On Friday, it published another article detailing how badly Facebook has fumbled fighting anti-vax content and CEO Mark Zuckerberg’s campaign to get users vaccinated.

[…]

One big problem was that Facebook users were brigading any content addressing vaccination with anti-vax comments. Company researchers, according to the Journal, warned executives that comments on vaccine-related content were flooded with anti-vax propaganda, pseudo-scientific claims, and other false information and lies about the virus and the vaccines.

Global health institutions such as the World Health Organization (WHO) and Unicef had registered their concern with Facebook, with one internal company memo warning of “anti-vaccine commenters that swarm their Pages,” while another internal report in early 2021 made an initial estimate that up to 41% of comments on vaccine-related posts appeared to risk discouraging people from getting vaccinated (referred to within the company “barrier to vaccination” content). That’s out of a pool of around 775 million vaccine-related comments seen by users daily.

[…]

Facebook had promised in 2019 to crack down on antivax content and summoned WHO reps to meet with tech leaders in February 2020. Zuckerberg personally got in contact with National Institute of Allergy and Infectious Diseases director Dr. Anthony Fauci to discuss funding vaccine trials, offer ad space and user data for government-run vaccination campaigns, and arrange a live Q&A between the two on the site. Facebook had also made adjustments to its content-ranking algorithm that a June 2020 memo claimed reduced health misinformation by 6.7% to 9.9%, the Journal wrote.

But by summer 2020, BS claims about the coronavirus and vaccines were going viral on the site, including the viral “Plandemic” video, a press conference staged by a group of right-wing weirdos calling themselves “America’s Frontline Doctors,” and a handful of anti-vax accounts such as Robert F. Kennedy Jr.’s that advocacy group Avaaz later identified as responsible for a wildly disproportionate share of the offending content. According to the Journal, Facebook was well aware that the phenomenon was being driven by a relatively small but determined and prolific segment of posters and group admins:

As the rollout of the vaccine began early this year, antivaccine activists took advantage of that stance. A later analysis found that a small number of “big whales” were behind many antivaccine posts and groups on the platform. Out of nearly 150,000 posters in Facebook Groups disabled for Covid misinformation, 5% were producing half of all posts, and around 1,400 users were responsible for inviting half the groups’ new members, according to one document.

“We found, like many problems at FB, this is a head-heavy problem with a relatively few number of actors creating a large percentage of the content and growth,” Facebook researchers would write in May, likening the movement to QAnon and efforts to undermine elections.

Zuckerberg waffled and suggested that Facebook shouldn’t be in the business of censoring anti-vax posts in an interview with Axios in September 2020, saying “If someone is pointing out a case where a vaccine caused harm or that they’re worried about it —you know, that’s a difficult thing to say from my perspective that you shouldn’t be allowed to express at all.” This was a deeply incorrect assessment of the problem, as Facebook was well aware that a small group of bad actors was actively and intentionally pushing the anti-vax content.

Another internal assessment conducted earlier this year by a Facebook employee, the Journal wrote, found that two-thirds of randomly sampled comments “were anti-vax” (though the sample size was just 110 comments). In their analysis, the staffer noted one poll that showed actual anti-vaccine sentiment in the general population was 40% lower.

[…]

The Journal reported that one integrity worker flagged a post with 53,000 shares and three million views that asserted vaccines are “all experimental & you are in the experiment.” Facebook’s automated moderation tools had ignored it after somehow concluding it was written in the Romanian language. By late February, researchers came up with a hasty method to scan for “vaccine hesitant” comments, but according to the Journal their report mentioned the anti-vax comment problem was “rampant” and Facebook’s ability to fight it was “bad in English, and basically non-existent elsewhere.”

[…]

 

Source: Facebook Documents Show It Fumbled the Fight Over Vaccines

FTC releases findings on how Big Tech eats little tech in deals that fly under the radar

Federal Trade Commission chair Lina Khan signaled changes are on the way in how the agency scrutinizes acquisitions after revealing the results of a study of a decade’s worth of Big Tech company deals that weren’t reported to the agency.

Why it matters: Tech’s business ecosystem is built on giant companies buying up small startups, but the message from the antitrust agency this week could chill mergers and acquisitions in the sector.

What they found: The FTC reviewed 616 transactions valued at $1 million or more between 2010 and 2019 that were not reported to antitrust authorities by Amazon, Apple, Facebook, Google and Microsoft.

  • 94 of the transactions actually exceeded the dollar size threshold that would require companies to report a deal. The deals may have qualified for other regulatory exemptions.
  • 79% of transactions used deferred or contingent compensation to founders and key employees, and nearly 77% involved non-compete clauses.
  • 36% of the transactions involved assuming some amount of debt or liabilities.

What they’re saying: In a statement, Khan said the report shows that loopholes may be “unjustifiably enabling deals to fly under the radar.”

  • Matt Stoller, director of research at the American Economic Liberties Project, said the high percentage of non-compete clauses was especially troubling.
  • “If nothing else, it’s a clear anticompetitive intent to just take talent and prevent them from competing with you,” Stoller said. “And there is a limited amount of tech talent.”

The other side: Nothing in the report indicates that rules were broken or that the deals were anticompetitive, Neil Chilson, a former FTC adviser, pointed out.

  • “I think the message is pretty clear from the chair: She’s suspicious of mergers, no matter what the size, just based on a belief that mergers at any size are suspect and should be reviewed,” Chilson, now senior research fellow for Tech and Innovation at Stand Together, told Axios.
  • “The law certainly is not behind her on that, and I don’t think the economics are particularly there either, and nothing in the report supports that assertion.”

Source: FTC releases findings on how Big Tech eats little tech – Axios

There we go – it’s a problem I have been talking about for some time

Facebook’s 2018 Algorithm Change ‘Rewarded Outrage’. Zuck Resisted Fixes

Internal memos show how a big 2018 change rewarded outrage and that CEO Mark Zuckerberg resisted proposed fixes

In the fall of 2018, Jonah Peretti, chief executive of online publisher BuzzFeed, emailed a top official at Facebook Inc. The most divisive content that publishers produced was going viral on the platform, he said, creating an incentive to produce more of it.

He pointed to the success of a BuzzFeed post titled “21 Things That Almost All White People are Guilty of Saying,” which received 13,000 shares and 16,000 comments on Facebook, many from people criticizing BuzzFeed for writing it, and arguing with each other about race. Other content the company produced, from news videos to articles on self-care and animals, had trouble breaking through, he said.

Mr. Peretti blamed a major overhaul Facebook had given to its News Feed algorithm earlier that year to boost “meaningful social interactions,” or MSI, between friends and family, according to internal Facebook documents reviewed by The Wall Street Journal that quote the email.

BuzzFeed built its business on making content that would go viral on Facebook and other social media, so it had a vested interest in any algorithm changes that hurt its distribution. Still, Mr. Peretti’s email touched a nerve.

Facebook’s chief executive, Mark Zuckerberg, said the aim of the algorithm change was to strengthen bonds between users and to improve their well-being. Facebook would encourage people to interact more with friends and family and spend less time passively consuming professionally produced content, which research suggested was harmful to their mental health.

Within the company, though, staffers warned the change was having the opposite effect, the documents show. It was making Facebook’s platform an angrier place.

Company researchers discovered that publishers and political parties were reorienting their posts toward outrage and sensationalism. That tactic produced high levels of comments and reactions that translated into success on Facebook.

“Our approach has had unhealthy side effects on important slices of public content, such as politics and news,” wrote a team of data scientists, flagging Mr. Peretti’s complaints, in a memo reviewed by the Journal. “This is an increasing liability,” one of them wrote in a later memo.

They concluded that the new algorithm’s heavy weighting of reshared material in its News Feed made the angry voices louder. “Misinformation, toxicity, and violent content are inordinately prevalent among reshares,” researchers noted in internal memos.

Some political parties in Europe told Facebook the algorithm had made them shift their policy positions so they resonated more on the platform, according to the documents.

“Many parties, including those that have shifted to the negative, worry about the long term effects on democracy,” read one internal Facebook report, which didn’t name specific parties.

Facebook employees also discussed the company’s other, less publicized motive for making the change: Users had begun to interact less with the platform, a worrisome trend, the documents show.

The email and memos are part of an extensive array of internal company communications reviewed by the Journal. They offer an unparalleled look at how much Facebook knows about the flaws in its platform and how it often lacks the will or the ability to address them. This is the third in a series of articles based on that information.

[…]

Anna Stepanov, who led a team addressing those issues, presented Mr. Zuckerberg with several proposed changes meant to address the proliferation of false and divisive content on the platform, according to an April 2020 internal memo she wrote about the briefing. One such change would have taken away a boost the algorithm gave to content most likely to be reshared by long chains of users.

“Mark doesn’t think we could go broad” with the change, she wrote to colleagues after the meeting. Mr. Zuckerberg said he was open to testing the approach, she said, but “We wouldn’t launch if there was a material tradeoff with MSI impact.”

Last month, nearly a year and a half after Ms. Stepanov said Mr. Zuckerberg nixed the idea of broadly incorporating a similar fix, Facebook announced it was “gradually expanding some tests to put less emphasis on signals such as how likely someone is to comment or share political content.” The move is part of a broader push, spurred by user surveys, to reduce the amount of political content on Facebook after the company came under criticism for the way election protesters used the platform to question the results and organize protests that led to the Jan. 6 riot at the Capitol in Washington.

[…]

“MSI ranking isn’t actually rewarding content that drives meaningful social interactions,” Mr. Peretti wrote in his email to the Facebook official, adding that his staff felt “pressure to make bad content or underperform.”

It wasn’t just material that exploited racial divisions, he wrote, but also “fad/junky science,” “extremely disturbing news” and gross images.

Political effect

In Poland, the changes made political debate on the platform nastier, Polish political parties told the company, according to the documents. The documents don’t specify which parties.

“One party’s social media management team estimates that they have shifted the proportion of their posts from 50/50 positive/negative to 80% negative, explicitly as a function of the change to the algorithm,” wrote two Facebook researchers in an April 2019 internal report.

Nina Jankowicz, who studies social media and democracy in Central and Eastern Europe as a fellow at the Woodrow Wilson Center in Washington, said she has heard complaints from many political parties in that region that the algorithm change made direct communication with their supporters through Facebook pages more difficult. They now have an incentive, she said, to create posts that rack up comments and shares—often by tapping into anger—to get exposure in users’ feeds.

The Facebook researchers, wrote in their report that in Spain, political parties run sophisticated operations to make Facebook posts travel as far and fast as possible.

“They have learnt that harsh attacks on their opponents net the highest engagement,” they wrote. “They claim that they ‘try not to,’ but ultimately ‘you use what works.’ ”

In the 15 months following fall 2017 clashes in Spain over Catalan separatism, the percentage of insults and threats on public Facebook pages related to social and political debate in Spain increased by 43%, according to research conducted by Constella Intelligence, a Spanish digital risk protection firm.

[…]

Early tests showed how reducing that aspect of the algorithm for civic and health information helped reduce the proliferation of false content. Facebook made the change for those categories in the spring of 2020.

When Ms. Stepanov presented Mr. Zuckerberg with the integrity team’s proposal to expand that change beyond civic and health content—and a few countries such as Ethiopia and Myanmar where changes were already being made—Mr. Zuckerberg said he didn’t want to pursue it if it reduced user engagement, according to the documents.

[…]

Source: Facebook tried to make its platform a healthier place. It got angrier instead

Ig Nobel Prizes blocked by YouTube takedown over 1914 song snippet – can’t find human to fix the error

YouTube, the Ig Nobel Prizes, and the Year 1914

YouTube’s notorious takedown algorithms are blocking the video of the 2021 Ig Nobel Prize ceremony.

We have so far been unable to find a human at YouTube who can fix that. We recommend that you watch the identical recording on Vimeo.

The Fatal Song

This is a photo of John McCormack, who sang the song “Funiculi, Funicula” in the year 1914, inducing YouTube to block the 2021 Ig Nobel Prize ceremony.

Here’s what triggered this: The ceremony includes bits of a recording (of tenor John McCormack singing “Funiculi, Funicula”) made in the year 1914.

The Corporate Takedown

YouTube’s takedown algorithm claims that the following corporations all own the copyright to that audio recording that was MADE IN THE YEAR 1914: “SME, INgrooves (on behalf of Emerald); Wise Music Group, BMG Rights Management (US), LLC, UMPG Publishing, PEDL, Kobalt Music Publishing, Warner Chappell, Sony ATV Publishing, and 1 Music Rights Societies”

UPDATES: (Sept 19, 2021) There’s an ongoing discussion on Slashdot.(Sept 13, 2021) There’s an ongoing discussion on Hacker News, about this problem.

Source: Improbable Research » Blog Archive

First of all, what is copyright doing protecting anything from 1914? The creator is more than dead and buried and the model of creating once and keeping raking in money is ridiculous anyway.
Second, this shows the power the large copyright holders hold over smaller players – and the Ig Nobel Prizes aren’t exactly a small player! If a big corporation throws a DMCA at you, there’s nothing you can do – you are caught in a Kafka-esque hole with no hope in sight.

A Stanford Proposal Over AI’s ‘Foundations’ Ignites Debate

Last month, Stanford researchers declared that a new era of artificial intelligence had arrived, one built atop colossal neural networks and oceans of data. They said a new research center at Stanford would build—and study—these “foundation models” of AI.

Critics of the idea surfaced quickly—including at the workshop organized to mark the launch of the new center. Some object to the limited capabilities and sometimes freakish behavior of these models; others warn of focusing too heavily on one way of making machines smarter.

“I think the term ‘foundation’ is horribly wrong,” Jitendra Malik, a professor at UC Berkeley who studies AI, told workshop attendees in a video discussion.

Malik acknowledged that one type of model identified by the Stanford researchers—large language models that can answer questions or generate text from a prompt—has great practical use. But he said evolutionary biology suggests that language builds on other aspects of intelligence like interaction with the physical world.

“These models are really castles in the air; they have no foundation whatsoever,” Malik said. “The language we have in these models is not grounded, there is this fakeness, there is no real understanding.” He declined an interview request.

A research paper coauthored by dozens of Stanford researchers describes “an emerging paradigm for building artificial intelligence systems” that it labeled “foundation models.” Ever-larger AI models have produced some impressive advances in AI in recent years, in areas such as perception and robotics as well as language.

Large language models are also foundational to big tech companies like Google and Facebook, which use them in areas like search, advertising, and content moderation. Building and training large language models can require millions of dollars worth of cloud computing power; so far, that’s limited their development and use to a handful of well-heeled tech companies.

But big models are problematic, too. Language models inherit bias and offensive text from the data they are trained on, and they have zero grasp of common sense or what is true or false. Given a prompt, a large language model may spit out unpleasant language or misinformation. There is also no guarantee that these large models will continue to produce advances in machine intelligence.

[…]

Dietterich wonders if the idea of foundation models isn’t partly about getting funding for the resources needed to build and work on them. “I was surprised that they gave these models a fancy name and created a center,” he says. “That does smack of flag planting, which could have several benefits on the fundraising side.”

[…]

Emily M. Bender, a professor in the linguistics department at the University of Washington, says she worries that the idea of foundation models reflects a bias toward investing in the data-centric approach to AI favored by industry.

Bender says it is especially important to study the risks posed by big AI models. She coauthored a paper, published in March, that drew attention to problems with large language models and contributed to the departure of two Google researchers. But she says scrutiny should come from multiple disciplines.

“There are all of these other adjacent, really important fields that are just starved for funding,” she says. “Before we throw money into the cloud, I would like to see money going into other disciplines.”

[…]

 

Source: A Stanford Proposal Over AI’s ‘Foundations’ Ignites Debate | WIRED

Alaska discloses ‘sophisticated’ nation-state cyberattack on health service

Alaska discloses ‘sophisticated’ nation-state cyberattack on health service

A nation-state cyber-espionage group has gained access to the IT network of the Alaska Department of Health and Social Service (DHSS), the agency said last week.

The attack, which is still being investigated, was discovered on May 2, earlier this year, by a security firm, which notified the agency.

While the DHSS made the incident public on May 18 and published two updates in June and August, the agency did not reveal any details about the intrusion until last week, when it officially dispelled the rumor that this was a ransomware attack.

Instead, the agency described the intruders as a “nation-state sponsored attacker” and “a highly sophisticated group known to conduct

complex cyberattacks against organizations that include state governments and health care entities.”

Attackers entered DHSS network via a vulnerable website

Citing an investigation conducted together with security firm Mandiant, DHSS officials said the attackers gained access to the department’s internal network through a vulnerability in one of its websites and “spread from there.”

Officials said they believe to have expelled the attacker from their network; however, there is still an investigation taking place into what the attackers might have accessed.

In a press release last week [PDF], the agency said it plans to notify all individuals who provided their personal information to the state agency.

“The breach involves an unknown number of individuals but potentially involves any data stored on the department’s information technology infrastructure at the time of the cyberattack,” officials said.

Data stored on the DHSS network, and which could have been collected by the nation-state group, includes the likes of:

  • Full names
  • Dates of birth
  • Social Security numbers
  • Addresses
  • Telephone numbers
  • Driver’s license numbers
  • Internal identifying numbers (case reports, protected service reports, Medicaid, etc.)
  • Health information
  • Financial information
  • Historical information concerning individuals’ interaction with DHSS

Notification emails will be sent to all affected individuals between September 27 and October 1, 2021, the DHSS said.

The agency has also published a FAQ page [PDF] with additional details about the nation-state attack.

“Regrettably, cyberattacks by nation-state-sponsored actors and transnational cybercriminals are becoming more common and are an inherent risk of conducting any type of business online,” said DHSS Technology Officer Scott McCutcheon.

All systems breached by the intruders remain offline. This includes systems used to perform background checks and systems used to request birth, death, and marriage certificates, all of which are now processed and reviewed manually, in person or via the phone.

Source: Alaska discloses ‘sophisticated’ nation-state cyberattack on health service – The Record by Recorded Future

Rolls-Royce’s all-electric aircraft completes 15-minute maiden voyage

Rolls-Royce, best known in aviation for its jet engines, has taken an all-electric airplane on its maiden voyage. The “Spirit of Innovation” completed a 15 minute flight, marking “the beginning of an intensive flight-testing phase in which we will be collecting valuable performance data on the aircraft’s electrical power and propulsion system,” the company announced.

Rolls Royce said the one-seat airplane has “the most power-dense battery pack every assembled for an aircraft.” The aircraft uses a 6,000 cell battery pack with a three-motor powertrain that currently delivers 400kW (500-plus horsepower), and Rolls-Royce said the aircraft will eventually achieve speeds of over 300 MPH.

[…]

Source: Rolls-Royce’s all-electric aircraft completes 15-minute maiden voyage | Engadget

Judge in pocket of big business throws book at Man who unlocked nearly 2 million AT&T phones: 12 years in prison

A man who the Department of Justice says unlocked AT&T customers’ phones for a fee was sentenced to 12 years in prison, in what the judge called “a terrible cybercrime over an extended period,” which allegedly continued even after authorities were on to the scheme.

According to a news release from the DOJ, in 2012, Muhammad Fahd, a citizen of Pakistan and Grenada, contacted an AT&T employee via Facebook and offered the employee “significant sums of money” to help him secretly unlock AT&T phones, freeing the customers from any installment agreement payments and from AT&T’s service.

Fahd used the alias Frank Zhang, according to the DOJ, and persuaded the AT&T employee to recruit other employees at its call center in Bothell, Washington, to help with the elaborate scheme. Fahd instructed the AT&T employees to set up fake businesses and phony bank accounts to receive payments, and to create fictitious invoices for deposits into the fake accounts to create the appearance that money exchanged as part of the scheme was payment for legitimate services.

In 2013, however, AT&T put into place a new unlocking system which made it harder for Fahd’s crew to unlock phones’ unique IMEI numbers, so according to the DOJ he hired a developer to design malware that could be installed on AT&T’s computer system. This allegedly allowed him to unlock more phones, and do so more efficiently. The AT&T employees working with Fahd helped him access information about its systems and other employees’ credentials, allowing his developer to tailor the malware more precisely, the DOJ said.

A forensic analysis by AT&T showed Fahd and his helpers fraudulently unlocked more than 1.9 million phones, costing the company more than $200 million. Fahd was arrested in Hong Kong in 2018 and extradited to the US in 2019. He pleaded guilty in September 2020 to conspiracy to commit wire fraud.

It’s not clear from the DOJ release whether anyone besides AT&T was harmed as a result of the scheme; there’s no mention of customers’ phones being otherwise compromised or any personal data being accessed. We’ve reached out to the DOJ to clarify whether any AT&T customers were affected.

Source: Man who unlocked nearly 2 million AT&T phones gets 12 years in prison – The Verge

So much for initiative then…

Physicists make square droplets and liquid lattices

When two substances are brought together, they will eventually settle into a steady state called thermodynamic equilibrium; examples include oil floating on top of water and milk mixing uniformly into coffee. Researchers at Aalto University in Finland wanted to disrupt this sort of state to see what happens—and whether they can control the outcome.

[…]

In their work, the team used combinations of oils with different dielectric constants and conductivities. They then subjected the liquids to an .

“When we turn on an electric field over the mixture, accumulates at the interface between the oils. This shears the interface out of thermodynamic equilibrium and into interesting formations,” explains Dr. Nikos Kyriakopoulos, one of the authors of the paper. As well as being disrupted by the electric field, the liquids were confined into a thin, nearly two-dimensional sheet. This combination led to the oils reshaping into various completely unexpected droplets and patterns.

The droplets in the experiment could be made into squares and hexagons with straight sides, which is almost impossible in nature, where small bubbles and droplets tend to form spheres. The two liquids could be also made to form into interconnected lattices: grid patterns that occur regularly in solid materials but are unheard of in mixtures. The liquids can even be coaxed into forming a torus, a donut shape, which was stable and held its shape while the field was applied—unlike in nature, as liquids have a strong tendency to collapse in and fill the hole at the center. The liquids can also form filaments that roll and rotate around an axis.

[…]

The research was carried out at the Department of Applied Physics in the Active Matter research group, led by Professor Timonen. The paper “Diversity of non- patterns and emergence of activity in confined electrohydrodynamically driven liquids” is published open-access in Science Advances.


Explore further

Effective temperatures connect equilibrium and nonequilibrium systems


More information: Diversity of non-equilibrium patterns and emergence of activity in confined electrohydrodynamically driven liquids, Science Advances (2021). DOI: 10.1126/sciadv.abh1642

Source: Physicists make square droplets and liquid lattices

Apple’s M1 MacBook screens are stunning – stunningly fragile and defective, that is, lawsuits allege

Aggrieved MacBook owners in two separate lawsuits claim Apple’s latest laptops with its M1 chips have defective screens that break easily and malfunction.

The complaints, both filed on Wednesday in a federal district court in San Jose, California, are each seeking class certification in the hope that the law firms involved will get a judicial blessing to represent the presumed large group of affected customers and, if victorious, to share any settlement.

Each of the filings contends Apple’s 2020-2021 MacBook line – consisting of the M1-based MacBook Air and M1-based 13″ MacBook Pro – have screens that frequently fail. They say Apple knew about the alleged defect or should have known, based on its own extensive internal testing, reports from technicians, and feedback from customers.

“[T]he M1 MacBook is defective, as the screens are extraordinarily fragile, cracking, blacking out, or showing magenta, purple and blue lines and squares, or otherwise ceasing to function altogether,” says a complaint filed on behalf of plaintiff Nestor Almeida [PDF]. “Thousands of users from across the globe have reported this issue directly to Apple and on Apple sponsored forums.”

Image of flawed Apple MacBook screen from Almeida complaint

Photograph from one of the lawsuits of a broken screen, redacted by the owner … Click to enlarge

The other complaint [PDF], filed on behalf of plaintiffs Daphne Pareas and Daniel Friend, makes similar allegations.

“The Class Laptops are designed and manufactured with an inherent defect that compromises the display screen,” it says. “During ordinary usage the display screens of the Class Laptops (1) may become obscured with black or gray bars and/or ‘dead spots’ where no visual output is displayed and (2) are vulnerable to cracks that obscure portions of the display. The appearance of black or gray bars on screen may precede, accompany, or follow cracks in the display glass.”

The Almeida complaint says thousands of Apple customers from around the world have reported MacBook screen problems to Apple and in online forums. It claims Apple has often refused to pay for repairs, forcing customers to pay as much as $850 through outside vendors. And where Apple has provided repairs, some customers have seen the problems return.

[…]

Source: Apple’s M1 MacBook screens are stunning – stunningly fragile and defective, that is, lawsuits allege • The Register

Scientists can now assemble entire genomes on their personal computers in minutes

Scientists at the Massachusetts Institute of Technology (MIT) and the Institut Pasteur in France have developed a technique for reconstructing whole genomes, including the human genome, on a personal computer. This technique is about a hundred times faster than current state-of-the-art approaches and uses one-fifth the resources. The study, published September 14 in the journal Cell Systems, allows for a more compact representation of genome data inspired by the way in which words, rather than letters, offer condensed building blocks for language models.

“We can quickly assemble entire genomes and metagenomes, including microbial genomes, on a modest laptop computer,” says Bonnie Berger, the Simons Professor of Mathematics at the Computer Science and AI Lab at MIT and an author of the study. “This ability is essential in assessing changes in the gut microbiome linked to disease and bacterial infections, such as sepsis, so that we can more rapidly treat them and save lives.”

[…]

To approach genome assembly more efficiently than current techniques, which involve making pairwise comparisons between all possible pairs of reads, Berger and colleagues turned to language models. Building from the concept of a de Bruijn graph, a simple, efficient data structure used for genome assembly, the researchers developed a minimizer-space de Bruin graph (mdBG), which uses short sequences of nucleotides called minimizers instead of single nucleotides.

“Our minimizer-space de Bruijn graphs store only a small fraction of the total nucleotides, while preserving the overall genome structure, enabling them to be orders of magnitude more efficient than classical de Bruijn graphs,” says Berger.

[…]

Berger and colleagues used their method to construct an index for a collection of 661,406 bacterial genomes, the largest collection of its kind to date. They found that the novel technique could search the entire collection for antimicrobial resistance genes in 13 minutes—a process that took 7 hours using standard sequence alignment.

[…]

“We can also handle sequencing data with up to 4% error rates,” adds Berger. “With long-read sequencers with differing error rates rapidly dropping in price, this ability opens the door to the democratization of sequencing data analysis.”

Berger notes that while the method currently performs best when processing PacBio HiFi reads, which fall well below a 1% error rate, it may soon be compatible with ultra-long reads from Oxford Nanopore, which currently has 5-12% error rates but may soon offer reads at 4%.

[…]

Source: Scientists can now assemble entire genomes on their personal computers in minutes

Simple Mathematical Law Predicts Movement in Cities around the World

The people who happen to be in a city center at any given moment may seem like a random collection of individuals. But new research featuring a simple mathematical law shows that urban travel patterns worldwide are, in fact, remarkably predictable regardless of location—an insight that could enhance models of disease spread and help to optimize city planning.

Studying anonymized cell-phone data, researchers discovered what is known as an inverse square relation between the number of people in a given urban location and the distance they traveled to get there, as well as how frequently they made the trip. It may seem intuitive that people visit nearby locations frequently and distant ones less so, but the newly discovered relation puts the concept into specific numerical terms. It accurately predicts, for instance, that the number of people coming from two kilometers away five times per week will be the same as the number coming from five kilometers twice a week. The researchers’ new visitation law, and a versatile model of individuals’ movements within cities based on it, was reported in Nature.

[…]

The researchers analyzed data from about eight million people between 2006 and 2013 in six urban locations: Boston, Singapore, Lisbon and Porto in Portugal, Dakar in Senegal, and Abidjan in Ivory Coast. Previous analyses have used cell-phone data to study individuals’ travel paths; this study focused instead on locations and examined how many people were visiting, from how far and how frequently. The researchers found that all the unique choices people make—from dropping kids at school to shopping or commuting—obey this inverse square law when considered in aggregate. “The result is very simple but quite startling,” says Geoffrey West, an urban scaling theorist at the Santa Fe Institute and one of the paper’s senior authors.

[…]

“Those organizational patterns have really profound implications on how COVID will spread,” Scarpino says. In a smaller rural location, where many people regularly go to the same church or grocery store, the entire town will experience sharp peaks of infections as the virus sweeps through the community. But in a bigger city, the propagation takes longer, he explains, because mini epidemics can occur in each neighborhood somewhat separately.

Stewart adds: “The authors demonstrate that their visitation law—that takes into account both travel distance and frequency of visits in a way that other models do not—outperforms gravity models when it comes to predicting flows between locations.”

Source: Simple Mathematical Law Predicts Movement in Cities around the World – Scientific American

Australia gave police power to compel sysadmins into assisting account takeovers – so they plan to use it

Australia’s Federal Police force on Sunday announced it intends to start using new powers designed to help combat criminal use of encryption by taking over the accounts of some social media users, then deleting or modifying content they’ve posted.

The law also requires sysadmins to help those account takeovers.

The force (AFP) stated its intentions in light of the late August passage of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2021, which was first mooted in December 2020. While the Bill was subject to consultation, few suggestions were incorporated and in August the Bill sped through Australia’s Parliament after two days of superficial debate with many suggested amendments ignored.

As detailed in its explanatory memorandum, the Bill was aimed squarely at helping investigators to act against users of encrypted services.

[..]

Yes, dear reader, if granted those warrants mean the AFP and ACIC can take over an account and delete or modify content created by the accountholder. And if they can’t do that themselves, sysadmins are required to assist.

[…]

Another scenario of concern is “forum shopping” whereby investigators could be denied access to use of one law by a judge, so turn to another judge and try a different law that delivers essentially the same outcome.

The AFP seems not to be bothered by the debate: its announcements stated it will “be relentless in using the law and its powers to remove child sex abuse material and unlawful content from the dark web and other forums”

Source: Australia gave police power to compel sysadmins into assisting account takeovers – so they plan to use it • The Register

Well as soon as you hear kiddie porn you know it’s going to be used for much much more than against kiddie porn. Who can argue against kiddie porn, right?

South Korea’s antitrust regulator fines Google $177 million for stifling innovation and competition

South Korea’s competition regulator on Tuesday announced it will fine Google 207.4 billion Korean won ($176.9 million) for allegedly using its dominant market position in the mobile operating system space to stifle competition.

Google’s Android operating system currently holds the lion’s share of the smartphone market, ahead of Apple’s iOS platform.

The U.S. tech giant allegedly used its market position to block smartphone makers like Samsung from using operating systems developed by rivals, according to the Korea Fair Trade Commission.

Yonhap News added that the regulator, which published its decision in Korean, said the tech giant required smartphone makers to agree to an “anti-fragmentation agreement (AFA)” when signing key contracts with Google over app store licenses and early access to the operating system.

This content is blocked because you are not allowing cookies.

To view this content, click on Manage Cookie Preferences here or at the bottom of the page to allow all cookies.

That agreement prevented device makers from installing modified versions of the Android operating system, known as “Android forks,” on their handsets, Yonhap reported.

The regulator alleged that Google’s practice stifled innovation in the development of new operating systems for smartphones, the news site added. The KFTC has asked the tech giant to stop forcing companies to sign AFAs and ordered it to take corrective steps, according to Yonhap.

[…]

Tuesday’s fine is small compared with the tech giant’s quarterly figures. Last quarter, Google’s parent company Alphabet reported $61.88 billion in revenue.

[…]

In late August, the country’s parliament approved a bill that will allow app developers to avoid paying hefty commissions to major app store operators, including Google, by directing users to pay via alternate platforms.

Source: South Korea’s antitrust regulator fines Google $177 million

Singapore snitchbots into the streets to detect “undesirable social behaviours”

Singapore’s Home Team Science and Technology Agency (HTX) roving robot has hit the streets of Toa Payoh Central as part of a trial to support public officers in enhancing public health and safety.

The robot, named Xavier, was jointly developed by HTX and the Agency for Science, Technology and Research. It is fitted with sensors for autonomous navigation, a 360-degree video feed to the command and control centre, real-time sensing and analysis, and an interactive dashboard where public officers can receive real-time information from and be able to monitor and control multiple robots simultaneously.

[…]

Over a three-week trial period, Xavier will detect “undesirable social behaviours” including smoking in prohibited areas, illegal hawking, improperly parked bicycles, congregation of more than five people in line with existing social distancing measures, and motorised active mobility devices and motorcycles on footpaths.

If one of those behaviours are detected, Xavier will trigger real-time alerts to the command and control centre, and display appropriate messages to educate the public and deter such behaviours.

[…]

Source: Singapore sends Xavier the robot to help police keep streets safe under three-week trial | ZDNet

Kumu – network mapping tool

  • Stakeholder mapping

    Explore the complex web of loyalties, interests, influence, and alignment of key players around important issues.

  • Systems mapping

    Understand and engage complex systems more effectively using systems maps and causal loop diagrams.

  • Social network mapping

    Capture the structure of personal networks and reveal key players. Visualize the informal networks within your organization and see how work really gets done.

  • Community asset mapping

    Keep track of the evolving relationships among community members and resources.

  • Concept mapping

    Brainstorm complex ideas and relate individual concepts to the bigger picture. Unfold convoluted series of events using Lombardi diagrams.

Source: Kumu

Apple wins some and loses some in big Epic Games lawsuit – judge must have been on acid

On the eve of the iPhone 13 launch, we’ve finally been handed a ruling in the lawsuit filed by Epic Games last year. Epic Games, the developer of Fortnite, sued Apple last year over claims the company was violating U.S. antitrust law by prohibiting developers from implementing alternative in-app purchase methods. Today, Judge Yvonne Gonzalez-Rogers issued her ruling in the Epic Games v. Apple lawsuit, handing app developers a major win in the fight for app payment freedom.

As part of her ruling, Judge Gonzalez-Rogers issued a permanent injunction against Apple that orders the company to lift its restrictions on iOS apps and App Store pages providing buttons, external links, and other “calls to action” that direct consumers to other purchasing mechanisms. The injunction essentially orders Apple to abandon its anti-steering policy, which prohibited app developers from informing users of alternative purchasing methods.

[…]

Apple wins on all but one important claim

Last year, Epic Games intentionally circumvented Apple’s App Store policy by introducing direct payments for in-app purchases in Fortnite. Immediately after, Apple pulled Fortnite from the App Store and suspended Epic’s developer account, citing a violation of the App Store guidelines regarding in-app payments. When Epic sued Apple in response, they sought to have the latter reinstate their developer account so they could re-release Fortnite on iOS. Apple argued that Fortnite and Epic’s developer account should not be restored as Epic intentionally breached the contract between the two companies (a contract that, of course, Epic argues is illegal.)

However, Judge Gonzalez-Rogers today ruled in favor of Apple on its counterclaim of breach of contract. “Apple’s termination of the DPLA and the related agreements between Epic Games and Apple was valid, lawful, and enforceable,” said the Judge in her ruling. Because of this, it’s unlikely Apple will ever reinstate Fortnite or Epic’s developer account, because they were found to be correct in suspending them in the first place. The Judge also ordered Epic to pay 30% the revenue the company collected from Fortnite on iOS through Epic Direct Payment since it was implemented.

The Court also ruled that Epic Games “failed in its burden to demonstrate Apple is an illegal monopolist” in the narrowly-defined “digital mobile gaming transactions” market rather than both parties’ definition of the relevant market. The market in question is a $100 billion industry, and while Apple “enjoys considerable market share of over 55% and extraordinarily high profit margins,” Epic failed to prove to the Court that Apple’s behavior violated antitrust law. “Success is not illegal,” said Judge Gonzalez-Rogers in her ruling.

Source: Apple wins some and loses some in big Epic Games lawsuit

First the judge says it was wrong to force developers to pay exclusively through Apple, then says there were other options and Apple isn’t a monopoly and then says but you have to pay Apple a 30% cut of what you made through your other payment channel. What was this judge smoking?

Seeing what’s in a room by pointing a laser through a keyhole

Non-line-of-sight (NLOS) imaging and tracking is an emerging technology that allows the shape or position of objects around corners or behind diffusers to be recovered from transient, time-of-flight measurements. However, existing NLOS approaches require the imaging system to scan a large area on a visible surface, where the indirect light paths of hidden objects are sampled. In many applications, such as robotic vision or autonomous driving, optical access to a large scanning area may not be available, which severely limits the practicality of existing NLOS techniques. Here, we propose a new approach, dubbed keyhole imaging, that captures a sequence of transient measurements along a single optical path, for example, through a keyhole. Assuming that the hidden object of interest moves during the acquisition time, we effectively capture a series of time-resolved projections of the object’s shape from unknown viewpoints. We derive inverse methods based on expectation-maximization to recover the object’s shape and location using these measurements. Then, with the help of long exposure times and retroreflective tape, we demonstrate successful experimental results with a prototype keyhole imaging system.

FILES

    • Technical Paper and Supplement (link)

CITATION

C. Metzler, D. Lindell, G. Wetzstein, Keyhole Imaging: Non-Line-of-Sight Imaging and Tracking of Moving Objects Along a Single Optical Path, IEEE Transactions on Computational Imaging, 2021.

Overview of results


Keyhole Imaging Overview
Keyhole imaging. A time-resolved detector and pulsed laser illuminate and image a point visible through a keyhole (left). As a hidden person moves, the detector captures a series of time-resolved measurements of the indirectly scattered light (center). From these measurements, we reconstruct both hidden object shape (e.g., for a hidden mannequin) and the time-resolved trajectory (right).

Keyhole Imaging Prototype
Experimental setup. Our optical system sends a laser pulse through the keyhole of a closed door. On the other side of the door, the hidden object moves along a translation stage. When third-bounce photons return, they are recorded and time-stamped by a SPAD. Top-right inset: A beam splitter (BS) is used to place the laser and SPAD in a confocal configuration.

Keyhole Imaging Experiments
Experimental results. First row: Images of the hidden objects. Second row: Reconstructions of the hidden objects using GD when their trajectories are known. Third row: EM reconstructions of the hidden objects when their trajectories are unknown. Fourth row: EM estimates of the trajectories of the hidden objects, each of which follows a different trajectory, where the dot color indicates position over time.
Computational imaging of moving 3D objects through the keyhole of a closed door.

Source: Computational Imaging Keyhole Imaging | IEEE TCI 2021

Hackers leak passwords for 500,000 Fortinet VPN accounts

A threat actor has leaked a list of almost 500,000 Fortinet VPN login names and passwords that were allegedly scraped from exploitable devices last summer.

While the threat actor states that the exploited Fortinet vulnerability has since been patched, they claim that many VPN credentials are still valid.

[…]

The list of Fortinet credentials was leaked for free by a threat actor known as ‘Orange,’ who is the administrator of the newly launched RAMP hacking forum and a previous operator of the Babuk Ransomware operation.

[…]

Both posts lead to a file hosted on a Tor storage server used by the Groove gang to host stolen files leaked to pressure ransomware victims to pay.

BleepingComputer’s analysis of this file shows that it contains VPN credentials for 498,908 users over 12,856 devices.

While we did not test if any of the leaked credentials were valid, BleepingComputer can confirm that all of the IP address we checked are Fortinet VPN servers.

Further analysis conducted by Advanced Intel shows that the IP addresses are for devices worldwide, with 2,959 devices located in the USA.

[…]

Kremez told BleepingComputer that the Fortinet CVE-2018-13379 vulnerability was exploited to gather these credentials.

A source in the cybersecurity industry told BleepingComputer that they were able to legally verify that at least some of the leaked credentials were valid.

It is unclear why the threat actor released the credentials rather than using them for themselves, but it is believed to have been done to promote the RAMP hacking forum and the Groove ransomware-as-a-service operation.

[…]

Source: Hackers leak passwords for 500,000 Fortinet VPN accounts

Jagex Blocks Release Of Popular Runescape Mod Runelite HD

Runelite HD is a mod (made by one person, 117) that takes Old School RuneScape and gives it an HD makeover.

As far back as 2018, Jagex were issuing legal threats against mods like this, claiming they were copyright infringement. However, those appeared to have blown over as Jagex gave their blessing to the original Runelite.

Yet earlier this week, just hours before the improved Runelite HD was due for an official release, 117 was contacted by Jagex, demanding that work stop and that the release be cancelled. This time, however, it’s not down to copyright claims, but because Jagex says they’re making their own HD upgrade.

[…]

While that sounds somewhat fair at first, there’s a huge problem. Runelite HD doesn’t actually seem to break any of Jagex’s modding guidelines, and the company says that new guidelines that spell out the fact Runelite HD does actually break its guidelines are being released next week.

Understandably, fans think this is incredibly shady, and have begun staging an in-game protest:

Mod creator 117 says they attempted to compromise with Jagex, even offering to remove their mod once the company had finished and released their own efforts, but, “they declined outright,” seemingly spelling the end for a project that had consumed, “approximately over 2000 hours of work over two years.”

Source: Jagex Blocks Release Of Popular Runescape Mod Runelite HD

Way to go, another company like GTA’s take two interactive, pissing off their player base.

Australia: Facebook Users Liable for Comments Under Their Posts

The High Court’s ruling on Wednesday is just a small part of a larger case brought against Australian news outlets, including the Sydney Morning Herald, The Age, and The Australian, among others, by a man who said he was defamed in the Facebook comments of the newspapers’ stories in 2016.

The question before the High Court was the definition of “publisher,” something that isn’t easily defined in Australian law.

From Australia’s ABC News:

The court found that, by creating a public Facebook page and posting content, the outlets had facilitated, encouraged and thereby assisted the publication of comments from third-party Facebook users, and they were, therefore, publishers of those comments.

The Aboriginal-Australian man who brought the lawsuit, Dylan Voller, was a detainee at a children’s detention facility in the Northern Territory in 2015 when undercover video of kids being physically abused was captured and broadcast in 2016. Voller was shown shirtless with a hood over his head and restraints around his arms. His neck was even tied to the back of the chair.

Facebook commenters at the time made false allegations that Voller had attacked a Salvation Army officer, leaving the man blind in one eye.

[…]

Voller never asked for the Facebook comments to be taken down, according to the media companies, something that was previously required for the news outlets to be held criminally liable for another user’s content in Australia. Facebook comments couldn’t be turned off completely in 2016, a feature that was added just this year.

Wednesday’s ruling did not determine whether the Facebook comments were defamatory and Voller’s full case against the media companies can now go forward to the High Court. Nine News, one of the companies being sued, released a statement to ABC News saying they were “obviously disappointed” in today’s ruling.

[…]

Source: Australia: Facebook Users Liable for Comments Under Their Posts

So if Facebook is responsible for stuff published on their platform then shouldn’t they be resposible for the comments too?