Zanadou writes On December 9 The Pirate Bay was raided but despite the rise of various TPB clones and rumors of reincarnations, thepiratebay.se domain remained inaccessible, until today. This morning the Pirate Bay's nameservers were updated to ones controlled by their domain name registrar binero.se . A few minutes later came another big change when The Pirate Bay's main domain started pointing to a new IP-address (18.104.22.168) that is connected to a server hosted in Moldova. So far there is not much to see, just a background video of a waving pirate flag (taken from Isohunt.to) and a counter displaying the time elapsed since the December 9 raid. However, the "AES string" looks promising.
First time accepted submitter Andrio writes In an unprecedented decision, an Argentine court has ruled that the Sumatran orangutan 'Sandra', who has spent 20 years at the zoo in Argentina's capital Buenos Aires, should be recognized as a person with a right to freedom. The ruling, signed by the judges unanimously, would see Sandra freed from captivity and transferred to a nature sanctuary in Brazil after a court recognized the primate as a "non-human person" which has some basic human rights. The Buenos Aires zoo has 10 working days to seek an appeal." A similar case involving chimpanzees failed to provide "non-human person" status here in the U.S. earlier this month.
itwbennett writes "Without naming the group responsible, the Tor project warned that it could face attempts to incapacitate its network in the next few days through the seizure of specialized servers called directory authorities. These servers guide Tor users on the list of distributed relays on the network that bounce communications around. 'We are taking steps now to ensure the safety of our users, and our system is already built to be redundant so that users maintain anonymity even if the network is attacked. Tor remains safe to use,' wrote 'arma' in a post Friday on the Tor project blog. The 'arma' developer handle is generally associated with project leader Roger Dingledine. There were no reports of a seizure by late Sunday. The project promised to update the blog and its Twitter account with new information."
An anonymous reader writes The Telegraph reports, "GCHQ has lost track of some of the most dangerous crime lords and has had to abort surveillance on others after Edward Snowden revealed their tactics ... The spy agency has suffered "significant" damage in its ability to monitor and capture serious organized criminals following the exposes by the former CIA contractor. Intelligence officers are now blind to more than a quarter of the activities of the UK's most harmful crime gangs after they changed their communications methods in the wake of the Snowden leaks. One major drug smuggling gang has been able to continue flooding the UK with Class A narcotics unimpeded for the last year after changing their operations. More intense tracking of others has either been abandoned or not started because of fears the tactics are now too easy to spot and will force the criminals to "go dark" and be lost sight of completely."
An anonymous reader writes with a ruling that seems obvious in a case about police making a fake Instagram account. A federal judge in New Jersey has signed off on the practice of law enforcement using a fake Instagram account in order to become "friends" with a suspect — thus obtaining photos and other information that a person posts to their account. "No search warrant is required for the consensual sharing of this type of information," United States District Judge William Martini wrote in an opinion published last Tuesday. In other news, an undercover officer still doesn't need to tell you that he or she is a member of law enforcement if you ask.
mrspoonsi writes Charlie Shrem, former Bitcoin Foundation board member and CEO of the now-defunct exchange BitInstant, has been sentenced to two years in prison for helping Silk Road users anonymously swap cash for digital currency. Silk Road, as you know, was the online marketplace infamous for hosting anonymous drug and gun sales that was busted by the FBI back in 2013. A version 2.0 went up shortly after that, but it suffered the same fate as its predecessor this November. Based on evidence gathered during the crackdown, Shrem agreed to partner with Robert M. Faiella to trade over $1 million in cash from buyers. Faiella was the one with direct contact to buyers, hiding behind the name BTCKing to post ads promoting his dollar-to-Bitcoin business on the marketplace.
MojoKid (1002251) writes Tech support scammers have been around for a long time and are familiar to most Slashdot readers. But last month, the Federal Trade Commission (FTC) announced that it had issued lawsuits against several culprits responsible for tech support scams. Now Microsoft has announced that it too is going after tech support scammers. According to the company, more than 65,000 complaints have been made about tech support scams since May of this year alone. Bogus technicians, pretending to represent Microsoft, call the house offering fake tech support and trick people into paying hundreds of dollars to solve a non-existent issue. If successful in their ruse, the scammer then gains access to a person's computer, which lets them steal personal and financial information and even install malware.
I managed to keep one of these guys on the phone for about 20 minutes while I stumbled through his directions, over and over, "rebooting," pretending to be using Windows, etc; the next one caught on my quickly. Have they called you? If so, how did the call go?
mpicpp writes with this excerpt from Fortune: Staples said Friday afternoon that nearly 1.16 million customer payment cards may have been affected in a data breach under investigation since October. The office-supply retailer said two months ago that it was working with law enforcement officials to look into a possible hacking of its customers' credit card data. Staples said in October that it had learned of a potential data theft at several of its U.S. stores after multiple banks noticed a pattern of payment card fraud suggesting the company computer systems had been breached. Now, Staples believes that point-of-sale systems at 115 Staples locations were infected with malware that thieves may have used to steal customers' names, payment card numbers, expiration dates and card verification codes, Staples said on Friday. At all but two of those stores, the malware would have had access to customer data for purchases made between August 10 and September 16 of this year. At the remaining two stores, the malware was active from July 20 through September 16, the company said.
itwbennett writes T-Mobile US will pay at least $90 million to settle a Federal Communications Commission (FCC) suit that alleged it looked the other way while third parties charged T-Mobile subscribers for services they didn't want. The settlement is the second largest ever for so-called 'cramming,' following one that the FCC reached with AT&T in October. It came just two days after the Consumer Financial Protection Bureau sued Sprint for the same practice.
apexcp writes: In less than a month, one of the biggest trials of 2015 will begin in New York City. The full list of government evidence and defense objections found its way online recently, shedding light on both the prosecutor's courtroom strategy and the defense team's attempted rebuttals. Also important is what's not presented as evidence. There's not a single piece of forensic documentation about how the FBI originally found Silk Road servers, an act the defense has called "blatantly criminal."
krakman writes: Researchers discovered security flaws in SS7 that allow listening to private phone calls and intercepting text messages on a potentially massive scale – even when cellular networks are using the most advanced encryption now available. The flaws, to be reported at a hacker conference in Hamburg this month, are actually functions built into SS7 for other purposes – such as keeping calls connected as users speed down highways, switching from cell tower to cell tower – that hackers can repurpose for surveillance because of the lax security on the network. It is thought that these flaws were used for bugging German Chancellor Angela's Merkel's phone.
Those skilled at the housekeeping functions built into SS7 can locate callers anywhere in the world, listen to calls as they happen or record hundreds of encrypted calls and texts at a time for later decryption (Google translation of German original). There is also potential to defraud users and cellular carriers by using SS7 functions, the researchers say. This is another result of security being considered only after the fact, as opposed to being part of the initial design.
SternisheFan notes that Nebraska and Oklahoma are suing Colorado over marijuana legalization. The attorneys general of Nebraska and Oklahoma sued Colorado in the U.S. Supreme Court on Thursday, arguing state-legalized marijuana from Colorado is improperly spilling across state lines. The suit invokes the federal government's right to regulate both drugs and interstate commerce, and says Colorado's decision to legalize marijuana has been "particularly burdensome" to police agencies on the other side of the state line. In June, USA TODAY highlighted the flow of marijuana from Colorado into small towns across Nebraska: felony drug arrests in Chappell, Neb., just 7 miles north of the Colorado border have skyrocketed 400% in three years. "In passing and enforcing Amendment 64, the state of Colorado has created a dangerous gap in the federal drug control system enacted by the United States Congress. Marijuana flows from this gap into neighboring states, undermining plaintiff states' own marijuana bans, draining their treasuries, and placing stress on their criminal justice systems," says the lawsuit. "The Constitution and the federal anti-drug laws do not permit the development of a patchwork of state and local pro-drug policies and licensed distribution schemes throughout the country which conflict with federal laws."
Slate reports that even old movies are enough to trigger a pretty strong knee jerk: Team America, World Police, selected as a tongue-in-cheek replacement by Dallas's Alamo Drafthouse Theater for the Sony-yanked The Interview after that film drew too much heat following the recent Sony hack, has also been pulled. The theater's tweet, as reprinted by Slate: "due to circumstances beyond our control,” their Dec. 27 Team America screening has also been canceled." If only I had a copy, I'd like to host a viewing party here in Austin for The Interview, which I want to see now more than ever. (And it would be a fitting venue.)
An anonymous reader writes Australia is starting a public
consultation process for new legislation that further restricts the
publication and export of technology on national security grounds. The
public consultation starts now (a few days before Christmas) and it is due
by Jan 30th while a lot of Australians are on holidays. I don't have the
legal expertise to dissect the proposed legislation, but I'd like some
more public scrutiny on it. I find particularly disturbing the phrase "The
Bill includes defences that reverse the onus of proof which limit the
right to be presumed innocent until proven guilty" contained in this
document, also available on the consultation web site.
In June of 1962, three prisoners escaped the penitentary on Alcatraz, in an elaborate plot that was dramatized in a Clint Eastwood movie. A question that has long puzzled the public is whether these men ever made it to shore; the many factors that made Alcatraz a secure prison include sharks, cold water, and contrary currents. Still, some artifacts from the attempt, and perhaps the appeal of stories about survival against high odds, have led many people to believe that the men actually landed safely and faded into society. coondoggie writes This week Dutch scientists from Delft University of Technology presented findings from a computer modeling program they were working on, unrelated to the mystery, that demonstrated the escapees could have survived the journey. "In hindsight, the best time to launch a boat from Alcatraz was [11:30 am], one and a half hours later than has generally been assumed. A rubber boat leaving Alcatraz at [11:30 am] would most likely have landed just north of the Golden Gate Bridge. The model also shows that debris in that scenario would be likely to wash up at Angel Island, exactly where one of the paddles and some personal belongings were found.
rossgneumann writes North Korea may really be behind the Sony hack, but we're still acting like idiots. Peter W. Singer, one of the nations foremost experts on cybersecurity, says Sony's reaction has been abysmal. "Here, we need to distinguish between threat and capability—the ability to steal gossipy emails from a not-so-great protected computer network is not the same thing as being able to carry out physical, 9/11-style attacks in 18,000 locations simultaneously. I can't believe I'm saying this. I can't believe I have to say this."