Technology

Australia’s First Powerwall Home Batteries Are Already Installed In Western Sydney

When Tesla’s Powerwall battery energy storage system was first announced, solar-friendly Australians went mad for it. A relatively cheap integrated system that could hook up to the grid and to rooftop solar panels, the Powerwall is one of the first widely-available technologies that could reduce users’ reliance on energy delivered via the national electricity grid. And now, one of the first Powerwall batteries to be installed in Australia is already bolted to the outside wall of a home in western Sydney.

Australia is the first country in the world to have Powerwall batteries installed and delivered, and companies like Natural Solar and Origin Energy are receiving and installing their first shipments into homes and businesses around Australia. New South Wales is first, but other states and territories have their first installations scheduled from the start of next week onwards — via redwolf.newsvine.com

Business, Politics, Rights, Technology

61 agencies after warrantless access to Australian telecommunications metadata

The names of 57 agencies that are seeking to gain access to telecommunications metadata stored on Australian residents without a warrant have been released under a Freedom of Information (FOI) request.

The names of four agencies have been redacted, with the Attorney-General’s Department (AGD) previously saying that disclosing the names of these agencies would be contrary to the public interest.

The FOI request originally asked for correspondence from organisations seeking to gain access to stored telecommunications metadata. The department denied this request on practical grounds, stating that 2,661 pages spread across 288 documents were related to such a request, and that 45 third parties needed to be consulted before the information could be released.

Eventually, the request was narrowed down to merely a list of agencies looking to be declared as an enforcement agency as defined under the Telecommunications (Interception and Access) Act.

Agencies objected to disclosure on the basis that it would compromise the trust they place in the Commonwealth, AGD said last week. During consultation, these four agencies clearly indicated that disclosure of this information would damage the relationship between the department and the relevant agencies, and could affect any future cooperation with the department
— via redwolf.newsvine.com

Technology, Wildlife

Track the dangerous squirrels attacking the US power grid

It’s not just Chinese and Russian hackers that want to take down the power grid. The real cyber enemy lives inside — a true insider threat — and has been attacking national power lines for decades: squirrels. A new Twitter account and accompanying website @cybersquirrel1 is tracking the threat. As of January 5th, the site reports that squirrels have successfully disrupted the power grid 623 times, whereas birds have successfully penetrated it 214 times. These unclassified operations go back to 1987, or when the site begins its data collection.

Site visitors can choose a month and year to see a map populate with these successful squirrel operations around the country, along with links back to news stories about the subsequent power outages — via redwolf.newsvine.com

Technology

Uncooperative Russian ISP Prevents Cisco from Shutting Down Cybercriminal Gang

Cisco’s Talos research team has managed to identify and partially shut down a cyber-criminal group that is using the RIG exploit kit to infect users with all kinds of malware.

This particular group used a series of security vulnerabilities, but most of the time, it was using the CVE-2015-5119 flaw in Flash, which allowed the group to compromise computers and later infect them with spambots.

Cisco reports that, in most cases, the main payload was the Tofsee spambot variant, which infected Windows machines via Internet Explorer.

Researchers say that most of the users getting infected via this particular RIG exploit kit campaign are redirected to the site using malicious ads and iframes embedded in legitimate and compromised websites.

The campaign was extremely active during the past fall and used well over 7,000 different domain names and 44 IPs to spread their malware payloads — via redwolf.newsvine.com

Technology, Wildlife

Taking Derby the Dog to New Heights with 3D Printing / 3D Systems

Following the original success of 3D printed custom prosthetics for Derby the Dog late last year, 3D Systems team members have continued research to allow Derby to walk with a straight back. He can now sit like a real dog — via Youtube

Rights, Technology

Error 451: The new HTTP code for censorship

Governments will not always be able to disguise which content they restrict across the Web thanks to a new error code which will warn users of content restricted through censorship.

On Friday, the group responsible for Internet standards, the Internet Engineering Steering Group (IESG), approved a new HTTP code to differentiate between Web pages which cannot be shown for technical reasons and others which are unavailable for non-technical reasons, such as governmental censorship.

Status codes, available within the 100s to 500s, are most commonly encountered when something goes wrong — such as a server downtime, for example, which prevents a user from accessing a Web page. The common 404 error tells users a page has not been found, but now 451 is coming into its own as a way to track other restrictions.

Online censorship is on the rise. Governments in the European bloc force ISPs to restrict access to websites linking to pirated content, China has its ever-famous “Great Firewall” which heavily restricts the Web, and countries including Russia and South Korea are also cracking down on access.

It isn’t always easy to work out whether a Web page is down because of technical reasons or governmental meddling. However, a new Internet protocol could change that.

Mark Nottingham, chair the IETF HTTP Working Group — developers of the Internet’s core HTTP protocol — explained in a blog post while the 403 error status code says “Forbidden,” it does not specify if there are legal reasons for restricting content.

However, status code 451 — a hat tip to Fahrenheit 451 — can now be used to distinguish pages unavailable due to censorship — via redwolf.newsvine.com

Technology

Don’t flip your lid: The Internet of Helmets has arrived

Microsoft has shown off an internet helmet built by a customer.

The hard-wired headwear is the brainchild of construction outfit Laing O’Rourke, which is rightly concerned with the welfare of workers it sends out to build stuff in the sweltering heat of places like Australia and the Middle East.

Folks toiling in the hot sun in such locales are liable to come down with nasty ailments like heatstroke, which the company would rather avoid because an afflicted worker is a danger to their colleagues as well as themselves.

The firm’s therefore found a way to fit sensors measuring heart rate, ambient temperature, body temperature, ultra-violet light and location into the sweatband of a bog-standard building site hard hat. There’s also a Zigbee radio in there with a range of 100m to shunt all the data into a Linux box, which passes it on to an Intel Compute Stick. That device shunts the lot into Azure where the incoming data’s crunched and turned into alerts to get that chap off the site, stat. And not because of the classic building site shocker — horrid arse-crack exposure — but rather because the helmet suggests a worker’s in a physical state that suggests ill-health or increased likelihood of accidents.

What’s that you say? Building sites are bigger than 100m? They certainly are, so Laing O’Rourke’s cunning R&D folk have daisy-chained Zigbee repeaters and reckon they’ve built a helmet-net with a range of 500 metres. Zigbee’s low power requirements make for all-day data beaming action. And if you’re worried about all that collection, storing-and-forwarding and cloud uploading going on, know that heatstroke’s symptoms can be detected before a sufferer notices them. So a few minutes diagnostic delay won’t be disastrous — via redwolf.newsvine.com

Business, Politics, Rights, Technology

TPP: ISPs will hand over copyright infringer details

Trans Pacific Partnership (TPP) member states will force internet service providers (ISPs) to give up identification details of alleged copyright infringers so that rights holders can protect and enforce their copyright through criminal and civil means with few limitations, according to the full text of the agreement.

The TPP, the full text of which has been published on the website for the New Zealand Ministry of Foreign Affairs and Trade a month after reaching agreement, will regulate trade between Australia, the United States, New Zealand, Canada, Singapore, Vietnam, Malaysia, Japan, Mexico, Peru, Brunei, and Chile.

Section J of the Intellectual Property chapter [PDF] covers ISPs, with Article 18.82(7) stating that member states must enable copyright holders to access the details of alleged copyright infringers through ISPs.

Each party shall provide procedures, whether judicial or administrative, in accordance with that party’s legal system, and consistent with principles of due process and privacy, that enable a copyright owner that has made a legally sufficient claim of copyright infringement to obtain expeditiously from an internet service provider information in the provider’s possession identifying the alleged infringer, in cases in which that information is sought for the purpose of protecting or enforcing that copyright, the text says.

The full text of the intellectual property chapter ties in with leaks last month from WikiLeaks revealing that ISPs would be forced to give up copyright infringer details — via redwolf.newsvine.com

Business, Technology

New top-level domains a money grab and a mistake: Paul Vixie

Dr Paul Vixie, a pioneer of the internet’s domain name system (DNS), has lashed out at the creation of hundreds of new top-level domains, ranging from .dog to .horse, and .cool to .porn, labelling them a money grab and a mistake.

Vixie, who is now the chief executive officer of Farsight Security, was speaking at the Ruxcon information security conference in Melbourne on Sunday about the importance of securing the internet’s DNS infrastructure.

In response to an audience question about the Internet Corporation for Assigned Names and Numbers (ICANN) decision to create some 1900 new top-level domains in this first round alone, Vixie was blunt.

I think it is a money grab. My own view is that ICANN functions as a regulator, and that as a regulator it has been captured by the industry that they are regulating. I think that there was no end-user demand whatsoever for more so-called DNS extensions, [or] global generic top-level domains (gTLDs), he said.

Vixie sees the demand for the new domains as having come from the people who have the budget to send a lot of people to every ICANN meeting, and participate in every debate, that is, the domain name registrars who simply want more names to sell, so they can make more money. But these new domains don’t seem to be working.

They’re gradually rolling out, and they are all commercial failures, Vixie said — via redwolf.newsvine.com

Politics, Rights, Technology

CISA blowup: Web giants sharing private info isn’t about security

There were sharp words on the floor of the US Senate on Wednesday as lawmakers debated the controversial Cybersecurity Information Sharing Act (CISA) and its amendments.

The bill, proposed by Senators Richard Burr (R-NC) and Dianne Feinstein (D-CA), would allow internet giants and other companies to share people’s personal information with the US government so it can be analyzed for signs of lawbreaking – be it computer related or not.

In return, the companies would get legal immunity from angry customers, although legal action is unlikely because the businesses and the government don’t have to reveal what they have shared, even with a freedom of information request.

The proposed legislation has been criticized by internet rights groups, and also by technology firms. Google, Facebook, Microsoft, and others published an open letter calling for the legislation to be rewritten, and since then Apple, Salesforce.com, Yelp, and Wikipedia have joined them in opposing the draft law.

Feinstein said organizations won’t be forced to reveal citizens’ private lives to Uncle Sam: it won’t be mandatory for businesses to hand over people’s private records, she claimed.

If you don’t like the bill, you don’t have to do it, Feinstein said.

So it’s hard for me to understand why we have companies like Apple and Google and Microsoft and others saying they can’t support the bill at this time. You have no reason, because you don’t have to do anything, but there are companies by the hundreds if not thousands that want to participate in this.

Her colleague Burr said on the floor that he couldn’t understand the opposition to CISA. Businesses against the new law will put their users at risk, he said, because by not sharing people’s personal information, they will not be given intelligence and heads up on attacks from the Feds.

When the companies who are against this get hacked, they are going to be begging to cooperate with the federal government, he opined — via redwolf.newsvine.com

Politics, Technology

Majority of ISPs not ready for metadata laws that come into force today

The vast majority of Australian internet service providers (ISPs) are not ready to start collecting and storing metadata as required under the country’s data retention laws which come into effect today.

ISPs have had the past six months to plan how they will comply with the law, but 84 per cent say they are not ready and will not be collecting metadata on time.

The Attorney-General’s department says ISPs have until April 2017 to become fully compliant with the law.

The figures come from a survey sent to ISPs by telecommunications industry lobby group Communications Alliance.

It found two-thirds of them are still not entirely sure what type of metadata the Government wants retained.

Communications Alliance chief executive John Stanton said ISPs have had to start collecting a significant amount of new data, and complying with the laws has been difficult and time consuming.

The Government’s claim that what they’re asking for is retention of the status quo has never been correct, he said.

The vast majority [of ISPS] are saying: ‘We’re trying, but we’re not there yet’ — via redwolf.newsvine.com

Technology

BBC joins war against Flash, launches beta HTML5 iPlayer

It may not be the definitive decision which propels humanity towards our inevitable end, but in a post on the Beeb’s internet blog, James East, the Media Playout Product Manager, stated that his team is now confident they can achieve the playback quality you’d expect from the BBC without using a third-party plugin.

HTML5 has already been used to deliver video to iOS devices. However, the Beeb has been hesitant to share this rollout to desktop services.

This was not an act of spite, East assures readers, but because Aunty felt that the consistent experience and efficient media delivery offered by Flash outweighed the benefit of moving to HTML5 — via redwolf.newsvine.com

Health, Science, Technology

World-first operation implants 3D-printed titanium ribcage and sternum

A Spanish cancer patient is the first person in the world to receive a titanium 3D-printed sternum and rib cage, designed and manufactured by an Australian company.

The 54-year-old needed his sternum and a portion of his rib cage replaced.

The CSIRO said chest prosthetics were notoriously tricky to create due to the complex customised geometry and design for each patient.

Thoracic surgeons typically use flat and plate implants in the chest, but they can come loose over time and create complications, the CSIRO said.

A 3D-printed implant was a safer option for the patient because it can identically mimic the intricate structures of the sternum and ribs.

Almost a fortnight since the surgery, the CSIRO confirmed the patient was discharged and had recovered well — via redwolf.newsvine.com

Technology

You’ve been Drudged! Malware-squirting ads appear on websites with 100+ million visitors

Internet lowlives who used Yahoo! ads to infect potentially countless PCs with malware have struck again — using adverts on popular websites to reach millions more people.

Security researchers at MalwareBytes this week discovered the crooks running another massive campaign of ads that use the Angler Exploit Kit to infiltrate Windows PCs via vulnerabilities in Adobe Flash and web browsers.

Prominent websites including the Drudge Report and Weather.com — a pair of sites whose total traffic alone amounts to nearly 200 million visits per month — were apparently inadvertently carrying the ads, putting millions of netizens at risk.

MalwareBytes said the network carrying the ads, AdSpirit, was notified, and it has since taken down the offending adverts. The campaign has now moved to AOL’s ad network, with dodgy adverts appearing on eBay, we’re told — via redwolf.newsvine.com

Politics, Rights, Technology

Government exploit vendor hacked, client data exposed

One of the world’s most notorious providers of offensive information technology to governments has had its internal systems breached and customer documentation dumped on the open internet.

Hacking Team, founded in 2003 and based in Milan, Italy, provides surveillance software and intrusion tools to law enforcement agencies around the world.

On its website it boasts clients across the US, Europe and the Asia Pacific, assisted by more than 50 employees providing all aspects of offensive IT tools.

The company’s primary surveillance tool – dubbed Da Vinci – earned it a spot on the Reporters Without Borders Enemies of the Internet list.

Its products allow governments to monitor online communications, record voice-over-IP (VoIP) sessions, remotely activate microphones and cameras, and break encrypted files and emails.

The company’s Twitter account was today compromised, and around 400GB of internal emails, files and source code were leaked to the internet, and spread via social media.

The attackers also posted screenshots of the compromised data from the leaked file to Twitter, and defaced the company’s logo and biography.

Earlier this afternoon — before his own Twitter account appeared to be hacked — Hacking Team engineer Christian Pozzi confirmed the breach and said the company was notifying affected customers and working with police.

According to the leaked data, Hacking Team counts customers from South Korea, Saudi Arabia, Lebanon, Egypt and Mongolia. The company has long maintained it does not sell to oppressive governments — via redwolf.newsvine.com

Technology

Popular Security Software Came Under Relentless NSA and GCHQ Attacks

The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden.

The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the UK, claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products.

British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The US spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.

The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the US and UK have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware — via redwolf.newsvine.com

Technology

Paternoster Lifts: Dangerous, Obsolete and Quite Fun / Tom Scott

There aren’t many paternoster lifts left in the world: they’re inaccessible, tough to maintain and a bit more dangerous than a regular lift. But some of them still exist: so if you’re ever nearby, do stop by the University of Sheffield’s Arts Tower and have a ride up and down. Just don’t go over the top — via Youtube

Politics, Rights, Technology

Glenn Greenwald says Australia is ‘one of most aggressive’ in mass surveillance

Australia is one of the most aggressive countries in the world in terms of mass surveillance and its techniques could be the subject of future leaks, journalist Glenn Greenwald, who first reported on the Edward Snowden revelations for the Guardian, has said.

Greenwald, who now works for The Intercept, told ABC’s Lateline program on Thursday night that Australia is probably the country that has gotten away with things the most in terms of the Snowden revelations.

There are interesting documents about what Australia is doing to privacy rights — not just to their own citizens Glenn Greenwald

Australia is one of the most aggressive countries that engage in mass surveillance as a member of the Five Eyes partnership, he said, referring to a security sharing arrangement between the United States, the United Kingdom, Australia, New Zealand and Canada.

There has been less reporting on Australia than the other four countries. We intend to change that.

We are working on the reporting, he continued. We will definitely get that done as soon as we can — via redwolf.newsvine.com