History, Technology

Joan Clarke, woman who cracked Enigma with Alan Turing

Joan Clarke’s ingenious work as a codebreaker during WW2 saved countless lives, and her talents were formidable enough to command the respect of some of the greatest minds of the 20th Century, despite the sexism of the time.

But while Bletchley Park hero Alan Turing — who was punished by a post-war society where homosexuality was illegal and died at 41 — has been treated more kindly by history, the same cannot yet be said for Clarke.

The only woman to work in the nerve centre of the quest to crack German Enigma ciphers, Clarke rose to deputy head of Hut 8, and would be its longest-serving member.

She was also Turing’s lifelong friend and confidante and, briefly, his fiancee — via redwolf.newsvine.com

Politics, Rights, Technology

Australian government warrantless data requests pass 500,000

Requests from government agencies for Australian telecommunications customers’ phone, internet, and address data surpassed 500,000 in the last financial year, according to the Australian Communications and Media Authority (ACMA).

The figure was revealed in the ACMA’s annual report (PDF) released this month. It says that there were 563,012 authorisations granted to government agencies for access to telecommunications metadata in the 2013-14 financial year.

Under the Telecommunications (Interception and Access) Act, government agencies can force telecommunications companies to hand over details about their customers, including address, phone number, IP address, call data, SMS data, and other held information without a warrant for the purpose of enforcing the law.

The ACMA recorded that total disclosures amounted to 748,079 for the financial year including to law enforcement for a range of reasons, such as to avert a threat to life, assist the ACMA, or enforce the criminal law of a foreign country.

The number of requests by far exceeds the more than 300,000 requests made in the 2012-13 financial year reported by the Attorney-General’s Department in its Telecommunications (Interception and Access) report last year. The report for this year has yet to be tabled in parliament.

A spokesperson for the Attorney-General’s Department had not responded to a request for comment on the disparity at the time of writing; however, security agencies such as the Australian Security and Intelligence Organisation (ASIO) are not required to publicly report the number of metadata access requests they make.

The department told The Guardian that the difference between the two figures was due to the department only counting the authorisation for a particular person’s details. So if the request is made to multiple telcos for that one person’s information, the access request is only counted as one from that particular government agency. The ACMA has compiled its report based on data from the telcos themselves, leading to the higher figure — via redwolf.newsvine.com

Rights, Technology

Adobe Spyware Reveals (Again) the Price of DRM: Your Privacy and Security

The publishing world may finally be facing its rootkit scandal. Two independent reports claim that Adobe’s e-book software, Digital Editions, logs every document readers add to their local library, tracks what happens with those files, and then sends those logs back to the mother-ship, over the Internet, in the clear. In other words, Adobe is not only tracking your reading habits, it’s making it really, really easy for others to do so as well.

And it’s all being done in the name of copyright enforcement. After all, the great promise of Digital Editions is that it can help publishers “securely distribute” and manage access to books. Libraries, for example, encourage their patrons to use the software, because it helps them comply with the restrictions publishers impose on electronic lending.

How big is the problem? Not completely clear, but it could be pretty big. First, it appears Adobe is tracking more than many readers may realize, including information about self-published and purchased books. If the independent reports are correct, Adobe may be scanning your entire electronic library. Borrowing a copy of Moby Dick from your public library shouldn’t be a license to scan your cookbook collection.

Adobe claims that these reports are not quite accurate. According to Adobe, the software only collects information about the book you are currently reading, not your entire library. It also collects information about where you are reading that book, how long you’ve been reading it, and how much you’ve read. Still disturbing, if you ask us.

Second, sending this information in plain text undermines decades of efforts by libraries and bookstores to protect the privacy of their patrons and customers. (Adobe does not deny transmitting the information unencrypted.) Indeed, in 2011 EFF and a coalition of companies and public interest groups helped pass the Reader Privacy Act, which requires the government and civil litigants to demonstrate a compelling interest in obtaining reader records and show that the information contained in those records cannot be obtained by less intrusive means. But if readers are using Adobe’s software, it’s all too easy for folks to bypass those restrictions.

Third and most depressing: this flaw may have been unintentional, but we probably should have seen it coming. As our friend Cory Doctorow has been explaining for years, DRM for books is dangerous for readers, authors and publishers alike. Whether or not Adobe actually intended to create this particular vulnerability, if your computer is collecting information about you, and then transmitting it in ways you can’t control, chances are you’ve got a security problem — via redwolf.newsvine.com

Politics, Rights, Technology

Australian Government Scrambles to Authorise Mass Surveillance

This week, Australian Prime Minister Tony Abbott used recent terrorist threats as the backdrop of a dire warning to Australians that for some time to come, the delicate balance between freedom and security may have to shift. There may be more restrictions on some, so that there can be more protection for others.

This pronouncement came as two of a series of three bills effecting that erosion of freedoms made their way through Australia’s Federal Parliament. These were the second reading of a National Security Amendment Bill which grants new surveillance powers to Australia’s spy agency, ASIO, and the first reading of a Counter-Terrorism Legislation Amendment (Foreign Fighters) Bill that outlaws speech seen as advocating terrorism. A third bill on mandatory data retention is expected to be be introduced by the end of the year.

Whilst all three bills in this suite raise separate concerns, the most immediate concern—because the bill in question could be passed this week — is the National Security Amendment Bill. Introduced into Parliament on 16 July, it endured robust criticism during public hearings last month that led into an advisory report released last week. Nevertheless the bill was introduced into the Senate this Tuesday with the provisions of most concern still intact.

In simple terms, the bill allows law enforcement agencies to obtain a warrant to access data from a computer—so far, so good. But it redefines a computer to mean not only one or more computers but also one or more computer networks. Since the Internet itself is nothing but a large network of computer networks, it seems difficult to avoid the conclusion that the bill may stealthily allow the spy agency to surveil the entire Internet with a single warrant.

Apart from allowing the surveillance of entire computer networks, the bill also allows the addition, deletion or alteration of data stored on a computer, provided only that this would not materially interfere with, interrupt or obstruct a communication in transit or the lawful use by other persons of a computer unless … necessary to do one or more of the things specified in the warrant. Given the broad definition of computer, this provision is broad enough to authorise website blocking or manipulation, and even the insertion of malware into networks targeted by the warrant — via redwolf.newsvine.com

Technology

Google’s Doubleclick ad servers exposed millions of computers to malware

Last night, researchers at Malwarebytes noticed strange behaviour on sites like Last.fm, The Times of Israel and The Jerusalem Post. Ads on the sites were being unusually aggressive, setting off anti-virus warnings and raising flags in a number of Malwarebytes systems. After some digging, researcher Jerome Segura realized the problem was coming from Google’s DoubleClick ad servers and the popular Zedo ad agency. Together, they were serving up malicious ads designed to spread the recently identified Zemot malware. A Google representative has confirmed the breach, saying our team is aware of this and has taken steps to shut this down.

Malware served through ad units (or malvertising) is nothing new, but this incident is notable because of the unusually broad reach of the attack. It was active but not too visible for a number of weeks until we started seeing popular sites getting flagged in our honeypots, Segura says. That’s when we thought, something is going on. The first impressions came in late August, and by now millions of computers have likely been exposed to Zemot, although only those with outdated antivirus protection were actually infected — via redwolf.newsvine.com

Politics, Rights, Technology, World

New Zealand denies it was planning mass domestic spying

New Zealand was preparing to conduct national covert surveillance last year, a US investigative journalist has said.

The claims by former Guardian newspaper reporter Glenn Greenwald were denied by New Zealand Prime Minister John Key.

The report was based on information disclosed by former US National Security Authority (NSA) contractor Edward Snowden, who said the government had planned to exploit new spying laws.

The revelations come just days ahead of a New Zealand general election — via redwolf.newsvine.com

Rights, Technology

WikiLeaks names NSW Police as FinFisher malware customer

WikiLeaks has today released parts of the FinFisher surveillance suite, as well as a customer list that it claims includes the police forces of the Netherlands and New South Wales, and the intelligence arms of the Hungarian, Qatari, Italian, and Bosnian governments.

Based on the price list it released, WikiLeaks has estimated that FinFisher licence sales brought in between €48 to €98 million, with total revenue said to be higher with FinFly ISP licences not being counted, nor the costs for support.

Of the customers listed, the NSW Police is listed as having purchased €1.8 million in FinFisher software, as well as submitting support requests relating to wanting to categorise keylogged conversations to avoid hot water by intruding on legal privilege, asking for reporting features to meet warrant requirements, and problems with FinSpy updates — via redwolf.newsvine.com

Craft, Technology

3D Printed Prosthetic / Evan Kuester

Evan Kuester, like many students, found his course work to be less than inspiring. However, he did have access to some really cool tools, such as a large 3D printer that started his mind wandering. Evan had noticed a fellow student on campus a few times. The thing that he noticed was that she had no left hand. Knowing that he had a 3D printer at his disposal, Evan found the inspiration he needed to embark on something wonderful. One day he worked up the nerve to simply walk up and introduce himself and propose an idea: Why not 3D print an aesthetically pleasing prosthetic? From that point forward, Evan and Ivania Castillo have been friends — via MAKE

Business, Politics, Rights, Technology

Copyright infringement is terrorism, screech the revolution’s losers

You might have thought that Australia’s debate over online copyright infringement couldn’t get any sillier. But this week the journalists’ union came out as a fan of internet censorship, only to withdraw when they realised what they’d done. And Village Roadshow equated copyright infringement with terrorism and paedophilia, and came out in support of, oh, moonbats or something. Hard to say.

Village Roadshow’s submission (PDF) to the government’s copyright infringement discussion paper is the loopiest, with so much shouting and whining that it’s hard to take their hyperbole seriously.

The dangers posed by piracy are so great, the goal should be total eradication or zero tolerance. Just as there is no place on the internet for terrorism or paedophilia, there should be no place for theft that will impact the livelihoods of the 900,000 people whose security is protected by legitimate copyright, the submission says.

Oh get a grip.

The tone is clearly that of Village Roadshow’s co-CEO Graham Burke, whose manner at the best of times can most generously be described as eccentric. But to equate the abstract problem of a reduction in your profit margin with the damage done to the victims of child sexual abuse and the slaughter of innocents? That takes some chutzpah — via redwolf.newsvine.com

Rights, Technology

Android security mystery – ‘fake’ cellphone towers found in US

There have been many comments to this story from people who are assuming that these towers are physical installations. There’s no reason to assume this is the case: it’s far likelier that they are mobile installations of the kind used not only by law enforcement and government agencies, but also by scammers and other criminals — David Harley

Seventeen mysterious cellphone towers have been found in America which look like ordinary towers, and can only be identified by a heavily customized handset built for Android security — but have a much more malicious purpose, according to Popular Science.

The fake towers — computers which wirelessly attack cellphones via the baseband chips built to allow them to communicate with their networks, can eavesdrop and even install spyware, ESD claims. They are a known technology — but the surprise is that they are in active use — via redwolf.newsvine.com

Technology

Humans Need Not Apply / CGP Grey

This video isn’t about how automation is bad — rather that automation is inevitable. It’s a tool to produce abundance for little effort. We need to start thinking now about what to do when large sections of the population are unemployable — through no fault of their own. What to do in a future where, for most jobs, humans need not apply — via Youtube

Politics, Rights, Technology

Leaked paper reveals Australia’s obsessive metadata secrecy

Last Friday, the Australian Attorney-General’s Department sent internet service providers (ISPs) a confidential discussion paper — subsequently leaked to Fairfax Media — that attempts to clarify exactly what metadata they’ll be required to store under the government’s proposed mandatory data-retention scheme. The detailed requirements are presumably designed to feed into the statutory specification of metadata that will be included in legislation to be introduced to parliament in coming weeks.

Until now, the only official government description of metadata we’d seen — apart from that breathtakingly confused TV performance by Australia’s favourite Attorney-General Senator George Brandis QC — was the hilariously inadequate one-pager (PDF) that the Attorney-General’s Department (AGD) tabled in Senate Estimates on October 15, 2012, after much prodding by Greens Senator Scott Ludlam.

You might therefore think that the description of the government’s metadata needs in Friday’s document was a recent development.

You’d be wrong.

A confidential document obtained by ZDNet shows that even more detailed descriptions of the government’s data-collection ambitions had been discussed with ISPs as far back as early 2010.

The document, Carrier-Carriage Service Provider Data Set Consultation Paper version 1.0 (PDF), is a 16-page PDF file created on 9 March 2010, at 14:49. Its core sections are similar in structure to the nine-page document obtained by Fairfax Media this week, with the addition of tables of sample data to further illustrate the expected type of data to be retained for each specific retention requirement from the data set, discussion questions for industry to answer, and an introductory background section rather than an executive summary.

The 2010 version of the document was quite specific about the data to be collected. For mobile calls, for example, the data would include the IMSI and IMEI of both the calling party’s and called party’s devices, whereas the current version simply specifies the identifier(s) of the devices. This is in line with the government’s intention to make the legislation technology neutral.

References to web-browser sessions and file transfers that were in the 2010 version have vanished, too, in line with such ideas being dropped as the data-retention debate has evolved — via redwolf.newsvine.com

Rights, Technology

Crypto Daddy Phil Zimmerman says surveillance society is DOOMED

A killer combination of rapidly advancing technology and a desire for greater privacy among the public should condemn current surveillance state to an historical anachronism, according to PGP creator Phil Zimmermann.

In an extended talk at Defcon 22 in Las Vegas, Zimmermann said it might seem as though the intelligence agencies have the whip hand at the moment but mankind had faced this situation before. He also said the abolition of slavery and absolute monarchy, and the achievement for civil rights, also once looked unlikely but were achieved.

Zimmermann praised the release of information by NSA whistleblower Edward Snowden, saying his efforts have alerted the populace to the real state of affairs and made people much more concerned about privacy. The revelations had also forced the technology industry to up its game and provide products to meet that demand, he opined — via redwolf.newsvine.com

Business, Technology

Service Drains Competitors’ Online Ad Budget

The longer one lurks in the Internet underground, the more difficult it becomes to ignore the harsh reality that for nearly every legitimate online business there is a cybercrime-oriented anti-business. Case in point: Today’s post looks at a popular service that helps crooked online marketers exhaust the Google AdWords budgets of their competitors.

AdWords is Google’s paid advertising product, displaying ads on the top or the right side of your screen in search results. Advertisers bid on specific keywords, and those who bid the highest will have their ads show up first when Internet users search for those terms. In turn, advertisers pay Google a small amount each time a user clicks on one of their ads.

One of the more well-known forms of online ad fraud (aka click fraud) involves Google AdSense publishers that automate the clicking of ads appearing on their own Web sites in order to inflate ad revenue. But fraudsters also engage in an opposite scam involving AdWords, in which advertisers try to attack competitors by raising their costs or exhausting their ad budgets early in the day.

Enter GoodGoogle, the nickname chosen by one of the more established AdWords fraudsters operating on the Russian-language crime forums. Using a combination of custom software and hands-on customer service, GoodGoogle promises clients the ability to block the appearance of competitors’ ads.

Are you tired of the competition in Google AdWords that take your first position and quality traffic? reads GoodGoogle’s pitch. I will help you get rid once and for all competitors in Google Adwords.

The service, which appears to have been in the offering since at least January 2012, provides customers both a la carte and subscription rates. The prices range from $100 to block between three to ten ad units for 24 hours to $80 for 15 to 30 ad units. For a flat fee of $1,000, small businesses can use GoodGoogle’s software and service to sideline a handful of competitors’s ads indefinitely. Fees are paid up-front and in virtual currencies (WebMoney, eg), and the seller offers support and a warranty for his work for the first three weeks — via redwolf.newsvine.com

Business, Rights, Technology

Google Protects Chilling Effects From Takedown Notices

Chilling Effects is the largest public repository of DMCA notices on the planet, providing a unique insight into the Internet’s copyright battles. However, each month people try to de-index pages of the site but Google has Chilling Effects’ back and routinely rejects copyright claims — via redwolf.newsvine.com

Politics, Rights, Technology

Brandis proposes website blocking and piracy crackdown

A leaked discussion paper from both Attorney-General George Brandis and Communications Minister Malcolm Turnbull has floated the possibility of websites being blocked, and measures to compel ISPs to take steps to prevent their customers infringing on copyright online.

Five months after first flagging a crackdown was on its way, Brandis appears to be pushing ahead with plans to crack down on Australians using programs such as BitTorrent to obtain copyright-infringing content such as TV shows, music, and films.

The discussion paper, leaked to Crikey, had been expected to be released this month, following Brandis meeting with representatives in the US and UK governments on their respective copyright infringement deterrence schemes.

It outlines a number of potential legislative measures the government can implement to deter what the paper said is a long standing issue with Australians having high illegal download rates.

The government states in the document that it believes even if an ISP doesn’t have a direct power to prevent its users from infringing on copyright, there are reasonable steps it can take to deter infringement.

In a move to undo the 2012 High Court judgment that iiNet did not authorise its users’ copyright infringement, the paper proposes amending the Copyright Act to extend authorisation of copyright infringement and the power to prevent infringement would just be one factor the courts would consider in determining whether an ISP was liable for infringement — via redwolf.newsvine.com

Politics, Technology

Wikipedia blocks US Capitol computers from editing online encyclopaedia after ‘disruptive’ revisions

Wikipedia has imposed a ban on page edits from computers at the US House of Representatives after anonymous changes were made to entries about politicians, businesses and historical events.

In response to what it calls disruptive revisions, Wikipedia has a 10-day ban blocking any editing from an IP address at the US Capitol, which is shared among a number of computers.

One entry referred to former US defence secretary Donald Rumsfeld as an alien lizard who eats Mexican babies.

Another said that John F Kennedy’s assassin Lee Harvey Oswald acted on behalf of Fidel Castro.

The ban came after unusual revisions were pointed out by Twitter account @congressedits, which describes itself as a bot that tweets anonymous Wikipedia edits that are made from IP addresses in the US Congress.

The account was created by a software developer named Ed Summers — via redwolf.newsvine.com