Police iPhone decryption sees high demand, Apple makes them wait

It turns out that the security features on the iPhone are so robust, that police are unable to decrypt them in order to gain access to possibly crucial information on suspects’ devices. This has led to federal agencies getting a hold of Apple in order to decrypt iPhones for them, but it turns out that so many devices are being requested for decryption, that Apple had to make a waiting list.

lock

While forensics teams are known for having the technology to hack into computers for vital information, it seems that the iPhone is one device that authorities are having trouble with, according to CNET. Specifically, an agent from the bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) said that we was added to a wait list by Apple in order to get an iPhone 4S decrypted, and it took approximately four months to finally get the device unlocked.

Apple’s iMessage service has been hailed as a “challenge” to break into, as all messages sent between iOS users are encrypted. Last month, the US Drug Enforcement Administration had trouble breaking into iMessage while trying to tap into suspects’ text messages, anad they most likely phoned Apple for help.

Of course, this is good news for anyone that’s paranoid about an outsider trying to hack into their iPhone’s deepest corners. Users can enable a password lock on their devices for added security, but we all know that doesn’t quite work all the time, as numerous loopholes have been found that give users access to devices even with a password lock enabled. While it’s highly unlikely that your phone will slip into the hands of someone who can quickly bypass a lock screen, it’s certainly something that doesn’t make us feel at ease.

Then again, iOS devices will be receiving the nod from the US Department of Defense as being secure enough to be used inside the Pentagon. As we all know, the Pentagon has some pretty confidential stuff that they deal with, so having secure devices is a must, and if forensics team can’t even break into an iPhone, that must say something about its security robustness.

SOURCE: CNET


Police iPhone decryption sees high demand, Apple makes them wait is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Galaxy S 4 app-bloat earns Samsung a BBC Watchdog investigation

The software bloat that leaves Samsung Galaxy S 4 owners with roughly half of the available storage their 16GB smartphone promises on the box is set to earn the handset a blasting on TV, with one UK consumer affairs show readying an investigation into missing memory. Samsung blamed the inevitable room value-added features on the Galaxy S 4 take up for around 8GB of the user storage being already occupied out of the box, when questioned about the paucity of space new owners discovered. That doesn’t appear to have satisfied the BBC’s Watchdog, which will apparently cover the controversy on May 15.

galaxy-s-4-components

“Samsung: it claims that its brand new Galaxy phone has an extra-large memory, but what did it forget to mention?” notoriously outspoken Watchdog host Anne Robinson teased at the end of the program on Wednesday this week, while graphics of the Samsung product page highlighting the storage variants were flashed on-screen. Watchdog, which hit UK television in 1980, has a track-record of investigative journalism, which has seen consumer rights complaints taken up and even laws enacted or modified as a result. As UK Mobile Review points out, the show also waded into the iPhone 4 “antennagate” saga back in 2010.

In the case of the Galaxy S 4, Samsung’s problem will likely center on how much available space a new owner has the right to reasonably expect, given the amount of memory listed on the box. All smartphones generally monopolize some of the internal capacity to add in preloaded apps and features, but the extent of the customizations and tweaks Samsung has made to the Galaxy S 4 has seemingly overstepped even those expectations.

Samsung’s argument is that users can opt to expand with a microSD card if they want more capacity, since unlike many other recent flagship devices there’s a memory card slot lurking under the Galaxy S 4′s removable back cover. Up to 64GB cards are supported at present.

Nonetheless, that does have limits of its own: apps can only be installed to the internal storage, not to a microSD card, for instance, which means that the latest generation of big game downloads could find themselves out of room. Samsung also offers 32GB and 64GB versions of the Galaxy S 4, though availability of those models has struggled, versus the more affordable 16GB entry-level handset.

The likely outcome of any investigation is better labeling, with clearer indications of exactly how much space is on offer printed on the box, rather than left as an unpleasant surprise once you turn the phone on and check the settings page. That’s not an issue that will solely affect Samsung, however, and the Galaxy S 4 may simply be the device that broke the camel’s back.

[via Clove]


Galaxy S 4 app-bloat earns Samsung a BBC Watchdog investigation is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Department of Defense gives banhammer to 3D-printed gun blueprints

It was the summer of 2012 when the first news of a 3D-printed gun surfaced, an assault rifle-style .22 that appeared on a message board devoted to the love of firearms. That weapon was believed to be the first 3D-printed gun successfully fired, but its fame was short lived, with The Liberator having caught popular attention soon after for being the first fully 3D-printed firearm. After being successfully fired, the company behind it – Defense Distributed – released the blueprints for anyone to download, something the Department of Defense has already stymied.

liber-1-580x318

The Liberator was created by 25-year-old law student Cody Wilson of Defense Distributed. The gun was designed in such a way that it can be easily recreated by others who have access to a 3D printer, making the firearm a weapon that can be theoretically mass produced on a very accessible consumer level. The gun, which resembles a toy with its square plastic body, is made from easily obtainable ABS plastic and has a total of 16 parts. Although it is hailed as the first fully-printed firearm, it does have a metal firing pin due to the inability of plastic to withstand the force. The weapon was designed to fire ordinary handgun rounds, of which various calibers can be used thanks to an interchangeable barrel.

The Liberator was test fired on Monday, May 6. Unfortunately, the testing phase didn’t fare as well as Wilson had hoped, with the first attempt resulting in a misfire and the second – which involved a 5.7 x 28 rifle cartridge – ending with the handgun being blow into shrapnel, perhaps making the Liberator the first 3D-printed explosive device, as well. Such a result didn’t slow them down too much, however.

As we noted earlier this month, Wilson planned to release his blueprints on the database website Defcad.org, where other CAD files for printable guns are available. He ultimately followed through with this plan, making the blueprints available for others to download today. In a short span of time, the file was saved over 100,000 times, a reality that has quickly been halted by the government.

As of now, the DefCad website displays a banner reading: “DEFCAD files are being removed from public access at the request of the US Department of Defense Trade Controls. Until further notice, the United States government claims control of the information.” This followed a letter sent by the State Department’s Office of Defense Trade Compliance demanding the blueprints be removed while a review was performed to see whether they count as class one munitions. It is possible Defense Distributed violated the Arms Export Control Act as a result of releasing information without authorization that is under control of the International Traffic in Arms Regulation.

On one side of the fence, many have expressed concerns about the ability for anyone to download blueprints for printing their own firearms, something that could result in obtaining weapons without a background check and facilitate access for felons and the mentally ill. In addition, 3D printed guns wouldn’t have serial numbers, an issue posing its own problems. On the other hand, however, are those who say access to such information is the right of a free people, and that blocking access to it is a restriction of one’s rights.

Wilson is in the latter camp, quoted as saying: “I immediately complied and I’ve taken down the files. But this is a much bigger deal than guns. It has implications for the freedom of the web.”

[via BetaBeat]


Department of Defense gives banhammer to 3D-printed gun blueprints is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Apple’s use of “iBooks” isn’t trademark infringement, says court

Apple began using the term “iBook” quite a few years ago, having applied it to various computers in days-gone-by that are now obsolete, only recently shifting to a slight variation of the word for its digital books app. Such a change prompted John T. Colby, a New York publisher, to file a lawsuit against Apple alleging trademark infringement. The case was initiated in the summer of 2011, and after nearly two years of a back-and-forth legal battle, Apple has won.

ibooks_logo

Colby filed the lawsuit under the DBA name Brick Tower Press, having purchased a variety of assets from multiple entities previously owned by another New York publisher – Byron Press – in both 2006 and 2007. The issue at play involves Byron Press’s use of the term “ibooks” to publish many paperback and hardback books, a process that began in late 1999, long before Apple began using the term for its digital books app.

According to the lawsuit, Apple’s shift to using the term for books-related purposes in 2010 following the launch of the iPad could spell the end for the publisher’s ibooks mark, making them effectively worthless. A quick look at the two logos used by the respective companies shows that – visually speaking – they are quite different, with Brick Tower Press’s displaying a picture of a lightbulb above the term and Apple using a distinctly iOS icon next to its own.

It is important to note that neither Byron Press, nor Brick Tower Press after purchasing the assets, registered the trademark, something both had ample time to do before Apple eventually registered it in 2010. Such would end up being one of the problems for the publisher, with U.S. District Judge Denise Cote stating that on its own the term “ibooks” was generic in nature, a descriptive term for digitally-sold books.

Because the term itself isn’t enough, the logo as a whole comes into play, with Cote saying that the publisher only retains any sort of meaning in the use of the word in conjunction with its lightbulb logo. As we mentioned, Brick Tower Press’s logo is quite different from the one used by Apple, and that ultimately lead to the ruling in the latter company’s favor. Said the court in its ruling, “[Brick Tower Press has] offered no evidence that consumers who use Apple’s iBooks software to download ebooks have come to believe that Apple has also entered the publishing business and is the publisher of all of the downloaded books, despite the fact that each book bears the imprint of its actual publisher.”

Because those buying books aren’t likely to mistake the publisher for Apple based on the differences in their logos, and because the term “ibooks” alone isn’t sufficient with the Press failing to register the trademark, the court has ruled in Apple’s favor.

[via Gigaom]


Apple’s use of “iBooks” isn’t trademark infringement, says court is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Cyberthieves yank $45 million in sophisticated ATM hack, make Ocean’s Eleven look trivial

Cyberthieves yank $45 million in sophisticated ATM hack, makes Ocean's 11 look trivial

It has the makings of a film — but the fallout from one of the world’s most sophisticated ATM heists is very real. The New York Times is reporting that a massive team of criminals worked in concert in order to grab some $45 million in a matter of hours over the course of two operations. The sheer scope of the project is hard to wrap one’s mind around, involving trained personnel positioned in over two dozen countries.

Earlier today, federal prosecutors in Brooklyn “unsealed an indictment charging eight members of the New York crew, offering a glimpse into what the authorities said was one of the most sophisticated and effective cybercrime attacks ever uncovered.” In essence, the hackers were able to infiltrate various credit card processing companies and raise withdrawal limits on prepaid accounts — from there, cashing crews hit thousands of ATMs, socking away millions in the process. Hit up the source link for the full read; it’s a wild one, for sure.

Filed under:

Comments

Source: The New York Times

Name.com hacked: Encrypted card details and more stolen

Domain retailer Name.com has been hacked, the company has informed customers today, with usernames, email addresses, and encrypted passwords and credit card details all stolen from the company’s servers. The hack, Name.com said in an email to registered users, is believed to have targeted “information on a single, large commercial account” with the company, with the other stolen data being taken along for the ride.

name-com_hacked

However, Name.com is also keen to point out that, even though the data has fallen into unauthorized hands, the most important parts are encrypted. Credit card details, stored at the site for easier domain registration renewals, had their private encryption keys “stored physically in a separate remote location that was not compromised,” Name.com insisted.

Meanwhile, the EPP codes needed for domain transfers are also safe, since they too are stored in a different location to the bulk the user registration data. “We have no evidence to suggest that your data has been used for fraudulent activities” Name.com concludes.

Nonetheless, all Name.com subscribers will have to change their password before they can log back into their account, even if their information wasn’t among that extracted. The company also suggests changing your login credentials if you use the same username and password combination with other sites and services.

Data hacks have become more commonplace in recent years, as databases of consumer information become increasingly tempting to spammers, those committing credit card fraud, and other criminals. Last month, Amazon-owned daily deals site LivingSocial admitted that its servers had been compromised, with data of 50m users extracted.


Name.com hacked: Encrypted card details and more stolen is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Court considers allowing class-action lawsuit against Google over book digitization

You may recall the backlash against Google over its book digitizing efforts, which many say is copyright infringement and it all eventually leading into a legal battle that has been ongoing for years. Back in 2011, for example, a District Court in NY rejected Google’s settlement with the ASA and Author’s Guild, and last summer Google moved to have the lawsuit dismissed. Now a court of appeals is considering whether a class-action lawsuit is warranted.

Screenshot from 2013-05-08 21:17:33

The matter at stake is whether the plaintiffs in the lawsuit are allowed to go through with a class-action lawsuit against Google, something that could result in billions of dollars in damages – over $3 billion, according to some estimates. As such, it isn’t surprising that Google appealed when one court ruled that a class-action lawsuit was permissible, and now the case has moved up to a higher court.

The 2nd U.S. Circuit Court of Appeals is now handling the issue, and seems to be leaning away from a class-action lawsuit, which would leave those who feel their copyrights have been infringed upon to sue Google on their own. This would result in substantially less damages being paid out, especially considering that many of those who would go after Google are small-time authors not in a position to initiate a lawsuit.

According to Reuters, one of the panel judges said the digitization efforts hold “enormous value for our culture.” Others have mentioned the notion of returning the case to the district court, having it give a ruling on Google’s claim of fair use. We’ll have to wait and see how it all plays out, but presently the plaintiffs are seeking $750 in damages per book Google copied.

[via Reuters]


Court considers allowing class-action lawsuit against Google over book digitization is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Apple demanding Android source code in Samsung lawsuit

The ongoing legal battle between Apple and Samsung is heating up yet again. This time around, Apple is turning to Google and has requested that they hand over various Android source code documents. Apple claims that Google is withholding information relating to Android, and says that Android is used in all of Samsung’s infringing products, which “provides much of the accused functionality.”

P3142832-galaxy-s-4-580x326

The report comes from Bloomberg, which notes that Apple attorney Mark Lyons says that all of this basically deals with “transparency,” and he argues that Google is beating around the bush with delivering evidence that is requested by either Apple or the court. However, Google lawyers argue that the company was to be kept off of the case in the initial court filing, so they don’t have the same legal rights as Apple or Samsung in this case.

Google is concerned that if they eventually do hand over the source code documents, Apple may discover other information that Google believes Apple isn’t entitled to, which could give the Cupertino-based company further “ideas about how to proceed that they wouldn’t have had” in the first place.

This second patent lawsuit comes after Apple was awarded $1.05 billion payable by Samsung after the court ruled that the Korean company infringed on Apple’s patents. However, that award has since been lowered to $639.4 million, and a new trial is set for November to re-evaluate some of the products involved in the downgraded award.

[via Android Community]


Apple demanding Android source code in Samsung lawsuit is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

EA no longer paying gun makers for naming rights

In an effort to slowly cut ties with various gun and weapon manufacturers, it’s reported that Electronic Arts will stop paying gun makers for the privilege of using real gun names in their video games, but will still continue to use real names without paying for the naming rights, saying that they retain the right to depict real guns without a license.

battlefield-4-580x325

The ongoing national debate over gun violence and gun control has made a lot of companies rethink the relationships they have with gun makers, including video game developers and publishers. Electronic Arts is one publisher who will be distancing themselves from relationships with gun makers, but will still continue to use real gun names in future games.

EA president of labels Frank Gibeau says that video game developers share the same rights of free speech as authors do, noting that novel writers don’t pay gun makers to use real gun names in their books. Video games are the same way, saying that Electronic Arts is “telling a story” through a point of view.

Video games have been at the forefront of the gun control debate for a while now, and it seems that video game publishers are finally buckling under the pressure and severing ties with gun manufacturers. However, none of that looks to change the ways that violent video games are made, and we’re guessing that war games like Call of Duty and Battlefield will continue on as normal.

[via Reuters]


EA no longer paying gun makers for naming rights is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

DOJ docs reveal Facebook and email digging without a warrant

The US Department of Justice and FBI can read your email, Facebook and Twitter messages, and other electronic content without needing a warrant first, government documentation reveals, in what’s being seen as another slap at due process and privacy. Internal guidelines from US Attorney offices in multiple locations and acquired by the American Civil Liberties Union apparently suggest that investigators need not go through regular legal channels to arrange search warrants to dig in American’s electronic communications. Instead, CNET reports, agencies are seemingly taking the easiest route they can to access email and messaging records, bypassing approval from a judge.

secret_data

In one case, in Houston, the US Attorney’s office apparently acquired “contents of stored communications” from an ISP, identity unspecified, without a warrant. The US Attorney’s office in Manhattan issued guidelines to staff that it could achieve the same results with a subpoena rather than a full warrant.

It’s not the first time this year that investigative methods followed by US governments have come in for criticism. Back in March, a California court criticized the FBI for violating First Amendment rights by using so-called “National Security Letters”; by citing national security considerations, the FBI could bypass getting warrants in the traditional manner, and the subject of investigations would not be informed that their data had been shared.

Here, it’s the Fourth Amendment which privacy advocates like the ACLU argue the DOJ and FBI are trampling over. Digital information held by cloud services like Gmail, Dropbox, Facebook, or Twitter should be just as protected as a hard-drive physically located in a suspect’s home, they claim.

One confusing factor is that in many cases email and non-email digital content is treated differently. A 2010 ruling by the Sixth Circuit Court of Appeals, US v. Warshak, left many of the big names in webmail – Gmail and Outlook among them – insisting full warrants for access to emails they store. However, while the Justice Department appears content to comply with that, it has proved less concerned with following full warrant procedures with files such as those stored in Dropbox or Google Drive, or direct messages and IM chat on Twitter and Facebook.

“We really can’t have this patchwork system anymore,” ACLU staff attorney Nathan Wessler concludes, “where agencies get to decide on an ad hoc basis how privacy-protective they’re going to be.” However, moves to pin down the exact legal expectations of the DoJ and FBI have met with opposition, and other proposals to heavily fine companies like Google who do not comply with wiretap orders are also underway.


DOJ docs reveal Facebook and email digging without a warrant is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.