Thursday, August 11, 2011

Riots prompt social media review

The government is exploring whether to turn off social networks or stop people texting during times of social unrest.

David Cameron said the intelligence services and the police were exploring whether it was "right and possible" to cut off those plotting violence.

Texting and Blackberry Messenger are said to have been used by some during this week's riots.

Rights groups said such a measure would be abused and hit the civil liberties of people who have done nothing wrong.

The prime minister told MPs the government was exploring the turn-off in a statement made to the House of Commons during an emergency recall of Parliament.

Mr Cameron said anyone watching the riots would be "struck by how they were organised via social media".

He said the government, using input from the police, intelligence services and industry, was looking at whether there should, or could, be limits on social media if it was being used to spread disorder.

Under social media, Mr Cameron includes Facebook, Twitter and specific technologies such as text messaging. The semi-private BBM messaging system on the Blackberry is said to have been widely used during the riots.

Home Secretary Theresa May is believed to be meeting representatives from Facebook, Twitter and RIM (maker of the Blackberry) to talk about their obligations during times of unrest.

Civil liberty implications

In the statement, Mr Cameron said law enforcement was considering "whether it would be right to stop people communicating via these websites and services when we know they are plotting violence, disorder and criminality".

"Start Quote

The only realistic answer is the courts must judge"

End Quote Jim Killock Open Rights Group

Questions about the technical feasibility and civil liberty implications of cutting off networks have been raised within the coalition, with many expressing scepticism about the proposal's workability.

Rights campaigners also criticised the idea. Jim Killock, director of the Open Rights Group, said events like the UK riots were often used to attack civil liberties.

He questioned who was going to decide whether texts or tweets were an incitement to disorder.

"How do people 'know' when someone is planning to riot? Who makes that judgement?" he asked.

"The only realistic answer is the courts must judge. If court procedures are not used, then we will quickly see abuses by private companies and police."

Any government policy to shut down networks deprived citizens of a right to secure communication and undermined the privacy required by a society that valued free speech, he said.

"David Cameron must be careful not to attack these fundamental needs because of concerns about the actions of a small minority," he said.

John Bassett, a former senior official at GCHQ and now a senior fellow at the Royal United Services Institute, told Reuters that the government should resist a clampdown.

"The use of social media in the unrest looks like a game-changer," he said. "But any attempt to exert state control over social media looks likely to fail."

Far better, he said, would be to encourage community groups and individuals to report when they see disorder brewing online and ensure police have the tools to extract intelligence from social media.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

LHC in call for Higgs hunt help

The Large Hadron Collider team will be tapping into the collective computing power of the public to help it simulate particle physics experiments.

Among other pursuits, the effort could help uncover the Higgs boson.

The effort, dubbed LHC@home 2.0, is a vastly updated version of a 2004 effort to enlist the public's computers to simulate beams of protons.

Advances in home computers now allow simulations of the enormously more complex particle collisions themselves.

The LHC facility is the world's most powerful "atom smasher", occupying an underground, 27km ring beneath the Swiss-French border.

"Volunteers can now actively help physicists in the search for new fundamental particles that will provide insights into the origin of our Universe, by contributing spare computing power from their personal computers and laptops," read a statement from Cern, the European Organization for Nuclear Research which runs the LHC.

'Fundamental principles'

Along with the grandeur of the accelerator itself came an unprecedented computing infrastructure to handle the 15 million gigabytes of data produced at the LHC each year.

The Worldwide Large Hadron Collider Computing Grid is a 100m-euro network designed to handle the flood of data and distribute it to scientists worldwide.

The LHC@home project will complement this network by splitting up the gargantuan task of simulating the collisions, feeding those computer simulations back to the scientists for comparison.

"By looking for discrepancies between the simulations and the data, we are searching for any sign of disagreement between the current theories and the physical Universe," says the LHC@home 2.0 website.

"Ultimately, such a disagreement could lead us to the discovery of new phenomena, which may be associated with new fundamental principles of nature."

The project is just the latest in an increasingly long line of "citizen science" projects in which the power of the public's home computers is put to use in solving scientific problems; the search for extra-terrestrial intelligence and the fabulously complex process of protein folding are both subjects of such distributed computing projects.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Hack attack hits Hong Kong shares

Trading in seven stocks listed on the Hong Kong stock exchange was suspended on Wednesday after a hacking attack.

The attack was aimed at a website run by the exchange used to tell traders about company announcements.

The site was shut and trading in seven firms due to make announcements via the website was suspended for half a day.

Shares in HSBC, Cathay Pacific, China Power International and the Hong Kong exchange itself were among those suspended.

"Our current assessment (is) that this is a result of a malicious attack by outside hacking," said Charles Li, head of Hong Kong Exchanges & Clearing (HKEC), in a statement. HKEC runs the Hang Seng exchange.

Mr Li said the company was looking into the motive for the attack and what hackers sought to gain from it. The incident has been referred to the police as well as the Securities and Futures Commission.

The attack on the site made it temporarily unavailable. It is not yet clear whether the attack overwhelmed the site with data, making it unreachable, or whether hackers gained unauthorised access to it.

HKEC was investigating the attack and said if the site remained unstable on Thursday, announcements would be made via the Hang Seng's bulletin board. Additionally, the suspension of the seven shares would be lifted.

Price sensitive information due to be announced included HSBC announcing the sale of its US credit card arm and Cathy Pacific unveiling half year results. The suspended stocks are among the biggest on the Hang Seng index.

None of the other systems operated by Hong Kong Exchanges was hit in the attack and its securities and derivatives markets ran as normal.

The Hong Kong exchange is one of many stock markets that have been hit by hackers. The Zimbabwe stock exchange was attacked in early August and in February, the US Nasdaq revealed that cyber criminals had planted malicious code on its "Directors Desk" web application.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Wednesday, August 10, 2011

Hackers hit Blackberry over riots

A hacker group has attacked Blackberry's website after the company said it would assist police investigating riots in the UK.

Team Poison defaced the official Blackberry blog, posting a message that threatened the firm with retaliation if it handed user data to authorities.

Blackberry's instant messaging service is believed to have been used by some looters to plan their movements.

The firm has promised to co-operate with police and the Home Office.

In its statement, Team Poison said that it did not condone innocent people or small businesses being attacked in the riots.

However, it added: "We are all for the rioters that are engaging in attacks on the police and government."

The group argued that if Blackberry gave subscriber information to police, it could lead to the wrong people being targeted.

"Innocent members of the public who were at the wrong place at the wrong time and owned a Blackberry will get charged for no reason at all," said Team Poison's statement.

It threatened to release employee information, including names, addresses and phone numbers of Blackberry staff.

UK laws mean police can request data from individuals' mobile phones when that information relates to criminal activity.

The procedure is governed by the Regulation of Investigatory Powers Act.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Facebook aims to replace texting

Facebook has launched an instant messaging service for mobile phones, similar to BlackBerry Messenger.

The dedicated app, for iPhones and Android devices, allows users to contact individual friends or groups of people.

Its release comes a month before Apple is due to unveil a similar product.

Attention has been focused on mobile messaging recently because some of the London rioters were known to have used it to co-ordinate their movements.

So far Facebook's mobile messenger is only available in the United States, but it is expected to eventually roll out in other countries.

The social network's 750 million users already have the ability to send messages through the website, and on Facebook's original smartphone app.

Its new application adds the option to send directly to a mobile phone via SMS, and also to include location information.

Bad timing?

Facebook's timing has raised a few eyebrows within the industry, given the debate around BlackBerry Messenger's role in the recent UK rioting.

"Start Quote

The big question you have to ask is how long will it be before Google+ has a messaging service built in"

End Quote Stuart Miles Pocket-lint.com

However, it is likely that its decision to launch in the US now was influenced by the impending Arrival of Apple's iOS 5 and its integrated messenger.

Stuart Miles, the founder of Pocket-lint.com, told BBC News that Facebook might be able to make mileage out of its compatibility with more than one phone system.

"Apple will be iPhone to iPhone, like Facetime. The same as BBM which is Blackberry to Blackberry. [Facebook] will be Android to iPhone, so theoretically it can only benefit from the platform," said Mr Miles.

"The big question you have to ask is how long will it be before Google+ has a messaging service built-in."



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Apple prevents Galaxy sales in EU

Apple has been granted a temporary injunction preventing Samsung Electronics from selling iPad tablet computer rival Galaxy Tab 10.1 in the European Union, except the Netherlands.

An Apple spokeswoman confirmed the ruling had been made by a court in Germany, after Apple argued the Korean firm had infringed its patents.

It is the latest setback for Samsung's launch of the Galaxy.

The Galaxy's Australian release has been delayed due to a similar lawsuit.

Apple is also seeking a court order to temporarily block sales of the tablet computer in the US until patent claims are resolved.

Legal dispute

Apple argues that Samsung has "slavishly" copied the technology of both the iPad and the iPhone.

Samsung has countersued Apple in South Korea, Japan, the US and Germany.

In a statement, Samsung spokesman Kim Titus said the German court had made its order "without any hearing or presentation of evidence from Samsung."

The company would "act immediately to defend our intellectual property rights," he added.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Tuesday, August 9, 2011

Rioters' phones could help police

Police may be able to use rioters' mobile phone information to help convict them, say legal experts.

Investigators can apply to see the contents of text and instant messages, as well as their location.

However, authorities may not be able to access the full wealth of data available to telecoms companies because of legal restrictions.

Guidelines require police to find out individuals' identities first before obtaining records from trouble spots.

Smartphone maker BlackBerry has already said that it will be cooperating with investigations, and pointed out that it is bound to hand over subscriber information when it relates to criminal activity.

The company's BBM instant messenger has been identified as one of the services used by rioters to coordinate their actions.

One-by-one

Under the Regulation of Investigatory Powers Act (RIPA), police can apply for details of a customer's phone records, including their location, details of calls made and received, and internet activity.

But requests must be made for each suspect on a case-by-case basis.

Police would be unable to carry out a broad-based search, identifying, for example, every person who was in Clapham Junction sending the word "riot".

"Start Quote

Similar to other technology providers in the UK we comply with the Regulation."

End Quote Patrick Spence Blackberry

"They would have to say we want this individual's comms data and these are the reasons why," said solicitor advocate Simon McKay, who has written a book on the subject.

"When it comes to the next person they would have to look at that completely separately and re-apply."

Initial identification data would likely need to be taken from video, photographs, CCTV footage and other intelligence.

Those limits mean telecoms subscriber data becomes useful additional evidence, rather than a first port of call.

Mr McKay explained that, when considering requests, the issue of collateral intrusion also had to be taken into account - specifically, how much other people's data might inadvertently be disclosed, along with the suspect.

Time consuming

Such safeguards make investigations extremely labour intensive according to Barrie Davies, a retired chief inspector who now teaches RIPA procedure for Baron Training.

"It is a lot of paperwork," he told BBC News.

"People don't always believe us but there is a lot of oversight that is done by authorising officers to make sure that anything that is done is necessary and proportionate."

<!-- Embedding the video player --> <!-- This is the embedded player component -->
<!-- embedding script -->
<!-- companion banner --> <!-- END - companion banner --><!-- caption -->

Iain Mackenzie says there is 'credible evidence' that rioters are using BlackBerry Messenger

<!-- END - caption -->
<!-- end of the embedded player component --> <!-- Player embedded -->

Despite the restrictions, some legal experts believe there is scope to push RIPA guidelines further than they have been in the past.

One senior barrister, with extensive experience of this area, told the BBC that doing a "trawl" for mobile phones in a particular location where rioting was taking place might be considered proportionate in this case.

However, he conceded that it was unlikely police would make such a request.

Message data

Another possibility, according to solicitor Tom Russell from DLA Piper, would be for BlackBerry to pro-actively offer a limited portion of their user data to police.

"They could say 'this person in in Brixton and he sent messages to 40 people and an hour later 25 of them turned up'," said Mr Piper.

That basic information could be used to narrow down suspects worthy of further investigation, without violating either data protection or RIPA guidelines, he explained.

"There's a specific section in the data protection act which says you can disclose personal information for the purposes of detection of crime without the consent of the person to whom it relates."

The Met Police was unavailable for comment on this matter at the time of writing.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Mobiles become emergency data net

Mobile phones could soon be helping in the aftermath of disasters by becoming an ad-hoc message passing network.

Computer scientist Thomas Wilhelm has developed software that lets data hop from phone to phone.

Messages sent via the application gradually migrates towards its intended target to keep communication going when other routes are closed.

The system could also help protesters in nations that routinely switch off networks to quell unrest.

Called Auto-BAHN, the project was unveiled at the DefCon hacker conference in Las Vegas in early August.

To pass messages the software uses the Bluetooth short-range radio technology and wi-fi that are ubiquitous on smartphones.

After a disaster, owners of phones that have the Auto-BAHN application can search for other users of it and pass on a message. Once sent, the message propagates across the network of other Auto-BAHN using phones until it gets to its intended target.

It could prove helpful during disasters and alert emergency services to the location of survivors.

Mr Wilhelm has produced an application that puts Auto-BAHN on Android phones and is working on one for the iPhone.

The applications are just to prove the concept works, he said, as he is trying to convince smartphone makers to have a similar system included as standard on their gadgets.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Monday, August 8, 2011

Child finds flaws in mobile games

A novel class of security problems have been found lurking in many mobile games by a ten-year old hacker.

Going by the handle CyFi, the hacker presented her findings at the DefCon hacker conference held in Las Vegas.

She found that advancing the clock on a tablet or phone can, in many games, open a loophole that can be exploited.

CyFi discovered the bug after getting bored with the pace of farming games and seeking ways to speed them up.

Find and fix

Many farm-based games force players to wait hours before they can harvest a crop grown from virtual seeds. As a result CyFi, who has not revealed her real name, started fiddling with the clock on her handset to see if she could produce crops more quickly.

While many games detect and block clock-based cheating, CyFi found ways round these security measures. Disconnecting a phone from wi-fi and only advancing a clock by a small amounts helped to open up the loophole as it forced the game into a state not tested by its original creators.

Details about what this bug opens up have not been revealed but such flaws are often used to let an attacker run their own code and get access to useful or saleable data.

CyFi's discovery has since been verified by independent security researchers.

The exploit has been found to work in versions of games for both Apple and Android gadgets. Exactly which games are vulnerable has not been revealed to give their creators time to fix them.

CyFi gave a presentation about her findings at DefCon Kids, the first meeting at the larger Def Con hacker conference, aimed at younger people who are interested in tinkering with hardware and software.

A sponsored session at DefCon Kids gave a cash prize to the youngster who found the most games suffering this loophole in 24 hours.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials

Friday, August 5, 2011

US man charged over Facebook spam

A US man charged with sending more than 27 million spam messages to Facebook users has turned himself in.

Sanford Wallace, who is known as the "Spam King", surrendered to FBI agents in California.

Prosecutors allege he developed a program that breached Facebook spam filters and lured users to submit their account details.

Mr Wallace denies the charges, which carry prison sentences of up to 10 years.

He has been released on $100,000 (�61,000) bail.

Prosecutors say Mr Wallace's program posted messages on Facebook users walls - purportedly from friends - urging users to visit a website where their account details were then harvested.

They were then redirected to an affiliate website that earned Wallace "substantial revenue", the charges say.

The program also retrieved lists of Facebook users' friends and posted spam messages on their walls, the indictment adds.

About 500,000 Facebook accounts were compromised between November 2008 and March 2009, leading to more than 27 million spam messages being sent, prosecutors said.

Mr Wallace, who is from Las Vegas, is charged with six counts of electronic mail fraud, three counts of intentional damage to a protected computer and two counts of criminal contempt.

Facebook sued Mr Wallace in 2009 and a federal judge ordered him not to access Facebook's computer network. However, prosecutors say he repeatedly violated that order earlier this year.

Mr Wallace also lost a civil case brought against him by MySpace in 2008 over junk messages sent to members of the social networking site.



Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement | WordPress Tutorials