Customs Officials Have Copied Americans’ Phone Data at Massive Scale

SpzToid writes: U.S. government officials are adding data from as many as 10,000 electronic devices each year to a massive database they’ve compiled from cellphones, iPads and computers seized from travelers at the country’s airports, seaports and border crossings, leaders of Customs and Border Protection told congressional staff in a briefing this summer. The rapid expansion of the database and the ability of 2,700 CBP officers to access it without a warrant — two details not previously known about the database — have raised alarms in Congress about what use the government has made of the information, much of which is captured from people not suspected of any crime. CBP officials told congressional staff the data is maintained for 15 years.

Details of the database were revealed Thursday in a letter to CBP Commissioner Chris Magnus from Sen. Ron Wyden (D-Ore.), who criticized the agency for “allowing indiscriminate rifling through Americans’ private records” and called for stronger privacy protections. The revelations add new detail to what’s known about the expanding ways that federal investigators use technology that many Americans may not understand or consent to. Agents from the FBI and Immigration and Customs Enforcement, another Department of Homeland Security agency, have run facial recognition searches on millions of Americans’ driver’s license photos. They have tapped private databases of people’s financial and utility records to learn where they live. And they have gleaned location data from license-plate reader databases that can be used to track where people drive.

Read more of this story at Slashdot.

Increase in LED Lighting ‘Risks Harming Human and Animal Health’

Blue light from artificial sources is on the rise, which may have negative consequences for human health and the wider environment, according to a study. From a report: Academics at the University of Exeter have identified a shift in the kind of lighting technologies European countries are using at night to brighten streets and buildings. Using images produced by the International Space Station (ISS), they have found that the orange-coloured emissions from older sodium lights are rapidly being replaced by white-coloured emissions produced by LEDs. While LED lighting is more energy-efficient and costs less to run, the researchers say the increased blue light radiation associated with it is causing “substantial biological impacts” across the continent. The study also claims that previous research into the effects of light pollution have underestimated the impacts of blue light radiation.

Chief among the health consequences of blue light is its ability to suppress the production of melatonin, the hormone that regulates sleep patterns in humans and other organisms. Numerous scientific studies have warned that increased exposure to artificial blue light can worsen people’s sleeping habits, which in turn can lead to a variety of chronic health conditions over time. The increase in blue light radiation in Europe has also reduced the visibility of stars in the night sky, which the study says “may have impacts on people’s sense of nature.” Blue light can also alter the behavioural patterns of animals including bats and moths, as it can change their movements towards or away from light sources.

Read more of this story at Slashdot.

Adobe Thinks It Can Solve Netflix’s Password ‘Piracy’ Problem

Adobe thinks it has the answer to Netflix’s “password sharing” problem that involves up to 46 million people, according to a 2020 study. TorrentFreak reports: Adobe believes that since every user is different, any actions taken against an account should form part of a data-driven strategy designed to “measure, manage and monetize” password sharing. The company’s vision is for platforms like Netflix to deploy machine learning models to extract behavioral patterns associated with an account, to determine how the account is being used. These insights can determine which measures should be taken against an account, and how success or otherwise can be determined by monitoring an account in the following weeks or months. Ignoring the obviously creepy factors for a moment, Adobe’s approach does seem more sophisticated, even if the accompanying slide gives off a file-sharing-style “graduated response” vibe. That leads to the question of how much customer information Adobe would need to ensure that the right accounts are targeted, with the right actions, at the right time.

Adobe’s Account IQ is powered by Adobe Sensei, which in turn acts as the intelligence layer for Adobe Experience Platform. In theory, Adobe will know more about a streaming account than those using it, so the company should be able to predict the most effective course of action to reduce password sharing and/or monetize it, without annoying the account holder. But of course, if you’re monitoring customer accounts in such close detail, grabbing all available information is the obvious next step. Adobe envisions collecting data on how many devices are in use, how many individuals are active, and geographical locations — including distinct locations and span. This will then lead to a “sharing probability” conclusion, along with a usage pattern classification that should identify travelers, commuters, close family and friends, even the existence of a second home.

Given that excessive sharing is likely to concern platforms like Netflix, Adobe’s plan envisions a period of mass account monitoring followed by an on-screen “Excessive Sharing” warning in its dashboard. From there, legal streaming services can identify the accounts most responsible and begin preparing their “graduated response” towards changing behaviors. After monetizing those who can be monetized, those who refuse to pay can be identified and dumped. Or as Adobe puts it: “Return free-loaders to available market.” Finally, Adobe also suggests that its system can be used to identify customers who display good behavior. These users can be rewarded by eliminating authentication requirements, concurrent stream limits, and device registrations.

Read more of this story at Slashdot.

China Accuses the NSA of Hacking a Top University To Steal Data

hackingbear shares a report from Gizmodo: China claims that America’s National Security Agency used sophisticated cyber tools to hack into an elite research university on Chinese soil. The attack allegedly targeted the Northwestern Polytechnical University in Xi’an (not to be confused with a California school of the same name), which is highly ranked in the global university index for its science and engineering programs. The U.S. Justice Department has referred to the school as a “Chinese military university that is heavily involved in military research and works closely with the People’s Liberation Army,” painting it as a reasonable target for digital infiltration from an American perspective.

China’s National Computer Virus Emergency Response Center (CVERC) recently published a report attributing the hack to the Tailored Access Operations group (TAO) — an elite team of NSA hackers which first became publicly known via the Snowden Leaks back in 2013, helps the U.S. government break into networks all over the world for the purposes of intelligence gathering and data collection. [CVERC identified 41 TAO tools involved in the case.] One such tool, dubbed ‘Suctionchar,’ is said to have helped infiltrate the school’s network by stealing account credentials from remote management and file transfer applications to hijack logins on targeted servers. The report also mentions the exploitation of Bvp47, a backdoor in Linux that has been used in previous hacking missions by the Equation Group — another elite NSA hacking team. According to CVERC, traces of Suctionchar have been found in many other Chinese networks besides Northwestern’s, and the agency has accused the NSA of launching more than 10,000 cyberattacks on China over the past several years.

On Sunday, the allegations against the NSA were escalated to a diplomatic complaint. Yang Tao, the director-general of American affairs at China’s Ministry of Foreign Affairs, published a statement affirming the CVERC report and claiming that the NSA had “seriously violated the technical secrets of relevant Chinese institutions and seriously endangered the security of China’s critical infrastructure, institutions and personal information, and must be stopped immediately.”

Read more of this story at Slashdot.

EA Announces Kernel-Level Anti-Cheat System For PC Games

Electronics Arts (EA) is launching a new kernel-level anti-cheat system that’s been developed in-house to protect its games from tampering and cheaters. It’ll debut first in FIFA 23 but not all of its games will implement the system. The Verge reports: Kernel-level anti-cheat systems have drawn criticism from privacy and security advocates, as the drivers these systems use are complex and run at such a high level that if there are security issues, then developers have to be very quick to address them. EA says kernel-level protection is “absolutely vital” for competitive games like FIFA 23, as existing cheats operate in the kernel space, so games running in regular user mode can’t detect that tampering or cheating is occurring. “Unfortunately, the last few years have seen a large increase in cheats and cheat techniques operating in kernel-mode, so the only reliable way to detect and block these is to have our anti-cheat operate there as well,” explains [Elise Murphy, senior director of game security and anti-cheat at EA].

EA’s anti-cheat system will run at the kernel level and only runs when a game with EAAC protection is running. EA says its anti-cheat processes shut down once a game does and that the anti-cheat will be limited to what data it collects on a system. “EAAC does not gather any information about your browsing history, applications that are not connected to EA games, or anything that is not directly related to anti-cheat protection,” says Murphy.

Read more of this story at Slashdot.

Coinbase Exec’s Brother Pleads Guilty In Crypto Insider Trading Case

Nikhil Wahi, brother of former Coinbase product manager Ishan Wahi, pleaded guilty in a Monday hearing to one count of conspiracy to commit wire fraud in connection with an alleged insider trading scheme. Decrypt reports: “Less than two months after he was charged, Nikhil Wahi admitted in court today that he traded in crypto assets based on Coinbase’s confidential business information to which he was not entitled,” said Damien Williams of the U.S. Attorney’s Office in New York in a statement. “For the first time ever, a defendant has admitted his guilt in an insider trading case involving the cryptocurrency markets,” Williams continued. “Today’s guilty plea should serve as a reminder to those who participate in the cryptocurrency markets that the Southern District of New York will continue to steadfastly police frauds of all stripes and will adapt as technology evolves.”

Nikhil now awaits sentencing in December, which could mean up to 20 years in prison. He has also been ordered to give back the money earned as a result of the illicit Coinbase trading, Williams said. Back in July, the Justice Department charged Ishan, Nikhil, and their friend Sameer Ramani with wire fraud conspiracy and wire fraud as it relates to cryptocurrency insider trading. The Securities and Exchange Commission also filed charges against the trio. While he was working at Coinbase, Ishan allegedly shared his insider knowledge of upcoming Coinbase listing announcements with Nikhil and Sameer to then profit from the listings by purchasing the tokens before they went live on Coinbase. In August, Ishan pled not guilty to the DOJ’s charges. Now that his brother has pleaded guilty, it’s unclear how Ishan’s case will proceed and whether he will continue to fight the insider trading case.

According to the DOJ’s statement released Monday, Nikhil implicated his brother Ishan and admitted to receiving tips from him. Nikhil then reportedly used numerous different crypto wallets in others’ names to anonymize his insider trading. Concerns of insider trading at cryptocurrency exchanges extend beyond just this case, which is considered the first of its kind and is likely to set a precedent. Three Australian finance academics have posited that up to 25% of Coinbase listings in the past four years may have involved some insider trading.

Read more of this story at Slashdot.

Uber Eats Will Begin Using Nuro Delivery Robots

Autonomous tech developer Nuro is teaming up with Uber Eats in a long-awaited partnership that will see the company’s latest robot take over the delivery of food to app users. Autoweek reports: The two companies signed a 10-year contract just a few days ago, paving the way for a wider rollout of Nuro’s driverless delivery robots, which have been operating on a limited scale in several cities. The partnership will kick off slowly, with Nuro deploying its robots to Houston and Mountain View, California, as a start, before the service makes a wider debut in the Bay Area.

Perhaps more importantly, Nuro’s delivery robots will allow Uber Eats to not have to pay a human driver, which is something that company has been working toward for years as part of its primary business as well. However, the lagging development of Level 4 and Level 5 autonomy, once widely expected to arrive around 2020, had stalled ambitions for Uber, which has struggled with profitability through normal operations with independent contractor drivers. Nuro delivery robots enjoyed renewed interest from business partners in the early months of the pandemic, but the company’s technology is now being viewed as a cost saver for operators rather than a method of more sanitary delivery.

Of course, a limited rollout in two cities plus plans to launch in the Bay Area won’t transform Uber Eats’ business model overnight. This could take years even with an unlimited supply of Nuro delivery robots — with regulatory approval still being the major impediment. That’s because commercial driverless permits are granted on a state-by-state basis, in addition to city and county approvals, which were hard enough for Nuro to obtain in the Bay Area, where Level 4 robotaxis are being tested. Nuro will need to focus its efforts in those areas where traffic is suitable for its robots.

Read more of this story at Slashdot.

Comcast Starts Rolling Out 2-Gigabyte Download Speeds to Millions of US Homes

Comcast says it’s “evolving its entire network architecture” (along with its equipment and customer devices) — and it’s not just a multi-gig network. They’re calling it America’s fastest — and its largest. It’s being rolled out “immediately” to millions of homes and business, “combined with up to 5x-to-10x faster upload speeds.”

“Comcast plans on bringing multi-gig internet speeds to 34 cities across the U.S. by the end of this year,” reports the Verge, “and will later expand its reach to more than 50 million households by the end of 2025.”

According to a press release, the company has already started rolling out 2-gig speeds over its broadband network in Colorado Springs, Colorado; Augusta, Georgia; Panama City Beach, Florida; and Philadelphia, Pennsylvania.

Customers in these cities will also get to take advantage of upload speeds that Comcast says are five to 10 times faster than what it currently offers. The upload speeds appear to max out at 200Mbps, even with the new Gigabit x2 plan, but Comcast intends to change that. It’s launching multi-gig symmetrical speeds next year, which will enable multi-gig speeds for both downloads and uploads.
“As part of this initiative, Comcast is accelerating the transformation of its network to a virtualized cloud-based architecture that is fully prepared for 10G and DOCSIS 4.0…” explains the press release, “which will deliver multi-gig symmetrical speeds over the connections already installed in tens of millions of homes and businesses.”

The big advantage of digital network technology is “rather than maintaining, updating, and replacing traditional analog network appliances by hand — which can take days or even weeks — Comcast engineers can reliably maintain, troubleshoot, and upgrade core network components almost instantly, with a few keystrokes on a laptop or mobile app. This also makes the network much more energy efficient and is an important element of Comcast’s plan to become carbon neutral by 2035.”

Read more of this story at Slashdot.