Remember how much fun chemistry sets used to be before the chemicals were deemed too dangerous for household fun? The Society for Science & The Public, in collaboration with the Gordon and Betty Moore Foundation, have launched a contest
to collect ideas for a new kind of Science Play and Research Kit (SPARK) "that encourage imagination and interest in science, recapturing the spirit of the chemistry set." There are cash prizes too! From the SPARK Competition site:
To be clear, we’re interested in science beyond chemistry. We borrow this term to capture the spirit and magic of what the classic chemistry set spawned in the 1940s - 60s. We’re looking for ideas that can engage kids as young as 8 and inspire people who are 88. We’re looking for ideas that encourage kids to explore, create, build and question. We’re looking for ideas that honor kids’ curiosity about how things work.
SPARK Competition: Reimagining The Chemistry Set of the 21st Century (Thanks, Chris Mentzel!)
What users who attempt to connect to the Silk Road marketplace see now (HT: Adrian Chen)
Looks like the government shutdown didn't stop federal agents from shutting down the most popular "deep web" illegal drug market. In San Francisco, federal prosecutors have indicted Ross William Ulbricht, who is said to be the founder of Silk Road. The internet marketplace allowed users around the world to buy and sell drugs like heroin, cocaine, and meth.
The government announced that it seized about 26,000 Bitcoins worth roughly USD$3.6 million, making this the largest Bitcoin bust in history. There were nearly 13,000 listings for controlled substances on the Silk Road site as of Sept. 23, 2013, according to the FBI, and the marketplace did roughly USD$1.2 billion in sales, yielding some $80 million in commissions.
According to the complaint, the service was also used to negotiate murder-for-hire: "not long ago, I had a clean hit done for $80k," the site's founder is alleged to have messaged an associate.
Ulbricht, 29, is also known as "Dread Pirate Roberts."
Read the rest
A lawsuit filed by technology entrepreneur and hacker Kim Dotcom
against the government of New Zealand demands NZ $6 million (roughly USD $5 million) over an "excessively aggressive and invasive approach" by police who raided his mansion 18 months ago. The raid was ordered by the FBI, which sought to extradite him to the US on copyright violation charges. — Xeni
"Barrett Brown makes for a pretty complicated victim," writes David Carr in his recent profile of the Dallas-based journalist
"obsessed with the government’s ties to private security firms." Brown, 32 has been in jail for a year. He faces charges that carry a combined penalty of more than 100 years in prison. Why does the gag order on his case matter to all of us? Carr explains
. — Xeni
"It wasn’t ever seriously in doubt," writes Kevin Poulsen at Wired
, "but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors." Freedom Hosting was a provider of so-called “Tor hidden service” sites. Their addresses end in .onion, their geographic locations are masked behind layers of routing, and they can be reached only over the Tor anonymity network. [Threat Level] — Xeni
r00tz is the amazing kid-track of programming at DEFCON, the giant hacker conference held annually in Las Vegas. The organizers have created a "code of conduct" for young hackers that is good advice for anyone doing infosec work, or exploring computers and systems:
The Internet is a small place. Word gets around, fast. Follow these rules at all times:
- Only hack things you own
- Do not hack anything you rely on
- Respect the rights of others
- Know and respect the law
- Find a safe playground (One always exists. If you don’t have support from your parents, get their permission to find an adult who will support you.)
There's more, but it's short and sweet. Go read it. The final statement, "r00tz is about creating a better world. You have the power and responsibility to do so. Now go do it! We are here to help you" sums it up nicely.
r00tz Asylum | About
MIT is rightfully proud of alumna Limor Fried, the superhero hardware hacker behind AdaFruit Industries, creators of fantastic DIY, open source electronics components and kits. We're proud of Limor too! From MIT News:
Apart from selling kits, original devices and providing hundreds of guides online, Adafruit works around the world with schools, teachers, libraries and hackerspaces — community technology labs — to promote STEM education, designing curricula in circuitry and electronics, among other initiatives.
The company has released an online children’s show called “A is for Ampere.” On a weekly Saturday night program, “Ask an Engineer,” anyone can ask Fried questions online or show off their original devices.
One of Fried’s favorite stories, from a young viewer of “Ask an Engineer,” illuminates what she sees as the growing diversity of engineering. “A parent emailed us after watching the show with his daughter,” she says. “I had another engineer on the show with me — my friend Amanda — and this parent’s daughter asked, ‘Dad, are there boy engineers too?’”
"Meet the maker
I found out yesterday that George Hotz, the hacker most known for unlocking the original iPhone and hacking the PS3, is now studying at my alma mater, Carnegie Mellon University. CMU has a bash.org clone for saving ridiculous quotes in IRC and around the computer science campus, and geohot already has some great ones in there.
amwatson: George, you have to start working on the assignment! If you don't, you won't have time to run on the supercomputer!
geohot: Don't worry. I have my own supercomputer!
amwatson: ...You have your own 256-core machine?
geohot: Yeah! Well, I have a botnet...
<geohot> I'm permitted to own Sony products. I'm just not permitted to touch them inappropriately.
< Tony0> I like geohot's method of forcing himself to suck less with vim
< Tony0> apparently he rebound the arrow keys to backspace.
< gwillen> I,I vim is properly appreciated in the original Klingon
Oh, geohot! More great quotes at cmubash.org. Thanks, Dannel!
Weev. Photo: Gawker
Adrian Chen at Gawker has a must-read profile on Weev: so-called "iPad hacker," founder of the anti-blogging Internet-trolling organization "Gay Nigger Association of America," and born-again Mormon troll. Snip:
For Auernheimer, the AT&T breach was one of his finest works as a troll. He personally didn't hack anything—the program used to collect the email addresses was written by Spitler—except the media. He was the hype man for Goatse, and he claims blew the breach up far beyond its actual significance. "The bug that I'm indicted over isn't a big deal," he says. "What made it big is the way I presented it." He boils down his success at promoting the AT&T job to three bullet points: "Rhetoric, persuasion, and meme reference."
But was collecting the email addresses actually a crime? "If somebody mistakenly puts information out there on the web and somebody mistakenly gets that information, that's not illegal," says Jennifer Granick, a lawyer and the director of the Center for Internet and Society at Stanford. This is why Auernheimer decided to fight his charges instead of take a plea deal, as Spitler did last year.
"I contend there is no crime in telling the truth or using AT&T's, or anybody's, publicly accessible data, to cite it to talk about how they made people's data public," he told CNET.
Auernhemier's jury disagreed.
Read: The Internet's Best Terrible Person Goes to Jail: Can a Reviled Master Troll Become a Geek Hero?.
Andrew "Weev" Auernheimer, the 26-year-old "iPad hacker" charged with federal crimes for obtaining personal data of more than 100,000 iPad owners from AT&T’s website was found guilty on Tuesday in federal court in New Jersey. The court convicted him in one count of identity fraud and one count of conspiracy to access a computer without authorization. Kim Zetter in Wired has the details
. Weev tweeted that he plans to appeal
. — Xeni
In Slate, Stephen Tobolowsky remembers what it was like to shoot the 1992 hacker/caper flick Sneakers, one of the great hacker movies of all time, with an all-star cast that included Robert Redford and Ben Kingsley:
During part of the big action finale, Robert Redford is chased through a secret lab by all of us bad guys. Phil was choreographing the chase and trying to put us in some kind of order of how fast we were running. He said, "Let's do it this way. Ben, you’re the Academy Award winner, we’ll start with you. Then, Tim, the Emmy winner, you’ll be next. Do we have a Tony winner? Anyway, Stephen, you'll be last."
Here is a Hollywood Zen story. We shot on location around Los Angeles and at Universal. The studio has a going concern of little buses that regularly drive through the back lot area with tourists from all over the world wielding disposable cameras. The tour guide has a set patter, "On your right is the shark from Jaws. On your left is Columbo's automobile." While one of the buses was nearing our stage, we were called to the set. The tour bus had to stop while Robert Redford and James Earl Jones crossed in front of it. No one noticed. The guide just kept up with, "On our right is the bicycle from E.T." People were snapping away at the bicycle and were completely oblivious that two of the most famous actors in the world were a few feet away from them.
At the end of the shoot, Phil said the only thing that could make the whole experience of working on Sneakers better was if the lab lost the film. Then we would be able to do it all over again.
Memories of the Sneakers Shoot
(via Hacker News)
The folks at the NYC Resistor hackerspace found a Macintosh SE that had been abandoned on a Brooklyn sidewalk and decided to conduct a little "digital archeology."
While digging through dumps generated from the Apple Mac SE ROM images we noticed that there was a large amount of non-code, non-audio data. Adam Mayer tested different stride widths and found that at 67 bytes (536 pixels across) there appeared to be some sort of image data that clearly was a picture of people. The rest of the image was skewed and distorted, so we knew that it wasn’t stored as an uncompressed bitmap.
After some investigation, we were able to decode the scrambled mess above and turn it into the full image with a hidden message from “Thu, Nov 20, 1986“
They say there's more curious data in the ROM that they haven't been able to decipher yet.
Ghosts in the ROM (Via Matt Richardson)
In a contest at the hacker conference Defcon, security specialist Shane MacDougall successfully penetrated Wal-Mart
. "Social engineering is the biggest threat to the enterprise, without a doubt," MacDougall said after his call. "I see all these [chief security officers] that spend all this money on firewalls and stuff, and they spend zero dollars on awareness." (via @kevinmitnick) — Xeni
Apple has never before participated in Defcon or Black Hat, but Bloomberg reports that this will change Thursday
"when Dallas De Atley, manager of Apple’s platform security team, is scheduled to give a presentation
on key security technologies within iOS, the operating system for iPhones and iPads" at Black Hat in Las Vegas, NV.
It’s significant because in recent years, Apple products have been stripped of their image of being hack-proof. The company’s rise has made it a bigger target, as hackers have been discovering bugs in the iPhone since it came out in 2007. Earlier this year, more than 600,000 Macs were infected, the first major malicious software attack targeting Apple computers.
Weev: Not Amused.
Mikko H. Hypponen of F-Secure publishes an email he claims is from a scientist with the Atomic Energy Organization of Iran (or AEOI), which details a new "cyber attack" wave against Iranian nuclear systems.
"There was also some music playing randomly on several of the workstations during the middle of the night with the volume maxed out. I believe it was playing 'Thunderstruck' by AC/DC."
Mikko can't validate the email or the tale therein, and neither can we, but if it's true? Heh.
* The 'shoop above is mine, not the hackers'.