×
Crime

How The FBI Identified That Masked Arsonist Identified and Jailed Because of Her Etsy Review (arstechnica.com) 259

An anonymous reader quotes Ars Technica: To some extent, every Internet user leaves a digital trail. So when a masked arsonist was seen on video setting fire to a police car on the day of a recent protest in Philadelphia, the fact that her face was hidden didn't prevent a Federal Bureau of Investigation agent from tracking down the suspect. The keys ended up being a tattoo and an Etsy review the alleged arsonist had left for a T-shirt she was wearing at the scene of the crime, according to the FBI...

Even with video and photos, the FBI wasn't yet able to identify the suspect because her face wasn't visible. But the T-shirt she wore was unique and sold on Etsy, so FBI agents read the reviews on the seller's Etsy page to see if anyone from the Philadelphia area had purchased it. Blumenthal had left a 5-star review that said, "Fast shipping, thanks very much!" from her username "alleycatlore," and her Etsy profile displayed her location as Philadelphia, the affidavit said.

The FBI did not yet have her full name, so they did a search for "alleycatlore" and found a user on the online fashion marketplace Poshmark "with a display name of 'lore-elisabeth,'" the affidavit said. A search for "Lore Elisabeth" in Philadelphia turned up "a LinkedIn profile... Pictures of the alleged arsonist showed a tattoo of a peace sign on her right forearm, and that tattoo was visible in a four-year-old video of Lore Elisabeth performing a massage on her business's website. The website had a phone number for Lore Elisabeth... From Lore Blumenthal's Etsy review of a T-shirt, her profiles on Poshmark and LinkedIn, and the tattoo visible on a video posted to her massage therapy website, the FBI found the details they needed to match the arsonist seen in photos and video to government records, the affidavit said...

"If convicted, the defendant faces a maximum possible sentence of eighty years in prison, followed by three years of supervised release, and a fine of up to $500,000," a press release from the Department of Justice and US Attorney's office said.

One local news site reported Blumenthal faces only a maximum possible sentence of ten years in prison and a fine of up to $250,000.

But she's currently being held in jail without bail until her trial begins.
Privacy

IRS Used Cellphone Location Data To Try To Find Suspects (wsj.com) 24

The Internal Revenue Service attempted to identify and track potential criminal suspects by purchasing access to a commercial database that records the locations of millions of American cellphones. The Wall Street Journal reports: The IRS Criminal Investigation unit, or IRS CI, had a subscription to access the data in 2017 and 2018, and the way it used the data was revealed last week in a briefing by IRS CI officials to Sen. Ron Wyden's (D., Ore.) office. The briefing was described to The Wall Street Journal by an aide to the senator. IRS CI officials told Mr. Wyden's office that their lawyers had given verbal approval for the use of the database, which is sold by a Virginia-based government contractor called Venntel Inc. Venntel obtains anonymized location data from the marketing industry and resells it to governments. IRS CI added that it let its Venntel subscription lapse after it failed to locate any targets of interest during the year it paid for the service, according to Mr. Wyden's aide.

Justin Cole, a spokesman for IRS CI, said it entered into a "limited contract with Venntel to test their services against the law enforcement requirements of our agency." IRS CI pursues the most serious and flagrant violations of tax law, and it said it used the Venntel database in "significant money-laundering, cyber, drug and organized-crime cases." "The tool provided information as to where a phone with an anonymized identifier (created by Venntel) is located at different times," Mr. Cole said. "For example, if we know that a suspicious ATM deposit was made at a specific time and at a specific location, and we have one or more other data points for the same scheme, we can cross reference the data from each event to see if one or more devices were present at multiple transactions. This would then allow us to identify the device used by a potential suspect and attempt to follow that particular movement."

IRS CI "attempted to use Venntel data to look for location records for mobile devices that were consistently present during multiple financial transactions related to an alleged crime," Mr. Cole said. He said that the tool could be used to track an individual criminal suspect once one was identified but said that it didn't do so because the tool produced no leads.

Crime

FBI Used Etsy, LinkedIn To Make Arrest In Torching of Philadelphia Police Vehicles (6abc.com) 325

Authorities used popular websites including Etsy, Poshmark and LinkedIn to identify a woman who has since been charged for the arson of two Philadelphia police vehicles during the unrest that followed peaceful protests on May 30. From a report: Lore-Elisabeth Blumenthal, 33, of Philadelphia, is currently in federal custody and had her initial court appearance on Tuesday. According to United States Attorney William M. McSwain, on May 30, two vehicles, one PPD sedan (number 2514) and one PPD SUV (number 1612), were parked on the north side of City Hall. During the violence that began around City Hall following peaceful protests, Blumenthal allegedly set fire to both vehicles.

[T]he FBI says it was Blumenthal's T-shirt and a forearm tattoo that helped authorities identify her. In amateur photos given to authorities, she is seen wearing a T-shirt that says, "Keep the immigrants, deport the racists." They were able to trace the T-shirt back to an Etsy shop, where a review was left by a user that displayed a Philadelphia location. Investigators say open searches for the username led them to a Poshmark user by the name of lore-elisabeth. Open searches for a Lore Elisabeth in Philadelphia led investigators to a LinkedIn profile for a woman who was employed as a massage therapist. [...] If convicted, Blumenthal faces a maximum possible sentence of ten years in prison, followed by three years of supervised release, and a fine of up to $250,000.

Iphone

'Hey Siri, I'm Getting Pulled Over': iPhone Feature Will Record Police Interaction, Send Location (fox29.com) 253

An iPhone user created a shortcut that prompts an iPhone to begin recording police interactions by the user simply uttering the phrase: "Hey Siri, I'm getting pulled over." The task utilizes Apple's relatively new "Shortcuts" feature, which allows users to conduct tasks on their phones with a single voice command using Siri. From a report: Twitter user Robert Petersen posted a link to the shortcut and an explanation of what it does. Users can download the police shortcut, but must make sure to have the Shortcuts app installed.

Upon saying "Hey Siri, I'm getting pulled over," any music that may be playing is paused and the screen's brightness is dimmed while the phone's "do not disturb" capability is turned on. The phone then automatically sends a message to a contact the user sets up, letting that person know that the user is being stopped by police, along with providing the user's location. The front camera is then turned on and the phone begins to record video of what is happening. "Once you stop the recording it sends a copy of the video to a contact you specify, puts volume and brightness back to where they were, turns off Do Not Disturb, and gives you the option to send to iCloud Drive or Dropbox," according to a Reddit post by Petersen.
There are apps with similar functions available for Android, including one called "Stop and Frisk Watch," which is designed to record incidents by "simply pushing a trigger on the phone's frame."
Privacy

Many Police Departments Have Software That Can Identify People In Crowds (buzzfeednews.com) 37

An anonymous reader quotes a report from BuzzFeed News: As protesters demand an end to police brutality and the coronavirus pandemic sweeps the nation, police departments around the country are using software that can track and identify people in crowds from surveillance footage -- often with little to no public oversight or knowledge. Dozens of cities around the country are using BriefCam, which sells software that allows police to comb through surveillance footage to monitor protests and enforce social distancing, and almost all of these cities have hosted protests against police brutality in the weeks since George Floyd was killed in police custody, BuzzFeed News has found. Some of the cities using BriefCam's technology -- such as New Orleans and St. Paul -- have been the site of extreme police violence, with officers using rubber bullets, tear gas, and batons on protesters. Authorities in Chicago; Boston; Detroit; Denver; Doral, Florida; Hartford, Connecticut; and Santa Fe County, New Mexico have also used it.

Founded in 2007 by Hebrew University researchers and now owned by camera company Canon, the Israel-based company sells a system called "Protect & Insights" that lets police and private companies filter hours of closed circuit television and home surveillance and create excerpts of a few relevant moments. Protect & Insights has built-in facial recognition and license plate reader searches, and lets police create "Watch Lists" of faces and license plates. The company also said its tool could filter out "men, women, children, clothing, bags, vehicles, animals, size, color, speed, path, direction, dwell time, and more." [...] There are currently no federal guidelines restricting the use of video analytics, license plate reader, and facial recognition software offered by companies like BriefCam. Neema Singh Guliani a senior legislative counsel with the ACLU said that city governments often acquire these technologies without public oversight or debate.

Privacy

Senator Fears Clearview AI Facial Recognition Could Be Used On Protesters (cnet.com) 74

Sen. Edward Markey has raised concerns that police and law enforcement agencies have access to controversial facial recognition app Clearview AI in cities where people are protesting the killing of George Floyd, an unarmed black man who died two weeks ago while in the custody of Minneapolis police. CNET reports: Markey, a Democratic senator from Massachusetts and a member of the Commerce, Science, and Transportation Committee, said Tuesday the technology could be used to identify and arrest protestors. "As demonstrators across the country exercise their First Amendment rights by protesting racial injustice, it is important that law enforcement does not use technological tools to stifle free speech or endanger the public," Markey said in a letter to Clearview AI CEO and co-founder Hoan Ton-That. The threat of surveillance could also deter people from "speaking out against injustice for fear of being permanently included in law enforcement databases," he said.

Markey, who has previously hammered Clearview AI over its sales to foreign governments, use by domestic law enforcement and use in the COVID-19 pandemic, is now asking the company for a list of law enforcement agencies that have signed new contracts since May 25, 2020. It's also being asked if search traffic on its database has increased during the past two weeks; whether it considers a law enforcement agency's "history of unlawful or discriminatory policing practices" before selling the technology to them; what process it takes to give away free trials; and whether it will prohibit its technology from being used to identify peaceful protestors.
Ton-That said he will respond to the letter from Markey. "Clearview AI's technology is intended only for after-the-crime investigations, and not as a surveillance tool relating to protests or under any other circumstances," he said in an emailed statement.
Crime

When the Police Get Filmed, Is There More Accountability? (msn.com) 269

Slashdot reader DevNull127 writes: Racism is not getting worse. It's getting filmed," Will Smith said in 2016. And this week the Washington Post noted a parallel pattern emerging: videos of violent police encounters which "contrast sharply with accounts by the departments or their unions." The Post provides four examples of police officials providing "inaccurate or outright misleading descriptions of what has occurred... Taken together, the incidents show how instant verification of police accounts have altered the landscape of accountability."

The Post even spoke to the executive director of one of America's national police officer labor unions, who conceded their profession has been "diminished by events that have been witnessed on video over the course of the last couple of weeks."

Here's one of the Post's examples:

Evan Gorski, 21, a protester in Philadelphia, was arrested on an allegation he pushed an officer off a bike on Monday, authorities told his attorney. But video circulated on social media painted a much different picture of how Gorski, a Temple University student, tangled with police. In the moment captured by others, Gorski reached between another demonstrator and an officer to separate them.

A moment later, Philadelphia Police officer Joseph Bologna Jr. struck Gorski with a baton, chased him down and straddled him as another officer pressed his face on the asphalt. Other officers swung their batons at others gathered around. Gorski's attorney, R. Emmett Madden, told the Philadelphia Inquirer that prosecutors dropped charges and released him Wednesday after reviewing video from the scene. "The police were lying," Madden said. "We had a protest police brutality, and then police brutalize my client and try to frame him for a crime he didn't commit."

Officer Bologna is now facing charges of aggravated assault.

Meanwhile CNN report that in the last week at least 8 instances of police using excessive force. were caught on camera, while Vox argue that videos going viral "have been crucial in keeping the police accountable."
Crime

DEA Authorized To Conduct Surveillance On Protesters (buzzfeednews.com) 186

An anonymous reader quotes a report from BuzzFeed News: The Drug Enforcement Administration has been granted sweeping new authority to "conduct covert surveillance" and collect intelligence on people participating in protests over the police killing of George Floyd, according to a two-page memorandum obtained by BuzzFeed News. Floyd's death "has spawned widespread protests across the nation, which, in some instances, have included violence and looting," said the DEA memo. "Police agencies in certain areas of the country have struggled to maintain and/or restore order." The memo requests the extraordinary powers on a temporary basis, and on Sunday afternoon a senior Justice Department official signed off.

The DEA is limited by statute to enforcing drug related federal crimes. But on Sunday, Timothy Shea, a former US Attorney and close confidant of Barr who was named acting administrator of the DEA last month, received approval from Associate Deputy Attorney General G. Bradley Weinsheimer to go beyond the agency's mandate "to perform other law enforcement duties" that Barr may "deem appropriate." In addition to "covert surveillance," the memo indicates that DEA agents would be authorized to share intelligence with local and state law enforcement authorities, to "intervene" to "protect both participants and spectators in the protests," and to conduct interviews and searches, and arrest protesters who are alleged to have violated federal law.
Here's why Shea says the agency should be granted extraordinary latitude: "In order for DEA to assist to the maximum extent possible in the federal law enforcement response to protests which devolve into violations of federal law, DEA requests that it be designated to enforce any federal crime committed as a result of protests over the death of George Floyd," Shea wrote in the memo. "DEA requests this authority on a nationwide basis for a period of fourteen days."
Canada

Huawei CFO Meng Loses Key Court Argument in Fight Against Extradition To United States (reuters.com) 96

Huawei's Chief Financial Officer Meng Wanzhou has lost a key aspect of the trial on her extradition to the United States, a Canadian court announced on Wednesday. From a report: Meng, a Chinese citizen, was arrested in December 2018 on a warrant issued by U.S. authorities, who accuse her of bank fraud and misleading HSBC about a Huawei-owned company's dealings with Iran, thereby breaking U.S. sanctions on Tehran. Meng's lawyers argued that the case should be thrown out because the alleged offences were not a crime in Canada. But British Columbia's Superior Court Associate Chief Justice Heather Holmes disagreed, ruling the legal standard of double criminality had been met. "Ms. Meng's approach ... would seriously limit Canada's ability to fulfill its international obligations in the extradition context for fraud and other economic crimes," Holmes said.
Security

20 Years Later, Creator of World's First Major Computer Virus Located in Manila (bbc.com) 100

"The man behind the world's first major computer virus outbreak has admitted his guilt, 20 years after his software infected millions of machines worldwide," reports the BBC: Filipino Onel de Guzman, now 44, says he unleashed the Love Bug computer worm to steal passwords so he could access the internet without paying. He claims he never intended it to spread globally.

And he says he regrets the damage his code caused. "I didn't expect it would get to the US and Europe. I was surprised," he said in an interview for Crime Dot Com, a forthcoming book on cyber-crime.

The Love Bug pandemic began on 4 May, 2000. Victims received an email attachment entitled LOVE-LETTER-FOR-YOU. It contained malicious code that would overwrite files, steal passwords, and automatically send copies of itself to all contacts in the victim's Microsoft Outlook address book. Within 24 hours, it was causing major problems across the globe, reportedly infecting 45 million machines...

He claims he initially sent the virus only to Philippine victims, with whom he communicated in chat rooms, because he only wanted to steal internet access passwords that worked in his local area. However, in spring 2000 he tweaked the code, adding an auto-spreading feature that would send copies of the virus to victims' Outlook contacts using a flaw in Microsoft's Windows 95 operating system.

"It's not really a virus," wrote CmdrTaco back on May 4, 2000. "It's a trojan that proclaims its love for the recipient and requests that you open its attachment. On a first date even! It then loves you so much that it sends copies of itself to everyone in your address book and starts destroying files on your drive...

"Pine/Elm/Mutt users as always laugh maniacally as the trojan shuffles countless wasted packets over saturated backbones filling overworked SMTP servers everywhere. Sysadmins are seen weeping in the alleys."
Security

WhatsApp: Israeli Firm 'Deeply Involved' In Hacking Our Users (theguardian.com) 9

WhatsApp has alleged in new court filings that an Israeli spyware company used US-based servers and was "deeply involved" in carrying out mobile phone hacks of 1,400 WhatsApp users, including senior government officials, journalists, and human rights activists. The Guardian reports: The new claims about NSO Group allege that the Israeli company bears responsibility in serious human rights violations, including the hacking of more than a dozen Indian journalists and Rwandan dissidents. For years, NSO Group has said that its spyware is purchased by government clients for the purpose of tracking down terrorists and other criminals and that it had no independent knowledge of how those clients -- which in the past have reportedly included Saudi Arabia and Mexico -- use its hacking software.

But a lawsuit filed by WhatsApp against NSO Group last year -- the first of its kind by a major technology company -- is revealing more technical details about how the hacking software, Pegasus, is allegedly deployed against targets. In the court filings last week, WhatsApp said its own investigation into how Pegasus was used against 1,400 users last year showed that servers controlled by NSO Group -- not its government clients -- were an integral part of how the hacks were executed. WhatsApp has said victims of the hack received phone calls using its messaging app, and were infected with Pegasus. Then, it said: "NSO used a network of computers to monitor and update Pegasus after it was implanted on users' devices. These NSO-controlled computers served as the nerve centre through which NSO controlled its customers' operation and use of Pegasus."

NSO has said in legal filings that it has no insight into how government clients use its hacking tools, and therefore does not know who governments are targeting. But one expert, John Scott-Railton of Citizen Lab, who has worked with WhatsApp on the case, said NSO's control of the servers involved in the hack suggests the company would have had logs, including IP addresses, identifying the users who were being targeted.
"Our products are used to stop terrorism, curb violent crime, and save lives. NSO Group does not operate the Pegasus software for its clients," the company said in a statement. "Our past statements about our business, and the extent of our interaction with our government intelligence and law enforcement agency customers, are accurate."
Businesses

CEO of SoftBank-Backed Surveillance Firm Banjo Once Helped KKK Leader Shoot Up a Synagogue (medium.com) 181

Matt Stroud, reporting for OneZero: In magazine profiles and on conference stages, Damien Patton, the 47-year-old co-founder and CEO of the surveillance startup Banjo, often recounts a colorful autobiography. He describes how he ran away from a broken home near Los Angeles around age 15 and joined the U.S. Navy before working as a NASCAR mechanic. He says he became a self-taught crime scene investigator and then learned to code. Eventually, Patton helped build the digital infrastructure of what would become Banjo, a company that, in the past decade, has raised nearly $223 million, according to the investment data-sharing platform SharesPost, from prominent venture capital firms such as SoftBank. Patton has been the subject of profiles in dozens of publications; Inc. featured him in its April 2015 issue, and versions of his story have appeared in the Wall Street Journal, Entrepreneur, Fortune, Fast Company, and the New York Times. He has told a version of his story to an online entrepreneurial program at Stanford.

With his long red beard, flat-brimmed baseball cap, and a penchant for motorcycles and off-road vehicles, Patton strikes a hardened, gritty profile among the hoodied techies of Silicon Valley. Patton's story and public persona are compelling. They are also incomplete. Documents available to the public and reviewed by OneZero -- including transcripts of courtroom testimony, sworn statements, and more than 1,000 pages of records produced from a federal hate crime prosecution -- reveal that Patton actively participated in white supremacist groups in his youth and was involved in the shooting of a synagogue. In an interview with OneZero, one of the people involved in that shooting confirmed Patton's participation. Patton has not previously acknowledged this chapter of his life in public.

Crime

Parolees Are Being Forced To Download Telmate's Guardian App That Listens and Records Every Move (gizmodo.com) 228

XXongo writes: Monitoring parolees released from prison by an app on their smartphone sounds like a good idea, right? The phone has facial recognition and biometric ID, and a GPS system that knows where it is. But what if the app doesn't work? In a story on Gizmodo, the [Telmate Guardian] app's coding is "sloppy" and "irresponsible" and its default privacy settings are wildly invasive, asking for "excessive permissions" to access device data. And the app isn't even accurate on recognizing parolees, nor on knowing location, with one parolee noting that the app set off the high-pitched warning alarm and sent a notification to her parole officers telling him that she was not at home multiple times in the middle of the night, when she was in fact at home and in bed. The device also serves as a covert surveillance bug, with built-in potential to covertly record ambient audio from the phone, even in standby mode -- a feature which is not even legal in many states. "But there's nothing you can do," according to one parolee. "If you don't accept it, then you go back to prison. You're considered their property. That's how they see it."
Australia

How Australia's New Contact-Tracing App Tries to Fight Covid-19 While Protecting Privacy (health.gov.au) 66

"Australia's coronavirus tracing app, dubbed COVIDSafe, has been released as the nation seeks to contain the spread of the deadly pandemic," reports ABC.net.au: People who download the app will be asked to supply a name, which can be a pseudonym, their age range, a mobile number and post code. Those who download the software will be notified if they have contact with another user who tests positive for coronavirus... Using Bluetooth technology, the app "pings" or exchanges a "digital handshake" with another user when they come within 1.5 metres of each other, and then logs this contact and encrypts it.

The data remains encrypted on a user's phone for 21 days, after which it is deleted if they have not been in contact with a confirmed case. The application will have two stages of consent that people will have to agree to: initially when they download the app so data can be collected, and secondly to release that data on their phone if they are diagnosed with the virus. If a person with the app tested positive to COVID-19, and provided they consent to sharing the information, it will be sent to a central server. From here, state and territory health authorities can access it and start contacting other people who might have contracted coronavirus...

The app is voluntary and it will be illegal to force anyone to download it.

In addition, Australia "will make it illegal for non-health officials to access data collected on smartphone software to trace the spread of the coronavirus," reports Reuters, citing comments Friday by Prime Minister Scott Morrison "amid privacy concerns raised by the measure." Australia has so far avoided the high death toll of other countries, with only 78 deaths, largely as a result of tough restrictions on movement that have brought public life to a standstill. The federal government has said existing "social distancing" measures will remain until at least mid-May, and that its willingness to relax them will depend on whether people download the smartphone "app" to identify who a person with the illness has had contact with...

Morrison also confirmed a local media report which said the data would be stored on servers managed by AWS, a unit of U.S. internet giant Amazon.com Inc, but added that "it's a nationally encrypted data store".

"The spec for it is very privacy-positive," writes Slashdot reader Bleve97, adding "It will be interesting to see what it looks like once it's been disassembled in a sandbox and played with!"

And Slashdot reader betsuin has already installed it (adding that the app "does not require GPS... I've installed, GPS is off on my rooted device."
The Courts

Supreme Court To Consider Limiting America's 'Anti-Hacking' Law (washingtonpost.com) 21

America's Supreme Court "is finally considering whether to rein in the nation's sweeping anti-hacking law, which cybersecurity pros say is decades out of date and ill-suited to the modern Internet," according to the Washington Post's cybersecurity writer: The justices agreed to hear a case this fall that argues law enforcement and prosecutors have routinely applied the law too broadly and used it to criminalize not just hacking into websites but also far more innocuous behavior — such as lying about your name or location while signing up on a website or otherwise violating the site's terms of service...

[C]urrent interpretations of the 1986 law, known as the Computer Fraud and Abuse act (CFAA), have made researchers wary of revealing bugs they find because they fear getting in trouble with police or with companies, which can also sue under the law in civil courts. "Computer researchers are constantly afraid that a security test they run is going to run them afoul of the law," Tor Ekeland, an attorney who specializes in defending people accused of violating the CFAA, told me. "This law makes the Internet less safe because it chills legitimate information security research and it's bad for the economy because it chills innovation...."

"This is about whether a statute should be drafted so broadly that everyone is committing crimes all the time and the government gets to choose who to prosecute," Greg Nojeim, senior counsel at the Center for Democracy and Technology, told me... The Justice Department even charged WikiLeaks founder Julian Assange under the law — his crime was allegedly giving advice to one of the site's main leakers Chelsea Manning about how to crack a Defense Department password to gather more information...

One of the best-known CFAA prosecutions was of the Internet activist Aaron Swartz.

The Courts

Uber Argues 'Fraud' Absolves It From Paying Star Engineer's $179 Million Fine (techcrunch.com) 41

An anonymous reader quotes a report from TechCrunch: Uber argued in a recent court filing that former employee Anthony Levandowski committed fraud, an action that frees the company from any obligation to pay his legal bills, including a judgment ordering the star engineer to pay Google $179 million. Uber's fraud claim was part of its response to Levandowski's motion to compel the ride-hailing company into arbitration in the hopes that his former employee will have to shoulder the cost of the $179 million judgment against him. The motion to compel arbitration, and now Uber's response, is part of Levandowski's bankruptcy proceedings. It's the latest chapter in a legal saga that has entangled Uber and Waymo, the former Google self-driving project that is now a business under Alphabet.

In this latest court filing, Uber has agreed to arbitration. However, Uber also pushed back against Levandowski's primary aim to force the company to stand by an indemnity agreement. Uber signed an indemnity agreement in 2016 when it acquired Levandowski's self-driving truck startup Otto. Under the agreement, Uber said it would indemnify -- or compensate -- Levandowski against claims brought by his former employer, Google. Uber said it rescinded the indemnification agreement several months prior to the inception of Levandowski's bankruptcy case "because it was procured by his fraud," according to the court filing. Uber revoked the indemnification agreement after Levandowski was indicted by a federal grand jury with 33 counts of theft and attempted theft of trade secrets while working at Google, where he was an engineer and one of the founding members of the group that worked on Google's self-driving car project.

Government

Bill Gates, Lancet, UN, and Many Others Lambast America's Withholding of Funds from the WHO (thehill.com) 373

This week U.S. president Donald Trump suspended America's $900 million annual contribution to the World Health Organization. Richard Horton, editor-in-chief of the prestigious medical journal The Lancet, called Trump's move a "crime against humanity...."

The Hill reports: "Every scientist, every health worker, every citizen must resist and rebel against this appalling betrayal of global solidarity," he added...

The American Medical Association (AMA) late Tuesday called Trump's decision a "dangerous step in the wrong direction" and urged him to reconsider. "Fighting a global pandemic requires international cooperation and reliance on science and data. Cutting funding to the WHO — rather than focusing on solutions — is a dangerous move at a precarious moment for the world," the AMA said in a statement. European Union foreign policy chief Josep Borrell, meanwhile, said Wednesday that there was "no reason justifying" Trump's move...

And Bill Gates said in a tweet that halting funding to the WHO amid a world health crisis "is as dangerous as it sounds."

"Their work is slowing the spread of COVID-19 and if that work is stopped no other organization can replace them," the Microsoft co-founder and billionaire philanthropist added. "The world needs @WHO now more than ever."

Agreeing with Bill Gates was 95-year-old former U.S. president Jimmy Carter. Newsweek quotes Carter's newly-released statement calling the WHO "the only international organization capable of leading the effort to control this virus."

The head of the United Nations also called the WHO "absolutely critical to the world's efforts to win the war against COVID-19."

While criticizing the WHO, this week an article in the Atlantic called president Trump's moves "a transparent effort to distract from his administration's failure to prepare for the COVID-19 pandemic." The Democrats speaker of the House added that Trump's decision "is dangerous, illegal and will be swiftly challenged."

But the science magazine Nature still published an editorial harshly criticizing Trump's attempt to defund the WHO. "[E]ven talk of doing so in the middle of a global health and economic crisis cannot be condemned strongly enough." They argue that withholding America's funds "will place more lives at risk and ensure that the world takes longer to emerge from this crisis... It is right that researchers, funders and governments have been protesting against Trump's decision, and they must continue to do so in the strongest terms."

And Newsweek also published the comments of the WHO's Director-General, who had this message for its critics. "[O]ur focus, my focus, is on stopping this virus and saving lives... This is a time for all of us to be united in our common struggle against a common threat, a dangerous enemy.

"When we're divided, the virus exploits the cracks between us."
The Courts

Former Tesla Employees Brought Stolen Documents To Self-Driving Startup Zoox (theverge.com) 45

Self-driving startup Zoox has admitted that four of its employees took confidential documents from their previous employer Tesla, according to a statement issued after the company settled a lawsuit this week over the matter. The Verge reports: "Zoox acknowledges that certain of its new hires from Tesla were in possession of Tesla documents pertaining to shipping, receiving, and warehouse procedures when they joined Zoox's logistics team," the startup said in a statement to Reuters. Zoox says it will pay Tesla an undisclosed amount of money and will perform an audit to "ensure that no Zoox employees have retained or are using Tesla confidential information." Zoox says it "regrets the actions of those employees," and says it will also "conduct enhanced confidentiality training to ensure that all Zoox employees are aware of and respect their confidentiality obligations."
The Courts

NASA Astronaut's Estranged Wife Charged With Lying About Space Crime Allegation (usatoday.com) 114

Last August, Slashdot reader bobstreo tipped us off to an interesting story where an astronaut accessed the bank account of her estranged spouse from the International Space Station, in what may have been the first allegation of a crime committed in space. We have now learned that the spouse has been indicted on charges of lying to federal authorities. USA Today reports: Summer Worden, 44, made false statements to NASA's Office of the Inspector General and the Federal Trade Commission, according a statement from U.S. Attorney Ryan Patrick. A federal jury in Houston returned the two-count indictment in late February, but it was unsealed Monday. Worden married Anne McClain, a decorated astronaut who was once set to be part of NASA's first all-female spacewalk, in 2014 and filed for divorce in 2018. In 2019, Worden filed a complaint with the Federal Trade Commission claiming McClain had stolen her identity while on a six-month mission aboard the International Space Station, although she saw no signs anyone had moved or used funds in the account, The New York Times reported. Worden's parents brought a separate complaint to NASA's Office of the Inspector General that described a "highly calculated and manipulative campaign" designed to win custody of the couple's child.

Through her lawyer, Rusty Hardin, McClain told The Times she had accessed the account but said she did so to ensure that the family's finances were in order and that there was enough money in the account to care for their child, who was born a year before they met. She said she was never told to stop using the account and continued to use the same password she had throughout the relationship. The indictment says Worden maintained multiple accounts at USAA Federal Savings Bank and she shared access to those accounts "with a commissioned officer in the U.S. Army on detail to NASA's Johnson Space Center." She lied about when she opened the account that had allegedly been improperly accessed and when she reset her login credentials in a complaint filed with the FTC in March 19, 2019, according to the indictment. Worden also allegedly made another false statement in an interview with NASA's Office of the Inspector General in July.
If Worden is convicted, she could face up to five years in prison on each count and a maximum fine of $250,000. She is expected to make an initial court appearance April 13.
Crime

'Zoombombing' Is a Federal Offense That Could Result In Imprisonment, Prosecutors Warn 37

"Zoomboming," where someone successfully invades a public or private meeting over the videoconferencing platform to broadcast shock videos, pornography, or other disruptive content, could result in fines and possible imprisonment, according to federal prosecutors. The Verge reports: The warning was posted as a press release to the Department of Justice's website under the U.S. Attorney's office for the state's Eastern district with support from the state attorney general and the FBI. Now, prosecutors say they'll pursue charges for Zoombombing, including "disrupting a public meeting, computer intrusion, using a computer to commit a crime, hate crimes, fraud, or transmitting threatening communications." Some of the charges include fines and possible imprisonment. The press release says that if you or anyone you know becomes a victim of teleconference hacking, they can report it to the FBI's Internet Crime Complaint Center. "Do not make the meetings or classroom public. In Zoom, there are two options to make a meeting private: require a meeting password or use the waiting room feature and control the admittance of guest," the guidance reads. "Do not share a link to a teleconference or classroom on an unrestricted publicly available social media post. Provide the link directly to specific people."

The Verge adds: "The guidance also advises against allowing anyone but the host to screenshare and asks that users of Zoom and other apps install the latest updates."

Slashdot Top Deals