Boston University patent suit over Apple's iPhone 5 could net $75M

By Kevin Bostic
Apple's iPhone is at the center of another patent dispute, as the Trustees of Boston University have filed suit against the Cupertino company, alleging that not only the iPhone 5 but also the iPad and MacBook Air infringe on a BU professor's patent.
738

At issue in the suit is U.S. Patent No. 5,686,738, covering a method of "highly insulating monocrystalline gallium nitride thin films." Theodor D. Moustakas, Ph.D., a BU professor of Electrical and Computer Engineering, is listed as the inventor of the '738 patent, and the University as the assignee owns the right, title, and interest to the patent.

The process in the patent is related to the production of semiconductor devices using silicon, sapphire, gallium aresenide, magnesium oxide, zinc oxide, and silicon carbide. Gallium nitride thin films, a product of the process, are desirable in electronics due to their being a source of inexpensive and compact solid-state blue lasers.

The plaintiffs claim that Apple's iPhone 5, iPad, and MacBook Air "include a gallium nitride thin film semiconductor device" of the type described in the '738 patent. The suit alleges that Apple "has infringed, and continues to infringe, one or more claims of the '738 patent."

BU's case would seem to be bolstered by the fact that at least one other company pays a licensing fee to use the component in question, the Boston Herald reported on Wednesday. The University will likely raise that issue in court.

Boston University has also filed identical claims against eight other smaller manufacturers, as well as claims against both Samsung and Amazon in the past year. Observers note that the payout from the Apple suit could top out around $75 million if the University can demonstrate that Moustakas intended to make a business out of his invention.

The University's suit calls for Apple to detail all "gains, profits, and advantages" stemming from its use of the '738 patent, as well as awarded damages to compensate for the infringement. The suit also calls for the court to permanently enjoin Apple from making and selling any of the infringing products.

In its filing, Boston University asks the court for a trial by jury on all matters suitable for trial by jury. The case, Civil Action No. 1:13-cv-11575, was filed on July 2 in the U.S. District Court for the District of Massachusetts. F. Dennis Saylor is the presiding judge.

Read More >>

Questions for Google about Android security, Glass privacy




As European officials continue to voice concerns about privacy, surveillance, and Google’s products, researchers released a report this week on the security of the search engine company’s operating system:
Security researchers believe they have found a major security flaw in Google’s Android mobile operating system, which could affect up to 99 percent of Android phones now in consumers’ hands . . .

The problem lies in the security verification process that has been used on the Google Play applications store since the release of Android 1.6. It could leave up to 900 million devices open to hackers. The flaw, the research firm said, is a weakness in the way that Android applications verify changes to their code. The weakness would allow hackers to “turn any legitimate application into a malicious Trojan” without flagging the attention of Google’s app store, a mobile phone or the person using an application.

The result, researchers said, would be that anyone who breaks into an app this way would have access to the data that app collects and — if an app made by the device manufacturer gets exploited — could even “take over normal functioning of a phone.”. . .

Security is a common concern on Android phones, in part because the open nature of the system also means that it’s easy for anyone to find out how it works. Android is the OS of choice for 75 percent of the world’s smartphones, IDC reported in May. But a report released in March from the F-Secure security firm found that 79 percent of all mobile malware found in 2012 was running on Android phones.

This problem is exacerbated by the fact that so many smartphone manufacturers use their own versions of the Android operating system, making it more difficult to get system updates that may include security fixes out to customers. Hayley Tsukayama
On the same day that the report was released, a German official advised users to avoid certain companies, including Google, that share information with the U.S. government if they are concerned about eavesdropping:
NSA leaker Edward Snowden claimed Google, Facebook and Microsoft were among several Internet companies to give the U.S. National Security Agency access to their users’ data under a program known as PRISM. The companies have contested this, but the claims prompted outrage in Europe and calls for tighter international rules on data protection.

“Whoever fears their communication is being intercepted in any way should use services that don’t go through American servers,” German Interior Minister Hans-Peter Friedrich said.

He also said German officials are in touch with their U.S. counterparts “on all levels” and a delegation is scheduled to fly to Washington next week to discuss the claims that ordinary citizens — and even European diplomats — were being spied upon by the NSA. Associated Press
British regulators announced Thursday that they have asked Google to revise its privacy policy:
Google is facing more pressure in Europe as British regulators ordered the tech giant to make changes to its privacy policy in Europe by Sept. 20, following actions earlier this month from France and Spain. . .

The agency said that it was particularly concerned that Google’s policy, which went into effect in March and covers over 60 Google services, does not give users enough information about the data the firm collects and how it is used. It also has concerns that the policy does not share enough information about how long Google keeps user data.

If Google does not amend its policy, the British agency said, it will “leave the company open to the possibility of formal enforcement action.” The Guardian reported that the company could also face fines of up to $750,000, but only if there is proof that individuals may have been harmed by the policy.

Also on Thursday, the data protection office in Hamburg, Germany — where Google’s German office is based — said in a statement that it will be calling Google in for a hearing over concerns that the policy’s provisions on data collection are unclear.

Data protection officials from across the European Union have been scrutinizing Google’s privacy protections. The French data protection authority CNIL, which led a year-long investigation into Google’s privacy policy, and said in its order to the company in June that regulators in the Netherlands and Italy were assessing whether the policy violated data protection rules in those countries. Hayley Tsukayama
While European regulators have been more skeptical of Google’s policies than their counterparts in the United States, lawmakers in Congress have questioned Google about its new Glass headware:
On Monday, Google attempted to assure U.S. lawmakers that the headset, which mimics many of the functions of a smartphone, does not push the barriers of its privacy standards. But that was not enough to satisfy some lawmakers’ lingering concerns. . .

Rep. Joe Barton (R-Tex.), co-chairman of the caucus, said that Google has failed to answer the key question: How can it ensure the privacy of passersby who have not agreed to be photographed or videotaped?

He said that there ought to be a way to alert individuals that they may be on camera and that there should be limits on the types of data that Google and other companies can collect from it, as well as limits on how long that data can be stored.

“There do not appear to me to be strong privacy protections for the population at large, or even ownership protection for the user of the Google Glass product,” Barton said. Hayley Tsukayama
Google has argued that it will be clear to people in the vicinity when the device is active or recording.

Read More >>

Hidden Google Glass code hints at 'Boutique' app store

As Google continues to shape its pre-release version of Google Glass, the latest firmware update has brought new features such a web browser - but it turns out that there are also a few other hints below the surface.
The most interesting new discovery lying dormant in the XE7 APK update code is a "Boutique" which hints at being a centralised app store.
Google Glass is currently lacking a go-to destination for applications, and the new discovery reveals that something is coming to fill that gap, well ahead of its consumer release.

Lock 'n' load

Another welcome new feature hinted at is a locking mechanism, which would function by the wearer swiping in a specific pattern.
This is something Google has mentioned in the past in response to questions over what happens when someone steals your Glass and suddenly has access to all your information.
Also buried in the code are some new media player functions, featuring playback controls, track information and some talk of a video player as well. Volume control has been officially added already, so everything seems to be coming together nicely.
There's no way of knowing when these new features will arrive, but the fact they're showing up in the coding now should mean that Google is busily working to get them out the door soon.
Check out a demo of the Google Glass XE7 web browser below.

Read More >>

Sources: Feds probe possible $90 million fraud tied to Bohemia firm



Federal law enforcement officials are investigating whether nearly $90 million in bank loans to a Bohemia finance company were the object of a "massive fraud," according to court records and sources familiar with the case.
The investigation involves Oak Rock Financial Llc, at 3900 Veterans Memorial Hwy., a commercial lending company that often provides capital that other lenders would then loan for transactions such as automobile and business-related purchases.

Last week, Israel Discount Bank of New York, the lead institution of the five banks that have loaned as much as $90 million to Oak Rock, asked a federal bankruptcy court judge in Central Islip to appoint a trustee to oversee the operation of the company on an emergency basis to preserve any of its remaining assets. The banks stated in court papers that Oak Rock falsified its financial position in order to borrow money.

Attorneys for Israel Discount Bank said in court papers that they had learned that the founder and head of Oak Rock, John P. Murphy, had resigned and can't be located -- and the manager who took over at Oak Rock estimated that the fraud went as high as $70 million.
"Oak Rock had perpetrated a massive fraud upon its senior secured lenders," the attorneys allege in the court papers.

As an example of the fraud allegation, the banks said in court filings that Oak Rock claimed recently to have $2.5 million in credit available when it actually was over-advanced by $47 million. The other banks that loaned the money to Oak Rock were identified as Bank Leumi USA, Capital One, Bank Hapoalim, and First National Bank of New York.

Lawyers for Oak Rock did not return telephone calls or emails seeking comment. Attorneys for the banks also declined to comment.

Murphy, who legal sources said had more than 20 years' experience in commercial lending, didn't return phone calls to his Nesconset home.

New chief discovers fraud
A longtime associate of Murphy's, Tom Stephens, took charge of Oak Rock, court papers said. Stephens later told the attorneys for the banks that on April 17 he discovered "that Murphy had been perpetrating a long-running, extensive fraud with Oak Rock by creating fictitious records," court papers said.
Murphy then resigned, the court papers said. According to state records, Oak Rock was incorporated in July 2001 as a Delaware corporation. The incorporation papers listed Murphy as president and said the company had four employees.

Further, Stephens said he informed the FBI and the U.S. attorney's office in the Eastern District of the situation at Oak Rock and they are investigating, the court papers said.
Sources confirmed the FBI's and U.S. attorney's inquiries into Oak Rock. Spokesmen for both the FBI and federal prosecutors declined to comment.

Stephens also said in light of the company's situation, "Oak Rock cannot possibly continue as a going concern and must be orderly liquidated," the papers said.
Two Oak Rock workers told Newsday that Stephens resigned Friday. Attempts to reach him were unsuccessful.

According to the court papers, Stephens began this past January to visit Oak Rock's offices to get a firsthand look at the company's operations and its books and records.
During the week of April 15 Stephens noticed unusual collection activity with respect to one of Oak Rock's customers and confronted Murphy, the court papers said. It was at that point, according to Stephens, that Murphy admitted to Stephens "that he had been creating fictitious records in order to increase Oak Rock's borrowing base," court papers alleged.

Though Stephens had told the banks about the problems at Oak Rock, the banks' attorneys now say they do not believe Stephens has the financial skills to operate Oak Rock and they want an experienced trustee appointed to oversee the firm, the court papers say.
A hearing on the banks' request for the trustee is scheduled for Monday in federal bankruptcy court in Central Islip.

The banks said in court papers that Stephens "has essentially hijacked" Oak Rock and accused him of denying the banks access to critical information about the company's financial health as well as failing to take steps to safeguard its assets.

Oak Rock specializes in a variety of businesses that involve credit -- in effect, borrowing money from banks and then loaning the money to other lenders or businesses or financing its own credit transactions.
The lending of money to other lenders or businesses is known as asset-based lending. Such loans can allow businesses to engage in installment financing for the purchase of consumer products or other business transactions, the court papers stated.

Oak Rock also had other companies participate in its loans to spread the risk, according to court papers and legal sources.

Marketplace impact
Jerome Reisman, a Garden City attorney who is representing AmeriMerchant LLC, a firm that borrowed from Oak Rock to advance to merchants, said the matter has the potential to dry up credit for some consumers and merchants.

"Right now it is catastrophic to the borrowers who can't draw down [from Oak Rock] on funding needs to fund their operations," Reisman said.

He explained that firms such as auto finance companies and merchants who let consumers make credit card purchases aren't able to fund their consumer accounts and commercial accounts.
"The end result is that [some] commercial and consumer funding has been cut off, pending a court hearing," Reisman said.

He declined to give specifics about AmeriMerchant's borrowing from Oak Rock, but stressed that the company had obtained alternate financing so it could pay off what it owed Oak Rock.
By noon Friday, an "administrative hold" on Oak Rock's operating bank account was lifted, court records stated.

With Chau Lam

Read More >>

Genpets, Real living Pre-packaged, Mass produced, Bioengineered pets!


Does anyone find this as disturbing as we do?

Are Genpets Real animals? How?
Genpets are living, breathing mammals. Bio-Genica is a Bioengineering Company that has combined, and modified existing DNA to create the Genpets lineup. Genpets have blood, bones, and muscle; they will bleed if you cut them, and die if mistreated just like any other animal. The electronic components are only in the packages and are for basic life support, outside of the packages the Genpets are wholly organic.

Genpets are packaged like toys though.
Genpets are designed to be sold on retail store shelves, not traditional pet stores. This is why they are packaged in plastic.

How are Genpets made?
The original prototype and breeding Genpets were created using a process called "Zygote Micro Injection" Thereafter the Genpets are grown in assisted breeding lab farms. Zygote Micro Injection is quickly becoming a favourable method to combine DNA, or to insert certain proteins from different species. Most notably it was used in 1997 to splice mice with bioluminescent jellyfish (link) and has since been used to create glowing rabbits, pigs, fish, and monkeys (link). Since then, human DNA has been injected into chimpanzees, spider into sheep, and now, Genpets have arrived.

Is bioengineering this far advanced?
In 2003 Human DNA was successfully combined with rabbit (and other animals), to create successful Chimera Hybrids. Read National Geographic for more information (link). While Bio-Gencia is still awaiting approval for worldwide distributionof the Genpets, Allerca already sells genetically altered cats.

How do Genpets stay alive in the packages?
While the Genpets™ hang on retail shelves they are in a chemically induced type of hibernation controlled by a protein in the packages’ nutrient supply tubes. This was a natural trait found in many seasonal animals that would normally hibernate in colder northern climates that has been added to the Genpet line. This also ensures comfort for the Genpets™ while they are on store shelves.

How do the Genpets breath in the packages?
There are vent holes on the side of the package that allow filtered air to pass.

Do Genpets feel pain?
Yes. However the Genpets have limited vocal chords so they will not create a large amount of noise when disturbed.

What if I go on vacation?
The same protein that keeps the Genpet dormant on store shelves can be supplied at anytime during the life span of the Genpet making care for the pet incredibly simple.

Do Genpets show emotions?
Yes. This is part of why we have colour coded the Genpets. They come in seven different personality types. Each personality type shows slightly different emotions.

Do Genpets Talk?
Genpets have limited vocal chords for the convenience of parents. However, they do make some sound.

Do Genpets grow?
Genpets come fully-grown in their packaging.


Where can I buy a Genpet?
We are currently getting the Genpets approved for resale, as well as securing retail opportunities. No public release date has yet been set.

20 YEAR OLD ARAB TERRORIST ARRESTED, 12 DEAD, 50 INJURED


The New York Post is reporting that a Saudi national has been placed under guard at a New York hospital under suspicion that he planted the bomb that, at last count, killed 12 and injured 50 people running in and observing the Boston Marathon:
Law enforcement sources said the 20-year-old suspect was under guard at an undisclosed Boston hospital.

The man was caught less than two hours after the 2:45 p.m. bombing on the finish line of the Boston race. Assuming the Saudi man did indeed place the bombs as part of a terrorist operation, here are the latest FACTS:
boston_wheelchair

It seems reasonable to believe right now that the Saudi national was not acting alone. Police have confirmed that another explosion went off at the JFK Presidential Library and Museum. Multiple simultaneous attacks are an al Qaeda hallmark. It would also be ironic — if this was an Islamic terrorist attack — that the Islamists targeted a City that has been nothing but sympathetic to the Islamist cause, and invariably hostile to efforts to deviate from the proscribed statement that “Islam is a religion of peace.”

DETAILS: Homegrown terror is being blamed for two explosions that killed 2 people and severely injured over 28 others at today’s Boston Marathon. Runners covered in blood are being carted away as the details of this tragedy unfold. Both explosions occurred around 2:35 p.m., around 4 hours after the start of the men’s race. This is also the same time that most people tend to complete marathons—indicating that whoever set these explosives off was intent on inflicting maximum human injury.
The explosions occurred 15 seconds apart on the north side of Boylston Street and Boston Police are confirming at least three more explosive devices in the area. The City of Boston is requiring all police report to work immediately and bomb squads are scouring the area.

It is heartbreaking and angering to think about how the nearly 27,000 participants in this race probably spent an entire year preparing for this big day. For many of them, completing the Boston Marathon was a life-long dream. Their friends, family and co-workers were cheering them on and the worst they expected at the finish line was soreness and exhaustion, but never this.

How ironic that this human tragedy should occur on Tax Day
—the same day that our government gouges American citizens of the money they have spent an entire year earning—only to see President Obama take their hard-earned cash and toss it into his golf fund.
man_bleeding

Just like in the 9-11 tragedy in New York, the local police and firemen in Boston have stepped up to the plate and are showing bravery and compassion, putting themselves on the line to help victims get immediate medical attention. Please keep the victims of this tragedy in your thoughts and prayers.

Two tip-lines have been established by the City of Boston:
1.) For families of victims searching for their loved ones: 617.635.4500
2.) If you have any information that may be of help to police: 1.800.494.TIPS
AUTHOR Katie Kieffer
Read More >>

Boston Marathon Bombing - ACTUAL EXPLOSION - GRAPHIC VIVID RAW FOOTAGE

Live Radio Scanner Fee Boston Police, Fire and EMS


Listen Live

Tune In A Live Radio Feed
Includes Mass State Police, Boston Media Massport Fire/F Troop, Fenway Park and Boston Garden Security.

UTMB: Virus missing from secured facility

  
GALVESTON, Texas -
A virus disappeared from a secure facility at the University of Texas Medical Branch in Galveston, officials said.

Officials said they discovered the that the virus was missing during a routine internal inspection on March 20.

The missing vial contained less than a quarter teaspoon of a virus called Guanarito, which is native only to Venezuela and can cause hemorrhagic fever, officials said.

The vial was stored in a locked freezer within a secure laboratory. Officials said they've confirmed there was no breach in the facility's security, so they don't suspect foul play. UTMB officials said the vial was likely destroyed during the normal laboratory decontamination and cleaning process.
Kristen Hensley with UTMB said the virus can be transmitted by rodents only native to Venezuela where the virus is found. Hensley said they don't believe the virus to be capable of surviving naturally in rodents in the U.S.

Officials said the Centers for Disease Control and Prevention was notified immediately, and UTMB has began a rigorous process to assure the safety of its researchers, employees and the community.
Read More >>

U.S. dairy industry petitions FDA to approve aspartame as hidden, unlabeled additive in milk, yogurt, eggnog and cream

 (NaturalNews) You probably already know that the FDA has declared war on raw milk and even helped fund and coordinate armed government raids against raw milk farmers and distributors. Yes, it's insane. This brand of tyranny is unique to the USA and isn't even conducted in China, North Kora or Cuba. Only in the USA are raw milk farmers treated like terrorists.

But now the situation is getting even more insane than you could have imagined: the International Dairy Foods Association (IDFA) and the National Milk Producers Federation (NMPF) have filed a petition with the FDA asking the FDA to alter the definition of "milk" to secretly include chemical sweeteners such as aspartame and sucralose.

Importantly, none of these additives need to be listed on the label. They will simply be swept under the definition of "milk," so that when a company lists "milk" on the label, it automatically includes aspartame or sucralose. And if you're trying to avoid aspartame, you'll have no way of doing so because it won't be listed on the label.

This isn't only for milk, either: It's also for yogurt, cream, sour cream, eggnog, whipping cream and a total of 17 products, all of which are listed in the petition at FDA.gov.

As the petition states:

IDFA and NMPF request their proposed amendments to the milk standard of identity to allow optional characterizing flavoring ingredients used in milk (e.g., chocolate flavoring added to milk) to be sweetened with any safe and suitable sweetener -- including non-nutritive sweeteners such as aspartame.

This is all being done to "save the children," we're told, because the use of aspartame in milk products would reduce calories.

Milk industry specifically asks to HIDE aspartame from consumers

Astonishingly, the dairy industry is engaged in extreme doublespeak logic and actually arguing that aspartame should be hidden from consumers by not listing it on the label. Here's what the petition says:

IDFA and NMPF argue that nutrient content claims such as "reduced calorie" are not attractive to children, and maintain that consumers can more easily identify the overall nutritional value of milk products that are flavored with non-nutritive sweeteners if the labels do not include such claims. Further, the petitioners assert that consumers do not recognize milk -- including flavored milk -- as necessarily containing sugar. Accordingly, the petitioners state that milk flavored with non-nutritive sweeteners should be labeled as milk without further claims so that consumers can "more easily identify its overall nutritional value."

In other words, hiding aspartame from consumers by not including it on the label actually helps consumers, according to the IDFA and NMPF!

Yep, consumers are best served by keeping them ignorant. If this logic smacks of the same kind of twisted deception practiced by Monsanto, that's because it's identical: the less consumers know, the more they are helped, according to industry. And it's for the children, too, because children are also best served by keeping them poisoned with aspartame.

Consumers have always been kept in the dark about pink slime, meat glue, rBGH and GMOs in their food. And now, if the IDFA gets its way, you'll be able to drink hormone-contaminated milk from an antibiotics-inundated cow fed genetically modified crops and producing milk containing hidden aspartame. And you won't have the right to know about any of this!

The FDA confirms this "secret" status of aspartame, stating, "If the standard of identity for milk is amended as requested by petitioners, milk manufacturers could use non-nutritive sweeteners in flavored milk without a nutrient content claim in its labeling."

FDA requests comments

The FDA is requesting comments on this petition. You have until May 21st, 2013 to submit your comments. Click here for instructions.

This is a clue to stop drinking processed milk and milk products altogether

There's a bigger story here than just the industry hoping to get FDA approval to secretly put aspartame in milk products while not listing aspartame on the label.

The bigger question is this: If an industry is pushing to hide aspartame in its products, what else is it already hiding?

How about the pus content of its dairy products? How about its inhumane treatment of animals who are subjected to torture conditions and pumped full of genetically engineered hormones? How about the fact that homogenization and pasteurization turn a whole food into a dietary nightmare that promotes obesity, autoimmune disorders and cardiovascular disease?

There are lots of dirty little secrets in the dairy industry of course, and that doesn't even get into the secret closed-door conversations to encourage the FDA to destroy the competition of raw milk.

The only rational answer to all this is to stop buying and consuming processed dairy products, period!

I gave up ALL milk products many years ago and have never looked back. I drink almond milk, not pus-filled pasteurized cow's milk. (Click here for a recipe to make your own almond milk at home.) I don't eat yogurt. If I want probiotics, I get them from tasty chewable probiotics supplements such as Sunbiotics. I parted ways with processed dairy products many years ago, and as a result, my cardiovascular health, skin health, digestive health and stamina have all remained in outstanding shape.

There's also a philosophical issue here: Don't buy products from an industry that habitually LIES about everything. The dairy industry is like a mafia. They actively seek to destroy the competition, keep consumers ignorant and monopolize the market. They run highly deceptive ads with ridiculous claims like, "drinking milk helps you lose weight" and other nonsense.

The U.S. dairy industry is steeped in deception at every level, and now they want you and your children to unknowingly drink aspartame that's secretly blended into the product.

The dairy industry is to food as Lance Armstrong is to sports. It's all a big lie, laced with secret chemicals and false claims.

Stop drinking milk. Stop financially supporting the food mafia.

Recommended videos:
Raw Milk Rover (hilarious animation)
http://tv.naturalnews.com/v.asp?v=273C2497DFDE9F61CB9E8867113CA5CA

Got a PUStache? (satire)
http://tv.naturalnews.com/v.asp?v=C463AA940B9AEBA5D294F87FF0716579

Jonathan Emord raw milk freedom speech:
http://tv.naturalnews.com/v.asp?v=F8DF9A42CC5479D8829A2445C56AFEF3

Farmageddon interview with Kristin Canty
http://tv.naturalnews.com/v.asp?v=3340FCCC93B2C17EEFA43C7E6296728D

Sources for this article:
This petition was originally brought to our attention by a reader who says it was covered on Activist Post. I haven't yet read that article but may update this article with a link to that article once I identify the URL.

FDA petition page:
http://www.federalregister.gov/articles/2013/02/20/2013-03835/flavore...  Read More >>

Outrage over Joe Biden's London, Paris $1M hotel bills.

Republican opponents are berating Vice President Joe Biden on Twitter for running up more than $1 million in hotel bills for two nights in London and Paris in the midst of sequester spending cuts.
According to ABC News, the VP incurred hotel bills totaling more than $1 million for himself, his staff and security details for two nights in London and Paris. The official contract filing documents were first obtained online by the Weekly Standard. They show that the US State Department obtained contracts with two five-star hotels in London and Paris where Biden stayed during a five-day tour of Europe in February. According to the documents, his bill for a night at the Hyatt Regency London was $459,338.65 and his bill for a night at the Hotel Intercontinental Paris Le Grand, $585,000.50. The Weekly Standard explains that "due to obvious security concerns, such contracts are not open to the competitive bidding normally required on government contracts." The accompanying document for the London contract says that the vice president and his entourage required "approximately 136 hotel rooms for 893 room nights." This amounts to about $500 per night at the hotel. According to the Daily Mail, Biden probably stayed in a two-room, 1,851-square-foot Presidential Suite with an interconnecting entertainment area, marble bathrooms and "upscale" linens. He traveled with his wife Dr Jill Biden. A State Department official, responding to critics, said that the bills may look hefty but they are "nothing out of the ordinary," ABC News reports.
VP Joe Biden s Hyatt Regency hotel bill
US govt
VP Joe Biden's Hyatt Regency hotel bill
The official said: "They are in line with high-level travel across multiple administrations. The contract costs cover the entire range of support, including accommodations for military, communications, secret service staff, and other support professionals. Security experts are also required to travel in advance of the president or vice president. Safety and security are not negotiable." According to the Daily Mail, Brad Dayspring, strategist for the National Republican Senatorial Committee, making a reference to the Obama administration's decision to stop tours at the White House because of budget cuts, said: "Bet that's a lot of White House tours."
Biden s Hotel Intercontinental Paris Le Grand bill
US Govt.
Biden's Hotel Intercontinental Paris Le Grand bill
The controversial conservative commentator Ann Coulter, joked on Twitter, saying: "We need to keep him out of the mini-bar," even though Biden is known to be a teetotaler who abstains from alcohol, as the Daily Mail notes. Conservative Congressman Randy Neugebauer from Texas also used the opportunity to attack the Democrat's plan for spending cuts. Newsmax reported he said: "Still no WH tours, but VP Biden’s recent trip to Europe racked up $1mil in hotel room bills." ABC News notes that in comparison, a 1999 GAO report showed that President Bill Clinton's trips to Africa, Chile and China in 1998 cost $42.8 million, $10.5 million and $18.8 million, respectively, a total of over $72 million. The White House does not normally disclose the amount paid for the trips of the president and the vice president. Responding to a question about how much the president's trip to Illinois cost earlier in the month, the White House press secretary Jay Carney said: "I don’t have a figure on the cost of presidential travel. It is obviously something, as every president deals with because of security and staff, a significant undertaking. But the president has to travel around the country. He has to travel around the world. That is part of his job." President Obama also defended the cost of his trips and allegations that he his out of touch with Americans with his family "jetting around." He told KMOV: "The fact of the matter is, I think if you look at my track record, I’m raising a family here. When we travel, we got to travel through Secret Service, and Air Force One, that’s not my choice. I think most folks understand how hard I work and how hard this administration is working on behalf of the American people."

Read more: http://digitaljournal.com/article/346294#ixzz2OTIV3XbV

Read More >>

Appeals Court Rejects CIA Secrecy on Drones


A federal appeals court has just ruled that the CIA cannot continue to “neither confirm nor deny” the existence of the drone war, in a court case prompted by a Freedom of Information Act request by the American Civil Liberties Union.
“This is an important victory. It requires the government to retire the absurd claim that the CIA’s interest in the targeted killing program is a secret, and it will make it more difficult for the government to deflect questions about the program’s scope and legal basis,” said ACLU Deputy Legal Director Jameel Jaffer, who argued the case before a three-judge panel of the D.C. Circuit Appeals Court in September. “It also means that the CIA will have to explain what records it is withholding, and on what grounds it is withholding them.”
The ACLU’s FOIA request, filed in January 2010, seeks to learn when, where, and against whom drone strikes can be authorized, and how and whether the U.S. ensures compliance with international law restricting extrajudicial killings. In September 2011, the district court granted the government’s request to dismiss the case, accepting the CIA’s argument that it could not release any documents because even acknowledging the existence of the program would harm national security. The ACLU filed its appeal brief in the case exactly one year ago, and today the appeals court reversed the lower court’s ruling in a 3-0 vote.
“We hope that this ruling will encourage the Obama administration to fundamentally reconsider the secrecy surrounding the targeted killing program,” Jaffer said. “The program has already been responsible for the deaths of more than 4,000 people in an unknown number of countries. The public surely has a right to know who the government is killing, and why, and in which countries, and on whose orders. The Obama administration, which has repeatedly acknowledged the importance of government transparency, should give the public the information it needs in order to fully evaluate the wisdom and lawfulness of the government’s policies.”
You can read the unanimous 19-page decision here. The crux of the opinion: “It is implausible that the CIA does not possess a single document on the subject of drone strikes.”

Read More >>

More People Moving Into NYC Than Moving Out for the First Time in Over 60 Years

Mayor Bloomberg announced that more people are moving to New York City than are moving out for the first time since before 1950, according to the latest U.S. Census Bureau estimates released today. The estimates show New York City’s population has hit an all-time record high of 8,336,697. The city’s population increased by 161,564 since 2010 – about two percent in two years. This increase is among the largest two-year increases in recent decades.

The increase is fueled by a continuing increase in people moving to the city and a decline in the number of people leaving the city, as well as the continued growth in the surplus of births over deaths due to life expectancy in the city reaching new record highs. Each of the five boroughs registered gains in population. The largest percentage change occurred in Brooklyn, where the population grew by 2.4 percent or 60,900 people; followed by Manhattan (2.1 percent or 33,200 people); Queens (1.9 percent or 42,000 people); the Bronx (1.7 percent or 23,400 people); and Staten Island (0.4 percent or 2,000 people). New York City’s increase since April 2010 represented 84 percent of the total population increase in New York State, which slightly increased the city’s share of the state’s population, from 42.2 percent to 42.6 percent.

The city’s population has grown by more than 300,000 since Mayor Bloomberg took office. Earlier this week, the MTA announced that subway annual ridership for 2012 was 1.654 billion, the highest in 62 years. Average weekend ridership on the subway grew by three percent, matching the all-time historic high for weekend ridership set in 1946.

“For the first time since before 1950, more people are coming to New York City than leaving,” said Mayor Bloomberg. “We have many indicators of quality of life in the city – record low crime, record high tourism, record high life expectancy, record high graduation rates, record job growth and more – but there’s no better indication of the strength of our city than a record high population and a net population influx. People are voting with their feet.”



The all-time high population and net influx of residents for the first time in more than 60 years is one of a number of recent measures that show quality of life in New York City is better than ever:


Record Lows

Murders: 419 in 2012
Shootings: 1,353 in 2012
Incarceration rates: 474 inmates per 100,000 residents in New York City in 2011
Teen pregnancy: 72.6 pregnancies per 1,000 girls in 2010
Emergency response times: Six minutes and 30 seconds in 2012
Fire fatalities: 58 in 2012

Record Highs

Private-sector jobs:3.2 million
Life expectancy: Average of 80.9 years
Tourists: 52 million in 2012
High school graduation rate: 65 percent
Percentage of New Yorkers who live within a 10-minute walk of a park: 76 percent

The Census Bureau’s methodology for data gathered prior to 1950 does not allow for calculation of the influx of people to New York City. More information and analysis on the Census Estimates is available at www.nyc.gov.

Read More >>

Privacy backlash against CISPA cybersecurity bill gains traction


A petition to the White House asking the president to "stop" a controversial cybersecurity bill passes the 100,000 mark. The only problem: President Obama has already threatened to veto it.


House members during last year's floor debate on CISPA (clockwise from top left): Jared Polis, who warned it would "waive every single privacy law ever enacted"; Adam Schiff; Sheila Jackson Lee; Hank Johnson; Mike Rogers; Jan Schakowsky
(Credit: C-SPAN) 

It's not exactly a secret where President Obama stands on a controversial Republican-backed cybersecurity bill: he's already promised to veto it.

But a cadre of Internet activists opposed to the Cyber Intelligence Sharing and Protection Act nevertheless created a petition to the president asking him to "stop CISPA" -- and it has crossed the 100,000-signature threshold necessary to secure a response from the administration.

In reality, there's little Obama can do to stop CISPA that he hasn't already done. The administration offered a stark warning in last year's veto threat, which talked up a competing Democrat-backed bill and predicted CISPA "will undermine the public's trust in the government as well as in the Internet by undermining fundamental privacy, confidentiality, civil liberties, and consumer protections."
CISPA is controversial because it overrules all existing federal and state laws by saying "notwithstanding any other provision of law," companies may share information "with any other entity, including the federal government." It would not, however, require them to do so.

That language has alarmed dozens of advocacy groups, including the American Library Association, the ACLU, the Electronic Frontier Foundation, and Reporters Without Borders, which sent a letter (PDF) to Congress on Monday opposing CISPA. It says: "CISPA's information sharing regime allows the transfer of vast amounts of data, including sensitive information like Internet records or the content of e-mails, to any agency in the government."

If this sounds a bit familiar, it should. A similar coalition mounted an attempt to defeat CISPA last year. It failed: despite a presidential veto threat and criticism from Rep. Jared Polis (D-Colo.) and Ron Paul (R-Tex.), the House of Representatives approved the measure by a largely party line vote of 248 to 168. The bill did not, however, receive a vote in the Senate.

Undaunted, Rep. Mike Rogers, a Michigan Republican and influential chairman of the House Intelligence Committee, reintroduced CISPA (H.R. 624) last month along with Rep. Dutch Ruppersberger, a Maryland Democrat. It's supported by AT&T, the U.S. Chamber of Commerce, Verizon, Intel, IBM, Comcast, and industry trade associations, according to letters of support posted on the committee's Web site.

Rogers' statement (PDF) in defense of CISPA says his legislation is necessary to head off cyberattacks from China and other sources:
This important legislation enables cyberthreat sharing within the private sector and, on a purely voluntary basis, with the government, all while providing strong protections for privacy and civil liberties. Voluntary information sharing with the federal government helps improve the government's ability to protect against foreign cyberthreats and gives our intelligence agencies tips and leads to help them find advanced foreign cyberhackers overseas. This in turn allows the government to provide better cyberthreat intelligence back to the private sector to help it protect itself.
One reason CISPA would be useful for government agencies hoping to conduct additional surveillance is that, under existing federal law, any person or company who helps someone "intercept any wire, oral, or electronic communication" -- unless specifically authorized by law -- could face criminal charges. CISPA would overrule those privacy protections.
Technology trade associations, and a few tech companies, are backing CISPA not because they necessarily adore it, but because they view it as preferable to a Democrat-backed bill that's more regulatory.

But last year's Democratic bill, backed by then-Sen. Joseph Lieberman (I-Conn.), had privacy problems of its own. Civil liberties groups including the Electronic Frontier Foundation opposed Lieberman's bill, warning last year that it would have given "companies new rights to monitor our private communications and pass that data to the government."

After the Senate failed to approve either CISPA or Lieberman's bill, Obama responded last month by signing a cybersecurity executive order. It doesn't rewrite privacy laws, and instead expands "real time sharing of cyberthreat information" to companies that operate critical infrastructure, asks NIST to devise cybersecurity standards, and proposes a "review of existing cybersecurity regulation."

Read More >>

Internet Activist, a Creator of RSS, Is Dead at 26, Apparently a Suicide


Aaron Swartz, a wizardly programmer who as a teenager helped develop code that delivered ever-changing Web content to users and who later became a steadfast crusader to make that information freely available, was found dead on Friday in his New York apartment.

An uncle, Michael Wolf, said that Mr. Swartz, 26, had apparently hanged himself, and that a friend of Mr. Swartz’s had discovered the body. 

At 14, Mr. Swartz helped create RSS, the nearly ubiquitous tool that allows users to subscribe to online information. He later became an Internet folk hero, pushing to make many Web files free and open to the public. But in July 2011, he was indicted on federal charges of gaining illegal access to JSTOR, a subscription-only service for distributing scientific and literary journals, and downloading 4.8 million articles and documents, nearly the entire library. 

Charges in the case, including wire fraud and computer fraud, were pending at the time of Mr. Swartz’s death, carrying potential penalties of up to 35 years in prison and $1 million in fines.
“Aaron built surprising new things that changed the flow of information around the world,” said Susan Crawford, a professor at the Cardozo School of Law in New York who served in the Obama administration as a technology adviser. She called Mr. Swartz “a complicated prodigy” and said “graybeards approached him with awe.” 

Mr. Wolf said he would remember his nephew, who had written in the past about battling depression and suicidal thoughts, as a young man who “looked at the world, and had a certain logic in his brain, and the world didn’t necessarily fit in with that logic, and that was sometimes difficult.”
The Tech, a newspaper of the Massachusetts Institute of Technology, reported Mr. Swartz’s death early Saturday. 

Mr. Swartz led an often itinerant life that included dropping out of Stanford, forming companies and organizations, and becoming a fellow at Harvard University’s Edmond J. Safra Center for Ethics.
He formed a company that merged with Reddit, the popular news and information site. He also co-founded Demand Progress, a group that promotes online campaigns on social justice issues — including a successful effort, with other groups, to oppose a Hollywood-backed Internet piracy bill. 

But he also found trouble when he took part in efforts to release information to the public that he felt should be freely available. In 2008, he took on PACER, or Public Access to Court Electronic Records, the repository for federal judicial documents. 

The database charges 10 cents a page for documents; activists like Carl Malamud, the founder of public.resource.org, have long argued that such documents should be free because they are produced at public expense. Joining Mr. Malamud’s efforts to make the documents public by posting legally obtained files to the Internet for free access, Mr. Swartz wrote an elegant little program to download 20 million pages of documents from free library accounts, or roughly 20 percent of the enormous database. 

The government shut down the free library program, and Mr. Malamud feared that legal trouble might follow even though he felt they had violated no laws. As he recalled in a newspaper account, “I immediately saw the potential for overreaction by the courts.” He recalled telling Mr. Swartz: “You need to talk to a lawyer. I need to talk to a lawyer.” 

Mr. Swartz recalled in a 2009 interview, “I had this vision of the feds crashing down the door, taking everything away.” He said he locked the deadbolt on his door, lay down on the bed for a while and then called his mother. 

The federal government investigated but did not prosecute.In 2011, however, Mr. Swartz went beyond that, according to a federal indictment. In an effort to provide free public access to JSTOR, he broke into computer networks at M.I.T. by means that included gaining entry to a utility closet on campus and leaving a laptop that signed into the university network under a false account, federal officials said. 

Mr. Swartz turned over his hard drives with 4.8 million documents, and JSTOR declined to pursue the case. But Carmen M. Ortiz, a United States attorney, pressed on, saying that “stealing is stealing, whether you use a computer command or a crowbar, and whether you take documents, data or dollars.” 

Founded in 1995, JSTOR, or Journal Storage, is nonprofit, but institutions can pay tens of thousands of dollars for a subscription that bundles scholarly publications online. JSTOR says it needs the money to collect and to distribute the material and, in some cases, subsidize institutions that cannot afford it. On Wednesday, JSTOR announced that it would open its archives for 1,200 journals to free reading by the public on a limited basis. 

Mr. Malamud said that while he did not approve of Mr. Swartz’s actions at M.I.T., “access to knowledge and access to justice have become all about access to money, and Aaron tried to change that. That should never have been considered a criminal activity.” 

Mr. Swartz did not talk much about his impending trial, Quinn Norton, a close friend, said on Saturday, but when he did, it was clear that “it pushed him to exhaustion. It pushed him beyond.”
Recent years had been hard for Mr. Swartz, Ms. Norton said, and she characterized him “in turns tough and delicate.” He had “struggled with chronic, painful illness as well as depression,” she said, without specifying the illness, but he was still hopeful “at least about the world.” 

Cory Doctorow, a science fiction author and online activist, posted a tribute to Mr. Swartz on BoingBoing.net, a blog he co-edits. In an e-mail, he called Mr. Swartz “uncompromising, principled, smart, flawed, loving, caring, and brilliant.” 

“The world was a better place with him in it,” he said. Mr. Swartz, he noted, had a habit of turning on those closest to him: “Aaron held the world, his friends, and his mentors to an impossibly high standard — the same standard he set for himself.” Mr. Doctorow added, however, “It’s a testament to his friendship that no one ever seemed to hold it against him (except, maybe, himself).” 

In a talk in 2007, Mr. Swartz described having had suicidal thoughts during a low period in his career. He also wrote about his struggle with depression, distinguishing it from sadness. 

“Go outside and get some fresh air or cuddle with a loved one and you don’t feel any better, only more upset at being unable to feel the joy that everyone else seems to feel. Everything gets colored by the sadness.”
When the condition gets worse, he wrote, “you feel as if streaks of pain are running through your head, you thrash your body, you search for some escape but find none. And this is one of the more moderate forms.”

Ravi Somaiya contributed reporting.

This article has been revised to reflect the following correction:
Correction: January 12, 2013

An earlier version of this article incorrectly identified the police who arrested Mr. Swartz, and when they did so. The police were from Cambridge, Mass., not the Massachusetts Institute of Technology campus force, and the arrest occurred two years before Mr. Swartz’s suicide, but not two years to the day.Read More >>

U.S.A.: Sorry, We’re Not Signing the ITU Treaty


The United States laid down the law on December 13, 2012: No dice, ITU.

An official statement by Terry Kramer sealed the deal, and the U.S. ambassador had this to say to those in attendance at the World Conference on International Telecommunications: “It is with a heavy heart and a sense of missed opportunities that the U.S. must communicate that it is not able to sign the agreement in the current form.”

The proposed ITU treaty revisions included many deeply troubling limitations to the Internet. If passed, the self-contained global network we know and love would become, essentially, answerable to the United Nations.

Hence, this is a big deal for the world. The U.S. and its allies drew a line in the sand, and this bold move has brought the entire summit to a screeching halt. For those who need a little refresher course, let’s look at what exactly the ITU is, who’s fighting back, and what all this means for the future of the Web.

The ITU Conference: What’s Going On

The International Telecommunication Union (ITU) is one part of the United Nations. Its just wrapped up a meeting hosted in Dubai, and almost 2,000 delegates from all over the globe were in attendance. The core goal of the meeting was to revise the International Telecommunication Regulations (ITRs). This treaty has been around since the 1980s, and according to a May 2012 Vanity Fair article, “The sprawling document, which governs telephone, television, and radio networks, may be extended to cover the Internet, raising questions about who should control it, and how.”

That grim forecast played out just as predicted in Dubai. A few countries offered up proposals that would allow the UN sweeping new power to regulate the Internet. However, the United States and its allies fiercely opposed such a plan. In fact, U.S. Ambassador Terry Kramer has been speaking out publicly against the inclusion of an Internet provision in the treaty even before the conference began.
According to Kramer in a recent briefing, “[The] U.S. cannot sign revised telecommunications regulations in their current form.” He went onto note, “[The] ITR should be a high-level document, and the scope of treaty does not extend to the Internet.” [Source: u-s-announces-will-not-sign-itu-treaty-period-7000008769/">ZDNet.com]

Kramer also pointed out, the “world community is at a crossroads of its collective view of the Internet. … [The] US will continue to uphold and advance the multi-stakeholder model of Internet governance. … The Internet has given the world unimaginable economic and social benefits during these past 24 years – all without UN regulation.”
The U.S. and its allies essentially have taken the stance that the private sector and the government-free Internet at large have a say in this matter as well, and it’s not the UN’s place to dabble with the architecture of the Web.

The Future of the Free and Open Internet

Governments were not the only ones opposing the proposed ITU treaty revisions. Internet companies went to bat to fight the proposal as well, and Google was of course the most vocal (and influential) of the bunch.
Anyone remember Google’s very public protest against the SOPA/ PIPA bills earlier this year? The search giant is the ultimate champion of a free and open Internet. Yes, Google’s motives may stem from self-interest (and money), but it is nevertheless impressive to see a private company fight so adamantly for freedom. G even set up a special page on its own domain to inform the public about the dangers of the proposed revisions to the existing treaty:

Image 1:

Image 2:



Google’s rallying cry was perhaps an influential factor in the decision of the US and its allies to oppose the signing. According to Google, the proposed changes to the ITU treaty had the potential to increase censorship and threaten innovation as we know it on the Web. In fact, some of the suggested proposals would have even permitted oppressive governments to censor legitimate speech or, even worse, allow them to cut off Internet access entirely.

Google pointed out that other proposals involved requiring services like YouTube, Facebook, and Skype to pay brand new “tolls” simply to reach people across national borders.
The worst part about all of this was the secrecy with which the talks took place. The treaty and proposals were all kept very hush-hush, and we the people did not get a vote. Luckily, the U.S. and its allies stepped up and did the right thing. For now, the free and open Internet is safe. For now.

This doesn’t mean we’re out of the woods yet – expect plenty more wars like this one to play out more frequently as the years wear on. It’s up to the citizens of the world to make their voices heard to protect this beautiful virtual society of ours, the one we’ve all worked so hard to build together.
Read More >>

Iran Stages Cyber Warfare Drill Alongside Hormuz Naval Exercise



Iranian forces have conducted a cyber-warfare drill for the first time as their naval forces conducts major exercises in the Strait of Hormuz, testing a brand new air defense missile system.

The Iranian navy has staged a cyber-attack against the computer network of its defene forces in order to simulate a hack or a virus infiltration of a foreign aggressor, the English language Iran Daily reported, quoting Rear Admiral Amir Rastegari.

The Rear Admiral continued that the fake cyber-attack was successfully blocked by Iranian forces.

Tehran has developed military and civil cyber units in the past few years to counter cyber-attacks on its nuclear sites, oil and industrial facilities, its communications network and banking systems.

Tehran has allegedly been attacked by the Fame, Stuxnet and Gauss viruses, which managed to gather sensitive information about Iranian equipment and have hampered the work of its nuclear centrifuges. The US and Israel have been tacitly implicated in the virus attacks.


Naval exercises are also taking place in the Strait of Hormuz and the Gulf of Oman, which Iranian military officials have stressed are for showing off the country’s “defensive naval capabilities and sending a message of peace and friendship to regional countries.”

Several submarine based missiles were tested during the attack, according to Iranian media sources. These included an Iranian made air defence system called Raad, or Thunder and domestically produced hovercraft.

Iran says the Raad system is more advanced than the Russian one it replaced and can knock out fighter jets, cruise missiles and drones at a height of up to 23 km.


Tehran has been trying to build up a self-sufficient military in particular its navy since 1992,as Iran believes any future conflict will be fought on the sea and in the air.

The drills come at the same time as the West is increasing pressure on Iran over its nuclear program which it suspects is aimed at producing a bomb. Iran insists it is purely for the peaceful production of electricity.

The west has slapped sanctions on Iran for its nuclear program which they maintain is for the production of nuclear weapons. The west argues that imposing sanctions will make it harder for Iran to acquire the money and materials to develop a bomb. Iran has threatened to retaliate by closing the Strait of Hormuz.

December 31, 2012

Read More >>

Revealed: The Internet’s Biggest Security Hole


Two security researchers have demonstrated a new technique to stealthily intercept internet traffic on a scale previously presumed to be unavailable to anyone outside of intelligence agencies like the National Security Agency.

The tactic exploits the internet routing protocol BGP (Border Gateway Protocol) to let an attacker surreptitiously monitor unencrypted internet traffic anywhere in the world, and even modify it before it reaches its destination.

The demonstration is only the latest attack to highlight fundamental security weaknesses in some of the internet’s core protocols. Those protocols were largely developed in the 1970s with the assumption that every node on the then-nascent network would be trustworthy.  The world was reminded of the quaintness of that assumption in July, when researcher Dan Kaminsky disclosed a serious vulnerability in the DNS system. Experts say the new demonstration targets a potentially larger weakness.

"It’s a huge issue. It’s at least as big an issue as the DNS issue, if not bigger," said Peiter "Mudge" Zatko, noted computer security expert and former member of the L0pht hacking group, who testified to Congress in 1998 that he could bring down the internet in 30 minutes using a similar BGP attack, and disclosed privately to government agents how BGP could also be exploited to eavesdrop. "I went around screaming my head about this about ten or twelve years ago…. We described this to intelligence agencies and to the National Security Council, in detail."

The man-in-the-middle attack exploits BGP to fool routers into re-directing data to an eavesdropper’s network.

Anyone with a BGP router (ISPs, large corporations or anyone with space at a carrier hotel) could intercept data headed to a target IP address or group of addresses. The attack intercepts only traffic headed to target addresses, not from them, and it can’t always vacuum in traffic within a network — say, from one AT&T customer to another.

The method conceivably could be used for corporate espionage, nation-state spying or even by intelligence agencies looking to mine internet data without needing the cooperation of ISPs.
BGP eavesdropping has long been a theoretical weakness, but no one is known to have publicly demonstrated it until Anton "Tony" Kapela, data center and network director at 5Nines Data, and Alex Pilosov, CEO of Pilosoft, showed their technique at the recent DefCon hacker conference. The pair successfully intercepted traffic bound for the conference network and redirected it to a system they controlled in New York before routing it back to DefCon in Las Vegas.

The technique, devised by Pilosov, doesn’t exploit a bug or flaw in BGP. It simply exploits the natural way BGP works.

"We’re not doing anything out of the ordinary," Kapela told Wired.com. "There’s no vulnerabilities, no protocol errors, there are no software problems. The problem arises (from) the level of interconnectivity that’s needed to maintain this mess, to keep it all working."

The issue exists because BGP’s architecture is based on trust. To make it easy, say, for e-mail from Sprint customers in California to reach Telefonica customers in Spain, networks for these companies and others communicate through BGP routers to indicate when they’re the quickest, most efficient route for the data to reach its destination. But BGP assumes that when a router says it’s the best path, it’s telling the truth. That gullibility makes it easy for eavesdroppers to fool routers into sending them traffic.

Here’s how it works. When a user types a website name into his browser or clicks "send" to launch an e-mail, a Domain Name System server produces an IP address for the destination. A router belonging to the user’s ISP then consults a BGP table for the best route. That table is built from announcements, or "advertisements," issued by ISPs and other networks — also known as Autonomous Systems, or ASes — declaring the range of IP addresses, or IP prefixes, to which they’ll deliver traffic.

The routing table searches for the destination IP address among those prefixes. If two ASes deliver to the address, the one with the more specific prefix "wins" the traffic. For example, one AS may advertise that it delivers to a group of 90,000 IP addresses, while another delivers to a subset of 24,000 of those addresses. If the destination IP address falls within both announcements, BGP will send data to the narrower, more specific one.

To intercept data, an eavesdropper would advertise a range of IP addresses he wished to target that was narrower than the chunk advertised by other networks. The advertisement would take just minutes to propagate worldwide, before data headed to those addresses would begin arriving to his network.
The attack is called an IP hijack and, on its face, isn’t new.

But in the past, known IP hijacks have created outages, which, because they were so obvious, were quickly noticed and fixed. That’s what occurred earlier this year when Pakistan Telecom inadvertently hijacked YouTube traffic from around the world. The traffic hit a dead-end in Pakistan, so it was apparent to everyone trying to visit YouTube that something was amiss.

Pilosov’s innovation is to forward the intercepted data silently to the actual destination, so that no outage occurs.

Ordinarily, this shouldn’t work — the data would boomerang back to the eavesdropper. But Pilosov and Kapela use a method called AS path prepending that causes a select number of BGP routers to reject their deceptive advertisement. They then use these ASes to forward the stolen data to its rightful recipients.
"Everyone … has assumed until now that you have to break something for a hijack to be useful," Kapela said. "But what we showed here is that you don’t have to break anything. And if nothing breaks, who notices?"

Stephen Kent, chief scientist for information security at BBN Technologies, who has been working on solutions to fix the issue, said he demonstrated a similar BGP interception privately for the Departments of Defense and Homeland Security a few years ago.

Kapela said network engineers might notice an interception if they knew how to read BGP routing tables, but it would take expertise to interpret the data.

A handful of academic groups collect BGP routing information from cooperating ASes to monitor BGP updates that change traffic’s path. But without context, it can be difficult to distinguish a legitimate change from a malicious hijacking. There are reasons traffic that ordinarily travels one path could suddenly switch to another — say, if companies with separate ASes merged, or if a natural disaster put one network out of commission and another AS adopted its traffic. On good days, routing paths can remain fairly static. But "when the internet has a bad hair day," Kent said, "the rate of (BGP path) updates goes up by a factor of 200 to 400."

Kapela said eavesdropping could be thwarted if ISPs aggressively filtered to allow only authorized peers to draw traffic from their routers, and only for specific IP prefixes. But filtering is labor intensive, and if just one ISP declines to participate, it "breaks it for the rest of us," he said.

"Providers can prevent our attack absolutely 100 percent," Kapela said. "They simply don’t because it takes work, and to do sufficient filtering to prevent these kinds of attacks on a global scale is cost prohibitive."
Filtering also requires ISPs to disclose the address space for all their customers, which is not information they want to hand competitors.

Filtering isn’t the only solution, though. Kent and others are devising processes to authenticate ownership of IP blocks, and validate the advertisements that ASes send to routers so they don’t just send traffic to whoever requests it.

Under the scheme, the five regional internet address registries would issue signed certificates to ISPs attesting to their address space and AS numbers. The ASes would then sign an authorization to initiate routes for their address space, which would be stored with the certificates in a repository accessible to all ISPs. If an AS advertised a new route for an IP prefix, it would be easy to verify if it had the right to do so.
The solution would authenticate only the first hop in a route to prevent unintentional hijacks, like Pakistan Telecom’s, but wouldn’t stop an eavesdropper from hijacking the second or third hop.

For this, Kent and BBN colleagues developed Secure BGP (SBGP), which would require BGP routers to digitally sign with a private key any prefix advertisement they propagated. An ISP would give peer routers certificates authorizing them to route its traffic; each peer on a route would sign a route advertisement and forward it to the next authorized hop.

"That means that nobody could put themselves into the chain, into the path, unless they had been authorized to do so by the preceding AS router in the path," Kent said.
The drawback to this solution is that current routers lack the memory and processing power to generate and validate signatures. And router vendors have resisted upgrading them because their clients, ISPs, haven’t demanded it, due to the cost and man hours involved in swapping out routers.

Douglas Maughan, cybersecurity research program manager for the DHS’s Science and Technology Directorate, has helped fund research at BBN and elsewhere to resolve the BGP issue. But he’s had little luck convincing ISPs and router vendors to take steps to secure BGP.

"We haven’t seen the attacks, and so a lot of times people don’t start working on things and trying to fix them until they get attacked," Maughan said. "(But) the YouTube (case) is the perfect example of an attack where somebody could have done much worse than what they did."
ISPs, he said, have been holding their breath, "hoping that people don’t discover (this) and exploit it."
"The only thing that can force them (to fix BGP) is if their customers … start to demand security solutions," Maughan said.

(Image: Alex Pilosov (left) and Anton "Tony" Kapela demonstrate their technique for eavesdropping on internet traffic during the DefCon hacker conference in Las Vegas earlier this month.
(Wired.com/Dave Bullock)
Read More >>

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More