FBI

Latest

  • Webcam-spying school district settles out of court, FBI declines to press charges

    by 
    Joseph L. Flatley
    Joseph L. Flatley
    10.13.2010

    Looks like the Lower Merion School District will be paying off kids who got zinged by its laptop tracking program -- to the tune of some $610,000. As you might recall, there was quite a bit of hubbub earlier this year when students discovered that their school issued computers tended to activate their webcams and shoot the photos back to administrators. Apparently the FBI has decided not to bring any charges in the case after all, and the various families of the students settled with the school district out of court. And yes, the schools have discontinued the tracking program.

  • American student finds GPS tracker stuck to car, FBI shows up to reclaim its 'federal property'

    by 
    Tim Stevens
    Tim Stevens
    10.08.2010

    Mechanics spot strange things stuck under cars all the time, but when 20-year-old Yasir Afifi's ride was put up on lifts his shop found something that hadn't been kicked up from the road: a cylindrical tube connected to a device with an antenna. An extremely paranoid person would think they'd found a bomb, but the truth isn't much better. It was an FBI tracking device. Afifi posted pictures and his story on Reddit while a friend contemplated cunning things to do with it, sticking it to someone else's car or selling it on Craigslist. They didn't have long to ponder long before two "sneaky-looking" people were spotted outside his apartment. Afifi got in his car and drove off, only to be pulled over by FBI agents who demanded the device back, threatening "We're going to make this much more difficult for you if you don't cooperate." Now, we've already given our opinions on using GPS technology like this and, while it's unknown whether these agents had a warrant to place this device, the 9th US Court of Appeals recently made one unnecessary for this sort of thing. The ACLU is working with Afifi to fight that ruling, and for now we're hoping that he, who is an American with an Egyptian father, is currently able to hit the town without agents following his every move. However, at this point they may not need a tracker: one agent who retrieved the device took the time to list off his favorite restaurants and even congratulated him on his new job.

  • No criminal charges in Pennsylvania MacBook spying probe

    by 
    Mel Martin
    Mel Martin
    08.17.2010

    The Associated Press is reporting that a federal investigation into the possible misuse of webcams on Apple laptops did not find criminal intent. The investigation was at a suburban Philadelphia school district that used special software that wound up covertly snapping images of students who were at home with their school provided MacBooks. The FBI opened the investigation to see if there were violations of federal wiretap statutes or privacy invasions. The school has said the security software had been purchased to track laptops that had been reported stolen, but one student, Blake Robbins, claimed he had been photographed more than 400 times during a two week period on a laptop that had not been reported to be stolen. The dropping of the federal probe does not have any bearing on a civil lawsuit against the Lower Merion School District. Another student has also joined that legal action. The school district issued 2,300 MacBook computers and installed software from LanRev to track stolen laptops. Parents and students were not notified the software was on the laptops. The civil suits allege that students' text messages were intercepted, and they were photographed while sleeping or only partially dressed. The school has since deactivated the anti-theft software.

  • Apple supply manager arrested for wire fraud, money laundering

    by 
    Sean Hollister
    Sean Hollister
    08.14.2010

    Ever wonder why -- after years of secrecy -- camera-ready iPod cases began rolling out? The answer could possibly be Apple supply manager Paul Shin Devine, who was just fingered by the FBI and IRS as a fraudulent, money laundering mole. Devine was arrested Friday for allegedly receiving kickbacks from six accessory suppliers in exchange for confidential information, which apparently gave them an edge in negotiating Apple contracts. "The alleged scheme used an elaborate chain of U.S. and foreign bank accounts and one front company to receive payments," reports the San Jose Mercury News, "and code words like 'sample' were used to refer to the payments so that Apple co-workers wouldn't become suspicious." Though we're not yet sure what specific confidential information might have been passed along and we doubt the indictment will say, a separate civil suit filed by Apple claims Devine accepted over $1 million in "payments, kickbacks and bribes" over the course of several years.

  • Alleged Russian spies used WiFi and pre-paid cellphones, got caught anyways

    by 
    Joseph L. Flatley
    Joseph L. Flatley
    07.05.2010

    Are the new crop of Russian spies nerds like us? We doubt it (we probably have more in common with Lil Wayne than a certain "Anna Chapman," if that is her real name). How do they do their dirty work, then? Apparently their kit is mostly off-the-shelf: including laptops and flash memory cards. According to the FBI, two of the recently accused perps would meet at a coffee shop in Manhattan every Wednesday, where one would sit inside, while they other passed by in a van. When in range, they would connect over WiFi and transfer encrypted communications over their network. (The FBI was able to sniff this out using commercial software. Had they used ultra-wideband radio, however, the investigator's task would probably have been all but impossible). It's also believed that the spies used pre-paid cellphones to communicate. One such unit, purchased by Chapman, had the following listed for her address: 99 Fake Street. It just goes to show you that all the gadgetry in the world will not protect you from your lack of common sense.

  • The Virtual Whirl: A brief history of Second Life, the middle years

    by 
    Tateru Nino
    Tateru Nino
    07.03.2010

    This week, we cover the second installment of our summarized history of Second Life and Linden Lab (or check out part one, if you missed it). From 2005, there's an impossible amount of material to cover, but there are some interesting stories lurking among it all. Join us as we work our way through some of the interesting highlights from 2005, 2006 and 2007.

  • New White House plan increases FBI anti-piracy force

    by 
    JC Fletcher
    JC Fletcher
    06.23.2010

    Yesterday, the White House announced its new Joint Strategic Plan on Intellectual Property Enforcement. In the plan, Intellectual Property Enforcement Coordinator Victoria Espinel describes an initiative to increase FBI resources devoted to investigating and curbing piracy of films, games, and other materials. In addition to the five agents doing full-time IP work at the FBI's Intellectual Property Rights Unit, "by the end of FY 2010, the FBI intends to employ over 50 Special Agents exclusively devoted to pursuing intellectual property investigations operating in field offices throughout the country and four enhanced intellectual property squads." ESA president Michael Gallagher spoke in support of the plan in a statement released yesterday. "We deeply appreciate the efforts of Vice President Biden and Intellectual Property Enforcement Coordinator Espinel and their leadership and vision in this critical area," Gallagher said. "We also applaud the numerous federal departments and agencies that are committed to protecting intellectual property rights, here and in foreign markets - both of which are critical to our industry's continuing growth and ability to deliver innovative entertainment experiences."

  • AT&T hacker's home raided, drugs found, dude detained (update)

    by 
    Vlad Savov
    Vlad Savov
    06.16.2010

    Man, one day you have the whole world's ear to talk about slack network security, and the next you're in the joint. Andrew Auernheimer, Goatse Security's hacker-in-chief and a key player in the unearthing of a major security flaw exposing iPads surfing AT&T's airwaves, is today facing felony charges for possession of a variety of potent drugs. That wouldn't be such intriguing news by itself, but the discovery was made by local law enforcers who were in the process of executing an FBI search warrant. Hey, wasn't the FBI going to look into this security breach? Yes indeedy. While nobody is yet willing to identify the reasons behind this warrant, it's not illogical to surmise that Andrew's crew and their online exploits were the cause for the raid. So there you have it folks, it's the first bit of advice any publicist will give you: if you're gonna step out into the glaring light of public life, you'd better clean out your closet first. Update: Before y'all get in an uproar about "white hacker this" and "Police State that," let's keep in mind that this Andrew Auernheimer character (a.k.a. "Weev") is one unsavory dude (not to mention a raving anti-Semite): check out this New York Times piece on Internet Trolls if you don't believe us. After all, it's not really a stretch that law enforcement might be after someone who's in possession of ecstasy, cocaine, LSD, and various other pharmaceuticals.

  • AT&T sends apology email to customers affected by iPad 3G security breach

    by 
    Nilay Patel
    Nilay Patel
    06.13.2010

    Good news if you're one of the 114,000 iPad 3G owners whose email address was uncovered by hackers spoofing the AT&T ICC database the other day -- AT&T is very, very sorry, and it's written you a nice email to make it all better. Ma Bell says the "hackers deliberately went to great efforts with a random program," which is pretty funny -- we can only imagine the damage insincere hackers making a half-hearted effort with a non-random program could have done. In any event, AT&T says the hole's been patched, that it's working with law enforcement to figure out who's liable, and promises that it takes your privacy seriously. Yes, it's all very nice -- although we're sure affected customers would much rather hear that they're being comped a free month of service. Full email after the break. [Thanks, Brad]

  • FBI steps in to investigate iPad security breach

    by 
    Ross Miller
    Ross Miller
    06.10.2010

    You might recall yesterday's news that a little trickery into AT&T's systems brought about the breach of 114,000 Apple iPad-owning email addresses. Now it seems the FBI has taken an interest in the case and has launched an investigation into the "potential cyber threat" of the snafu. As far as we know and have seen, the hackers were able to obtain just email addresses, although with that comes the knowledge that the victims in question own iPad 3Gs and don't mind AT&T's service -- don't click on any odd billing statements if you were affected. As stated previously, the carrier has subsequently apologized and proverbially "plugged the hole" from which the info was obtained. Not sure anything will come of this inquiry, but we'll let you know what we hear.

  • Did a Pennsylvania school district use iSight to iSpy?

    by 
    Mel Martin
    Mel Martin
    02.22.2010

    The FBI and lots of parents want to know if school-issued MacBooks were used to spy on students at a suburban Philadelphia school. Earlier today, a federal judge was asked to stop the school from destroying any records or logs from the 2,300 laptops that were used by high school students that attended Harriton High School in the Lower Merion School District. The district admitted that it activated the iSight cameras to find more than 40 missing student computers. Officials claim that the district is no longer turning the cameras on remotely. Meanwhile, other lawyers are pursuing a potential class-action lawsuit against the district. The FBI is investigating if the school district broke any federal wiretapping or computer intrusion laws. The district noted that students must sign a release when they get the laptops, but the release does not state that the iSight cameras might be activated without the permission or knowledge of the students or their families. The parties met in court today as a judge ruled on the preserving of evidence. Some students say they are now putting tape over the camera and microphone on the laptops to keep school employees from seeing or hearing anything. According to one student involved in the legal action, the controversy began when an Assistant Principal at the school said the student was acting inappropriately at home. The student wondered how the Assistant Principal would know, and that started the investigation. The school district has said that it has not spied on students, but activated the cameras on computers it said were lost or stolen. Creepy.

  • Spying school district update: turned on webcams 42 times, FBI isn't sure that's legal

    by 
    Tim Stevens
    Tim Stevens
    02.20.2010

    Remember the Pennsylvania school district that was accused of remotely flipping on the webcams of students' laptops? As if the civil suit filed on behalf of those students wasn't going to be enough trouble for the Lower Merion representatives, now it seems the FBI wants to know just what's going on, launching an investigation into the practice. For its part the district said that it remotely activated the cams 42 times, and that it only did so with the bestest of intentions: when trying to locate a missing laptop. It would also like to point out that only two employees had the power to flip the switch, and that they only captured images -- never sound. Because, you know, surreptitiously watching your kids is so much less menacing when there's no audio involved.

  • FBI crime study finds video game system theft on the rise

    by 
    Griffin McElroy
    Griffin McElroy
    12.17.2009

    The common criminal is getting smarter, folks. If the results of a recent FBI study on property crimes (published by USA Today) are any indication, professional thieves have learned that yoinking video game consoles is a much more lucrative venture than stealing ceramic tchotchkes from grandma's mantle. According to the report, gaming console theft has increased 285 percent over three years, from 11,074 cases in 2007 to 42,615 cases in 2009. Sure, this increase could also be attributed to the larger install bases of these consoles, but given our paranoid nature, we're more inclined to believe that criminals are just getting better at their jobs. Of course, there's a simple way to counteract this rise in theft: Just live in a state of constant, apprehensive fear. We don't think it's too -- did you just hear something?

  • Jagex gets RuneScape fraudster arrested in the UK

    by 
    Krystalle Voecks
    Krystalle Voecks
    11.29.2009

    For quite some time now cheating in an MMO generally only carried with it the repercussion of a virtual slap on the hand. Fake someone out of an item or two, and a GM might intervene, take the stuff and suspend your account. Do something against the terms of service and generally speaking, one might get an account ban. For many farmers and internet fraudsters, this really didn't seem to be much of a deterrent. Just start up a new account and off you go again, taking virtual items, breaking TOS/EULAs, or bilking people for money. Well, that is until now. According to CasualGaming.biz Jagex Games Studio, not content to simply run the cheaters out of RuneScape, actually managed to successfully work with the Police Central e-Crime Unit in the UK to run down an online thief in the real world. The 23-year-old man was reportedly tied to a recent rash of account phishing scams according to an investigation, for which he was arrested. Furthermore, Jagex says that not only are they working with the PCeU overseas, but also with the FBI in the United States. Whether or not other MMO companies will follow this lead and start to chase down the Internet fraudsters plaguing their games for prosecution remains to be seen, but it's definitely worth reading the entire story for Jagex's side of things. [Via PlayNoEvil]

  • Khalid Shaikh, prolific app creator and former YouSendIt CEO, busted by FBI

    by 
    Mel Martin
    Mel Martin
    11.01.2009

    Khalid Shaikh has been indicted by a grand jury for four counts of mail fraud. The FBI says Shaikh was involved in 4 denial of service attacks against the the firm he founded, YouSendIt, which crippled the content delivery company's servers. According to the FBI, Shaikh was one of YouSendIt's founders when the company was established in 2004. He served as the company's chief executive officer until August 2005. He then served as the company's chief technology officer until he left the company in November 2006. In August, Mobile Crunch reported that Shaikh had been banned from the iPhone app store after creating more than 900 useless apps that were mostly links to websites. How they got through the app approval process is another story. For his part, Shaikh claims he is innocent. The maximum penalty for each count of mail fraud is five years imprisonment, three years of supervised release and a fine of $250,000, plus restitution if appropriate. [Via The Alarm Clock]

  • Fox Mulder gets all up in your Second Life

    by 
    Brooke Pilley
    Brooke Pilley
    05.18.2009

    Realizing the vast amounts of time honest to goodness citizens spend on social media sites and in virtual worlds, the FBI has decided to jump aboard the Web 2.0 train to aid in their never-ending search for terrorists, fugitives, missing children, and new potential recruits.The Federal Bureau of Investigation now has a presence on Facebook, YouTube, Twitter, iPhone, and Second Life. They even have widgets you can embed almost anywhere to show your support. If staring at billboards plastered with America's most wanted and assorted recruitment ads is your idea of fun, you might check them out. This isn't just a lame PR attempt, though it may seem that way at first glance. The FBI is truly interested in reaching out to individuals who may be able to help them with their mission, "To protect and defend the United States against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the United States, and to provide leadership and criminal justice services to federal, state, municipal, and international agencies and partners."

  • Pentagon presents hypothetical terrorist plot in WoW

    by 
    Alex Ziebart
    Alex Ziebart
    09.16.2008

    A number of readers wrote in to tell us about a 'hypothetical WoW-hatched terror plot' from the Pentagon, which Wired posted just last night. The scenario detailed in the presentation given by Dr. Dwight V. Toavs is meant to display how terrorists could potentially use the pseudonymity of an MMO combined with the obscure gamer lingo to hide a terrorist plot within the massive, mostly unmonitored (by them) playerbase. This isn't the first time we've heard about the government looking to virtual worlds for potential terrorist hideouts, but it's the most ridiculous.The presented scenario is as follows (summarized; full version at Wired): Two WoW players, WAR_MONGER and TALON238 meet up to plot. WAR_MONGER lays out the plan: They will approach via the South East of the Zoram Strand, and assault the 'White Keep' using a 'Dragon Fire' spell in their inventory. They will kill all of the 'castle guards' and when they've entered the keep, they will acquire their treasure of 110 gold, 234 silver.Translation: These two terrorists will meet South East of the White House (the White Keep) and take out all of the security before sneaking a weapon of some sort through. The 'treasure' is the coordinates for their attack.

  • District attorney on trial for building monster gaming rig with state money

    by 
    Joshua Topolsky
    Joshua Topolsky
    03.13.2008

    A district attorney in Rockwall County, Dallas, is under scrutiny from the FBI due to a PC he built as a backup server -- using office money. Ray Sumrow claims he was using the system for business, but the "server" actually seems to be a tricked out gaming rig, featuring two hard drives, seven fans, high end graphics and sound cards, WiFi, and cables which "glow under ultraviolet light." Rod Gregg, the FBI examiner on the case says, "I would not configure a backup computer in that way," and added, "When I saw that, I did not think of anything related to a government agency." Charges of forgery, theft, and records tampering have been made against Mr. Sumrow due to his use of the district attorney's "fee fund," which is meant to be used for office supplies or employee salaries. Testimony will take place through the week, and prosecutors expect to hear how it was imperative to Mr. Sumrow's legal work that he, "Frag the crap out of dudes."[Via Penny Arcade]

  • FBI pays visit to nuclear reactor-building gamer

    by 
    Justin McElroy
    Justin McElroy
    01.10.2008

    Though a few of our commenters have challenged it over the years, we still hold the belief that gamers are some of the most clever, creative and downright brilliant people around. In fact, it's probably a good thing they have video games to keep them busy, or else they might do something like build a nuclear reactor in their basement. That's exactly what one Texas gamer and modder did and managed to get the FBI on his case in the process. We blame the post-holiday game drought.No charges were filed though the FBI did take his project away, at the behest of his parents. While that may seem a little harsh, his mom's feelings were probably still a little hurt over the whole chocolate milk incident. ... No, you're right. It's probably not the same guy. But we can dream.[Via GamePolitics]

  • FBI rolling out digital billboards in 20 cities

    by 
    Evan Blass
    Evan Blass
    12.27.2007

    Employing public signage in the pursuit of suspects is probably about as old as criminology itself, so it's no surprise to see the FBI leveraging the latest technology to erect some of the largest, most versatile wanted posters in history. Thanks to a partnership with advertising giant Clear Channel Outdoor, the G-men will deploy some 150 digital billboards -- capable of displaying fugitives, missing children, or public safety info in real-time -- to 20 major cities around the country, following a successful trial launched in Philadelphia in September. So if you're planning on committing a felony in Des Moines, Iowa or Akron, Ohio soon, better get it done quick, lest your ugly mug become the talk of the car pool during your morning commute. List of all the lucky cities after the break.[Via Slashdot]