Posts with «society & culture» label

Air National Guardsman accused of leaking classified documents has been indicted

Jack Texeira, the Air National Guard member who was arrested in April for sharing documents containing US intelligence matters, has been indicted on six counts of willful retention and transmission of classified national defense information. According to The New York Times, Texeira was indicted by a federal grand jury and now faces up to 60 years in prison. His 10-page indictment reportedly contained a distilled version of the national secrets Texeira allegedly took from the Cape Cod air base and shared with people on Discord. 

The Justice Department arrested Texeira in April in connection with its investigation on the "alleged unauthorized removal, retention, and transmission of classified national defense information." While previous reports said he shared national secrets using a pseudonym on Discord, he was identified through the Instagram account he linked to his Steam profile. The photos on that account showed the same granite kitchen countertop and floor tiles that were also visible in the leaks. 

According to the 10-page indictment documents, Texeira mishandled classified information that included details on the delivery of military equipment to Ukraine, as well as details on Russian and Ukrainian troop movements. He also reportedly leaked documents showing how the US spies on its foreign allies. Some of the documents he shared with the public had markings to show that they had the most highly restricted classification and could only be viewed inside a protected facility. 

Previous reports said Texeira didn't intend to become a whistleblower and only started sharing documents to impress his gaming friends. He started by copying sensitive information by hand, since he worked at a facility that prohibited cameras and phones, but was eventually able to post photos of original documents. Since he was arrested, prosecutors presented his history of making violent and racist threats to court. The Justice Department's national security division also argued for his indefinite detention, because he could still be in possession of information that would be "tremendous value to hostile nation-states." In addition, the Justice Department has revealed that Air Force officials failed to remove Texeira from his job and to take appropriate action after catching him copying sensitive details and actively looking for classified information months before he was arrested. 

This article originally appeared on Engadget at https://www.engadget.com/air-national-guardsman-accused-of-leaking-classified-documents-has-been-indicted-063800341.html?src=rss

Former Samsung executive accused of trying to copy an entire chip plant in China

South Korean President Yoon Suk Yeol recently declared the chip manufacturing industry to be in an "all-out war," and the latest developments certainly support that statement. Prosecutors in the Suwon District have indicted a former Samsung executive for allegedly stealing semiconductor plant blueprints and technology from the leading chipmaker, BusinessKorea reports. They didn't name the 65-year-old defendant, who also previously served as vice president of another Korean chipmaker SK Hynix, but claimed he stole the information between 2018 and 2019. The leak reportedly cost Samsung about $230 million.

The defendant allegedly planned to build a semiconductor in Xi'an, China, less than a mile from an existing Samsung plant. He hired 200 employees from SK Hynix and Samsung to obtain their trade secrets while also teaming up with an unnamed Taiwanese electronics manufacturing company that pledged $6.2 billion to build the new semiconductor plant — the partnership fell through. However, the defendant was able to secure about $358 million from Chinese investors, which he used to create prototypes in a Chengdu, China-based plant. The plant was reportedly also built using stolen Samsung information, according to prosecutors. 

"It's so serious that it's difficult to compare it in terms of the scale of the crime and the degree of damage with previous individual semiconductor technology leakage cases," the prosecutor's office said in a statement. "It's a grave crime that could deal a heavy blow to our economic security by shaking the foundation of the domestic chip industry at a time of intensifying competition in chip manufacturing." Six co-conspirators, including one Samsung sub-contractor, were indicted alongside the lead defendant. These charges follow continued efforts from China to acquire South Korea's technologies across a range of industries and Korea creating stricter punishments for related offenses.

This article originally appeared on Engadget at https://www.engadget.com/former-samsung-executive-accused-of-trying-to-copy-an-entire-chip-plant-in-china-121008690.html?src=rss

DOJ charges Russian nationals with laundering bitcoin in 2011 Mt. Gox hack

The US Department of Justice announced today that it charged two Russian nationals for crimes related to the 2011 hacking of Mt. Gox, the now-defunct crypto exchange that was one of the world’s largest at the time. Alexey Bilyuchenko and Aleksandr Verner are accused in the Southern District of New York (SDNY) of laundering about 647,000 bitcoins connected to the heist. In addition, Bilyuchenko faces separate charges in the Northern District of California (NDCA) related to running the infamous Russian crypto exchange BTC-e.

The pair are being charged in SDNY for conspiracy to commit money laundering. Meanwhile, the NDCA charges are for conspiracy to commit money laundering and operating an unlicensed money services business. The SDNY charges carry a maximum sentencing of 20 years for each defendant, while Bilyuchenko faces a maximum of 25 years in prison in the NDCA indictment.

The DOJ says Bilyuchenko, Verner and co-conspirators gained access to the server storing Mt. Gox’s crypto wallets in or about September 2011. Once they infiltrated the servers, the pair and their partners allegedly initiated the transfer of customers’ bitcoins to accounts they controlled. In addition, they’re accused of laundering the stolen bitcoins to accounts on other crypto exchanges also controlled by the group.

The conspirators allegedly negotiated and entered into a fraudulent “advertising contract” with a New York bitcoin brokerage service, a relationship they used to request regular transfers to “various offshore bank accounts, including in the names of shell corporations, controlled by Bilyuchenko, Verner, and their co-conspirators.” The DOJ says the group transferred over $6.6 million from March 2012 to April 2013.

“This announcement marks an important milestone in two major cryptocurrency investigations,” said US Assistant Attorney General Kenneth A. Polite, Jr. “As alleged in the indictments, starting in 2011, Bilyuchenko and Verner stole a massive amount of cryptocurrency from Mt. Gox, contributing to the exchange’s ultimate insolvency. Armed with the ill-gotten gains from Mt. Gox, Bilyuchenko allegedly went on to help set up the notorious BTC-e virtual currency exchange, which laundered funds for cyber criminals worldwide. These indictments highlight the department’s unwavering commitment to bring to justice bad actors in the cryptocurrency ecosystem and prevent the abuse of the financial system.”

This article originally appeared on Engadget at https://www.engadget.com/doj-charges-russian-nationals-with-laundering-bitcoin-in-2011-mt-gox-hack-184052373.html?src=rss

Man allegedly used a Nintendo ‘Duck Hunt’ gun to rob convenience store

Police have arrested a South Carolina man after he allegedly robbed a convenience store armed with a Nintendo light gun primarily used in the 1980s to play Duck Hunt, Hogan’s Alley and Gumshoe, as originally announced by York County deputies. The 25-year-old suspect allegedly made away with $300 in cash after donning a mask, wig, hoodie sweatshirt and the aforementioned Nintendo Entertainment System (NES) Zapper gun accessory.

Police allege the suspect waved the fake gun at a clerk and demanded money from the cash register. Authorities found him down the street in a Dollar General parking lot with the fake pistol in his pants. The original 1984 accessory is famously bright orange and gray, but authorities say the suspect spray-painted his black, likely so it would resemble a functional firearm. The York County Sheriff’s Department released an image of the doctored gaming accessory on its Twitter account.

Man robs gas station with Nintendo 'Duck Hunt' pistol: sheriff https://t.co/W9zPl0yxuKpic.twitter.com/nGHELXwr39

— WFLA NEWS (@WFLA) May 31, 2023

The original light gun accessory, called the Zapper, shipped with the NES and used an internal optical sensor to translate trigger presses to on-screen action. The primary use was Duck Hunt, though it worked with a handful of titles throughout the console’s lifespan.

Using a fake gun to commit a crime is no joke and has been a serious issue for decades. A 1990 study conducted by Congress found that fake guns were used in more than 15 percent of robberies. It’s worth noting that in most parts of the country, using a fake gun to commit a crime carries similar penalties to that of a real firearm, as the threat of danger is very real to victims. After all, these toy or replica guns look nearly identical to the real thing. To that end, New York State recently passed legislation banning toy guns unless they are clearly fake, such as those painted with bright colors.

This article originally appeared on Engadget at https://www.engadget.com/man-allegedly-used-a-nintendo-duck-hunt-gun-to-rob-convenience-store-182657571.html?src=rss

Amazon again accused of breaking labor laws at unionized warehouse

Amazon has been accused again of illegal anti-union behavior. The National Labor Relations Board (NLRB) filed a complaint Monday, saying the company changed its policies to squash union support at its only unionized warehouse in Staten Island, as reported byBloomberg. The complaint says Amazon changed policies to prohibit onsite union meetings while bypassing labor negotiations for providing paid leave for COVID-19 cases, among other violations. The accusations paint a picture of a corporation essentially dismissing the union, which voted to organize in 2022, as illegitimate — an image that lines up with its CEO’s public comments.

The NLRB accuses Amazon of changing a policy to prevent unionized workers from accessing the Staten Island warehouse during their time off. In addition, the agency says the company terminated two employees because of their association with the Amazon Labor Union (ALU) and changed its paid-leave policy for COVID-19 cases unilaterally — without negotiating with the workers’ organization.

The complaint also alleges that Amazon CEO Andy Jassy broke federal labor laws by saying unionized employees would be less empowered and have difficulty enjoying direct relationships with supervisors in an interview at The New York Times DealBook Summit in December. “That has a real chance to end up in federal courts,” Jassy added about the workers’ establishment of “bureaucratic” unions. Amazon has argued that the union’s establishment should be overturned because of “misconduct.”

The NLRB complaint describes Jassy’s comments as “interfering with, restraining and coercing employees,” saying his quotes about losing access to managers were an illegal threat. The NLRB filed a previous complaint in October following similar anti-union comments from Jassy. “All these Succession-style billionaires should be held accountable for unlawful actions, and that’s what we’re doing,” said ALU attorney Seth Goldstein. “[The complaint] is going to send a strong message to the union-busters and to CEOs like Jassy who think that they can say whatever they want to and they won’t be held accountable.”

In cases like this, NLRB prosecutors’ complaints are sent to agency judges, whose rulings can be appealed to labor board members in Washington and, if it stretches beyond that, to federal court. But, unfortunately, although the National Labor Relations Act (NLRA) allows the independent agency to make employers reinstate wrongly terminated workers and change policies, it can’t issue fines to them (or individual executives like Jassy). So don’t be shocked if this saga makes its way through the courts as Amazon flexes its muscle to try to avoid meaningful consequences and prevent the lone unionized warehouse from sparking a broader movement within the corporation.

This article originally appeared on Engadget at https://www.engadget.com/amazon-again-accused-of-breaking-labor-laws-at-unionized-warehouse-165523220.html?src=rss

DOJ charges a third former Apple employee with stealing self-driving car tech

For many years, rumors have been flying around that Apple has been working on a self-driving car, or at least an electric vehicle with some autonomous functionality. Now, a third former employee has been accused of stealing some of that technology for a Chinese self-driving car company.

A federal court in the Northern District of California has unsealed charges against Weibao Wang, a former Apple software engineer. Wang started working at the company in 2016 as part of a team that developed hardware and software for autonomous systems — technology that could conceivably wind up in self-driving cars.

According to the indictment, in November 2017, Wang accepted a job with a US subsidiary of a Chinese company that was developing self-driving cars but waited more than four months to tell Apple that he was quitting. After Wang left Apple in April 2018, the company found that he "accessed large amounts of sensitive proprietary and confidential information" in the lead up to his departure, the Department of Justice said.

"Large quantities of data taken from Apple" were found during a law enforcement search of Wang's Mountain View residence that June. Wang told agents that he wasn't planning to travel, but he flew back to China that night, according to the indictment.

Wang has been charged with six counts of stealing or attempting to steal trade secrets. He faces a maximum prison sentence of 10 years and a fine of $250,000 for each count. However, that depends on officials being able to extradite Wang, who remains in China, as CNBC reports.

This marks the third instance of a former Apple employee being accused of stealing autonomous trade secrets for Chinese entities. Xiaolang Zhang, who worked at Apple at the same time as Wang, pleaded guilty last year to stealing technology from Apple's car division. Zhang was apprehended at San Jose International Airport in 2018 while trying to board a flight to China.

In 2019, another former employee was arrested before they could flee to China. Jizhong Chen allegedly stole self-driving car tech for a Chinese company. Chen pleaded not guilty and the case is proceeding in federal court.

This article originally appeared on Engadget at https://www.engadget.com/doj-charges-a-third-former-apple-employee-with-stealing-self-driving-car-tech-180824584.html?src=rss

DOJ charges Russian hacker linked to attacks against US law enforcement agencies

The US State Department has announced a reward of up to $10 million for information that leads to the arrest of a prolific hacker. On Monday, the Department of Justice filed criminal charges against Mikhail Pavlovich Matveev, a Russian national and resident with links to the infamous Hive, LockBit and Babuk ransomware gangs. Starting as early as 2020, Matveev has allegedly targeted US law enforcement and healthcare organizations on multiple occasions.

In April 2021, for instance, he was linked to a Babuk ransomware attack that saw the computer systems of the Metropolitan Police Department in Washington DC locked out. Last May, Matveev, whose online pseudonyms include Wazawaka, Uhodiransomwar, m1x, and Boriselcin, was allegedly involved in a Hive ransomware attack that targeted a healthcare NGO in New Jersey.

Separately, the Treasury Department’s Office of Foreign Assets Control announced sanctions against Matveev. "Matveev has been vocal about his illegal activities. He has provided insight into his cybercrimes in media interviews, disclosed exploit code to online criminals, and stated that his illicit activities will be tolerated by local authorities provided that he remains loyal to Russia," the Treasury said.

Of the ransomware gangs Matveev is allegedly affiliated with, LockBit is among the most active and destructive. As of late 2022, the group’s malware has infected the computer systems of at least 1,400 victims, including a Holiday Inn hotel in Turkey. According to the Justice Department, the gang’s affiliates have extracted at least $75 million in ransom payments. Security researchers recently found evidence that suggests that LockBit recently began targeting Mac computers.

This article originally appeared on Engadget at https://www.engadget.com/doj-charges-russian-hacker-linked-to-attacks-against-us-law-enforcement-agencies-175740601.html?src=rss

After layoffs and an AI scandal, CNET's staff are unionizing

CNET, the venerable tech site which began publication nearly 30 years ago, has become the latest digital media company whose staff have chosen to band together and demand more. The CNET Media Worker's Union (CMWU) today sent a letter to Red Ventures, the private equity concern which purchased CNET in 2020, seeking recognition of a bargaining unit of nearly 100 workers including editors, writers, and video producers. According to CMWU, a supermajority of those in the unit signed union authorization cards.

Like the overwhelming majority of other organized digital publications, the workers who make up CMWU are responding in large part to an increasingly hostile financial climate in the industry. CNET has not been spared the same tumult that has led to the shuttering of Buzzfeed News and VICE's decision to file for bankruptcy: the company went through three brutal rounds of layoffs over recent months, the most recent of which stripped approximately a dozen staffers from the masthead. "We lost a lot of really great reporters," Laura Michelle Davis, an editor with CNET and organizing committee member, told Engadget.

According to Davis, that sense of uncertainty led to a number of voluntary departures, but also to the surviving staff choosing to organize. Despite those cuts, according to the union's statement sent to management today, staff have continue to be "subjected to ongoing restructuring, cost-cutting austerity measures, shifting job roles and promotion freezes." 

CMWU has also organized around what it feels is a "blurring of editorial and monetization strategies" and a lack of transparency around, among other things, the use of artificial intelligence. While it was apparently not a key factor in beginning the union drive, CNET was the subject of a fairly public scandal recently, when it was revealed by Futurism, both to the public at large and allegedly to the staff itself, that the site had begun publishing content written by AI without any form of authorship disclosure. Over half of those machine-generated stories were eventually appended with corrections for factual errors, and CNET later issued something like an apology.  

The unit is represented by the Writer's Guild of America, East, which has helped organize sites including Vox, HuffPost, and The Onion. Screenwriters from the union's sister organization, the Writer's Guild of America, have now been on strike for two weeks over a variety of disputes with the Alliance of Motion Picture and Television Producers, among which also has been the use of AI in content production. (Disclosure: I was a member of the WGA-E and served on the bargaining committee for Gizmodo Media Group during my tenure there.)

While the contours of whatever contract CMWU may eventually bargain with Red Ventures are still to be decided, the bargaining unit will be looking to substantially similar wins in digital media as a guide. We've reached out to Red Ventures for comment and will update if we hear back. CMWU's organizing statement follows below: 

CNET has been a trusted authority for original reporting, helpful explainers and honest advice for nearly 30 years. We – writers, editors, video producers, designers and other content creators – are committed to CNET’s future as a reputable source for tech reviews, news and commerce. That’s why an overwhelming majority of us have formed the CNET Media Workers Union, affiliated with the Writers Guild of America, East. We are confident that our collective efforts will allow us to better serve our audience and make a more collaborative workplace.

The digital media landscape is transforming rapidly. In this time of instability, our diverse content teams need industry-standard job protections, fair compensation, editorial independence and a voice in the decision-making process, especially as automated technology threatens our jobs and reputations. A union will help us adapt to new business strategies while establishing high journalistic standards and practices.

Since Red Ventures acquired CNET in fall 2020, CNET media workers have been subjected to ongoing restructuring, cost-cutting austerity measures, shifting job roles and promotion freezes. In the past year, three major rounds of layoffs have deeply impacted our reporting and our teams. Red Ventures cut senior editorial positions, eliminated the Roadshow cars section, drastically slashed our video team, gutted our news division and shut down science and culture coverage. These unilateral overhauls created low morale and unease, resulting in a wave of resignations and talent attrition. We face a lack of transparency and accountability from management around performance evaluations, sponsored content and plans for artificial intelligence. We are concerned about the blurring of editorial and monetization strategies.

By unionizing, we’re joining our peers at other digital media sites who have won security and benefits through negotiating unit-wide contracts. We feel that a union is the only way to guarantee job protections, defend editorial integrity and ensure standard cost-of-living raises as well as fair severance packages. A union would give us a voice on new AI and marketing initiatives and allow us to safeguard our workloads, bylines and careers. We look forward to bringing together our largely remote and siloed teams in this effort.

We are a passionate and loyal community of hard workers, and our rights should be enshrined and respected. We ask Red Ventures to recognize our union in a timely manner so we can begin the contract negotiation process.

CNET Media Workers Union

Organizing within tech? I'd like to hear about it. Tip me at avery@engadget.com or message me on Signal at 646.983.9846

This article originally appeared on Engadget at https://www.engadget.com/after-layoffs-and-an-ai-scandal-cnets-staff-are-unionizing-161508890.html?src=rss

YouTuber pleads guilty to intentionally crashing his plane for a wallet sponsorship

In the latest proof that satire is no match for today’s reality, The DOJ announced that a YouTuber pled guilty on Wednesday to obstructing a federal investigation by destroying the wreckage of an airplane he intentionally crashed for views and sponsorship money. Trevor Jacob, a 29-year-old former pro snowboarder turned YouTuber, recorded and uploaded his staged (yet very real) crash landing in Santa Barbara County, CA, in November 2021.

Jacob pled guilty to one count of destruction and concealment with the intent to obstruct a federal investigation, which carries a maximum sentence of 20 years in federal prison, as first reported by Gizmodo. He admitted in his plea agreement that his motive was profiting from a wallet promotion attached to the video.

Before taking flight, Jacob equipped the plane with video cameras while arming himself with a parachute, video camera and selfie stick. He ejected himself from the aircraft about 35 minutes into the flight, recording himself parachuting to the ground as the plane crashed into a dry brush area in Los Padres National Forest. (A dry brush area in wildfire country sounds like a terrific place to send an aircraft to its fiery demise.) He then hiked to the crash scene to recover his cameras and recordings.

YouTube

Unfortunately, that wasn’t the end of Jacob’s wallet-shilling shenanigans. He then waited two days to report the incident to the National Transportation Safety Board (NTSB); in the report, he incorrectly described it as an accident. Then, after the NTSB told him he was responsible for preserving the wreckage for examination, he returned to the crash scene by helicopter, which he used to airlift the wreckage to a local vineyard and winery. There, he loaded it onto a trailer attached to his pickup truck and hauled it to Lompoc City Airport, where he cut the plane’s remains into pieces, dumping them into nearby trash bins. Around this time, he lied to investigators, telling them he didn’t know where the wreckage was.

Still wanting to ensure the wallet sponsorship money made its way to his wallet, Jacob uploaded the YouTube video “I Crashed My Airplane” on December 23rd, 2021. The video is still up and has tallied 3.3 million views. During a clip of his long hike back to civilization after the landing, Jacob says, “I’m so past the point of even saying I’m exhausted… but I saw a cow.”

This article originally appeared on Engadget at https://www.engadget.com/youtuber-pleads-guilty-to-intentionally-crashing-his-plane-for-a-wallet-sponsorship-194604042.html?src=rss

UK citizen pleads guilty to 2020 Twitter hack and other cybercrimes

Joseph James O'Connor has pleaded guilty to playing a role in various cybercrime activities, including the July 2020 hack that took over hundreds of high-profile Twitter accounts. O'Connor, who's known by the name PlugwalkJoe online, was originally from Liverpool, but he was extradited from Spain to the US in April. If you'll recall, the perpetrators of the 2020 Twitter hack hijacked accounts owned by popular personalities, including Bill Gates, Barack Obama and Elon Musk, and promoted crypto scams under their names. In 2021, Graham Ivan Clark, the supposed teenage mastermind behind the breach, pleaded guilty in return for a three-year prison sentence. 

According to the Justice Department, O'Connor communicated with his co-conspirators in that Twitter breach regarding purchasing unauthorized access to Twitter accounts. He allegedly purchased access to at least one Twitter account himself for $10,000. In addition, he was also apparently involved in the hack of a TikTok account with millions of followers, as well as a Snapchat account, via SIM swapping. In both cases, O'Connor and his co-conspirators stole sensitive personal information from the victims and then threatened to release them to the public. While the DOJ didn't identify victims in those cases, The Guardian says they were named in press reports as TikTok star Addison Rae and actor Bella Thorne.

From March 2019 until May 2019, O'Connor was also allegedly involved in the infiltration of a Manhattan-based crypto company to steal $794,000 worth of cryptocurrency. They used SIM swapping to target three of the company's executives and successfully pulled it off with one of them. Using the compromised executive's credentials, they were able to gain unauthorized access to the company's accounts and computer systems. They then laundered the stolen cryptocurrency by transferring them multiple times and using crypto exchanges. 

O'Connor has pleaded guilty to a lengthy list of charges, including conspiracy to commit wire fraud and conspiracy to commit money laundering, both of which carry a maximum penalty of 20 years in prison. He is now scheduled for sentencing on June 23rd. 

This article originally appeared on Engadget at https://www.engadget.com/uk-citizen-pleads-guilty-to-2020-twitter-hack-and-other-cybercrimes-102634567.html?src=rss