Shared posts

22 Jan 13:14

Rocket Report: Starship going offshore, Blue Origin may launch humans in April

by Eric Berger
Rocket Lab's first mission of 2021 was named "Another One Leaves The Crust."

Enlarge / Rocket Lab's first mission of 2021 was named "Another One Leaves The Crust." (credit: Rocket Lab)

Welcome to Edition 3.30 of the Rocket Report! This week we're celebrating another private company—Virgin Orbit—has reaching orbit for the first time. Seeing the company's rocket drop from an aircraft last weekend and ascend into orbit on just its second attempt was darn impressive.

As always, we welcome reader submissions, and if you don't want to miss an issue, please subscribe using the box below (the form will not appear on AMP-enabled versions of the site). Each report will include information on small-, medium-, and heavy-lift rockets as well as a quick look ahead at the next three launches on the calendar.

Virgin Orbit goes orbital. On Sunday afternoon, Virgin Orbit joined the rare club of companies that have privately developed a rocket and successfully launched it into orbit. Moreover, with its LauncherOne rocket dropped from a 747 aircraft, the California-based company has become the first to reach orbit with an air-launched, liquid-fueled rocket.

Read 26 remaining paragraphs | Comments

08 Jul 13:34

ETSI Releases EN 303 645 IoT Security Standard for Consumer Devices

by Jean-Luc Aufranc (CNXSoft)
To be successful over the long term, IoT must be secure, at least that’s what people say. So in 2016, UL introduced the UL 2900 IoT security standard, but it set the bar so high, that nobody...
15 Jul 22:12

5G won't fix America's terrible broadband

by Cory Doctorow

5G cellular networks are able to transmit data at very high speeds, with incredible spectrum sharing that allows multiple 5G towers to operate in close proximity without their transmissions clobbering one another.

There's only one problem: for 5G to deliver high speeds to our homes and businesses, each of those 5G towers has to be fed by a high-speed link -- like, say, the fiber optic links that America's ISPs have been vastly underinvesting in (while getting state laws passed that ban cities from picking up the slack) for decades.

Putting a 5G tower next to your house will only help you if the 5G tower is connected to a fast internet pipe. Basically, 5G is fiber to the curb with wireless distribution over the final few yards, the very thing that America's telcoms sector is pathologically allergic to, and incapable of delivering on.

There are those who say that the way the cellular companies will handle future growth is through millimeter wave spectrum. However, that technology will require a fiber-fed small cell site near to every home. We really need to stop referring to millimeter wave spectrum as 5G wireless and instead call it what it is – fiber-to-the curb. When thought of that way, it’s easy to realize that there are no carriers likely to make the investment to deploy that much fiber along every residential street in America. Wireless 5G fiber-to-the-curb is not coming to most neighborhoods. The bottom line is that the world is not going to go wireless, and anybody saying so is engaging in hyperbole and not reality.

Will Broadband Go Wireless? [Doug Dawson/Pots and Pans]

(Thanks, Steve K!)

10 Feb 15:45

Using LLVM Clang To Compile The Linux Kernel Is Heating Up Again Thanks To Google

Interest in building the mainline Linux kernel with LLVM Clang as an alternative to GCC seemed like it waned for several years, but in recent months that effort has been moving forward thanks to Google's involvement...
21 Jan 19:10

EU will have agreed a tech tax by March, says French finance minister

by Rebecca Hill

Bruno le Maire confident despite 'hesitant' nations

The French finance minister has said he expects the European Union to agree on a digital services tax by March – a year after the bloc's initial proposal.…

15 Dec 02:38

Ships are just giant floating computers, filled with ransomware, BadUSB, and worms

by Cory Doctorow

A coalition of shipping industry associations has published The Guidelines on Cyber Security Onboard Ships, laying out best practices for the giant ships that ply the seas, and revealing that these behemoths are routinely infected with worms, ransomware, and malware spread by infected USB devices.

The document recounts incidents in which infected ships were stranded because malware caused their computerized navigation to fail, and there were no paper charts to fall back on; incidents where fleet owners paid off ransomware demands to keep ships at sea safe, and where the entire digital infrastructure of a ship at sea failed due to malware that spread thanks to weak passwords.

The report includes details of two incidents where USB thumb drives have led to a cyber-security incident, delays, and financial damage.

1) A dry bulk ship in port had just completed bunkering operations. The bunker surveyor boarded the ship and requested permission to access a computer in the engine control room to print documents for signature. The surveyor inserted a USB drive into the computer and unwittingly introduced malware onto the ship's administrative network. The malware went undetected until a cyber assessment was conducted on the ship later, and after the crew had reported a "computer issue" affecting the business networks. This emphasises the need for procedures to prevent or restrict the use of USB devices onboard, including those belonging to visitors.

2) A ship was equipped with a power management system that could be connected to the internet for software updates and patching, remote diagnostics, data collection, and remote operation. The ship was built recently, but this system was not connected to the internet by design. The company's IT department made the decision to visit the ship and performed vulnerability scans to determine if the system had evidence of infection and to determine if it was safe to connect. The team discovered a dormant worm that could have activated itself once the system was connected to the internet and this would have had severe consequences. The incident emphasizes that even air gapped systems can be compromised and underlines the value of proactive cyber risk management. The shipowner advised the producer about the discovery and requested procedures on how to erase the worm. The shipowner stated that before the discovery, a service technician had been aboard the ship. It was believed that the infection could potentially have been caused by the technician. The worm spread via USB devices into a running process, which executes a program into the memory. This program was designed to communicate with its command and control server to receive its next set of instructions. It could even create files and folders. The company asked cyber security professionals to conduct forensic analysis and remediation. It was determined that all servers associated with the equipment were infected and that the virus had been in the system undiscovered for 875 days. Scanning tools removed the virus. An analysis proved that the service provider was indeed the source and that the worm had introduced the malware into the ship's system via a USB flash drive during a software installation. Analysis also proved that this worm operated in the system memory and actively called out to the internet from the server. Since the worm was loaded into memory, it could affect the performance of the server and systems connected to the internet.

The Guidelines on Cyber Security Onboard Ships [International Chamber of Shipping et al]

Ships infected with ransomware, USB malware, worms [Catalin Cimpanu/Zdnet]

16 Aug 14:34

Elder Scrolls Online - The Cycle Continues

by news@mmorpg.com
Wolfhunter is upon us, and I am excited about all that it brings to the game. Two new dungeons are available to run, Moonhunter Keep and March of Sacrifices. As always, these dungeons bring new gear for us to obtain. A new battleground is available to play as well, the past couple of weeks I have been really getting back into PvP and battlegrounds has expedited that addiction.
13 May 17:50

Mesa 18.1 Expected To Officially Debut Next Week

While Mesa 18.0 debuted just about one and a half months ago, the fourth and final release candidate of Mesa 18.1 is now available for testing as the next quarterly feature installment to these primarily OpenGL/Vulkan open-source drivers...
11 Apr 13:09

Linux Computer Manufacturer Moving to U.S

Manufacturer of Linux based PCs, System76, has announced that it will be moving its manufacturing from China to the United States according to a report from OpenSource.com . OpenSource interviewed the company's marketing director, Louisa Bisio about the move to the U.S. Carl Richell, founder and CEO of System76 said on Twitter that they anticipate shipping products from the new factory by the end of the year. Great news in my opinion, and fantastic for the new jobs that are coming thanks to the move. Browsing the systems they have on their website, the lineup seems pretty nice, albeit a little expensive to me. Thanks to @cageymaru for the story. Creating a computer that is open source from the physical design to the OS is the next step in our mission to empower our customers and the community. We believe that by leading with open source design, the rest of the industry will have to follow. The open source model leads to improved quality and greater experimentation through peer review and expert analysis. It also guarantees users' freedom to own the product they've purchased, down to the design and how it was manufactured. Discussion
19 Sep 12:15

Seasonic PRIME 650 Platinum Review

This time we review a small Seasonic rated at 650 watts, but this one is part of its flagship Prime series with Platinum rated efficiency. That means, less heat, less noise, and a lower cost of operation over time. So, is the PRIME 650 Platinum PSU worthy of Seasonic's flagship status? We will surely find out.
08 Sep 15:53

Cuckoo calls sound like hawks to distract the birds they’re preying on

by Cathleen O'Grady

Enlarge / This reed warbler hasn't cottoned on yet. (credit: Per Harald Olsen / Wikimedia Commons)

Cuckoos are nest parasites. That means they lay eggs in the nests of other birds, which then put the effort into raising the chicks. So you'd think they'd be quiet about it. Yet female cuckoos have a tendency to make a bubbly, chuckling call while they’re laying their eggs. That’s a strange thing for them to do, because host birds aren’t too fond of cuckoos.

That chuckle doesn’t sound at all like the male cuckoo call. But it does have similarities to the call of the sparrowhawk, which led researchers Jenny York and Nicholas Davies to wonder whether the call might be a purposeful deceit—a ruse to distract the hapless host birds while their nest is being violated. York and Davies’ paper in Nature Ecology & Evolution this week provides evidence that the cuckoo chuckle does indeed seem to distract host birds by making them fear a sparrowhawk attack.

Faking it

Plenty of species have evolved to mimic predators, often for their own protection. For instance, the wasp beetle mimics a stinging wasp, causing predators to steer away. Cuckoos seem to be a fan of that tactic: some cuckoo species look quite a bit like hawks, and this seems to protect them from mobbing by other birds.

Read 8 remaining paragraphs | Comments

04 May 15:57

Neverwinter’s Shroud of Souls update is now live on PC

by Bree Royce
Shroud of Souls is live in Neverwinter today as promised — at least if you’re on PC. Console folks, you’ll be waiting a bit longer as usual to get your eyeballs on the patch, which includes a new storyline, customizable guild halls, a new stronghold siege event for guilded players, and of course, the loadouts feature, which allows players to [...]


This article was published by the word-wranglers at Massively Overpowered. Please review our terms of use for feeds.
14 Apr 11:48

Photo of all the Dr. Pepper knockoffs

by Rob Beschizza

Spotted doing the viral rounds and unattributed (though watermarked with a URL that redirects to Elbe Spurling's website) this wall of Dr. Pepper knockoffs is a magnificent lesson in branding magic and semiotics and all that fancy jazz. I transcribed the names:

Dr. Choice
Dr. Bold
Dr. Perfect
Dr. Bob
Dr. Wow
Real Dr.
Dr. Thunder
Dr. Right
Dr. K
Dr. Shaw
Dr. A+
Dr. Stripes
Dr. Chill
Dr. Skipper
The Dr.
Dr. Tremor
Dr. Snap
Dr. Perky
Dr. Shasta
Dr. Spice
Dr. Fine
Dr. Zevia
Dr. Dynamite

Not included, tragically, is Kroger's recently-marketed "The Fizzicist", photographed here by Brent Nashville.

If I made one, it would be 'Not really a Dr."

Update: One ~bmasmith compiled a big list of Dr. Pepper clones.

24 Mar 17:57

Judge: eBay can’t be sued over seller accused of patent infringement

by Joe Mullin

eBay headquarters on January 22, 2014 in San Jose, California. (credit: Justin Sullivan/Getty Images)

It's game over for an Alabama man who claims his patent on "Carpenter Bee Traps" is being infringed by competing products on eBay.

Robert Blazer filed his lawsuit in 2015, saying that his US Patent No. 8,375,624 was being infringed by a variety of products being sold on eBay. Blazer believed the online sales platform should have to pay him damages for infringing his patent. A patent can be infringed when someone sells or "offers to sell" a patented invention.

At first, Blazer went through eBay's official channels for reporting infringement, filing a "Notice of Claimed Infringement," or NOCI. At that point, his patent hadn't even been issued yet and was still a pending application, so eBay told him to get back in touch if his patent was granted.

Read 8 remaining paragraphs | Comments

25 Jan 13:17

Congratulations – you're looking better than ever this morning!

by Richard Chirgwin

America's new Earth observation sat sends home sharpest images ever

The United States' newest Earth-watcher, GOES-16, has sent back its first high-resolution images, and it's making the Earth observation community get a bit misty around the eyes.…

14 Nov 01:11

Intel HEDT Skylake-X And Kaby Lake-X Detailed

More details are in about Intel's next high-end desktop platform, Basin Falls-X, which will host the Kaby Lake-X and Skylake-X CPUs. Bringing a new socket, LGA2066, the chips are expected to launch before the end of next year. Kaby Lake-X will initially only be available in a quad-core configuration while Skylake-X will be coming in 6-, 8- and 10-core versions. The Kaby Lake-X will also offer 16 PCIe 3.0 lanes while Skylake-X will be coming with 44/28 PCIe lanes. According to another slide, Kaby Lake-X will support dual-channel DDR4 while Skylake-X will come with quad-channel DDR4-2666 memory support. The Kaby Lake-X TDP will peak at 112W while Skylake-X chips will hit maximum TDP of 140W. According to the same source, Intel's Skylake-X chips have already started sampling and these CPUs are expected to launch sometime in Q3 2017. Comments
21 Sep 12:46

Lethal 4-hour-erection-causing spiders spill out of bunch of ASDA bananas

by Alexander J Martin

Man flees with family

Yet another British family has been forced to flee its habitat after an infestation of Brazilian wandering spiders smuggled itself into their nest on the back of a bunch of supermarket bananas.…

21 Aug 13:29

Amazon's New Part-Time Tech Teams Will Get Full-Time Benefits

Four-hour work days with Fridays off while retaining full-time benefits? Say no more. You would, of course—assuming that NYT piece is to be believed—still have to tolerate being treated like a sub-human. In addition to attracting technical talent to the company, the pilot could also serve to play a role in changing the company's image after the Times investigation. The article painted a picture of ruthless and cut-throat company culture that left many stressed and burned out. CEO Jeff Bezos fought back against the accusations. Jay Carney, Amazon's senior vice president for global corporate affairs, and Times executive editor Dean Baquet sparred over the accuracy of the reporting. All of the workers on the part-time teams (including managers) will work 'core hours' on Monday through Thursday, from 10 a.m. to 2pm. The rest of the week, they'll have flexible hours and still get the same benefits as the company's full-time employees. Comments
04 Jul 13:19

Is Data Privacy part of your Company's Culture?, (Sun, Jul 3rd)

I was reading a while back about the FDIC data lost who had 5 major breaches between Oct 30, 2015 (taxpayers personally identifiable information) and could have been prevented with a combination of host based and network controls to prevent sensitive data from leaving the network. According to the information released, the breaches occurred because individual copied data to USB drives which then left the premises. A strong and effective security policy restricting access to USB drive could have helped prevent this. All removable drives should be encrypted and limit who can write to a removable drive for accountability.

Here are three tips I think can help:

1- Have HR involved and provide awareness training [1] on a regular basis

Have the human resource (HR) department do awareness training on a regular basis with an emphasis on the organization access data policy and explain the consequences to the company and the individual when data is lost. If the data policy changes, HR must explain clearly what those changes are and why they were implemented.

2- Track, tag and audit sensitive data

It is possible to protect corporate data by tagging and classifying it properly. Employees should have access to the data they need to do their job (need to know) and nothing else. Auditing and reporting who access what help understanding if the proper controls and safeguard are working. These controls should also be applied to who print what documents. For example, if you do business in the EU, in May 2018, the EU [2] is implementing a new directive on data protection. This update means stiffer penalty of [...] up to 4% of their global annual turnover.[3]

3- Encrypt all external devices and identify who can transfer sensitive data?

First, having all external devices used to copy sensitive data encrypted is a good idea, if it get lost, it cannot be access without the proper encryption key. Next, have a policy that identify who can copy and save data sensitive data on an external media. As per Item #2, track, audit and report when that data was access or transferred and by whom.

Is Data Privacy part of your Companys Culture? Do you feel the policy use to protect data within your organization is adequate?

[1] https://securingthehuman.sans.org/
[2] http://ec.europa.eu/justice/data-protection/reform/index_en.htm
[3] http://europa.eu/rapid/press-release_MEMO-15-6385_en.htm
[4] https://technet.microsoft.com/en-us/magazine/2007.06.grouppolicy.aspx

-----------
Guy Bruneau IPSS Inc.
Twitter: GuyBruneau
gbruneau at isc dot sans dot edu

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
18 May 23:27

Turbulent times for Formula 1 engines result in unprecedented efficiency gains

by Jonathan M. Gitlin

(credit: Getty Images | Joe Klamar/AFP)

It's no secret that we're fans of using the racetrack to improve road car technology here at Ars. It's also no secret that we believe the discipline of endurance racing (Le Mans and the like) to have far more relevance to making our road cars better than Formula 1. But it would be incorrect to say that no such tech transfer happens within the ultra-specialized world of F1. And a perfect example of that is a clever engine development being used by Mercedes-Benz and Ferrari that's pushing the envelope of energy efficiency. It's called turbulent jet ignition (TJI), and not only does it do wonders for fuel efficiency, it also results in a cleaner exhaust.

As you probably know, gasoline engines combust fuel with air within each cylinder, and that combustion moves the pistons—and therefore the crankshaft, powering the car. But most of the energy released during combustion is wasted as heat. In fact, the average road car engine wastes between 70 to 75 percent, meaning its thermal efficiency is around 25 to 30 percent. That comes down to the way that the fuel combusts after it's injected into the cylinder, which normally happens around the center of the cylinder by the spark plug (the bit that ignites the mixture). If you can control ignition so that it happens more homogeneously throughout the cylinder, with more air per given amount of fuel (i.e. a leaner burn), less energy is wasted as heat and more of it is converted to work.

But this process can be improved. Take Toyota's latest generation of Prius hybrids, for example. These cars use what's known as an Atkinson-cycle (most engines work via the Otto-cycle). The current Prius engine is supposed to have a thermal efficiency of 40 percent, which is quite an achievement. But there are other options, too, like a technology that's already used in some road cars called direct injection. Rather than traditional fuel injection, which squirts fuel into the engine upstream of the cylinder in the intake port (the bit that the air gets sucked through on its way from the outside of the car into the engine), direct injection uses a high-pressure system to add the fuel into the cylinder itself. This makes it possible to more accurately control the fuel-air mix, whether that's to achieve a stoichiometric air-fuel ratio (14.7:1) or even an ultra-lean mix (useful when cruising with the engine under a light load).

Read 6 remaining paragraphs | Comments

15 May 13:40

Vicarious Preps VR Content Publishing Platform For Alpha Testing

Vicarious announced that it is preparing for an alpha test of the Vicarious VR content publishing platform. The company has been testing with a small early contributor team and is now ready to accept more members.
06 May 02:19

The 10 most unsolvable unsolved disappearances

by James Renner

bks

As a true crime journalist who searches for the missing, I am keenly aware of the breadcrumbs I’m leaving behind throughout a typical day. If I were to suddenly disappear, these bits of information will mean everything to detectives. But I worry that these clues will be misleading, that my receipts and cell phone pings will only muddy the waters of the official investigation should I vanish without a trace, because the littlest detail can seem quite suspicious when taken out of context.

tca James Renner is a novelist and journalist from Ohio. He’s new work of nonfiction, True Crime Addict, follows his investigation into the disappearance of Maura Murray. It’s available everywhere books are sold, May 24.

For instance, the police might find the credit card slip in my car that shows I was in the bad part of Akron, today, and think that has something to do with whatever happened. That’s where people go to buy crack, after all. But really, I only drove out to Exchange because I found a new place over there that serves authentic Pho. Yesterday, I paid for several mirrors at a craft-supply store I’d never visited in the past. If I disappeared, the detectives will wonder why I altered my routine that day. Maybe they’ll suspect I was using those mirrors to cut cocaine (my son needed them to build a periscope for Cub Scouts – honest!).

When someone goes missing, the clues they leave behind lack context. There’s no telling which detail is important and which isn’t. And the cases that go cold often contain more clues than the ones that don’t. It makes a certain kind of sense, if you think about it. These unsolved cases lack focus because there’s just enough evidence to lead a detective in any direction they wish to go. Without focus, how can an investigator hone in on the solution?

A disappearance is a half-finished story. Is the victim alive? Are they dead? Other crimes at least have a conclusion: murder, robbery, assault. We know what we’re dealing with. Not so with disappearances.

Of course, that’s what I like about them. And I suspect I’m not alone. After all, who doesn’t like a challenge?

Over the years, I’ve kept a log of the most alluring disappearances. I present them here, in no particular order.

Screen Shot 2016-05-05 at 9.23.12 AM

10. Ted Conrad

Case Background: It was the summer of 1969 and the future looked bright for young Ted Conrad. He was a handsome, bright kid with a nice job at Society National Bank, in Cleveland. He had a cute girlfriend and an apartment in Lakewood. He could have done anything he set his mind to. And what he set his mind to that summer was robbing the his bank.

Conrad was a fan of The Thomas Crown Affair, the one with Steve McQueen. He watched the movie over and over, religiously and began to model himself after McQueen’s debonair character, purchasing a sports car and becoming fluent in French. On his twentieth birthday – Friday, July 11 – Conrad purchased a fifth of whiskey and smokes during his lunch break and made sure to show everyone the bag as he returned to the vault for the remainder of the day. When his shift was over, he walked out of the bank with the paper bag. But this time it was filled with $215,000. That was a lot of cheese in 1969 – adjusted for inflation, that’s equal to about $1.3 million, today.

Nobody noticed he was missing until Monday. By the time the bank figured out it had been robbed, Conrad had a four day head start on the F.B.I.

Possible Solutions: Conrad would be sixty-six years old, today. Family members claim he never contacted them after he fled Cleveland and his brother-in-law believes he’s dead. Conrad was spotted at a bar in Hawaii a couple weeks after the theft, by a couple from Cleveland on vacation. Before he vanished for good, Conrad sent his girlfriend a letter postmarked from Engelwood, California, near Los Angeles International Airport.

Want to hear something really crazy? I was watching an episode of Anthony Bourdain’s No Reservations not long after I reported on Conrad’s disappearance for The Free Times. It was the episode where Bourdain travels to Hawaii and meets a strange old man living in a house on a volcano. The old man wouldn’t talk about his past and refused to leave the evacuation area as the lava fields drew near. I’m not positive, but damn it if that strange man doesn’t look like an old Teddy Conrad.

9. Madeleine McCann

Case Background: The disappearance of Madeleine McCann is easily the most publicized missing persons case this century. But for all the reports and news specials, the mystery remains unsolved. Madeleine was from Leicester, a city near the center of England. She was on vacation with her family at Praia da Luz, a Portugal resort, in May, 2007, a week before her fourth birthday, when she vanished from the ground-floor bedroom of a rented apartment near the beach. Her parents, Kate and Gerry McCann, had gone with friends to eat dinner at a restaurant a mere 160 feet from the apartment door. During the meal, members of their group went to check on Madeleine, who was sleeping in a bedroom with her younger siblings. The McCanns had left the patio door unlocked so they could easily come in and out to check on them. Madeleine’s mother discovered her daughter was missing sometime around 10 p.m. The bedroom window was open, the girl was gone.

Possible Solutions: How can a girl just disappear from a popular holiday resort? Was she abducted? Was her death accidental and her body hidden? Is she still alive? Early scrutiny fell on Madeleine’s parents but it’s very difficult to believe they could have had anything to do with some kind of rushed cover-up while dining with seven friends. And it was Madeleine’s father who reported the girl missing at 10:10 p.m. that night. In the last nine years, according to the BBC, police have taken 1,338 statements and have looked closely at 60 persons of interest. There have been over 8,000 reported sightings of Madeleine from all over the world – so many, in fact, that the sightings, alone, have their own Wikipedia page. In a recent interview, Kate McCann said she believes her daughter is still alive, and being held not far from Praia da Luz.

8. D.B. Cooper

Case Background: This case is fascinating because it is actually a series of mysteries. On November 24, 1971, a handsome, well-dressed, Don Draper-type who called himself “Dan Cooper,” boarded a Boeing 727 at Portland International Airport for a thirty-minute hop to Seattle. He lit a cigarette, ordered a bourbon and soda, and when the plane took off, he handed a stewardess a note in which he claimed to have a bomb. He then casually asked for $200,000 cash and four parachutes to be delivered in exchange for the passengers when they reached Seattle. The FBI met his demands and the passengers and some crew were released before Cooper instructed the pilot to take off again. After they were in the air, he told the rest of the crew to join the captain in the cockpit and stay there with the door closed. At about 8 p.m., the aft airstairs opened up and Cooper jumped out with the money and two parachutes. It remains the only unsolved hijacking in American history.

So who was “Dan Cooper?” And where did he go?

Possible Solutions: There are dozens of men who have been suspected of being D.B. Cooper, as he came to be known thanks to a newspaper misprint. Several books have been written, pointing fingers at different suspects. But to date, none of these men have been linked to the fingerprints and DNA the FBI have on file. It’s possible the hijacker died as soon as he jumped from the plane, his neck snapping when the parachute opened, his corpse slowly falling into the deep woods south of Seattle. Perhaps he landed in a river or lake and that’s why no body was ever found. After all, an eight-year-old boy discovered a couple bundles of Cooper’s ransom cash in the Columbia River, in 1980. But if Cooper did die that day, there has to be a missing persons report that matches him out there somewhere, since he never managed to return to the life he left behind.

7. Amy Lynn Bradley

Case Background: In March of 1998, twenty-three-year-old Amy Lynn Bradley joined her parents and brother on a Caribbean cruise, while on break from college. They were aboard Royal Caribbean Cruise Line’s Rhapsody of the Seas, en route to Curacao, the morning of March 24 when she suddenly vanished. She was seen around 5:30 a.m., on the balcony of her family’s suite. Her father realized she was missing around 6 a.m. The balcony door was left open and her sandals were just inside the room. This occurred just as the ship was entering the Curacao port and her father asked the crew to not let anyone off until they found Amy but the gangplank was lowered anyway.

The night before her disappearance, Amy and her brother were up until 3:30 a.m., partying at the disco with the ship’s band, Blue Orchid. Amy was last seen in an elevator with one of the band members, a man known as “Yellow,” according to The Charley Project website.

Possible Solutions: Though she was last seen on a cruise ship, it’s not likely that Amy could have jumped from the balcony or have been pushed into the ocean. At the time of her disappearance, the ship was pulling into Curacao and she likely would have been seen by crew or tourists on land if she’d fallen into the water. She was also an excellent swimmer. So, did Amy exit with the other passengers on Curacao? Did she decide to stay on her own or was she kidnapped? Two Canadian tourists claimed they saw Amy on a beach in Curacao in 1998, and even identified her tattoos. And, in 1999, a man in the Navy came forward saying he saw Amy in a Caribbean brothel, leading to speculation that she may have been sold into sex slavery.

[caption id="attachment_460516" align="alignleft" width="300"]thierry ehrmann/flickr thierry ehrmann/flickr[/caption]

6. The 229 People Aboard MH370

Case Background: In this day of constant surveillance, advanced radar technology, and heightened airline security it is inconceivable that a large passenger jet could simply vanish without a trace. And yet that’s exactly what happened on March 8, 2014, when Malaysia Airlines Flight 370 flew out of Kuala Lumpur International Airport and failed to arrive as scheduled in Beijing. Everything seemed fine when the captain communicated with air traffic control in Kuala Lumpur, but then he failed to check in with their Ho Chi Minh City counterparts when the plane crossed into Vietnamese airspace. At the same time, the jet’s transponder stopped functioning and it could no longer be tracked by tradition radar. However, military radar still had it. They tracked Flight 370 as it went off course and turned to the southwest. The aircraft’s satellite data unit continued to communicate with its satellite, even though the transponder was down. The SDU data suggests Flight 370 flew west for another five hours before it stopped transmitting altogether.

Possible Solutions: Oh man, how far down the rabbit hole do you want to jump? There are those who believe the flight was hijacked by terrorists who diverted it to Afghanistan so the aircraft could be used in a future attack. Others believe that twenty-two employees of a semiconductor company who were passengers aboard Flight 370 had to be murdered to silence what they knew about stealth technology. And there are some who blame things like black holes, aliens, and Shakira (I’m not kidding).

If Flight 370 was hijacked perhaps it was taken over by the two men who used stolen passports to clear security in Kuala Lumpur. Or maybe the captain decided to commit suicide and take everyone with him – it’s happened before. Maybe the lithium-ion batteries in the cargo hold caught fire and fried the electrical system.

Last year, debris from a Boeing 777 washed up on a beach on Reunion Island, in the western Indian Ocean. Since then, other pieces of an aircraft have been found along the coast of Mozambique. Though these artifacts have yet to be conclusively linked to Flight 370, they do fit the pattern of debris we expected to find if it crashed into the Indian Ocean.

But if it is Flight 370 how did it get so off course? What happened on board that plane for six hours after it lost contact with air traffic controllers?

tc

5. Tara Calico

Case Background: Nineteen-year-old Tara Calico borrowed her mother’s bicycle and went for a ride near her house in the small town of Belen, New Mexico, the morning of September 20, 1988. She was listening to her Walkman as she pedaled along her usual route down Highway 47. She was due to return home by noon and was last seen around 11:45 a.m., two miles away. Her mother went searching for her at 12:05 p.m. When she could not find her, she contacted police. Later, part of Tara’s Walkman was found near a campground, nineteen miles away. Neither Tara nor the bicycle were ever found.

Possible Solutions: There are two clear possibilities in Tara’s case: 1. She was abducted by a man or a group of men. 2. Her death was accidental but covered up.

One clue that supports the abduction theory is the disturbing Polaroid photograph that was discovered in a parking lot in Port St. Joe, Florida, in 1989. It’s a picture of a woman who resembles Tara, bound and gagged in the back of a van beside a young boy, who is also restrained. Her mother believes it to be Tara and points to the scar seen on the woman’s leg that matches an injury Tara suffered in a car accident, as proof. But some police detectives who worked on the case lean toward a simpler explanation: that Tara was accidentally struck by a truck, driven by a boy she knew. That boy, and at least one friend, then covered it up, disposing of Tara’s body and the bike. Valencia County Sheriff Rene Rivera has publicly stated he believes this is what happened but cannot prosecute due to lack of a body.

rg

4. Ray Gricar

Case Background: On April, 15, 2005, the District Attorney for Centre County, Pennsylvania, vanished under very mysterious circumstances. He was playing hooky that Friday, as he liked to do, driving through Brush Valley, cruising the back roads of rural P.A. When he didn’t return that evening, his girlfriend reported him missing. Police found his red MINI Cooper parked in the lot of an antique store in Lewisburg, near a bridge over the Susquehanna River. He was never seen again. A few months later, fishermen recovered Gricar’s laptop computer from the river. The hard drive had been removed. The hard drive was eventually discovered on the shore but it was so damaged, nobody could recover the data it once contained. A search of his home computer found Internet searches for “how to wreck a hard drive” and “water damage to a notebook computer.”

Possible Solutions: This one gets weird, fast. First, there’s the rumor that Gricar was murdered to avoid a sex scandal. You see, Gricar’s office had investigated Jerry Sandusky after kids came forward claiming they had been sexually abused by the Penn State assistant football coach. But in 1998, Gricar declined to press charges and the truth didn’t come out for another thirteen years. Some believe that Gricar, facing retirement in 2005, was finally going to make the allegations public and had met someone in the parking lot about this, only to be killed.

I prefer to believe that Gricar staged his disappearance and changed his identity to live out the remainder of his life, quietly. And I think he did it in such a way as to pay homage to a science fiction book he once consulted on. Author Pamela West approached Gricar about twenty years before he disappeared, asking for a little help with a novel she was working on, titled 20/20 Vision. It was a mystery loosely based on the cold case murder of Penn State student Betsy Aardsma, but it used time travel to solve the crime. In the novel, the main character disappears from State College, on April 14. Like Gricar, this detective was about to retire. And cigarette ash was found in Gricar’s vehicle, just like in the book, though neither Gricar, nor the protagonist smoked.

brs

3. Brian Shaffer

Case Background: Brian Shaffer was dashingly handsome med student at Ohio State University when he disappeared after a night of drinking, on Friday, March 31, 2006. Shaffer and his friend, William “Clint” Florence, met up at the Ugly Tuna Saloona around 9 p.m. and then went bar-hopping for several hours before returning to the Ugly Tuna just before 2 a.m. The bar’s security camera shows Brian walking in but never coming out, again. His friends say they figured he’d gone home. He wasn’t reported missing until Monday, when he didn’t show up to catch a flight to Miami, where he planned to spend Spring Break with his girlfriend.

Possible Solutions: Not long before he went missing, Brian Shaffer’s mother died and those close to him say he took it hard. This event, and the pressures of medical school, lead some to believe he committed suicide, though no body has ever been found. Perhaps instead of killing himself, he simply walked away from his life. Others suspect foul play. His friend, Clint Florence, refuses to take a lie detector test. But again, where is the body? How did Brian get out of the bar without being seen by security cameras? Two New York homicide detectives have even suggested Brian was the victim of the Smiley Face serial killer, a rumored boogeyman who draws smiley faces near the locations of the bodies he’s dumped in rivers.

bs

2. The Beaumont Siblings

Case Background: On Australia Day, in 1966, Jane, Arnna, and Grant Beaumont disappeared from Glenelg Beach near Adelaide, South Australia. Jane was the oldest at nine. Arnna was seven. Grant, just four. Their parents often let Jane take her younger siblings to the beach to play that summer. The children set out from home at 10 a.m. and were supposed to return at 2. When they still hadn’t come home by 7:30 that night, their parents called police. No trace of them has ever been found.

Several witnesses came forward later to say they’d seen the Beaumont children playing at the beach. The children were seen in the company of tall, blond man with a thin face and a sun tan. They also bought a meat pie from a local vendor, which was strange for two reasons: 1. They’d come into the store before, but never for a meat pie. 2. Nobody knows where the children got the money for the snack, as they were not sent out from home with enough coin to cover it.

Possible Solutions: Washed out to sea? Jane was the only one of the lot who could swim, and she couldn’t swim all that well. Did Grant wander into the ocean, prompting his older sisters to attempt a rescue? Were they killed in an accident while walking along Jetty Road, their bodies hidden as part of a cover-up? Did the tall, blond man abduct them? Was he the person who gave the children money for the meat pie? A reward of $1 million still stands for information that might solve this mystery.

mm2

1. Maura Murray

Case Background: On the surface, Maura Murray appeared to be the quintessential All-American Girl: track star, former West Point cadet, nursing student, and cute as a button. Then a series of strange events began one night while Maura was working the security desk at Melville Hall, on the campus of UMass, Amherst. This was Thursday, February 5, 2004. A shift manager found Maura at her desk in a catatonic state. All she would say was, “my sister.” The manager escorted her back to her room. The next day, school was canceled due to snow. That Saturday, Maura’s father, Fred, came to visit, with $4,000 in cash, to find her a new car, he says, though they never purchased one. On Saturday night Maura wrecked Fred’s car on the way back to his motel room around 3:30 a.m. On Monday morning, Maura sent an email to professors, stating that she would not be in class that week due to a death in the family – this was a lie. Nobody had died.

That afternoon, Maura got into her car, stopped by an ATM to empty out her bank account, and then drove north into the White Mountains of New Hampshire, where she got into another accident, this time smashing into a snow bank. A bus driver who lived nearby stopped to ask if she needed help. She declined. The time between the accident and the moment the first officer arrived on scene was between five and seven minutes. Sometime in that window, Maura vanished.

Possible Solutions: I began investigating Maura’s disappearance in 2010 and what I found was quite shocking. Maura was not the angelic young woman presented in early media reports. At the time of her disappearance she was in trouble for credit card fraud and identity theft. She left West Point in the middle of a judicial inquiry that was launched when she stole makeup from the commissary at Fort Knox. And she had been having an affair with her track coach and sometimes told him that she wanted to run away and start a new life.

Where was Maura going when she crashed her car in New Hampshire? What happened to her afterwards? Was she heading into the White Mountains to commit suicide, to go off and die “like an old squaw,” as her father suggested to police. Was she picked up by a serial killer? Or did she use an underground railroad for abused women to aide her escape into Canada?

06 May 02:13

The contenders for this year’s best TV

by WC Staff

We’ve added a What to look forward to section to our TV guide with early thoughts on six new contenders: the LG E6 or B6 OLED; the LG 60UH8500; the Samsung KS9000 or KS8000; the Sony X930D; the Vizio P65-C1; and the Vizio M65-C1. [Best TV]

25 Feb 02:50

Fallout 4: Survival Mode Detailed in Extensive Reddit Datamine

by news@mmorpg.com (News Manager)
Dataminer deluxe 'rayQuGR' has uncovered the way that Survival Mode will work in Fallout 4 when it arrives. As Bethesda has hinted, Survival Mode will "upend the rules of life" to provide players with the maximum challenge that many wish.
25 Nov 15:08

Bubble Catcher Watches Your Booze Burp

by Richard Baguley

Making your own booze involves a lot of sitting around waiting for things to happen, like waiting for the fermentation process to finish so you can get on with bottling and drinking it. That involves watching the bubbles in the airlock: once the frequency of the bubbles falls below a certain level, your hooch is ready for the next step.

[Waldy45] decided to automate this process by building a bubble catcher that measures the frequency of bubbles passing through the airlock. He did this using an optocoupler, a combination of LED and light sensor that changes resistance when something passes between them. You can’t see it in the image, but the horseshoe-shaped optocoupler is slotted around the thin neck in the bubble tube to sense when a bubble passes through.

The optocoupler is connected to an Arduino, running a bit of code that generates an interrupt when the optocoupler is triggered. At the moment, this just outputs an average time between bubbles to the serial port, but [Waldy45] is looking to add an ESP8266 to wirelessly connect the Arduino and contact him when the bubble frequency falls, indicating that the booze is ready for bottling.

We’ve seen a couple of over the top beer breweries before (here and here), but none of them have automated the actual fermentation stage, so something like this would definitely be an addition. Cheers!


Filed under: Arduino Hacks
04 Oct 21:39

Apple Cider Press is Just In Time for Fall

by Cameron Coward

Do you like hacking? Do you like apple cider? Do you like ceiling fans? If you answered “yes” to any of those questions, then boy do we have the project for you! [Lou Wozniak] has an awesome tutorial for building an apple cider press using a ceiling fan motor and a handful of items available at your local hardware store.

The build is pretty simple in concept but complex in execution, and [Lou] does a fantastic job of covering every step in detail in his two project videos. The project has two main components: the grinder to decimate the apples and create a juicy, pulpy soup, and the press to extract the juice. The grinder is powered by the fan motor, while the press uses a screw-drive connected to a power drill, and then a ratchet to squeeze out every last drop.

Eager for more ceiling fan motor goodness? You’re in luck! Apparently [Lou] is a master of repurposing fan motors, and we featured a pottery wheel he made with one a while back.


Filed under: cooking hacks, Holiday Hacks
21 Sep 22:32

General: Dragon's Dogma Online - New Update & Class Revealed

by news@mmorpg.com

Dragon

As the loud drum beat of hopeful anticipation echoes from the West, Capcom took to the stage at the Tokyo Game Show with a pair of videos to showcase the v1.1 update and the new class coming with it, the Element Archer, a healer as well as a ranged dynamo. Check them out and leave us your impressions in the comments.

06 Aug 01:59

Inside the $100M ‘Business Club’ Crime Gang

by BrianKrebs

New research into a notorious Eastern European organized cybercrime gang accused of stealing more than $100 million from banks and businesses worldwide provides an unprecedented, behind-the-scenes look at an exclusive “business club” that dabbled in cyber espionage and worked closely with phantom Chinese firms on Russia’s far eastern border.

In the summer of 2014, the U.S. Justice Department joined multiple international law enforcement agencies and security firms in taking down the Gameover ZeuS botnet, an ultra-sophisticated, global crime machine that infected upwards of a half-million PCs.

Thousands of freelance cybercrooks have used a commercially available form of the ZeuS banking malware for years to siphon funds from Western bank accounts and small businesses. Gameover ZeuS, on the other hand, was a closely-held, customized version secretly built by the ZeuS author himself (following a staged retirement) and wielded exclusively by a cadre of hackers that used the systems in countless online extortion attacks, spam and other illicit moneymaking schemes.

Last year’s takedown of the Gameover ZeuS botnet came just months after the FBI placed a $3 million bounty on the botnet malware’s alleged author — a Russian programmer named Evgeniy Mikhailovich Bogachev who used the hacker nickname “Slavik.” But despite those high-profile law enforcement actions, little has been shared about the day-to-day operations of this remarkably resourceful cybercrime gang.

That changed today with the release of a detailed report from Fox-IT, a security firm based in the Netherlands that secretly gained access to a server used by one of the group’s members. That server, which was rented for use in launching cyberattacks, included chat logs between and among the crime gang’s core leaders, and helped to shed light on the inner workings of this elite group.

The alleged ZeuS Trojan author, Yevgeniy Bogachev, Evgeniy Mikhaylovich Bogachev, a.k.a. "lucky12345", "slavik", "Pollingsoon". Source: FBI.gov "most wanted, cyber.

The alleged ZeuS Trojan author, Yevgeniy Bogachev, Evgeniy Mikhaylovich Bogachev, a.k.a. “lucky12345″, “slavik”, “Pollingsoon”. Source: FBI.gov “most wanted, cyber.

THE ‘BUSINESS CLUB’

The chat logs show that the crime gang referred to itself as the “Business Club,” and counted among its members a core group of a half-dozen people supported by a network of more than 50 individuals. In true Oceans 11 fashion, each Business Club member brought a cybercrime specialty to the table, including 24/7 tech support technicians, third-party suppliers of ancillary malicious software, as well as those engaged in recruiting “money mules” — unwitting or willing accomplices who could be trained or counted on to help launder stolen funds.

“To become a member of the business club there was typically an initial membership fee and also typically a profit sharing agreement,” Fox-IT wrote. “Note that the customer and core team relationship was entirely built on trust. As a result not every member would directly get full access, but it would take time until all the privileges of membership would become available.”

Michael Sandee, a principal security expert at Fox-IT and author of the report, said although Bogachev and several other key leaders of the group were apparently based in or around Krasnodar — a temperate area of Russia on the Black Sea — the crime gang had members that spanned most of Russia’s 11 time zones.

Geographic diversity allowed the group — which mainly worked regular 9-5 hour days Monday through Friday — to conduct their cyberheists against banks by following the rising sun across the globe — emptying accounts at Australia and Asian banks in the morning there, European banks in the afternoon, before handing the operations over to a part of the late afternoon team based in Eastern Europe that would attempt to siphon funds from banks that were just starting their business day in the United States.

“They would go along with the time zone, starting with banks in Australia, then continuing in Asia and following the business day wherever it was, ending the day with [attacks against banks in] the United States,” Sandee said.

Image: Timetemperature.com

Image: Timetemperature.com

Business Club members who had access to the GameOver ZeuS botnet’s panel for hijacking online banking transactions could use the panel to intercept security challenges thrown up by the victim’s bank — including one-time tokens and secret questions — as well as the victim’s response to those challenges. The gang dubbed its botnet interface “World Bank Center,” with a tagline beneath that read: “We are playing with your banks.”

The business end of the Business Club's peer-to-peer botnet, dubbed "World Bank Center."

The business end of the Business Club’s peer-to-peer botnet, dubbed “World Bank Center.” Image: Fox-IT

CHINESE BANKS, RUSSIAN BUSINESSES

Aside from their role in siphoning funds from Australian and Asian banks, Business Club members based in the far eastern regions of Russia also helped the gang cash out some of their most lucrative cyberheists, Fox-IT’s research suggests.

In April 2011, the FBI issued an alert warning that cyber thieves had stolen approximately $20 million in the year prior from small to mid-sized U.S. companies through a series of fraudulent wire transfers sent to Chinese economic and trade companies located on or near the country’s border with Russia.

In that alert, the FBI warned that the intended recipients of the fraudulent, high-dollar wires were companies based in the Heilongjiang province of China, and that these firms were registered in port cities located near the Russia-China border. The FBI said the companies all used the name of a Chinese port city in their names, such as Raohe, Fuyuan, Jixi City, Xunke, Tongjiang, and Donging, and that the official name of the companies also included the words “economic and trade,” “trade,” and “LTD”. The FBI further advised that recipient entities usually held accounts with a the Agricultural Bank of China, the Industrial and Commercial Bank of China, and the Bank of China.

Fox-IT said its access to the gang revealed documents that showed members of the group establishing phony trading and shipping companies in the Heilongjiang province — Raohe county and another in Suifenhe — two cities adjacent to a China-Russia border crossing just north of Vladivostok.

Remittance slips discovered by Fox-IT show records of wire transfers that the Business Club executed from hacked accounts in the United States and Europe to accounts tied to phony shipping companies in China on the border with Russia.

Remittance slips discovered by Fox-IT show records of wire transfers that the Business Club executed from hacked accounts in the United States and Europe to accounts tied to phony shipping companies in China on the border with Russia. Image: Fox-IT

Sandee said the area in and around Suifenhe began to develop several major projects for economic cooperation between China and Russia beginning in the first half of 2012. Indeed, this Slate story from 2009 describes Suifenhe as an economy driven by Russian shoppers on package tours, noting that there is a rapidly growing population of Russian expatriates living in the city.

“So it is not unlikely that peer-to-peer ZeuS associates would have made use of the positive economic climate and business friendly environment to open their businesses right there,” Fox-IT said in its report. “This shows that all around the world Free Trade Zones and other economic incentive areas are some of the key places where criminals can set up corporate accounts, as they are promoting business. And without too many problems, and with limited exposure, can receive large sums of money.”

Remittance found by Fox-IT from Wachovia Bank in New York to an tongue-in-cheek named Chinese front company in Suifenhe called "Muling Shuntong Trading."

Remittance found by Fox-IT from Wachovia Bank in New York to an tongue-in-cheek named Chinese front company in Suifenhe called “Muling Shuntong Trading.” Image: Fox-IT

KrebsOnSecurity publicized several exclusive stories about U.S.-based businesses robbed of millions of dollars from cyberheists that sent the stolen money in wires to Chinese firms, including $1.66M in Limbo After FBI Seizes Funds from Cyberheist, and $1.5 million Cyberheist Ruins Escrow Firm.

The red arrows indicate the border towns of  Raohe (top) and Suifenhe (below)

The red arrows indicate the border towns of Raohe (top) and Suifenhe (below). Image: Fox-IT

KEEPING TABS ON THE NEIGHBORS

The Business Club regularly divvied up the profits from its cyberheists, although Fox-IT said it lamentably doesn’t have insight into how exactly that process worked. However, Slavik — the architect of ZeuS and Gameover ZeuS — didn’t share his entire crime machine with the other Club members. According to Fox-IT, the malware writer converted part of the botnet that was previously used for cyberheists into a distributed espionage system that targeted specific information from computers in several neighboring nations, including Georgia, Turkey and Ukraine.

Beginning in late fall 2013 — about the time that conflict between Ukraine and Russia was just beginning to heat up — Slavik retooled a cyberheist botnet to serve as purely a spying machine, and began scouring infected systems in Ukraine for specific keywords in emails and documents that would likely only be found in classified documents, Fox-IT found.

“All the keywords related to specific classified documents or Ukrainian intelligence agencies,” Fox-IT’s Sandee said. “In some cases, the actual email addresses of persons that were working at the agencies.”

Likewise, the keyword searches that Slavik used to scourt bot-infected systems in Turkey suggested the botmaster was searching for specific files from the Turkish Ministry of Foreign Affairs or the Turkish KOM – a specialized police unit. Sandee said it’s clear that Slavik was looking to intercept communications about the conflict in Syria on Turkey’s southern border — one that Russia has supported by reportedly shipping arms into the region.

“The keywords are around arms shipments and Russian mercenaries in Syria,” Sandee said. “Obviously, this is something Turkey would be interested in, and in this case it’s obvious that the Russians wanted to know what the Turkish know about these things.”

According to Sandee, Slavik kept this activity hidden from his fellow Business Club members, at least some of whom hailed from Ukraine.

“The espionage side of things was purely managed by Slavik himself,” Sandee said. “His co-workers might not have been happy about that. They would probably have been happy to work together on fraud, but if they would see the system they were working on was also being used for espionage against their own country, they might feel compelled to use that against him.”

Whether Slavik’s former co-workers would be able to collect a reward even if they did turn on their former boss is debatable. For one thing, he is probably untouchable as long as he remains in Russia. But someone like that almost certainly has protection higher up in the Russian government.

Indeed, Fox-IT’s report concludes it’s evident that Slavik was involved in more than just the crime ring around peer-to-peer ZeuS.

“We could speculate that due to this part of his work he had obtained a level of protection, and
was able to get away with certain crimes as long as they were not committed against Russia,” Sandee wrote. “This of course remains speculation, but perhaps it is one of the reasons why he has as yet not been apprehended.”

The Fox-IT report, available here (PDF), is the subject of a talk today at the Black Hat security conference in Las Vegas, presented by Fox-IT’s Sandee, Elliott Peterson of the FBI, and Tillmann Werner of Crowdstrike.

Are you fascinated by detailed stories about real-life organized cybercrime operations? If so, you’ll almost certainly enjoy reading my book, Spam Nation: The Inside Story of Organized Cybercrime – From Global Epidemic to Your Front Door.

01 Aug 04:56

Deals: Our pick for best soft cooler, the AO Coolers Canvas Series 24 Pack, is down to $54 (from $67)

by SH Staff

Best Deals: Our pick for best soft cooler, the AO Coolers Canvas Series 24 Pack in Charcoal, is down to $54 (from $67). [Amazon]

12 Jun 15:10

The FCC will now take your net neutrality complaints

by Jon Brodkin

The Federal Communications Commission's net neutrality rules took effect today, and you can file complaints against your Internet service provider (or mobile data provider) on the FCC's website.

The submission form already allowed consumers to file complaints about availability, interference, billing, equipment, privacy, and speed. The form has been updated to include "Open Internet/Net Neutrality" issues:

The complaint process is the same whether you're raising a stink about an equipment or speed problem or net neutrality. You'll get a tracking number and will be able to check the status of the complaint online. An FCC consumer representative will review your complaint and may contact you to gather more information.

Read 7 remaining paragraphs | Comments