Como rodar jogos de PS4 no PC
16 de Maio de 2016, 7:07
Se você não sabe como fazer para rodar games de PS4 no computador, essa é a hora de aprender. Graças a uma atualização para o videogame lançada pela Sony no mês de abril de 2016, qualquer usuário pode continuar sua partida em sistemas Windows ou Mac OS, de forma simples e rápida. Basicamente, trata-se de um novo recurso incorporado ao sistema do console, chamado Remote Play.
Em linhas gerais, o Remote Play permite que jogadores possam transmitir suas partidas de PS4 para outras máquinas, desde que, obviamente, todas estejam ligadas e em rede.
Na prática, é útil pelo seguinte: suponha que você esteja no meio de uma partida e alguém resolva assistir à TV usando o mesmo aparelho em que o console está conectado; com o novo recurso do PS4, basta “direcionar” a partida para seu computador e continuar feliz!
O legal é que a novidade funciona também nos dispositivos PS Vita e PS TV, além de pegar em celulares da linha Xperia.
Para fazer o download do programa para rodar jogos de PS4 no computador, clique no link a seguir. É grátis.
Download do Remote Play
>>> Clique aqui para baixar de graça.
VEJA TAMBÉM:
>>> Conheça o teclado e o mouse oficiais do PS4
>>> [E3] PS4 vai começar a ser fabricado no Brasil!
>>> [Unboxing] PS4 branco é de ofuscar a vista
>>> Saiba como rodar Blu-ray 3D no PS4
>>> Como usar o controle sem fio do PS4 no PS3
>>> Conheça o PS4 versão “laptop”
>>> PS4 deve durar menos do que o PS3
>>> Já tem PS4 por R$ 2.500 no centro de SP
>>> Como comprar o PS4 no Paraguai com R$ 2.700
>>> Os melhores vídeos de destruição do PS4
>>> Entenda o que é a “Luz Azul da Morte” do PS4
>>> Evolução do PS1 ao PS4 em 1 minuto de vídeo
Source link
Nags, Sluts, and A Deep-Breasted Soulmate from the Shining City: Thomas Wolfe’s Women in The Web and The Rock (English Edition)
16 de Maio de 2016, 6:55I wrote this critical essay after I got my Master’s Degree in English and went to a Thomas Wolfe festival in 1991. While I was there, I had the good fortune to run into his nephew, who was the only living relative who actually knew him. I’ve always been a sucker for a good love story and was pleased to discover the best one in American Literature, in my humble opinion, in Wolfe’s long novel, The Web and The Rock. In that thinly-veiled self-portrait, Wolfe loves and captures the spirit of Aline Bernstein. In his extravagant rhetoric, he immortalizes her in his fictional character, Esther Jack. Written in the 1930’s, it shows a remarkable respect for an independent woman, and in this respect, Wolfe was ahead of his time. The fact that Aline won a Tony award for Best Costume Design, makes the story of her relationship with Wolfe even more fascinating. This eBook also includes photographs.
MoneyWiz
16 de Maio de 2016, 5:45
Click here to get notifications about new giveaways in your browser.

Hurry up and win one of the 50 license keys
Complete the tasks to get as many entries as possible.
Your chances of winning increase with each entry! This offer is available for several days only.
Win one of the fifty licenses for MoneyWiz!
Simplify your financial life with MoneyWiz! Have all your accounts, budgets and bills in one place! With powerful reports, worldwide online banking and instant sync between all your devices! That’s MoneyWiz – the world’s most powerful and beautiful finance software.
No similar feedback found. Feel free to add yours!

TopScanner is a PDF scanner tool that uses the stunning camera of…
$1.99 ➞ free today

Video Slimmer App lets you shrink video files filmed on your iOS…
$1.99 ➞ free today

iOS in the Car is here in your hands!
$5.99 ➞ free today

Spawn into the ultimate mods experience!
$1.99 ➞ free today

See all connections to your favorite public WiFi network or your home…
$3.99 ➞ free today

Suru is a vivid, high-resolution icon pack for Android to install and…
$1.82 ➞ free today

Go on a Match 3 Magical Adventure.
$0.99 ➞ free today

QuikCoach is a sports video analyses and planning application for…
$4.96 ➞ free today

A Game by Colin Sanders & Jason RT BondGrow your own garden…
$2.99 ➞ free today

Heads Up!
$0.74 ➞ free today
Source link
Xbox One: retrocompatibilidade já suporta jogos multi-disco
16 de Maio de 2016, 3:05
De acordo com Larry “Major Nelson” Hryb, a retrocompatibilidade do Xbox One já está suportando jogos com mais de um disco. Hryb ainda declarou que os engenheiros responsáveis pela compatibilidade com jogos do Xbox 360 estão trabalhando duro para incluir jogos multi-disco à lista da retrocompatibilidade.
A novidade acrescentada ao recurso do Xbox One surgiu após a Microsoft ter anunciado a chegada de Deus Ex: Human Revolution Director’s Cut à lista de jogos retrocompatíveis. A empresa já tinha declarado anteriormente as dificuldades que encontravam para levar esses jogos ao Xbox One, mas enfim conseguiram driblar os obstáculos.
A empresa disse que os fãs estavam solicitando esse recurso, e então os engenheiros da companhia os ouviram.“Sabemos que os fãs estavam pedindo esse recurso e os nossos engenheiros trabalharam arduamente desenvolvendo uma solução para conseguir habilitá-lo para que nós pudéssemos expandir ainda mais títulos retrocompatíveis com o Xbox One. Continuamos ouvindo o feedback dos nossos fãs e trabalharemos com nossos parceiros de publicação para expandir a biblioteca de jogos retrocompatíveis, incluindo novos títulos multi-disco.”
É apenas uma questão de tempo para que mais jogos que contenham mais de um discos sejam acrescentados à lista da retrocompatibilidade. Agora portas estão abertas para a chegada de jogos como Mass Effect 2 e 3, Lost Odyssey, Blue Dragon, assim como versões aprimoradas de alguns games que possuem dois discos, Deus Ex: Human Revolution Director’s Cut é um bom exemplo.
Source link
Mobile M.2 Complete KIT
16 de Maio de 2016, 3:03
Monday, May 16, 2016 (05:42:54)
Mobile M.2 Complete KIT
MediaClone, Inc. is proud to announce the release of the Mobile M.2 Complete KIT.
The M.2 KIT includes many adapters with SATA and USB3.0 interfaces that enable the user to capture, clone, and erase data from different kinds and types of small form factors of flash digital storages such as mSATA SSD, Micro-SATA SSD, SLIM SATA SSD, special kind of SSD, and M.2 SSD with PCIE and SATA storage protocols.
http://www.media-clone.net/M-2-complete-KIT-p/opt-0043-00a.htm
The M.2 KIT: In order to help the forensic investigator in the field, we did collect and cataloged most of the adapters in the marketplace; from mini PCIE to NVMe adapters, and created a kit that can be very helpful.
The kit includes mSATA, Micro SATA, Slim SATA adapters and some other adapters that are not M.2
Background:
A long time ago laptop manufacturers were using SSD storage devices inside their laptops, with Mini-PCIE connectors, and with some propriety interfaces. (Asus PC900 for example)
The mSATA SSD was the next step in shrinking the size (~1”x2”) of the SSD and is being used with SATA protocols only, mostly on PC, gaming boxes, and laptops.
The M.2 NGFF (Next Generation Form Factor) solid state drives are the new generation of digital storage devices. They are very compact, and they come in a much smaller size than their predecessor; the mSATA SSD. They are extremely fast and widely used in the new slim lines of laptops and tablets. The M.2 standard allows module widths of 12, 16, 22 and 30 mm, and lengths of 16, 26, 30, 38, 42, 60, 80 and 110 mm.
The main challenge with M.2 storage devices began where there was no real standardization of the size and type of the interface connector that been used on that SSD. Most of the laptops manufacturers were using 2 types of M.2 connectors: B-type (used for SATA) and M-type (used for PCIE), and with 2 different storage protocols: SATA and PCIE.
The PCIE Sold Sate Drives (SSD)are supported PCIE 2.0 up to 4 lanes and they are much faster than SATA base SSD (SATA 3.0).
Apple Laptops: Prior to 2013 they were using SATA SSD with some propriety interfaces, and today they are using PCIE base SSD with M.2 (M type).
The latest in storage come from Intel with M.2 NVMe SSD, which is using PCIE 3.0 with 4 lanes, and there are only a few external solutions that enable the user to read from those drives (Otherwise the user will need to plug to a PC in order to capture the data).
There is a lot of confusion and misidentification of M.2 SSD. Choosing the right adapter to plug the SSD and connect to a PC or to any imaging device can be challenging.
Plugging the wrong SSD to the wrong adapter (even if it physically fits) can damage the SSD and compromise the data.
Source link
Python com PostgreSQL: Orientado a Objeto
16 de Maio de 2016, 2:53A ideia deste livro nasce da baixa quantidade de conteúdo no idioma português (pt-br) e visa permitir que o leitor tenha contato com a orientação a objeto e ao final do E-book consiga construir uma aplicação que interaja com o banco PostgreSQL através do Python.
Não é necessário conhecimento prévio de programação com Python ou do próprio PostgreSQL, visto que este E-book é praticamente um CookBook (os códigos estão prontos), porém o aproveitamento (curva de aprendizado) será mais rápida para aqueles que já possuem noções de programação em Python e comandos SQL.
Nos exemplos foram utilizado o Python 3.5 e PostgreSQL 9.
Intel CEO Brian Krzanich says Moore's Law is alive and well
15 de Maio de 2016, 23:03
It was a week ago today that Intel announced plans to eliminate up to 12,000 positions globally, or 11 percent of its total workforce, as part of a transformation strategy. Intel CEO Brian Krzanich shared more details about those plans today, which includes continuing to abide by Moore’s Law. Well, sort of.
As revised in 1975, Moore’s Law dictates that the number of transistors in a processor will double around every two years. It’s named after Gordon Moore, a co-founder of Intel who originally predicted in 1965 that the number of transistors would double annually. Moore’s Law (the revised version) has driven innovation in the semiconductor industry and at Intel in particular for the past 50 years, though every so often, there’s chatter that it’s no longer feasible.
That’s been the popular opinion in recent times as Intel struggles to transition its manufacturing process from 14 nanometers to 10 nanometers. Just last month, Intel seemingly signaled the end of its tick-tock release cadence, which was getting ready to be disrupted with Kaby Lake, a second consecutive tock release (the first being Skylake) to buy some time for Intel to work on Cannonlake. It was originally thought the disruption would be a one-time anomaly, but in a recent 10K filing, Intel hinted that the tick-tock era might over. That in turn prompted talk of Moore’s Law coming to an end, though don’t tell that to Krzanich.
“In my 34 years in the semiconductor industry, I have witnessed the advertised death of Moore’s Law no less than four times. As we progress from 14 nanometer technology to 10 nanometer and plan for 7 nanometer and 5 nanometer and even beyond, our plans are proof that Moore’s Law is alive and well,” Krzanich stated in a blog post outlining Intel’s plans. “Intel’s industry leadership of Moore’s Law remains intact, and you will see continued investment in capacity and R&D to ensure so.”
That’s good news for enthusiasts, gamers, overclockers, and every other segment that drives continued advancements in processing power, though Krzanich muddies the water a bit when he talks about Moore’s Law in terms of economics instead of the current pace of doubling transistors.
“Moore’s Law is fundamentally a law of economics, and Intel will confidently continue to harness its value. The law says that we can shrink transistor dimensions by roughly 50 percent at a roughly fixed cost, thus driving twice the transistors for the same cost (or the same number of transistors for half the cost),” Krzanich says.
What’s missing from all that rhetoric is a commitment to (or even an acknowledgement of) sticking with a two-year time frame for doubling transistors. Certainly Intel has 7 nanometer and 5 nanometer plans on its roadmap, but with Cannonlake (10 nanometer) delayed until next year, you have to wonder how smoothly things will go after that.
In any event, it’s nice to see Krzanich not only talk about Moore’s Law, but list it as one of five core beliefs behind its transformation strategy.
Source link
Advanced Android Application Development (Developer’s Library)
15 de Maio de 2016, 22:51Advanced Android™ Application Development, Fourth Edition, is the definitive guide to building robust, commercial-grade Android apps. Systematically revised and updated, this guide brings together powerful, advanced techniques for the entire app development cycle, including design, coding, testing, debugging, and distribution. With the addition of quizzes and exercises in every chapter, it is ideal for both professional and classroom use.
An outstanding practical reference for the newest Android APIs, this guide provides in-depth explanations of code utilizing key API features and includes downloadable sample apps for nearly every chapter. Together, they provide a solid foundation for any modern app project.
Throughout, the authors draw on decades of in-the-trenches experience as professional mobile developers to provide tips and best practices for highly efficient development. They show you how to break through traditional app boundaries with optional features, including the Android NDK, Google Analytics and Android Wear APIs, and Google Play Game Services.
New coverage in this edition includes
- Integrating Google Cloud Messaging into your apps
- Utilizing the new Google location and Google Maps Android APIs
- Leveraging in-app billing from Google Play, as well as third-party providers
- Getting started with the Android Studio IDE
- Localizing language and using Google Play App Translation services
- Extending your app’s reach with Lockscreen widgets and DayDreams
- Leveraging improvements to Notification, Web, SMS, and other APIs
Annuzzi has released new source code samples for use with Android Studio. The code updates are posted to the associated blog site: http://advancedandroidbook.blogspot.com/
This title is an indispensable resource for intermediate- to advanced-level Java programmers who are now developing for Android, and for seasoned mobile developers who want to make the most of the new Android platform and hardware.
This revamped, newly titled edition is a complete update of Android™ Wireless Application Development, Volume II: Advanced Topics, Third Edition.
Acer And Starbreeze Team Up To Develop And Manufacture StarVR Headset
15 de Maio de 2016, 19:02
Acer is partnering with Starbreeze, the game studio behind The Darkness, to help bring their virtual reality headset StarVR to life, which was announced last year at E3.
Acer, one of the world’s largest computer manufacturers, will aid Starbreeze in its design, manufacturing, marketing for StarVR.
“Acer is thrilled to join forces with Starbreeze in bringing the StarVR head-mounted display to the market,” said Jason Chen, Acer Corporate President and CEO. “We are devoting R&D resources across multiple aspects of the VR ecosystem for a coherent and high-quality experience, while just last month Acer announced powerful desktops and notebooks fully-ready for StarVR. Starbreeze and Acer share the same goal of delivering best-in-class VR applications, and we look forward to unlocking new VR possibilities together with this partnership.”
StarVR is a 210 degree, high resolution VR headset that was initially born from the InfinitEye project. We had the chance to try the headset out at E3 2015, where it was coupled with a demo based on The Walking Dead. Since then, Starbreeze unveiled plans for a virtual reality arcade space in Los Angeles called StarCade and premiered a cinematic VR experience during the first week of this year’s Cannes Festival.
Both Acer and Starbreeze plan to gear the device towards more location-based and enterprise-focused markets, which likely means StarVR won’t be competing as much against consumer-based VR experiences such as the Oculus Rift and the HTC Vive.
Our Take
Considering how large a company Acer is, it’s bound to help this VR headset gain more leverage in the marketplace. During last year’s E3, our editor Mike Futter had a chance to try the StarVR headset himself. While he enjoyed his experience for the most part, he noted issues from pixelation to a bulky design that felt heavy to wear. If StarVR hopes to be successful, problems like these will first have to be ironed out.
Source link
Everything We Know About How the FBI Hacks People
15 de Maio de 2016, 19:00
Recent headlines warn that the government now has greater authority to hack your computers, in and outside the US. Changes to federal criminal court procedures known as Rule 41 are to blame; they vastly expand how and whom the FBI can legally hack. But just like the NSA’s hacking operations, FBI hacking isn’t new. In fact, the bureau has a long history of surreptitiously hacking us, going back two decades.
That history is almost impossible to document, however, because the hacking happens mostly in secret. Search warrants granting permission to hack get issued using vague, obtuse language that hides what’s really happening, and defense attorneys rarely challenge the hacking tools and techniques in court. There’s also no public accounting of how often the government hacks people. Although federal and state judges have to submit a report to Congress tracking the number and nature of wiretap requests they process each year, no similar requirement exists for hacking tools. As a result, little is known about the invasive tools the bureau, and other law enforcement agencies, use or how they use them. But occasionally, tidbits of information do leak out in court cases and news stories.
A look at a few of these cases offers a glimpse at how FBI computer intrusion techniques have developed over the years. Note that the government takes issue with the word “hacking,” since this implies unauthorized access, and the government’s hacking is court-sanctioned. Instead it prefers the terms “remote access searches” and Network Investigative Techniques, or NIT. By whatever name, however, the activity is growing.
1998: The Short But Dramatic Life of Carnivore
The FBI’s first known computer surveillance tool was a traffic sniffer named Carnivore that got installed on network backbones—with the permission of internet service providers. The unfortunately named tool was custom-built to filter and copy metadata and/or the content of communications to and from a surveillance target. The government had already used it about 25 times, beginning in 1998, when the public finally learned about it in 2000 after Earthlink refused to let the FBI install the tool on its network. Earthlink feared the sniffer would give the feds unfettered access to all customer communications. A court battle and congressional hearing ensued, which sparked a fierce and divisive debate, making Carnivore the Apple/FBI case of its day.
The FBI insisted to Congress that its precision filters prevented anything but the target’s communications from being collected. But Carnivore’s descriptive name seemed to defy that, and an independent review ultimately found that the system was “capable of broad sweeps” if incorrectly configured. The reviewers also found that Carnivore lacked both the protections to prevent someone from configuring it this way and the capability to track who did it if the configuration got changed.
By 2005, the FBI had replaced Carnivore with commercial filters, but was still using other custom-built collection tools in the Carnivore family. But all of these network surveillance tools had one problem, the same issue plaguing law enforcement agencies today: encryption. FBI agents could use tools to siphon all the data they wanted as it crossed various networks, but if the data was encrypted, they couldn’t read it.
Enter key loggers designed to circumvent encryption by capturing keystrokes as a surveillance target typed, before encryption kicked in.
1999: How a Mob Boss Helped Birth the Fed’s Computer Surveillance
Cosa Nostra mob boss Nicodemo Salvatore Scarfo, Jr., was the first criminal suspect known to be targeted by a government keystroke logger in 1999. Scarfo was using encryption to protect his communications, and the FBI used a key logger—which was likely a commercially made tool—to capture his PGP encryption key. Unlike key loggers today which can be remotely installed, however, the FBI had to physically break into Scarfo’s office twice to install the logger on his computer and retrieve it, since Scarfo was using a dial-up internet connection that prevented authorities from reaching his computer remotely.
The FBI apparently went rogue in using the tool, however, because a government memo from 2002 (.pdf) recently obtained by MIT national security researcher Ryan Shapiro revealed that the Justice Department was irked that the Bureau had “risked a classified technique on an unworth [sic] target.”
Scarfo challenged the surveillance, arguing in a motion that the feds needed a wiretap order to capture the content of his communications and that a search warrant was insufficient. His lawyers sought information about the keylogger, but the government insisted the technology—which was already being used in the wild by hackers—was classified for national security reasons. It’s one of the same excuses the government uses today to keep a veil over its surveillance tools and techniques.
2001: Magic Lantern
The Scarfo case evidently convinced the feds that they needed to develop their own custom hacking tools, and in 2001, reporters got wind of Magic Lantern, the code name for an FBI keylogger that apparently went beyond what the government had used against Scarfo, since this one could be installed remotely. (A former lawyer for Scarfo who has asked to remain anonymous says Magic Lantern was not the tool used on the mob boss, though he doesn’t know the name of the tool that was.)
In addition to keystrokes, this new tool also recorded web browsing history, usernames and passwords and listed all the internet-facing ports open on a machine. It may have been used for the first time in Operation Trail Mix, an investigation of an animal rights group that occurred in 2002 and 2003. As recently revealed by the New York Times, the FBI used a tool to get around the encryption one suspect in the case was using; although the tool was never identified in court documents, it’s believed to have been a keystroke logger. “This was the first time that the Department of Justice had ever approved such an intercept of this type,” an FBI agent wrote about the tool in a 2005 email obtained by Shapiro this year.
After the news about Magic Lantern leaked in 2001, the government managed to keep a tight lid on its hacking tools and techniques for nearly a decade.
2009: Finally More Information Leaks Out
In 2009, the public finally got a more comprehensive view of FBI hacking when WIRED obtained a cache of government documents through a FOIA request. The documents described a surveillance tool called CIPAV—Computer and Internet Protocol Address Verifier—designed to collect a computer’s IP and MAC address, an inventory of all open ports and software installed on the machine, as well as registry information, the username of anyone logged in and the last URL visited by the machine. All of this data got sent to the FBI over the internet. CIPAV apparently didn’t come with a keystroke logger, however, and didn’t collect the contents of communication. Many in the security community believe that CIPAV, which has been around for at least as long as Magic Lantern and is still used today, is Magic Lantern by another name, minus the keystroke logger component.
The tool helped identify an extortionist in 2004 who was cutting phone and internet cables and demanding money from telecoms to stop. In 2007 it was used to unmask a teen who was e-mailing bomb threats to a high school in Washington state. And it’s been used in various other cases, ranging from hacker investigations to terrorism and foreign spying cases, all for the primary purpose of unmasking the IP address of targets who used anonymizing services to hide their identity and location.
It was apparently so popular that a federal prosecutor complained (.pdf) in 2002 that it was being used too much. “While the technique is of indisputable value in certain kinds of cases,” he wrote, “we are seeing indications that it is being used needlessly by some agencies, unnecessarily raising difficult legal questions (and a risk of suppression) without any countervailing benefit.” In other words, the more it got used, the more likely defense attorneys would learn about it and file legal objections to throw out evidence collected with it.
2012: Stepping Up the Hacking Game
But hacking surveillance targets one at a time is too time-consuming when a crime involves many suspects. So in 2012 the government borrowed a favorite trick of the criminal hacker trade: drive-by downloads, also known as watering hole attacks. These involve embedding spyware on a website where criminal suspects congregate so the computers of all visitors to the site get infected. It has become a favorite government tactic for unmasking visitors to child porn sites hosted with Tor Hidden Services, which can only be accessed using the Tor anonymizing browser, which conceals the real IP address of users. To infect suspect machines, the feds first gain control of servers hosting the sites, then embed their spyware in one of the site’s pages.
They apparently used a watering hole attack for the first time in Operation Torpedo, a sting operation aimed at unmasking anonymous visitors to three child porn sites hosted on servers in Nebraska in 2012.
They repeated the tactic in 2013 with Freedom Hosting, a provider of anonymous web hosting services that included child porn sites among its customers. In August that year after the FBI seized control of Freedom Hosting’s servers, all the sites the company hosted displayed a “Down for Maintenance” page with hidden Javascript code embedded in it. The code exploited a Firefox security hole to cause infected computers to reveal their real IP address to the FBI. There was just one problem with the tactic, however. Freedom Hosting wasn’t just hosting child porn sites; it also hosted legitimate businesses, and customers to those sites may have been infected too. It’s not known how many innocent bystanders may have been hooked in the hack, however, since the government has never revealed how the operation worked.
The FBI and international partners used a similar tactic last year to target more than 4,000 machines belonging to members and would-be members of the child porn site Playpen. The FBI, for its part, identified the real IP addresses of some 1,300 Playpen visitors, of which about 137 have been charged with crimes.
Big Questions Remain
For all that we now know about government hacking, there’s so much more that we still don’t know. For example, what exactly is the government doing with these tools? Are they just grabbing IP addresses and information from a computer’s registry? Or are they doing more invasive things—like activating the webcam to take pictures of anyone using a targeted machine, as they sought to do in a 2013 case? How are the tools tested to make sure they don’t damage the machines they infect? The latter is particularly important if the government installs any tool on the machines of botnet victims, as the recent Rule 41 changes suggest they might do.
Do investigators always obtain a search warrant to use the tools? If yes, do the spy tools remain on systems after the term of the search warrant ends or do the tools self-delete on a specified date? Or do the tools require law enforcement to send a kill command to disable and erase them? How often does the government use zero-day vulnerabilities and exploits to covertly slip their spyware onto systems? And how long do they withhold information about those vulnerabilities from software vendors so they can be exploited instead of patched?
The Justice Department has long insisted that its hacking operations are legal, done with search warrants and court supervision. But even operations done with court approval can raise serious questions. The case in 2007 of the teen who sent bomb threats is one example. In order to infect the teenage suspect’s computer, the FBI tricked him into downloading the spy tool by posting a malicious link (.pdf) to the private chat room of a MySpace account the teen controlled. The link was for a bogus Associated Press article purporting to be about the bomb threats.
The FBI didn’t disclose in its warrant affidavit that it planned to lure the suspect with a news article; that only came to light in FBI emails later obtained by the Electronic Frontier Foundation. The AP accused the feds of undermining its credibility and putting AP journalists and other newsgatherers around the world in danger by giving the appearance that the media outlet had worked in collusion with the government. There’s one other problem with the tactic as well—the potential spread of the malware. “The FBI may have intended this false story as a trap for only one person,” the AP added, in a letter to the Justice Department. “However, the individual could easily have reposted this story to social networks, distributing to thousands of people, under our name, what was essentially a piece of government disinformation.”
And then there’s the recent PlayPen sting, where for the two weeks the operation continued, the government allowed people visiting the site to download and share thousands of exploitive images and videos of toddlers and pre-teens, further victimizing the children and infants in those images.
“The public might want to know, how did the FBI figure out where on balance it’s worth it to run a child porn web site for two weeks, given some of what’s involved in the covert operations will essentially permit more child porn to be distributed. Someone has to make [those] calculations,” says Elizabeth Joh, a University of California Davis law professor who writes extensively about policing, technology and surveillance. “But we don’t know how that calculation is made.”
It’s not clear if Congress knows either.
Questions about how much law enforcement can participate in criminal behavior and disguise their identity in covert operations are not new in the offline world. “But there’s more urgency now because of the ways in which [online investigations] are becoming more complex, and we continue to have very little oversight,” she says. “What sort of oversight should there be when the FBI decides to impersonate real people, real institutions—particularly the media—and when it actually participates in the very illegal activity that it’s trying to stop? Should we really leave law enforcement to police themselves? That’s the question.”
Source link