Via security expert Bruce Schneier, the AP reports that police in central Connecticut obtained an arrest warrant partially on the timing of a murder victim's Fitbit step data:
Connecticut State Police allege [Richard] Dabate killed 39-year-old Connie Dabate at their Ellington home two days before Christmas in 2015, while their two young sons were in school.
Dabate told investigators a masked man shot his wife and tied him up before he burned the intruder with a torch. Authorities responded to a burglary alarm at the home and found Richard Dabate with superficial knife wounds, with one arm and one leg zip-tied to a folding chair.
But police said evidence contradicted Dabate's story and timeline of events, including information from Connie Dabate's Fitbit that showed she was still moving around the house an hour after Richard Dabate said she was shot.
Dabate pleaded not guilty to the crime. Also, the Fitibit data, while helpful to the police, may have had less impact than the allegation that "Dabate also told his pregnant girlfriend before the slaying that he was going to divorce his wife, state police said in an arrest warrant affidavit."
NBC has more.
A little busy today, so I'm putting these down for later consumption:
Now, I must prepare...for Whisky Fest!
Amazon is opening an actual brick-and-mortar bookstore right by the Southport Brown Line stop:
On Tuesday, it will open the doors of a brick-and-mortar store in Chicago's Lakeview neighborhood, giving customers a chance to test the e-commerce giant's take on offline shopping.
It's just one 6,000-square-foot neighborhood bookstore. But it's also one of Amazon's first experiments with live customer service and cash registers, and a sign that one of the retail industry's biggest disrupters may not be content to stick to e-commerce.
Amazon is still in the early days of its bookstore experiment. The first location opened in Seattle in late 2015, and the Chicago store, in the 3400 block of North Southport Avenue, will be Amazon's fifth, and first outside a mall. It opened briefly on Saturday as a test and is expected to start regularly scheduled hours Tuesday.
The question, of course, is "why?" I'm going to watch this space.
First, two unidentified have discovered malware on 38 Android devices that could only have been installed after manufacture but before distribution to retailers:
An assortment of malware was found on 38 Android devices belonging to two unidentified companies. This is according to a blog post published Friday by Check Point Software Technologies, maker of a mobile threat prevention app. The malicious apps weren't part of the official ROM firmware supplied by the phone manufacturers but were added later somewhere along the supply chain. In six of the cases, the malware was installed to the ROM using system privileges, a technique that requires the firmware to be completely reinstalled for the phone to be disinfected.
"This finding proves that, even if a user is extremely careful, never clicks a malicious link, or downloads a fishy app, he can still be infected by malware without even knowing it," Check Point Mobile Threat Researcher Daniel Padon told Ars. "This should be a concern for all mobile users."
Padon said it's not clear if the two companies were specifically targeted or if the infections were part of a broader, more opportunistic campaign. The presence of ransomware and other easy-to-detect malware seems to suggest the latter. Check Point also doesn't know where the infected phones were obtained. One of the affected parties was a "large telecommunications company" and the other was a "multinational technology company."
But malware and password stealing doesn't always need software. Sometimes it just needs a suspicious border guard:
Data provided by the Department of Homeland Security shows that searches of cellphones by border agents has exploded, growing fivefold in just one year, from fewer than 5,000 in 2015 to nearly 25,000 in 2016.
According to DHS officials, 2017 will be a blockbuster year. Five-thousand devices were searched in February alone, more than in all of 2015.
The more aggressive tactics of the past two years, two senior intelligence officials told NBC News, were sparked by a string of domestic incidents in 2015 and 2016 in which the watch list system and the FBI failed to stop American citizens from conducting attacks. The searches also reflect new abilities to extract contact lists, travel patterns and other data from phones very quickly.
But the officials caution that rhetoric about a Muslim registry and ban during the presidential campaign also seems to have emboldened federal agents to act more forcefully.
"The shackles are off," said Hugh Handeyside, a staff attorney with the ACLU's National Security Project. "We see individual officers and perhaps supervisors as well pushing those limits, exceeding their authority and violating people's rights."
Expect a lot of litigation and very unhappy travelers. Plus some other Fourth Amendment issues that go unreported.
Happy cell phoning!
Jeet Heer says no:
[T]he very nature of our modern world, and the United States’ supremacy, makes it impossible to dismiss an American president’s word. The U.S. is a nuclear-armed superpower, with a commander in chief who presides over the world’s largest economy. Millions of people all over the world pay careful attention to what a president says, making their own plans based on the words coming out of the White House—and they will continue to do so whether or not the press corps and political class in Washington somehow agree en masse to ignore Trump’s tweets.
“Toyota Motor said will build a new plant in Baja, Mexico, to build Corolla cars for U.S. NO WAY!” Trump tweeted in January. “Build plant in U.S. or pay big border tax.” Toyota’s stock promptly fell, as has the stock of other companies caught in Trump’s Twitter crosshairs. Because his tweets move markets, businesses are developing strategies for how to handle a presidential social media attack. There’s even an app that lets you know when Trump has tweeted negatively about a publicly traded company, so you can sell quickly if needed. Another company created a lightning-fast Twitter bot that automatically short sells such stocks. It’s called “Trump and Dump.”
“Mr. Trump’s Twitter posts, viewed with amazement outside the West Wing bubble, often create crises on the inside,” the Times reported. “That was never truer than when Mr. Trump began posting from his weekend retreat at his Mar-a-Lago estate in Florida shortly after sunrise on Saturday. His groggy staff realized quickly that this was no typical Trump broadside, but an allegation with potentially far-reaching implications that threatened to derail a coming week that included the rollout of his redrafted travel ban and the unveiling of the Republican plan to replace the Affordable Care Act.”
The more one watches this clown, the more one wonders just how much he's a genius, or, you know, something else?
The Finnish manufacturer is bringing back their 2000-era 3310:
Given the rising angst of a society run by technology, Nokia might have picked the perfect time to introduce an antidote to the smartphone. But even under today’s conditions, it is tempting to see the new Nokia 3310 merely as another example of retro nostalgia. Ha-ha, what if you could get a dumbphone instead? It would pair perfectly with a milk crate full of vinyl albums. But it’s also possible that the 3310 marks the start of a new period of technological mobility. One that offers a sense of how even the most entrenched technological habits might yet turn out differently.
It might be premature to announce the end of humanity’s love affair with the smartphone. But the relationship’s cracks are surely showing. Some have immediate consequence. Apps have contributed to a huge spike in traffic accidents and deaths, as more and more people attempt to operate finicky handheld devices while driving. The partial-reinforcement techniques baked into today’s apps and games has become more apparent to users, who seem increasingly resigned to services they also feel no option to quit. And the uniformity in design of devices has arrested their future potential. Every year another glass rectangle, affording no more or less than it promises, which is more of the same.
The smartphone’s conquest is definitive and complete. A decade after its form solidified, the contemporary citizen of the developed world has almost no choice but to own and operate one. And yet, the joy and the utility of doing so has declined, if not ceased entirely.
Hey, for $50 I might pick one up as a backup device, once they're offered in the U.S.
My new LG G5 is now a brick, so I'm back to my slightly-cracked G4.
Yesterday, the phone got hot, stopped responding to inputs, and rebooted itself twice in three hours. That's usually the sign of a runaway app. So upon turning it back on, I manually rebooted it to clear running apps (it auto-loads apps that were running when it resets), and all seemed fine.
Then sometime while I walked home from Wrigley it shut itself off completely and has not yet woken up.
Fortunately T-Mobile was able to move my SIM back to my old phone. Unfortunately the photos I took at Wrigley were on an encrypted SD card which is now unreadable because the decryption keys are hardware-based. (The whole point of the encryption scheme is to prevent an attacker from moving the data to a new phone.)
T-Mobile says I should have a replacement G5 by Monday.
The appeals court that is typically the last stop for regulatory disputes has ruled that the Internet is a utility:
The court’s decision upholds the F.C.C. on the declaration of broadband as a utility, the most significant aspect of the rules. That has broad-reaching implications for web and telecommunications companies and signals a shift in the government’s view of broadband as a service that should be equally accessible to all Americans, rather than a luxury that does not need close government supervision.
The ruling may open a path for new limits on broadband providers. Google and Netflix support net neutrality rules and have warned government officials that without regulatory limits, broadband providers would have an incentive to create business models that could harm consumers. They argue that broadband providers could degrade the quality of downloads and streams of online services to extract tolls from web companies or to promote unfairly their own competing services or the content of partners.
This is very good news to those of us worried about the dominance of carriers. There's not other way to solve the "last mile" problem, I think, than this, forcing your local telco or cable company to treat all Internet traffic equally. It's still subject to appeal to the Supreme Court; here's hoping they don't grant certiorari.
Canadian writers Pat Kelly, Peter Oldring, and Chris Kelly nail it:
Startup founder Tim Romeo decided to kill his startup right before they would have gotten a check for $500,000. Sounds crazy? No; he did the right thing:
[S]omething was wrong. It seemed trivial at first, but it bothered me. Despite glowing praise, our users were only using ContractBeast to create a small percentage of their total new contracts.
I spent the next two weeks visiting our beta users, looking over their shoulders as they worked, and listening to them explain how they planned on using the product. Pressing them directly on why they were not using ContractBeast to create all their contracts resulted in a lot of feature requests.
Now, talking with customers about features is tricky. Often you receive solid and useful ideas. Occasionally a customer will provide an insight that will change the way you look at your product. But most of the time, customers don’t really want the the features they are asking for. At least not very badly.
When users are unhappy but can’t explain exactly why, they often express that dissatisfaction as a series of tangential, trivial feature requests. ... These aren’t necessarily bad ideas, but they had nothing to do with why they were not using ContractBeast more extensively.
His blog post is good advice not just for startup founders, but for anyone writing software.