Blog Archives

Twitter Makes Its I.P.O. Plans Known

Twitter has taken the cover off its initial public offering, making public its prospectus and setting the clock on one of the most anticipated stock sales of the year, Vindu Goel and Michael J. de la Merced report.

Twitter’s prospectus — whose filing was initially disclosed in a 135-character post on its own service last month — offers the fullest look yet at the privately held company. But while its growth is as high as had been anticipated in some ways, the document reflects a company that is still relatively small compared to its rivals.

Based on an internal valuation of its shares from Aug. 5, Twitter is worth about $9.7 billion.

India Flooding World with Tainted Drugs, and Getting Away with It

Each time we take medicine, we assume that the manufacturer did its best to produce a quality product. Evidence is mounting, however, that some pharmaceutical manufacturers in countries like India cut corners and send low-quality products to major, developed markets. Worse still, they may have separate production lines for drugs they sell in developing markets like Africa, where poor quality is more likely to go unnoticed.

In mid-2013, India’s largest drugmaker, Ranbaxy, pleaded guilty in a U.S. court to several criminal offenses relating to the fraudulent manufacture and sale of adulterated drugs. (The United States is the biggest importer of generic Indian drugs.) Among other revelations, Ranbaxy’s executives acknowledged that “more than 200 products in more than 40 countries” are affected by “elements of data that were fabricated to support [Ranbaxy’s] business needs.” In other words, Ranbaxy made up facts and figures to demonstrate product safety for myriad drugs, including critical HIV medicines paid for by U.S. tax dollars and destined for the poor in Africa. As a consequence, the company was fined $500 million.

Meet Abu Omar: Al Qaeda Busted Him Out of Abu Ghraib. Now He Fights in Syria

Waiting for the tram in the southern Turkish city of Gaziantep, Abu Omar is on his way to the mall. No groceries today, his shopping list includes a Turkish-made tablet computer and a small GPS navigation device loaded with digital maps of the Middle East.

“It’s nothing special,” says Abu Omar, an Iraqi national, as he puts the goods in his rucksack. “But this stuff might come in handy after I make it to Syria.”

Abu Omar, a handsome young man with long black hair, is not the only one making the trek to Syria. Hundreds of Iraqi prisoners, mostly suspected or convicted jihadists, were freed in July after al Qaeda-linked militants staged a deadly jailbreak at the notorious Abu Ghraib prison near Baghdad. At the time, Iraqi and Western authorities feared that some of those men would travel to Syria, helping to fuel the rise of extremist groups there. Those fears have now become a reality.

Shabaab Plot to Attack London Planned to be ‘Similar to…Mumbai’

A document found after Somali troops killed Fazul Abdullah Mohammed, al Qaeda’s former leader in East Africa and a senior Shabaab commander, details a plot to conduct multiple Mumbai-like attacks that target civilians in London. The plot highlights how al Qaeda and Shabaab seek to strike civilian targets outside Somalia, and foreshadowed Shabaab’s attack on the Eastgate Mall in Kenya this week.

The document and several others found in Fazul’s possession after he was killed by Somali troops at a checkpoint in Mogadishu in June 2011 were obtained by the Toronto Star. A copy of the document was also obtained by The Long War Journal. The Canadian newspaper reported that “dozens of documents, Internet frame grabs and media reports in English, Arabic, Somali and Swahili, along with more than 50 video clips” were also found in Fazul’s car.

Google Alters Search Algorithm to Handle More Complex Queries

Google on Thursday announced one of the biggest changes ever to its search engine, a rewriting of its algorithm to handle more complex queries that affects 90 percent of all searches.

The change represents a new approach to search for Google and required the biggest changes to the company’s search algorithm since 2000. Now, the world’s most popular search engine will focus more on trying to understand the meanings of things and the relationships among them, as opposed to the company’s original strategy of matching keywords.

The company made the changes, executives said, because Google users are asking increasingly long and complex questions and they are searching Google more often on mobile phones with voice search.

Google’s Gmail Keyword Scanning Might Violate Wiretap Law, Judge Finds

A federal judge today found that Google may have breached federal and California wiretapping laws for machine-scanning Gmail messages as part of its business model to create user profiles and provide targeted advertising.

The decision by U.S. District Judge Lucy Koh was rendered in a proposed class-action alleging Google wiretaps Gmail as part of its business model. Google sought to have the federal case in California dismissed under a section of the Wiretap Act that authorizes email providers to intercept messages if the interception facilitated the message’s delivery or was incidental to the functioning of the service in general.

Are You Looking at An Official Shabaab Twitter Account?

Not long after Shabaab took responsibility for the Westgate mall attack, Twitter shut down the terror group’s official account. Although Twitter has acted against Shabaab’s accounts a couple times in the past, it had never done so while the jihadist group was live-tweeting one of its attacks.

As in the previous instances, Shabaab quickly returned to the social media platform to spew its hate and propaganda. At the same time, copycat accounts emerged, which led to false reporting and a bit of confusion for observers not used to following the al Qaeda affiliate on Twitter.

Google Begs Court to Reconsider Ruling That Wi-Fi Sniffing Is Wiretapping

Google is asking a federal appeals court to reconsider a recent ruling finding Google potentially liable for wiretapping when it secretly intercepted data on open Wi-Fi routers.

The Mountain View-based company said the September 10 decision by the 9th U.S. Circuit Court of Appeals will create “confusion” (.pdf) about which over-the-air signals are protected by the Wiretap Act, including broadcast television.

The case concerns nearly a dozen combined lawsuits seeking damages from Google for eavesdropping on open Wi-Fi networks from its Street View mapping cars. The vehicles, which rolled through neighborhoods around the world, were equipped with Wi-Fi–sniffing hardware to record the names and MAC addresses of routers to improve Google location-specific services. But the cars also gathered snippets of content.

The search giant petitioned the San Francisco-based appeals court to reconsider its decision that allowed the case to proceed at trial — a ruling that upended Google’s defense.

Google claimed it is was legal to intercept data from unencrypted, or non-password-protected Wi-Fi networks. Google said open Wi-Fi networks are “radio communications” like AM/FM radio, citizens’ band and police and fire bands, and are “readily accessible” to the general public and exempt from the Wiretap Act — a position the appeals court rejected.

Shabaab Threatens ‘Big Surprise’ As Siege at Kenyan Mall Continues

Shabaab-tweet-big-surprise.jpg

As Shabaab fighters continue to hold out inside the Westgate Mall in Kenya for the fourth day after assaulting the upscale shopping center on Saturday, the al Qaeda group’s media arm on Twitter threatened that a “big surprise” was in store for Kenyans. Shabaab released the following statement on Twitter just minutes ago:

The Kenyan govt and FM haven’t the faintest idea of what’s going on inside #Westgate mall. Rest assured, Kenyans are in for a big surprise!

The group did not detail the nature of the “big surprise” (or it wouldn’t be a surprise), but previous tweets over the past few hours indicate that the members of the assault team are holding their ground, despite claims from Kenyan officials last night that the mall has been secured, and the team still has hostages.

How a Crypto ‘Backdoor’ Pitted the Tech World Against the NSA

In August 2007, a young programmer in Microsoft’s Windows security group stood up to give a five-minute turbo talk at the annual Crypto conference in Santa Barbara.

It was a Tuesday evening, part of the conference’s traditional rump session, when a hodge-podge of short talks are presented outside of the conference’s main lineup. To draw attendees away from the wine and beer that competed for their attention at that hour, presenters sometimes tried to sex up their talks with provocative titles like “Does Bob Go to Prison?” or “How to Steal Cars – A Practical Attack on KeeLoq” or “The Only Rump Session Talk With Pamela Anderson.”

Dan Shumow and his Microsoft colleague Niels Ferguson titled theirs, provocatively, “On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng.” It was a title only a crypto geek would love or get.