Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Hungary's Plans For Internet Tax On Hold After Protests

Soulskill posted about an hour ago | from the gigabit-off-more-than-they-could-chew dept.

The Internet 20

An anonymous reader writes: When news broke last week that the Hungarian government was planning to tax internet traffic at a rate of about 62 cents per gigabyte, people on the internet were outraged. But it went beyond that: there were protests in the streets in Hungary, and the European Union warned against the plan. Now, Hungarian Prime Minister Viktor Orban has put the plans on hold, saying, "This tax in its current form cannot be introduced." It's not completely dead — Orban has planned consultations over the next year to look for other ways to tax revenue generated over the internet.

Statisticians Study Who Was Helped Most By Obamacare

samzenpus posted 5 hours ago | from the looking-at-the-numbers dept.

United States 349

HughPickens.com writes We know that about 10 million more people have insurance coverage this year as a result of the Affordable Care Act but until now it has been difficult to say much about who was getting that Obamacare coverage — where they live, their age, their income and other such details. Now Kevin Quealy and Margot Sanger-Katz report in the NYT that a new data set is providing a clearer picture of which people gained health insurance under the Affordable Care Act. The data is the output of a statistical model based on a large survey of adults and shows that the law has done something rather unusual in the American economy this century: It has pushed back against inequality, essentially redistributing income — in the form of health insurance or insurance subsidies — to many of the groups that have fared poorly over the last few decades. The biggest winners from the law include people between the ages of 18 and 34; blacks; Hispanics; and people who live in rural areas. The areas with the largest increases in the health insurance rate, for example, include rural Arkansas and Nevada; southern Texas; large swaths of New Mexico, Kentucky and West Virginia; and much of inland California and Oregon.

Despite many Republican voters' disdain for the Affordable Care Act, parts of the country that lean the most heavily Republican (according to 2012 presidential election results) showed significantly more insurance gains than places where voters lean strongly Democratic. That partly reflects underlying rates of insurance. In liberal places, like Massachusetts and Hawaii, previous state policies had made insurance coverage much more widespread, leaving less room for improvement. But the correlation also reflects trends in wealth and poverty. Many of the poorest and most rural states in the country tend to favor Republican politicians.

Swedish Regulator Orders Last "Hold-Out" ISP To Retain Customer Data

samzenpus posted 7 hours ago | from the keeping-it-going dept.

Government 26

An anonymous reader writes Despite the death of the EU Data Retention Directive in April, and despite the country having taken six years to even begin to obey the ruling, the Swedish government, via its telecoms regulator, has forced ISPs to continue retaining customer data for law enforcement purposes. Now the last ISP retrenching on the issue has been told that it must comply with the edict or face a fine of five million krona ($680,000).

While providers all over Europe have rejoiced in not being obliged any longer to provide infrastructure to retain six months of data per customer, Sweden and the United Kingdom alone have insisted on retaining the ruling — particularly surprising in the case of Sweden, since it took six years to begin adhering to the Data Retention Directive after it was made law in 2006. Britain's Data Retention and Investigatory Powers bill, rushed through in July, actually widens the scope of the original EU order.

Charity Promotes Covert Surveillance App For Suicide Prevention

samzenpus posted yesterday | from the keeping-an-eye-on-things dept.

Privacy 70

VoiceOfDoom writes Major UK charity The Samaritans have launched an app titled "Samaritans Radar", in an attempt to help Twitter users identify when their friends are in crisis and in need of support. Unfortunately the privacy implications appear not to have been thought through — installing the app allows it to monitor the Twitter feeds of all of your followers, searching for particular phrases or words which might indicate they are in distress. The app then sends you an email suggesting you contact your follower to offer your help. Opportunities for misuse by online harassers are at the forefront of the concerns that have been raised, in addition; there is strong evidence to suggest that this use of personal information is illegal, being in contravention of UK Data Protection law.

Signed-In Maps Mean More Location Data For Google

timothy posted yesterday | from the this-time-tomorrow dept.

Google 35

mikejuk writes The announcement on the Google Geo Developers blog has the catchy title No map is an island. It points out that while there are now around 2 million active sites that have Google Maps embedded, they store data independently, The new feature, called attributed save, aims to overcome this problem by creating an integrated experience between the apps you use that have map content and Google Maps, and all it requires is that users sign in. So if you use a map in a specific app you will be able to see locations you entered in other apps.This all sounds great and it makes sense to allow users to take all of the locations that have previously been stored in app silos and put them all together into one big map data pool. The only down side is that the pool is owned by Google and some users might not like the idea of letting Google have access to so much personal geo information. It seems you can have convenience or you can have privacy. It might just be that many users prefer their maps to be islands.

Pirate Bay Founder Gottfrid Warg Faces Danish Jail Time

timothy posted yesterday | from the he-typed-like-a-one-armed-man dept.

Crime 79

Hammeh writes BBC news reports that Pirate Bay co-founder Gottfrid Warg has been found guilty of hacking into computers and illegally downloading files in Denmark. Found guilty of breaching security to access computers owned by technology giant CSC to steal police and social security files, Mr Warg faces a sentence of up to six years behind bars. Mr Warg argued that although the computer used to commit the offence was owned by him, the hacks were carried out by another individual who he declined to name.

Hacking Team Manuals: Sobering Reminder That Privacy is Elusive

timothy posted yesterday | from the legitimacy-generally-is-too dept.

Privacy 34

Advocatus Diaboli writes with a selection from The Intercept describing instructions for commercial spyware sold by Italian security firm Hacking Team. The manuals describe Hacking Team's software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers. With a few clicks of a mouse, even a lightly trained technician can build a software agent that can infect and monitor a device, then upload captured data at unobtrusive times using a stealthy network of proxy servers, all without leaving a trace. That, at least, is what Hacking Team's manuals claim as the company tries to distinguish its offerings in the global marketplace for government hacking software. (Here are the manuals themselves.)

Australian Gov't Tries To Force Telcos To Store User Metadata For 2 Years

timothy posted yesterday | from the authority-problem dept.

Australia 56

AlbanX writes The Australian Government has introduced a bill that would require telecommunications carriers and service providers to retain the non-content data of Australian citizens for two years so it can be accessed — without a warrant — by local law enforcement agencies. Despite tabling the draft legislation into parliament, the bill doesn't actually specify the types of data the Government wants retained. The proposal has received a huge amount of criticism from the telco industry, other members of parliament and privacy groups. (The Sydney Morning Herald has some audio of discussion about the law.)

MIT Professor Advocates Ending Asteroid Redirect Mission To Fund Asteroid Survey

samzenpus posted yesterday | from the identify-the-problem dept.

Space 107

MarkWhittington writes Professor Richard Binzel published a commentary in the journal Nature that called for two things. He proposed that NASA cancel the Asteroid Redirect Mission currently planned for the early 2020s. Instead, he would like the asteroid survey mandated by the George E. Brown, Jr. Near-Earth Object Survey Act of 2005, part of the 2005 NASA Authorization Act, funded at $200 million a year. Currently NASA funds the survey at $20 million a year, considered inadequate to complete the identification of 90 percent of hazardous near-Earth objects 140 meters or greater by 2020 as mandated by the law.

Labor Department To Destroy H-1B Records

samzenpus posted yesterday | from the removed-from-the-game dept.

Government 178

Presto Vivace writes H-1B records that are critical to research and take up a small amount of storage are set for deletion. "In a notice posted last week, the U.S. Department of Labor said that records used for labor certification, whether in paper or electronic, 'are temporary records and subject to destruction' after five years, under a new policy. There was no explanation for the change, and it is perplexing to researchers. The records under threat are called Labor Condition Applications (LCA), which identify the H-1B employer, worksite, the prevailing wage, and the wage paid to the worker. The cost of storage can't be an issue for the government's $80 billion IT budget: A full year's worth of LCA data is less than 1GB."

Secret Policy Allows GCHQ Bulk Access To NSA Data

samzenpus posted yesterday | from the have-some-data dept.

United Kingdom 93

hazeii writes Though legal proceedings following the Snowden revelations, Liberty UK have succeeded in forcing GCHQ to reveal secret internal policies allowing Britain's intelligence services to receive unlimited bulk intelligence from the NSA and other foreign agencies and to keep this data on a massive searchable databases, all without a warrant. Apparently, British intelligence agencies can "trawl through foreign intelligence material without meaningful restrictions", and can keep copies of both content and metadata for up to two years. There is also mention of data obtained "through US corporate partnerships". According to Liberty, this raises serious doubts about oversight of the UK Intelligence and Security Committee and their reassurances that in every case where GCHQ sought information from the US, a warrant for interception signed by a minister was in place.

Eric King, Deputy Director of Privacy international, said: "We now know that data from any call, internet search, or website you visited over the past two years could be stored in GCHQ's database and analyzed at will, all without a warrant to collect it in the first place. It is outrageous that the Government thinks mass surveillance, justified by secret 'arrangements' that allow for vast and unrestrained receipt and analysis of foreign intelligence material is lawful. This is completely unacceptable, and makes clear how little transparency and accountability exists within the British intelligence community."

Power and Free Broadband To the People

samzenpus posted 2 days ago | from the get-you-some-internet dept.

The Internet 254

NewYorkCountryLawyer writes Slashdot member and open source developer Ben Kallos @KallosEsq — who is now a NYC Councilman — is pushing to make it a precondition to Comcast's merging with Time Warner that it agree to provide free broadband to all public housing residents in the City (and by free I mean free as in beer). Kallos, along with NY's Public Advocate, Letitia James, is leading a group of state and local politicians calling on Comcast to help bridge the digital divide in NY.

Is the Outrage Over the FBI's Seattle Times Tactics a Knee-Jerk Reaction?

samzenpus posted 2 days ago | from the wait-a-second dept.

Crime 202

reifman writes The Internet's been abuzz the past 48 hours about reports the FBI distributed malware via a fake Seattle Times news website. What the agency actually did is more of an example of smart, precise law enforcement tactics. Is the outrage online an indictment of Twitter's tendency towards uninformed, knee-jerk reactions? In this age of unwarranted, unconstitutional blanket data collection by the NSA, the FBI's tactics from 2007 seem refreshing for their precision.

Hackers Breach White House Network

Soulskill posted 2 days ago | from the dozens-of-solitaire-games-compromised dept.

Government 98

wiredmikey writes: The White House's unclassified computer network was recently breached by intruders, a U.S. official said Tuesday. While the White House has not said so, The Washington Post reported that the Russian government was thought to be behind the act. Several recent reports have linked Russia to cyber attacks, including a report from FireEye on Tuesday that linked Russia back to an espionage campaign dating back to 2007. Earlier this month, iSight Partners revealed that a threat group allegedly linked with the Russian government had been leveraging a Microsoft Windows zero-day vulnerability to target NATO, the European Union, and various private energy and telecommunications organizations in Europe. The group has been dubbed the "Sandworm Team" and it has been using weaponized PowerPoint files in its recent attacks. Trend Micro believes the Sandworm team also has their eyes set on compromising SCADA-based systems.

Verizon Launches Tech News Site That Bans Stories On US Spying

Soulskill posted 2 days ago | from the pay-no-attention-to-the-man-behind-the-mirror dept.

Verizon 140

blottsie writes: The most-valuable, second-richest telecommunications company in the world is bankrolling a technology news site called SugarString.com. The publication, which is now hiring its first full-time editors and reporters, is meant to rival major tech websites like Wired and the Verge while bringing in a potentially giant mainstream audience to beat those competitors at their own game.

There's just one catch: In exchange for the major corporate backing, tech reporters at SugarString are expressly forbidden from writing about American spying or net neutrality around the world, two of the biggest issues in tech and politics today.

Open Consultation Begins On Italy's Internet Bill of Rights

Soulskill posted 2 days ago | from the do-it-right-so-we-can-steal-it dept.

The Internet 95

Anita Hunt (lissnup) writes: Hot on the heels of Brazil's recent initiative in this area, Italy has produced a draft [PDF] Declaration of Internet Rights, and on Monday opened the bill for consultation on the Civici [Italian] platform, a first in Europe. "[A]s it is now, it consists of a preamble and 14 articles that span several pages. Topics range from the 'fundamental right to Internet access' and Net Neutrality to the notion of 'informational self-determination.' The bill also includes provisions on the right to anonymity and tackles the highly debated idea of granting online citizens a 'right to be forgotten.' Measures are taken against algorithmic discriminations and the opacity of the terms of service devised by 'digital platform operators' who are 'required to behave honestly and fairly' and, most of all, give 'clear and simple information on how the platform operates.'"

Help a Journalist With An NFC Chip Implant Violate His Own Privacy and Security

Soulskill posted 2 days ago | from the what-could-possibly-go-wrong dept.

Privacy 137

An anonymous reader writes: His wife thinks he's crazy, but this guy got an NFC chip implanted in his arm, where it will stay for at least a year. He's inviting everyone to come up with uses for it. Especially ones that violate his privacy and security. There must be something better to do than getting into the office or unlocking your work PC.

He says, "The chip we are using is the xNTi, an NFC type 2 NTAG216, which is about the size of a grain of rice and is manufactured by the Dutch semiconductor company NXP, maker of the NFC chip for the new iPhone. It is a glass transponder with an operating frequency of 13.56MHz, developed for mass-market applications such as retail, gaming and consumer electronics. ... The chip's storage capacity is pretty limited, the UID (unique identifier) is 7 bytes, while the read/write memory is 888 bytes. It can be secured with a 32-bit password and can be overwritten about 100,000 times, by which point the memory will be quite worn. Data transmission takes place at a baud rate of 106 kbit/s and the chip is readable up to 10 centimeters, though it is possible to boost that distance."

Tech Giants Donate $750 Million In Goods and Services To Underprivileged Schools

Soulskill posted 2 days ago | from the go-big-or-go-home dept.

Education 140

mrspoonsi sends news that a group of major tech companies has combined to donate $750 million worth of gadgets and services to students in 114 schools across the U.S. Apple is sending out $100 million worth of iPads, MacBooks, and other products. O'Reilly Media is making $100 million worth of educational content available for free. Microsoft and Autodesk are discounting software, while Sprint and AT&T are offering free wireless service. This is part of the ConnectED Initiative, a project announced by the Obama Administration last year to bring modern technology to K-12 classrooms. The FCC has also earmarked $2 billion to improve internet connectivity in schools and libraries over the next two years. Obama also plans to seek funding for training teachers to utilize this infusion of technology.

US Post Office Increases Secret Tracking of Mail

Soulskill posted 2 days ago | from the enjoy-all-those-circulars dept.

Privacy 108

HughPickens.com writes: Ron Nixon reports in the NY Times that the United States Postal Service says it approved nearly 50,000 requests last year from law enforcement agencies and its own internal inspection unit to secretly monitor the mail of Americans for use in criminal and national security investigations, in many cases without adequately describing the reason or having proper written authorization. In addition to raising privacy concerns, the audit questioned the efficiency and accuracy of the Postal Service in handling the requests. The surveillance program, officially called mail covers, is more than a century old, but is still considered a powerful investigative tool. The Postal Service said that from 2001 through 2012, local, state and federal law enforcement agencies made more than 100,000 requests to monitor the mail of Americans. That would amount to an average of some 8,000 requests a year — far fewer than the nearly 50,000 requests in 2013 that the Postal Service reported in the audit (PDF).

In Arizona in 2011, Mary Rose Wilcox, a Maricopa County supervisor, discovered that her mail was being monitored by the county's sheriff, Joe Arpaio. Wilcox had been a frequent critic of Arpaio, objecting to what she considered the targeting of Hispanics in his immigration sweeps. Wilcox sued the county, was awarded nearly $1 million in a settlement in 2011 and received the money this June when the Ninth Circuit Court of Appeals upheld the ruling. Andrew Thomas, the former county attorney, was disbarred for his role in investigations into the business dealings of Ms. Wilcox and other officials and for other unprofessional conduct. "I don't blame the Postal Service," says Wilcox, "but you shouldn't be able to just use these mail covers to go on a fishing expedition. There needs to be more control."

Slashdot Login

Need an Account?

Forgot your password?