We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
mrspoonsi sends this news from the Washington Post: "A report by the Senate Intelligence Committee concludes that the CIA misled the government and the public about aspects of its brutal interrogation program for years — concealing details about the severity of its methods, overstating the significance of plots and prisoners, and taking credit for critical pieces of intelligence that detainees had in fact surrendered before they were subjected to harsh techniques. The report, built around detailed chronologies of dozens of CIA detainees, documents a long-standing pattern of unsubstantiated claims as agency officials sought permission to use — and later tried to defend — excruciating interrogation methods that yielded little, if any, significant intelligence, according to U.S. officials who have reviewed the document. ... At the secret prison, Baluchi endured a regime that included being dunked in a tub filled with ice water. CIA interrogators forcibly kept his head under the water while he struggled to breathe and beat him repeatedly, hitting him with a truncheon-like object and smashing his head against a wall, officials said. As with Abu Zubaida and even Nashiri, officials said, CIA interrogators continued the harsh treatment even after it appeared that Baluchi was cooperating."
Charliemopps writes: "According to Director of National Intelligence, James Clapper, 'There have been queries, using U.S. person identifiers, of communications lawfully acquired to obtain foreign intelligence targeting non-U.S. persons reasonably believed to be located outside the United States. These queries were performed pursuant to minimization procedures approved by the Fisa court and consistent with the statute and the fourth amendment.' Basically, if you communicated with someone that is 'reasonably believed' to be a terrorist, you've lost constitutional protection against searches without a warrant, according to the NSA."
Chester Wisniewski's nakedsecurity describes Wisniewski's specialty thus: "He provides advice and insight into the latest threats for security and IT professionals with the goal of providing clear guidance on complex topics." So he's obviously someone who might know a little about preventing future Target-style security debacles. We've also interviewed tech journalist Wayne Rash about this topic, and will probably interview another security expert or two. Many Slashdot users may find all this credit card security talk boring, but for those who handle security matters for a living, especially for retailers, it's vital information. So here's Tim Lord talking with Chet, who is a recognized security expert for Sophos, one of the big dogs in the IT security field, when Chet was in Texas for the latest iteration of Security B-Sides in Austin. (Alternate video link.)
concertina226 (2447056) writes with this excerpt from IBTimes: "Apple has been granted a patent for interchangeable camera lenses — which could be used on the up-coming iPhone 6. The application was granted by the US Patent and Trademark Office in remarkably quick time, according to Patently Apple. Patent No. 8,687,299 has been granted to Apple today for 'Bayonet attachment mechanisms,' i.e. a bayonet mount that is able to securely attach lenses to an iOS device, such as an iPhone, iPod touch or iPad. A bayonet mount is a fastening mechanism which is typically seen on cameras, used to attach lenses to the camera body. At the moment, there is no adjustable camera lens system in existence for smartphones, although there are lots of third party macro lens products that consumers can buy to clip onto their smartphone."
itwbennett (1594911) writes "U.S. District Judge Lucy H. Koh on Sunday overruled Samsung Electronics' objections to showing jurors a recent instructional video on how patents work, ahead of a trial in a patent dispute between Apple and Samsung. The new video, called 'The Patent Process: An Overview for Jurors,' was developed by the Federal Judicial Center to provide jurors with an introduction to the patent system. Samsung's objection is to several scenes in which Apple products are depicted and used (and, by extension, seen as patentable and innovative)."
walterbyrd (182728) writes "The case, Alice Corp. v. CLS Bank International, poses huge risks for both sides. If the court upholds the patent or rules only narrowly against it without affecting most others, the problem of too many patents — and patent lawsuits — will continue. In that case, Justice Stephen Breyer said, future competition could move from price and quality to 'who has the best patent lawyer.'"
Lasrick (2629253) writes "This NYT adaptation from the book provides an in-depth and infuriating look at how the stock market is rigged. Brad Katsuyama of the Royal Bank of Canada couldn't understand why stock he was trying to buy would suddenly vanish: 'Before RBC acquired this supposed state-of-the-art electronic-trading firm, Katsuyama's computers worked as he expected them to. Suddenly they didn't. It used to be that when his trading screens showed 10,000 shares of Intel offered at $22 a share, it meant that he could buy 10,000 shares of Intel for $22 a share. He had only to push a button. By the spring of 2007, however, when he pushed the button to complete a trade, the offers would vanish.' The ensuing investigation by Katsuyama led him to design a program that actually slowed down the trades. But Katsuyama's investigation revealed so much about how the system is rigged."
colinneagle (2544914) writes "Apple, Google, and a slew of other high-tech firms are currently embroiled in a class-action lawsuit on allegations that they all adhered to tacit anti-poaching agreements. With that case currently ongoing, we've seen a number of interesting executive emails come to light, including emails showing that Steve Jobs threatened Palm's CEO with a full-fledged legal assault if the company kept going after Apple engineers. There is also correspondence between Sergey Brin, Marissa Mayer, Facebook's Sheryl Sandberg, and Google's Jonathan Rosenberg discussing the threat that Google saw in Facebook hiring its engineers. The discussion elevates, with Sandberg pointing out the hypocrisy of Google growing to prominence by hiring engineers from major Silicon Valley firms. Rosenberg then hints at the potential for a 'deeper relationship' that Google would be willing to reach as long as Facebook stops hiring its engineers, going so far as to tell Sandberg to 'fix this problem.'"
Rambo Tribble (1273454) writes "Reuters is reporting that the U.S. National Security Agency managed to have security firm RSA adopt not just one, but two security tools, further facilitating NSA eavesdropping on Internet communications. The newly discovered software is dubbed 'Extended Random', and is intended to facilitate the use of the already known 'Dual Elliptic Curve' encryption software's back door. Researchers from several U.S. universities discovered Extended Random and assert it could help crack Dual Elliptic Curve encrypted communications 'tens of thousands of times faster'."
First time accepted submitter Nodsnarb (2851527) writes "The UN's international Court of Justice (ICJ) has ruled that Japan's Antarctic whaling program is not for scientific purposes. In a statement, the court said that Japan's programme involved activities which 'can broadly be characterised as scientific research.' However, it said that 'the evidence does not establish that the programme's design and implementation are reasonable in relation to achieving its stated objectives.' It added: 'The court concludes that the special permits granted by Japan for the killing, taking and treating of whales in connection with JARPA II are not 'for purposes of scientific research' pursuant to [the International Convention for the Regulation of Whaling].'"
Advocatus Diaboli (1627651) writes "This weekend a small corner of the Internet exploded with concern that Dropbox was going too far, actually scanning users' private and directly peer-shared files for potential copyright issues. What's actually going on is a little more complicated than that, but shows that sharing a file on Dropbox isn't always the same as sharing that file directly from your hard drive over something like e-mail or instant messenger. The whole kerfuffle started yesterday evening, when one Darrell Whitelaw tweeted a picture of an error he received when trying to share a link to a Dropbox file with a friend via IM. The Dropbox web page warned him and his friend that 'certain files in this folder can't be shared due to a takedown request in accordance with the DMCA.'"
An anonymous reader writes "Recording private conversations or activities using Google's Glass eyewear or similar wearable technologies without consent could become illegal under a push to overhaul Australian state and federal privacy laws. From the article: 'The Australian Law Reform Commission discussion paper, released on Monday morning, recommended 47 legislative changes aimed at updating existing privacy laws for the digital age. It proposed the government introduce a statutory cause of action for a serious invasion of one’s privacy, in what would be the first time a person’s privacy has legally been protected in Australia. It also recommended harmonising rules for using technology to monitor and record authors, which are currently legislated by state governments, to deal with the implications of new technologies such as wearable devices and drones.'"
time_lords_almanac (3527081) writes "BlackBerry is trying to put the kibosh on the Typo, a physical keyboard attachment for iPhone. And they've won the first round, in the form of a sales ban on the attachment. From the article: '"BlackBerry is pleased that its motion for a preliminary injunction against Typo Products LLC was granted. This ruling will help prevent further injury to BlackBerry from Typo's blatant theft of our patented keyboard technology," a spokeswoman for BlackBerry told the news agency in an email.'"
Hugh Pickens DOT Com (2995471) writes "The Guardian reports that a million jars of peanut butter are going to be dumped in a New Mexico landfill and bulldozed over after retailer Costco refused to take shipment of the peanut butter and declined requests to let it be donated to food banks or repackaged or sold to brokers who provide food to institutions like prisons. The peanut butter comes from a bankrupt peanut-processing plant that was at the heart of a salmonella outbreak in 2012 and although 'all parties agreed there's nothing wrong with the peanut butter from a health and safety issue,' court records show that on a 19 March conference call Costco said 'it would not agree to any disposition ... other than destruction.'
The product was tested extensively and determined to be safe. Costco initially agreed to allowing the peanut butter to be sold, but rejected it as 'not merchantable' because of leaking peanut oil. So instead of selling or donating the peanut butter, with a value estimated at $2.6m, the estate is paying about $60,000 to transport 950,000 jars – or about 25 tons – to the Curry County landfill in Clovis, where public works director Clint Bunch says it 'will go in with our regular waste and covered with dirt'. Despite the peanut butter being safe, Curry County landfill employee Tim Stacy says that no one will be able to consume the peanut butter once it's dumped because it will be immediately rolled over with a bulldozer, destroying the supply. Stacy added more trash will then be dumped on top of the pile. Sonya Warwick, spokeswoman for New Mexico's largest food bank, declined to comment directly on the situation, but she noted that rescued food accounted for 74% of what Roadrunner Food Bank distributed across New Mexico last year. 'Access to rescued food allows us to provide a more well-rounded and balanced meal to New Mexicans experiencing hunger.'"
Rambo Tribble (1273454) writes "Reuters reports that Mt. Gox employees began to question the handling of funds at least two years ago. Although only CEO Mark Karpeles had full access to financial records, a group of a half-dozen employees began to suspect client funds were being diverted to cover operating costs, which included Karpeles' toys, such as a 'racing version of the Honda Civic imported from Britain.' Employees confronted Karpeles in early 2012, only to be given vague assurances with a 'pay no attention to the man behind the curtain' ring. Unfortunately, since Mt. Gox was not regulated as a financial institution under Japanese law, it is unclear what recourse might be gained in pursuing this question."
hackingbear writes: "In China, censorship is not just about politics; it's also a vibrant business. Police in Beijing have detained at least ten people, including employees at web giant Baidu and a web censor working at the Beijing Municipal Public Security Bureau (cached version), over allegations that they deleted defamatory online posts about companies and government enterprises in return for money, the Beijing News reports. The case was first surfaced when Baidu noticed and reported several of its workers' illegal activities. From 2010 to 2012, Gu, an ex-Baidu employee, is believed to have deleted over 2,000 posts on Baidu, 500 on news site Sohu and 20 posts on qianlong.com, with over 2 million yuan ($322,000) reportedly changing hands. While Gu can delete negative Internet posts for topics ranging from environmental issues to product quality problems on behalf of companies, he could not delete posts relating to his government clients. So he paid and asked Liu, a Beijing Municipal Public Security Bureau web censor, to issue official orders to the web sites to remove the posts (Google translation of Chinese original). Liu was found to have accepted 770,000 yuan ($124,000) from Gu for deleting posts. He also received 150,000 yuan ($24,000) from other sources."
theodp writes: "PandoDaily's Mark Ames reports that U.S. District Judge Lucy Koh has denied the final attempt by Apple, Google, Intel, and Adobe to have the class action lawsuit over hiring collusion practices tossed. The wage fixing trial is slated to begin on May 27. 'It's clearly in the defendants' interests to have this case shut down before more damaging revelations come out,' writes Ames. (Pixar, Intuit and LucasFilm have already settled.) The wage fixing cartel, which allegedly involved dozens of companies and affected one million employees, also reportedly affected innovation. 'One the most interesting misconceptions I've heard about the "Techtopus" conspiracy,' writes Ames of Google's agreement to cancel plans for an engineering center in Paris after Jobs expressed disapproval, 'is that, while these secret deals to fix recruiting were bad (and illegal), they were also needed to protect innovation by keeping teams together while avoiding spiraling costs.' Ames adds, 'In a field as critical and competitive as smartphones, Google's R&D strategy was being dictated, not by the company's board, or by its shareholders, but by a desire not to anger the CEO of a rival company.'"
Advocatus Diaboli sends this news from Der Spiegel: "Documents show that Britain's GCHQ intelligence service infiltrated German Internet firms and America's NSA obtained a court order to spy on Germany and collected information about the chancellor in a special database. Is it time for the country to open a formal espionage investigation? ... A secret NSA document dealing with high-ranking targets has provided further indications that Merkel was a target. The document is a presentation from the NSA's Center for Content Extraction, whose multiple tasks include the automated analysis of all types of text data. The lists appear to contain 122 country leaders. Twelve names are listed as an example, including Merkel's."
An anonymous reader writes "Reuters reports: 'A federal judge in New York granted class certification on Friday to a group of consumers who sued Apple Inc for conspiring with five major publishers to fix e-book prices in violation of antitrust law....The plaintiffs are seeking more than $800 million in damages.' The trial will probably be in July or September. The judge who granted class certification, Denise Cote, ruled in 2013 that Apple was guilty of colluding with other publishers to raise the price of e-books and to force Amazon.com to do the same."
mdsolar (1045926) writes "James Schlesinger, who served as Secretary of Defense under Presidents Nixon and Ford and as the first Secretary of Energy under President Carter, passed away on Thursday in Baltimore at the age of 85. Schlesinger is perhaps the most technocratic person to reach such high office. He had a keen awareness of the connection between energy supply and national defense and as Administrator of the Economic Regulatory Administration, brought our Standby Gasoline Rationing Plan into existence. The existence of such a plan along with our Strategic Petroleum Reserve, which Schlesinger also brought into being, have been a bulwark against further oil embargoes and essentially broke OPEC for a period of more than a decade. The NYT has an obituary that covers more of his career."
An anonymous reader writes "Microsoft took some much-deserved flack last week for admitting they examined the emails of a Hotmail user who received some leaked Windows 8 code. The company defended their actions at the time. Now, after hearing the backlash, Microsoft General Counsel Brad Smith says they will not do so in the future. Instead, they'll refer it to law enforcement. He wrote, 'It's always uncomfortable to listen to criticism. But if one can step back a bit, it's often thought-provoking and even helpful. That was definitely the case for us over the past week. Although our terms of service, like those of others in our industry, allowed us to access lawfully the account in this case, the circumstances raised legitimate questions about the privacy interests of our customers. ...As a company we've participated actively in the public discussions about the proper balance between the privacy rights of citizens and the powers of government. We've advocated that governments should rely on formal legal processes and the rule of law for surveillance activities. While our own search was clearly within our legal rights, it seems apparent that we should apply a similar principle and rely on formal legal processes for our own investigations involving people who we suspect are stealing from us.'"
Daniel_Stuckey writes: "You might remember House Intelligence Chair Mike Rogers, a Republican from Michigan, from his lovely, universally-hated CISPA cybersecurity bill that would have allowed nearly seamless information sharing between companies and the federal government. You might also remember him from his c'est la vie attitude towards civil liberties in general. Well, we've got some good news and some bad news: Rogers announced today that he won't seek re-election and is instead retiring from politics to start a conservative talk radio show on Cumulus. The bad news? He's got at least one terrible, civil liberties-killing bill to try to push through Congress before he goes. Like CISPA, the newly introduced 'FISA Transparency and Modernization Act,' seeks to make it easier for the federal government to get your information from companies."
coondoggie writes "By all accounts, many of the massive data breaches in the news these days are first revealed to the victims by law enforcement: the Secret Service and Federal Bureau of Investigation. But how do the agencies figure it out before the companies know they have been breached, especially given the millions companies spend on security and their intense focus on compliance? The agencies do the one thing companies don't do. They attack the problem from the other end by looking for evidence that a crime has been committed. Agents go undercover in criminal forums where stolen payment cards, customer data and propriety information are sold. They monitor suspects and sometimes get court permission to break into password-protected enclaves where cyber-criminals lurk."
An anonymous reader writes "In February, Judge William Alsup ruled in favor of Rahinah Ibrahim, who sued the U.S. government in 2006 after she was mistakenly added to the no-fly list and subsequently denied entry to the country. Now, the Department of Justice has finally decided it won't appeal the ruling, making Ibrahim the first person to challenge the list at trial and get herself removed. 'But Ibrahim's case, as just one of hundreds of thousands of individuals who have been placed on such lists, shows the system's opacity. First, the only surefire way to even determine if one is on such a list in the U.S. is to attempt to board a flight and be denied. Even after that happens, when a denied person inquires about his or her status, the likely response will be that the government "can neither confirm nor deny" the placement on such lists. The government's surrender in Ibrahim comes on the heels of a new report by the American Civil Liberties Union that shows just how insanely difficult it is to contest one's status on the government blacklists (PDF).'"
jfruh writes: "You will probably not be surprised to learn that Chinese search giant Baidu censors a wide range of content, particularly political material deemed to be pro-democracy — and does so for users everywhere, not just in China. A group of activists filed suit against Baidu in New York for violating free speech laws, but the judge in the case declared (PDF) that, as a private entity in the United States, Baidu has the right to provide whatever kind of search results it wants, even for political reasons."
Advocatus Diaboli writes with news about the DOJ's push to make it easier to get warrants to hack suspected cyber-criminals. "The U.S. Department of Justice is pushing to make it easier for law enforcement to get warrants to hack into the computers of criminal suspects across the country. The move, which would alter federal court rules governing search warrants, comes amid increases in cases related to computer crimes. Investigators say they need more flexibility to get warrants to allow hacking in such cases, especially when multiple computers are involved or the government doesn't know where the suspect's computer is physically located."
concertina226 (2447056) writes "Chinese authorities have detained a total of 1,530 suspects in a crackdown on spam SMS text messages being sent out by illegal telecoms equipment, according to Chinese news agency ECNS. Over 2,600 fake mobile base stations were seized and 24 sites manufacturing illegal telecoms equipment shut down as part of a massive nationwide operation involving nine central government and Communist Party of China departments. A report released by Trend Micro this month looked into the telecoms equipment black market in China (PDF) and found that cybercriminals routinely use either a GSM modem, an internet short message gateway and an SMS server to send out spam messages. On the underground market, SMS servers come in 'all-in-one' packages that include a laptop, a GSM mobile phone, an SMS server, an antenna to send out the fake signal and a USB cable, all for RMB 45,000 (£4,355)."
_xeno_ (155264) writes "Mozilla recently named a new CEO, Brendan Eich, and as commentators in that article noted, there could be some backlash over his private contributions to political campaigns. Well, it turns out that they were correct, and despite a statement from Brendan Eich pledging to continue Mozilla's inclusiveness, some Mozilla employees are calling for him to step down. Should private beliefs be enough to prevent someone from heading a project they helped found?"
wiredmikey writes: "Russian government officials have swapped their iPads for Samsung tablets to ensure tighter security, the telecoms minister told news agencies on Wednesday. Journalists spotted that ministers at a cabinet meeting were no longer using Apple tablets, and minister Nikolai Nikiforov confirmed the changeover "took place not so long ago." He said the ministers' new Samsungs were "specially protected devices that can be used to work with confidential information." This isn't the first time Russian powers have had concerns over mobile. In August 2012, Russia unveiled a prototype tablet with its own "almost Android" mobile OS that has the remarkably familiar feel of an Android but with bolstered encryption. In an even more paranoid move, this past July a Russian state service in charge of safeguarding Kremlin communications was looking to purchase an array of old-fashioned typewriters to prevent leaks from computer hardware."
jonklinger (1166633) writes "A class action lawsuit was brought against Waze (a community-based traffic and navigation app), claiming that their source code and map data were licensed to Waze by the community under the GPL. The plaintiff, Roey Gorodish, requests a copy of the recent source code and map data. This is (as far as I know) the first ever GPL class action suit, too bad it will be quashed by bad facts later as I see it." Google seems to do a credible translation of this source article.
schwit1 (797399) writes "A Minnesota school district has agreed to pay $70,000 to settle a lawsuit that claimed school officials violated a student's constitutional rights by viewing her Facebook and email accounts without permission. The lawsuit, filed in 2012 by the American Civil Liberties Union of Minnesota, alleged that Riley Stratton, now 15, was given detention after posting disparaging comments about a teacher's aide on her Facebook page, even though she was at home and not using school computers. After a parent complained about the Facebook chat, the school called her in and demanded her password. With a sheriff deputy looking on, she complied, and they browsed her Facebook page in front of her, according to the report. 'It was believed the parent had given permission to look at her cellphone,' Minnewaska Superintendent Greg Schmidt said Tuesday. But Schmidt said the district did not have a signed consent from the parent. That is now a policy requirement, he said.'" Asks schwit1, "How is this not a violation of the CFAA?" It sounds like the school was violating Facebook's Terms of Service, too.
jfruh (300774) writes "The latest developments in the sad saga of Mt. Gox's missing bitcoins: the exchange has announced that it's working with Japanese police to try to determine who (if anyone) stole the bitcoins entrusted to Mt. Gox, resulting in the company's collapse. There are serious doubts as to Japanese law enforcement's abilities to deal with the technical issues involved. Meanwhile, Mt. Gox creditors [have rejected] Mt. Gox CEO Mark Karpeles offer to testify in their lawsuit against him from Taiwan, and have demanded that he come to the United States."
Daniel_Stuckey (2647775) writes "The FBI is intercepting the prison correspondence of infamous Internet troll Andrew "weev" Auernheimer, including letters from his defense team, according to his attorney. 'He's sent me between 10 and 20 letters in the last month or two. I've received one,' Tor Ekeland, who had just returned from visiting Auernheimer at the federal corrections institute in Allenwood, PA., told the Daily Dot in a video interview.
Last March, Auernheimer was convicted of accessing a computer without authorization and sentenced to 41 months in prison. As a member of the computer security team Goatse Security, Auernheimer discovered a major security flaw in AT&T's network, which allowed him to download the email addresses of some 114,000 iPad users. Goatse Security reported the flaw to Gawker and provided journalists with the information, who then published it in redacted form."
Several readers sent word that California State Senator Leland Yee was arrested today. He's accused of conspiring to traffic guns and commit wire fraud, to defraud citizens of honest services, and bribery. The complant (PDF) also names 25 other defendants. Yee is known for pushing legislation that would ban the sale of violent video games to minors. "Federal prosecutors also allege Yee agreed to perform official acts in exchange for the money, including one instance in which he introduced a businessman to state legislators who had significant influence over pending medical marijuana legislation. In exchange, the businessman -- who was actually an undercover FBI agent -- agreed to donate thousands to Yee's campaign fund, according to the indictment. The indictment also describes an August 2013 exchange in which [former school board president Keith Jackson] told an undercover officer that Yee had an arms trafficking contact. Jackson allegedly said Yee could facilitate a meeting for a donation."
schwit1 sends this news from The Verge:
"Tamerlan Tsarnaev, the primary conspirator in the Boston Marathon bombing that killed three people, slipped through airport security because his name was misspelled in a database, according to a new Congressional report. The Russian intelligence agency warned U.S. authorities twice that Tsarnaev was a radical Islamist and potentially dangerous. As a result, Tsarnaev was entered into two U.S. government databases: the Terrorist Identities Datamart Environment and the Treasury Enforcement Communications System (TECS), an interagency border inspection database.
A special note was added to TECS in October of 2011 requiring a mandatory search and detention of Tsarnaev if he left the country. 'Detain isolated and immediately call the lookout duty officer,' the note reportedly said. 'Call is mandatory whether or not the officer believes there is an exact match.' 'Detain isolated and immediately call the lookout duty officer.' Unfortunately, Tsarnaev's name was not an exact match: it was misspelled by one letter. Whoever entered it in the database spelled it as 'Tsarnayev.' When Tsarnaev flew to Russia in January of 2012 on his way to terrorist training, the system was alerted but the mandatory detention was not triggered. Because officers did not realize Tsarnaev was a high-priority target, he was allowed to travel without questioning."
jfruh (300774) writes "The venerable Nortel Networks may have vanished into bankruptcy five years ago, but thanks to U.S. patent law, it can strike back at its old rival Cisco from beyond the grave. Spherix, a Virginia-based 'research company' that bought Nortel's patents in 2009, has filed a federal lawsuit claiming that Cisco has been knowingly violating 11 Nortel patents. 'The vast majority of Cisco's switching and routing revenue from March 2008 until the present is and has been generated by products and services implementing technology that infringes the Asserted Patents,' the lawsuit claims."
redletterdave (2493036) writes "Less than a week after the Turkish government banned Twitter over failing to remove allegations of government corruption from the social network, a Turkish court on Wednesday suspended the ban, calling it 'illegal.'" Unfortunately, according to the BBC Twitter may remain blocked until after the elections: "The administrative court in Ankara issued a temporary injunction on Wednesday ordering the TIB to restore access to Twitter until it could deliver its full verdict on the ban. Turkish media reports suggested the ban would be suspended soon afterwards but a source in Mr Erdogan's office told Reuters news agency the TIB had 30 days to implement or appeal against the court ruling." In the meantime, Twitter is attempting to fight the ban directly.
jfruh (300774) writes "Security vendors like Trustwave can make big bucks when major companies decide they don't have the internal resources to handle their cybersecurity needs. Unfortunately, when taking on security chores, you also take on security liabilities. In the wake of Target's massive credit card security breach, both Target and Trustwave are now on the receiving end of a class action lawsuit, in part backed by banks that had to issue thousands of new credit cards." The filing, and a bit more from El Reg: "It's against Target, however, that the most serious allegations are levelled. The class action led by Trustmark National Bank and Green Bank, say the retailer should not have allowed an outside contractor the access to its network that brought about the breach, and that it violated federal and state laws in storing the credit card data on its network."
rjmarvin writes: "Researchers in the MIT Computer Science and Artificial Intelligence Laboratory have developed a platform for building secure web applications and services that never decrypt or leak data. MIT researcher Raluca Ada Popa, who previously worked on the Google and SAP-adopted CryptoDB, and her team, have put a longstanding philosophy into practice: to never store unencrypted data on servers. They've redesigned the entire approach to securing online data by creating Mylar, which builds and updates applications to keep data secure from server breaches with constant encryption during storage, only decrypting the data in the user's browser. Integrated with the open-source Meteor framework, a Mylar prototype has already secured six applications by changing only 35 lines of code."
Trailrunner7 writes: "The long shadow cast by the use of surveillance technology and so-called lawful intercept tools has spread across much of the globe and has sparked a renewed push in some quarters for restrictions on the export of these systems. Politicians and policy analysts, discussing the issue in a panel Monday, said that there is room for sensible regulation without repeating the mistakes of the Crypto Wars of the 1990s. 'There's virtually no accountability or transparency, while he technologies are getting faster, smaller and cheaper,' Marietje Schaake, a Dutch member of the European Parliament, said during a panel discussion put on by the New America Foundation. 'We're often accused of over-regulating everything, so it's ironic that there's no regulation here. And the reason is that the member states [of the EU] are major players in this. The incentives to regulate are hampered by the incentives to purchase. There has been a lot of skepticism about how to regulate and it's very difficult to get it right. There are traumas from the Crypto Wars. Many of these companies are modern-day arms dealers. The status quo is unacceptable and criticizing every proposed regulation isn't moving us forward.'"
An anonymous reader sends this news from Bloomberg: "The U.S. government will treat Bitcoin as property for tax purposes, applying rules it uses to govern stocks and barter transactions, the Internal Revenue Service said in its first substantive ruling on the issue. Today's IRS guidance will provide certainty for investors, along with potential income-tax liability. Under the ruling, purchasing a $2 cup of coffee with Bitcoins bought for $1 would trigger $1 in capital gains for the coffee drinker and $2 of income for the coffee shop. ... Under the IRS ruling, Bitcoin investors would be treated like stock investors. Bitcoins held for more than a year and then sold would pay the lower tax rates applicable to capital gains — a maximum of 23.8 percent compared with the 43.4 percent top rate on property sold within a year of purchase. For investors with losses, U.S. tax law allows taxpayers to subtract capital losses from any capital gains. They can also subtract up to $3,000 of capital losses a year from ordinary income.'"
McGruber writes: "Former U.S. President Jimmy Carter defended the disclosures by fugitive NSA contractor Edward Snowden on Monday, saying revelations that U.S. intelligence agencies were collecting meta-data of Americans' phone calls and e-mails have been 'probably constructive in the long run.' 'I think it's wrong,' President Carter said of the NSA program. 'I think it's an intrusion on one of the basic human rights of Americans, is to have some degree of privacy if we don't want other people to read what we communicate.'" It's important to note that Carter doesn't believe Snowden should necessarily get a pass for his actions. Carter said, "I think it's inevitable that he should be prosecuted and I think he would be prosecuted, [if he comes back to the U.S.] But I don't think he ought to be executed as a traitor or any kind of extreme punishment like that." Nevertheless, Carter thinks NSA surveillance has gotten out of control. "We've gone a long way down the road of violating Americans' basic civil rights, as far as privacy is concerned." He added, "For the last two or three years, when I want to write a highly personal letter to a foreign leader, or even some American leaders, I hand-write it and mail it, because I feel that my telephone calls and my email are being monitored, and there are some things I just don’t want anybody to know except me and my wife."
judgecorp (778838) writes "A newly discovered malware attack uses a smartphone connected to the computer that manages an ATM, and then sends an SMS message to instruct it to dispense cash. The attack was reported by Symantec, and builds on a previous piece of malware called Backdoor.Ploutus. It is being used in actual attacks, and Symantec has demonstrated it with an ATM in its labs, though it is not revealing the brand of the vulnerable machines."
Hugh Pickens DOT Com (2995471) writes "As attacks like the one on Target have exposed up to 40 million customer payment card accounts and the names, addresses and email addresses of as many as 70 million shoppers, Tiffany Hsu and E. Scott Reckard report in the LA Times that increased activity by data hackers has produced millions of victims but there has been one big winner: credit monitoring businesses. "It's almost a terrible thing to say, but these kinds of situations raise awareness of the need to protect yourself and to be more vigilant in checking your transactions," says Yaron Samid. Meanwhile services with names such as BillGuard and Identity Guard report a surge in sign-ups from people anxious to be protected. For example, the number of AAA Southern California members opting in for the club's identity theft monitoring service — whether for free or for an extra charge — boomed in January, up 58% from December." (More below.)
First time accepted submitter tor528 (896250) writes "Patent troll Personal Audio has sued top podcasters including Adam Carolla and HowStuffWorks, claiming that they own the patent for delivery of episodic content over the Internet. Adam Carolla is fighting back and has started a Fund Anything campaign to cover legal fees. From the Fund Anything campaign page: 'If Adam Carolla loses this battle, then every other Podcast will be quickly shut down. Why? Because Patent Trolls like Personal Audio would use a victory over Carolla as leverage to extort money from every other Podcast.. As you probably know, Podcasts are inherently small, owner-operated businesses that do not have the financial resources to fight off this type of an assault. Therefore, Podcasts as we know them today would cease to exist.' James Logan of Personal Audio answered Slashdotters' questions in June 2013. Links to the patent in question can be found on Personal Audio's website. The EFF filed a challenge against Personal Audio's podcasting patent in October 2013."
The New York Times reported last night that the White House is planning to introduce a legislative package that would mostly end the NSA's bulk collection of phone records. Instead, phone companies would be required to hand over records up to "two hops" from a target number. Phone companies would be required to retain records for 18 months (already legally mandated) instead of the NSA storing records for five years. It does not appear that secret courts and secret orders from the court would be abolished, however. From the article: "The new type of surveillance court orders envisioned by the administration would require phone companies to swiftly provide records in a technologically compatible data format, including making available, on a continuing basis, data about any new calls placed or received after the order is received, the officials said ... The administration’s proposal would also include a provision clarifying whether Section 215 of the Patriot Act, due to expire next year unless Congress reauthorizes it, may in the future be legitimately interpreted as allowing bulk data collection of telephone data. ... The proposal would not, however, affect other forms of bulk collection under the same provision."
An anonymous reader writes "Florida District Court Judge Ursula Ungaro has dismissed a lawsuit brought by Malibu Media against an alleged BitTorrent pirate. Though Malibu Media explained how they geolocated the download site and verified that the IP address was residential rather than a public wifi hotspot, the judge reasoned that the 'Plaintiff has not shown how this geolocation software can establish the identity of the Defendant....Even if this IP address is located within a residence, the geolocation software cannot identify who has access to that residence's computer and who would actually be using it to infringe Plaintiff's copyright.' Judge Ungaro's ruling is not the first of its kind, but it could signal a growing legal trend whereby copyright lawsuits can no longer just hinge on the acquisition of an IP address."
jayp00001 (267507) writes "'As we all know, there is no free lunch, and there’s also no cost-free delivery of streaming movies. Someone has to pay that cost. Mr. Hastings' arrogant proposition is that everyone else should pay but Netflix. That may be a nice deal if he can get it. But it's not how the Internet, or telecommunication for that matter, has ever worked,' writes AT&T Senior Executive Vice President of Legislative Affairs, James Cicconi. Mr. Cicconi took issue with a blog post from Netflix CEO Reed Hastings on the importance of net neutrality.
An anonymous reader writes "Turkish Finance Minister Mehmet Simsek has defended his governments ban on Twitter and accused the social networking site of not complying with court orders. Simsek said: 'The Turkish telecommunications watchdog has made a number of statements saying that they have asked Twitter on a number of occasions to remove some content on the back of court orders and Twitter has been refusing to comply. I don’t think any global company, whether it’s a media company, whether it’s an industrial company, it shouldn’t see itself [as being] above the law.'" As a result of the ban, Tor gained over 10,000 new users in Turkey.
garymortimer (1882326) writes in with news about rules for hunting with drones in Alaska. "At its March 14-18 meeting in Anchorage, the seven-member Alaska Board of Game approved a measure to prohibit hunters from spotting game with such aircraft, often called drones. While the practice does not appear to be widespread, Alaska Wildlife Troopers said the technology is becoming cheaper, easier to use and incorporates better video relay to the user on the ground. A drone system allowing a hunter or helper to locate game now costs only about $1,000, said Capt. Bernard Chastain, operations commander for the Wildlife Troopers. Because of advances in the technology and cheaper prices, it is inevitable hunters seeking an advantage would, for example, try to use a drone to fly above trees or other obstacles and look for a moose or bear to shoot, he said."