We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
An anonymous reader writes "Almost every modern abusive relationship has a digital component, from cyberstalking to hacking phones, emails, and social media accounts, but women's shelters increasingly have found themselves on the defensive, ill-equipped to manage and protect their clients from increasingly sophisticated threats. Recently the Tor Project stepped in to help change that. Andrew Lewman, executive director of the project, 'thinks of the digital abuse epidemic like a doctor might consider a biological outbreak. "Step one, do not infect yourself. Step two, do not infect others, especially your co-workers. Step three, help others," he said. In the case of digital infections, like any other, skipping those first two steps can quickly turn caretakers into infected liabilities. For domestic violence prevention organizations that means ensuring their communication lines stay uncompromised. And that means establishing a base level of technology education for staff with generally little to no tech chops who might not understand the gravity of clean communication lines until faced with a situation where their own phone or email gets hacked.'"
randomErr (172078) writes "Russia is tightening its grip on free speech and freedom of the Internet by creating a new 'bloggers law'. This policy follows the pattern set by China, Pakistan, Turkey, and Iran." Any site with more than 3000 daily visitors will be required to register and be held to a number of restrictions, quoting the article: "Besides registering, bloggers can no longer remain anonymous online, and organizations that provide platforms for their work such as search engines, social networks and other forums must maintain computer records on Russian soil of everything posted over the previous six months."
judgecorp (778838) writes "RightsCorp, the controversial copyright enforcer, is planning to begin operations in Europe. In the U.S., the company scans torrents for IP addresses on behalf of media companies, shares them with ISPs, forcing them to send lawyers' letters (using the DMCA) demanding money from the supposed copyright infringers. RightsCorp says Europe needs its help in fighting piracy." They recently expanded operations into Canada as well.
An anonymous reader writes "Argentinian political activists are developing an open source program that will allow voters to direct their representatives on how to vote on certain issues by giving voters a platform to debate and vote on issues themselves. Started as an accompaniment to and a fundamental feature of a new political party in Argentina, Democracy OS is not designed to be anonymous (i.e., no secret ballots, no anonymous comments). 'Fortunately, the software isn't yet being used to gather real votes, just to gather public feedback.' Critics see this program as yet another iteration of Germany's Pirate Party, which could not engage enough voters in its own open source program, Liquid Feedback, to gain any meaningful policy direction from their constituents. German newspaper Der Spiegel once called the movement 'a grassroots democracy where no one is showing up to participate.'"
DeviceGuru (1136715) writes "Raytheon is switching its UAV control system from Solaris to Linux for U.S. military drones, starting with a Northrop Grumman MQ-8C Fire Scout helicopter. Earlier this month Raytheon entered into a $15.8 million contract with the U.S. Navy to upgrade Raytheon's control systems for unmanned aerial vehicles (UAVs), according to a recent Avionics Intelligence report. The overhaul is designed to implement more modern controls to help ground-based personnel control UAVs. Raytheon's tuxified version of its Vertical Takeoff and Landing Unmanned Air Vehicle Tactical Control System (TCS) will also implement universal UAV control qualities. As a result the TCS can be used in in all U.S. Navy, Air Force, Army, and Marine Corps UAVs that weigh at least 20 pounds. By providing an open standard, the common Linux-based platform is expected to reduce costs by limiting the types of UAV control systems that need to be built and maintained for each craft."
An anonymous reader writes "Forbes reported on Monday that The President of Russia's Council on Civil Society and Human Rights very briefly and supposedly by accident posted the actual results of the Crimean secession vote. According to the blog post, which has since been taken down, only 30% of Crimeans participated in the vote instead of the 83% participation officially advertised by Russia, and of that 30% only half voted for secession, which means that 15% of all Crimeans voted for secession rather than the 82% officially reported by Russia. There is no way for this claim to be verified as no foreign observers were allowed during the voting process. The vote is reportedly being conducted again during the 'May 11 referendum on the status of the so-called People's Republic of Donetsk.'" We've had a lot of discussion over the years about election methods and transparency; it would be interesting to hear from Ukranian readers in particular on this topic.
An anonymous reader writes "Vigilant Solutions maintains what they claim is the nation's largest database of license-plate tracking data, 'LEARN' (Law Enforcement Archival and Reporting Network). But when a law enforcement agency signs up to use the database, they are sworn to keep it secret. The reason? They are quite clear about that: 'to prohibit users from cooperating with any media outlet to bring attention to LEARN or LEARN-NVLS.' So, they're tracking you (they're tracking everybody)... but they don't want you to know. The agreement, uncovered by the Electronic Frontier Foundation, states: You shall not create, publish, distribute, or permit any written, electronically transmitted or other form of publicity material that makes reference to LEARN or this Agreement without first submitting the material to LEARN-NVLS and receiving written consent from LEARN-NVLS. This prohibition is specifically intended to prohibit users from cooperating with any media outlet to bring attention to LEARN or LEARN-NVLS. Breach this provision may result in LEARN-NVLS immediately termination of this Agreement upon notice to you."
Immediately after WIRED published the story, though, the agreement mysteriously changed. The secrecy provision is still there, but the statement that it's 'specifically intended' to prevent the media attention has vanished."
SonicSpike (242293) writes with news that the ACLU and Rand Paul both think every Senator should read David Barron's legal memos justifying the use of drones against an American citizen before he is confirmed to the 1st Circuit Court of Appeals. From the article: "Paul, the junior Republican senator from Kentucky, has informed Reid he will object to David Barron's nomination to the 1st Circuit Court of Appeals unless the Justice Department makes public the memos he authored justifying the killing of an American citizen in Yemen. The American Civil Liberties Union supports Paul's objection, giving some Democratic lawmakers extra incentive to support a delay to Barron's nomination, which could come to the floor in the next two weeks. Barron, formerly a lawyer in the Justice Department's Office of Legal Counsel, penned at least one secret legal memo approving the Sept. 2011 drone strike that killed Anwar al-Awlaki, a radical Muslim cleric whom intelligence officials accused of planning terrorist attacks against the United States."
Jason Koebler (3528235) writes "A Redditor got more than he bargained for in the mail today: He was accidentally mailed parts to a $350,000 environment and wildlife monitoring drone owned by the National Ocean and Atmospheric Administration. 'We sent a set of about eight boxes for this one aircraft system, and one was misdelivered by UPS. We're working with UPS to find it,' the federal agency says."
randomErr (172078) writes "The US Department of Defense is investigating whether Bitcoin and other virtual currencies are a potential terrorist threat. The Combating Terrorism Technical Support Office (CTTSO), a division within DOD that identifies and develops counter terrorism abilities and investigates irregular warfare and evolving threats, has listed Bitcoin among its topics for research and mission critical analysis related to terrorism."
Daniel_Stuckey (2647775) writes "How risky is it to use the words "bomb," "plague," or "gun" online? That was a question we posed, tongue in cheek, with a web toy we built last year called Hello NSA. It offers users suggested tweets that use words that drawn from a list of watchwords that analysts at the Dept. of Homeland Security are instructed to search for on social media. "Stop holding my love hostage," one of the tweets read. "My emotions are like a tornado of fundamentalist wildfire." It was silly, but it was also imagined as an absurdist response to the absurdist ways that dragnet surveillance of the public and non-public Internet jars with our ideas of freedom of speech and privacy. And yet, after reading the mounting pile of NSA PowerPoints, are all of us as comfortable as we used to be Googling for a word like "anthrax," even if we were simply looking up our favorite thrash metal band? Maybe not. According to a new study of Google search trends, searches for terms deemed to be sensitive to government or privacy concerns have dropped "significantly" in the months since Edward Snowden's revelations in July."
An anonymous reader writes "The Mozilla Foundation is filing a petition asking the FCC to declare that ISPs are common carriers, with a twist. 'The FCC doesn't have to reclassify the Internet access ISPs offer consumers as a telecommunications service subject to common carrier regulations under Title II of the Communications Act, Mozilla says. Instead, the FCC should target the service ISPs offer to edge providers like Netflix and Dropbox, who need to send their bits over ISP networks to reach their customers. Classifying the ISP/edge provider relationship as a common carrier service will be a little cleaner since the FCC wouldn't have to undo several decade-old orders that classified broadband as an "information" service rather than telecommunications, Mozilla argues.'" Here's the Mozilla blog post and the 13-page petition.
An anonymous reader writes "Addressing the audience at the Freedom Online Coalition Conference, Secretary of State John Kerry defended NSA snooping actions saying: 'Let me be clear – as in the physical space, cyber security cannot come at the expense of cyber privacy. And we all know this is a difficult challenge. But I am serious when I tell you that we are committed to discussing it in an absolutely inclusive and transparent manner, both at home and abroad. As President Obama has made clear, just because we can do something doesn't mean that we should do it. And that's why he ordered a thorough review of all our signals intelligence practices. And that's why he then, after examining it and debating it and openly engaging in a conversation about it, which is unlike most countries on the planet, he announced a set of concrete and meaningful reforms, including on electronic surveillance, in a world where we know there are terrorists and others who are seeking to do injury to all of us. And finally, transparency – the principles governing such activities need to be understood so that free people can debate them and play their part in shaping these choices. And we believe these principles can positively help us to distinguish the legitimate practices of states governed by the rule of law from the legitimate practices of states that actually use surveillance to repress their people. And while I expect you to hold the United States to the standards that I've outlined, I also hope that you won't let the world forget the places where those who hold their government to standards go to jail rather than win prizes.' He added: 'This debate is about two very different visions: one vision that respects freedom and another that denies it. All of you at the Freedom Online Coalition are on the right side of this debate, and now we need to make sure that all of us together wind up on the right side of history."
wiredmikey (1824622) writes "As Europe powered up its most ambitious ever cybersecurity exercise this month, doubts were being raised over whether the continent's patchwork of online police was right for the job. The exercise, called Cyber Europe 2014, involved 200 organizations and 400 cybersecurity professionals from both the European Union and beyond. Yet some critics argued that herding together normally secretive national security agencies and demanding that they spend the rest of 2014 sharing information amounted to wishful thinking. Others questioned whether the law enforcement agencies taking part in the drill should be involved in safeguarding online security, in the wake of American whistleblower Edward Snowden's revelations of online spying by western governments. Eurostat figures show that, by January 2012, only 26 percent of EU enterprises had a formally defined information technology security plan in place. One industry insider said the view in Brussels is that EU cybersecurity was "like teenage sex: everyone says they are doing it but not that many actually are.""
theodp (442580) writes "Thankfully, no one's gone full-Charles-Bronson yet, but the NY Times reports that victims of smartphone theft are using GPS to take the law into their own hands, paying visits to thieves' homes and demanding the return of their stolen phones. "The emergence of this kind of do-it-yourself justice," writes Ian Lovett, "has stirred worries among law enforcement officials that people are putting themselves in danger, taking disproportionate risks for the sake of an easily replaced item." And while hitting "Find My iPhone" can take you to a thief's doorstep, LAPD Cmdr. Andrew Smith urges resisting the impulse to do so. "It's just a phone," he said. "it's not worth losing your life over. Let police officers take care of it. We have backup, guns, radio, jackets — all that stuff civilians don't have.""
New submitter postglock (917809) writes "Swype is a popular third-party keyboard for Android phones (and also available for Windows phones and other platforms). It's currently the second-most-popular paid keyboard in Google Play (behind SwiftKey), and the 17th highest of all paid apps. Recently, users have discovered that it's been accessing location data extremely frequently, making almost 4000 requests per day, or 2.5 requests per minute. The developers claim that this is to facilitate implementation of 'regional dialects,' but cannot explain why such frequent polling is required, or why this still occurs if the regional function is disabled. Some custom ROMs such as Cyanogenmod can block this tracking, but most users would be unaware that such tracking is even occurring." Readers in the linked thread don't all seem to see the same thing; if you are a Swype user, do you see thousands of location requests, none, or something in between?
Lasrick (2629253) writes "Princeton sociologist Janet Vertesi writes about her attempt at hiding her pregnancy from 'the bots, trackers, cookies and other data sniffers online that feed the databases that companies use for targeted advertising.' Big data still found her, even though she steered clear of social media, avoided baby-related credit card purchases, and downloaded Tor to browse the Internet privately."
jfruh (300774) writes "The Video Privacy Protection Act, a 1988 law that made it illegal for a video store to share your rental history, has thrown up roadblocks for modern-day streaming video sites. Last year Congress amended the law to make it possible for you to share your Netflix viewing history with your social media friends, as long as you opt in. But what does "opting in" entail? Hulu is now on the receiving end of a lawsuit over the fact that clicking the Facebook "like" button on a viewing page shares that viewing activity on Facebook."
An anonymous reader writes "A U.S. jury concluded Friday that Samsung had infringed on two of Apple's patents and that Apple had infringed on one of Samsung's patents. Prior to the trial, the judge had ruled that Samsung had infringed on one other Apple patent. Samsung will receive $158,400 in damages, although they had requested just over $6 million. Apple will receive $119.6 million in damages, although they had requested just over $2 billion and a ban on certain Samsung phones. Some say that a sales ban is unlikely to be approved by the judge. The jury is scheduled to return on Monday to resolve what appears to be a technical mistake in their verdict on one of the patents, and Apple may gain a few hundred thousand dollars in their damages award as a result."
As reported by TorrentFreak, a New York man's large-scale pirating of Ultimate Fighting Championship videos via The Pirate Bay and KickassTorrents has landed him on the uncomfortable end of a $32 million lawsuit. From the article: "Known online as Secludedly, the man uploaded at least 124 events. As a result UFC parent Zuffa is hitting him with everything from copyright infringement, to fraud, to breach of contract. ... The lawsuit, which includes two other doe defendants and an unknown company Zuffa refers to as XYZ Corp (“a business entity, the exact nature of which is unknown”), centers around the unlawful recording (“capping”), uploading and distribution of more than 120 UFC events via two of the world’s biggest torrent sites. ... Also receiving a prominent mention from Zuffa is the fact that Secludedly allowed people to donate via a PayPal in order to help with the financing of future ripping and uploading activities."
MouseTheLuckyDog (2752443) writes "In a recent story on reason.com it was reported that the DoJ is closing down the bank accounts of porn stars. Not knowing the site I googled around and found another site, the Guardian. The story does not end there. It turns out that this is part of a larger scheme (ironically) called Operation Choke Point. Also reported in a Washington Post article that downplays the practice. According to Cryptocoin news. There are thirty industries the DoJ is now targeteting: Ammunition Sales; Cable Box De-scramblers; Coin Dealers; Credit Card Schemes; Credit Repair Services; Dating Services; Debt Consolidation Scams; Drug Paraphernalia; Escort Services; Firearms Sales; Fireworks Sales; Get Rich Products; Government Grants; Home-Based Charities; Life-Time Guarantees; Life-Time Memberships; Lottery Sales; Mailing Lists/Personal Info; Money Transfer Networks; On-line Gambling; PayDay Loans; Pharmaceutical Sales; Ponzi Schemes; Pornography; Pyramid-Type Sales; Racist Materials; Surveillance Equipment; Telemarketing; Tobacco Sales; and Travel Clubs. But more can be added. (I notice alcohol sales is not on the list)." The Reason article stops short of saying that Choke Point is proven to be the reason for the account closures, but it seems very plausible.
An anonymous reader writes "In 2012, a card game called Asylum was successfully funded on Kickstarter. Two months later, its expected delivery date came and passed without a product. In July 2013, the company behind the game stopped communicating with backers. Now, the Washington state Attorney General has filed a consumer protection lawsuit against the makers. This is the first time a project from a crowdfunding site has been the target of such a lawsuit. The AG said, 'Consumers need to be aware that crowdfunding is not without risk. This lawsuit sends a clear message to people seeking the public's money: Washington state will not tolerate crowdfunding theft. The Attorney General's Office will hold those accountable who don't play by the rules.' Here's the legal document (PDF)."
An anonymous reader writes "When web browsers started implementing 'do-not-track' settings, Yahoo got some respect for being the first of the huge tech companies to honor those settings. Unfortunately, that respect has now gone out the door. As of this week, Yahoo will no longer alter their data collection if a user doesn't want to be tracked. They say there are two reasons for this. First, they want to provide a personalized web-browsing experience, which isn't possible using do-not-track. Second, they don't think do-not-track is viable. They say, '[W]e've been at the heart of conversations surrounding how to develop the most user-friendly standard. However, we have yet to see a single standard emerge that is effective, easy to use and has been adopted by the broader tech industry.' It looks like this is another blow to privacy on the web."
itwbennett writes: "A class-action lawsuit filed Thursday (PDF) accuses Google of strong-arming device manufacturers into making its search engine the default on Android devices, driving up the cost of those devices and hurting consumers. The suit does not argue that device manufacturers entered Mobile Application Distribution Agreements involuntarily, but that the market power of Google compels them to. 'Because consumers want access to Google's products, and due to Google's power in the U.S. market for general handheld search, Google has unrivaled market power over smartphone and tablet manufacturers,' says the suit."
Rambo Tribble (1273454) writes "Reuters is reporting that Space Exploration Technologies, aka SpaceX, has won a Federal Claims Court temporary injunction against the purchase by United Launch Alliance of Russian-made rocket boosters, intended for use by the United States Air Force. In her ruling Judge Susan Braden prohibited ULA and the USAF, 'from making any purchases from or payment of money to [Russian firm] NPO Energomash.' United Launch Alliance is a joint venture of Boeing and Lockheed Martin."
R3d M3rcury (871886) writes "How's this for a good idea? A gun that won't fire unless it's within 10 inches of a watch? That's the iP1 from Armatrix. Of course, don't try to sell it here in the United States." From the NY Times article linked: "[Armatrix employee] Belinda Padilla does not pick up unknown calls anymore, not since someone posted her cellphone number on an online forum for gun enthusiasts. Then someone snapped pictures of the address where she has a P.O. box and put those online, too. In a crude, cartoonish scrawl, this person drew an arrow to the blurred image of a woman passing through the photo frame. 'Belinda?" the person wrote. "Is that you?" ... "I have no qualms with the idea of personally and professionally leveling the life of someone who has attempted to profit from disarming me and my fellow Americans," one commenter wrote." The article paints a fairly rosy picture of the particular technology that Armatrix is pushing, but their ID-checking gun seems to default to an unfireable state, which might not always be an attractive feature. And given that at least one state — New Jersey — has hinged a gun law on the commercial availability of these ID-linked guns, it's not surprising that some gun owners dislike a company that advertises this kind of system as "the future of the firearm."
itwbennett (1594911) writes "Google will no longer scan the email messages of students and other school staff who use its Google Apps for Education suite, exempting about 30 million users from the chronically controversial practice for Gmail advertising. In addition, Google is removing the option for Apps for Education administrators to allow ads to be shown to their users. Until now, ads were turned off by default, but admins could turn on this feature at their discretion. A Google spokesperson called the move part of a 'continued evolution of our efforts to provide the best experience for our users, including students' and not a response to a recent lawsuit alleging that by scanning Gmail messages Google violated wiretapping laws and breached users' privacy."
Advocatus Diaboli (1627651) writes "Britain's electronic surveillance agency, Government Communications Headquarters, has long presented its collaboration with the National Security Agency's massive electronic spying efforts as proportionate, carefully monitored, and well within the bounds of privacy laws. But according to a top-secret document in the archive of material provided to The Intercept by NSA whistleblower Edward Snowden, GCHQ secretly coveted the NSA's vast troves of private communications and sought 'unsupervised access' to its data as recently as last year – essentially begging to feast at the NSA's table while insisting that it only nibbles on the occasional crumb."
Go to Stop the Secrecy.net and you'll see that this is something that requires action now, not someday, It's about the TPP, or Trans Pacific Partnership, a trade agreement that could place major restrictions on how we use the Internet. This is far from the only attack on Internet freedom we need to fight against, just one the EFF (and others) feel is one of the worst ones in play right now. Mild-mannered Steve Anderson, founder and Executive Director of OpenMedia.ca, is today's interview guest. He's Canadian, but OpenMedia.ca doesn't stop at Canada's southern border. Steve and the rest of the group want U.S. citizens to have the same Internet freedoms they want Canadians to have -- as well as people all over the world, because Internet balkanization hurts all Internet users. Including you. And worse, this is not the only problem with the TPP. Did you notice, in the TPP link above (to Wikipedia), that parts of this trade agreement are secret? So even if you want to protest against it, you might end up holding a sign that's mostly blank. This is a "Call your Congressional representatives" situation. Unless you're in Canada, in which case it's a "Call your Member of Parliament" situation. Ditto if you're in another TPP country. In any case, it's going to take a lot of calls, letters, emails, and faxes from people like us to overcome some of the heavy money that wants the TPP to go through. (Alternate video link.)
theodp (442580) writes "Simon Allardice takes a stroll down coding memory lane, recalling that when he got started in programming in 1983, hand-writing one's programs with pencil on IBM coding sheets was still considered good enough for British government work (COBOL, Assembler forms). Allardice writes, 'And when you were finished handwriting a section of code — perhaps a full program, perhaps a subroutine — you'd gather these sheets together (carefully numbered in sequence, of course) and send them along to the folks in the data entry department. They'd type it in. And the next day you'd get a report to find out if it compiled or not. Let me say that again: the next day you could find out if your code compiled or not.' So, does anyone have 'fond' memories of computer programming in the punched card era? And for you young'uns, what do you suppose your C++ or Java development times would be like if you got one compile a day?" The other way you could program in 1983.
UnknowingFool (672806) writes "In a pair of unanimous rulings yesterday, the Supreme Court made it easier for defendants in patent cases to collect attorneys fees if the litigation was frivolous. In the first case, Octane Fitness v. Icon Health & Fitness, the court ruled that a standard used by lower courts to award attorney's fees was impossible to meet. The original standard under Brooks Furniture Mfg., Inc. v. Dutailier Int'l, Inc. had ruled that a claim had to be both 'objectively baseless' and 'brought in subjective bad faith' before fees could be awarded. The high court ruled that fees should be awarded merely when the case is 'exceptional' and not when the defendant must prove there was zero merit.
In the second case, Highmark v. Allcare Health Management, the Supreme Court also noted the 'exceptional' standard in reversing the appellate court's decision but specifically ruled that appellate courts should give more deference to the lower courts on rulings of fact. In Highmark, the district court found that Allcare had engaged in a pattern of 'vexatious' and 'deceitful' conduct throughout the litigation and awarded fees. The appellate court while agreeing with the lower court about part of the case reversed the fees in their de novo review of the case. In de novo reviews, the court case is essentially retried with the higher court. The Supreme Court iterated that de novo reviews should be done typically for 'questions of law' and reviews on 'questions of fact' are done if there are clear errors with decisions on matters of discretion 'reviewable for "abuse of discretion."' In other words, the appellate courts can review a case if a lower court has not correctly interpreted law; however, they should not retry a lower case on facts unless the lower court made a clear error. Also unless the lower court abused their power in some way, the appellate court should not review their final decisions.
For example, if a person is tried for murder, an appellate court could rule that a district court misinterpreted a statute about sentencing if the person if found guilty. The appellate court should not retry the facts of the case unless the lower court had made a clear error like ruling that there was a DNA match when there was not. Also an appellate court should not reverse the lower court if they sentenced the person to a reasonable time. Now if the district court sentenced the person to 400 years for one murder, then the appellate court should intervene.
In effect the two rulings make it easier for companies to recover money should they be sued in frivolous patent lawsuits. This would make the risks greater for those who sue."
Daniel_Stuckey (2647775) writes "The state of Oklahoma had scheduled two executions for Tuesday, April 29th. This in spite of myriad objections that the drugs being used for both lethal injections had not been tested, and thus could violate the constitutional right to the courts, as well as the 8th Amendment: protection from cruel and unusual punishment. After much legal and political wrangling, the state proceeded with the executions anyway. It soon became clear that the critics' worst case scenarios were coming true — Oklahoma violently botched the first execution. The inmate "blew" a vein and had a heart attack. The state quickly postponed the second one. 'After weeks of Oklahoma refusing to disclose basic information about the drugs for tonight's lethal injection procedures, tonight, Clayton Lockett was tortured to death,' Madeline Cohen, the attorney of Charles Warner, the second man scheduled for execution, said in a statement. Katie Fretland at The Guardian reported from the scene of the botched attempt to execute Lockett using the untested, unvetted, and therefore potentially unconstitutional lethal injection drugs." sciencehabit also points out a study indicating that around 4% of death row inmates in the U.S. are likely innocent.
Hugh Pickens DOT Com writes "Reuters reports that U.S. Securities and Exchange Commission Chair Mary Jo White told a U.S. House of Representatives panel that she flatly rejected claims that retail investors are being fleeced by high-frequency traders who can use their speed to jump ahead with buy and sell orders that fetch better prices. 'The markets are not rigged,' says White. 'The U.S. markets are the strongest and most reliable in the world.' White's comments to the House Financial Services Committee mark the first time she has directly responded to allegations in Michael Lewis' new book Flash Boys: A Wall Street Revolt. The book alleges that high-speed traders are engaged in a form of front-running, in which the firms are able to quickly identify an investor's desire to buy a stock, rush to buy it first and then sell it back at a higher price. The SEC has been reviewing equity market structure issues, particularly following the May 6, 2010 flash crash incident when the Dow Jones Industrial Average sharply plunged before quickly rebounding. Although staff at SEC are considering whether to launch some pilot studies to test different regulatory proposals, there are no immediate plans to issue rules to crack down on high-speed trading or trading in unlit markets. 'I want to be very clear that the market metrics suggest that the retail investor is very well-served by the current market structure.'"
An anonymous reader writes "In 2013, a startup called Outbox drew a lot of attention for its ambitious goal: digitizing everybody's snail mail. It was a nice dream; no more walking down your driveway six days a week to clear out the useless junk it contained. But less than a year later, Outbox shut down. This article explains how the United States Postal Service swiftly crushed their plan to make mail better. The founders were summoned to a meeting with the Postmaster General, who told them. 'We have a misunderstanding. You disrupt my service and we will never work with you. You mentioned making the service better for our customers; but the American citizens aren't our customers—about 400 junk mailers are our customers. Your service hurts our ability to serve those customers.' The USPS's Chief of Digital Strategy said Outbox's business model 'will never work anyway. Digital is a fad.' The USPS wouldn't work with Outbox to forward customers' mail, and that eventually destroyed the business."
SpaceGhost writes: "The Houston Chronicle reveals that Friday morning a $250,000 drone was lost by the Sheriff's department in Lake Conroe (just north of Houston.) Divers have been searching for the drone. What's more, the drone is reportedly over the FAA's 25-pound weight limit, so they shouldn't have been flying it in the first place (the Chronicle says 49 pounds, the Montgomery County Police Reporter says 29 pounds — either way, it's too heavy). The MCPR article goes on to discuss the recently passed Texas Legislature House Bill 912 which restricts the use of drones to observe private property, likely influenced by the January 2012 discovery of illegal pig blood runoff and subsequent indictment."
Daniel_Stuckey writes: "CISPA is back for a third time—it has lost the 'P,' but it's just as bad for civil liberties as ever. The Senate Intelligence Committee is considering a new cybersecurity bill that contains many of the provisions that civil liberties groups hated about the Cybersecurity Information Sharing and Protection Act (CISPA). Most notably, under the proposed bill companies could not be sued for incorrectly sharing too much customer information with the federal government, and broad law enforcement sharing could allow for the creation of backdoor wiretaps. The bill, called the Cybersecurity Information Sharing Act of 2014, was written by Senate Intelligence Chair Dianne Feinstein (D-Calif.) and Sen. Saxby Chambliss (R-Ga.) and is currently circulating around the committee right now but has not yet been introduced. Right now, the bill is only a 'discussion draft,' and the committee is still looking to make revisions to the bill before it is officially introduced."
New submitter freddieb writes: "An individual who had been jamming cellphone traffic on interstate 4 in Florida was located by FCC agents with the assistance of Hillsborough County Sheriff's Deputies. The individual had reportedly been jamming cellphone traffic on I-4 for two years. The FCC is now proposing a $48,000 fine for his actions. They say the jamming 'could and may have had disastrous consequences by precluding the use of cell phones to reach life-saving 9-1-1 services provided by police, ambulance, and fire departments.'"
indros13 (531405) writes "Net neutrality took a hit when the FCC gave its blessing to "Internet fast lanes' last week and one commentator believes that the solution is simple: public ownership of the hardware. 'Owning the means of distribution is a traditional function of local government. We call our roads and bridges and water and sewer pipe networks public infrastructure for a reason. In the 19th century local and state governments concluded that the transportation of people and goods was so essential to a modern economy that the key distribution system must be publicly owned. In the 21st century the transportation of information is equally essential.'
Is the Internet essential infrastructure? Should local governments step in to preserve equality of access?"
Daniel_Stuckey (2647775) writes "If you were anywhere near the internet last week, you would have come across reports of 'DarkMarket', a new system being touted as a Silk Road the FBI could never seize. Although running in a similar fashion on the face of things — some users buy drugs, other sell them — DarkMarket works in a fundamentally different way to Silk Road or any other online marketplace. Instead of being hosted off a server like a normal website, it runs in a decentralized manner: Users download a piece of software onto their device, which allows them to access the DarkMarket site. The really clever part is how the system incorporates data with the blockchain, the part of Bitcoin that everybody can see. Rather than just carrying the currency from buyer to seller, data such as user names are added to the blockchain by including it in very small transactions, meaning that its impossible to impersonate someone else because their pseudonymous identity is preserved in the ledger. Andy Greenberg has a good explanation of how it works over at Wired. The prototype includes nearly everything needed for a working marketplace: private communications between buyers and sellers, Bitcoin transfers to make purchases, and an escrow system that protects the cash until it is confirmed that the buyer has received their product. Theoretically, being a decentralized and thus autonomous network, it would still run without any assistance from site administrators, and would certainly make seizing a central server, as was the case with the original Silk Road, impossible."
sunbird (96442) writes "Less than one week after passing the Marco Civil da Internet, Article 3 of which purports to protect free expression and privacy of personal data from government intrusion, a Public Prosecutor in Brazil is seeking to seize a server hosting research groups, social movements, discussion lists and other tools. The server is hosted by the Saravá Group, which has adopted a policy of not storing connection logs to protect the privacy of users. The Public Prosecutor is seeking to identify individuals involved in Rádio Mudo, a project hosted by Saravá, but as Saravá does not store logs, there is no information on the server that is responsive to the investigation. This action comes as Brazil seeks to place itself in the forefront of protecting internet privacy after it hosted the Net Mundial conference. Saravá has called for a protest action today at 1PM local time (9AM PT/12noonET) to protest against the seizure."
walterbyrd (182728) writes in with news about the end of the line for a Novell anti-trust claim against Microsoft. "The U.S. Supreme Court on Monday brought an end to Novell Inc's antitrust claims against Microsoft Corp that date back 20 years to the development of Windows 95 software. By declining to hear Novell's appeal, the court left intact a 10th U.S. Circuit Court of Appeals ruling from September 2013 in favor of Microsoft. The court of appeals unanimously affirmed the dismissal of Novell Inc's claims that Microsoft violated the Sherman Antitrust Act when it decided not to share its intellectual property while developing its Windows 95 operating system. Novell was seeking more than $3 billion."
dryriver (1010635) writes in with news that the Chinese government has had enough of the antics of doctor Sheldon Lee Cooper. "Chinese authorities have ordered video streaming websites in the country to stop showing four popular American TV shows, including The Big Bang Theory and The Good Wife, senior staff from two sites said Sunday. The move suggests government attention is intensifying on the online streaming industry, which is freer than state television and China's cinemas to show foreign productions and other content and has stretched the boundaries of what can be seen in the country. A spokeswoman for a leading online video site, Youku, said it had received notification on Saturday not to show sitcom The Big Bang Theory, political and legal drama The Good Wife, crime drama NCIS and legal drama The Practice."
First time accepted submitter Parseval (3632761) writes "The NSA and GCHQ need mathematicians in order to function — they are some of the biggest employers of mathematicians in the world. This New Scientist article by a mathematician describes some of the math behind mass surveillance, and calls on other mathematicians to refuse to cooperate with the NSA/GCHQ while they continue to surveil the entire population. From the article: 'Mathematicians seldom face ethical questions. We enjoy the feeling that what we do is separate from the everyday world. As the number theorist G. H. Hardy wrote in 1940: "I have never done anything 'useful'. No discovery of mine has made, or is likely to make, directly or indirectly, for good or ill, the least difference to the amenity of the world." That idea is now untenable. Mathematics clearly has practical applications that are highly relevant to the modern world, not least internet encryption.'"
An anonymous reader writes "The US government has entered its reply brief in the US vs. Wurie case and its argument in favor of warrantless searches of arrestees' cell phones contains some truly terrible suppositions. The government argues that impartial technological advancements somehow favor criminals. As it sees it, the path to the recovery of evidence should not be slowed by encryption or wiping or even the minimal effort needed to obtain a warrant. From the article: 'The government agrees that times are changing but counterintuitively argues that only law enforcement is being negatively affected by this. Every argument in favor of warrantless searches contains some sort of lamentation about how tech-savvy criminals will be able to cover up or destroy evidence contained on their phones before the police can crack open these new-fangled address books and copy everything down.'"
Cludge writes "Describing concerns about the potential for big data methods to inadvertently classify people by race, religion, income or other forms of discrimination, the White House announced it will release a report next week that reviews the adequacy of existing privacy laws and regulations in the era of online data collection. The review, led by Obama's senior counselor, John Podesta, will outline concerns about whether methods used for commercial applications may be inherently vulnerable to inadvertent discrimination. 'He described a program called "Street Bump" in Boston that detected pot-holes using sensors in smartphones of citizens who had downloaded an app. The program inadvertently directed repair crews to wealthier neighborhoods, where people were more likely to carry smartphones and download the app.' 'It's easy to imagine how big data technology, if used to cross legal lines we have been careful to set, could end up reinforcing existing inequities in housing, credit, employment, health and education,' he said."
New submitter dislikes_corruption writes: "Stopping the recently announced plan by the FCC to end net neutrality is going to require a significant outcry by the public at large, a public that isn't particularly well versed on the issue or why they should care. Ryan Singel, a former editor at Wired, has written a thorough and easy to understand primer on the FCC's plan, the history behind it, and how it will impact the Internet should it come to pass. It's suitable for your neophyte parent, spouse, or sibling. In the meantime, the FCC has opened a new inbox (firstname.lastname@example.org) for public comments on the decision, there's a petition to sign at whitehouse.gov, and you can (and should) contact your congressmen."
New submitter sim2com writes: "An American judge has just added another reason why foreign (non-American) companies should avoid using American Internet service companies. The judge ruled that search warrants for customer email and other content must be turned over, even when that data is stored on servers in other countries. The ruling came out of a case in which U.S. law enforcement was demanding data from Microsoft's servers in Dublin, Ireland. Microsoft fought back, saying, 'A U.S. prosecutor cannot obtain a U.S. warrant to search someone's home located in another country, just as another country's prosecutor cannot obtain a court order in her home country to conduct a search in the United States. We think the same rules should apply in the online world, but the government disagrees.'
If this ruling stands, foreign governments will not be happy about having their legal jurisdiction trespassed by American courts that force American companies to turn over customers' data stored in their countries. The question is: who does have legal jurisdiction on data stored in a given country? The courts of that country, or the courts of the nationality of the company who manages the data storage? This is a matter that has to be decided by International treaties. While we're at it, let's try to establish an International cyber law enforcement system. In the meantime."
New submitter martinQblank writes "CNN reports: A Texas family whose home was within a two-mile radius of 22 natural gas wells — one of which was less than 800 feet away — has been awarded $2.9 million by a jury. The family, who suffered from a variety of ailments (including nosebleeds, rashes, migraines and more), was advised by a doctor to leave their ranch immediately and see a physician specializing in environmental health. The defendant in the case, Aruba Petroleum, disagreed with the jury's decision, as did other attorneys who are familiar with the energy sector — calling in a 'knee-jerk' reaction. Additionally the company noted that they had complied with all applicable environmental regulations. The family itself? Still in favor of oil and natural gas extraction: 'We are not anti-fracking or anti-drilling. My goodness, we live in Texas. Keep it in the pipes, and if you have a leak or spill, report it and be respectful to your neighbors. If you are going to put this stuff in close proximity to homes, be respectful and careful.'"
New submitter electronic convict writes: "Hulu, apparently worried that too many non-U.S. residents are using cheap VPN services to watch its U.S. programming, has started blocking IP address ranges belonging to known VPN services. Hulu didn't announce the ban, but users of the affected VPNs are getting this message: 'Based on your IP-address, we noticed that you are trying to access Hulu through an anonymous proxy tool. Hulu is not currently available outside the U.S. If you're in the U.S. you'll need to disable your anonymizer to access videos on Hulu.' Hulu may make Hollywood happy by temporarily locking out foreign users — at least until they find new VPN providers. But in so doing it's now forcing its U.S. customers to sacrifice their privacy and even to risk insecure connections. Hulu hasn't even implemented SSL on its site."