We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
An anonymous reader writes "Senator Al Franken can be counted among the many who are at odds with the FCC's proposed net neutrality rules. From the article: 'Senator Al Franken has a pretty good idea of what the term "net neutrality" means—and that, he says, puts him head-and-shoulders above many of his colleagues in the U.S. Congress. "We literally have members of Congress—I've heard members of the House—say, 'We've had all this innovation on the Internet without net neutrality. Why do we need it now?'" he told TIME in an interview last week. "I want to say, 'Come on, just try to understand the idea. Or at least just don't give a speech if you don't know what you're saying. Please—it hurts my head."'"
SonicSpike (242293) points out this article about a mask that can foil surveillance cameras and provide fuel for nightmares. "If the world starts looking like a scene from Matrix 3 where everyone has Agent Smith's face, you can thank Leo Selvaggio. His rubber mask aimed at foiling surveillance cameras features his visage, and if he has his way, plenty of people will be sporting the Personal Surveillance Identity Prosthetic in public. It's one of three products made by the Chicago-based artist's URME Surveillance, a venture dedicated to 'protecting the public from surveillance and creating a safe space to explore our digital identities.' 'Our world is becoming increasingly surveilled. For example, Chicago has over 25,000 cameras networked to a single facial recognition hub,' reads the URME (pronounced U R Me) site. 'We don't believe you should be tracked just because you want to walk outside and you shouldn't have to hide either. Instead, use one of our products to present an alternative identity when in public.'"
ClownP (1315157) writes in with this story about a hacker who did some of his work while aboard a nuclear aircraft carrier. " A former sailor assigned to a US nuclear aircraft carrier and another man have been charged with hacking the computer systems of 30 public and private organizations, including the US Navy, the Department of Homeland Security, AT&T, and Harvard University. Nicholas Paul Knight, 27, of Chantilly, VA, and Daniel Trenton Krueger, 20, of Salem, IL, were members of a crew that hacked protected computers as part of a scheme to steal personal identities and obstruct justice, according to a criminal complaint unsealed earlier this week in a US District Court in Tulsa, Oklahoma. The gang, which went by the name Team Digi7al, allegedly took to Twitter to boast of the intrusions and publicly disclose sensitive data that was taken. The hacking spree lasted from April 2012 to June 2013, prosecutors said."
An anonymous reader writes "An article by David Cole at the NY Review of Books lays out why we should care as much about the collection of metadata as we do about the collection of the data itself. At a recent debate, General Michael Hayden, who formerly led both the NSA and the CIA, told Cole, 'we kill people based on metadata.' The statement is stark and descriptive: metadata isn't just part of the investigation. Sometimes it's the entire investigation. Cole talks about the USA Freedom Act, legislation that would limit the NSA's data collection powers if it passes. The bill contains several good steps in securing the privacy of citizens and restoring due process. But Cole says it 'only skims the surface.' He writes, 'It does not address, for example, the NSA's guerilla-like tactics of inserting vulnerabilities into computer software and drivers, to be exploited later to surreptitiously intercept private communications. It also focuses exclusively on reining in the NSA's direct spying on Americans. ... In the Internet era, it is increasingly common that everyone's communications cross national boundaries. That makes all of us vulnerable, for when the government collects data in bulk from people it believes are foreign nationals, it is almost certain to sweep up lots of communications in which Americans are involved.' He concludes, '[T]he biggest mistake any of us could make would be to conclude that this bill solves the problem.'"
An anonymous reader writes "A article on The Register titled talks about a demo that was given in London last month by NCC Group where they turned a modern TV into an audio bug. 'The devices contain microphones and cameras that can be utilized by applications — Skype and similar apps being good examples. The TV has a fairly large amount of storage, so would be able to hold more than 30 seconds of audio – we only captured short snippets for demonstrations purposes. A more sophisticated attack could store more audio locally and only upload it at certain times, or could even stream it directly to a server, bypassing the need to use any of the device’s storage.' Given the Snowden revelations and what we've seen previously about older tech being deprecated, how can we protect ourselves with the modern devices (other than not connecting them to the Internet)?"
phmadore writes: "Some clever German pranksters managed to put one over on a sect of the intelligentsia just the other day. In this 30-minute presentation (video) at the re:publica 2014 tech conference, activists going under the pseudonyms of Paul von Ribbeck and Gloria Spindle presented four new (and moderately credible) Google products making up the 'Google Nest': Google Trust, Google Hug, Google Bee, and Google Bye. 'We can't really guarantee that we protect your information, but we can do our very best to protect you,' says Spindle about eight minutes in. Google is reportedly rather upset about the whole affair. The conference organizers were in on the joke — the audience were clued in afterward and asked to participate in order to fool the media. For me, the discussion-worthy items here are: data insurance and the value of data."
An anonymous reader writes "The U.S. Department of Justice says it needs greater authority to hack remote computers in the course of an investigation. The agency reasons that criminal operations involving computers are become more complicated, and argues that its own capabilities need to scale up to match them. An ACLU attorney said, 'By expanding federal law enforcement's power to secretly exploit "zero-day"' vulnerabilities in software and Internet platforms, the proposal threatens to weaken Internet security for all of us.' This is particularly relevant in the wake of Heartbleed — it's been unclear whether the U.S. government knew about it before everyone else did. This request suggests that the DOJ, at least, did not abuse it — but it sure looks like they would've wanted to. You can read their request starting on page 499 of this committee meeting schedule."
Hugh Pickens DOT Com (2995471) writes "Jaikumar Vijayan reports at Computerworld that a physician at Columbia University Medical Center (CU) attempted to "deactivate" a personally owned computer from a hospital network segment that contained sensitive patient health information, creating an inadvertent data leak that is going to cost the hospital $4.8 million to settle with the U.S. Department of Health and Human Services (HHS). The error left patient status, vital signs, laboratory results, medication information, and other sensitive data on about 6,800 individuals accessible to all via the Web. The breach was discovered after the hospital received a complaint from an individual who discovered personal health information about his deceased partner on the Web. An investigation by the HHS Office for Civil Rights (OCR) found that neither Columbia University nor New York Presbyterian Hospital, who operated the network jointly, had implemented adequate security protections, or undertook a risk analysis or audit to identify the location of sensitive patient health information on the joint network. "For more than three years, we have been cooperating with HHS by voluntarily providing information about the incident in question," say the hospitals. "We also have continually strengthened our safeguards to enhance our information systems and processes, and will continue to do so under the terms of the agreement with HHS." HHS has also extracted settlements from several other healthcare entities over the past two years as it beefs up the effort to crack down on HIPAA violations. In April, it reached a $2 million settlement with with Concentra Health Services and QCA Health Plan. Both organizations reported losing laptops containing unencrypted patient data."
angry tapir (1463043) writes "The Australian government is eyeing the introduction of a government-wide content-management system, with the preferred choice almost certain to be Drupal. Government documents indicate that part of the appeal is that Drupal modules can be easily shared between government agencies and with the public."
First time accepted submitter ChelleChelle2 (2908449) writes "Edward Snowden's release of classified material exposing the existence of numerous global surveillance programs (obtained while working as an NSA contractor at Booz Allen Hamilton) has been referred to as 'the most damaging breach of secrets in U.S. history.' Regardless of whether one choses to champion or condemn Snowden's actions, it is apparent that the NSA needs to dramatically rework its security measures. In this article Bob Toxen, renown author of several books and articles on Linux Security, discusses the security practices that could have stopped Snowden. Equally interesting, he weighs in on the constitutionality and morality of the NSA's spying on all Americans."
New submitter rjune (123157) writes with some rare positive news from the online ride-sharing world, specifically from Milwaukee. "Ald. Robert Bauman is drafting a proposed ordinance that, if approved by the Common Council, would change the way public passenger vehicles are regulated and licensed. The proposal, expected to be outlined on Friday before the Common Council's Public Transportation Review Board, not only lifts the cap on taxicab vehicle perimits but accommodates new smartphone app services such as Uber and Lyft. Both Uber and Lyft are already in the marketplace." I wish that the cities I spend the most time in would do the same, but they've been busily protecting the local cartels, instead.
Lucas123 writes "A U.S. District Court has ruled that Marvell Technology must pay Carnegie Mellon University (CMU) $1.54B for infringing on two hard drive chip patents. Marvell was also ordered to pay interest at 0.14% annually, and 50 cents for each chip sold that uses the intellectual property. While Marvell did not comment on the case, CMU said it 'understands' that Marvell will again appeal the ruling and the school 'will look forward to the federal circuit court' upholding the lower court's ruling. The latest decision by a U.S. District Court in Western Pennsylvania ends for now a five-year legal battle between the two. In 2012, a jury found Marvell had violated CMU's patents, and the chip maker then appealed that ruling."
An anonymous reader writes "Two weeks ago, SpaceX filed suit against the U.S. Air Force in an attempt to enforce competition for rocket purchases. They argued it was a bad idea to blindly shovel money into Russia's coffers for rides to space, and said there was no way for other rocket manufacturers to get a foot in the door. Last week, it looked like they were getting traction — an injunction was granted, temporarily halting the Air Force's process of buying rockets. Unfortunately for SpaceX, that injunction has now been dissolved. At the heart of the suit was Executive Order 13,661, which blocks the transfer of wealth to people in the Russian Federation who are related to the situation in the Ukraine. SpaceX said that since Russian Deputy Prime Minister Dmitry Rogozin was the head of their space agency, payments to the agency were effectively payments to him. The U.S. departments of Commerce, State, and the Treasury all sent letters to the court saying this was not the case, and the court agreed. Here's the final ruling."
An anonymous reader writes "Remember the court battle between Google and Oracle? It's the one where Oracle claimed Android violated Oracle's patents and copyright related to Java. Oracle thought they deserved $6 billion in compensation, but ended up getting nothing. Well, it's still going, and the tide is turning somewhat in Oracle's favor. An appeals court decided that Oracle can claim copyright over some parts of Java. It's a complicated ruling (PDF) — parts of it went Google's way and parts of it went Oracle's way — but here's the most important line: '[T]he declaring code and the structure, sequence, and organization of the 37 Java API packages at issue are entitled to copyright protection.' A jury's earlier finding of infringement has been reinstated, and now it's up to Google to justify its actions under fair use."
An anonymous reader writes "Following the FCC's proposal a couple weeks ago to allow an internet fast lane, a group of activists has come up with a fun counterproposal: force the FCC itself into the slow lane and see how they like it. They write, 'Since the FCC seems to have no problem with this idea, I've (through correspondence) gotten access to the FCC's internal IP block, and throttled all connections from the FCC to 28.8kbps modem speeds on the Neocities.org front site, and I'm not removing it until the FCC pays us for the bandwidth they've been wasting instead of doing their jobs protecting us from the "keep America's internet slow and expensive forever" lobby.' The group has published the code snippet that throttles FCC IP addresses, and they encourage other web admins to implement it."
New submitter echo-e writes: "A deal has been made between groups representing content creators and ISPs in the UK concerning how the ISPs should respond to suspected illegal file sharers. In short, the ISPs will send letters or emails with an 'educational' rather than threatening tone, alerting users to legal alternatives. The rights holders will be notified of the number of such alerts that have been sent out, but only the ISPs will know the identity of the offenders. Only four of the UKs ISPs have agreed to the 'Voluntary Copyright Alert Programme' so far, but the remaining ISPs are expected to join the programme at a later stage. The debate between rights holders and ISPs has raged on for years. This agreement falls short of the of the proposals put forward by the rights holders groups, but the ISPs have argued that it is not their responsibility to police users and that a legal process already exists for going after individuals."
Bruce66423 (1678196) writes in with news about a planned protest by London black-cab drivers against Uber. "London black-cab drivers are planning to cause gridlock in the city to protest against car service Uber. The Licensed Taxi Drivers Association complains that Uber's drivers are using a smartphone app to calculate fares despite it being illegal for private vehicles to be fitted with taximeters. Transport for London has declined to intervene, because it disagrees that there has been a breach of the law. LTDA now plans to force the issue by holding the action in early June. 'Transport for London not enforcing the Private Hire Vehicles Act is dangerous for Londoners,' Steve McNamara, LTDA's general secretary, told the BBC. 'I anticipate that the demonstration against TfL's handling of Uber will attract many many thousands of cabs and cause severe chaos, congestion and confusion across the metropolis.'"
The New York Times is one of many outlets reporting that Snapchat has agreed to settle with the FTC about the gap between promises made about the company's "disappearing" communications system and reality. "The Federal Trade Commission on Thursday said Snapchat had agreed to settle charges that the company was deceiving users about the ephemeral nature of the photos and video messages sent through its service. The messages were significantly less private than the company had said, the commission said. In marketing the service, Snapchat has said that its messages “disappear forever.” But in its complaint, the commission said the messages, often called snaps, can be saved in several ways. The commission said that users can save a message by using a third-party app, for example, or employ simple workarounds that allow users to take a screenshot of messages without detection." Besides the monetary side of the settlement (details of which are promised soon on the FTC's site), the company has agreed to operate for the next 20 years with special supervision of a new privacy program; it seems a little optimistic as a timeframe for any social-media related business. Here are the FTC's charges (PDF).
An anonymous reader writes "The U.S. Patent Office granted Amazon a patent in March that basically describes taking a picture with a white background. Amazon claims that their method is unique to current photography methods because they can achieve the effect of a true white background without retouching the photo or using any sort of post-processing technique. Some professional photographers disagree, claiming that plenty of prior art exists embodying Amazon's described method and furthermore that this pre-existing method is what the photography industry calls 'shooting against a seamless white backdrop.'"
Trailrunner7 (1100399) writes "If law enforcement gets hold of your locked iPhone and has some interest in its contents, Apple can pull all kinds of content from the device, including texts, contacts, photos and videos, call history and audio recordings. The company said in a new document that provides guidance for law enforcement agencies on the kinds of information Apple can provide and what methods can be used to obtain it that if served with a search warrant, officials will help law enforcement agents extract specific application-specific data from a locked iOS device. However, that data appears to be limited to information related to Apple apps, such as iMessage, the contacts and the camera. Email contents and calendar data can't be extracted, the company said in the guidelines."
mask.of.sanity (1228908) writes with this excerpt from The Register: "'Intel security subsidiary McAfee may be in hot water after it allegedly scraped thousands of records from the Open Source Vulnerability Database instead of paying for them. The slurp was said to be conducted using fast scripts that rapidly changed the user agent, and was launched after McAfee formally inquired about purchasing a license to the data.' Law experts say the site's copyright could be breached by individuals merely downloading the information in contravention to the site's policies, and did not require the data to be subsequently disseminated."
beaverdownunder (1822050) writes "Victoria Australia's Taxi Directorate has begun a crackdown on Melbourne Uber drivers, fining them $1700 each for operating a taxi service illegally, with total fines apparently equalling over $50000. In response, Uber has shut down its Melbourne service, and has refused to comment on whether its drivers will be compensated, since Uber told them they were providing a legal service. (Fined Uber drivers could take the company to the state's consumer tribunal: stay tuned!) Uber is set to meet with the Directorate next week but it is likely the demands the Directorate will place on Uber drivers, such as mandatory criminal record checks, vehicle inspections and insurance, will make the service in Melbourne unviable. Meanwhile, the New South Wales government is awaiting a report to determine if Uber drivers operating in that state are doing so illegally, warning that drivers could face substantial fines if they are found to have been operating in breach of the law. In South Australia, it doesn't even appear Uber will get off the ground — the state has made it clear that those who operate as an Uber driver will be driving without being covered by the state's mandatory insurance coverage, essentially de-registering their vehicle and making them liable for fines and license suspension."
PuceBaboon (469044) writes "Earlier today (Thursday), police in Kawasaki, Japan, arrested a man for violation of the firearms control law. He was apparently in possession of five, 3D-printed handguns, two of which were reportedly capable of firing normal rounds (although no actual bullets were found). The suspect was arrested after releasing video of the guns online. Japan has very strict gun control laws and, whether or not the suspect actually appeared in the alleged video, he may just have signed himself up for some serious porridge."
First time accepted submitter sumakor (3571543) writes "The House Judiciary Committee has advanced a weakened version of the USA Freedom Act (HR3361). The amended compromise version allows collection of phone call records up to two hops away from a target, potentially including millions of customer records, and allows for collection without a judge's order in emergency cases. The amended bill also drops the requirement for a privacy advocate who can appeal the rulings of the Foreign Intelligence Surveillance Court and extends the controversial Section 215 of the Patriot Act from 2015 through 2017.
Despite these significant changes the amended bill has been endorsed by the ACLU and the EFF as a first step and the most promising path towards reigning in government surveillance. The two organizations called for further Congressional measures to tighten control of surveillance authorities including an explicit definition of the term 'selector,' a reduction in the number of hops from 2 to 1 under most circumstances and the closing the loophole that allows searches of Americans' data inadvertently collected thru Section 702.
The bill now proceeds to the House Intelligence Committee, who has advanced its competing bill, the FISA Transparency and Modernization Act (HR 4291). The committee will mark up both bills on the same day, beginning at 10am Thursday, behind closed doors."
An anonymous reader writes "The London Metropolitan Police Service (MPS) is reportedly engaging in a year-long pilot program to determine the benefits of its police force wearing video cameras during interactions with the public. 'The pilot will include a total of 500 cameras distributed across ten city boroughs.' London joins some major U.S. cities in this endeavor to improve the quality of policing through the use of wearable cameras. Privacy advocates argue, however, that police officers having these devices on their persons is not enough: 'the efficacy of police body-mounted cameras as a crime reduction and accountability tool hinges on enforcement of good policies and procedures—including something as basic as preventing officers from being able to deactivate the cameras at their own discretion.'"
An anonymous reader writes "Almost every modern abusive relationship has a digital component, from cyberstalking to hacking phones, emails, and social media accounts, but women's shelters increasingly have found themselves on the defensive, ill-equipped to manage and protect their clients from increasingly sophisticated threats. Recently the Tor Project stepped in to help change that. Andrew Lewman, executive director of the project, 'thinks of the digital abuse epidemic like a doctor might consider a biological outbreak. "Step one, do not infect yourself. Step two, do not infect others, especially your co-workers. Step three, help others," he said. In the case of digital infections, like any other, skipping those first two steps can quickly turn caretakers into infected liabilities. For domestic violence prevention organizations that means ensuring their communication lines stay uncompromised. And that means establishing a base level of technology education for staff with generally little to no tech chops who might not understand the gravity of clean communication lines until faced with a situation where their own phone or email gets hacked.'"
randomErr (172078) writes "Russia is tightening its grip on free speech and freedom of the Internet by creating a new 'bloggers law'. This policy follows the pattern set by China, Pakistan, Turkey, and Iran." Any site with more than 3000 daily visitors will be required to register and be held to a number of restrictions, quoting the article: "Besides registering, bloggers can no longer remain anonymous online, and organizations that provide platforms for their work such as search engines, social networks and other forums must maintain computer records on Russian soil of everything posted over the previous six months."
judgecorp (778838) writes "RightsCorp, the controversial copyright enforcer, is planning to begin operations in Europe. In the U.S., the company scans torrents for IP addresses on behalf of media companies, shares them with ISPs, forcing them to send lawyers' letters (using the DMCA) demanding money from the supposed copyright infringers. RightsCorp says Europe needs its help in fighting piracy." They recently expanded operations into Canada as well.
An anonymous reader writes "Argentinian political activists are developing an open source program that will allow voters to direct their representatives on how to vote on certain issues by giving voters a platform to debate and vote on issues themselves. Started as an accompaniment to and a fundamental feature of a new political party in Argentina, Democracy OS is not designed to be anonymous (i.e., no secret ballots, no anonymous comments). 'Fortunately, the software isn't yet being used to gather real votes, just to gather public feedback.' Critics see this program as yet another iteration of Germany's Pirate Party, which could not engage enough voters in its own open source program, Liquid Feedback, to gain any meaningful policy direction from their constituents. German newspaper Der Spiegel once called the movement 'a grassroots democracy where no one is showing up to participate.'"
DeviceGuru (1136715) writes "Raytheon is switching its UAV control system from Solaris to Linux for U.S. military drones, starting with a Northrop Grumman MQ-8C Fire Scout helicopter. Earlier this month Raytheon entered into a $15.8 million contract with the U.S. Navy to upgrade Raytheon's control systems for unmanned aerial vehicles (UAVs), according to a recent Avionics Intelligence report. The overhaul is designed to implement more modern controls to help ground-based personnel control UAVs. Raytheon's tuxified version of its Vertical Takeoff and Landing Unmanned Air Vehicle Tactical Control System (TCS) will also implement universal UAV control qualities. As a result the TCS can be used in in all U.S. Navy, Air Force, Army, and Marine Corps UAVs that weigh at least 20 pounds. By providing an open standard, the common Linux-based platform is expected to reduce costs by limiting the types of UAV control systems that need to be built and maintained for each craft."
An anonymous reader writes "Forbes reported on Monday that The President of Russia's Council on Civil Society and Human Rights very briefly and supposedly by accident posted the actual results of the Crimean secession vote. According to the blog post, which has since been taken down, only 30% of Crimeans participated in the vote instead of the 83% participation officially advertised by Russia, and of that 30% only half voted for secession, which means that 15% of all Crimeans voted for secession rather than the 82% officially reported by Russia. There is no way for this claim to be verified as no foreign observers were allowed during the voting process. The vote is reportedly being conducted again during the 'May 11 referendum on the status of the so-called People's Republic of Donetsk.'" We've had a lot of discussion over the years about election methods and transparency; it would be interesting to hear from Ukranian readers in particular on this topic.
An anonymous reader writes "Vigilant Solutions maintains what they claim is the nation's largest database of license-plate tracking data, 'LEARN' (Law Enforcement Archival and Reporting Network). But when a law enforcement agency signs up to use the database, they are sworn to keep it secret. The reason? They are quite clear about that: 'to prohibit users from cooperating with any media outlet to bring attention to LEARN or LEARN-NVLS.' So, they're tracking you (they're tracking everybody)... but they don't want you to know. The agreement, uncovered by the Electronic Frontier Foundation, states: You shall not create, publish, distribute, or permit any written, electronically transmitted or other form of publicity material that makes reference to LEARN or this Agreement without first submitting the material to LEARN-NVLS and receiving written consent from LEARN-NVLS. This prohibition is specifically intended to prohibit users from cooperating with any media outlet to bring attention to LEARN or LEARN-NVLS. Breach this provision may result in LEARN-NVLS immediately termination of this Agreement upon notice to you."
Immediately after WIRED published the story, though, the agreement mysteriously changed. The secrecy provision is still there, but the statement that it's 'specifically intended' to prevent the media attention has vanished."
SonicSpike (242293) writes with news that the ACLU and Rand Paul both think every Senator should read David Barron's legal memos justifying the use of drones against an American citizen before he is confirmed to the 1st Circuit Court of Appeals. From the article: "Paul, the junior Republican senator from Kentucky, has informed Reid he will object to David Barron's nomination to the 1st Circuit Court of Appeals unless the Justice Department makes public the memos he authored justifying the killing of an American citizen in Yemen. The American Civil Liberties Union supports Paul's objection, giving some Democratic lawmakers extra incentive to support a delay to Barron's nomination, which could come to the floor in the next two weeks. Barron, formerly a lawyer in the Justice Department's Office of Legal Counsel, penned at least one secret legal memo approving the Sept. 2011 drone strike that killed Anwar al-Awlaki, a radical Muslim cleric whom intelligence officials accused of planning terrorist attacks against the United States."
Jason Koebler (3528235) writes "A Redditor got more than he bargained for in the mail today: He was accidentally mailed parts to a $350,000 environment and wildlife monitoring drone owned by the National Ocean and Atmospheric Administration. 'We sent a set of about eight boxes for this one aircraft system, and one was misdelivered by UPS. We're working with UPS to find it,' the federal agency says."
randomErr (172078) writes "The US Department of Defense is investigating whether Bitcoin and other virtual currencies are a potential terrorist threat. The Combating Terrorism Technical Support Office (CTTSO), a division within DOD that identifies and develops counter terrorism abilities and investigates irregular warfare and evolving threats, has listed Bitcoin among its topics for research and mission critical analysis related to terrorism."
Daniel_Stuckey (2647775) writes "How risky is it to use the words "bomb," "plague," or "gun" online? That was a question we posed, tongue in cheek, with a web toy we built last year called Hello NSA. It offers users suggested tweets that use words that drawn from a list of watchwords that analysts at the Dept. of Homeland Security are instructed to search for on social media. "Stop holding my love hostage," one of the tweets read. "My emotions are like a tornado of fundamentalist wildfire." It was silly, but it was also imagined as an absurdist response to the absurdist ways that dragnet surveillance of the public and non-public Internet jars with our ideas of freedom of speech and privacy. And yet, after reading the mounting pile of NSA PowerPoints, are all of us as comfortable as we used to be Googling for a word like "anthrax," even if we were simply looking up our favorite thrash metal band? Maybe not. According to a new study of Google search trends, searches for terms deemed to be sensitive to government or privacy concerns have dropped "significantly" in the months since Edward Snowden's revelations in July."
An anonymous reader writes "The Mozilla Foundation is filing a petition asking the FCC to declare that ISPs are common carriers, with a twist. 'The FCC doesn't have to reclassify the Internet access ISPs offer consumers as a telecommunications service subject to common carrier regulations under Title II of the Communications Act, Mozilla says. Instead, the FCC should target the service ISPs offer to edge providers like Netflix and Dropbox, who need to send their bits over ISP networks to reach their customers. Classifying the ISP/edge provider relationship as a common carrier service will be a little cleaner since the FCC wouldn't have to undo several decade-old orders that classified broadband as an "information" service rather than telecommunications, Mozilla argues.'" Here's the Mozilla blog post and the 13-page petition.
An anonymous reader writes "Addressing the audience at the Freedom Online Coalition Conference, Secretary of State John Kerry defended NSA snooping actions saying: 'Let me be clear – as in the physical space, cyber security cannot come at the expense of cyber privacy. And we all know this is a difficult challenge. But I am serious when I tell you that we are committed to discussing it in an absolutely inclusive and transparent manner, both at home and abroad. As President Obama has made clear, just because we can do something doesn't mean that we should do it. And that's why he ordered a thorough review of all our signals intelligence practices. And that's why he then, after examining it and debating it and openly engaging in a conversation about it, which is unlike most countries on the planet, he announced a set of concrete and meaningful reforms, including on electronic surveillance, in a world where we know there are terrorists and others who are seeking to do injury to all of us. And finally, transparency – the principles governing such activities need to be understood so that free people can debate them and play their part in shaping these choices. And we believe these principles can positively help us to distinguish the legitimate practices of states governed by the rule of law from the legitimate practices of states that actually use surveillance to repress their people. And while I expect you to hold the United States to the standards that I've outlined, I also hope that you won't let the world forget the places where those who hold their government to standards go to jail rather than win prizes.' He added: 'This debate is about two very different visions: one vision that respects freedom and another that denies it. All of you at the Freedom Online Coalition are on the right side of this debate, and now we need to make sure that all of us together wind up on the right side of history."
wiredmikey (1824622) writes "As Europe powered up its most ambitious ever cybersecurity exercise this month, doubts were being raised over whether the continent's patchwork of online police was right for the job. The exercise, called Cyber Europe 2014, involved 200 organizations and 400 cybersecurity professionals from both the European Union and beyond. Yet some critics argued that herding together normally secretive national security agencies and demanding that they spend the rest of 2014 sharing information amounted to wishful thinking. Others questioned whether the law enforcement agencies taking part in the drill should be involved in safeguarding online security, in the wake of American whistleblower Edward Snowden's revelations of online spying by western governments. Eurostat figures show that, by January 2012, only 26 percent of EU enterprises had a formally defined information technology security plan in place. One industry insider said the view in Brussels is that EU cybersecurity was "like teenage sex: everyone says they are doing it but not that many actually are.""
theodp (442580) writes "Thankfully, no one's gone full-Charles-Bronson yet, but the NY Times reports that victims of smartphone theft are using GPS to take the law into their own hands, paying visits to thieves' homes and demanding the return of their stolen phones. "The emergence of this kind of do-it-yourself justice," writes Ian Lovett, "has stirred worries among law enforcement officials that people are putting themselves in danger, taking disproportionate risks for the sake of an easily replaced item." And while hitting "Find My iPhone" can take you to a thief's doorstep, LAPD Cmdr. Andrew Smith urges resisting the impulse to do so. "It's just a phone," he said. "it's not worth losing your life over. Let police officers take care of it. We have backup, guns, radio, jackets — all that stuff civilians don't have.""
New submitter postglock (917809) writes "Swype is a popular third-party keyboard for Android phones (and also available for Windows phones and other platforms). It's currently the second-most-popular paid keyboard in Google Play (behind SwiftKey), and the 17th highest of all paid apps. Recently, users have discovered that it's been accessing location data extremely frequently, making almost 4000 requests per day, or 2.5 requests per minute. The developers claim that this is to facilitate implementation of 'regional dialects,' but cannot explain why such frequent polling is required, or why this still occurs if the regional function is disabled. Some custom ROMs such as Cyanogenmod can block this tracking, but most users would be unaware that such tracking is even occurring." Readers in the linked thread don't all seem to see the same thing; if you are a Swype user, do you see thousands of location requests, none, or something in between?
Lasrick (2629253) writes "Princeton sociologist Janet Vertesi writes about her attempt at hiding her pregnancy from 'the bots, trackers, cookies and other data sniffers online that feed the databases that companies use for targeted advertising.' Big data still found her, even though she steered clear of social media, avoided baby-related credit card purchases, and downloaded Tor to browse the Internet privately."
jfruh (300774) writes "The Video Privacy Protection Act, a 1988 law that made it illegal for a video store to share your rental history, has thrown up roadblocks for modern-day streaming video sites. Last year Congress amended the law to make it possible for you to share your Netflix viewing history with your social media friends, as long as you opt in. But what does "opting in" entail? Hulu is now on the receiving end of a lawsuit over the fact that clicking the Facebook "like" button on a viewing page shares that viewing activity on Facebook."
An anonymous reader writes "A U.S. jury concluded Friday that Samsung had infringed on two of Apple's patents and that Apple had infringed on one of Samsung's patents. Prior to the trial, the judge had ruled that Samsung had infringed on one other Apple patent. Samsung will receive $158,400 in damages, although they had requested just over $6 million. Apple will receive $119.6 million in damages, although they had requested just over $2 billion and a ban on certain Samsung phones. Some say that a sales ban is unlikely to be approved by the judge. The jury is scheduled to return on Monday to resolve what appears to be a technical mistake in their verdict on one of the patents, and Apple may gain a few hundred thousand dollars in their damages award as a result."
As reported by TorrentFreak, a New York man's large-scale pirating of Ultimate Fighting Championship videos via The Pirate Bay and KickassTorrents has landed him on the uncomfortable end of a $32 million lawsuit. From the article: "Known online as Secludedly, the man uploaded at least 124 events. As a result UFC parent Zuffa is hitting him with everything from copyright infringement, to fraud, to breach of contract. ... The lawsuit, which includes two other doe defendants and an unknown company Zuffa refers to as XYZ Corp (“a business entity, the exact nature of which is unknown”), centers around the unlawful recording (“capping”), uploading and distribution of more than 120 UFC events via two of the world’s biggest torrent sites. ... Also receiving a prominent mention from Zuffa is the fact that Secludedly allowed people to donate via a PayPal in order to help with the financing of future ripping and uploading activities."
MouseTheLuckyDog (2752443) writes "In a recent story on reason.com it was reported that the DoJ is closing down the bank accounts of porn stars. Not knowing the site I googled around and found another site, the Guardian. The story does not end there. It turns out that this is part of a larger scheme (ironically) called Operation Choke Point. Also reported in a Washington Post article that downplays the practice. According to Cryptocoin news. There are thirty industries the DoJ is now targeteting: Ammunition Sales; Cable Box De-scramblers; Coin Dealers; Credit Card Schemes; Credit Repair Services; Dating Services; Debt Consolidation Scams; Drug Paraphernalia; Escort Services; Firearms Sales; Fireworks Sales; Get Rich Products; Government Grants; Home-Based Charities; Life-Time Guarantees; Life-Time Memberships; Lottery Sales; Mailing Lists/Personal Info; Money Transfer Networks; On-line Gambling; PayDay Loans; Pharmaceutical Sales; Ponzi Schemes; Pornography; Pyramid-Type Sales; Racist Materials; Surveillance Equipment; Telemarketing; Tobacco Sales; and Travel Clubs. But more can be added. (I notice alcohol sales is not on the list)." The Reason article stops short of saying that Choke Point is proven to be the reason for the account closures, but it seems very plausible.
An anonymous reader writes "In 2012, a card game called Asylum was successfully funded on Kickstarter. Two months later, its expected delivery date came and passed without a product. In July 2013, the company behind the game stopped communicating with backers. Now, the Washington state Attorney General has filed a consumer protection lawsuit against the makers. This is the first time a project from a crowdfunding site has been the target of such a lawsuit. The AG said, 'Consumers need to be aware that crowdfunding is not without risk. This lawsuit sends a clear message to people seeking the public's money: Washington state will not tolerate crowdfunding theft. The Attorney General's Office will hold those accountable who don't play by the rules.' Here's the legal document (PDF)."
An anonymous reader writes "When web browsers started implementing 'do-not-track' settings, Yahoo got some respect for being the first of the huge tech companies to honor those settings. Unfortunately, that respect has now gone out the door. As of this week, Yahoo will no longer alter their data collection if a user doesn't want to be tracked. They say there are two reasons for this. First, they want to provide a personalized web-browsing experience, which isn't possible using do-not-track. Second, they don't think do-not-track is viable. They say, '[W]e've been at the heart of conversations surrounding how to develop the most user-friendly standard. However, we have yet to see a single standard emerge that is effective, easy to use and has been adopted by the broader tech industry.' It looks like this is another blow to privacy on the web."
itwbennett writes: "A class-action lawsuit filed Thursday (PDF) accuses Google of strong-arming device manufacturers into making its search engine the default on Android devices, driving up the cost of those devices and hurting consumers. The suit does not argue that device manufacturers entered Mobile Application Distribution Agreements involuntarily, but that the market power of Google compels them to. 'Because consumers want access to Google's products, and due to Google's power in the U.S. market for general handheld search, Google has unrivaled market power over smartphone and tablet manufacturers,' says the suit."