We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
mpicpp sends this news from the BBC: The U.K. government has revealed that intelligence service GCHQ can snoop on British citizens' use of Facebook, Twitter and Google without a warrant because the firms are based overseas. U.K. spy boss Charles Farr said that such platforms are classified as external communications. The policy was revealed as part of an ongoing legal battle with campaign group Privacy International (PI). PI said the interpretation of the law "patronizes the British people." According to Mr Farr, Facebook, Twitter, Facebook, YouTube and web searches on Google, as well as webmail services such as Hotmail and Yahoo are classified as "external communications," which means that they can be intercepted without the need for additional legal clearance."
phrackthat writes with an update to Friday's news that the IRS cannot locate two years worth of email from Lois Lerner, a central figure in the controversy surrounding the IRS's apparent targeting of Tea Party groups for extra scrutiny. Now, the IRS says there are another six workers for whom the agency cannot locate emails. As with Lerner, they attribute the unrecoverable emails to computer crashes. Among them was Nikole Flax, who was chief of staff to Lerner’s boss, then-deputy commissioner Steven Miller. Miller later became acting IRS commissioner, but was forced to resign last year after the agency acknowledged that agents had improperly scrutinized tea party and other conservative groups when they applied for tax-exempt status. Documents have shown some liberal groups were also flagged. ... Lerner’s computer crashed in the summer of 2011, depriving investigators of many of her prior emails. Flax’s computer crashed in December 2011, Camp and Boustany said. The IRS said Friday that technicians went to great lengths trying to recover data from Lerner’s computer in 2011. In emails provided by the IRS, technicians said they sent the computer to a forensic lab run by the agency’s criminal investigations unit. But to no avail.
Advocatus Diaboli sends this excerpt from an article about the data collection capabilities of the Nest Protect 'smart' smoke alarms, and how they could become a privacy concern:
Consider that each Protect is packed full of sensors, some of which are capable of much more than they're doing right now: From heat and light sensors to motion sensors and ultrasonic wave sensors. This simple little device could scrape an incredible amount of data about your life if Nest asked it to: From when you get home, to when you go to bed, to your daily routine, to when you cook dinner. Now imagine how a device like that would interlock with another that you keep on your wrist, like the forthcoming Android Wear. Together, they would create a seamless mesh of connectivity where every detail of what you do and where you go is recorded into a living, breathing algorithm based on your life.
Neither Nest nor Google has stated any intention to turn Nest's hardware into more than it is right now. Protect is an alarm, the Thermostat is a thermostat. But as Google ramps up its vision to connect every aspect of our world, from Android Wear to its acquisition of a company that specializes in high-res, near-instantaneous satellite imagery of Earth, it's easier than ever to see why it would cough up billions for a company that has installed hundreds of thousands of Wi-Fi connected devices in the homes of Google users."
jppiiroinen writes: At the end of 2007, when Nokia still had huge market share with Symbian devices, they failed to disclose that somebody had stolen their encryption keys and extorted them for millions of Euros. The Finnish National Bureau of Investigation has not been able to figure out who did it. "The blackmailer had gotten hold of the Symbian encryption key used for signing. The code is a few kilobytes in size. Had the key been leaked, Nokia would not have been able to ensure that the phones accept only applications approved by the company."
An anonymous reader writes: A proposal from Democrats in the U.S. House and Senate would require the FCC to stop ISPs from creating "internet fast lanes." Senator Patrick Leahy (D-VT) said, "Americans are speaking loud and clear. They want an Internet that is a platform for free expression and innovation, where the best ideas and services can reach consumers based on merit rather than based on a financial relationship with a broadband provider." Representative Doris Matsui (D-CA) added, "A free and open Internet is essential for consumers. Our country cannot afford 'pay-for-play' schemes that divide our Internet into tiers based on who has the deepest pockets." Unfortunately, this is only half a solution — the bill doesn't actually add to the FCC's authority. It only requires them to use the authority they currently have, which is questionable at best.
Jason Koebler (3528235) writes Internet slang: Do you use it? If so, do it AYOR (at your own risk), because the FBI knows exactly what you're saying thanks to the agency's insane list of "Twitter shorthand." Rather than just rely on Urban Dictionary or a Google search, the agency has compiled an 83 page list of more than 2,800 acronyms. The FBI responded to a FOIA request with one of the most illegible scans of a document you'll ever see, embedded on a CD — so maybe the agency isn't all that up on its technology, or maybe it's just doing its best to KTAS (keep this a secret). Please use one of your favorites in a grammatical sentence referencing current events, and/or your favorite food, to help build up the corpus.
An anonymous reader writes A team of researchers at the UC Santa Barbara and RWTH Aachen presented new findings on the relationship of spam actors [abstract; full paper here] at the ACM Symposium on Information, Computer and Communications Security. This presents the first end-to-end analysis of the spam delivery ecosystem including: harvesters crawl the web and compile email lists, botmasters infect and operate botnets, and spammers rent botnets and buy email lists to run spam campaigns. Their results suggest that spammers develop a type of "customer loyalty"; spammers likely purchase preferred resources from actors that have "proven" themselves in the past. Previous work examined the market economy of the email address market in preparatory work: 1 million email addresses were offered on the examined forum for anywhere ranging between 20 and 40 Euros.
stephendavion (2872091) writes Hackers who compromised the servers of Domino's Pizza have demanded a ransom of €30,000 or they will publish the records of more than 600,000 customers – including their favourite toppings. "Earlier this week, we hacked our way into the servers of Domino's Pizza France and Belgium, who happen to share the same vulnerable database," wrote Rex Mundi [the name the perpetrators go by]. "And boy, did we find some juicy stuff in there!"
An anonymous reader writes In the aftermath of the European Court of Justice "right to be forgotten" decision, many asked whether a similar ruling could arise elsewhere. While a privacy-related ruling has yet to hit Canada, Michael Geist reports that last week a Canadian court relied in part on the decision in issuing an unprecedented order requiring Google to remove websites from its global index. The ruling is unusual since its reach extends far beyond Canada. Rather than ordering the company to remove certain links from the search results available through Google.ca, the order intentionally targets the entire database, requiring the company to ensure that no one, anywhere in the world, can see the search results.
mpicpp (3454017) writes with news of amateur drones appearing at the World Cup, quoting Ars Technica: "France's World Cup soccer team has filed a complaint with FIFA, claiming that someone used a small unmanned aircraft to spy on the team's training camp near São Paulo, Brazil as players prepared for their match against Honduras Sunday, the BBC reports. The quadrocopter appears from video to be a Phantom II autonomous micro-drone with a video camera.
'Apparently, drones are being used more and more,' France's manager Didier Deschamps told the BBC. 'We don't want intrusion into our privacy. It's hard to fight.' Deschamps did not comment on who might be behind the surveillance but said in an interview with Football Italia that he believed the drone was operated by one of France's potential opponents or by a French news agency." Police later captured the drone operator, who claimed just to be a fan bitten by a bit too much curiosity.
v3rgEz (125380) writes "Collaborative investigative news site MuckRock is trying to take a national look at Stingray usage across America, and is looking for people to submit contact information for their local police departments and other law enforcement groups for a mass FOIA campaign. The submissions are free, but the site is also running a crowdfunding campaign to cover the cost of stamps, etc. on Beacon Reader." This comes after news broke that the federal government has been pushing for local police to avoid disclosing their use of Stringray devices.
An anonymous reader writes in with news that the IRS lost email scandal is far from over. Representative Steve Stockman (R-TX) has sent a formal letter to the National Security Agency asking it to hand over "all its metadata" on the e-mail accounts of a former division director at the Internal Revenue Service. "Your prompt cooperation in this matter will be greatly appreciated and will help establish how IRS and other personnel violated rights protected by the First Amendment," Stockman wrote on Friday. The request came hours after the IRS told a congressional committee that it had "lost" all of the former IRS Exempt Organizations division director's e-mails between January 2009 and April 2011.
An anonymous reader writes in with news about proposed rules regarding mapping technology used in cars.Many are in favor of rules that prevent texting while driving, but in-car navigation is a murkier legal area — how do you minimize distractions without limiting the ability to get from point A to point B? Like it or not, the US government may settle that debate before long. The proposed Grow America Act would let the National Highway Traffic Safety Administration (NHTSA) set rules for dash-mounted GPS units, smartphone mapping apps and anything else you'd use for driving directions. While it's not clear what the NHTSA would do with its power, the Department of Transportation's voluntary guidelines ask for limits on eye-catching visuals (think videos) and interaction times; don't be surprised if these enter the rulebooks.
An anonymous reader writes Ikea has sent the IkeaHackers blog a C&D order over the usage of the Ikea name. IkeaHackers hosts articles on how to hack Ikea furniture to make it more useful in daily life. From the article: "Speaking to the BBC, an Ikea representative said: 'We feel a great responsibility to our customers and that they always can trust Ikea... many people want to know what really is connected to Ikea - and what isn't. And we think that people should have that right. When other companies use the Ikea name for economic gain, it creates confusion and rights are lost.'
walterbyrd (182728) writes "A list of hundreds of patents that Microsoft believes entitle it to royalties over Android phones, and perhaps smartphones in general, has been published on a Chinese language website. The patents Microsoft plans to wield against Android describe a range of technologies. They include lots of technologies developed at Microsoft, as well as patents that Microsoft acquired by participating in the Rockstar Consortium, which spent $4.5 billion on patents that were auctioned off after the Nortel bankruptcy."
PC Magazine reports that following Elon Musk's announcement that Tesla would be freeing for other electric car makers to use the various patents that the company has amassed, at least two companies — Mazda and BMW — are said to be interested in meeting with Tesla, for a very good reason: According to undisclosed sources speaking to the Financial Times, both Nissan and BMW would be interested in working with Tesla to craft up some universal vehicle charging standards. To quote unnamed official: "It is obviously clear that everyone would benefit if there was a far more simple way for everyone to charge their cars."
itwbennett (1594911) writes "In a victory for the Electronic Frontier Foundation (EFF), which is suing to make the DOJ release information about surveillance on U.S. citizens, a California judge on Friday ordered the Department of Justice to produce 66 pages of documents for her review. The judge said the agency failed to justify keeping the documents secret and she will decide whether the documents, including one opinion and four orders by the U.S. Foreign Intelligence Surveillance Court (FISC), were improperly withheld from the public."
think_nix (1467471) writes The EU Parliament is paving the way for EU Nation States to decide on banning or allowing GMO foods within their respective territories. An further article at Der Spiegel (German) (Google translation) quotes the German Health Minister's claim that if countries cannot specifically, scientifically argue for a ban, this would allow GMO companies to initiate legal actions against the banning ruling states. Furthermore it was noted, given EU Parliaments current stance on not reintroducing border and customs controls between member states, this will make checks and controls of GMO foods between member states even more difficult.
An anonymous reader writes MIT researchers believe the solution to misuse and leakage of private data is more transparency and auditability, not adding new layers of security. Traditional approaches make it hard, if not impossible, to share data for useful purposes, such as in healthcare. Enter HTTPA, HTTP with accountability.
From the article: "With HTTPA, each item of private data would be assigned its own uniform resource identifier (URI), a component of the Semantic Web that, researchers say, would convert the Web from a collection of searchable text files into a giant database. Every time the server transmitted a piece of sensitive data, it would also send a description of the restrictions on the data’s use. And it would also log the transaction, using the URI, in a network of encrypted servers."
Charliemopps (1157495) writes "A lawsuit filed in September 2013 in the Northern District of California alleged that LinkedIn misled its users about the number of times it would attempt to invite their contacts using their name. LinkedIn tried to get the suit dismissed but Thursday Judge Lucy Koh ruled the suit can continue."
ktetch-pirate (1850548) writes Earlier this week, Nominet launched the .uk domain to great fanfare, but hidden in that activity has been Nominet's new policy of exposing personal domain owners' home addresses. Justification is based on a site being judged "commercial," which can mean anything from a few Google ads or an Amazon widget, to an email subscription box or linking to too many commercial sites, according to Nominet reps. In the meantime though, they want your driving license or passport to ensure "accuracy" because they "want to make things safe."
mrspoonsi (2955715) writes with word of a new extension to European consumer protection laws: Previously, anyone who bought a product online was allowed seven business days during which they were able to change their mind and return the product for a full refund. This 'cooling-off period,' during which a refund can be requested without being required to give a reason for the cancellation, has now been extended to fourteen calendar days from the date on which the goods are received. Online retailers and providers are now also banned from 'pre-ticking' optional extras on order forms, such as those adding insurance to the cost of a purchase. For the first time, laws have also been introduced to offer a cooling-off period for digital content, including music, films and books, as BBC News reports. Consumers may now cancel an order for digital content within fourteen days, but only if they have not downloaded it.
An anonymous reader writes The Federal Communications Commission (FCC) announced on Friday that it has successfully obtained the details regarding paid peering deals between Netflix and Comcast as well as Verizon and is working to obtain similar information for other video streamers and their respective ISP peers. The FCC's goal is, as they pointed out themselves, not to regulate as yet but to examine these deals with the goal of providing some transparency to the American public regarding the internet services they pay for. Verizon and Comcast issued statements expressing their willingness to be open about their peering activities and stressed that no regulation is required. The peering market 'has functioned effectively and efficiently for over two decades without government intervention,' Comcast claimed at a congressional hearing. The Free Press policy director nevertheless points out that 'when the FCC required reporting from AT&T after the company blocked Skype in 2009 and Google Voice in 2012, the disclosures revealed that AT&T was indeed misleading its customers.'
mpicpp (3454017) writes with an update from Ars Technica to this story: "The Illinois man who made headlines when he was detained for parodying the town's mayor on Twitter sued the Peoria politician and local police, claiming on Thursday that his civil rights were violated. As part of the April raid, the authorities seized the mobile phone and laptop of the 29-year-old prankster, Jonathan Daniel, and reviewed their contents, which he says was in violation of his First Amendment rights. Daniel, the operator of the @peoriamayor handle shut down by Twitter after the city threatened a lawsuit, was initially accused of impersonating a public official in violation of Illinois law. The authorities never lodged charges, however."
NewYorkCountryLawyer (912032) writes In Authors Guild v Hathitrust, the US Court of Appeals for the Second Circuit has found that scanning whole books and making them searchable for research use is a fair use. In reaching its conclusion, the 3-judge panel reasoned, in its 34-page opinion (PDF), that the creation of a searchable, full text database is a "quintessentially transformative use", that it was "reasonably necessary" to make use of the entire works, that maintaining four copies of the database was reasonably necessary as well, and that the research library did not impair the market for the originals. Needless to say, this ruling augurs well for Google in Authors Guild v. Google, which likewise involves full text scanning of whole books for research.
As reported by the Associated Press, via US News & World Report, the IRS says that it cannot locate much of the email sent by a former IRS official over a two-year period. "The IRS told Congress Friday it cannot locate many of Lois Lerner's emails prior to 2011 because her computer crashed during the summer of that year. Lerner headed the IRS division that processed applications for tax-exempt status. The IRS acknowledged last year that agents had improperly scrutinized applications for tax-exempt status by tea party and other conservative groups." Three congressional committees are investigating the agency because of the allegations of politically motivated mishandling of those applications, as is the Justice Department and the IRS's own inspector general. As the story says, "Congressional investigators have shown that IRS officials in Washington were closely involved in the handling of tea party applications, many of which languished for more than a year without action. But so far, they have not publicly produced evidence that anyone outside the agency directed the targeting or even knew about it." CBS News has a slightly different version, also based on the AP's reporting.
Jason Koebler writes: At least 20 states have laws that make it illegal for communities to offer local government-owned high speed internet access. Wednesday, Federal Communications Commission Chairman Tom Wheeler threw consumers a bone by suggesting that the agency could make it easier for cities to skirt those laws. That's a great first step — but many cities have locked themselves into telecom company-caused messes the FCC probably can't fix. The FCC's power becomes much less certain once you drill into the other major reason—besides state laws—why cities can't offer broadband to their constituents: local, long-term agreements with internet service providers.
An anonymous reader writes For the past several months, many Canadians have been debating privacy reform, with the government moving forward on two bills involving Internet surveillance and expanded voluntary, warrantless disclosure of personal information. Today, the Supreme Court of Canada entered the debate and completely changed the discussion, issuing its long-awaited R. v. Spencer decision, which examined the legality of voluntary warrantless disclosure of basic subscriber information to law enforcement. Michael Geist summarizes the findings, noting that the unanimous decision included a strong endorsement of Internet privacy, emphasizing the privacy importance of subscriber information, the right to anonymity, and the need for police to obtain a warrant for subscriber information except in exigent circumstances or under a reasonable law.
New submitter criticalmass24 writes: 42-year-old Marcel Lehel Lazar, better known as Guccifer, the hacker that gained unauthorized access to email and social network accounts of high-profile public figures, has been charged in the United States. According to the Department of Justice, "[F]rom December 2012 to January 2014, Lazar hacked into the e-mail and social media accounts of high-profile victims, including a family member of two former U.S. presidents, a former U.S. Cabinet member, a former member of the U.S. Joint Chiefs of Staff, and a former presidential adviser. After gaining unauthorized access to their e-mail and social media accounts, Lazar publicly released his victims’ private e-mail correspondence, medical and financial information, and personal photographs. The indictment also alleges that in July and August 2013, Lazar impersonated a victim after compromising the victim’s account." The full indictment can be read online.
ClownP writes with news that the U.S. Marshals Service is selling off 29,656.51306529 Bitcoins that were seized when the Silk Road website was shut down. At current exchange rates, they're worth around $17-18 million. The coins will be auctioned off in nine blocks of 3,000 coins, plus one block with the remainder. The USMS said that the first deadline for bidders will be 9am Eastern Time on June 16, 2014. All bidders must complete the government's Bidder Registration Form, which requires that you provide a copy of a government-issued ID as well as a $200,000 deposit sent by wire transfer from an American bank. The government added that the highest bidder will win, and he or she cannot finance its payment in installments — the winner must pay the full amount in cash. The USMS added one final stipulation. "The USMS will not sell to any person who is acting on behalf of or in concert with the Silk Road and/or Ross William Ulbricht, and bidders will be required to so certify," the USMS stated.
mrspoonsi (2955715) writes The EU's top court is considering a test case which could oblige employers to treat obesity as a disability. Denmark has asked the European Court of Justice to rule on the case of a male childminder who says he was sacked for being too fat. The court's final ruling will be binding across the EU. It is seen as especially significant because of rising obesity levels in Europe and elsewhere, including the US. If the judges decide it is a disability then employers could face new obligations. Employers might in future have a duty to create reserved car parking spaces for obese staff, or adjust the office furniture for them, she said.
An anonymous reader writes in with news about ride-share crackdowns in California. California regulators are threatening to revoke permits for on-demand ride companies UberX, Lyft, Sidecar, Summon and Wingz unless they stop giving rides to and from airports within two weeks. The move could lead to the state shutting down the companies' operations. Flouting the airport rules also flouts regulations that the CPUC set up for the new generation of ride companies to operate in California. In a clear rebuttal to an argument often made by the ride companies, Peevey wrote: "These safety requirements should not hinder your creativity nor should they impede your innovation."
schwit1 (797399) writes with this story from the Associated Press, as carried by Yahoo News: The Obama administration has been quietly advising local police not to disclose details about surveillance technology they are using to sweep up basic cellphone data from entire neighborhoods, The Associated Press has learned. Citing security reasons, the U.S. has intervened in routine state public records cases and criminal trials regarding use of the technology. This has resulted in police departments withholding materials or heavily censoring documents in rare instances when they disclose any about the purchase and use of such powerful surveillance equipment. Federal involvement in local open records proceedings is unusual. It comes at a time when President Barack Obama has said he welcomes a debate on government surveillance and called for more transparency about spying in the wake of disclosures about classified federal surveillance programs.
mpicpp (3454017) writes Facebook users who are annoyed by the targeted ads that pop up in their News Feed will soon have more control over what they see. Like Google, Facebook collects all kinds of information on its users and uses that information to serve up targeted ads. For some people, especially privacy advocates, it seemed a little creepy to have a social network tracking a user's activity and then using that data to sell them stuff. On Thursday, Facebook announced that users will soon be able to opt out of that targeted ad system through controls in their Web browser and iOS and Android phones. Facebook will also show users what information they have collected about them and let them edit the kinds of ads they want to see. If someone is confused about why they are seeing an ad for P.F. Chang's, for example, they can simply click on "Why am I seeing this ad?"
mknewman (557587) writes with a welcome followup to the broad hints that Tesla might release some of its patents for others to use patents that it has amassed. Now, Elon Musk writes on the company's blog: Yesterday, there was a wall of Tesla patents in the lobby of our Palo Alto headquarters. That is no longer the case. They have been removed, in the spirit of the open source movement, for the advancement of electric vehicle technology. Tesla Motors was created to accelerate the advent of sustainable transport. If we clear a path to the creation of compelling electric vehicles, but then lay intellectual property landmines behind us to inhibit others, we are acting in a manner contrary to that goal. Tesla will not initiate patent lawsuits against anyone who, in good faith, wants to use our technology.
The Guardian reports that Alaa Abd El Fattah, "one of the activists most associated with the 2011 uprising that briefly ended 60 years of autocratic rule, was sentenced to 15 years in jail for allegedly organising a protest – an act banned under a law implemented last November, and used to jail several revolutionary leaders. ... Abd El Fattah was also jailed under Mubarak, the military junta that succeeded him, and Adly Mansour, the interim president installed after the overthrow of Mohamed Morsi last summer. Under Morsi, Abd El Fattah escaped prison, but was placed under investigation." The EFF points ou that Abd El Fattah "is one of many caught up in the Egyptian government’s attempt to assert powers. Alaa set an example for how the Internet could be used to organize and exercise free speech: Egypt's leaders should not be permitted to make an example of him to silence others." Update: 06/12 20:02 GMT by T : Reader Mostafa Hussein points out that Abd El Fattah took part in a Slashdot interview more than 10 years ago, too; it gives some insight into the tech scene (and a bit of the politics) of Egypt at that time.
ectoman (594315) writes Proponents of patent reform in the United States glimpsed a potential victory late last year, when the House of Representatives passed H.R. 3309, the Innovation Act, designed to significantly mitigate patent abuse. Just months ago, however, the Senate pulled consideration of the bill. And since then, patent reform has been at a standstill. In a new analysis for Opensource.com, Mark Bohannon, Vice President of Corporate affairs and Global Public Policy at Red Hat, explains three reasons why. "For this year, at least," he writes, "the prospect of addressing abusive patent litigation through Congressional action is on ice"—despite the unavoidable case for reform.
Jason Koebler (3528235) writes The government cannot use cell phone location data as evidence in a criminal proceeding without first obtaining a warrant, an appeals court ruled today, in one of the most important privacy decisions in recent memory. "In short, we hold that cell site location information is within the subscriber's reasonable expectation of privacy," the United States Court of Appeals for the Eleventh Circuit ruled. "The obtaining of that data without a warrant is a Fourth Amendment violation."
walterbyrd (182728) writes Last week, it transpired that the big cable companies were bankrolling fake consumer groups like Broadband for America and The American Consumer Institute. These 'independent consumer advocacy groups' are, in truth, nothing of the sort, and instead represent the interests of its benefactors, in the fight against net neutrality. If that wasn't bad enough, VICE is now reporting that several of the real community groups (and an Ohio bed-and-breakfast) that were signed up as supporters of Broadband for America were either duped into joining, or were signed up to the cause without their consent or knowledge.
wiredmikey (1824622) writes With the FIFA World Cup 2014 kicking off this week in Brazil, cybercriminals and scammers are working hard to take advantage of visitors to the World Cup in Brazil and those following the world soccer tournament online. In recent months, several security vendors have published advisories about the various scams, phishing and malware operations that target Internet users interested in the World Cup. While individuals from all over the world have been targeted, many of the malicious campaigns focus on Brazil and neighboring South American countries. While news that cybercriminals are zoning in on a large global event is no surprise, the scale and tactics being used is quite wide in scope, ranging from malware distribution and phishing scams, to fraudulent ticket sales, spam and other promising yet fraudulent schemes.For those visiting Brazil to watch the games in person, the cyber threats also include rogue wireless access points, ATMs rigged with card skimmers and Point-of-Sale malware.
alphadogg (971356) writes China makes headlines every other week for its censorship of the Internet, but few people outside the country know what it's like to live with those access controls, or how to get around them. This IDG News Service writer has lived in China for close to six years and censorship has been a near constant, lurking in the background ready to "harmonize" the Web and throw a wrench in his online viewing. It's been especially evident this month. Google's services, which don't follow the strict censorship rules, are currently blocked. How long that will last is unknown, but it coincides with the 25th anniversary of the Tiananmen Square protests earlier this month — an event the Chinese government wants no one to remember.
trazom28 writes: Hachette books aren't the only products that are now harder to order on Amazon — the online retailer is going after movies, too. Amazon has turned off the preorder function for DVDs of prominent Warner Bros. films as it seeks to raise pressure on the company during negotiations. The Lego Movie, for example, is listed as "currently unavailable" on Amazon. Set for release in the home video marketplace on June 17, there is no option to place a preorder."
An anonymous reader writes "For the first time in United States political history, the House Majority Leader has been defeated in his primary election. Long time Republican congressman and House Majority Leader Eric Cantor was defeated by 10 percentage points in the Virginia primary by Republican Tea Party challenger Dave Brat. This shocking defeat is likely to upset the political balance of power in the United States for years to come."
angry tapir writes: All bits running over the Internet are not equal and should not be treated that way by broadband providers, despite net neutrality advocates' calls for traffic neutral regulations, Cisco Systems has said. Some Web-based applications, including rapidly growing video services, home health monitoring and public safety apps, will demand priority access to the network, while others, like most Web browsing and email, may live with slight delays, said Jeff Campbell, Cisco's vice president for government and community relations. "Different bits do matter differently. We need to ensure that we have a system that allows this to occur."
An anonymous reader writes "Tenure laws one of the most controversial aspects of education reform, and now the tide seems to be turning against them. A California judge has handed down a ruling that such laws are unconstitutional, depriving students of an education by sometimes securing positions held by bad teachers. The judge said, "Substantial evidence presented makes it clear to this court that the challenged statutes disproportionately affect poor and/or minority students. The evidence is compelling. Indeed, it shocks the conscience." The plaintiff's case was that "California's current laws make it impossible to get rid of the system's numerous low-performing and incompetent teachers; that seniority rules requiring the newest teachers to be laid off first were harmful; and that granting tenure to teachers after only two years on the job was farcical, offering far too little time for a fair assessment of their skills." This is a precedent-setting case, and there will likely be many similar cases around the country as tenure is challenged with this new ammunition."
mpicpp sends this report from Ars: A cinema chain announced Tuesday that it is now barring patrons from wearing Google Glass at its movie houses across the U.S. in a bid to clamp down on piracy. Alamo Drafthouse, which runs theaters in Colorado, Michigan, Missouri, Texas, Virginia, and soon in California, is among the first U.S. chains to ban Google's computerized eyewear. 'Google Glass is officially banned from @drafthouse auditoriums once lights dim for trailers,' the chain's chief executive, Tim League, tweeted. The decision comes as Google has made the eyewear readily available to the general public, and it follows a slew of incidents in which wearers of Google Glass have had brushes with the law.
Reader Bruce66423 (1678196) points out skeptical-sounding coverage at the Washington Post of the NSA's claim that it can't hold onto information it collects about users' online activity long enough for it to be useful as evidence in lawsuits about the very practice of that collection. From the article: 'The agency is facing a slew of lawsuits over its surveillance programs, many launched after former NSA contractor Edward Snowden leaked information on the agency's efforts last year. One suit that pre-dates the Snowden leaks, Jewel v. NSA, challenges the constitutionality of programs that the suit allege collect information about Americans' telephone and Internet activities. In a hearing Friday, U.S. District for the Northern District of California Judge Jeffrey S. White reversed an emergency order he had issued earlier the same week barring the government from destroying data that the Electronic Frontier Foundation had asked be preserved for that case. The data is collected under Section 702 of the Amendments Act to the Foreign Intelligence Surveillance Act. But the NSA argued that holding onto the data would be too burdensome. "A requirement to preserve all data acquired under section 702 presents significant operational problems, only one of which is that the NSA may have to shut down all systems and databases that contain Section 702 information," wrote NSA Deputy Director Richard Ledgett in a court filing submitted to the court. The complexity of the NSA systems meant preservation efforts might not work, he argued, but would have "an immediate, specific, and harmful impact on the national security of the United States.' Adds Bruce66423: "This of course implies that they have no backup system — or at least that the backup are not held for long."
wonkavader (605434) writes 'Lawrence Lessig's MAYDAY.US Super PAC to end all Super PACs (and more) is now on its second round of funding. The PAC has been reported on here before, but now the numbers are bigger. They hit their $1 million first goal easily, but now they aim to get another $5 million in the same time period. Lessig says that he's arranged for matching, again. It seems like the goals will be even higher in 2016: "For 2014, our goal is to raise $12 million and use it to make fundamental reform the key issue in five congressional races. And we'll apply what we learn then to 2016."'
schwit1 (797399) writes 'It wasn't touted onstage, but a new iOS 8 feature is set to cause havoc for location trackers, and score a major win for privacy.As spotted by Frederic Jacobs, the changes have to do with the MAC address used to identify devices within networks. When iOS 8 devices look for a connection, they randomize the MAC address, effectively disguising any trace of the real device until it decides to connect to a network.'
PvtVoid (1252388) writes "In the semiannual report to Congress by the NSF Office of Inspector General, the organization said it received reports of a researcher who was using NSF-funded supercomputers at two universities to mine Bitcoin. The computationally intensive mining took up about $150,000 worth of NSF-supported computer use at the two universities to generate bitcoins worth about $8,000 to $10,000, according to the report. It did not name the researcher or the universities."