We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
New submitter CarlThansk (3713681) writes The courts have long debated on if cell phones can be searched during an arrest without a warrant. Today, the Supreme Court unanimously ruled that the police need warrants to search the cellphones of people they arrest. "Chief Justice John G. Roberts Jr., writing for the court, said the vast amount of data contained on modern cellphones must be protected (PDF) from routine inspection." Phones may still be searched under limited circumstances (imminent threats), but this looks like a clear win for privacy. Quoting the decision: "We cannot deny that our decision today will have an impact on the ability of law enforcement to combat crime. Cell phones have become important tools in facilitating coordination and communication among members of criminal enterprises, and can provide valuable incriminating information about dangerous criminals. Privacy comes at a cost."
New submitter Last_Available_Usern (756093) writes that the Aereo saga is likely over. "The U.S. Supreme Court today dealt a potentially fatal blow to Aereo, an Internet service that allows customers to watch broadcast TV programs on mobile devices by renting a small DVR and antennas (in supported cities) to record and then retransmit local programming on-demand over the internet." Ruling (PDF). Aereo was found to be publicly transmitting, according to SCOTUSBlog "The essence of the Aereo ruling is that Aereo is equivalent to a cable company, not merely an equipment provider."
An anonymous reader writes The experts at Kaspersky Lab have discovered evidence of a targeted attack against the clients of a large European bank. According to the logs found in the server used by the attackers, apparently in the space of just one week cybercriminals stole more than half a million euros from accounts in the bank. The experts also detected transaction logs on the server, containing information about which sums of money were taken from which accounts. All in all, more than 190 victims could be identified, most of them located in Italy and Turkey. The sums stolen from each bank account, according to the logs, ranged between 1,700 to 39,000 euros.
New submitter Andreas Kolbe writes: "Businessman, philanthropist and musician Yank Barry and the Global Village Champions Foundation are suing four Wikipedia editors for defamation, claiming they have maliciously conspired to keep Barry's Wikipedia biography unduly negative. The Daily Dot article includes a copy of the legal brief and quotes Barry as saying, "My page was so ridiculously false and made me sound like a terrible person and people believed it causing deals to fall through. I finally had enough."
New submitter dmitrygr sends this news from Reuters: The U.S. government's no-fly list banning people accused of links to terrorism from commercial flights violates their constitutional rights because it gives them no meaningful way to contest that decision, a federal judge ruled on Tuesday. ... "The court concludes international travel is not a mere convenience or luxury in this modern world. Indeed, for many international travel is a necessary aspect of liberties sacred to members of a free society," [U.S. District Judge Anna Brown] wrote in her 65-page ruling (PDF). "Accordingly, on this record the court concludes plaintiff's inclusion on the no-fly list constitutes a significant deprivation of their liberty interests in international travel," Brown said.
An anonymous reader sends this report from Ars Technica: The Federal Aviation Administration has said that online shopping powerhouse Amazon may not employ drones to deliver packages, at least not anytime soon. The revelation was buried in an FAA document (PDF) unveiled Monday seeking public comment on its policy on drones, or what the agency calls "model aircraft." The FAA has maintained since at least 2007 that the commercial operation of drones is illegal. ... In Monday's announcement, published in the Federal Register, the FAA named Amazon's December proposal as an example of what is barred under regulations that allow the use of drones for hobby and recreational purposes. The agency did not mention Amazon Prime Air by name, but it didn't have to. Under a graphic that says what is barred, the FAA mentioned the "Delivering of packages to people for a fee." A footnote added, "If an individual offers free shipping in association with a purchase or other offer, FAA would construe the shipping to be in furtherance of a business purpose, and thus, the operation would not fall within the statutory requirement of recreation or hobby purpose."
An anonymous reader writes At the non-profit where I work, there isn't a lot of money for buying stock photos or licensing professional images. So, we've turned to sources of 'free' imagery, notably Creative Commons-licensed photos on Flickr. While we're not a huge organization, we do have 100+ individuals creating content in one way or another. We're now wrestling with compliance of the CC licensing, like including links for By Attribution images, etc. Our legal counsel is also scared of photographers changing their licenses and suing us after the fact. How do you document the images you find were licensed one way in the past, especially when numerous people from across the country are acquiring the images?
mpicpp (3454017) points out this story illustrating the problem of betting on the differential between the price of deliverable bitcoin-mining hardware and the price of bitcoin itself: Yet another Bitcoin miner manufacturer, CoinTerra, now faces legal action for not fulfilling an order when it originally promised to. CoinTerra is the third Bitcoin-related startup to face litigation for breach of contract and/or fraud in recent months. The CoinTerra lawsuit was filed in late April 2014 by an Oakland, California-based man seeking to be the lead plaintiff in a proposed class-action lawsuit. Lautaro Cline, the suit alleges, purchased a TerraMiner IV in October 2013 for delivery by January 2014. The company promised, he claims, that this miner would operate at two terahashes per second and would consume 1,200 watts of power. It did neither. However, Cline's suit also claims that CoinTerra did not deliver the miner until February 2014, and it "operated well below the speed advertised and consumed significantly more power than CoinTerra represented, causing Plaintiff to suffer significant lost profits and opportunities."
msm1267 (2804139) writes Controversial spyware commercially developed by Italy's Hacking Team and sold to governments and law enforcement for the purpose of surveillance has a global command and control infrastructure. For the first time, security experts have insight into how its mobile malware components work. Collaborating teams of researchers from Kaspersky Lab and Citizen Lab at the Monk School of Global Affairs at the University of Toronto today reported on their findings during an event in London. The breadth of the command infrastructure supporting Hacking Team's Remote Control System (RCS) is extensive, with 326 servers outed in more than 40 countries; the report also provides the first details on the inner workings of the RCS mobile components for Apple iOS and Android devices. Adds reader Trailrunner7: [T]he report also provides the first details on the inner workings of the RCS mobile components for Apple iOS and Android devices. The new modules enable governments and law enforcement officers with extensive monitoring capabilities over victims, including the ability to report on their location, steal data from their device, use the device's microphone in real time, intercept voice and SMS messages sent via applications such as Skype, WhatsApp, Viber, and much more.
An anonymous reader writes with this news from The Independent: An American driver is facing a $48,000 fine after using a mobile signal jammer in his car to block motorists around him from using their phones on the road. Jason Humphreys reportedly used the jammer from the back seat of his Toyota Highlander for around two years before being caught by Florida police. The 60-year-old said that he used the jammer – which transmits radio signals that interfere with mobile phones – because he was 'fed up' with watching others use their phones on the road. A story from late April (before the fine was levied) gives more detail: The case along I-4 started on April 29, 2013, when the cellular company Metro PCS contacted the Federal Communications Commission because a transmission tower along I-4 would suffer in the morning and evening. A week later, agents from the FCC's enforcement division in Tampa staked out the freeway on May 7, 8, and 9 and pinpointed a “strong wideband emission” in the cellphone wireless range “emanating from a blue Toyota Highlander sport utility vehicle,” with Florida license plates, according to a complaint issued by the FCC on Tuesday. Another clue: When Hillsborough County Sheriffs deputies stopped the SUV, their own two-way radios were jammed."
An anonymous reader writes The U.S. Court of Appeals for the 2nd Circuit last week reversed a tax evasion conviction against an accountant because the government had used data from his computers that were seized under a warrant targeting different suspects. The Fourth Amendment, the court pointed out, "prevents the seizure of one thing under a warrant describing another." Law enforcement originally made copies of his hard drives and during off-site processing, separated his personal files from data related to the original warrant. However, 1.5 years later, the government sifted through his personal files and used what it found to build a case against him. The appeals court held that "[i]f the Government could seize and retain non-responsive electronic records indefinitely, so it could search them whenever it later developed probable cause, every warrant to search for particular electronic data would become, in essence, a general warrant," which the Fourth Amendment protects against. The EFF hopes that the outcome of this appeal will have implications for the NSA's dragnet surveillance practice.
mpicpp (3454017) writes with news that a dump of fare logs from NYC cabs resulted in trip details being leaked thanks to using an MD5 hash on input data with a very small key space and regular format. From the article:
City officials released the data in response to a public records request and specifically obscured the drivers' hack license numbers and medallion numbers. ... Presumably, officials used the hashes to preserve the privacy of individual drivers since the records provide a detailed view of their locations and work performance over an extended period of time.
It turns out there's a significant flaw in the approach. Because both the medallion and hack numbers are structured in predictable patterns, it was trivial to run all possible iterations through the same MD5 algorithm and then compare the output to the data contained in the 20GB file. Software developer Vijay Pandurangan did just that, and in less than two hours he had completely de-anonymized all 173 million entries.
An anonymous reader writes in with news that the memo presenting a case for killing Anwar al-Awlaki has been released thanks to a Freedom of Information Act lawsuit. The U.S. Court of Appeals for the Second Circuit on Monday released a secret 2010 Justice Department memo justifying the killing of Anwar al-Awlaki, a U.S citizen killed in a drone strike in 2011. The court released the document as part of a Freedom of Information Act lawsuit filed by The New York Times and the American Civil Liberties Union to make the document public. Then-acting Assistant Attorney General David Barron, in the partially redacted 41-page memo, outlines the justification of the drone strike in Yemen to take out al-Awlaki, an alleged operational leader of al Qaeda.
UnknowingFool writes In Utility Air Regulatory Group v. EPA, the Supreme Court ruled against the EPA on some limits to greenhouse gases but also upheld other limits. In a 5-4 partial decision, the high court ruled that EPA overstepped their authority in requiring permits only for greenhouse gases for new and modified facilities using the Clean Air act. Such regulatory action can only be granted by Congress. But in the same case on a 7-2 decision, the court ruled that the EPA can enforce greenhouse gas limits on facilities that already require permits for other air pollutants. This leaves intact most of the new regulations proposed by the Obama administration earlier this month as many coal plants produce other air pollutants that can be regulated by the EPA.
samzenpus (5) writes "Lawrence Lessig's list of achievements and areas of influence is not small. He's co-founder of the Creative Commons, but it is his Mayday PAC however that has garnered the most attention recently. The crowdfunded "Super PAC to end all Super PACs" was launched in May with the goal of raising money to elect candidates who would pass campaign finance reform. It raised over $1 million in the first 13 days and has the support of some influential people. With the help of matching contributions, Mayday hopes to raise $12 million by the end of June. Lessig has agreed to answer any questions about the PAC that you might have. As usual, ask as many as you'd like, but please, one question per post."
Graculus writes with news about a plan to install sensors to collect environmental data and count people in Chicago. Chicago plans to install sensors in light poles to observe air quality, light intensity, sound volume, heat, precipitation, and wind. The sensors will also count people by observing cell phone traffic. The curled metal fixtures set to go up on a handful of Michigan Avenue light poles later this summer may look like delicate pieces of sculpture, but researchers say they'll provide a big step forward in the way Chicago understands itself by observing the city's people and surroundings. Some experts caution that efforts like the one launching here to collect data from people and their surroundings pose concerns of a Big Brother intrusion into personal privacy. In particular, sensors collecting cell phone data make privacy proponents nervous. But computer scientist Charlie Catlett said the planners have taken precautions to design their sensors to observe mobile devices and count contact with the signal rather than record the digital address of every device.
ygslash writes "Robert McMillen of Wired claims that we have gotten Net Neutrality all wrong. While we are all busy arguing about whether there should be regulations preventing large content providers from getting preferential bandwidth, McMillen says that not only have the large content providers already had preferential bandwidth for ten years, but that by now this has become an inherent part of the structure of the Internet and in practice cannot be changed. Instead, he says, the Net Neutrality discussion should be about ensuring a free and open competitive market for bandwidth, so that anyone who wants bandwidth can purchase it at a fair price.
hackingbear writes According to British patent consultancy CambridgeIP, China has filed for more than 2,200 graphene patents, the most of any country, followed by the U.S. with more than 1,700 patents, and South Korea with just under 1,200 patents. In terms of institutions, Samsung, Korea Advanced Institute of Science and Technology, and IBM lead the way of number of patent filing on this futurist materials with seemingly unlimited potentials, followed by Qinghua University of China. As China's moving its economy to be more innovation based and strengthening its IP laws, American companies will perhaps soon be at the receiving ends of patent law suits.
itwbennett writes Police in Dallas are scrambling after difficulties using a new records management system caused more than 20 jail inmates, including a number of people charged with violent crimes, to be set free. The prisoners were able to get out of jail because police officers struggling to learn the new system didn't file cases on them within three days, as required by law.
An anonymous reader writes For better or worse, surveillance technology is becoming more common in the workplace. These tools are being used to measure and monitor employees, with the promise changing how people work. "Through these new means, companies have found, for example, that workers are more productive if they have more social interaction. So a bank's call center introduced a shared 15-minute coffee break, and a pharmaceutical company replaced coffee makers used by a few marketing workers with a larger cafe area. The result? Increased sales and less turnover." Of course, this kind of monitoring raises privacy concerns. "Whether this kind of monitoring is effective or not, it's a concern," said Lee Tien, a senior staff lawyer at the Electronic Frontier Foundation in San Francisco.
An anonymous reader writes There have been many US military machines of war that seemed to be revolutionary, but never make it out of the prototype stage. As Robert Farley explains: "Sometimes they die because they were a bad idea in the first place. For the same reasons, bad defense systems can often survive the most inept management if they fill a particular niche well enough." A weapon can seem like an amazing invention, but it still has to adapt to all sorts of conditions--budgetary, politics, and people's plain bias. Here's a look at a few of the best weapons of war that couldn't win under these "battlefield" conditions.
schwit1 (797399) writes "The text of a 19-page, international trade agreement being drafted in secret was published by WikiLeaks as the transparency group's editor commemorated his two-year anniversary confined to the Ecuadorian Embassy in London. Fifty countries around the globe have already signed on to the Trade in Service Agreement, or TISA, including the United States, Australia and the European Union. Despite vast international ties, however, details about the deal have been negotiated behind closed-doors and largely ignored by the press. In a statement published by the group alongside the leaked draft this week, WikiLeaks said "proponents of TISA aim to further deregulate global financial services markets," and have participated in "a significant anti-transparency maneuver" by working secretly on a deal that covers more than 68 percent of world trade in services, according to the Swiss National Center for Competence in Research.
hypnosec writes A new movement dubbed the Open Wireless Movement is asking users to open up their private Wi-Fi networks to total strangers – a random act of kindness – with an aim of better securing networks and facilitating better use of finite broadband resources. The movement is supported by non-profit and pro-internet rights organizations like the Electronic Frontier Foundation (EFF), Mozilla, Open Rights Group, and Free Press among others. The EFF is planning to unveil one such innovation – Open Wireless Router – at the Hackers on Planet Earth (HOPE X) conference to be held next month on New York. This firmware will allow individuals to share their private Wi-Fi to total strangers to anyone without a password.
ectoman (594315) writes The U.S. Supreme Court issued a groundbreaking decision concerning software patents, claiming that abstract ideas are not by themselves patentable. The ruling was a cause for celebration among those opposed to software patent abuse, like Red Hat's Vice President and Assistant General Counsel, Rob Tiller. Here, Tiller analyzes and offers some context for the Court's ruling, which "uses the traditional common law methodology of comparing one case to previous similar cases and harmonizing with those most similar."
Advocatus Diaboli sends this excerpt from Wired: Police in Florida have, at the request of the U.S. Marshals Service, been deliberately deceiving judges and defendants about their use of a controversial surveillance tool to track suspects, according to newly obtained emails (PDF). At the request of the Marshals Service, the officers using so-called stingrays have been routinely telling judges, in applications for warrants, that they obtained knowledge of a suspect's location from a 'confidential source' rather than disclosing that the information was gleaned using a stingray.
jfruh (300774) writes "When the U.S. government shut down the Silk Road marketplace, they seized its assets, including roughly $18 million in bitcoin, and despite the government's ambivalence about the cryptocurrency, they plan to auction the bitcoin off to the highest bidder, as they do with most criminal assets. Ironically, considering many bitcoin users' intense desire for privacy, the U.S. Marshall service accidentally revealed the complete list of potential bidders by sending a message to everyone on the list and putting their addresses in the CC field instead of the BCC field."
Rambo Tribble (1273454) writes "Netcraft is reporting that criminals are mounting massive phishing attacks through online dating sites. The scams are numerous and target multiple sites. Actual methods range from blackmail to 419-style scams. Characteristically, fraudsters hijack an existing account on one of the services, then use that as a portal to deliver a PHP script to compromise the site. 'The latest attacks make use of a phishing kit which contains hundreds of PHP scripts, configured to send stolen credentials to more than 300 distinct email addresses.' The BBC offers additional insights ."
An anonymous reader writes "A research project dubbed the 'Array of Things' will add sensors for public monitoring throughout Chicago. The project is being started by a collaborative effort between the University of Chicago and Argonne National Laboratories. The goal of the project is to build a permanent data collection infrastructure to monitor things that might help government officials, researchers and companies better understand the city environment. Sensors will examine various attributes such as air quality, wind, light, sound heat, precipitation, and of course cell phone data. Eventually the researchers would like to see the sensors exist as a public utility throughout the entire city to help public, private and academic partners learn about the city. Researchers say there is nothing to fear about privacy because the sensors will only count people by observing cellphone traffic. With such assurances from researchers working in a shining example of transparency and democratic freedom like Chicago, what could possible go wrong?"
An anonymous reader writes We had some good news yesterday when the U.S. Supreme Court invalidated a software patent for failing to turn an idea into an invention. Unfortunately, the justices weren't willing to make any broader statements about the patentability of basic software tools, so the patent fights will continue. Timothy B. Lee at Vox argues that this is because the Supreme Court does not understand software, and says we won't see significant reform until they do.
He says, "If a sequence of conventional mathematical operations isn't patentable, then no software should enjoy patent protection. For example, the 'data compression' patents that Justice Kennedy wants to preserve simply claim formulas for converting information from one digital format to another. If that's not a mathematical algorithm, nothing is. This is the fundamental confusion at the heart of America's software patent jurisprudence: many judges seem to believe that mathematical algorithms shouldn't be patented but that certain kinds of software should be patentable. ... If a patent claims a mathematical formula simple enough for a judge to understand how it works, she is likely to recognize that the patent claims a mathematical formula and invalidate it. But if the formula is too complex for her to understand, then she concludes that it's something more than a mathematical algorithm and uphold it."
itwbennett writes: "A proposed $324.5 million settlement of claims that Silicon Valley companies (Adobe, Apple, Google, and Intel) suppressed worker wages by agreeing not to hire each others' employees may not be high enough, a judge signaled on Thursday. Judge Lucy Koh didn't say whether she would approve the settlement, but she did say in court that she was worried about whether that amount was fair to the roughly 64,000 technology workers represented in the case. Throughout Thursday's hearing, she questioned not just the amount but the logic behind the settlement as presented by lawyers for both the plaintiffs and the defendants."
An anonymous reader writes: The U.S. House of Representatives voted late Thursday night, 293 to 123, to approve an amendment to the NSA's appropriations bill that cuts all funding for warrantless surveillance and for programs that force companies to create backdoors in their products. The success of this vote in the House is attributed to the fact that the amendment did not have to go through the House Judiciary and Intelligence Committees and also to the increasingly apparent unpopularity of NSA activities among voters. Although privacy advocates laud the vote, there are those who note that the amendment specifically applies to the NSA and CIA while remaining silent on other agencies such as the FBI. The appropriations bill in its entirety will now proceed to the Senate for approval."
An anonymous reader writes Der Spiegel has written a piece on the extent of collaboration between Germany's intelligence agency, Bundesnachrichtendienst (BND), and the U.S.'s National Security Agency (NSA). The sources cited in the piece do reveal BND's enthusiastic collusion in enabling the NSA to tap fiber optic cables in Germany, but they seem inconclusive as to how much information from the NSA's collection activity in the country is actually shared between the NSA and BND. Of note is evidence that the NSA's collection methods do not automatically exclude German companies and organizations from their data sweep; intelligence personnel have to rectro-actively do so on an individual basis when they realize that they are surveilling German targets. Germany's constitution protects against un-warranted surveillance of correspondence, either by post or telecommunications, of German citizens in Germany or abroad and foreigners on German soil.
An anonymous reader writes Mark Karpeles doesn't seem to understand how much anger and trouble the $400 million Mt. Gox fiasco caused his customers. According to Wired: "After a long absence, the Mt Gox CEO has returned to Twitter with a bizarre string of tone-deaf tweets that were either written by a Turing test chat bot, or by a man completely oblivious to the economic chaos he has wrought. His first message after losing hundreds of millions of dollars worth of bitcoins? 'What would we do without busybox?'—a reference to a slimmed-down Linux operating system used on devices such as routers. He's also Tweeted about a noodle dish called yakisoba and Japanese transportation systems." Andreas Antonopoulos, the CSO with Blockchain says, "He continues to be oblivious about his own failure and the pain he has caused others. He is confirming that he is a self-absorbed narcissist with an inflated sense of self-confidence who has no remorse."
alphadogg writes A Chinese electronics vendor accused of selling signal jammers to U.S. consumers could end up leading the market in one dubious measure: the largest fine ever imposed by the Federal Communications Commission. The agency wants to fine CTS Technology $34,912,500 for allegedly marketing 285 models of jammers over more than two years. CTS boldly—and falsely—claimed that some of its jammers were approved by the FCC, according to the agency's enforcement action released Thursday. Conveniently, CTS' product detail pages also include a button to "report suspicious activity." The proposed fine, which would be bigger than any the FCC has levied for anti-competitive behavior, or a wardrobe malfunction, comes from adding up the maximum fines for each model of jammer the company allegedly sold in the U.S. The agency also ordered CTS, based in Shenzhen, China, to stop marketing illegal jammers to U.S. consumers and identify the buyer of each jammer it sold in the U.S.
Advocatus Diaboli (1627651) writes It has already been widely reported that the NSA works closely with eavesdropping agencies in the United Kingdom, Canada, New Zealand, and Australia as part of the so-called Five Eyes surveillance alliance. But the latest Snowden documents show that a number of other countries, described by the NSA as "third-party partners," are playing an increasingly important role – by secretly allowing the NSA to install surveillance equipment on their fiber-optic cables. The NSA documents state that under RAMPART-A, foreign partners "provide access to cables and host U.S. equipment." This allows the agency to covertly tap into "congestion points around the world" where it says it can intercept the content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype.
An anonymous reader writes There are several proposals on the table to stave off the impending insolvency of the Highway Trust Fund (which pays for transit, biking, and walking projects too) in two months. Just now, two senators teamed up to announce one that might actually have a chance. Senators Bob Corker (R-TN) and Chris Murphy (D-CT) have proposed increasing the gas tax by 12 cents a gallon over two years. The federal gas tax currently stands at 18.4 cents a gallon, where it has been set since 1993, when gas cost $1.16 a gallon.
New submitter UrsaMajor987 (3604759) writes I recently retired after a long career in IT. I am not ready to kick the bucket quite yet, but having seen the difficulty created by people dying without a will and documenting what they have and where it is, I am busy doing just that. At the end of it all, I will have documentation on financial accounts, passwords, etc., which I will want to share with a few people who are pretty far away. I can always print a copy and have it delivered to them, but is there any way to share this sort of information electronically? There are lots of things to secure transmission of data, but once it arrives on the recipients' desktop, you run the risk of their system being compromised and exposing the data. Does anyone have any suggestions? Is paper still the most secure way to go?
ciaran_o_riordan (662132) writes The US Supreme Court has just invalidated a patent for being a software patent! To no fanfare, the Court has spent the past months reviewing a case, Alice v. CLS Bank, which posed the question of "Whether claims to computer-implemented inventions ... are directed to patent-eligible subject matter." Their ruling was just published, and what we can say already is that the court was unanimous in finding this particular software patent invalid, saying: "the method claims, which merely require generic computer implementation, fail to transform that abstract idea into a patent-eligible invention," and go on to conclude that because "petitioner's system and media claims add nothing of substance to the underlying abstract idea, we hold that they too are patent ineligible." The End Software Patents wiki has a page for commenting the key extracts and listing third-party analyses. Analysis will appear there as the day(s) goes on. Careful reading is needed to get an idea of what is clearly invalidated (file formats?), and what areas are left for future rulings. If you can help, well, it's a wiki. Software Freedom Law Center's website will also be worth checking in the near future.
itwbennett (1594911) writes "Responding to more than a year of pressure, Google and Microsoft will follow Apple in adding an anti-theft "kill switch" to their smartphone operating systems. In New York, iPhone theft was down 19 percent in the first five months of this year. Over the same period, thefts of Samsung devices — which did not include a kill switch until one was introduced on Verizon-only models in April — rose by over 40 percent. In San Francisco, robberies of iPhones were 38 percent lower in the six months after the iOS 7 introduction versus the six months before, while in London thefts over the same period were down by 24 percent. In both cities, robberies of Samsung devices increased. 'These statistics validate what we always knew to be true, that a technological solution has the potential to end the victimization of wireless consumers everywhere,' said San Francisco District Attorney George Gascon."
An anonymous reader writes On a request from Matthew Green to fork the TrueCrypt code, the author answers that this is impossible. He says that this might be no good idea, because the code needs a rewrite, but he allows to use the existing code as a reference. "I am sorry, but I think what you're asking for here is impossible. I don't feel that forking TrueCrypt would be a good idea, a complete rewrite was something we wanted to do for a while. I believe that starting from scratch wouldn't require much more work than actually learning and understanding all of truecrypts current codebase. I have no problem with the source code being used as reference."
phrackthat (2602661) writes The Senate Finance Committee has been informed that the IRS recycled the hard drive of Lois Lerner, which will deprive investigators of the ability to forensically retrieve emails which were supposedly deleted or lost in a "crash." This news comes after the IRS revealed that it had lost the emails of Lois Lerner and six other employees who were being investigated regarding the targeting of conservative groups and donors.
An anonymous reader writes A group of internet industry executives and politicians came together to look back on the Telecommunications Act of 1996, and to do a little crystal-ball gazing about the future of broadband regulation in the United States. Former FCC commissioner Michael Copps was among the presenters, and he had sharp words for the audience about the "insanity" of the current wave of merger mania in the telecom field and the looming threats of losing net neutrality regulation.
BillCable writes: Politico reports, "In a major blow to the Washington Redskins, the U.S. Patent and Trademark Office on Wednesday canceled six federal trademarks of the 'Washington Redskins' team name because it was found to be 'disparaging' to Native Americans. 'We decide, based on the evidence properly before us, that these registrations must be canceled because they were disparaging to Native Americans at the respective times they were registered,' the PTO's Trademark Trial and Appeal Board wrote. The panel voted 2-1 in favor of the decision." Perhaps this move will speed up the inevitable name change, which was expected within the next few years."
Taco Cowboy writes: The net neutrality issue has become a hot topic recently, but on the mobile side, net neutrality rules are absent. Why? The wireless companies successfully convinced regulators four years ago to keep mobile networks mostly free of net neutrality rules. Now that FCC officials are looking into whether wireless networks should remain exempt from net neutrality rules, the mobile carriers are lobbying hard to maintain the status quo. "Wireless is different ... it is dependent on finite spectrum," said Meredith Attwell Baker, the new head of CTIA, the wireless industry's lobbying arm. Baker previously served as an FCC commissioner. On the other side of the issue, net neutrality advocates are "hoping to convince regulators to include wireless networks more fully under any new proposed rules. They are pushing for the FCC to re-regulate broadband Internet under a section of the law (called Title II), which was written with old phone networks in mind. ... The FCC will be taking public comments about what it should do about new net neutrality rules through the end of July." You can comment by emailing to firstname.lastname@example.org or go to file a Consumer Informal Complaint on the FCC's wesbite. Meanwhile, AT&T says that strong net neutrality regulations will ruin the internet.
jfruh (300774) writes with news that a complaint in Irish Court against Facebook for possibly sharing personal data of EU citizens with the NSA has escalated to the European Court of Justice which will review the continuance of the U.S./EU Safe Harbor Framework in light of PRISM. Under European laws, personal data of EU citizens can't be transferred to countries that don't meet EU standards for data protection. The U.S. doesn't meet those standards, but American companies have worked around this by using EU standards for the data of European citizens, even that data stored on servers outside of Europe. Now the EU's highest court will decide if this workaround is good enough — especially in light of revelations of the NSA's Prism data-mining program.
mpicpp sends this news from the BBC: The U.K. government has revealed that intelligence service GCHQ can snoop on British citizens' use of Facebook, Twitter and Google without a warrant because the firms are based overseas. U.K. spy boss Charles Farr said that such platforms are classified as external communications. The policy was revealed as part of an ongoing legal battle with campaign group Privacy International (PI). PI said the interpretation of the law "patronizes the British people." According to Mr Farr, Facebook, Twitter, Facebook, YouTube and web searches on Google, as well as webmail services such as Hotmail and Yahoo are classified as "external communications," which means that they can be intercepted without the need for additional legal clearance."
phrackthat writes with an update to Friday's news that the IRS cannot locate two years worth of email from Lois Lerner, a central figure in the controversy surrounding the IRS's apparent targeting of Tea Party groups for extra scrutiny. Now, the IRS says there are another six workers for whom the agency cannot locate emails. As with Lerner, they attribute the unrecoverable emails to computer crashes. Among them was Nikole Flax, who was chief of staff to Lerner’s boss, then-deputy commissioner Steven Miller. Miller later became acting IRS commissioner, but was forced to resign last year after the agency acknowledged that agents had improperly scrutinized tea party and other conservative groups when they applied for tax-exempt status. Documents have shown some liberal groups were also flagged. ... Lerner’s computer crashed in the summer of 2011, depriving investigators of many of her prior emails. Flax’s computer crashed in December 2011, Camp and Boustany said. The IRS said Friday that technicians went to great lengths trying to recover data from Lerner’s computer in 2011. In emails provided by the IRS, technicians said they sent the computer to a forensic lab run by the agency’s criminal investigations unit. But to no avail.
Advocatus Diaboli sends this excerpt from an article about the data collection capabilities of the Nest Protect 'smart' smoke alarms, and how they could become a privacy concern:
Consider that each Protect is packed full of sensors, some of which are capable of much more than they're doing right now: From heat and light sensors to motion sensors and ultrasonic wave sensors. This simple little device could scrape an incredible amount of data about your life if Nest asked it to: From when you get home, to when you go to bed, to your daily routine, to when you cook dinner. Now imagine how a device like that would interlock with another that you keep on your wrist, like the forthcoming Android Wear. Together, they would create a seamless mesh of connectivity where every detail of what you do and where you go is recorded into a living, breathing algorithm based on your life.
Neither Nest nor Google has stated any intention to turn Nest's hardware into more than it is right now. Protect is an alarm, the Thermostat is a thermostat. But as Google ramps up its vision to connect every aspect of our world, from Android Wear to its acquisition of a company that specializes in high-res, near-instantaneous satellite imagery of Earth, it's easier than ever to see why it would cough up billions for a company that has installed hundreds of thousands of Wi-Fi connected devices in the homes of Google users."
jppiiroinen writes: At the end of 2007, when Nokia still had huge market share with Symbian devices, they failed to disclose that somebody had stolen their encryption keys and extorted them for millions of Euros. The Finnish National Bureau of Investigation has not been able to figure out who did it. "The blackmailer had gotten hold of the Symbian encryption key used for signing. The code is a few kilobytes in size. Had the key been leaked, Nokia would not have been able to ensure that the phones accept only applications approved by the company."
An anonymous reader writes: A proposal from Democrats in the U.S. House and Senate would require the FCC to stop ISPs from creating "internet fast lanes." Senator Patrick Leahy (D-VT) said, "Americans are speaking loud and clear. They want an Internet that is a platform for free expression and innovation, where the best ideas and services can reach consumers based on merit rather than based on a financial relationship with a broadband provider." Representative Doris Matsui (D-CA) added, "A free and open Internet is essential for consumers. Our country cannot afford 'pay-for-play' schemes that divide our Internet into tiers based on who has the deepest pockets." Unfortunately, this is only half a solution — the bill doesn't actually add to the FCC's authority. It only requires them to use the authority they currently have, which is questionable at best.