Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.
Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and learn more about it. Thanks for reading, and for making the site better!
wiredmikey (1824622) writes Human Rights Watch on Friday demanded a clarification from Saudi Arabia over allegations from security researchers that the kingdom is infecting and monitoring dissidents' mobile phones with surveillance malware. The New York-based rights watchdog said surveillance software allegedly made by Italian firm Hacking Team mostly targeted individuals in Qatif district in Eastern Province, which has been the site of sporadic Shiite-led protests since February 2011. "We have documented how Saudi authorities routinely crack down on online activists who have embraced social media to call out human rights abuses," said Cynthia Wong, HRW's senior Internet researcher. "It seems that authorities may now be hacking into mobile phones, turning digital tools into just another way for the government to intimidate and silence independent voices." The accusations against the Saudi Government come days after researchers from Kaspersky Lab and Citizen Lab uncovered new details on advanced surveillance tools offered by HackingTeam [Note: mentioned in this earlier Slashdot story], including never before seen implants for smartphones running on iOS and Android.
Trailrunner7 writes The United States federal government issued more than 19,000 National Security Letters – perhaps its most powerful tool for domestic intelligence collection – in 2013, and those NSLs contained more than 38,000 individual requests for information. The new data was released by the Office of the Director of National Intelligence on Friday as part of its effort to comply with a directive from President Obama to declassify and release as much information as possible about a variety of tools that the government uses to collect intelligence. The directive came in the immediate aftermath of the first revelations by former NSA contractor Edward Snowden about the agency's capabilities, methods and use of legal authorities.
The use of NSLs is far from new, dating back several decades. But their use was expanded greatly after 9/11 and NSLs are different from other tools in a number of ways, perhaps most importantly in the fact that recipients typically are prohibited from even disclosing the fact that they received an NSL. Successfully fighting an NSL is a rare thing, and privacy advocates have been after the government for years to release data on their use of the letters and the number of NSLs issued. Now, the ODNI is putting some of that information into the public record."
dcblogs writes: In a speech Wednesday on the floor of the U.S. House of Representatives, Rep. Luis Gutierrez (D-Ill.) declared immigration reform dead. He chastised and baited Republicans in Congress for blocking reform, and declared that winning the White House without the support of a growing Hispanic population will become mathematically impossible. "The Republican Presidential nominee, whoever he or she may be, will enter the race with an electoral college deficit they cannot make up," said Gutierrez. If he's right, and comprehensive immigration reform is indeed dead, then so too is the tech industry's effort to raise the cap on H-1B visas. Immigration reform advocates have successfully blocked any effort to take up the immigration issue in piecemeal fashion, lest business support for comprehensive reform peel away. Next year may create an entirely new set of problems for tech. If the Republicans take control of the Senate, the tech industry will face this obstacle: Sen. Chuck Grassley (R-Iowa). Grassley, the ranking Republican on the Judiciary Committee could become its next chairman. He has been a consistent critic of the H-1B program through the years. "The H-1B program is so popular that it's now replacing the U.S. labor force," said Grassley, at one point.
Dega704 sends this news from Wired:
Plenty of nightmare surveillance theories surround the million-square-foot NSA facility opened last year in Bluffdale, Utah. Any locals driving by the massive complex Friday morning saw something that may inspire new ones: A massive blimp hovering over the center, with the letters NSA printed on its side.
Activist groups including the Electronic Frontier Foundation and Greenpeace launched the 135-foot thermal airship early Friday morning to protest the agency's mass surveillance programs and to announce the launch of Stand Against Spying, a website that rates members of Congress on their support or opposition to NSA reform. The full message on the blimp reads 'NSA: Illegal Spying Below' along with an arrow pointing downward and the Stand Against Spying URL."
blottsie writes: The Supreme Court ruled this week that it is illegal for police to search your phone without a warrant. But just because that's the new rule doesn't mean all 7.5 million law enforcement officers in the U.S. will abide by it. This guide, put together with the help of the EFF and ACLU, explains what to do if a police officer tries to search your phone without a warrant. Of course, that doesn't mean they don't have other ways of getting your data.
An anonymous reader writes Google often gets criticism for its seemingly boundless desire for data collection and analysis, but the company says it has higher ambitions than just figuring out how best to serve advertising. Speaking to the NY Times, Larry Page said, "We get so worried about these things that we don't get the benefits Right now we don't data-mine healthcare data. If we did we'd probably save 100,000 lives next year." By "these things," he means privacy concerns and fear that the data might be misused. But he also pointed to Street View as a case where privacy concerns mostly melted away after people used it and found it helpful. "In the early days of Street View, this was a huge issue, but it's not really a huge issue now. People understand it now and it's very useful. And it doesn't really change your privacy that much. A lot of these things are like that."
New submitter thermowax sends a report on how Massachusetts SWAT teams are dodging open records requests by claiming to be corporations. From the article: As it turns out, a number of SWAT teams in the Bay State are operated by what are called law enforcement councils, or LECs. These LECs are funded by several police agencies in a given geographic area and overseen by an executive board, which is usually made up of police chiefs from member police departments. ... Some of these LECs have also apparently incorporated as 501(c)(3) organizations. And it's here that we run into problems. According to the ACLU, the LECs are claiming that the 501(c)(3) status means that they're private corporations, not government agencies. And therefore, they say they're immune from open records requests. Let's be clear. These agencies oversee police activities. They employ cops who carry guns, wear badges, collect paychecks provided by taxpayers and have the power to detain, arrest, injure and kill. They operate SWAT teams, which conduct raids on private residences. And yet they say that because they've incorporated, they're immune to Massachusetts open records laws. The state's residents aren't permitted to know how often the SWAT teams are used, what they're used for, what sort of training they get or who they're primarily used against.
An anonymous reader writes Google has begun removing some search results to comply with a European Union ruling upholding citizens' right to have objectionable personal information about them hidden in search engines. "Google engineers overnight updated the company's technical infrastructure to begin implementing the removals, and Thursday began sending the first emails to individuals informing them that links they had requested were being taken down. The company has hired a dedicated 'removals team' to evaluate each request, though only a small number of the initial wave of takedown requests has so far been processed."
mpicpp writes with good news for every New Yorker who needs 44oz of soft drink to be refreshed. New York's Court of Appeals ruled Thursday that New York City's ban on large sugary drinks, which was previously blocked by lower courts, is illegal. "We hold that the New York City Board of Health, in adopting the 'Sugary Drinks Portion Cap Rule,' exceeded the scope of its regulatory authority," the ruling said. Former New York City Mayor Michael Bloomberg had pushed for the ban on sugary drinks larger than 16 ounces as a way to fight obesity and other health problems.
schwit1 (797399) writes with word that, after revelations that Verizon assisted the NSA in its massive surveillance program, Germany is cutting ties with Verizon as their infrastructure provider. From the article: The Interior Ministry says it will let its current contract for Internet services with the New York-based company expire in 2015. The announcement comes after reports this week that Verizon and British company Colt provide Internet services to the German parliament and other official entities. ... Ministry spokesman Tobias Plate said Thursday that Germany wants to ensure it has full control over highly sensitive government communications networks.
Trailrunner7 (1100399) writes ... Security experts have been pounding the drum about the importance of encrypting not just data in transit, but information stored on laptops, phones, and portable drives. But the Massachusetts Supreme Judicial Court put a dent in that armor on Wednesday, ruling that a criminal defendant could be compelled to decrypt the contents of his laptops. The case centers on a lawyer who was arrested in 2009 for allegedly participating in a mortgage fraud scheme. The defendant, Leon I. Gelfgatt, admitted to Massachusetts state police that he had done work with a company called Baylor Holdings and that he encrypted his communications and the hard drives of all of his computers. He said that he could decrypt the computers seized from his home, but refused to do so. The MJSC, the highest court in Massachusetts, was considering the question of whether the act of entering the password to decrypt the contents of a computer was an act of self-incrimination, thereby violating Gelfgatt's Fifth Amendment rights. The ruling.
An anonymous reader writes with news that, not long after UK ISPs agreed to send piracy notices (Voluntary Copyright Alerts Program), thoughts have already turned toward adding criminal penalties. From the article: Prime Minister David Cameron's IP advisor believes that the carrot needs to be backed up by a stick. In a report published yesterday largely detailing the "Follow the Money" approach to dealing with pirate sites, Mike Weatherley MP says now is the time to think about VCAP’s potential failure. "The Voluntary Copyright Alert Programme (VCAP) is welcomed and will be a good step forward once it is hopefully in operation in 2015, although it is primarily an education tool," Weatherley says. ... "Warnings and fines are obvious first steps, with Internet access blocking and custodial sentencing for persistent and damaging infringers not to be ruled out in my opinion." These suggestions aren't new, but this is the second time in a matter of months that the Prime Minister's closest advisor on IP matters has spoken publicly about the possibility of putting persistent file-sharers in jail.
Last fall, Newegg lost a case against patent troll TQP for using SSL with RC4, despite arguments from Diffie of Diffie-Hellman key exchange. Intuit was also targeted by a lawsuit for infringing the same patent, and they were found not to be infringing. mpicpp (3454017) sends this excerpt from Ars: U.S. Circuit Judge William Bryson, sitting "by designation" in the Eastern District of Texas, has found in a summary judgment ruling (PDF) that the patent, owned by TQP Development, is not infringed by the two defendants remaining in the case, Intuit Corp. and Hertz Corp. In a separate ruling (PDF), Bryson rejected Intuit's arguments that the patent was invalid. Not a complete victory (a clearly bogus patent is still not invalidated), but it's a start.
schwit1 (797399) sends word of a new and exciting use for all of the data various entities are collecting about you. From the article: You may soon get a call from your doctor if you've let your gym membership lapse, made a habit of ordering out for pizza or begin shopping at plus-sized stores. That's because some hospitals are starting to use detailed consumer data to create profiles on current and potential patients to identify those most likely to get sick, so the hospitals can intervene before they do. Acxiom Corp. (ACXM) and LexisNexis are two of the largest data brokers who collect such information on individuals. They say their data are supposed to be used only for marketing, not for medical purposes or to be included in medical records. While both sell to health insurers, they said it's to help those companies offer better services to members.
angry tapir writes The Australian government has indicated it intends to seek a boost to the powers of Australia's spy agencies, particularly ASIO (the Australian Security Intelligence Organization). The attorney-general told the Senate today that the government would introduce legislation based on recommendations of a parliamentary committee that last year canvassed "reforms" including boosting ASIO's power to penetrate third party computer systems to intercept communications to and from a target. That report also covered other issues such as the possibility of introducing a mandatory data retention scheme for ISPs and telcos.
New submitter CarlThansk (3713681) writes The courts have long debated on if cell phones can be searched during an arrest without a warrant. Today, the Supreme Court unanimously ruled that the police need warrants to search the cellphones of people they arrest. "Chief Justice John G. Roberts Jr., writing for the court, said the vast amount of data contained on modern cellphones must be protected (PDF) from routine inspection." Phones may still be searched under limited circumstances (imminent threats), but this looks like a clear win for privacy. Quoting the decision: "We cannot deny that our decision today will have an impact on the ability of law enforcement to combat crime. Cell phones have become important tools in facilitating coordination and communication among members of criminal enterprises, and can provide valuable incriminating information about dangerous criminals. Privacy comes at a cost."
New submitter Last_Available_Usern (756093) writes that the Aereo saga is likely over. "The U.S. Supreme Court today dealt a potentially fatal blow to Aereo, an Internet service that allows customers to watch broadcast TV programs on mobile devices by renting a small DVR and antennas (in supported cities) to record and then retransmit local programming on-demand over the internet." Ruling (PDF). Aereo was found to be publicly transmitting, according to SCOTUSBlog "The essence of the Aereo ruling is that Aereo is equivalent to a cable company, not merely an equipment provider."
An anonymous reader writes The experts at Kaspersky Lab have discovered evidence of a targeted attack against the clients of a large European bank. According to the logs found in the server used by the attackers, apparently in the space of just one week cybercriminals stole more than half a million euros from accounts in the bank. The experts also detected transaction logs on the server, containing information about which sums of money were taken from which accounts. All in all, more than 190 victims could be identified, most of them located in Italy and Turkey. The sums stolen from each bank account, according to the logs, ranged between 1,700 to 39,000 euros.
New submitter Andreas Kolbe writes: "Businessman, philanthropist and musician Yank Barry and the Global Village Champions Foundation are suing four Wikipedia editors for defamation, claiming they have maliciously conspired to keep Barry's Wikipedia biography unduly negative. The Daily Dot article includes a copy of the legal brief and quotes Barry as saying, "My page was so ridiculously false and made me sound like a terrible person and people believed it causing deals to fall through. I finally had enough."
New submitter dmitrygr sends this news from Reuters: The U.S. government's no-fly list banning people accused of links to terrorism from commercial flights violates their constitutional rights because it gives them no meaningful way to contest that decision, a federal judge ruled on Tuesday. ... "The court concludes international travel is not a mere convenience or luxury in this modern world. Indeed, for many international travel is a necessary aspect of liberties sacred to members of a free society," [U.S. District Judge Anna Brown] wrote in her 65-page ruling (PDF). "Accordingly, on this record the court concludes plaintiff's inclusion on the no-fly list constitutes a significant deprivation of their liberty interests in international travel," Brown said.
An anonymous reader sends this report from Ars Technica: The Federal Aviation Administration has said that online shopping powerhouse Amazon may not employ drones to deliver packages, at least not anytime soon. The revelation was buried in an FAA document (PDF) unveiled Monday seeking public comment on its policy on drones, or what the agency calls "model aircraft." The FAA has maintained since at least 2007 that the commercial operation of drones is illegal. ... In Monday's announcement, published in the Federal Register, the FAA named Amazon's December proposal as an example of what is barred under regulations that allow the use of drones for hobby and recreational purposes. The agency did not mention Amazon Prime Air by name, but it didn't have to. Under a graphic that says what is barred, the FAA mentioned the "Delivering of packages to people for a fee." A footnote added, "If an individual offers free shipping in association with a purchase or other offer, FAA would construe the shipping to be in furtherance of a business purpose, and thus, the operation would not fall within the statutory requirement of recreation or hobby purpose."
An anonymous reader writes At the non-profit where I work, there isn't a lot of money for buying stock photos or licensing professional images. So, we've turned to sources of 'free' imagery, notably Creative Commons-licensed photos on Flickr. While we're not a huge organization, we do have 100+ individuals creating content in one way or another. We're now wrestling with compliance of the CC licensing, like including links for By Attribution images, etc. Our legal counsel is also scared of photographers changing their licenses and suing us after the fact. How do you document the images you find were licensed one way in the past, especially when numerous people from across the country are acquiring the images?
mpicpp (3454017) points out this story illustrating the problem of betting on the differential between the price of deliverable bitcoin-mining hardware and the price of bitcoin itself: Yet another Bitcoin miner manufacturer, CoinTerra, now faces legal action for not fulfilling an order when it originally promised to. CoinTerra is the third Bitcoin-related startup to face litigation for breach of contract and/or fraud in recent months. The CoinTerra lawsuit was filed in late April 2014 by an Oakland, California-based man seeking to be the lead plaintiff in a proposed class-action lawsuit. Lautaro Cline, the suit alleges, purchased a TerraMiner IV in October 2013 for delivery by January 2014. The company promised, he claims, that this miner would operate at two terahashes per second and would consume 1,200 watts of power. It did neither. However, Cline's suit also claims that CoinTerra did not deliver the miner until February 2014, and it "operated well below the speed advertised and consumed significantly more power than CoinTerra represented, causing Plaintiff to suffer significant lost profits and opportunities."
msm1267 (2804139) writes Controversial spyware commercially developed by Italy's Hacking Team and sold to governments and law enforcement for the purpose of surveillance has a global command and control infrastructure. For the first time, security experts have insight into how its mobile malware components work. Collaborating teams of researchers from Kaspersky Lab and Citizen Lab at the Monk School of Global Affairs at the University of Toronto today reported on their findings during an event in London. The breadth of the command infrastructure supporting Hacking Team's Remote Control System (RCS) is extensive, with 326 servers outed in more than 40 countries; the report also provides the first details on the inner workings of the RCS mobile components for Apple iOS and Android devices. Adds reader Trailrunner7: [T]he report also provides the first details on the inner workings of the RCS mobile components for Apple iOS and Android devices. The new modules enable governments and law enforcement officers with extensive monitoring capabilities over victims, including the ability to report on their location, steal data from their device, use the device's microphone in real time, intercept voice and SMS messages sent via applications such as Skype, WhatsApp, Viber, and much more.
An anonymous reader writes with this news from The Independent: An American driver is facing a $48,000 fine after using a mobile signal jammer in his car to block motorists around him from using their phones on the road. Jason Humphreys reportedly used the jammer from the back seat of his Toyota Highlander for around two years before being caught by Florida police. The 60-year-old said that he used the jammer – which transmits radio signals that interfere with mobile phones – because he was 'fed up' with watching others use their phones on the road. A story from late April (before the fine was levied) gives more detail: The case along I-4 started on April 29, 2013, when the cellular company Metro PCS contacted the Federal Communications Commission because a transmission tower along I-4 would suffer in the morning and evening. A week later, agents from the FCC's enforcement division in Tampa staked out the freeway on May 7, 8, and 9 and pinpointed a “strong wideband emission” in the cellphone wireless range “emanating from a blue Toyota Highlander sport utility vehicle,” with Florida license plates, according to a complaint issued by the FCC on Tuesday. Another clue: When Hillsborough County Sheriffs deputies stopped the SUV, their own two-way radios were jammed."
An anonymous reader writes The U.S. Court of Appeals for the 2nd Circuit last week reversed a tax evasion conviction against an accountant because the government had used data from his computers that were seized under a warrant targeting different suspects. The Fourth Amendment, the court pointed out, "prevents the seizure of one thing under a warrant describing another." Law enforcement originally made copies of his hard drives and during off-site processing, separated his personal files from data related to the original warrant. However, 1.5 years later, the government sifted through his personal files and used what it found to build a case against him. The appeals court held that "[i]f the Government could seize and retain non-responsive electronic records indefinitely, so it could search them whenever it later developed probable cause, every warrant to search for particular electronic data would become, in essence, a general warrant," which the Fourth Amendment protects against. The EFF hopes that the outcome of this appeal will have implications for the NSA's dragnet surveillance practice.
mpicpp (3454017) writes with news that a dump of fare logs from NYC cabs resulted in trip details being leaked thanks to using an MD5 hash on input data with a very small key space and regular format. From the article:
City officials released the data in response to a public records request and specifically obscured the drivers' hack license numbers and medallion numbers. ... Presumably, officials used the hashes to preserve the privacy of individual drivers since the records provide a detailed view of their locations and work performance over an extended period of time.
It turns out there's a significant flaw in the approach. Because both the medallion and hack numbers are structured in predictable patterns, it was trivial to run all possible iterations through the same MD5 algorithm and then compare the output to the data contained in the 20GB file. Software developer Vijay Pandurangan did just that, and in less than two hours he had completely de-anonymized all 173 million entries.
An anonymous reader writes in with news that the memo presenting a case for killing Anwar al-Awlaki has been released thanks to a Freedom of Information Act lawsuit. The U.S. Court of Appeals for the Second Circuit on Monday released a secret 2010 Justice Department memo justifying the killing of Anwar al-Awlaki, a U.S citizen killed in a drone strike in 2011. The court released the document as part of a Freedom of Information Act lawsuit filed by The New York Times and the American Civil Liberties Union to make the document public. Then-acting Assistant Attorney General David Barron, in the partially redacted 41-page memo, outlines the justification of the drone strike in Yemen to take out al-Awlaki, an alleged operational leader of al Qaeda.
UnknowingFool writes In Utility Air Regulatory Group v. EPA, the Supreme Court ruled against the EPA on some limits to greenhouse gases but also upheld other limits. In a 5-4 partial decision, the high court ruled that EPA overstepped their authority in requiring permits only for greenhouse gases for new and modified facilities using the Clean Air act. Such regulatory action can only be granted by Congress. But in the same case on a 7-2 decision, the court ruled that the EPA can enforce greenhouse gas limits on facilities that already require permits for other air pollutants. This leaves intact most of the new regulations proposed by the Obama administration earlier this month as many coal plants produce other air pollutants that can be regulated by the EPA.
samzenpus (5) writes "Lawrence Lessig's list of achievements and areas of influence is not small. He's co-founder of the Creative Commons, but it is his Mayday PAC however that has garnered the most attention recently. The crowdfunded "Super PAC to end all Super PACs" was launched in May with the goal of raising money to elect candidates who would pass campaign finance reform. It raised over $1 million in the first 13 days and has the support of some influential people. With the help of matching contributions, Mayday hopes to raise $12 million by the end of June. Lessig has agreed to answer any questions about the PAC that you might have. As usual, ask as many as you'd like, but please, one question per post."
Graculus writes with news about a plan to install sensors to collect environmental data and count people in Chicago. Chicago plans to install sensors in light poles to observe air quality, light intensity, sound volume, heat, precipitation, and wind. The sensors will also count people by observing cell phone traffic. The curled metal fixtures set to go up on a handful of Michigan Avenue light poles later this summer may look like delicate pieces of sculpture, but researchers say they'll provide a big step forward in the way Chicago understands itself by observing the city's people and surroundings. Some experts caution that efforts like the one launching here to collect data from people and their surroundings pose concerns of a Big Brother intrusion into personal privacy. In particular, sensors collecting cell phone data make privacy proponents nervous. But computer scientist Charlie Catlett said the planners have taken precautions to design their sensors to observe mobile devices and count contact with the signal rather than record the digital address of every device.
ygslash writes "Robert McMillen of Wired claims that we have gotten Net Neutrality all wrong. While we are all busy arguing about whether there should be regulations preventing large content providers from getting preferential bandwidth, McMillen says that not only have the large content providers already had preferential bandwidth for ten years, but that by now this has become an inherent part of the structure of the Internet and in practice cannot be changed. Instead, he says, the Net Neutrality discussion should be about ensuring a free and open competitive market for bandwidth, so that anyone who wants bandwidth can purchase it at a fair price.
hackingbear writes According to British patent consultancy CambridgeIP, China has filed for more than 2,200 graphene patents, the most of any country, followed by the U.S. with more than 1,700 patents, and South Korea with just under 1,200 patents. In terms of institutions, Samsung, Korea Advanced Institute of Science and Technology, and IBM lead the way of number of patent filing on this futurist materials with seemingly unlimited potentials, followed by Qinghua University of China. As China's moving its economy to be more innovation based and strengthening its IP laws, American companies will perhaps soon be at the receiving ends of patent law suits.
itwbennett writes Police in Dallas are scrambling after difficulties using a new records management system caused more than 20 jail inmates, including a number of people charged with violent crimes, to be set free. The prisoners were able to get out of jail because police officers struggling to learn the new system didn't file cases on them within three days, as required by law.
An anonymous reader writes For better or worse, surveillance technology is becoming more common in the workplace. These tools are being used to measure and monitor employees, with the promise changing how people work. "Through these new means, companies have found, for example, that workers are more productive if they have more social interaction. So a bank's call center introduced a shared 15-minute coffee break, and a pharmaceutical company replaced coffee makers used by a few marketing workers with a larger cafe area. The result? Increased sales and less turnover." Of course, this kind of monitoring raises privacy concerns. "Whether this kind of monitoring is effective or not, it's a concern," said Lee Tien, a senior staff lawyer at the Electronic Frontier Foundation in San Francisco.
An anonymous reader writes There have been many US military machines of war that seemed to be revolutionary, but never make it out of the prototype stage. As Robert Farley explains: "Sometimes they die because they were a bad idea in the first place. For the same reasons, bad defense systems can often survive the most inept management if they fill a particular niche well enough." A weapon can seem like an amazing invention, but it still has to adapt to all sorts of conditions--budgetary, politics, and people's plain bias. Here's a look at a few of the best weapons of war that couldn't win under these "battlefield" conditions.
schwit1 (797399) writes "The text of a 19-page, international trade agreement being drafted in secret was published by WikiLeaks as the transparency group's editor commemorated his two-year anniversary confined to the Ecuadorian Embassy in London. Fifty countries around the globe have already signed on to the Trade in Service Agreement, or TISA, including the United States, Australia and the European Union. Despite vast international ties, however, details about the deal have been negotiated behind closed-doors and largely ignored by the press. In a statement published by the group alongside the leaked draft this week, WikiLeaks said "proponents of TISA aim to further deregulate global financial services markets," and have participated in "a significant anti-transparency maneuver" by working secretly on a deal that covers more than 68 percent of world trade in services, according to the Swiss National Center for Competence in Research.
hypnosec writes A new movement dubbed the Open Wireless Movement is asking users to open up their private Wi-Fi networks to total strangers – a random act of kindness – with an aim of better securing networks and facilitating better use of finite broadband resources. The movement is supported by non-profit and pro-internet rights organizations like the Electronic Frontier Foundation (EFF), Mozilla, Open Rights Group, and Free Press among others. The EFF is planning to unveil one such innovation – Open Wireless Router – at the Hackers on Planet Earth (HOPE X) conference to be held next month on New York. This firmware will allow individuals to share their private Wi-Fi to total strangers to anyone without a password.
ectoman (594315) writes The U.S. Supreme Court issued a groundbreaking decision concerning software patents, claiming that abstract ideas are not by themselves patentable. The ruling was a cause for celebration among those opposed to software patent abuse, like Red Hat's Vice President and Assistant General Counsel, Rob Tiller. Here, Tiller analyzes and offers some context for the Court's ruling, which "uses the traditional common law methodology of comparing one case to previous similar cases and harmonizing with those most similar."
Advocatus Diaboli sends this excerpt from Wired: Police in Florida have, at the request of the U.S. Marshals Service, been deliberately deceiving judges and defendants about their use of a controversial surveillance tool to track suspects, according to newly obtained emails (PDF). At the request of the Marshals Service, the officers using so-called stingrays have been routinely telling judges, in applications for warrants, that they obtained knowledge of a suspect's location from a 'confidential source' rather than disclosing that the information was gleaned using a stingray.
jfruh (300774) writes "When the U.S. government shut down the Silk Road marketplace, they seized its assets, including roughly $18 million in bitcoin, and despite the government's ambivalence about the cryptocurrency, they plan to auction the bitcoin off to the highest bidder, as they do with most criminal assets. Ironically, considering many bitcoin users' intense desire for privacy, the U.S. Marshall service accidentally revealed the complete list of potential bidders by sending a message to everyone on the list and putting their addresses in the CC field instead of the BCC field."
Rambo Tribble (1273454) writes "Netcraft is reporting that criminals are mounting massive phishing attacks through online dating sites. The scams are numerous and target multiple sites. Actual methods range from blackmail to 419-style scams. Characteristically, fraudsters hijack an existing account on one of the services, then use that as a portal to deliver a PHP script to compromise the site. 'The latest attacks make use of a phishing kit which contains hundreds of PHP scripts, configured to send stolen credentials to more than 300 distinct email addresses.' The BBC offers additional insights ."
An anonymous reader writes "A research project dubbed the 'Array of Things' will add sensors for public monitoring throughout Chicago. The project is being started by a collaborative effort between the University of Chicago and Argonne National Laboratories. The goal of the project is to build a permanent data collection infrastructure to monitor things that might help government officials, researchers and companies better understand the city environment. Sensors will examine various attributes such as air quality, wind, light, sound heat, precipitation, and of course cell phone data. Eventually the researchers would like to see the sensors exist as a public utility throughout the entire city to help public, private and academic partners learn about the city. Researchers say there is nothing to fear about privacy because the sensors will only count people by observing cellphone traffic. With such assurances from researchers working in a shining example of transparency and democratic freedom like Chicago, what could possible go wrong?"
An anonymous reader writes We had some good news yesterday when the U.S. Supreme Court invalidated a software patent for failing to turn an idea into an invention. Unfortunately, the justices weren't willing to make any broader statements about the patentability of basic software tools, so the patent fights will continue. Timothy B. Lee at Vox argues that this is because the Supreme Court does not understand software, and says we won't see significant reform until they do.
He says, "If a sequence of conventional mathematical operations isn't patentable, then no software should enjoy patent protection. For example, the 'data compression' patents that Justice Kennedy wants to preserve simply claim formulas for converting information from one digital format to another. If that's not a mathematical algorithm, nothing is. This is the fundamental confusion at the heart of America's software patent jurisprudence: many judges seem to believe that mathematical algorithms shouldn't be patented but that certain kinds of software should be patentable. ... If a patent claims a mathematical formula simple enough for a judge to understand how it works, she is likely to recognize that the patent claims a mathematical formula and invalidate it. But if the formula is too complex for her to understand, then she concludes that it's something more than a mathematical algorithm and uphold it."
itwbennett writes: "A proposed $324.5 million settlement of claims that Silicon Valley companies (Adobe, Apple, Google, and Intel) suppressed worker wages by agreeing not to hire each others' employees may not be high enough, a judge signaled on Thursday. Judge Lucy Koh didn't say whether she would approve the settlement, but she did say in court that she was worried about whether that amount was fair to the roughly 64,000 technology workers represented in the case. Throughout Thursday's hearing, she questioned not just the amount but the logic behind the settlement as presented by lawyers for both the plaintiffs and the defendants."
An anonymous reader writes: The U.S. House of Representatives voted late Thursday night, 293 to 123, to approve an amendment to the NSA's appropriations bill that cuts all funding for warrantless surveillance and for programs that force companies to create backdoors in their products. The success of this vote in the House is attributed to the fact that the amendment did not have to go through the House Judiciary and Intelligence Committees and also to the increasingly apparent unpopularity of NSA activities among voters. Although privacy advocates laud the vote, there are those who note that the amendment specifically applies to the NSA and CIA while remaining silent on other agencies such as the FBI. The appropriations bill in its entirety will now proceed to the Senate for approval."
An anonymous reader writes Der Spiegel has written a piece on the extent of collaboration between Germany's intelligence agency, Bundesnachrichtendienst (BND), and the U.S.'s National Security Agency (NSA). The sources cited in the piece do reveal BND's enthusiastic collusion in enabling the NSA to tap fiber optic cables in Germany, but they seem inconclusive as to how much information from the NSA's collection activity in the country is actually shared between the NSA and BND. Of note is evidence that the NSA's collection methods do not automatically exclude German companies and organizations from their data sweep; intelligence personnel have to rectro-actively do so on an individual basis when they realize that they are surveilling German targets. Germany's constitution protects against un-warranted surveillance of correspondence, either by post or telecommunications, of German citizens in Germany or abroad and foreigners on German soil.
An anonymous reader writes Mark Karpeles doesn't seem to understand how much anger and trouble the $400 million Mt. Gox fiasco caused his customers. According to Wired: "After a long absence, the Mt Gox CEO has returned to Twitter with a bizarre string of tone-deaf tweets that were either written by a Turing test chat bot, or by a man completely oblivious to the economic chaos he has wrought. His first message after losing hundreds of millions of dollars worth of bitcoins? 'What would we do without busybox?'—a reference to a slimmed-down Linux operating system used on devices such as routers. He's also Tweeted about a noodle dish called yakisoba and Japanese transportation systems." Andreas Antonopoulos, the CSO with Blockchain says, "He continues to be oblivious about his own failure and the pain he has caused others. He is confirming that he is a self-absorbed narcissist with an inflated sense of self-confidence who has no remorse."
alphadogg writes A Chinese electronics vendor accused of selling signal jammers to U.S. consumers could end up leading the market in one dubious measure: the largest fine ever imposed by the Federal Communications Commission. The agency wants to fine CTS Technology $34,912,500 for allegedly marketing 285 models of jammers over more than two years. CTS boldly—and falsely—claimed that some of its jammers were approved by the FCC, according to the agency's enforcement action released Thursday. Conveniently, CTS' product detail pages also include a button to "report suspicious activity." The proposed fine, which would be bigger than any the FCC has levied for anti-competitive behavior, or a wardrobe malfunction, comes from adding up the maximum fines for each model of jammer the company allegedly sold in the U.S. The agency also ordered CTS, based in Shenzhen, China, to stop marketing illegal jammers to U.S. consumers and identify the buyer of each jammer it sold in the U.S.
Advocatus Diaboli (1627651) writes It has already been widely reported that the NSA works closely with eavesdropping agencies in the United Kingdom, Canada, New Zealand, and Australia as part of the so-called Five Eyes surveillance alliance. But the latest Snowden documents show that a number of other countries, described by the NSA as "third-party partners," are playing an increasingly important role – by secretly allowing the NSA to install surveillance equipment on their fiber-optic cables. The NSA documents state that under RAMPART-A, foreign partners "provide access to cables and host U.S. equipment." This allows the agency to covertly tap into "congestion points around the world" where it says it can intercept the content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype.