We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
VentureBeat reports that the unofficial Google ambassador to the world has made another significant visit to a place where Internet access is either forbidden or impractical for most of the citizenry; hopefully it heralds change on that front. Continuing his tour of countries with authoritarian governments and less-than-favorable Internet access, Google Chairman Eric Schmidt made a secret visit to Cuba yesterday. The U.S. government has forbidden its citizens from traveling to Cuba or spending any money within the country since cold war tensions in the 1960s. Even though the cold war is over, the ban remains in effect, which is why Schmidt’s visit is significant. Unofficially (meaning not on behalf of his company), the powerful Googler has also made controversial visits to North Korea and Myanmar to promote Internet freedom, and has previously spoken out against online censorship happening in both China and India. Schmidt, says the article, "was joined by a crew of former Google employees as well as author Jared Cohen."
An anonymous reader writes The U.S. National Archives has revealed to Wikipedia newspaper The Signpost that it will be uploading all of its holdings to the Wikimedia Commons. Dominic McDevitt-Parks told the Signpost that "The records we have uploaded so far contain some of the most high-value holdings ... However, we are not limiting ourselves ... Our approach has always been simply to upload as much as possible ... to make them as widely accessible to the public as possible."
An anonymous reader writes A day after a surprise U.S. Supreme Court decision to outlaw streaming TV service Aereo, U.S. broadcaster Fox has moved to use the ruling to clamp down on another internet TV service. Fox has cited Wednesday's ruling – which found Aereo to be operating illegally – to bolster its claim against a service offered by Dish, America's third largest pay TV service, which streams live TV programming over the internet to its subscribers and allows them to copy programmes onto tablet computers for viewing outside the home.
New submitter redr00k (3719103) writes with a link to the summary of a RAND Corporation study addressing "a general perception that there is a shortage of cybersecurity professionals within the United States, and a particular shortage of these professionals within the federal government, working on national security as well as intelligence. Shortages of this nature complicate securing the nation's networks and may leave the United States ill-prepared to carry out conflict in cyberspace." One of the key findings: waive the Civil Service rules. (The NSA can already bypass those rules; RAND's authors say this should be extended to other agencies.)
Jason Koebler (3528235) writes "The cybersecurity bill making its way through the Senate right now is so broad that it could allow ISPs to classify Netflix as a "cyber threat," which would allow them to throttle the streaming service's delivery to customers. "A 'threat,' according to the bill, is anything that makes information unavailable or less available. So, high-bandwidth uses of some types of information make other types of information that go along the same pipe less available," Greg Nojeim, a lawyer with the Center for Democracy and Technology, said. "A company could, as a cybersecurity countermeasure, slow down Netflix in order to make other data going across its pipes more available to users.""
Nate the greatest (2261802) writes "Here in the US it is legal to resell your MP3s on Redigi, and thanks to the UsedSoft decision you can resell downloaded software in Europe. But if you want to resell your ebooks you had better act fast. Tom Kabinet launched last week in the Netherlands to offer a marketplace for used ebooks, and it is already getting legal threats. The Dutch Trade Publishers Association (GAU) says that the site is committing piracy and if it doesn't shut down the GAU plans to take it to court. Citing a ruling from a German court, secretary general of the GAU Martijn David said that the question of legality had already been settled. Would anyone care to place a bet on whether the site is still in operation in 6 months?"
McGruber (1417641) writes In December 2013, Slashdot reported the arrest of seven metro Atlanta residents for allegedly selling counterfeit MARTA Breeze cards, stored-value smart cards that passengers use as part of an automated fare collection system on Atlanta's subway. Now, six months later (June 2014), the seven suspects have finally been indicted. According to the indictment, the co-conspirators purchased legitimate Breeze cards for $1, then fraudulently placed unlimited or monthly rides on the cards. They then sold the fraudulent cards to MARTA riders for a discounted cash price. Distributors of the fraudulent cards were stationed at several subway stations. The indictment claims that the ring called their organization the "Underground Railroad."
An anonymous reader writes It didn't take long for Aereo to deal with the realities of the U.S. Supreme Court decision. As of 11:30am EDT today Aereo is suspending operations while they go back to U.S. District Court. In order to keep good will with customers during this time, they are refunding the last month's payment for service. curtwoodward (2147628) writes to point out that the decision which has shut down Aereo for now doesn't mean doom for other cloud services: Don't listen to the trolls---the Supremes were very clear that their ruling only applied to Aereo's livestream and things that look just like it. iCloud, Dropbox and friends are fine.
theodp (442580) writes In an interview with The Washington Post's Lyndsey Layton that accompanied her report on How Bill Gates Pulled Off the Swift Common Core Revolution (the Gates Foundation doled out $233 million in grants to git-r-done), Gates denied that he has too much influence in K-12 education. Despite Gates' best efforts, however, there's been more and more pushback recently from both teachers and politicians on the standards, GeekWire's Taylor Soper reports, including a protest Friday by the Badass Teacher Association, who say Gates is ruining education. "We want to get corporations out of teaching," explained one protester. If that's the case, the "Badasses" probably won't be too pleased to see how the K-12 CS education revolution is shaping up, fueled by a deep-pocketed alliance of Gates, Google, Microsoft, Facebook, and others. Google alone has already committed $90 million to influence CS education. And well-connected Code.org, which has struck partnerships with school districts reaching over 2M U.S. students and is advising NSF-funded research related to the nation's CS 10K Project, will be conducting required professional development sessions for K-12 CS teachers out of Google, Microsoft, and Amazon offices this summer in Chicago, New York City, Boston, and Seattle. So, could K-12 CS Education ("Common Code"?) become the next Common Core?
An anonymous reader writes As the support for the Microsoft (MS) Windows XP service is terminated this year, the government will try to invigorate open source software in order to solve the problem of dependency on certain software. By 2020 when the support of the Windows 7 service is terminated, it is planning to switch to open OS and minimize damages. Industry insiders pointed out that the standard e-document format must be established and shared as an open source before open source software is invigorated. A similar suggestion that Korea might embrace more open source (but couched more cautiously, with more "should" and "may") is reported on the news page of the EU's program on Interoperability Solutions for European Public Administrations, based on a workshop presentation earlier this month by Korea's Ministry of Science, ICT, and Future Planning. (And at a smaller but still huge scale, the capitol city of Seoul appears to be going in for open source software in a big way, too.)
wiredmikey (1824622) writes Human Rights Watch on Friday demanded a clarification from Saudi Arabia over allegations from security researchers that the kingdom is infecting and monitoring dissidents' mobile phones with surveillance malware. The New York-based rights watchdog said surveillance software allegedly made by Italian firm Hacking Team mostly targeted individuals in Qatif district in Eastern Province, which has been the site of sporadic Shiite-led protests since February 2011. "We have documented how Saudi authorities routinely crack down on online activists who have embraced social media to call out human rights abuses," said Cynthia Wong, HRW's senior Internet researcher. "It seems that authorities may now be hacking into mobile phones, turning digital tools into just another way for the government to intimidate and silence independent voices." The accusations against the Saudi Government come days after researchers from Kaspersky Lab and Citizen Lab uncovered new details on advanced surveillance tools offered by HackingTeam [Note: mentioned in this earlier Slashdot story], including never before seen implants for smartphones running on iOS and Android.
Trailrunner7 writes The United States federal government issued more than 19,000 National Security Letters – perhaps its most powerful tool for domestic intelligence collection – in 2013, and those NSLs contained more than 38,000 individual requests for information. The new data was released by the Office of the Director of National Intelligence on Friday as part of its effort to comply with a directive from President Obama to declassify and release as much information as possible about a variety of tools that the government uses to collect intelligence. The directive came in the immediate aftermath of the first revelations by former NSA contractor Edward Snowden about the agency's capabilities, methods and use of legal authorities.
The use of NSLs is far from new, dating back several decades. But their use was expanded greatly after 9/11 and NSLs are different from other tools in a number of ways, perhaps most importantly in the fact that recipients typically are prohibited from even disclosing the fact that they received an NSL. Successfully fighting an NSL is a rare thing, and privacy advocates have been after the government for years to release data on their use of the letters and the number of NSLs issued. Now, the ODNI is putting some of that information into the public record."
dcblogs writes: In a speech Wednesday on the floor of the U.S. House of Representatives, Rep. Luis Gutierrez (D-Ill.) declared immigration reform dead. He chastised and baited Republicans in Congress for blocking reform, and declared that winning the White House without the support of a growing Hispanic population will become mathematically impossible. "The Republican Presidential nominee, whoever he or she may be, will enter the race with an electoral college deficit they cannot make up," said Gutierrez. If he's right, and comprehensive immigration reform is indeed dead, then so too is the tech industry's effort to raise the cap on H-1B visas. Immigration reform advocates have successfully blocked any effort to take up the immigration issue in piecemeal fashion, lest business support for comprehensive reform peel away. Next year may create an entirely new set of problems for tech. If the Republicans take control of the Senate, the tech industry will face this obstacle: Sen. Chuck Grassley (R-Iowa). Grassley, the ranking Republican on the Judiciary Committee could become its next chairman. He has been a consistent critic of the H-1B program through the years. "The H-1B program is so popular that it's now replacing the U.S. labor force," said Grassley, at one point.
Dega704 sends this news from Wired:
Plenty of nightmare surveillance theories surround the million-square-foot NSA facility opened last year in Bluffdale, Utah. Any locals driving by the massive complex Friday morning saw something that may inspire new ones: A massive blimp hovering over the center, with the letters NSA printed on its side.
Activist groups including the Electronic Frontier Foundation and Greenpeace launched the 135-foot thermal airship early Friday morning to protest the agency's mass surveillance programs and to announce the launch of Stand Against Spying, a website that rates members of Congress on their support or opposition to NSA reform. The full message on the blimp reads 'NSA: Illegal Spying Below' along with an arrow pointing downward and the Stand Against Spying URL."
blottsie writes: The Supreme Court ruled this week that it is illegal for police to search your phone without a warrant. But just because that's the new rule doesn't mean all 7.5 million law enforcement officers in the U.S. will abide by it. This guide, put together with the help of the EFF and ACLU, explains what to do if a police officer tries to search your phone without a warrant. Of course, that doesn't mean they don't have other ways of getting your data.
An anonymous reader writes Google often gets criticism for its seemingly boundless desire for data collection and analysis, but the company says it has higher ambitions than just figuring out how best to serve advertising. Speaking to the NY Times, Larry Page said, "We get so worried about these things that we don't get the benefits Right now we don't data-mine healthcare data. If we did we'd probably save 100,000 lives next year." By "these things," he means privacy concerns and fear that the data might be misused. But he also pointed to Street View as a case where privacy concerns mostly melted away after people used it and found it helpful. "In the early days of Street View, this was a huge issue, but it's not really a huge issue now. People understand it now and it's very useful. And it doesn't really change your privacy that much. A lot of these things are like that."
New submitter thermowax sends a report on how Massachusetts SWAT teams are dodging open records requests by claiming to be corporations. From the article: As it turns out, a number of SWAT teams in the Bay State are operated by what are called law enforcement councils, or LECs. These LECs are funded by several police agencies in a given geographic area and overseen by an executive board, which is usually made up of police chiefs from member police departments. ... Some of these LECs have also apparently incorporated as 501(c)(3) organizations. And it's here that we run into problems. According to the ACLU, the LECs are claiming that the 501(c)(3) status means that they're private corporations, not government agencies. And therefore, they say they're immune from open records requests. Let's be clear. These agencies oversee police activities. They employ cops who carry guns, wear badges, collect paychecks provided by taxpayers and have the power to detain, arrest, injure and kill. They operate SWAT teams, which conduct raids on private residences. And yet they say that because they've incorporated, they're immune to Massachusetts open records laws. The state's residents aren't permitted to know how often the SWAT teams are used, what they're used for, what sort of training they get or who they're primarily used against.
An anonymous reader writes Google has begun removing some search results to comply with a European Union ruling upholding citizens' right to have objectionable personal information about them hidden in search engines. "Google engineers overnight updated the company's technical infrastructure to begin implementing the removals, and Thursday began sending the first emails to individuals informing them that links they had requested were being taken down. The company has hired a dedicated 'removals team' to evaluate each request, though only a small number of the initial wave of takedown requests has so far been processed."
mpicpp writes with good news for every New Yorker who needs 44oz of soft drink to be refreshed. New York's Court of Appeals ruled Thursday that New York City's ban on large sugary drinks, which was previously blocked by lower courts, is illegal. "We hold that the New York City Board of Health, in adopting the 'Sugary Drinks Portion Cap Rule,' exceeded the scope of its regulatory authority," the ruling said. Former New York City Mayor Michael Bloomberg had pushed for the ban on sugary drinks larger than 16 ounces as a way to fight obesity and other health problems.
schwit1 (797399) writes with word that, after revelations that Verizon assisted the NSA in its massive surveillance program, Germany is cutting ties with Verizon as their infrastructure provider. From the article: The Interior Ministry says it will let its current contract for Internet services with the New York-based company expire in 2015. The announcement comes after reports this week that Verizon and British company Colt provide Internet services to the German parliament and other official entities. ... Ministry spokesman Tobias Plate said Thursday that Germany wants to ensure it has full control over highly sensitive government communications networks.
Trailrunner7 (1100399) writes ... Security experts have been pounding the drum about the importance of encrypting not just data in transit, but information stored on laptops, phones, and portable drives. But the Massachusetts Supreme Judicial Court put a dent in that armor on Wednesday, ruling that a criminal defendant could be compelled to decrypt the contents of his laptops. The case centers on a lawyer who was arrested in 2009 for allegedly participating in a mortgage fraud scheme. The defendant, Leon I. Gelfgatt, admitted to Massachusetts state police that he had done work with a company called Baylor Holdings and that he encrypted his communications and the hard drives of all of his computers. He said that he could decrypt the computers seized from his home, but refused to do so. The MJSC, the highest court in Massachusetts, was considering the question of whether the act of entering the password to decrypt the contents of a computer was an act of self-incrimination, thereby violating Gelfgatt's Fifth Amendment rights. The ruling.
An anonymous reader writes with news that, not long after UK ISPs agreed to send piracy notices (Voluntary Copyright Alerts Program), thoughts have already turned toward adding criminal penalties. From the article: Prime Minister David Cameron's IP advisor believes that the carrot needs to be backed up by a stick. In a report published yesterday largely detailing the "Follow the Money" approach to dealing with pirate sites, Mike Weatherley MP says now is the time to think about VCAP’s potential failure. "The Voluntary Copyright Alert Programme (VCAP) is welcomed and will be a good step forward once it is hopefully in operation in 2015, although it is primarily an education tool," Weatherley says. ... "Warnings and fines are obvious first steps, with Internet access blocking and custodial sentencing for persistent and damaging infringers not to be ruled out in my opinion." These suggestions aren't new, but this is the second time in a matter of months that the Prime Minister's closest advisor on IP matters has spoken publicly about the possibility of putting persistent file-sharers in jail.
Last fall, Newegg lost a case against patent troll TQP for using SSL with RC4, despite arguments from Diffie of Diffie-Hellman key exchange. Intuit was also targeted by a lawsuit for infringing the same patent, and they were found not to be infringing. mpicpp (3454017) sends this excerpt from Ars: U.S. Circuit Judge William Bryson, sitting "by designation" in the Eastern District of Texas, has found in a summary judgment ruling (PDF) that the patent, owned by TQP Development, is not infringed by the two defendants remaining in the case, Intuit Corp. and Hertz Corp. In a separate ruling (PDF), Bryson rejected Intuit's arguments that the patent was invalid. Not a complete victory (a clearly bogus patent is still not invalidated), but it's a start.
schwit1 (797399) sends word of a new and exciting use for all of the data various entities are collecting about you. From the article: You may soon get a call from your doctor if you've let your gym membership lapse, made a habit of ordering out for pizza or begin shopping at plus-sized stores. That's because some hospitals are starting to use detailed consumer data to create profiles on current and potential patients to identify those most likely to get sick, so the hospitals can intervene before they do. Acxiom Corp. (ACXM) and LexisNexis are two of the largest data brokers who collect such information on individuals. They say their data are supposed to be used only for marketing, not for medical purposes or to be included in medical records. While both sell to health insurers, they said it's to help those companies offer better services to members.
angry tapir writes The Australian government has indicated it intends to seek a boost to the powers of Australia's spy agencies, particularly ASIO (the Australian Security Intelligence Organization). The attorney-general told the Senate today that the government would introduce legislation based on recommendations of a parliamentary committee that last year canvassed "reforms" including boosting ASIO's power to penetrate third party computer systems to intercept communications to and from a target. That report also covered other issues such as the possibility of introducing a mandatory data retention scheme for ISPs and telcos.
New submitter CarlThansk (3713681) writes The courts have long debated on if cell phones can be searched during an arrest without a warrant. Today, the Supreme Court unanimously ruled that the police need warrants to search the cellphones of people they arrest. "Chief Justice John G. Roberts Jr., writing for the court, said the vast amount of data contained on modern cellphones must be protected (PDF) from routine inspection." Phones may still be searched under limited circumstances (imminent threats), but this looks like a clear win for privacy. Quoting the decision: "We cannot deny that our decision today will have an impact on the ability of law enforcement to combat crime. Cell phones have become important tools in facilitating coordination and communication among members of criminal enterprises, and can provide valuable incriminating information about dangerous criminals. Privacy comes at a cost."
New submitter Last_Available_Usern (756093) writes that the Aereo saga is likely over. "The U.S. Supreme Court today dealt a potentially fatal blow to Aereo, an Internet service that allows customers to watch broadcast TV programs on mobile devices by renting a small DVR and antennas (in supported cities) to record and then retransmit local programming on-demand over the internet." Ruling (PDF). Aereo was found to be publicly transmitting, according to SCOTUSBlog "The essence of the Aereo ruling is that Aereo is equivalent to a cable company, not merely an equipment provider."
An anonymous reader writes The experts at Kaspersky Lab have discovered evidence of a targeted attack against the clients of a large European bank. According to the logs found in the server used by the attackers, apparently in the space of just one week cybercriminals stole more than half a million euros from accounts in the bank. The experts also detected transaction logs on the server, containing information about which sums of money were taken from which accounts. All in all, more than 190 victims could be identified, most of them located in Italy and Turkey. The sums stolen from each bank account, according to the logs, ranged between 1,700 to 39,000 euros.
New submitter Andreas Kolbe writes: "Businessman, philanthropist and musician Yank Barry and the Global Village Champions Foundation are suing four Wikipedia editors for defamation, claiming they have maliciously conspired to keep Barry's Wikipedia biography unduly negative. The Daily Dot article includes a copy of the legal brief and quotes Barry as saying, "My page was so ridiculously false and made me sound like a terrible person and people believed it causing deals to fall through. I finally had enough."
New submitter dmitrygr sends this news from Reuters: The U.S. government's no-fly list banning people accused of links to terrorism from commercial flights violates their constitutional rights because it gives them no meaningful way to contest that decision, a federal judge ruled on Tuesday. ... "The court concludes international travel is not a mere convenience or luxury in this modern world. Indeed, for many international travel is a necessary aspect of liberties sacred to members of a free society," [U.S. District Judge Anna Brown] wrote in her 65-page ruling (PDF). "Accordingly, on this record the court concludes plaintiff's inclusion on the no-fly list constitutes a significant deprivation of their liberty interests in international travel," Brown said.
An anonymous reader sends this report from Ars Technica: The Federal Aviation Administration has said that online shopping powerhouse Amazon may not employ drones to deliver packages, at least not anytime soon. The revelation was buried in an FAA document (PDF) unveiled Monday seeking public comment on its policy on drones, or what the agency calls "model aircraft." The FAA has maintained since at least 2007 that the commercial operation of drones is illegal. ... In Monday's announcement, published in the Federal Register, the FAA named Amazon's December proposal as an example of what is barred under regulations that allow the use of drones for hobby and recreational purposes. The agency did not mention Amazon Prime Air by name, but it didn't have to. Under a graphic that says what is barred, the FAA mentioned the "Delivering of packages to people for a fee." A footnote added, "If an individual offers free shipping in association with a purchase or other offer, FAA would construe the shipping to be in furtherance of a business purpose, and thus, the operation would not fall within the statutory requirement of recreation or hobby purpose."
An anonymous reader writes At the non-profit where I work, there isn't a lot of money for buying stock photos or licensing professional images. So, we've turned to sources of 'free' imagery, notably Creative Commons-licensed photos on Flickr. While we're not a huge organization, we do have 100+ individuals creating content in one way or another. We're now wrestling with compliance of the CC licensing, like including links for By Attribution images, etc. Our legal counsel is also scared of photographers changing their licenses and suing us after the fact. How do you document the images you find were licensed one way in the past, especially when numerous people from across the country are acquiring the images?
mpicpp (3454017) points out this story illustrating the problem of betting on the differential between the price of deliverable bitcoin-mining hardware and the price of bitcoin itself: Yet another Bitcoin miner manufacturer, CoinTerra, now faces legal action for not fulfilling an order when it originally promised to. CoinTerra is the third Bitcoin-related startup to face litigation for breach of contract and/or fraud in recent months. The CoinTerra lawsuit was filed in late April 2014 by an Oakland, California-based man seeking to be the lead plaintiff in a proposed class-action lawsuit. Lautaro Cline, the suit alleges, purchased a TerraMiner IV in October 2013 for delivery by January 2014. The company promised, he claims, that this miner would operate at two terahashes per second and would consume 1,200 watts of power. It did neither. However, Cline's suit also claims that CoinTerra did not deliver the miner until February 2014, and it "operated well below the speed advertised and consumed significantly more power than CoinTerra represented, causing Plaintiff to suffer significant lost profits and opportunities."
msm1267 (2804139) writes Controversial spyware commercially developed by Italy's Hacking Team and sold to governments and law enforcement for the purpose of surveillance has a global command and control infrastructure. For the first time, security experts have insight into how its mobile malware components work. Collaborating teams of researchers from Kaspersky Lab and Citizen Lab at the Monk School of Global Affairs at the University of Toronto today reported on their findings during an event in London. The breadth of the command infrastructure supporting Hacking Team's Remote Control System (RCS) is extensive, with 326 servers outed in more than 40 countries; the report also provides the first details on the inner workings of the RCS mobile components for Apple iOS and Android devices. Adds reader Trailrunner7: [T]he report also provides the first details on the inner workings of the RCS mobile components for Apple iOS and Android devices. The new modules enable governments and law enforcement officers with extensive monitoring capabilities over victims, including the ability to report on their location, steal data from their device, use the device's microphone in real time, intercept voice and SMS messages sent via applications such as Skype, WhatsApp, Viber, and much more.
An anonymous reader writes with this news from The Independent: An American driver is facing a $48,000 fine after using a mobile signal jammer in his car to block motorists around him from using their phones on the road. Jason Humphreys reportedly used the jammer from the back seat of his Toyota Highlander for around two years before being caught by Florida police. The 60-year-old said that he used the jammer – which transmits radio signals that interfere with mobile phones – because he was 'fed up' with watching others use their phones on the road. A story from late April (before the fine was levied) gives more detail: The case along I-4 started on April 29, 2013, when the cellular company Metro PCS contacted the Federal Communications Commission because a transmission tower along I-4 would suffer in the morning and evening. A week later, agents from the FCC's enforcement division in Tampa staked out the freeway on May 7, 8, and 9 and pinpointed a “strong wideband emission” in the cellphone wireless range “emanating from a blue Toyota Highlander sport utility vehicle,” with Florida license plates, according to a complaint issued by the FCC on Tuesday. Another clue: When Hillsborough County Sheriffs deputies stopped the SUV, their own two-way radios were jammed."
An anonymous reader writes The U.S. Court of Appeals for the 2nd Circuit last week reversed a tax evasion conviction against an accountant because the government had used data from his computers that were seized under a warrant targeting different suspects. The Fourth Amendment, the court pointed out, "prevents the seizure of one thing under a warrant describing another." Law enforcement originally made copies of his hard drives and during off-site processing, separated his personal files from data related to the original warrant. However, 1.5 years later, the government sifted through his personal files and used what it found to build a case against him. The appeals court held that "[i]f the Government could seize and retain non-responsive electronic records indefinitely, so it could search them whenever it later developed probable cause, every warrant to search for particular electronic data would become, in essence, a general warrant," which the Fourth Amendment protects against. The EFF hopes that the outcome of this appeal will have implications for the NSA's dragnet surveillance practice.
mpicpp (3454017) writes with news that a dump of fare logs from NYC cabs resulted in trip details being leaked thanks to using an MD5 hash on input data with a very small key space and regular format. From the article:
City officials released the data in response to a public records request and specifically obscured the drivers' hack license numbers and medallion numbers. ... Presumably, officials used the hashes to preserve the privacy of individual drivers since the records provide a detailed view of their locations and work performance over an extended period of time.
It turns out there's a significant flaw in the approach. Because both the medallion and hack numbers are structured in predictable patterns, it was trivial to run all possible iterations through the same MD5 algorithm and then compare the output to the data contained in the 20GB file. Software developer Vijay Pandurangan did just that, and in less than two hours he had completely de-anonymized all 173 million entries.
An anonymous reader writes in with news that the memo presenting a case for killing Anwar al-Awlaki has been released thanks to a Freedom of Information Act lawsuit. The U.S. Court of Appeals for the Second Circuit on Monday released a secret 2010 Justice Department memo justifying the killing of Anwar al-Awlaki, a U.S citizen killed in a drone strike in 2011. The court released the document as part of a Freedom of Information Act lawsuit filed by The New York Times and the American Civil Liberties Union to make the document public. Then-acting Assistant Attorney General David Barron, in the partially redacted 41-page memo, outlines the justification of the drone strike in Yemen to take out al-Awlaki, an alleged operational leader of al Qaeda.
UnknowingFool writes In Utility Air Regulatory Group v. EPA, the Supreme Court ruled against the EPA on some limits to greenhouse gases but also upheld other limits. In a 5-4 partial decision, the high court ruled that EPA overstepped their authority in requiring permits only for greenhouse gases for new and modified facilities using the Clean Air act. Such regulatory action can only be granted by Congress. But in the same case on a 7-2 decision, the court ruled that the EPA can enforce greenhouse gas limits on facilities that already require permits for other air pollutants. This leaves intact most of the new regulations proposed by the Obama administration earlier this month as many coal plants produce other air pollutants that can be regulated by the EPA.
samzenpus (5) writes "Lawrence Lessig's list of achievements and areas of influence is not small. He's co-founder of the Creative Commons, but it is his Mayday PAC however that has garnered the most attention recently. The crowdfunded "Super PAC to end all Super PACs" was launched in May with the goal of raising money to elect candidates who would pass campaign finance reform. It raised over $1 million in the first 13 days and has the support of some influential people. With the help of matching contributions, Mayday hopes to raise $12 million by the end of June. Lessig has agreed to answer any questions about the PAC that you might have. As usual, ask as many as you'd like, but please, one question per post."
Graculus writes with news about a plan to install sensors to collect environmental data and count people in Chicago. Chicago plans to install sensors in light poles to observe air quality, light intensity, sound volume, heat, precipitation, and wind. The sensors will also count people by observing cell phone traffic. The curled metal fixtures set to go up on a handful of Michigan Avenue light poles later this summer may look like delicate pieces of sculpture, but researchers say they'll provide a big step forward in the way Chicago understands itself by observing the city's people and surroundings. Some experts caution that efforts like the one launching here to collect data from people and their surroundings pose concerns of a Big Brother intrusion into personal privacy. In particular, sensors collecting cell phone data make privacy proponents nervous. But computer scientist Charlie Catlett said the planners have taken precautions to design their sensors to observe mobile devices and count contact with the signal rather than record the digital address of every device.
ygslash writes "Robert McMillen of Wired claims that we have gotten Net Neutrality all wrong. While we are all busy arguing about whether there should be regulations preventing large content providers from getting preferential bandwidth, McMillen says that not only have the large content providers already had preferential bandwidth for ten years, but that by now this has become an inherent part of the structure of the Internet and in practice cannot be changed. Instead, he says, the Net Neutrality discussion should be about ensuring a free and open competitive market for bandwidth, so that anyone who wants bandwidth can purchase it at a fair price.
hackingbear writes According to British patent consultancy CambridgeIP, China has filed for more than 2,200 graphene patents, the most of any country, followed by the U.S. with more than 1,700 patents, and South Korea with just under 1,200 patents. In terms of institutions, Samsung, Korea Advanced Institute of Science and Technology, and IBM lead the way of number of patent filing on this futurist materials with seemingly unlimited potentials, followed by Qinghua University of China. As China's moving its economy to be more innovation based and strengthening its IP laws, American companies will perhaps soon be at the receiving ends of patent law suits.
itwbennett writes Police in Dallas are scrambling after difficulties using a new records management system caused more than 20 jail inmates, including a number of people charged with violent crimes, to be set free. The prisoners were able to get out of jail because police officers struggling to learn the new system didn't file cases on them within three days, as required by law.
An anonymous reader writes For better or worse, surveillance technology is becoming more common in the workplace. These tools are being used to measure and monitor employees, with the promise changing how people work. "Through these new means, companies have found, for example, that workers are more productive if they have more social interaction. So a bank's call center introduced a shared 15-minute coffee break, and a pharmaceutical company replaced coffee makers used by a few marketing workers with a larger cafe area. The result? Increased sales and less turnover." Of course, this kind of monitoring raises privacy concerns. "Whether this kind of monitoring is effective or not, it's a concern," said Lee Tien, a senior staff lawyer at the Electronic Frontier Foundation in San Francisco.
An anonymous reader writes There have been many US military machines of war that seemed to be revolutionary, but never make it out of the prototype stage. As Robert Farley explains: "Sometimes they die because they were a bad idea in the first place. For the same reasons, bad defense systems can often survive the most inept management if they fill a particular niche well enough." A weapon can seem like an amazing invention, but it still has to adapt to all sorts of conditions--budgetary, politics, and people's plain bias. Here's a look at a few of the best weapons of war that couldn't win under these "battlefield" conditions.
schwit1 (797399) writes "The text of a 19-page, international trade agreement being drafted in secret was published by WikiLeaks as the transparency group's editor commemorated his two-year anniversary confined to the Ecuadorian Embassy in London. Fifty countries around the globe have already signed on to the Trade in Service Agreement, or TISA, including the United States, Australia and the European Union. Despite vast international ties, however, details about the deal have been negotiated behind closed-doors and largely ignored by the press. In a statement published by the group alongside the leaked draft this week, WikiLeaks said "proponents of TISA aim to further deregulate global financial services markets," and have participated in "a significant anti-transparency maneuver" by working secretly on a deal that covers more than 68 percent of world trade in services, according to the Swiss National Center for Competence in Research.
hypnosec writes A new movement dubbed the Open Wireless Movement is asking users to open up their private Wi-Fi networks to total strangers – a random act of kindness – with an aim of better securing networks and facilitating better use of finite broadband resources. The movement is supported by non-profit and pro-internet rights organizations like the Electronic Frontier Foundation (EFF), Mozilla, Open Rights Group, and Free Press among others. The EFF is planning to unveil one such innovation – Open Wireless Router – at the Hackers on Planet Earth (HOPE X) conference to be held next month on New York. This firmware will allow individuals to share their private Wi-Fi to total strangers to anyone without a password.
ectoman (594315) writes The U.S. Supreme Court issued a groundbreaking decision concerning software patents, claiming that abstract ideas are not by themselves patentable. The ruling was a cause for celebration among those opposed to software patent abuse, like Red Hat's Vice President and Assistant General Counsel, Rob Tiller. Here, Tiller analyzes and offers some context for the Court's ruling, which "uses the traditional common law methodology of comparing one case to previous similar cases and harmonizing with those most similar."
Advocatus Diaboli sends this excerpt from Wired: Police in Florida have, at the request of the U.S. Marshals Service, been deliberately deceiving judges and defendants about their use of a controversial surveillance tool to track suspects, according to newly obtained emails (PDF). At the request of the Marshals Service, the officers using so-called stingrays have been routinely telling judges, in applications for warrants, that they obtained knowledge of a suspect's location from a 'confidential source' rather than disclosing that the information was gleaned using a stingray.