We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
An anonymous reader writes About a week ago, the Federal Communications Commission (FCC) asked for Verizon's justification on its policy of throttling users who pay for unlimited data usage. "I know of no past Commission statement that would treat 'as reasonable network management' a decision to slow traffic to a user who has paid, after all, for 'unlimited' service," the FCC wrote. In its response, Verizon has indicated that its throttling policy is meant to provide users with an incentive to limit their data usage. The company explained that "a small percentage of the customers on these [unlimited] plans use disproportionately large amounts of data, and, unlike subscribers on usage-based plans, they have no incentive not to do so during times of unusually high demand....our practice is a measured and fair step to ensure that this small group of customers do not disadvantage all others."
bobbied (2522392) writes Apparently Edward Snowden is not alone. CNN is reporting that recent leaked documents published by The Intercept (a website that has been publishing Snowden's leaked documents) could not have been leaked by Snowden because they didn't exist prior to his fleeing the USA and he couldn't possibly have accessed them. Authorities are said to be looking for a new leaker.
The EFF is only today able to release details of an attempt by the government to alter the historical record in the case brought by the EFF against the NSA in Jewel v. NSA. "On June 6, the court held a long hearing in Jewel in a crowded, open courtroom, widely covered by the press. We were even on the local TV news on two stations. At the end, the Judge ordered both sides to request a transcript since he ordered us to do additional briefing. But when it was over, the government secretly, and surprisingly sought permission to "remove" classified information from the transcript, and even indicated that it wanted to do so secretly, so the public could never even know that they had done so." As you'd expect of the EFF, they fought back with vigorous objections, and in the end the government did not get its way, instead deciding that it hadn't given away any classified information after all. "The transcript of a court proceeding is the historical record of that event, what will exist and inform the public long after the persons involved are gone. The government's attempt to change this history was unprecedented. We could find no example of where a court had granted such a remedy or even where such a request had been made. This was another example of the government's attempt to shroud in secrecy both its own actions, as well as the challenges to those actions. We are pleased that the record of this attempt is now public. But should the situation recur, we will fight it as hard as we did this time."
Advocatus Diaboli (1627651) writes For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement's knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system. The approach has borne fruit—over a dozen alleged users of Tor-based child porn sites are now headed for trial as a result. But it's also engendering controversy, with charges that the Justice Department has glossed over the bulk-hacking technique when describing it to judges, while concealing its use from defendants.
jfruh (300774) writes The fallout from HP's Autonomy acquisition keeps getting more dramatic. Autonomy's ex-CFO is trying to block the settlement of lawsuits that arsoe the botched deal, claiming that HP is trying to hide its "own destruction of Autonomy's success after the acquisition." HP hit back, saying the ex-CFO "was one of the chief architects of the massive fraud on HP that precipitated this litigation."
mask.of.sanity (1228908) writes "A string of documents detailing the operations and effectiveness of the FinFisher suite of surveillance platforms appears to have been leaked. The documents, some dated 4 April this year, detail the anti-virus detection rates of the FinFisher spyware which German based Gamma Group sold to governments and law enforcement agencies. The dump also reveals Windows 8 users should opt for the Metro version of Skype rather than the desktop client because it cannot be tapped by FinFisher."
Despite a failed attempt to have charges dismissed, the alleged Silk Road operator Ross Ulbricht's lawyer has filed a new motion to have evidence dismissed, citing recent court rulings in an argument that the Silk Road related searches were overly broad. From the article:
Dratel [Ulbricht's lawyer] argues in his 102-page motion filed last Friday that "the government conducted a series of 14 searches and seizures of various physical devices containing electronically stored information ('ESI'), and of ESI itself from Internet providers and other sources. Some of the ESI was obtained via search warrant, but other ESI was obtained via court order, and still other ESI was obtained without benefit of any warrant at all." ...
The defense lawyer argues that even the searches for which the government had a warrant were overbroad and based on evidence that may have been obtained illegally. The attorney writes: " As set forth ante, all of the searches and seizures conducted pursuant to warrants and/or orders were based on the initial ability of the government to locate the Silk Road Servers, obtain the ESI on them, and perform extensive forensic analysis of that ESI. Thus, all subsequent searches and seizures are invalid if that initial locating the Silk Road Servers, obtaining their ESI, and gaining real-time continued access to those servers, was accomplished unlawfully."
Nerval's Lobster writes The "Compubody Sock," which anyone with knitting skills can make at home, is a giant sock-hoodie-bag in which you place your laptop or tablet, along with your head and hands, giving you total privacy while freaking out anyone who happens to be sitting next to you. Designer Becky Stern told Forbes' Kashmir Hill that the Sock was meant more as commentary on privacy and device addiction; even so, considering how NSA employees reportedly drape themselves in hoods in order to thwart hidden cameras while typing in passwords, it's not outside the realm of possibility that an ultra-paranoid someone could find a practical use for a body sock. But that paranoid android better have expert knitting skills: putting together the Sock necessitates a whole lot of steps ("Purl 5, purl 2 together, purl 1, turn the work," etc.). Your other option, of course, is to simply avoid working on sensitive stuff in public.
rsmiller510 writes Spain's new tax on linking to Spanish newspaper articles is ill defined and short sighted and ends up protecting a dying industry, while undermining a vibrant one. In another case of disrupted industries turning to lawmakers to solve their problems, this one makes no sense at all, especially given the state of the Spanish economy and the fact that it comes 15 years too late to even matter. From the article: "While newspapers are at least partly correct to blame the Internet for their troubles, they should recognize that their own mismanagement also played a key role. Newspapers everywhere waited much too long to take the Internet seriously, and while virtually every surviving newspaper has a website now, they almost invariably treat those sites as a necessary evil, as something separate from the news collection and delivery that they do with print."
schwit1 writes Vitaly Lopota, the president of Russia's largest space company Energia, was suspended Friday by the company's board of directors. From the article: "The move appears to be part of an effort by Russia's government to obtain majority control over Energia, of which it owns a 38-percent share. The directors elected Igor Komarov as its new chairman of the board. Komarov is chief of the Russian United Rocket and Space Corporation (URSC), the government-owned company tasked with consolidating Russia's sprawling space sector." The government is also conducting a criminal investigation of Lopota, which might be justified but appears to be a power play designed to both eliminate him from the game as well as make sure everyone else tows the line so that URSC can take complete control.
mrspoonsi writes with this story about a tip sent to police by Google after scanning a users email. A Houston man has been arrested after Google sent a tip to the National Center for Missing and Exploited Children saying the man had explicit images of a child in his email, according to Houston police. The man was a registered sex offender, convicted of sexually assaulting a child in 1994, reports Tim Wetzel at KHOU Channel 11 News in Houston. "He was keeping it inside of his email. I can't see that information, I can't see that photo, but Google can," Detective David Nettles of the Houston Metro Internet Crimes Against Children Taskforce told Channel 11. After Google reportedly tipped off the National Center for Missing and Exploited Children, the Center alerted police, which used the information to get a warrant.
An anonymous reader writes A week after Judge Denise Cote put forward concerns over a proposed settlement with consumers over e-book price-fixing in the iBookstore, she has given Apple preliminary approval for its $450 million settlement. "The proposed settlement agreement is within the range of those that may be approved as fair and reasonable, such that notice to the class is appropriate," Cote said. "Preliminary approval is granted." Cote set a final fairness hearing for Nov. 21.
wiredmikey writes Mozilla warned on Friday that it had mistakenly exposed information on almost 80,000 members of its Mozilla Developer Network (MDN) as a result of a botched data sanitization process. The discovery was made around June 22 by one of Mozilla's Web developers, Stormy Peters, Director of Developer Relations at Mozilla, said in a security advisory posted to the Mozilla Security Blog on Friday. "Starting on about June 23, for a period of 30 days, a data sanitization process of the Mozilla Developer Network (MDN) site database had been failing, resulting in the accidental disclosure of MDN email addresses of about 76,000 users and encrypted passwords of about 4,000 users on a publicly accessible server," Peters wrote. According to Peters, the encrypted passwords were salted hashes and they by themselves cannot currently be used to authenticate with the MDN. However, Peters warned that MDN users may be at risk if they reused their original MDN passwords on other non-Mozilla websites or authentication systems.
An anonymous reader writes with a FCC proposal that is bad news for Sprint and T-Mobile. A proposal from FCC Chairman Tom Wheeler would block an attempt by Sprint and T-Mobile US to buy spectrum together in the incentive auction that will transfer airwaves from broadcast TV stations to cellular carriers next year. Announced on Friday, Wheeler's proposal seeks to help the smallest wireless companies develop business partnerships with larger ones. But it would not allow partnerships between the biggest carriers, since more than 95 percent of US customers are served by either AT&T, Sprint, T-Mobile, or Verizon Wireless. "Our goal is to promote the participation of as many parties as possible in the auction," FCC Wireless Telecommunications Bureau Chief Roger Sherman wrote Friday. "If two of the largest companies are able to bid as one combined entity in the auction, their combined resources may have the effect of suppressing meaningful competition. Therefore, the item tentatively concludes that joint bidding arrangements between nationwide providers should not be allowed."
mdsolar writes with news about the closing of the San Onofre nuclear plant. Dismantling the San Onofre nuclear power plant in Southern California will take two decades and cost $4.4 billion. Southern California Edison on Friday released a road map that calls for decommissioning the twin-reactor plant and restoring the property over two decades, beginning in 2016. U-T San Diego says it could be the most expensive decommissioning in the 70-year history of the nuclear power industry. But Edison CEO Ted Craver says there's already enough money to pay for it. Edison shut down the plant in 2012 after extensive damage was found to tubes carrying radioactive water. It was closed for good last year.
An anonymous reader writes: We often worry about technology and unscrupulous intelligence agencies driving us toward a surveillance state. But apparently Singapore already beat us to the punch. "Not only does the government keep a close eye on what its citizens write and say publicly, but it also has the legal authority to monitor all manner of electronic communications, including phone calls, under several domestic security laws aimed at preventing terrorism, prosecuting drug dealing, and blocking the printing of 'undesirable' material." They've used it to do good, like swiftly moving to contain the spread of infectious diseases and to figure out how the public wants policy problems solved. But they've also obliterated privacy and restricted what people can say and do. "Singaporeans speak, often reverently, of the "social contract" between the people and their government. They have consciously chosen to surrender certain civil liberties and individual freedoms in exchange for fundamental guarantees: security, education, affordable housing, health care." The article notes, "It's hard to know whether the low crime rates and adherence to the rule of law are more a result of pervasive surveillance or Singaporeans' unspoken agreement that they mustn't turn on one another, lest the tiny island come apart at the seams."
hypnosec writes Lionsgate, the film company in charge of distribution for Expendables 3, has filed a lawsuit against unknown individuals who shared a DVD-level copy of the movie and six file-sharing sites known to have the links through which copies of the movies are being downloaded illegally. An advance copy of Expendables 3 was leaked online in July, and it was downloaded as many as 180,000 times in just 24 hours. The movie, which is releasing on August 15, is said to have crossed two million downloads already. In addition to the lawsuit, the Dept. of Homeland Security is on the case.
An anonymous reader writes: In response to an inquiry from European data protection regulators, Google has detailed how they evaluate and act on requests to de-index search results. Google's procedures for responding to "right-to-be-forgotten" requests are explained in a lengthy document that was made publicly available. "Google of course claims its own economic interest does not come into play when making these rtbf judgements — beyond an 'abstract consideration' of a search engine needing to help people find the most relevant information for their query. ... Google also goes into lengthy detail to justify its decision to inform publishers when it has removed links to content on their sites — a decision which has resulted in media outlets writing new articles about delisted content, thereby resulting in the rtbf ruling causing the opposite effect to that intended (i.e. fresh publicity, not fair obscurity)."
theodp writes: Over at Code.org, they're celebrating because more than 100 members of Congress are now co-sponsoring the Computer Science Education Act (HR 2536), making the bill designed to"strengthen elementary and secondary computer science education" the most broadly cosponsored education bill in the House. By adding fewer than 50 words to the Elementary and Secondary Education Act of 1965, HR 2536 would elevate Computer Science to a "core academic subject" (current core academic subjects are English, reading or language arts, mathematics, science, foreign languages, civics and government, economics, arts, history, and geography), a status that opens the doors not only to a number of funding opportunities, but also to a number of government regulations. So, now that we know it takes 112 U.S. Representatives to make a CS education bill, the next question is, "How many taxpayer dollars will it take to pay for the consequences?" While Code.org says "the bill is cost-neutral and doesn't introduce new programs or mandates," the organization in April pegged the cost of putting CS in every school at $300-$400 million. In Congressional testimony last January, Code.org proposed that "comprehensive immigration reform efforts that tie H-1B visa fees to a new STEM education fund" could be used "to support the teaching and learning of more computer science in K-12 schools," echoing Microsoft's National Talent Strategy.
On Friday President Obama signed into a law a bill allowing mobile devices to be legally unlocked, so that consumers can switch between carriers. The legislation was kicked off by a successful petition on Whitehouse.gov after the Librarian of Congress decided that cell phones no longer needed an exemption from the Digital Millennium Copyright Act's anti-hacking provision. The legislation (PDF) passed both houses of Congress and is now law. Unfortunately, the new bill doesn't guarantee permanent legality. It simply reinstates the exemption, and leaves the DMCA alone. For the next year, cell phone unlocking will certainly be legal, but after that, the Librarian of Congress once again has the ability to void the exemption once every three years.
jfruh writes The FTC has moved aggressively recently against companies that make it too easy for people — especially kids — to rack up huge charges on purchases within apps. But at a dicussion panel sponsored by free-market think tank TechFreedom, critics pushed back. Joshua Wright, an FTC commissioner who dissented in a recent settlement with Apple, says a 15-minute open purchase window produced "obvious and intuitive consumer benefits" and that the FTC "simply substituted its own judgment for a private firm's decision as to how to design a product to satisfy as many users as possible."
An anonymous reader writes On Friday, Russia implemented a new law that significantly limits its citizens' online free speech. Under this new law, social media sites must "retain user data for at least six months...within the country's boundaries so it can be available for government inspection." Also, "bloggers with at least 3,000 daily readers must register with Roskomnadzor, the regulator that also oversees Russia's main media outlets." This, of course, means that popular bloggers will no longer be able to remain anonymous.
DroidJason1 writes: Microsoft has filed a contract dispute lawsuit against Samsung over what Microsoft claims is a breach of contract by Samsung involving Android patent royalties. Back in 2011, Samsung voluntarily entered into a legally binding contract with Microsoft in a cross-licensing IP agreement involving Android patents. Samsung has grown over the past few years and now believes that Microsoft's recent acquisition of Nokia nulls the agreement. Microsoft has gone to court and is asking to settle the disagreement with Samsung in order to continue the original agreement.
RobinH writes: Our small-ish municipality (between 10,000 to 15,000 in population) has recently decided to switch to online voting. I should note that they were previously doing voting-by-mail. I have significant reservations about online voting, particularly the possibility of vote-selling and the general lack of voter secrecy, not to mention the possible lack of computer security. However, it's only a municipal election, and apparently a lot of municipalities around here are already doing online voting. I'm not sure if the rank-and-file citizens care, or if they would listen to my concerns. Should I bother speaking up, or should I ignore it since municipal elections are not that important anyway?
jfruh (300774) writes Investigators in a criminal case want to see some emails stored on Microsoft's servers in Ireland. Microsoft has resisted, on the grounds that U.S. law enforcement doesn't have jurisdiction there, but a New York judge ruled against them, responding to prosecutors' worries that web service providers could just move information around the world to avoid investigation. The case will be appealed.
Nicola Hahn (1482985) writes Despite the long line of covert operations that Ed Snowden's documents have exposed, public outcry hasn't come anywhere near the level of social unrest that characterized the 1960s. Journalists like Conor Friedersdorf have suggested that one explanation for this is that the public is "informed by a press that treats officials who get caught lying and misleading (e.g., James Clapper and Keith Alexander) as if they're credible."
Certainly there are a number of well-known popular venues which offer a stage for spies to broadcast their messages from while simultaneously claiming to "cultivate conversations among all members of the security community, both public and private." This year, for instance, Black Hat USA will host Dan Greer (the CISO of In-Q-Tel) as a keynote speaker.
But after all of the lies and subterfuge is it even constructive to give voice to the talking points of intelligence officials? Or are they just muddying the water? As one observer put it, "high-profile members of the intelligence community like Cofer Black, Shawn Henry, Keith Alexander, and Dan Greer are positioned front and center in keynote slots, as if they were glamorous Hollywood celebrities. While those who value their civil liberties might opine that they should more aptly be treated like pariahs."
An anonymous reader writes with a bit of pith from TechDirt: Every so often, people who don't really understand the importance of anonymity or how it enables free speech (especially among marginalized people), think they have a brilliant idea: "just end real anonymity online." They don't seem to understand just how shortsighted such an idea is. It's one that stems from the privilege of being in power. And who knows that particular privilege better than members of the House of Lords in the UK — a group that is more or less defined by excess privilege? The Communications Committee of the House of Lords has now issued a report concerning "social media and criminal offenses" in which they basically recommend scrapping anonymity online.
Bruce66423 (1678196) writes with this story from the Guardian: The director of the Central Intelligence Agency, John Brennan, issued an extraordinary apology to leaders of the US Senate intelligence committee on Thursday, conceding that the agency employees spied on committee staff and reversing months of furious and public denials. Brennan acknowledged that an internal investigation had found agency security personnel transgressed a firewall set up on a CIA network, called RDINet, which allowed Senate committee investigators to review agency documents for their landmark inquiry into CIA torture." (Sen. Diane Feinstein was one of those vocally accusing the CIA of spying on Congress; Sen. Bernie Sanders has raised a similar question about the NSA.)
DroidJason1 writes The Chinese government is investigating Microsoft for possible breaches of anti-monopoly laws, following a series of surprise visits to Redmond's offices in cities across China on Monday. These surprise visits were part of China's ongoing investigation [warning: WSJ paywall], and were based on security complaints about Microsoft's Windows operating system and Office productivity suite. Results from an earlier inspection apparently were not enough to clear Microsoft of suspicion of anti-competitive behavior. Microsoft's alleged anti-monopoly behavior is a criminal matter, so if found guilty, the software giant could face steep fines as well as other sanctions.
Daniel_Stuckey writes Now the NSA has yet another dilemma on its hands: Investigative journalist Jason Leopold is suing the agency for denying him the release of financial disclosure statements attributable to its former director. According to a report by Bloomberg, prospective clients of Alexander's, namely large banks, will be billed $1 million a month for his cyber-consulting services. Recode.net quipped that for an extra million, Alexander would show them the back door (state-installed spyware mechanisms) that the NSA put in consumer routers.
An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.
Lucas123 writes: The Alliance of Artists and Recording Companies is suing Ford and General Motors for millions of dollars over alleged copyrights infringement violations because their vehicles' CD players can rip music to infotainment center hard drives. The AARC claims in its filing (PDF) that the CD player's ability to copy music violates the Audio Home Recording Act of 1992. The Act protects against distributing digital audio recording devices whose primary purpose is to rip copyrighted material. For example, Ford's owner's manual explains, "Your mobile media navigation system has a Jukebox which allows you to save desired tracks or CDs to the hard drive for later access. The hard drive can store up to 10GB (164 hours; approximately 2,472 tracks) of music." The AARC wants $2,500 for each digital audio recording device installed in a vehicle, the amount it says should have been paid in royalties.
An anonymous reader writes: Every time a city- or state-wide disaster strikes, services to help the victims slowly crop up over the following days and weeks. Sometimes they work well, sometimes they don't. Today, city officials in San Francisco and Portland announced a partnership with peer-to-peer lodging service Airbnb to work out some disaster-preparedness plans ahead of time. Airbnb will locate hosts in these cities who will commit to providing a place to stay for people who are displaced in a disaster, and then set up alerts and notifications to help people find these hosts during a crisis. The idea is that if wildfires or an earthquake forces thousands of people to evacuate their homes, they can easily be absorbed into an organized, distributed group of willing hosts, rather than being shunted to one area and forced to live in a school gymnasium or something similar.
An anonymous reader writes: Today Senator Patrick Leahy (D-VT) introduced a bill that would ban bulk collection of telephone records and internet data for U.S. citizens. This is a stronger version of the legislation that passed the U.S. House in May, and it has support from the executive branch as well. "The bill, called the USA Freedom Act, would prohibit the government from collecting all information from a particular service provider or a broad geographic area, such as a city or area code, according to a release from Leahy's office. It would expand government and company reporting to the public and reform the Foreign Intelligence Surveillance Court, which reviews NSA intelligence activities. Both House and Senate measures would keep information out of NSA computers, but the Senate bill would impose stricter limits on how much data the spy agency could seek."
redletterdave (2493036) writes "Sharron Laverne Parrish Jr., 24, allegedly scammed Apple not once, but 42 times, cheating the company out of more than $300,000 — and his scam was breathtakingly simple. According to a Secret Service criminal complaint, Parrish allegedly visited Apple Stores and tried to buy products with four different debit cards, which were all closed by his respective financial institutions. When his debit card was inevitably declined by the Apple Store, he would protest and offer to call his bank — except, he wasn't really calling his bank. So he would allegedly offer the Apple Store employees a fake authorization code with a certain number of digits, which is normally provided by credit card issuers to create a record of the credit or debit override. But that's the problem with this system: as long as the number of digits is correct, the override code itself doesn't matter."
mrspoonsi (2955715) writes "The City of London police has started placing banner advertisements on websites believed to be offering pirated content illegally. The messages, which will appear instead of paid-for ads, will ask users to close their web browsers. The move comes as part of a continuing effort to stop piracy sites from earning money through advertising. Police said the ads would make it harder for piracy site owners to make their pages look authentic. "When adverts from well known brands appear on illegal websites, they lend them a look of legitimacy and inadvertently fool consumers into thinking the site is authentic," said Detective Chief Inspector Andy Fyfe from the City of London Police Intellectual Property Crime Unit (Pipcu). "This new initiative is another step forward for the unit in tackling IP crime and disrupting criminal profits. "Copyright infringing websites are making huge sums of money though advert placement, therefore disrupting advertising on these sites is crucial and this is why it is an integral part of Operation Creative.""
With recent news that Facebook altered users' feeds as part of a psychology experiment, OKCupid has jumped in and noted that they too have altered their algorithms and experimented with their users (some unintentional) and "if you use the Internet, you’re the subject of hundreds of experiments at any given time, on every site. That’s how websites work." Findings include that removing pictures from profiles resulted in deeper conversations, but as soon as the pictures returned appearance took over; personality ratings are highly correlated with appearance ratings (profiles with attractive pictures and no other information still scored as having a great personality); and that suggesting a bad match is a good match causes people to converse nearly as much as ideal matches would.
Jason Koebler (3528235) writes In the months and weeks leading up to a referendum vote that would have established a locally owned fiber network in three small Illinois cities, Comcast and SBC (now AT&T) bombarded residents and city council members with disinformation, exaggerations, and outright lies to ensure the measure failed. The series of two-sided postcards painted municipal broadband as a foolhardy endeavor unfit for adults, responsible people, and perhaps as not something a smart woman would do. Municipal fiber was a gamble, a high-wire act, a game, something as "SCARY" as a ghost. Why build a municipal fiber network, one asked, when "internet service [is] already offered by two respectable private businesses?" In the corner, in tiny print, each postcard said "paid for by SBC" or "paid for by Comcast." The postcards are pretty absurd and worth a look.
UrsaMajor987 (3604759) writes I have a Asus Transformer tablet that I dropped on the floor. There is no obvious sign of damage but It will no longer boot. Good excuse to get a newer model. I intend to sell it for parts (it comes with an undamaged keyboard) or maybe just toss it. I want to remove all my personal data. I removed the flash memory card but what about the other storage? I know how to wipe a hard drive, but how do you wipe a tablet? If you were feeling especially paranoid, but wanted to keep the hardware intact for the next user, what would you do?
SonicSpike points out an article from the Pew Charitable Trusts' Research & Analysis department on the legislation and regulation schemes emerging in at least a few states in reaction to the increasing use of digital currencies like Bitcoin. A working group called the Conference of State Bank Supervisors’ Emerging Payments Task Force has been surveying the current landscape of state rules and approaches to digital currencies, a topic on which state laws are typically silent. In April, the task force presented a model consumer guidance to help states provide consumers with information about digital currencies. A number of states, including California, Massachusetts and Texas, have issued warnings to consumers that virtual currencies are not subject to “traditional regulation or monetary policy,” including insurance, bonding and other security measures, and that values can fluctuate dramatically. ... The article focuses on the high-population, big-economy states of New York, California and Texas, with a touch of Kansas -- but other states are sure to follow. Whether you live in the U.S. or not, are there government regulations that you think would actually make sense for digital currencies?
itwbennett (1594911) writes "Attackers are exploiting a vulnerability in distributed search engine software Elasticsearch to install DDoS malware on Amazon and possibly other cloud servers. Last week security researchers from Kaspersky Lab found new variants of Mayday, a Trojan program for Linux that's used to launch distributed denial-of-service (DDoS) attacks. The malware supports several DDoS techniques, including DNS amplification. One of the new Mayday variants was found running on compromised Amazon EC2 server instances, but this is not the only platform being misused, said Kaspersky Lab researcher Kurt Baumgartner Friday in a blog post."
hypnosec writes with news that India's Central Bureau of Investigation has ordered a preliminary enquiry (PE) against Google for violating Indian laws by mapping sensitive areas and defence installations in the country. As per the PE, registered on the basis of a complaint made by the Surveyor General of India's office to the Union Home Ministry, Google has been accused of organizing a mapping competition dubbed 'Mapathon' in February-March 2013 without taking prior permission from Survey of India, country's official mapping agency. The mapping competition required citizens to map their neighbourhoods, especially details related to hospitals and restaurants. The Survey of India (SoI), alarmed by the event, asked the company to share its event details. While going through the details the watchdog found that there were several coordinates having details of sensitive defence installations which are out of the public domain."
jrepin (667425) writes "The government of the autonomous region of Valencia (Spain) earlier this month made available the next version of Lliurex, a customisation of the Edubuntu Linux distribution. The distro is used on over 110,000 PCs in schools in the Valencia region, saving some 36 million euro over the past nine years, the government says." I'd lke to see more efforts like this in the U.S.; if mega school districts are paying for computers, I'd rather they at least support open source development as a consequence.
MarkWhittington (1084047) writes "While participating in a panel called "The US Space Enterprise Partnership" at the NewSpace Conference that was held by the Space Frontier Foundation on Saturday, SpaceX Chief Operating Officer Gwynne Shotwell opined that NASA's budget should be raised to $22-25 billion, according to a tweet by Space Policy Online's Marcia Smith. The theory is that a lot of political rancor has taken place in the aerospace community because of the space agency's limited budget. If the budget were to be increased to pay for everything on the space wish list, the rancor will cease.
The statement represents something of a departure of the usual mutual antagonism that exists between some in the commercial space community and some at NASA. Indeed Space Politics' Jeff Foust added a tweet, "Thought: a panel at a Space Frontier Foundation conf is talking about how to increase NASA budget. Imagine that in late 90s." The Space Frontier Foundation has been a leading voice for commercializing space, sometimes at the expense of NASA programs."
An anonymous reader writes with an unpleasant statistic from France, quoting David Corchia, who heads a service employed by large French news organizations to sift through and moderate comments made on their sites. Quoting YNet News: Corchia says that as an online moderator, generally 25% to 40% of comments are banned. Moderators are assigned with the task of filtering comments in accordance with France's legal system, including those that are racist, anti-Semitic or discriminatory. Regarding the war between the Israelis and Hamas, however, Corchia notes that some 95% of online comments made by French users are removed. "There are three times as many comments than normal, all linked to the Israeli-Palestinian conflict," added Jeremie Mani, head of another moderation company Netino. "We see racist or anti-Semitic messages, very violent, that also take aim at politicians and the media, sometimes by giving journalists' contact details," he added. "This sickening content is peculiar to this conflict. The war in Syria does not trigger these kinds of comments."
Bose has taken issue with some of the technology embodied in products in Apple's newly acquired Beats line of headphones. As Ars Technica reports, Bose is suing Apple, claiming that the Beats products violate five Bose patents, covering noise cancellation and signal processing Although Bose never mentions Apple in the 22-page complaint, the acquisition price of the private company may have played a part in spurring Bose to sue. The suit doesn't include a specific damage demand. Bose has also filed a complaint with the US International Trade Commission against Beats over the same infringement claims. That means the patent lawsuit filed in federal court will be stayed while the ITC case gets resolved first.
The Wall Street Journal lists 26 questions that Google and other search providers have been asked (in a meeting in Brussels earlier this week) to answer for EU regulators, to pin down what the search engine companies have done to comply with European demands to implement a "right to be forgotten." Some questions were asked directly of representatives of Microsoft, Yahoo and Google, while the regulators want answers to the others in short order. From the article: Regulators touched on some hot-button issues in six oral questions and another 26 written ones, with answers due by next Thursday. They asked Google to describe the “legal basis” of its decision to notify publishers when it approves right-to-be-forgotten requests, something that has led to requesters’ being publicly identified in some cases. They also asked search engines to explain where they take down the results, after complaints from some regulators that Google does not filter results on google.com. That means that anyone in Europe can switch from, say, google.co.uk to Google.com to see any removed links. Among the questions: "2. Do you filter out some requests based on the location, nationality, or place of residence of the data subject? If so, what is the legal basis for excluding such requests?" and "16. Does your company refuse requests when the data subject was the author of the information he/she posted himself/herself on the web? If so, what is the basis for refusing such requests?"
The Washington Post reports in a short article on the sometimes strange, sometimes strained relationship between spy agencies like the NSA and CIA and law enforcement (as well as judges and prosecutors) when it comes to evidence gathered using technology or techniques that the spy agencies would rather not disclose at all, never mind explain in detail. They may both be arms of the U.S. government, but the spy agencies and the law enforcers covet different outcomes. From the article: [S]sometimes it's not just the tool that is classified, but the existence itself of the capability — the idea that a certain type of communication can be wiretapped — that is secret. One former senior federal prosecutor said he knew of at least two instances where surveillance tools that the FBI criminal investigators wanted to use "got formally classified in a big hurry" to forestall the risk that the technique would be revealed in a criminal trial. "People on the national security side got incredibly wound up about it," said the former official, who like others interviewed on the issue spoke on condition of anonymity because of the topic’s sensitivity. "The bottom line is: Toys get taken away and put on a very, very high shelf. Only people in the intelligence community can use them." ... The DEA in particular was concerned that if it came up with a capability, the National Security Agency or CIA would rush to classify it, said a former Justice Department official.
McGruber (1417641) writes In Atlanta, an electrical problem in a "Buss Duct" has caused the Sam Nunn Atlanta Federal Center to be closed for at least a week. 5,000 federal employees work at the center. While many might view this as another example of The Infrastructure Crisis in the USA, it might actually be another example of mismanagement at the complex's landlord, the General Service Administration (GSA). Probably no one wants to go to work in an Atlanta July without a working A/C.
theshowmecanuck (703852) writes with this excerpt from Reuters summarizing the upshot of a talk that Jonathan Zdziarski gave at last weekend's HOPE conference: Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicized techniques by Apple Inc employees, the company acknowledged this week. The same techniques to circumvent backup encryption could be used by law enforcement or others with access to the 'trusted' computers to which the devices have been connected, according to the security expert who prompted Apple's admission. Users are not notified that the services are running and cannot disable them, Zdziarski said. There is no way for iPhone users to know what computers have previously been granted trusted status via the backup process or block future connections. If you'd rather watch and listen, Zdziarski has posted a video showing how it's done.