We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
itwbennett writes China is tightening control over mobile messaging services with new rules that limit their role in spreading news. Under the new regulations, only news agencies and other groups with official approval can publish whatever the government considers political news via public accounts. "All other public accounts that have not been approved cannot release or reprint political news," the regulations said. Users of the instant messaging services will also have to register with their official IDs, and agree to follow relevant laws.
First time accepted submitter PotatoHead (12771) writes "This is a big win for Open Hardware Proponents! The Parallax Propeller Microcontroller VERILOG code was released today, and it's complete! Everything you need to run Open Code on an Open CPU design. This matters because you can now build a device that is open hardware, open code all the way down to the CPU level! Either use a product CPU, and have access to its source code to understand what and how it does things, or load that CPU onto a suitable FPGA and modify it or combine it with your design."
Sonny Yatsen (603655) writes A California man with nothing better to do has launched a class-action lawsuit against Sony because he claims he was harmed because Killzone: Shadowfall's multiplayer mode doesn't have native 1080p resolution as Sony originally claimed. He now demands 'all economic, monetary, actual, consequential, statutory and compensatory damages' as well as punitive damages from Sony.
SiggyRadiation writes Edward Snowden is allowed to stay in Russia for three more years. According to the NYPost:"His lawyer, Analtoly Kucherena, was quoted by Russian news agencies on Thursday as saying Snowden now has been granted residency for three more years, but that he had not been granted political asylum. That status, which would allow him to stay in Russia permanently, must be decided by a separate procedure, Kucherena said, but didn't say whether Snowden is seeking it." The question that remains, of course, is did the Russians use this as leverage over him to get to more information or influence him? Or is the positive PR in itself enough for the Russians in the current climate of tensions and economic sanctions relating to the Ukraine crisis?"
mrspoonsi writes Apple and Samsung have agreed to withdraw all legal cases against each other outside the United States. The two rivals have sued each other over a range of patent disputes in nine countries outside the US, including the UK, South Korea, Japan and Germany. A joint statement said the agreement "does not involve any licensing arrangements", and they would continue to pursue existing cases in US courts. The two firms are the biggest players in the smartphone and tablet PC market. But they have been involved in a bitter legal battle, spread across various countries, which has escalated in recent years.
stephendavion writes A legal scholar says he and colleagues have developed an algorithm that can predict, with 70 percent accuracy, whether the US Supreme Court will uphold or reverse the lower-court decision before it. "Using only data available prior to the date of decision, our model correctly identifies 69.7 percent of the Court's overall affirm and reverse decisions and correctly forecasts 70.9% of the votes of individual justices across 7,700 cases and more than 68,000 justice votes," Josh Blackman, a South Texas College of Law scholar, wrote on his blog Tuesday.
Mr_Silver writes TorrentFreak is reporting that the City of London Police (a private police force in government-backed livery with an authority that does not go beyond the corporate-controlled City of London area — so not to be confused with the Metropolitan Police) has seized control of a number of domains including Immunicity, a general proxy server that was set up as a censorship circumvention tool. This appears to be their next step after placing banner adverts on websites.
coondoggie writes Can a tool or technology be applied to the brain and accurately predict out of a given group of people who will be the smartest? The research arm of the Office of the Director of National Intelligence, Intelligence Advanced Research Projects Activity (IARPA) is looking for exactly those kinds of tools."IARPA is looking to get a handle on the state of the art in brain-based predictors of future cognitive performance. In particular, IARPA is interested in non-invasive analyses of brain structure and/or function that can be used to predict who will best learn complex skills and accomplish tasks within real-world environments, and with outcome measures, that are relevant to national security.
First time accepted submitter jaeztheangel writes Ecuador's government has approved plans to start a new Digital Currency backed by the state. With defaults in recent history, and dwindling oil reserves it will be interesting to see how this decision turns out. From the article: "Congress last month approved legislation to start a digital currency for use alongside the U.S. dollar, the official tender in Ecuador. Once signed into law, the country will begin using the as-yet-unnamed currency as soon as October. A monetary authority will be established to regulate the money, which will be backed by 'liquid assets.'”
v3rgEz (125380) writes As part of MuckRock's Drone Census, the San Jose Police twice denied having a drone in public records requests — until the same investigation turned up not only a signed bid for a drone but also a federal grant giving them money for it. Now, almost a full year after first denying they had a drone, the department has come clean and apologized for hiding the program, promising more transparency and to pursue federal approval for the program, which the police department had, internally, claimed immunity from previously.
MojoKid (1002251) writes "China seems to be on a mission to isolate itself from the world, at least in terms of technology. After banning Windows 8 on government PCs and raiding several of Microsoft's offices in China as part of an anti-trust investigation, Chinese officials have now prohibited purchase of several Apple products for government use. The list of banned Apple products include the iPad, iPad Mini, MacBook Air, MacBook Pro, and half a dozen other items, all of which were left off of a final government procurement list distributed in July. This is a potentially big hit to Apple, which generated around 16 percent of its $37.4 billion in revenue last quarter from China. Apple saw its iPad sales jump 51 percent and Mac sales boosted 39 percent in China."
New submitter socheres (1771002) writes I keep a Slackware server hosted at various datacenters on leased hardware for personal / freelance business use. I have been doing this for the last 10 years and during this time I moved my stuff to several datacenters, some small and some big name companies. No matter the hosting company, since I choose to install my own OS and not take a pre-installed machine, I always got the hardware delivered with the previous guys' data stored on the hard drives. It was also the case with spare drives, which were not installed new if I did not ask specifically for new ones. Has this happened to you? How often?
netbuzz (955038) writes The Wikimedia Foundation this morning reports that 50 links to Wikipedia from Google have been removed under Europe's "right to be forgotten" regulations, including a page about a notorious Irish bank robber and another about an Italian criminal gang. "We only know about these removals because the involved search engine company chose to send notices to the Wikimedia Foundation. Search engines have no legal obligation to send such notices. Indeed, their ability to continue to do so may be in jeopardy. Since search engines are not required to provide affected sites with notice, other search engines may have removed additional links from their results without our knowledge. This lack of transparent policies and procedures is only one of the many flaws in the European decision." Wikimedia now has a page listing all notifications that search listing were removed. itwbennett also wrote in with Wikimedia news this morning: the Wikimedia foundation published its first ever transparency report, detailing requests to remove or alter content (zero granted, ever) and content removed for copyright violations.
I Ate A Candle (3762149) writes Aaron's Law, named after the late internet activist Aaron Swartz, was supposed to fix U.S. hacking laws, which many deem dated and overly harsh. But the bill looks certain to wither in Congress, thanks to corporate lobbying, disagreements in Washington between key lawmakers and a simple lack of interest amongst the general population for changes to the Computer Fraud and Abuse Act. Representative Zoe Lofgren blamed inactivity from the House Judiciary Committee headed up by Representative Bob Goodlatte, which has chosen not to discuss or vote on Aaron's Law. There is still an appetite for CFAA reform, thanks to complaints from the security community that their research efforts have been deemed illegal acts, perversely making the internet a less secure place. But with the likes of Oracle trying to stop it and with Congress unwilling to act, change looks some way away.
New submitter Rigodi (1000552) writes "The New York Times reported on August 5th that a massive collection of stolen email passwords and website accounts have been accumulated by an alleged Russian "crime ring". Over 1.2 billion accounts were compromised ... the attack scheme is essentially the old and well known SQL injection tactic using a botnet. The Information has been made public to coincide with the Blackhat conference to cause a debate about the classic security account and password system weaknesses, urging the industry to find new ways to perform authentication. What do Black Hat security conference participants have to say about that in Vegas?
Advocatus Diaboli (1627651) writes with the chilling, but not really surprising, news that the U.S. government is aware that many names in its terrorist suspect database are not linked to terrorism in any way. From the article: Nearly half of the people on the U.S. government's widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept. Of the 680,000 people caught up in the government's Terrorist Screening Database — a watchlist of "known or suspected terrorists" that is shared with local law enforcement agencies, private contractors, and foreign governments — more than 40 percent are described by the government as having "no recognized terrorist group affiliation." That category — 280,000 people — dwarfs the number of watchlisted people suspected of ties to al Qaeda, Hamas, and Hezbollah combined.
An anonymous reader writes with the news that Hackaday published an article on the poor security of the add-on modules that Tektronix sells as expensive add-ons to unlock features in certain of its oscilloscopes. The reader writes: "It has come to attention of Tek's legal eagles and they now want the article to be taken down. Perhaps they can ask Google to forget that page?"
An anonymous reader writes About a week ago, the Federal Communications Commission (FCC) asked for Verizon's justification on its policy of throttling users who pay for unlimited data usage. "I know of no past Commission statement that would treat 'as reasonable network management' a decision to slow traffic to a user who has paid, after all, for 'unlimited' service," the FCC wrote. In its response, Verizon has indicated that its throttling policy is meant to provide users with an incentive to limit their data usage. The company explained that "a small percentage of the customers on these [unlimited] plans use disproportionately large amounts of data, and, unlike subscribers on usage-based plans, they have no incentive not to do so during times of unusually high demand....our practice is a measured and fair step to ensure that this small group of customers do not disadvantage all others."
bobbied (2522392) writes Apparently Edward Snowden is not alone. CNN is reporting that recent leaked documents published by The Intercept (a website that has been publishing Snowden's leaked documents) could not have been leaked by Snowden because they didn't exist prior to his fleeing the USA and he couldn't possibly have accessed them. Authorities are said to be looking for a new leaker.
The EFF is only today able to release details of an attempt by the government to alter the historical record in the case brought by the EFF against the NSA in Jewel v. NSA. "On June 6, the court held a long hearing in Jewel in a crowded, open courtroom, widely covered by the press. We were even on the local TV news on two stations. At the end, the Judge ordered both sides to request a transcript since he ordered us to do additional briefing. But when it was over, the government secretly, and surprisingly sought permission to "remove" classified information from the transcript, and even indicated that it wanted to do so secretly, so the public could never even know that they had done so." As you'd expect of the EFF, they fought back with vigorous objections, and in the end the government did not get its way, instead deciding that it hadn't given away any classified information after all. "The transcript of a court proceeding is the historical record of that event, what will exist and inform the public long after the persons involved are gone. The government's attempt to change this history was unprecedented. We could find no example of where a court had granted such a remedy or even where such a request had been made. This was another example of the government's attempt to shroud in secrecy both its own actions, as well as the challenges to those actions. We are pleased that the record of this attempt is now public. But should the situation recur, we will fight it as hard as we did this time."
Advocatus Diaboli (1627651) writes For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement's knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system. The approach has borne fruit—over a dozen alleged users of Tor-based child porn sites are now headed for trial as a result. But it's also engendering controversy, with charges that the Justice Department has glossed over the bulk-hacking technique when describing it to judges, while concealing its use from defendants.
jfruh (300774) writes The fallout from HP's Autonomy acquisition keeps getting more dramatic. Autonomy's ex-CFO is trying to block the settlement of lawsuits that arsoe the botched deal, claiming that HP is trying to hide its "own destruction of Autonomy's success after the acquisition." HP hit back, saying the ex-CFO "was one of the chief architects of the massive fraud on HP that precipitated this litigation."
mask.of.sanity (1228908) writes "A string of documents detailing the operations and effectiveness of the FinFisher suite of surveillance platforms appears to have been leaked. The documents, some dated 4 April this year, detail the anti-virus detection rates of the FinFisher spyware which German based Gamma Group sold to governments and law enforcement agencies. The dump also reveals Windows 8 users should opt for the Metro version of Skype rather than the desktop client because it cannot be tapped by FinFisher."
Despite a failed attempt to have charges dismissed, the alleged Silk Road operator Ross Ulbricht's lawyer has filed a new motion to have evidence dismissed, citing recent court rulings in an argument that the Silk Road related searches were overly broad. From the article:
Dratel [Ulbricht's lawyer] argues in his 102-page motion filed last Friday that "the government conducted a series of 14 searches and seizures of various physical devices containing electronically stored information ('ESI'), and of ESI itself from Internet providers and other sources. Some of the ESI was obtained via search warrant, but other ESI was obtained via court order, and still other ESI was obtained without benefit of any warrant at all." ...
The defense lawyer argues that even the searches for which the government had a warrant were overbroad and based on evidence that may have been obtained illegally. The attorney writes: " As set forth ante, all of the searches and seizures conducted pursuant to warrants and/or orders were based on the initial ability of the government to locate the Silk Road Servers, obtain the ESI on them, and perform extensive forensic analysis of that ESI. Thus, all subsequent searches and seizures are invalid if that initial locating the Silk Road Servers, obtaining their ESI, and gaining real-time continued access to those servers, was accomplished unlawfully."
Nerval's Lobster writes The "Compubody Sock," which anyone with knitting skills can make at home, is a giant sock-hoodie-bag in which you place your laptop or tablet, along with your head and hands, giving you total privacy while freaking out anyone who happens to be sitting next to you. Designer Becky Stern told Forbes' Kashmir Hill that the Sock was meant more as commentary on privacy and device addiction; even so, considering how NSA employees reportedly drape themselves in hoods in order to thwart hidden cameras while typing in passwords, it's not outside the realm of possibility that an ultra-paranoid someone could find a practical use for a body sock. But that paranoid android better have expert knitting skills: putting together the Sock necessitates a whole lot of steps ("Purl 5, purl 2 together, purl 1, turn the work," etc.). Your other option, of course, is to simply avoid working on sensitive stuff in public.
rsmiller510 writes Spain's new tax on linking to Spanish newspaper articles is ill defined and short sighted and ends up protecting a dying industry, while undermining a vibrant one. In another case of disrupted industries turning to lawmakers to solve their problems, this one makes no sense at all, especially given the state of the Spanish economy and the fact that it comes 15 years too late to even matter. From the article: "While newspapers are at least partly correct to blame the Internet for their troubles, they should recognize that their own mismanagement also played a key role. Newspapers everywhere waited much too long to take the Internet seriously, and while virtually every surviving newspaper has a website now, they almost invariably treat those sites as a necessary evil, as something separate from the news collection and delivery that they do with print."
schwit1 writes Vitaly Lopota, the president of Russia's largest space company Energia, was suspended Friday by the company's board of directors. From the article: "The move appears to be part of an effort by Russia's government to obtain majority control over Energia, of which it owns a 38-percent share. The directors elected Igor Komarov as its new chairman of the board. Komarov is chief of the Russian United Rocket and Space Corporation (URSC), the government-owned company tasked with consolidating Russia's sprawling space sector." The government is also conducting a criminal investigation of Lopota, which might be justified but appears to be a power play designed to both eliminate him from the game as well as make sure everyone else tows the line so that URSC can take complete control.
mrspoonsi writes with this story about a tip sent to police by Google after scanning a users email. A Houston man has been arrested after Google sent a tip to the National Center for Missing and Exploited Children saying the man had explicit images of a child in his email, according to Houston police. The man was a registered sex offender, convicted of sexually assaulting a child in 1994, reports Tim Wetzel at KHOU Channel 11 News in Houston. "He was keeping it inside of his email. I can't see that information, I can't see that photo, but Google can," Detective David Nettles of the Houston Metro Internet Crimes Against Children Taskforce told Channel 11. After Google reportedly tipped off the National Center for Missing and Exploited Children, the Center alerted police, which used the information to get a warrant.
An anonymous reader writes A week after Judge Denise Cote put forward concerns over a proposed settlement with consumers over e-book price-fixing in the iBookstore, she has given Apple preliminary approval for its $450 million settlement. "The proposed settlement agreement is within the range of those that may be approved as fair and reasonable, such that notice to the class is appropriate," Cote said. "Preliminary approval is granted." Cote set a final fairness hearing for Nov. 21.
wiredmikey writes Mozilla warned on Friday that it had mistakenly exposed information on almost 80,000 members of its Mozilla Developer Network (MDN) as a result of a botched data sanitization process. The discovery was made around June 22 by one of Mozilla's Web developers, Stormy Peters, Director of Developer Relations at Mozilla, said in a security advisory posted to the Mozilla Security Blog on Friday. "Starting on about June 23, for a period of 30 days, a data sanitization process of the Mozilla Developer Network (MDN) site database had been failing, resulting in the accidental disclosure of MDN email addresses of about 76,000 users and encrypted passwords of about 4,000 users on a publicly accessible server," Peters wrote. According to Peters, the encrypted passwords were salted hashes and they by themselves cannot currently be used to authenticate with the MDN. However, Peters warned that MDN users may be at risk if they reused their original MDN passwords on other non-Mozilla websites or authentication systems.
An anonymous reader writes with a FCC proposal that is bad news for Sprint and T-Mobile. A proposal from FCC Chairman Tom Wheeler would block an attempt by Sprint and T-Mobile US to buy spectrum together in the incentive auction that will transfer airwaves from broadcast TV stations to cellular carriers next year. Announced on Friday, Wheeler's proposal seeks to help the smallest wireless companies develop business partnerships with larger ones. But it would not allow partnerships between the biggest carriers, since more than 95 percent of US customers are served by either AT&T, Sprint, T-Mobile, or Verizon Wireless. "Our goal is to promote the participation of as many parties as possible in the auction," FCC Wireless Telecommunications Bureau Chief Roger Sherman wrote Friday. "If two of the largest companies are able to bid as one combined entity in the auction, their combined resources may have the effect of suppressing meaningful competition. Therefore, the item tentatively concludes that joint bidding arrangements between nationwide providers should not be allowed."
mdsolar writes with news about the closing of the San Onofre nuclear plant. Dismantling the San Onofre nuclear power plant in Southern California will take two decades and cost $4.4 billion. Southern California Edison on Friday released a road map that calls for decommissioning the twin-reactor plant and restoring the property over two decades, beginning in 2016. U-T San Diego says it could be the most expensive decommissioning in the 70-year history of the nuclear power industry. But Edison CEO Ted Craver says there's already enough money to pay for it. Edison shut down the plant in 2012 after extensive damage was found to tubes carrying radioactive water. It was closed for good last year.
An anonymous reader writes: We often worry about technology and unscrupulous intelligence agencies driving us toward a surveillance state. But apparently Singapore already beat us to the punch. "Not only does the government keep a close eye on what its citizens write and say publicly, but it also has the legal authority to monitor all manner of electronic communications, including phone calls, under several domestic security laws aimed at preventing terrorism, prosecuting drug dealing, and blocking the printing of 'undesirable' material." They've used it to do good, like swiftly moving to contain the spread of infectious diseases and to figure out how the public wants policy problems solved. But they've also obliterated privacy and restricted what people can say and do. "Singaporeans speak, often reverently, of the "social contract" between the people and their government. They have consciously chosen to surrender certain civil liberties and individual freedoms in exchange for fundamental guarantees: security, education, affordable housing, health care." The article notes, "It's hard to know whether the low crime rates and adherence to the rule of law are more a result of pervasive surveillance or Singaporeans' unspoken agreement that they mustn't turn on one another, lest the tiny island come apart at the seams."
hypnosec writes Lionsgate, the film company in charge of distribution for Expendables 3, has filed a lawsuit against unknown individuals who shared a DVD-level copy of the movie and six file-sharing sites known to have the links through which copies of the movies are being downloaded illegally. An advance copy of Expendables 3 was leaked online in July, and it was downloaded as many as 180,000 times in just 24 hours. The movie, which is releasing on August 15, is said to have crossed two million downloads already. In addition to the lawsuit, the Dept. of Homeland Security is on the case.
An anonymous reader writes: In response to an inquiry from European data protection regulators, Google has detailed how they evaluate and act on requests to de-index search results. Google's procedures for responding to "right-to-be-forgotten" requests are explained in a lengthy document that was made publicly available. "Google of course claims its own economic interest does not come into play when making these rtbf judgements — beyond an 'abstract consideration' of a search engine needing to help people find the most relevant information for their query. ... Google also goes into lengthy detail to justify its decision to inform publishers when it has removed links to content on their sites — a decision which has resulted in media outlets writing new articles about delisted content, thereby resulting in the rtbf ruling causing the opposite effect to that intended (i.e. fresh publicity, not fair obscurity)."
theodp writes: Over at Code.org, they're celebrating because more than 100 members of Congress are now co-sponsoring the Computer Science Education Act (HR 2536), making the bill designed to"strengthen elementary and secondary computer science education" the most broadly cosponsored education bill in the House. By adding fewer than 50 words to the Elementary and Secondary Education Act of 1965, HR 2536 would elevate Computer Science to a "core academic subject" (current core academic subjects are English, reading or language arts, mathematics, science, foreign languages, civics and government, economics, arts, history, and geography), a status that opens the doors not only to a number of funding opportunities, but also to a number of government regulations. So, now that we know it takes 112 U.S. Representatives to make a CS education bill, the next question is, "How many taxpayer dollars will it take to pay for the consequences?" While Code.org says "the bill is cost-neutral and doesn't introduce new programs or mandates," the organization in April pegged the cost of putting CS in every school at $300-$400 million. In Congressional testimony last January, Code.org proposed that "comprehensive immigration reform efforts that tie H-1B visa fees to a new STEM education fund" could be used "to support the teaching and learning of more computer science in K-12 schools," echoing Microsoft's National Talent Strategy.
On Friday President Obama signed into a law a bill allowing mobile devices to be legally unlocked, so that consumers can switch between carriers. The legislation was kicked off by a successful petition on Whitehouse.gov after the Librarian of Congress decided that cell phones no longer needed an exemption from the Digital Millennium Copyright Act's anti-hacking provision. The legislation (PDF) passed both houses of Congress and is now law. Unfortunately, the new bill doesn't guarantee permanent legality. It simply reinstates the exemption, and leaves the DMCA alone. For the next year, cell phone unlocking will certainly be legal, but after that, the Librarian of Congress once again has the ability to void the exemption once every three years.
jfruh writes The FTC has moved aggressively recently against companies that make it too easy for people — especially kids — to rack up huge charges on purchases within apps. But at a dicussion panel sponsored by free-market think tank TechFreedom, critics pushed back. Joshua Wright, an FTC commissioner who dissented in a recent settlement with Apple, says a 15-minute open purchase window produced "obvious and intuitive consumer benefits" and that the FTC "simply substituted its own judgment for a private firm's decision as to how to design a product to satisfy as many users as possible."
An anonymous reader writes On Friday, Russia implemented a new law that significantly limits its citizens' online free speech. Under this new law, social media sites must "retain user data for at least six months...within the country's boundaries so it can be available for government inspection." Also, "bloggers with at least 3,000 daily readers must register with Roskomnadzor, the regulator that also oversees Russia's main media outlets." This, of course, means that popular bloggers will no longer be able to remain anonymous.
DroidJason1 writes: Microsoft has filed a contract dispute lawsuit against Samsung over what Microsoft claims is a breach of contract by Samsung involving Android patent royalties. Back in 2011, Samsung voluntarily entered into a legally binding contract with Microsoft in a cross-licensing IP agreement involving Android patents. Samsung has grown over the past few years and now believes that Microsoft's recent acquisition of Nokia nulls the agreement. Microsoft has gone to court and is asking to settle the disagreement with Samsung in order to continue the original agreement.
RobinH writes: Our small-ish municipality (between 10,000 to 15,000 in population) has recently decided to switch to online voting. I should note that they were previously doing voting-by-mail. I have significant reservations about online voting, particularly the possibility of vote-selling and the general lack of voter secrecy, not to mention the possible lack of computer security. However, it's only a municipal election, and apparently a lot of municipalities around here are already doing online voting. I'm not sure if the rank-and-file citizens care, or if they would listen to my concerns. Should I bother speaking up, or should I ignore it since municipal elections are not that important anyway?
jfruh (300774) writes Investigators in a criminal case want to see some emails stored on Microsoft's servers in Ireland. Microsoft has resisted, on the grounds that U.S. law enforcement doesn't have jurisdiction there, but a New York judge ruled against them, responding to prosecutors' worries that web service providers could just move information around the world to avoid investigation. The case will be appealed.
Nicola Hahn (1482985) writes Despite the long line of covert operations that Ed Snowden's documents have exposed, public outcry hasn't come anywhere near the level of social unrest that characterized the 1960s. Journalists like Conor Friedersdorf have suggested that one explanation for this is that the public is "informed by a press that treats officials who get caught lying and misleading (e.g., James Clapper and Keith Alexander) as if they're credible."
Certainly there are a number of well-known popular venues which offer a stage for spies to broadcast their messages from while simultaneously claiming to "cultivate conversations among all members of the security community, both public and private." This year, for instance, Black Hat USA will host Dan Greer (the CISO of In-Q-Tel) as a keynote speaker.
But after all of the lies and subterfuge is it even constructive to give voice to the talking points of intelligence officials? Or are they just muddying the water? As one observer put it, "high-profile members of the intelligence community like Cofer Black, Shawn Henry, Keith Alexander, and Dan Greer are positioned front and center in keynote slots, as if they were glamorous Hollywood celebrities. While those who value their civil liberties might opine that they should more aptly be treated like pariahs."
An anonymous reader writes with a bit of pith from TechDirt: Every so often, people who don't really understand the importance of anonymity or how it enables free speech (especially among marginalized people), think they have a brilliant idea: "just end real anonymity online." They don't seem to understand just how shortsighted such an idea is. It's one that stems from the privilege of being in power. And who knows that particular privilege better than members of the House of Lords in the UK — a group that is more or less defined by excess privilege? The Communications Committee of the House of Lords has now issued a report concerning "social media and criminal offenses" in which they basically recommend scrapping anonymity online.
Bruce66423 (1678196) writes with this story from the Guardian: The director of the Central Intelligence Agency, John Brennan, issued an extraordinary apology to leaders of the US Senate intelligence committee on Thursday, conceding that the agency employees spied on committee staff and reversing months of furious and public denials. Brennan acknowledged that an internal investigation had found agency security personnel transgressed a firewall set up on a CIA network, called RDINet, which allowed Senate committee investigators to review agency documents for their landmark inquiry into CIA torture." (Sen. Diane Feinstein was one of those vocally accusing the CIA of spying on Congress; Sen. Bernie Sanders has raised a similar question about the NSA.)
DroidJason1 writes The Chinese government is investigating Microsoft for possible breaches of anti-monopoly laws, following a series of surprise visits to Redmond's offices in cities across China on Monday. These surprise visits were part of China's ongoing investigation [warning: WSJ paywall], and were based on security complaints about Microsoft's Windows operating system and Office productivity suite. Results from an earlier inspection apparently were not enough to clear Microsoft of suspicion of anti-competitive behavior. Microsoft's alleged anti-monopoly behavior is a criminal matter, so if found guilty, the software giant could face steep fines as well as other sanctions.
Daniel_Stuckey writes Now the NSA has yet another dilemma on its hands: Investigative journalist Jason Leopold is suing the agency for denying him the release of financial disclosure statements attributable to its former director. According to a report by Bloomberg, prospective clients of Alexander's, namely large banks, will be billed $1 million a month for his cyber-consulting services. Recode.net quipped that for an extra million, Alexander would show them the back door (state-installed spyware mechanisms) that the NSA put in consumer routers.
An anonymous reader writes: Last week, we discussed news that a presentation had been canceled for the upcoming Black Hat security conference that involved the Tor Project. The researchers involved hadn't made much of an effort to disclose the vulnerability, and the Tor Project was scrambling to implement a fix. Now, the project says it's likely these researchers were actively attacking Tor users and trying to deanonymize them. "On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic confirmation attacks. ...We know the attack looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic (e.g. what pages were loaded or even whether users visited the hidden service they looked up). The attack probably also tried to learn who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service." They also provide a technical description of the attack, and the steps they're taking to block such attacks in the future.
Lucas123 writes: The Alliance of Artists and Recording Companies is suing Ford and General Motors for millions of dollars over alleged copyrights infringement violations because their vehicles' CD players can rip music to infotainment center hard drives. The AARC claims in its filing (PDF) that the CD player's ability to copy music violates the Audio Home Recording Act of 1992. The Act protects against distributing digital audio recording devices whose primary purpose is to rip copyrighted material. For example, Ford's owner's manual explains, "Your mobile media navigation system has a Jukebox which allows you to save desired tracks or CDs to the hard drive for later access. The hard drive can store up to 10GB (164 hours; approximately 2,472 tracks) of music." The AARC wants $2,500 for each digital audio recording device installed in a vehicle, the amount it says should have been paid in royalties.
An anonymous reader writes: Every time a city- or state-wide disaster strikes, services to help the victims slowly crop up over the following days and weeks. Sometimes they work well, sometimes they don't. Today, city officials in San Francisco and Portland announced a partnership with peer-to-peer lodging service Airbnb to work out some disaster-preparedness plans ahead of time. Airbnb will locate hosts in these cities who will commit to providing a place to stay for people who are displaced in a disaster, and then set up alerts and notifications to help people find these hosts during a crisis. The idea is that if wildfires or an earthquake forces thousands of people to evacuate their homes, they can easily be absorbed into an organized, distributed group of willing hosts, rather than being shunted to one area and forced to live in a school gymnasium or something similar.