×
Privacy

WikiLeaks Publishes Secret International Trade Agreement 222

schwit1 (797399) writes "The text of a 19-page, international trade agreement being drafted in secret was published by WikiLeaks as the transparency group's editor commemorated his two-year anniversary confined to the Ecuadorian Embassy in London. Fifty countries around the globe have already signed on to the Trade in Service Agreement, or TISA, including the United States, Australia and the European Union. Despite vast international ties, however, details about the deal have been negotiated behind closed-doors and largely ignored by the press. In a statement published by the group alongside the leaked draft this week, WikiLeaks said "proponents of TISA aim to further deregulate global financial services markets," and have participated in "a significant anti-transparency maneuver" by working secretly on a deal that covers more than 68 percent of world trade in services, according to the Swiss National Center for Competence in Research.
Open Source

EFF To Unveil Open Wireless Router For Open Wireless Movement 184

hypnosec writes A new movement dubbed the Open Wireless Movement is asking users to open up their private Wi-Fi networks to total strangers – a random act of kindness – with an aim of better securing networks and facilitating better use of finite broadband resources. The movement is supported by non-profit and pro-internet rights organizations like the Electronic Frontier Foundation (EFF), Mozilla, Open Rights Group, and Free Press among others. The EFF is planning to unveil one such innovation – Open Wireless Router – at the Hackers on Planet Earth (HOPE X) conference to be held next month on New York. This firmware will allow individuals to share their private Wi-Fi to total strangers to anyone without a password.
Red Hat Software

Red Hat Assistant General Counsel Analyses Supreme Court's Patent Ruling 43

ectoman (594315) writes The U.S. Supreme Court issued a groundbreaking decision concerning software patents, claiming that abstract ideas are not by themselves patentable. The ruling was a cause for celebration among those opposed to software patent abuse, like Red Hat's Vice President and Assistant General Counsel, Rob Tiller. Here, Tiller analyzes and offers some context for the Court's ruling, which "uses the traditional common law methodology of comparing one case to previous similar cases and harmonizing with those most similar."
Government

Emails Show Feds Asking Florida Cops To Deceive Judges About Surveillance Tech 251

Advocatus Diaboli sends this excerpt from Wired: Police in Florida have, at the request of the U.S. Marshals Service, been deliberately deceiving judges and defendants about their use of a controversial surveillance tool to track suspects, according to newly obtained emails (PDF). At the request of the Marshals Service, the officers using so-called stingrays have been routinely telling judges, in applications for warrants, that they obtained knowledge of a suspect's location from a 'confidential source' rather than disclosing that the information was gleaned using a stingray.
Bitcoin

US Marshals Accidentally Reveal Potential Bidders For Gov't-Seized Bitcoin 101

jfruh (300774) writes "When the U.S. government shut down the Silk Road marketplace, they seized its assets, including roughly $18 million in bitcoin, and despite the government's ambivalence about the cryptocurrency, they plan to auction the bitcoin off to the highest bidder, as they do with most criminal assets. Ironically, considering many bitcoin users' intense desire for privacy, the U.S. Marshall service accidentally revealed the complete list of potential bidders by sending a message to everyone on the list and putting their addresses in the CC field instead of the BCC field."
Crime

Make a Date With Fraud 61

Rambo Tribble (1273454) writes "Netcraft is reporting that criminals are mounting massive phishing attacks through online dating sites. The scams are numerous and target multiple sites. Actual methods range from blackmail to 419-style scams. Characteristically, fraudsters hijack an existing account on one of the services, then use that as a portal to deliver a PHP script to compromise the site. 'The latest attacks make use of a phishing kit which contains hundreds of PHP scripts, configured to send stolen credentials to more than 300 distinct email addresses.' The BBC offers additional insights ."
Crime

Chicago Adding Sensors For Public Monitoring 107

An anonymous reader writes "A research project dubbed the 'Array of Things' will add sensors for public monitoring throughout Chicago. The project is being started by a collaborative effort between the University of Chicago and Argonne National Laboratories. The goal of the project is to build a permanent data collection infrastructure to monitor things that might help government officials, researchers and companies better understand the city environment. Sensors will examine various attributes such as air quality, wind, light, sound heat, precipitation, and of course cell phone data. Eventually the researchers would like to see the sensors exist as a public utility throughout the entire city to help public, private and academic partners learn about the city. Researchers say there is nothing to fear about privacy because the sensors will only count people by observing cellphone traffic. With such assurances from researchers working in a shining example of transparency and democratic freedom like Chicago, what could possible go wrong?"
Software

The Supreme Court Doesn't Understand Software 263

An anonymous reader writes We had some good news yesterday when the U.S. Supreme Court invalidated a software patent for failing to turn an idea into an invention. Unfortunately, the justices weren't willing to make any broader statements about the patentability of basic software tools, so the patent fights will continue. Timothy B. Lee at Vox argues that this is because the Supreme Court does not understand software, and says we won't see significant reform until they do.

He says, "If a sequence of conventional mathematical operations isn't patentable, then no software should enjoy patent protection. For example, the 'data compression' patents that Justice Kennedy wants to preserve simply claim formulas for converting information from one digital format to another. If that's not a mathematical algorithm, nothing is. This is the fundamental confusion at the heart of America's software patent jurisprudence: many judges seem to believe that mathematical algorithms shouldn't be patented but that certain kinds of software should be patentable. ... If a patent claims a mathematical formula simple enough for a judge to understand how it works, she is likely to recognize that the patent claims a mathematical formula and invalidate it. But if the formula is too complex for her to understand, then she concludes that it's something more than a mathematical algorithm and uphold it."
Google

Judge: $324M Settlement In Silicon Valley Tech Worker Case Not Enough 150

itwbennett writes: "A proposed $324.5 million settlement of claims that Silicon Valley companies (Adobe, Apple, Google, and Intel) suppressed worker wages by agreeing not to hire each others' employees may not be high enough, a judge signaled on Thursday. Judge Lucy Koh didn't say whether she would approve the settlement, but she did say in court that she was worried about whether that amount was fair to the roughly 64,000 technology workers represented in the case. Throughout Thursday's hearing, she questioned not just the amount but the logic behind the settlement as presented by lawyers for both the plaintiffs and the defendants."
Government

US House of Representatives Votes To Cut Funding To NSA 164

An anonymous reader writes: The U.S. House of Representatives voted late Thursday night, 293 to 123, to approve an amendment to the NSA's appropriations bill that cuts all funding for warrantless surveillance and for programs that force companies to create backdoors in their products. The success of this vote in the House is attributed to the fact that the amendment did not have to go through the House Judiciary and Intelligence Committees and also to the increasingly apparent unpopularity of NSA activities among voters. Although privacy advocates laud the vote, there are those who note that the amendment specifically applies to the NSA and CIA while remaining silent on other agencies such as the FBI. The appropriations bill in its entirety will now proceed to the Senate for approval."
United States

German Intel Agency Helped NSA Tap Fiber Optic Cables In Germany 103

An anonymous reader writes Der Spiegel has written a piece on the extent of collaboration between Germany's intelligence agency, Bundesnachrichtendienst (BND), and the U.S.'s National Security Agency (NSA). The sources cited in the piece do reveal BND's enthusiastic collusion in enabling the NSA to tap fiber optic cables in Germany, but they seem inconclusive as to how much information from the NSA's collection activity in the country is actually shared between the NSA and BND. Of note is evidence that the NSA's collection methods do not automatically exclude German companies and organizations from their data sweep; intelligence personnel have to rectro-actively do so on an individual basis when they realize that they are surveilling German targets. Germany's constitution protects against un-warranted surveillance of correspondence, either by post or telecommunications, of German citizens in Germany or abroad and foreigners on German soil.
Businesses

Mt. Gox CEO Returns To Twitter, Enrages Burned Investors 281

An anonymous reader writes Mark Karpeles doesn't seem to understand how much anger and trouble the $400 million Mt. Gox fiasco caused his customers. According to Wired: "After a long absence, the Mt Gox CEO has returned to Twitter with a bizarre string of tone-deaf tweets that were either written by a Turing test chat bot, or by a man completely oblivious to the economic chaos he has wrought. His first message after losing hundreds of millions of dollars worth of bitcoins? 'What would we do without busybox?'—a reference to a slimmed-down Linux operating system used on devices such as routers. He's also Tweeted about a noodle dish called yakisoba and Japanese transportation systems." Andreas Antonopoulos, the CSO with Blockchain says, "He continues to be oblivious about his own failure and the pain he has caused others. He is confirming that he is a self-absorbed narcissist with an inflated sense of self-confidence who has no remorse."
United States

Chinese Vendor Could Pay $34.9M FCC Fine In Signal-Jammer Sting 188

alphadogg writes A Chinese electronics vendor accused of selling signal jammers to U.S. consumers could end up leading the market in one dubious measure: the largest fine ever imposed by the Federal Communications Commission. The agency wants to fine CTS Technology $34,912,500 for allegedly marketing 285 models of jammers over more than two years. CTS boldly—and falsely—claimed that some of its jammers were approved by the FCC, according to the agency's enforcement action released Thursday. Conveniently, CTS' product detail pages also include a button to "report suspicious activity." The proposed fine, which would be bigger than any the FCC has levied for anti-competitive behavior, or a wardrobe malfunction, comes from adding up the maximum fines for each model of jammer the company allegedly sold in the U.S. The agency also ordered CTS, based in Shenzhen, China, to stop marketing illegal jammers to U.S. consumers and identify the buyer of each jammer it sold in the U.S.
Communications

How Secret Partners Expand NSA's Surveillance Dragnet 63

Advocatus Diaboli (1627651) writes It has already been widely reported that the NSA works closely with eavesdropping agencies in the United Kingdom, Canada, New Zealand, and Australia as part of the so-called Five Eyes surveillance alliance. But the latest Snowden documents show that a number of other countries, described by the NSA as "third-party partners," are playing an increasingly important role – by secretly allowing the NSA to install surveillance equipment on their fiber-optic cables. The NSA documents state that under RAMPART-A, foreign partners "provide access to cables and host U.S. equipment." This allows the agency to covertly tap into "congestion points around the world" where it says it can intercept the content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype.
The Almighty Buck

2 US Senators Propose 12-Cent Gas Tax Increase 619

An anonymous reader writes There are several proposals on the table to stave off the impending insolvency of the Highway Trust Fund (which pays for transit, biking, and walking projects too) in two months. Just now, two senators teamed up to announce one that might actually have a chance. Senators Bob Corker (R-TN) and Chris Murphy (D-CT) have proposed increasing the gas tax by 12 cents a gallon over two years. The federal gas tax currently stands at 18.4 cents a gallon, where it has been set since 1993, when gas cost $1.16 a gallon.
Encryption

Ask Slashdot: How To Bequeath Sensitive Information? 208

New submitter UrsaMajor987 (3604759) writes I recently retired after a long career in IT. I am not ready to kick the bucket quite yet, but having seen the difficulty created by people dying without a will and documenting what they have and where it is, I am busy doing just that. At the end of it all, I will have documentation on financial accounts, passwords, etc., which I will want to share with a few people who are pretty far away. I can always print a copy and have it delivered to them, but is there any way to share this sort of information electronically? There are lots of things to secure transmission of data, but once it arrives on the recipients' desktop, you run the risk of their system being compromised and exposing the data. Does anyone have any suggestions? Is paper still the most secure way to go?
The Courts

US Supreme Court Invalidates Patent For Being Software Patent 220

ciaran_o_riordan (662132) writes The US Supreme Court has just invalidated a patent for being a software patent! To no fanfare, the Court has spent the past months reviewing a case, Alice v. CLS Bank, which posed the question of "Whether claims to computer-implemented inventions ... are directed to patent-eligible subject matter." Their ruling was just published, and what we can say already is that the court was unanimous in finding this particular software patent invalid, saying: "the method claims, which merely require generic computer implementation, fail to transform that abstract idea into a patent-eligible invention," and go on to conclude that because "petitioner's system and media claims add nothing of substance to the underlying abstract idea, we hold that they too are patent ineligible." The End Software Patents wiki has a page for commenting the key extracts and listing third-party analyses. Analysis will appear there as the day(s) goes on. Careful reading is needed to get an idea of what is clearly invalidated (file formats?), and what areas are left for future rulings. If you can help, well, it's a wiki. Software Freedom Law Center's website will also be worth checking in the near future.
Cellphones

Google and Microsoft Plan Kill Switches On Smartphones 137

itwbennett (1594911) writes "Responding to more than a year of pressure, Google and Microsoft will follow Apple in adding an anti-theft "kill switch" to their smartphone operating systems. In New York, iPhone theft was down 19 percent in the first five months of this year. Over the same period, thefts of Samsung devices — which did not include a kill switch until one was introduced on Verizon-only models in April — rose by over 40 percent. In San Francisco, robberies of iPhones were 38 percent lower in the six months after the iOS 7 introduction versus the six months before, while in London thefts over the same period were down by 24 percent. In both cities, robberies of Samsung devices increased. 'These statistics validate what we always knew to be true, that a technological solution has the potential to end the victimization of wireless consumers everywhere,' said San Francisco District Attorney George Gascon."
Encryption

TrueCrypt Author Claims That Forking Is Impossible 250

An anonymous reader writes On a request from Matthew Green to fork the TrueCrypt code, the author answers that this is impossible. He says that this might be no good idea, because the code needs a rewrite, but he allows to use the existing code as a reference. "I am sorry, but I think what you're asking for here is impossible. I don't feel that forking TrueCrypt would be a good idea, a complete rewrite was something we wanted to do for a while. I believe that starting from scratch wouldn't require much more work than actually learning and understanding all of truecrypts current codebase. I have no problem with the source code being used as reference."
Government

IRS Recycled Lerner Hard Drive 682

phrackthat (2602661) writes The Senate Finance Committee has been informed that the IRS recycled the hard drive of Lois Lerner, which will deprive investigators of the ability to forensically retrieve emails which were supposedly deleted or lost in a "crash." This news comes after the IRS revealed that it had lost the emails of Lois Lerner and six other employees who were being investigated regarding the targeting of conservative groups and donors.

Slashdot Top Deals