An anonymous reader writes "TorrentFreak reports on an internet piracy case from Finland, which saw four men found guilty and fined €45,000. During the trial, the defense attorney took note of inconsistencies in log files used as evidence against the men. An investigator for international recording industry organization IFPI revealed after questioning that the files had been tampered with. He said an MPAA executive was present when the evidence gathering took place, and altered the files to hide the identity of 'one of their spies.' 'No one from the MPAA informed the defense that the edits had been made and the tampering was revealed at the worst possible time – during the trial. This resulted in the prosecutor ordering a police investigation into the changes that had been made. "Police then proceeded by comparing the 'work copy' that the IFPI investigator produced with the material that police and the defending counsels had received. Police found out that the material had differences in over 10 files," Hietanen reveals.'"
Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.
Lauren Weinstein writes "Are you ready for the imagery war — the war against personal photography and capturing of video? You'd better be. 'In some cities, like New York, the surveillance-industrial complex has its fangs deeply into government for the big bucks. It's there we heard the Police Commissioner — just hours ago, really — claim that "privacy is off the table." And of course, there's the rise of wearable cameras and microphones by law enforcement, generally bringing praise from people who assume they will reduce police misconduct, but also dangerously ignoring a host of critical questions. Will officers be able to choose when the video is running? How will the video be protected from tampering? How long will it be archived? Can it be demanded by courts? ... All of this and more is the gung-ho, government surveillance side of the equation. But what about the personal photography and video side? What of individual or corporate use of these technologies in public and private spaces? Will the same politicians promoting government surveillance in all its glory take a similar stance toward nongovernmental applications? Writing already on the wall suggests not. Inklings of the battles to come are already visible, if you know where to look."
Avantare writes "The first sci-fi novel I read was A Wrinkle in Time; the next was Dune. Why don't more people read these extraordinarily imaginative books? Delegate Ray Canterbury, who represents Greenbrier County in southern WV, wants to help with that. Canterbury introduced House Bill 2983, which reads, 'To stimulate interest in math and science among students in the public schools of this state, the State Board of Education shall prescribe minimum standards by which samples of grade-appropriate science fiction literature are integrated into the curriculum of existing reading, literature or other required courses for middle school and high school students.' For decades, walking around with a paperback sci-fi novel in your back pocket at school was the quickest way to find yourself permanently excluded from the cool-kid clique. But what if it wasn't just the geeks who read Isaac Asimov and Arthur C. Clarke? What if science fiction was mandatory reading for all students?"
reifman writes "The Seattle Times reports, 'For the first time in state history, the Washington state budget is being written by Microsofties,' Representative Ross Hunter has 'tamed his Microsoft-style head-butting with a politician's trust-building.' Senator Andy Hill is 'the first Senate budget chair ever to request Excel files instead of paper spreadsheets.' 'The two must find $1 billion in new money for the state's K-12 system.' Unfortunately, The Times neglects to mention that Hunter and Microsoft are among those behind the deficit and cutbacks in the first place. Hunter helped pass the amnesty bill for Microsoft's $1.5 billion Nevada tax dodge ($4.37 billion if you include impacts from its lobbying to reduce tax rates) that contributed to $4 billion in cuts to K-12 and higher education since 2008. The state has resorted to using Yelp to tax dancing to try to make up the shortfall (for real)."
First time accepted submitter NF6X writes "Following the conviction of British conman James McCormick for selling fake bomb detectors which were in fact rebadged novelty golf ball divining rods, Nairobi police chief Benson Githinji stated to reporters that his department's fake bomb detectors are serviceable, and contributed towards a recent elimination of successful grenade attacks."
Nerval's Lobster writes "Even before the Google acquisition, Motorola Mobility was engaged in a major legal battle with Microsoft, insisting that the latter needed to pay around $4 billion per year if it wanted to keep using Motorola's patents related to the H.264 video and 802.11 WiFi standards. (The patents in question affected the Xbox and other major Microsoft products.) Had that lawsuit succeeded as Motorola Mobility originally intended, it would have made Google a boatload of cash—but on April 25, a federal judge in Seattle ruled that Microsoft's royalty payments should total around $1.8 million per year. 'Based on Motorola's original demand of more than $4 billion per year from Microsoft,' patent expert Florian Mueller wrote in an April 26 posting on his FOSS Patents blog, 'it would have taken only about three years' worth of royalties for Microsoft to pay the $12.5 billion purchase price Google paid (in fact, way overpaid) for Motorola Mobility.' This latest courtroom defeat also throws into question the true worth of Motorola Mobility's patents. After all, if the best Google can earn from those patents is a few pennies-per-unit from its rivals' products, that may undermine the whole idea of paying $12.5 billion primarily for Motorola Mobility's intellectual-property portfolio.
An anonymous reader writes "New York City Police Commissioner Ray Kelly thinks that now is a great time to install even more surveillance cameras hither and yon around the Big Apple. After the Boston Marathon bombing, the Tsarnaev brothers were famously captured on security camera footage and thereby identified. That just may soften up Americans to the idea of the all-seeing glass eye. 'I think the privacy issue has really been taken off the table,' Kelly gloats."
An anonymous reader writes with this excerpt from The Daily Dot: "A Senate committee aide, who requested to not be named, told the Daily Dot that 'there is no possible plan to bring up CISPA,' in the Senate. The aide cited the fact that the Senate tried to pass its own cybersecurity bill, the Cybersecurity Act of 2012 (CSA). While unsuccessful, it underscored a desire for legislation that took more explicit efforts to protect individuals' Internet privacy. 'There are just too many problems with it,' the aide said of CISPA. This is backed up by U.S. News and World Report, which has reported that a staffer on the Senate's Committee on Commerce, Science and Transportation explicitly claims CISPA is no longer a possibility, and senators are 'drafting separate bills' to include some CISPA provisions."
hackingbear writes "The Beijing No. 2 Intermediate People's Court ruled in favor of a group of Chinese authors, and Apple will have to pay them in excess of 730,000 yuan (US$118,000) for infringement. Apple had not gotten permission before selling their books on the Apple App Store, it noted. These cases were the second batch of lawsuits filed against Apple by the Writers' Right Protection Union, which includes prominent members like prolific blogger and novelist Han Han who have become a pop culture star through his creative and cynical writings criticizing the (Chinese) government."
angry tapir writes "The three-year blockade against donations to WikiLeaks may have just been chiseled away, in Iceland, by a ruling handed down by the European country's Supreme Court. The verdict says that the Visa subcontractor Valitor had unlawfully terminated its contract with WikiLeaks' donation processor, DataCell, and must re-open the processing of donations to the whistle-blowing site within 15 days or else face a fine of ISK800,000, or US$6,830, per day."
terrancem writes "The Seattle-based Amazon.com has applied for its brand to be a generic top-level domain name (.amazon), but South American governments argue this would prevent the use of this internet address for environmental protection, the promotion of indigenous rights and other public interest uses. Along with dozens of other disputed claims to names including ".patagonia" and ".shangrila", the issue cuts to the heart of debates about the purpose and governance of the internet."
zacharye writes "Washington State Attorney General Bob Ferguson on Thursday ordered UNcarrier T-Mobile to correct 'deceptive advertising that promised consumers no annual contracts while carrying hidden charges for early termination of phone plans.' T-Mobile, which recently did away with standard cell phone service contracts and typical smartphone subsidies, is accused of misleading consumers by advertising no-contract wireless plans despite requiring that customers sign an agreement that makes them responsible for the full cost of their handsets should they cancel service prematurely ..."
tlhIngan writes "On Tuesday, the New York appellate court denied Grooveshark the DMCA safe harbor protection on songs like Johnny B. Goode. What happened was due to an oddity in the law, the DMCA does not apply to state-licensed copyrighted works (those copyrighted before February 15, 1972). What happened was Congress overhauled copyright law to make it a Federal matter, but all works prior to that date still come under common-law and state statutes. The end result is that Grooveshark does not have DMCA safe harbor protection for older works and may be sued for copyright infringement (barring other agreements, e.g., UMG and YouTube), even though they fully comply with the DMCA otherwise, taking down copyrighted materials. Grooveshark is a "music locker" service allowing users to upload music for others to listen to."
judgecorp writes "The Deputy Prime Minister, Nick Clegg, has effectively 'killed' the Communications Data Bill which would have required service providers to share personal communications data with the police. Clegg has withdrawn the support of the Liberal Democrat Party (part of the Coalition in power in the UK) from the so-called 'Snooper's Charter.' The announcement is timed to block the measure from the Queen's Speech on 8 May, which introduces the next programme of planned legislation."
SEWilco writes in with news that U.S. House of Representatives Judiciary Committee Chairman Bob Goodlatte plans on conducting "...a comprehensive review of US copyright law over the coming months.""In a speech given in celebration of World Intellectual Property Day at the Library of Congress today, Goodlatte mentioned a few examples of the sorts of problems that he hopes to address in such a review: 'The Internet has enabled copyright owners to make available their works to consumers around the world, but has also enabled others to do so without any compensation for copyright owners. Efforts to digitize our history so that all have access to it face questions about copyright ownership by those who are hard, if not impossible, to locate. There are concerns about statutory license and damage mechanisms. Federal judges are forced to make decisions using laws that are difficult to apply today. Even the Copyright Office itself faces challenges in meeting the growing needs of its customers - the American public.'"
whoever57 writes "Prime Minister David Cameron is proposing that porn should not be available through WiFi hotspots in public areas. Exactly how this will be implemented has not been identified, even to the extent of whether the ISP or the hotspot operator should implement the blocking. From the article: ' The Prime Minister said: “We are promoting good, clean, WiFi in local cafes and elsewhere to make sure that people have confidence in public WiFi systems so that they are not going to see things they shouldn’t.” His intervention comes after a long-running campaign from children’s charities to ensure a blanket ban on unacceptable sites on public WiFi networks.'"
savuporo writes "A DC Area Drone User Group has posted an open letter in response to recent comments by Eric Schmidt about banning drones from private use. The closing section reads: 'Personally owned flying robots today have the power to change the balance of power between individuals and large bureaucracies in much the same way the Internet did in the past. And just as the military researchers who developed GPS for guiding munitions could never have imagined their technology would be used in the future to help people conduct health surveys in the world's poorest countries or help people find dates in the world's richest, there is a whole world of socially positive and banal applications for drones that are yet to be discovered. We should embrace this chance that technology provides instead of strangling these opportunities in their infancy. Our hope is that you and the rest of Google's leadership will embrace this pro-technology agenda in the future rather than seeking to stifle it. We would welcome the opportunity to speak further with you about this topic.'"
itwbennett writes "Aereo's court battles are far from over, to be sure, but the ruling earlier this month that the TV streaming service doesn't violate copyright laws must have the folks at music streaming service Pandora shaking their heads, wondering why they're still paying royalties that currently consume more than half their revenues. The implications of Aereo's business model are far-reaching and may ultimately 'be resolved by Congress, just as it did when cable first came on the scene, by passing legislation to redefine a public performance,' writes broadcast industry attorney David Oxenford."
wiredmikey writes "Israeli security officials at Ben Gurion airport are legally allowed to demand access to tourists' email accounts and deny them entry if they refuse, the country's top legal official said on Wednesday. Details of the policy were laid out by Attorney General Yehuda Weinstein in a written response to the Association for Civil Rights in Israel (ACRI), the group said in a statement. 'In a response dated April 24, 2013, the attorney general's office confirmed this practice,' ACRI said, quoting sections of the document which said it was only done in exceptional cases where 'relevant suspicious signs' were evident and only done with the tourist's 'consent'. 'Allowing security agents to take such invasive measures at their own discretion and on the basis of such flimsy "consent" is not befitting of a democracy,' commented Lila Margalit from ACRI."
An anonymous reader writes "In its continuing march toward locking up deals with every major Android and Chrome device maker, Microsoft announced on Tuesday a patent-licensing agreement with Chinese manufacturer ZTE. This follows a similar deal last week with the parent company of Foxconn. Microsoft's Deputy General Counsel Horacio Gutierrez said, 'Much of the current litigation in the so called 'smartphone patent wars' could be avoided if companies were willing to recognize the value of others’ creations in a way that is fair. At Microsoft, experience has taught us that respect for intellectual property rights is a two-way street, and we have always been prepared to respect the rights of others just as we seek respect for our rights. This is why we have paid others more than $4 billion over the last decade to secure intellectual property rights for the products we provide our customers.'"
kxra writes "The Free Culture Foundation has posted a thorough response to the most common and misinformed defenses of the W3C's Extended Media Extensions (EME) proposal to inject DRM into HTML5. They join the EFF and FSF in a call to send a strong message to the W3C that DRM in HTML5 undermines the W3C's self-stated mission to make the benefits of the Web 'available to all people, whatever their hardware, software, network infrastructure, native language, culture, geographical location, or physical or mental ability.' The FCF counters the three most common myths by unpacking some quotes which explain that 1.) DRM is not about protecting copyright. That is a straw man. DRM is about limiting the functionality of devices and selling features back in the form of services. 2.) DRM in HTML5 doesn't obsolete proprietary, platform-specific browser plug-ins; it encourages them. 3.) the Web doesn't need big media; big media needs the Web." Also: the FSF has announced that a coalition of 27 web freedom organizations have sent a joint letter to the W3C opposing DRM support in HTML5.
Virtucon writes "U.S. Magistrate William Callahan Jr. of Wisconsin has ruled in favor of the accused in that he should not have to decrypt his storage device. The U.S. Government had sought to compel Feldman to provide his password to obtain access to the data. Presumably the FBI has had no success in getting the data and had sought to have the judge compel Feldman to provide the decrypted contents of what they had seized. The Judge ruled (PDF): 'This is a close call, but I conclude that Feldman's act of production, which would necessarily require his using a password of some type to decrypt the storage device, would be tantamount to telling the government something it does not already know with "reasonably particularity" — namely, that Feldman has personal access to and control over the encrypted storage devices. Accordingly, in my opinion, Fifth Amendment protection is available to Feldman. Stated another way, ordering Feldman to decrypt the storage devices would be in violation of his Fifth Amendment right against compelled self-incrimination.'" If the government has reasonable suspicion that you have illicit data, they can still compel you to decrypt it.
New submitter AlbanX writes "An IT professional working in Sydney has been arrested for hacking a government website as part of the LulzSec movement. The 24-year-old man, residing in Point Clare, was arrested at his workplace late yesterday. He claimed to be the leader of the hacker movement. 'Police say he was in a "position of trust" within the company and had access to information on government clients. The AFP says its investigation began less than two weeks ago when investigators found a government website had been compromised. The man has been charged with two counts of unauthorised modification of data to cause impairment and one count of unauthorised access to a restricted computer system. He faces a maximum of 12 years in jail.'"
coondoggie writes "The term sequestration has certainly become a four-letter word for many across the country — and now you can count business and regular traveling public among those hating its impact. The Federal Aviation Administration today issued a blunt statement on the impact of sequestration on the nation's air traffic control system, which this week begain furloughing about 10% of air traffic controllers for two days or so per month. It reads as follows: 'As a result of employee furloughs due to sequestration, the FAA is implementing traffic management initiatives at airports and facilities around the country. Travelers can expect to see a wide range of delays that will change throughout the day depending on staffing and weather-related issues. ... Yesterday more than 1,200 delays in the system were attributable to staffing reductions resulting from the furlough.'" U.S. Democrats and Republicans spent the day using the FAA's statement as political fodder rather than working on resolving sequestration.
jfruh writes "The rap on the under-30 crowd is that they don't care anywhere near as much about online privacy as their elders — but that's not quite true. According to a recent study by USC's Annenberg Center for the Digital Future, millennials are just as concerned about the use of their personal data online as their elders. The difference arises when it comes to why they share that data: older users share with someone they trust, while millennials share when they perceive that there's something in it for them."
Nerval's Lobster writes "With emotions high in the hours and days following the Boston Marathon bombing, hundreds of people took to Reddit's user-generated forums to pick over images from the crime scene. Could a crowd of sharp-eyed citizens uncover evidence of the perpetrators? No, but they could definitely focus attention on the wrong people. 'Though started with noble intentions, some of the activity on reddit fueled online witch hunts and dangerous speculation which spiraled into very negative consequences for innocent parties,' read an April 22 posting on Reddit's official blog. 'The reddit staff and the millions of people on reddit around the world deeply regret that this happened.'"
An anonymous reader writes "Two men were arrested in Canada, accused of conspiring to carry out an 'al-Qaeda supported' attack against a VIA passenger train in the Greater Toronto Area. The arrests were products of 'extensive' co-operation between Canadian and US intelligence agencies, who had been investigating the plot since August 2012." From this article, it's not clear whether any actual al-Qaeda support was forthcoming, or whether the accused plotters merely thought there was, by means of an FBI sting operation, as in the 2006 case in Florida.
judgecorp writes "Privacy groups have accused British ISPs of a 'conspiracy of silence' over the impact of the UK government;s proposed Communications Data Bill or 'Snooper's Charter.' The letter accuses the SPs of allowing themselves to be 'co-opted as an arm of the state' — and of not telling their customers what they are up to. Under the bill, ISPs can be ordered to store their users' communications data (the who when and where but not the content of emails etc) for police to search through."
An anonymous reader writes "Former diplomat to Belgium and the European Union Brendan Nelson describes his astonishment at his inability to get any response from Facebook when trying to get a diplomatically damaging fake page taken down. The social network ignored official protestations from the department of foreign affairs and security agencies."
New submitter Rideak writes with this excerpt from CNet about an ITC ruling against Motorola in their case against Apple for violating a few of their proximity sensor patents: "The U.S. International Trade Commission today ended Motorola's case against Apple, which accused the iPhone and Mac maker of patent infringement. In a ruling (PDF), the ITC said that Apple was not violating Motorola's U.S. patent covering proximity sensors, which the commission called 'obvious.' It was the last of six patents Motorola aimed at Apple as part of an October 2010 complaint."
Bismillah writes "Excite Mobile in South Australia also set up a fake debt collection agency, and a fictional complaints body for late-paying customers. The company sent fake debt collection letters to 1074 customers, even going so far as threatening to confiscate the toys of their customers' kids if they didn't pay up. From the article: 'South Australian mobile phone provider Excite Mobile has been found guilty of false, misleading and unconscionable conduct by the Federal Court after the ACCC took action against the company for faking a debt collection agency, creating a fictional complaints body, and misrepresenting scope of mobile coverage.'"
schwit1 writes "The Obama Administration and a federal judge in San Francisco appear to be headed for a showdown over the controversial state secrets privilege in a case about the U.S. government's 'no-fly' list for air travel. U.S. District Judge William Alsup is also bucking the federal government's longstanding assertion that only the executive branch can authorize access to classified information. From the article: 'The disputes arose in a lawsuit Malaysian citizen and former Stanford student Rahinah Ibrahim filed seven years ago after she was denied travel and briefly detained at the San Francisco airport in 2005, apparently due to being on the no-fly list. In an order issued earlier this month and made public Friday, Alsup instructed lawyers for the government to "show cause" why at least nine documents it labeled as classified should not be turned over to Ibrahim's lawyers. Alsup said he'd examined the documents and concluded that portions of some of them and the entirety of others could be shown to Ibrahim's attorneys without implicating national security.'"
DavidGilbert99 writes "For a completely online movement, the lack of an official Anonymous website is certainly strange. The reason, according to Anonymous itself is down to the lack of a hierarchical structure. However, one Anonymous-linked group could be about to change all that, having succeeded in securing $55,000 in funding for a website. Is this the beginning of Anonymous going mainstream? From the article: 'The @YourAnonNews (YAN) Twitter account has over one million followers and has leveraged its popularity to successfully raise over $55,000 (£34,000) through a crowd-funding campaign on the Indiegogo website. The funding drive was established to allow those behind the YAN account to set up a website of its own which will allow it "to collect breaking reports and blog postings from the best independent reporters online."'"
judgecorp writes "Germany's privacy regulator has fined Google €145,000 over its Street View cars' harvesting of private data — but the official has complained that the size of the fine is too small, because of limits to the fines regulators can impose. German data protection commissioner Johannes Caspar said the fine was too low, for 'one of the largest known data breachers ever,' saying, 'as long as privacy violations can be punished only at discount prices, enforcement of data protection law in the digital world with its high abuse potential is hardly possible.' In 2010 it emerged that Google's Street View cars captured personal data from Wi-Fi networks as well as taking pictures — since then regulators have imposed a series of fines — the largest being $7 million reportedly paid to settle a U.S. government probe."
SternisheFan writes "ArsTechnica reports: 'While the whole country is relieved that this past week's Boston Marathon bombing ordeal and subsequent lockdown of the city is finally over, Boston Police Commissioner Edward Davis told the Washington Post that the department's facial recognition system "did not identify" the two bombing suspects. "The technology came up empty even though both Tsarnaevs' images exist in official databases: Dzhokhar had a Massachusetts driver's license; the brothers had legally immigrated; and Tamerlan had been the subject of some FBI investigation," the Post reported on Saturday. Facial recognition systems can have limited utility when a grainy, low-resolution image captured at a distance from a cellphone camera or surveillance video is compared with a known, high-quality image. Meanwhile, the FBI is expected to release a large-scale facial recognition apparatus "next year for members of the Western Identification Network, a consortium of police agencies in California and eight other Western states," according to the San Jose Mercury News. Still, video surveillance did prove extremely useful in pinpointing the suspects.'"
An anonymous reader writes "Silicon Valley tech firms, banks and other powerful industries are mounting a quiet but forceful campaign to kill an Internet privacy bill that would give California consumers the right to know how their personal information is being used. A recent letter signed by 15 companies and trade groups — including TechAmerica, which represents Google, Facebook, Microsoft and other technology companies — demanded that the measure's author, Assemblywoman Bonnie Lowenthal, D-Long Beach, drop her bill. They complain it would open up businesses to an avalanche of requests from individuals as well as costly lawsuits."
hypnosec writes "Authorities in Japan are presumably worried about their inability to tackle cybercrime and, in a bid to stem one of the sources of anonymous traffic, the National Police Agency (NPA) is asking ISPs to block Tor. The recommendation comes from the special panel formed by the NPA after a hacker going by the name Demon Killer was found to regularly use Tor to anonymize his online activities, like posting of death threats on public message boards."
An anonymous reader writes "What do you get mugged in Central London and the local police are too incompetent to find a mugger even with his address and photograph? You may not be able to get to the laptop, but you still own the photos and data on it, so you set up the NSFW Plumpergeddon blog which gives details of the subsequent 'owner's' 'Brick House Butts' fetishes. Now of course later the IT media might get interested and offer an interview with a promise to let him review the article and keep his name secret. luckily our hero is not so innocent and demonstrates the value of using a false name on the internet as well as planting your own monitoring software on your laptop."
New submitter JoeyRox writes "On 3/22 the Senate approved a non-binding proposal to allow states to tax online sales to residents outside their state. That vote was a trial balloon to gauge the support for the Marketplace Fairness Act. This week Senate Majority Leader Harry Reid filed a cloture to allow the law to be voted on for real this time. The vote may occur as soon as tomorrow. eBay is attempting to rally Americans against the bill via a massive email campaign."
First time accepted submitter thejezus writes "A spy cabinet has been exposed on a public road in The Hague, the Netherlands (Google translate here). The cabinet was disguised as telecom-cabinet and was detected by the maintenance crew of Ziggo (a triple-play provider) because it was not listed as a property of the company. Upon opening, it was revealed the cabinet contained a camera and UMTS equipment. Later that day, the cabinet disappeared. 1984 much?"
An anonymous reader writes "My Skype account was hijacked, which I discovered after Skype suspended it for suspicious activity, including a number of paid calls and an attempt to debit my card. Now that I've secured the account again, I can see the call history — there are several numbers called in Senegal, Mali, Benin and Philippines. Obviously I could call them myself and create a bit of havoc in their lives, but ideally I'd like to trace the hijacker himself — perhaps with some kind of 'social engineering' approach. Or is it just a waste of time?" How would you do this, and would you bother?
New submitter trims writes "The TSA is now in the public comment stage of its project to roll out Advanced Imaging Technology (i.e. full-body X-ray) scanners. The TSA wants your feedback as to whether or not this project should be continued or cancelled. Now is your chance to tell the TSA that this is a huge porkbarrel project and nothing more than Security Theater. You can comment at http:///www.regulations.gov and reference the docket ID TSA-2013-0004." Note: the backscatter X-ray machines are being phased out, in favor of millimeter-wave systems; the linked documents give the government's side of the story when it comes to efficacy, safety, privacy, and worth. The comment period runs until June 24.
An anonymous reader writes with this excerpt from the BBC: "A woman who complained about an unpaid £146 invoice is facing a libel battle that could cost her more than £100,000. Lesley Kemp, 55, took to Twitter claiming that a company based in the Middle East had failed to pay her promptly for transcription work. Now the firm is suing Mrs Kemp, of Milton Keynes, for defamation, claiming up to £50,000 in damages and a further £70,000 in costs. The company, Resolution Productions, based in Qatar, has yet to comment."
Blug_fred writes "For the first year the Digital Freedom Foundation (ex-SFI) is organizing Hardware Freedom Day. With 66 events worldwide split over 36 countries, they are not yet covering the whole world but it is a good start. So if you have always been wondering about hacking your own stuff, be it a piece of wood or some more complex electronic gears then it is time to join an open door day type of event. Sixty-six events is definitely less that the total number of hackerspaces around the world and you can check for other events happening in a hackerspace near you if none are celebrating today. Hopefully they will join the movement next year."
Should Boston have been put in a state of lockdown on Friday as police chased down Dzhokhar Tsarnaev? Pragmatic Bruce Schneier writes on his blog: "I generally give the police a lot of tactical leeway in times like this. The very armed and very dangerous suspects warranted extraordinary treatment. They were perfectly capable of killing again, taking hostages, planting more bombs -- and we didn't know the extent of the plot or the group. That's why I didn't object to the massive police dragnet, the city-wide lock down, and so on." Schneier links to some passionate counterarguments, though. It doesn't escape the originator of a recurring movie plot terrorism contest that the Boston events of yesterday were just "the sort of thing that pretty much only happens in the movies."
alostpacket writes "The New York times reports that statistical scoring by the standardized testing company Pearson incorrectly disqualified over 4700 students from a chance to enter gifted / advanced programs in New York City schools. Only students who score in the 90th percentile or above are eligible for these programs. Those in the 97th or above are eligible for 5 of the best programs. 'According to Pearson, three mistakes were made. Students' ages, which are used to calculate their percentile ranking against students of similar age, were recorded in years and months, but should also have counted days to be precise. Incorrect scoring tables were used. And the formula used to combine the two test parts into one percentile ranking contained an error.' No mention of enlisting the help of the gifted children was made in the Times article, but it also contained a now-corrected error. This submission likely also contains an erro"
An anonymous reader writes "A new malware scheme has been discovered that pushes fake antivirus software to Android users via in-app advertising. Once installed, the trojan informs the victims they need to pay up to remove threats on their device. The malware in question, detected as "Android.Fakealert.4.origin" by Russian security firm Doctor Web, has been around since at least October 2012 according to the company. While Android malware that masks itself as an antivirus for Google's platform is nothing new, and neither are ads in Android apps pushing malware, but putting the two together can certainly be effective. This is naturally a practice that Windows users are all too familiar with."