symbolset writes "The Wall Street Journal and others are reporting that longtime telecomm lobbyist Tom Wheeler will be nominated to head the Federal Communications Commission. According to the LA Times: 'Wheeler is a former president of the National Cable Television Assn. and the Cellular Telecommunications and Internet Assn. Despite his close ties to industries he will soon regulate, some media watchdogs are willing to give him the benefit of the doubt. "As someone who has known Tom for years, I believe that he will be an independent, proactive chairman," said Gigi B. Sohn, president and chief executive of Public Knowledge, adding that she has "no doubt that Tom will have an open door and an open mind, and that ultimately his decisions will be based on what he genuinely believes is best for the public interest, not any particular industry."'"
Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.
v3rgEz writes "The Supreme Court ruled Monday morning that states have the right to restrict public records access to locals, meaning one more hurdle to would-be muckrakers everywhere. Even in-state requesters are harmed: It means one more bureaucratic hurdle and another excuse for agencies to respond in paper rather than electronically. MuckRock has helped file requests in all 50 states — important for projects like the Drone Census — and we're looking for more volunteers to help ensure transparency from sea to shining sea. States impacted: Alabama; Arkansas; Delaware; Georgia; New Hampshire; New Jersey; Tennessee; and Virginia. If you live in one of the above, fill out a simple form and we can help ensure that sunshine isn't restricted depending on where you live."
sl4shd0rk writes "Remember SOPA? If not, perhaps the name Lamar Smith will ring a bell. The U.S. House Committee on Science, Space and Technology chose Smith to Chair as an overseer for the National Science Foundation's funding process. Smith is preparing a bill (PDF) which will require that every grant must benefit 'national defense,' be of 'utmost importance to society,' and not be 'duplicative of other research.' Duplicating research seems reasonable until you consider that this could also mean the NSF will not provide funding for research once someone has already provided results — manufactured or otherwise. A strange target since there is a process in place which makes an effort to limit duplicate funding already. The first and second requirements, even when read in context, still miss the point of basic research. If we were absolutely without-a-doubt-certain of the results, there would be little point in doing the research in the first place."
An anonymous reader writes "German IT magazine Heise reports (original in German) that the Ministry of Education in Schwerin had a Conficker virus infection on 170 machines, that was dealt with by simply throwing them on the trash. Other German authorities have now decided that 'the approach taken is not up to the principle of efficiency and economy' and that the 187,300 Euro invested in this radical form of virus removal were inappropriate. The ministry had earlier estimated the cost of cleaning their desktops and servers by more conventional means to 130,000 Euro."
jrepin writes "The government of Spain's autonomous region of Extremadura has begun the switch to open source of it desktop PCs. The government expects the majority of its 40,000 PCs to be migrated this year, the region's CIO Theodomir Cayetano announced on 18 April. Extremadura estimates that the move to open source will help save 30 million euro per year. Extremadura in 2012 completed the inventory of all the software applications and computers used by its civil servants. It also tailored a Linux distribution, Sysgobex, to meet the majority of requirements of government tasks. It has already migrated to open source some 150 PCs at several ministries, including those for Development, Culture and Employment."
Jeremiah Cornelius writes with what looks to be part of CISPA III: Children of CISPA. From the article: "A government task force is preparing legislation that would pressure companies such as Facebook and Google to enable law enforcement officials to intercept online communications as they occur. ... 'The importance to us is pretty clear,' says Andrew Weissmann, the FBI's general counsel. 'We don't have the ability to go to court and say, "We need a court order to effectuate the intercept." Other countries have that.' Under the draft proposal, a court could levy a series of escalating fines, starting at tens of thousands of dollars, on firms that fail to comply with wiretap orders, according to persons who spoke on the condition of anonymity to discuss internal deliberations. 'This proposal is a non-starter that would drive innovators overseas and cost American jobs,' said Greg Nojeim, a senior counsel at the Center for Democracy and Technology. 'They might as well call it the Cyber Insecurity and Anti-Employment Act.'"
kodiaktau writes "The UK govt passed the Enterprise and Regulatory Reform Act which effectively makes so-called 'orphaned' content posted on social media sites public domain. Corporations now only need to have made a "diligent search" to find the owner of the content before use. From the article: 'The Act contains changes to UK copyright law which permit the commercial exploitation of images where information identifying the owner is missing, so-called "orphan works", by placing the work into what's known as "extended collective licensing" schemes. Since most digital images on the internet today are orphans - the metadata is missing or has been stripped by a large organization - millions of photographs and illustrations are swept into such schemes.'"
John Wagger writes "When Greenheart Games released their very first game, Game Dev Tycoon (for Mac, Windows and Linux) yesterday, they did something unusual and as far as I know unique. They released a cracked version of the game, minutes after opening their Store. The pirated copy was completely same as the real copy, except that after a few hours into the game, players started noticing widespread piracy of their games in the game development simulator."
bizwriter writes "Nobody would ever say that the world of patent law is a roller coaster of excitement but every now and then something interesting happens. Take this attorney who was angry over a patent examiner's rejection of his client's application. Here are a few snippets from the lawyers letter to the examiner: 'Are you drunk? No, seriously... are you drinking scotch and whiskey with a side of crack cocaine while you "examine" patent applications? (Heavy emphasis on the quotes.) Do you just mail merge rejection letters from your home? Is that what taxpayers are getting in exchange for your services? Have you even read the patent application? I'm curious. Because you either haven't read the patent application or are... (I don't want to say the "R" word) "Special."....Your job is not a joke, but you are turning it into a regular three ring circus. If you can't motivate yourself to take your job seriously, then you need to quit and let someone else take over what that actually wants to do the job right.'"
gmfeier writes "The EPA has significantly lowered its estimate of how much methane leaks during natural gas production. This has major implications for the fracking debate, but puts the EPA at odds with NOAA. From the article: 'The scope of the EPA's revision was vast. In a mid-April report on greenhouse emissions, the agency now says that tighter pollution controls instituted by the industry resulted in an average annual decrease of 41.6 million metric tons of methane emissions from 1990 through 2010, or more than 850 million metric tons overall. That's about a 20 percent reduction from previous estimates. The agency converts the methane emissions into their equivalent in carbon dioxide, following standard scientific practice.'"
First time accepted submitter Thorhs writes "According to preliminary results (all votes counted, no official word yet) the Icelandic Pirate Party was able to secure 3 members of the national Parliament, the first PP to reach a national Parliament. Things were hairy election night, the PP lost all their MPs when they dropped below the 5% barrier 'needed' in the somewhat complex election system. Thankfully they managed to slip back up above, with 5.1% of the total votes. The old 'crash parties', the ones in charge before our epic financial crash, (Independent and Progressive parties) are the prime candidates to form a new government with just over 51% of the votes, getting 40 of 63 seats. RUV (Icelandic) has good coverage."
An anonymous reader writes "TorrentFreak reports on an internet piracy case from Finland, which saw four men found guilty and fined €45,000. During the trial, the defense attorney took note of inconsistencies in log files used as evidence against the men. An investigator for international recording industry organization IFPI revealed after questioning that the files had been tampered with. He said an MPAA executive was present when the evidence gathering took place, and altered the files to hide the identity of 'one of their spies.' 'No one from the MPAA informed the defense that the edits had been made and the tampering was revealed at the worst possible time – during the trial. This resulted in the prosecutor ordering a police investigation into the changes that had been made. "Police then proceeded by comparing the 'work copy' that the IFPI investigator produced with the material that police and the defending counsels had received. Police found out that the material had differences in over 10 files," Hietanen reveals.'"
Lauren Weinstein writes "Are you ready for the imagery war — the war against personal photography and capturing of video? You'd better be. 'In some cities, like New York, the surveillance-industrial complex has its fangs deeply into government for the big bucks. It's there we heard the Police Commissioner — just hours ago, really — claim that "privacy is off the table." And of course, there's the rise of wearable cameras and microphones by law enforcement, generally bringing praise from people who assume they will reduce police misconduct, but also dangerously ignoring a host of critical questions. Will officers be able to choose when the video is running? How will the video be protected from tampering? How long will it be archived? Can it be demanded by courts? ... All of this and more is the gung-ho, government surveillance side of the equation. But what about the personal photography and video side? What of individual or corporate use of these technologies in public and private spaces? Will the same politicians promoting government surveillance in all its glory take a similar stance toward nongovernmental applications? Writing already on the wall suggests not. Inklings of the battles to come are already visible, if you know where to look."
Avantare writes "The first sci-fi novel I read was A Wrinkle in Time; the next was Dune. Why don't more people read these extraordinarily imaginative books? Delegate Ray Canterbury, who represents Greenbrier County in southern WV, wants to help with that. Canterbury introduced House Bill 2983, which reads, 'To stimulate interest in math and science among students in the public schools of this state, the State Board of Education shall prescribe minimum standards by which samples of grade-appropriate science fiction literature are integrated into the curriculum of existing reading, literature or other required courses for middle school and high school students.' For decades, walking around with a paperback sci-fi novel in your back pocket at school was the quickest way to find yourself permanently excluded from the cool-kid clique. But what if it wasn't just the geeks who read Isaac Asimov and Arthur C. Clarke? What if science fiction was mandatory reading for all students?"
reifman writes "The Seattle Times reports, 'For the first time in state history, the Washington state budget is being written by Microsofties,' Representative Ross Hunter has 'tamed his Microsoft-style head-butting with a politician's trust-building.' Senator Andy Hill is 'the first Senate budget chair ever to request Excel files instead of paper spreadsheets.' 'The two must find $1 billion in new money for the state's K-12 system.' Unfortunately, The Times neglects to mention that Hunter and Microsoft are among those behind the deficit and cutbacks in the first place. Hunter helped pass the amnesty bill for Microsoft's $1.5 billion Nevada tax dodge ($4.37 billion if you include impacts from its lobbying to reduce tax rates) that contributed to $4 billion in cuts to K-12 and higher education since 2008. The state has resorted to using Yelp to tax dancing to try to make up the shortfall (for real)."
First time accepted submitter NF6X writes "Following the conviction of British conman James McCormick for selling fake bomb detectors which were in fact rebadged novelty golf ball divining rods, Nairobi police chief Benson Githinji stated to reporters that his department's fake bomb detectors are serviceable, and contributed towards a recent elimination of successful grenade attacks."
Nerval's Lobster writes "Even before the Google acquisition, Motorola Mobility was engaged in a major legal battle with Microsoft, insisting that the latter needed to pay around $4 billion per year if it wanted to keep using Motorola's patents related to the H.264 video and 802.11 WiFi standards. (The patents in question affected the Xbox and other major Microsoft products.) Had that lawsuit succeeded as Motorola Mobility originally intended, it would have made Google a boatload of cash—but on April 25, a federal judge in Seattle ruled that Microsoft's royalty payments should total around $1.8 million per year. 'Based on Motorola's original demand of more than $4 billion per year from Microsoft,' patent expert Florian Mueller wrote in an April 26 posting on his FOSS Patents blog, 'it would have taken only about three years' worth of royalties for Microsoft to pay the $12.5 billion purchase price Google paid (in fact, way overpaid) for Motorola Mobility.' This latest courtroom defeat also throws into question the true worth of Motorola Mobility's patents. After all, if the best Google can earn from those patents is a few pennies-per-unit from its rivals' products, that may undermine the whole idea of paying $12.5 billion primarily for Motorola Mobility's intellectual-property portfolio.
An anonymous reader writes "New York City Police Commissioner Ray Kelly thinks that now is a great time to install even more surveillance cameras hither and yon around the Big Apple. After the Boston Marathon bombing, the Tsarnaev brothers were famously captured on security camera footage and thereby identified. That just may soften up Americans to the idea of the all-seeing glass eye. 'I think the privacy issue has really been taken off the table,' Kelly gloats."
An anonymous reader writes with this excerpt from The Daily Dot: "A Senate committee aide, who requested to not be named, told the Daily Dot that 'there is no possible plan to bring up CISPA,' in the Senate. The aide cited the fact that the Senate tried to pass its own cybersecurity bill, the Cybersecurity Act of 2012 (CSA). While unsuccessful, it underscored a desire for legislation that took more explicit efforts to protect individuals' Internet privacy. 'There are just too many problems with it,' the aide said of CISPA. This is backed up by U.S. News and World Report, which has reported that a staffer on the Senate's Committee on Commerce, Science and Transportation explicitly claims CISPA is no longer a possibility, and senators are 'drafting separate bills' to include some CISPA provisions."
hackingbear writes "The Beijing No. 2 Intermediate People's Court ruled in favor of a group of Chinese authors, and Apple will have to pay them in excess of 730,000 yuan (US$118,000) for infringement. Apple had not gotten permission before selling their books on the Apple App Store, it noted. These cases were the second batch of lawsuits filed against Apple by the Writers' Right Protection Union, which includes prominent members like prolific blogger and novelist Han Han who have become a pop culture star through his creative and cynical writings criticizing the (Chinese) government."
angry tapir writes "The three-year blockade against donations to WikiLeaks may have just been chiseled away, in Iceland, by a ruling handed down by the European country's Supreme Court. The verdict says that the Visa subcontractor Valitor had unlawfully terminated its contract with WikiLeaks' donation processor, DataCell, and must re-open the processing of donations to the whistle-blowing site within 15 days or else face a fine of ISK800,000, or US$6,830, per day."
terrancem writes "The Seattle-based Amazon.com has applied for its brand to be a generic top-level domain name (.amazon), but South American governments argue this would prevent the use of this internet address for environmental protection, the promotion of indigenous rights and other public interest uses. Along with dozens of other disputed claims to names including ".patagonia" and ".shangrila", the issue cuts to the heart of debates about the purpose and governance of the internet."
zacharye writes "Washington State Attorney General Bob Ferguson on Thursday ordered UNcarrier T-Mobile to correct 'deceptive advertising that promised consumers no annual contracts while carrying hidden charges for early termination of phone plans.' T-Mobile, which recently did away with standard cell phone service contracts and typical smartphone subsidies, is accused of misleading consumers by advertising no-contract wireless plans despite requiring that customers sign an agreement that makes them responsible for the full cost of their handsets should they cancel service prematurely ..."
tlhIngan writes "On Tuesday, the New York appellate court denied Grooveshark the DMCA safe harbor protection on songs like Johnny B. Goode. What happened was due to an oddity in the law, the DMCA does not apply to state-licensed copyrighted works (those copyrighted before February 15, 1972). What happened was Congress overhauled copyright law to make it a Federal matter, but all works prior to that date still come under common-law and state statutes. The end result is that Grooveshark does not have DMCA safe harbor protection for older works and may be sued for copyright infringement (barring other agreements, e.g., UMG and YouTube), even though they fully comply with the DMCA otherwise, taking down copyrighted materials. Grooveshark is a "music locker" service allowing users to upload music for others to listen to."
judgecorp writes "The Deputy Prime Minister, Nick Clegg, has effectively 'killed' the Communications Data Bill which would have required service providers to share personal communications data with the police. Clegg has withdrawn the support of the Liberal Democrat Party (part of the Coalition in power in the UK) from the so-called 'Snooper's Charter.' The announcement is timed to block the measure from the Queen's Speech on 8 May, which introduces the next programme of planned legislation."
SEWilco writes in with news that U.S. House of Representatives Judiciary Committee Chairman Bob Goodlatte plans on conducting "...a comprehensive review of US copyright law over the coming months.""In a speech given in celebration of World Intellectual Property Day at the Library of Congress today, Goodlatte mentioned a few examples of the sorts of problems that he hopes to address in such a review: 'The Internet has enabled copyright owners to make available their works to consumers around the world, but has also enabled others to do so without any compensation for copyright owners. Efforts to digitize our history so that all have access to it face questions about copyright ownership by those who are hard, if not impossible, to locate. There are concerns about statutory license and damage mechanisms. Federal judges are forced to make decisions using laws that are difficult to apply today. Even the Copyright Office itself faces challenges in meeting the growing needs of its customers - the American public.'"
whoever57 writes "Prime Minister David Cameron is proposing that porn should not be available through WiFi hotspots in public areas. Exactly how this will be implemented has not been identified, even to the extent of whether the ISP or the hotspot operator should implement the blocking. From the article: ' The Prime Minister said: “We are promoting good, clean, WiFi in local cafes and elsewhere to make sure that people have confidence in public WiFi systems so that they are not going to see things they shouldn’t.” His intervention comes after a long-running campaign from children’s charities to ensure a blanket ban on unacceptable sites on public WiFi networks.'"
savuporo writes "A DC Area Drone User Group has posted an open letter in response to recent comments by Eric Schmidt about banning drones from private use. The closing section reads: 'Personally owned flying robots today have the power to change the balance of power between individuals and large bureaucracies in much the same way the Internet did in the past. And just as the military researchers who developed GPS for guiding munitions could never have imagined their technology would be used in the future to help people conduct health surveys in the world's poorest countries or help people find dates in the world's richest, there is a whole world of socially positive and banal applications for drones that are yet to be discovered. We should embrace this chance that technology provides instead of strangling these opportunities in their infancy. Our hope is that you and the rest of Google's leadership will embrace this pro-technology agenda in the future rather than seeking to stifle it. We would welcome the opportunity to speak further with you about this topic.'"
itwbennett writes "Aereo's court battles are far from over, to be sure, but the ruling earlier this month that the TV streaming service doesn't violate copyright laws must have the folks at music streaming service Pandora shaking their heads, wondering why they're still paying royalties that currently consume more than half their revenues. The implications of Aereo's business model are far-reaching and may ultimately 'be resolved by Congress, just as it did when cable first came on the scene, by passing legislation to redefine a public performance,' writes broadcast industry attorney David Oxenford."
wiredmikey writes "Israeli security officials at Ben Gurion airport are legally allowed to demand access to tourists' email accounts and deny them entry if they refuse, the country's top legal official said on Wednesday. Details of the policy were laid out by Attorney General Yehuda Weinstein in a written response to the Association for Civil Rights in Israel (ACRI), the group said in a statement. 'In a response dated April 24, 2013, the attorney general's office confirmed this practice,' ACRI said, quoting sections of the document which said it was only done in exceptional cases where 'relevant suspicious signs' were evident and only done with the tourist's 'consent'. 'Allowing security agents to take such invasive measures at their own discretion and on the basis of such flimsy "consent" is not befitting of a democracy,' commented Lila Margalit from ACRI."
An anonymous reader writes "In its continuing march toward locking up deals with every major Android and Chrome device maker, Microsoft announced on Tuesday a patent-licensing agreement with Chinese manufacturer ZTE. This follows a similar deal last week with the parent company of Foxconn. Microsoft's Deputy General Counsel Horacio Gutierrez said, 'Much of the current litigation in the so called 'smartphone patent wars' could be avoided if companies were willing to recognize the value of others’ creations in a way that is fair. At Microsoft, experience has taught us that respect for intellectual property rights is a two-way street, and we have always been prepared to respect the rights of others just as we seek respect for our rights. This is why we have paid others more than $4 billion over the last decade to secure intellectual property rights for the products we provide our customers.'"
kxra writes "The Free Culture Foundation has posted a thorough response to the most common and misinformed defenses of the W3C's Extended Media Extensions (EME) proposal to inject DRM into HTML5. They join the EFF and FSF in a call to send a strong message to the W3C that DRM in HTML5 undermines the W3C's self-stated mission to make the benefits of the Web 'available to all people, whatever their hardware, software, network infrastructure, native language, culture, geographical location, or physical or mental ability.' The FCF counters the three most common myths by unpacking some quotes which explain that 1.) DRM is not about protecting copyright. That is a straw man. DRM is about limiting the functionality of devices and selling features back in the form of services. 2.) DRM in HTML5 doesn't obsolete proprietary, platform-specific browser plug-ins; it encourages them. 3.) the Web doesn't need big media; big media needs the Web." Also: the FSF has announced that a coalition of 27 web freedom organizations have sent a joint letter to the W3C opposing DRM support in HTML5.
Virtucon writes "U.S. Magistrate William Callahan Jr. of Wisconsin has ruled in favor of the accused in that he should not have to decrypt his storage device. The U.S. Government had sought to compel Feldman to provide his password to obtain access to the data. Presumably the FBI has had no success in getting the data and had sought to have the judge compel Feldman to provide the decrypted contents of what they had seized. The Judge ruled (PDF): 'This is a close call, but I conclude that Feldman's act of production, which would necessarily require his using a password of some type to decrypt the storage device, would be tantamount to telling the government something it does not already know with "reasonably particularity" — namely, that Feldman has personal access to and control over the encrypted storage devices. Accordingly, in my opinion, Fifth Amendment protection is available to Feldman. Stated another way, ordering Feldman to decrypt the storage devices would be in violation of his Fifth Amendment right against compelled self-incrimination.'" If the government has reasonable suspicion that you have illicit data, they can still compel you to decrypt it.
New submitter AlbanX writes "An IT professional working in Sydney has been arrested for hacking a government website as part of the LulzSec movement. The 24-year-old man, residing in Point Clare, was arrested at his workplace late yesterday. He claimed to be the leader of the hacker movement. 'Police say he was in a "position of trust" within the company and had access to information on government clients. The AFP says its investigation began less than two weeks ago when investigators found a government website had been compromised. The man has been charged with two counts of unauthorised modification of data to cause impairment and one count of unauthorised access to a restricted computer system. He faces a maximum of 12 years in jail.'"
coondoggie writes "The term sequestration has certainly become a four-letter word for many across the country — and now you can count business and regular traveling public among those hating its impact. The Federal Aviation Administration today issued a blunt statement on the impact of sequestration on the nation's air traffic control system, which this week begain furloughing about 10% of air traffic controllers for two days or so per month. It reads as follows: 'As a result of employee furloughs due to sequestration, the FAA is implementing traffic management initiatives at airports and facilities around the country. Travelers can expect to see a wide range of delays that will change throughout the day depending on staffing and weather-related issues. ... Yesterday more than 1,200 delays in the system were attributable to staffing reductions resulting from the furlough.'" U.S. Democrats and Republicans spent the day using the FAA's statement as political fodder rather than working on resolving sequestration.
jfruh writes "The rap on the under-30 crowd is that they don't care anywhere near as much about online privacy as their elders — but that's not quite true. According to a recent study by USC's Annenberg Center for the Digital Future, millennials are just as concerned about the use of their personal data online as their elders. The difference arises when it comes to why they share that data: older users share with someone they trust, while millennials share when they perceive that there's something in it for them."
Nerval's Lobster writes "With emotions high in the hours and days following the Boston Marathon bombing, hundreds of people took to Reddit's user-generated forums to pick over images from the crime scene. Could a crowd of sharp-eyed citizens uncover evidence of the perpetrators? No, but they could definitely focus attention on the wrong people. 'Though started with noble intentions, some of the activity on reddit fueled online witch hunts and dangerous speculation which spiraled into very negative consequences for innocent parties,' read an April 22 posting on Reddit's official blog. 'The reddit staff and the millions of people on reddit around the world deeply regret that this happened.'"
An anonymous reader writes "Two men were arrested in Canada, accused of conspiring to carry out an 'al-Qaeda supported' attack against a VIA passenger train in the Greater Toronto Area. The arrests were products of 'extensive' co-operation between Canadian and US intelligence agencies, who had been investigating the plot since August 2012." From this article, it's not clear whether any actual al-Qaeda support was forthcoming, or whether the accused plotters merely thought there was, by means of an FBI sting operation, as in the 2006 case in Florida.
judgecorp writes "Privacy groups have accused British ISPs of a 'conspiracy of silence' over the impact of the UK government;s proposed Communications Data Bill or 'Snooper's Charter.' The letter accuses the SPs of allowing themselves to be 'co-opted as an arm of the state' — and of not telling their customers what they are up to. Under the bill, ISPs can be ordered to store their users' communications data (the who when and where but not the content of emails etc) for police to search through."
An anonymous reader writes "Former diplomat to Belgium and the European Union Brendan Nelson describes his astonishment at his inability to get any response from Facebook when trying to get a diplomatically damaging fake page taken down. The social network ignored official protestations from the department of foreign affairs and security agencies."
New submitter Rideak writes with this excerpt from CNet about an ITC ruling against Motorola in their case against Apple for violating a few of their proximity sensor patents: "The U.S. International Trade Commission today ended Motorola's case against Apple, which accused the iPhone and Mac maker of patent infringement. In a ruling (PDF), the ITC said that Apple was not violating Motorola's U.S. patent covering proximity sensors, which the commission called 'obvious.' It was the last of six patents Motorola aimed at Apple as part of an October 2010 complaint."
Bismillah writes "Excite Mobile in South Australia also set up a fake debt collection agency, and a fictional complaints body for late-paying customers. The company sent fake debt collection letters to 1074 customers, even going so far as threatening to confiscate the toys of their customers' kids if they didn't pay up. From the article: 'South Australian mobile phone provider Excite Mobile has been found guilty of false, misleading and unconscionable conduct by the Federal Court after the ACCC took action against the company for faking a debt collection agency, creating a fictional complaints body, and misrepresenting scope of mobile coverage.'"
schwit1 writes "The Obama Administration and a federal judge in San Francisco appear to be headed for a showdown over the controversial state secrets privilege in a case about the U.S. government's 'no-fly' list for air travel. U.S. District Judge William Alsup is also bucking the federal government's longstanding assertion that only the executive branch can authorize access to classified information. From the article: 'The disputes arose in a lawsuit Malaysian citizen and former Stanford student Rahinah Ibrahim filed seven years ago after she was denied travel and briefly detained at the San Francisco airport in 2005, apparently due to being on the no-fly list. In an order issued earlier this month and made public Friday, Alsup instructed lawyers for the government to "show cause" why at least nine documents it labeled as classified should not be turned over to Ibrahim's lawyers. Alsup said he'd examined the documents and concluded that portions of some of them and the entirety of others could be shown to Ibrahim's attorneys without implicating national security.'"
DavidGilbert99 writes "For a completely online movement, the lack of an official Anonymous website is certainly strange. The reason, according to Anonymous itself is down to the lack of a hierarchical structure. However, one Anonymous-linked group could be about to change all that, having succeeded in securing $55,000 in funding for a website. Is this the beginning of Anonymous going mainstream? From the article: 'The @YourAnonNews (YAN) Twitter account has over one million followers and has leveraged its popularity to successfully raise over $55,000 (£34,000) through a crowd-funding campaign on the Indiegogo website. The funding drive was established to allow those behind the YAN account to set up a website of its own which will allow it "to collect breaking reports and blog postings from the best independent reporters online."'"
judgecorp writes "Germany's privacy regulator has fined Google €145,000 over its Street View cars' harvesting of private data — but the official has complained that the size of the fine is too small, because of limits to the fines regulators can impose. German data protection commissioner Johannes Caspar said the fine was too low, for 'one of the largest known data breachers ever,' saying, 'as long as privacy violations can be punished only at discount prices, enforcement of data protection law in the digital world with its high abuse potential is hardly possible.' In 2010 it emerged that Google's Street View cars captured personal data from Wi-Fi networks as well as taking pictures — since then regulators have imposed a series of fines — the largest being $7 million reportedly paid to settle a U.S. government probe."
SternisheFan writes "ArsTechnica reports: 'While the whole country is relieved that this past week's Boston Marathon bombing ordeal and subsequent lockdown of the city is finally over, Boston Police Commissioner Edward Davis told the Washington Post that the department's facial recognition system "did not identify" the two bombing suspects. "The technology came up empty even though both Tsarnaevs' images exist in official databases: Dzhokhar had a Massachusetts driver's license; the brothers had legally immigrated; and Tamerlan had been the subject of some FBI investigation," the Post reported on Saturday. Facial recognition systems can have limited utility when a grainy, low-resolution image captured at a distance from a cellphone camera or surveillance video is compared with a known, high-quality image. Meanwhile, the FBI is expected to release a large-scale facial recognition apparatus "next year for members of the Western Identification Network, a consortium of police agencies in California and eight other Western states," according to the San Jose Mercury News. Still, video surveillance did prove extremely useful in pinpointing the suspects.'"
An anonymous reader writes "Silicon Valley tech firms, banks and other powerful industries are mounting a quiet but forceful campaign to kill an Internet privacy bill that would give California consumers the right to know how their personal information is being used. A recent letter signed by 15 companies and trade groups — including TechAmerica, which represents Google, Facebook, Microsoft and other technology companies — demanded that the measure's author, Assemblywoman Bonnie Lowenthal, D-Long Beach, drop her bill. They complain it would open up businesses to an avalanche of requests from individuals as well as costly lawsuits."
hypnosec writes "Authorities in Japan are presumably worried about their inability to tackle cybercrime and, in a bid to stem one of the sources of anonymous traffic, the National Police Agency (NPA) is asking ISPs to block Tor. The recommendation comes from the special panel formed by the NPA after a hacker going by the name Demon Killer was found to regularly use Tor to anonymize his online activities, like posting of death threats on public message boards."
An anonymous reader writes "What do you get mugged in Central London and the local police are too incompetent to find a mugger even with his address and photograph? You may not be able to get to the laptop, but you still own the photos and data on it, so you set up the NSFW Plumpergeddon blog which gives details of the subsequent 'owner's' 'Brick House Butts' fetishes. Now of course later the IT media might get interested and offer an interview with a promise to let him review the article and keep his name secret. luckily our hero is not so innocent and demonstrates the value of using a false name on the internet as well as planting your own monitoring software on your laptop."