Valencia Linux School Distro Saves 36 Million Euro 158

jrepin (667425) writes "The government of the autonomous region of Valencia (Spain) earlier this month made available the next version of Lliurex, a customisation of the Edubuntu Linux distribution. The distro is used on over 110,000 PCs in schools in the Valencia region, saving some 36 million euro over the past nine years, the government says." I'd lke to see more efforts like this in the U.S.; if mega school districts are paying for computers, I'd rather they at least support open source development as a consequence.

SpaceX Executive Calls For $22-25 Billion NASA Budget 114

MarkWhittington (1084047) writes "While participating in a panel called "The US Space Enterprise Partnership" at the NewSpace Conference that was held by the Space Frontier Foundation on Saturday, SpaceX Chief Operating Officer Gwynne Shotwell opined that NASA's budget should be raised to $22-25 billion, according to a tweet by Space Policy Online's Marcia Smith. The theory is that a lot of political rancor has taken place in the aerospace community because of the space agency's limited budget. If the budget were to be increased to pay for everything on the space wish list, the rancor will cease.

The statement represents something of a departure of the usual mutual antagonism that exists between some in the commercial space community and some at NASA. Indeed Space Politics' Jeff Foust added a tweet, "Thought: a panel at a Space Frontier Foundation conf is talking about how to increase NASA budget. Imagine that in late 90s." The Space Frontier Foundation has been a leading voice for commercializing space, sometimes at the expense of NASA programs."
The Internet

In France, Most Comments on Gaza Conflict Yanked From Mainstream News Sites 512

An anonymous reader writes with an unpleasant statistic from France, quoting David Corchia, who heads a service employed by large French news organizations to sift through and moderate comments made on their sites. Quoting YNet News: Corchia says that as an online moderator, generally 25% to 40% of comments are banned. Moderators are assigned with the task of filtering comments in accordance with France's legal system, including those that are racist, anti-Semitic or discriminatory. Regarding the war between the Israelis and Hamas, however, Corchia notes that some 95% of online comments made by French users are removed. "There are three times as many comments than normal, all linked to the Israeli-Palestinian conflict," added Jeremie Mani, head of another moderation company Netino. "We see racist or anti-Semitic messages, very violent, that also take aim at politicians and the media, sometimes by giving journalists' contact details," he added. "This sickening content is peculiar to this conflict. The war in Syria does not trigger these kinds of comments."

Bose Sues New Apple Acquisition Beats Over Patent Violations 162

Bose has taken issue with some of the technology embodied in products in Apple's newly acquired Beats line of headphones. As Ars Technica reports, Bose is suing Apple, claiming that the Beats products violate five Bose patents, covering noise cancellation and signal processing Although Bose never mentions Apple in the 22-page complaint, the acquisition price of the private company may have played a part in spurring Bose to sue. The suit doesn't include a specific damage demand. Bose has also filed a complaint with the US International Trade Commission against Beats over the same infringement claims. That means the patent lawsuit filed in federal court will be stayed while the ITC case gets resolved first.

On Forgetting the Facts: Questions From the EU For Google, Other Search Engines 186

The Wall Street Journal lists 26 questions that Google and other search providers have been asked (in a meeting in Brussels earlier this week) to answer for EU regulators, to pin down what the search engine companies have done to comply with European demands to implement a "right to be forgotten." Some questions were asked directly of representatives of Microsoft, Yahoo and Google, while the regulators want answers to the others in short order. From the article: Regulators touched on some hot-button issues in six oral questions and another 26 written ones, with answers due by next Thursday. They asked Google to describe the “legal basis” of its decision to notify publishers when it approves right-to-be-forgotten requests, something that has led to requesters’ being publicly identified in some cases. They also asked search engines to explain where they take down the results, after complaints from some regulators that Google does not filter results on That means that anyone in Europe can switch from, say, to to see any removed links. Among the questions: "2. Do you filter out some requests based on the location, nationality, or place of residence of the data subject? If so, what is the legal basis for excluding such requests?" and "16. Does your company refuse requests when the data subject was the author of the information he/she posted himself/herself on the web? If so, what is the basis for refusing such requests?"
United States

When Spies and Crime-Fighters Squabble Over How They Spy On You 120

The Washington Post reports in a short article on the sometimes strange, sometimes strained relationship between spy agencies like the NSA and CIA and law enforcement (as well as judges and prosecutors) when it comes to evidence gathered using technology or techniques that the spy agencies would rather not disclose at all, never mind explain in detail. They may both be arms of the U.S. government, but the spy agencies and the law enforcers covet different outcomes. From the article: [S]sometimes it's not just the tool that is classified, but the existence itself of the capability — the idea that a certain type of communication can be wiretapped — that is secret. One former senior federal prosecutor said he knew of at least two instances where surveillance tools that the FBI criminal investigators wanted to use "got formally classified in a big hurry" to forestall the risk that the technique would be revealed in a criminal trial. "People on the national security side got incredibly wound up about it," said the former official, who like others interviewed on the issue spoke on condition of anonymity because of the topic’s sensitivity. "The bottom line is: Toys get taken away and put on a very, very high shelf. Only people in the intelligence community can use them." ... The DEA in particular was concerned that if it came up with a capability, the National Security Agency or CIA would rush to classify it, said a former Justice Department official.

Bad "Buss Duct" Causes Week-long Closure of 5,000 Employee Federal Complex 124

McGruber (1417641) writes In Atlanta, an electrical problem in a "Buss Duct" has caused the Sam Nunn Atlanta Federal Center to be closed for at least a week. 5,000 federal employees work at the center. While many might view this as another example of The Infrastructure Crisis in the USA, it might actually be another example of mismanagement at the complex's landlord, the General Service Administration (GSA). Probably no one wants to go to work in an Atlanta July without a working A/C.

Private Data On iOS Devices Not So Private After All 101

theshowmecanuck (703852) writes with this excerpt from Reuters summarizing the upshot of a talk that Jonathan Zdziarski gave at last weekend's HOPE conference: Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicized techniques by Apple Inc employees, the company acknowledged this week. The same techniques to circumvent backup encryption could be used by law enforcement or others with access to the 'trusted' computers to which the devices have been connected, according to the security expert who prompted Apple's admission. Users are not notified that the services are running and cannot disable them, Zdziarski said. There is no way for iPhone users to know what computers have previously been granted trusted status via the backup process or block future connections. If you'd rather watch and listen, Zdziarski has posted a video showing how it's done.

Enraged Verizon FiOS Customer Seemingly Demonstrates Netflix Throttling 398

MojoKid (1002251) writes The ongoing battle between Netflix and ISPs that can't seem to handle the streaming video service's traffic, boiled over to an infuriating level for Colin Nederkoon, a startup CEO who resides in New York City. Rather than accept excuses and finger pointing from either side, Nederkoon did a little investigating into why he was receiving such slow Netflix streams on his Verizon FiOS connection. What he discovered is that there appears to be a clear culprit. Nederkoon pays for Internet service that promises 75Mbps downstream and 35Mbps upstream through his FiOS connection. However, his Netflix video streams were limping along at just 375kbps (0.375mbps), equivalent to 0.5 percent of the speed he's paying for. On a hunch, he decided to connect to a VPN service, which in theory should actually make things slower since it's adding extra hops. Speeds didn't get slower, they got much faster. After connecting to VyprVPN, his Netflix connection suddenly jumped to 3000kbps, the fastest the streaming service allows and around 10 times faster than when connecting directly with Verizon. Verizon may have a different explanation as to why Nederkoon's Netflix streams suddenly sped up, but in the meantime, it would appear that throttling shenanigans are taking place. It seems that by using a VPN, Verizon simply doesn't know which packets to throttle, hence the gross disparity in speed.

Australian Government Moving Forward With Anti-Piracy Mandate For ISPs 128

angry tapir (1463043) writes Australia is moving closer to a regime under which ISPs will be forced to block access to websites whose "dominant purpose" is to facilitate copyright violations. A secret government discussion paper (PDF) has been leaked and proposes a system of website blocking and expanded liability for ISPs when it comes to "reasonable steps that can be taken ... to discourage or reduce online copyright infringement."

FBI Studied How Much Drones Impact Your Privacy -- Then Marked It Secret 139

v3rgEz writes When federal agencies adopt new technology, they're required by law to do Privacy Impact Assessments, which is exactly what the FBI did regarding its secretive drone program. The PIAs are created to help the public and federal government assess what they're risking through the adoption of new technology. That part is a little trickier, since the FBI is refusing to release any of the PIA on its drone project, stating it needs to be kept, er, private to protect national security.

Compromise Struck On Cellphone Unlocking Bill 77

NotSanguine (1917456) writes The U.S. Senate has passed a bill (S.517) today, allowing users to unlock their phones when moving to another provider. From a recent article at "Consumers should be able to use their existing cell phones when they move their service to a new wireless provider," [Sen. Patrick] Leahy said in a statement. "Our laws should not prohibit consumers from carrying their cell phones to a new network, and we should promote and protect competition in the wireless marketplace," he said. [Sen. Chuck] Grassley called the bipartisan compromise "an important step forward in ensuring that there is competition in the industry and in safeguarding options for consumers as they look at new cell phone contracts." "Empowering people with the freedom to use the carrier of their choice after complying with their original terms of service is the right thing to do," he said. The House in February passed a companion bill sponsored on cellphone unlocking from House Judiciary Committee Chairman Bob Goodlatte (R-Va.)." Also at Ars Technica, as pointed out by reader jessepdx.

The NSA's New Partner In Spying: Saudi Arabia's Brutal State Police 125

Advocatus Diaboli sends this news from The Intercept: The National Security Agency last year significantly expanded its cooperative relationship with the Saudi Ministry of Interior, one of the world's most repressive and abusive government agencies. An April 2013 top secret memo provided by NSA whistleblower Edward Snowden details the agency's plans "to provide direct analytic and technical support" to the Saudis on "internal security" matters. The Saudi Ministry of Interior—referred to in the document as MOI— has been condemned for years as one of the most brutal human rights violators in the world. In 2013, the U.S. State Department reported that "Ministry of Interior officials sometimes subjected prisoners and detainees to torture and other physical abuse," specifically mentioning a 2011 episode in which MOI agents allegedly "poured an antiseptic cleaning liquid down [the] throat" of one human rights activist. The report also notes the MOI's use of invasive surveillance targeted at political and religious dissidents.

Russia Posts $110,000 Bounty For Cracking Tor's Privacy 98

hypnosec writes: The government of Russia has announced a ~$110,000 bounty to anyone who develops technology to identify users of Tor, an anonymising network capable of encrypting user data and hiding the identity of its users. The public description (in Russian) of the project has been removed now and it only reads "cipher 'TOR' (Navy)." The ministry said it is looking for experts and researchers to "study the possibility of obtaining technical information about users and users' equipment on the Tor anonymous network."

Switching From Microsoft Office To LibreOffice Saves Toulouse 1 Million Euros 296

jrepin sends this EU report: The French city of Toulouse saved 1 million euro by migrating all its desktops from Microsoft Office to LibreOffice. This project was rooted in a global digital policy which positions free software as a driver of local economic development and employment. Former IT policy-maker Erwane Monthubert said, "Software licenses for productivity suites cost Toulouse 1.8 million euro every three years. Migration cost us about 800,000 euro, due partly to some developments. One million euro has actually been saved in the first three years. It is a compelling proof in the actual context of local public finance. ... France has a high value in free software at the international level. Every decision-maker should know this."

SLS Project Coming Up $400 Million Short 132

schwit1 writes: A GAO report finds that the Space Launch System is over budget and NASA will need an additional $400 million to complete its first orbital launch in 2017. From the article: "NASA isn't meeting its own requirements for matching cost and schedule resources with the congressional requirement to launch the first SLS in December 2017. NASA usually uses a calculation it calls the 'joint cost and schedule confidence level' to decide the odds a program will come in on time and on budget. 'NASA policy usually requires a 70 percent confidence level for a program to proceed with final design and fabrication,' the GAO report says, and the SLS is not at that level. The report adds that government programs that can't match requirements to resources 'are at increased risk of cost and schedule growth.'

In other words, the GAO says SLS is at risk of costing more than the current estimate of $12 billion to reach the first launch or taking longer to get there. Similar cost and schedule problems – although of a larger magnitude – led President Obama to cancel SLS's predecessor rocket system called Constellation shortly after taking office." The current $12 billion estimate is for the program's cost to achieve one unmanned launch. That's four times what it is costing NASA to get SpaceX, Boeing, and Sierra Nevada to build their three spaceships, all scheduled for their first manned launches before 2017.

Wikipedia Blocks 'Disruptive' Edits From US Congress 165

alphatel writes: Wikipedia has blocked anonymous edits from a congressional IP address for 10 days because of "disruptive" behavior. These otherwise anonymous edits were brought to light recently by @Congressedits, a bot that automatically tweets Wikipedia changes that come from Congressional IP addresses. The biography of former U.S. defense secretary Donald Rumsfeld was edited to say that he was an "alien lizard who eats Mexican babies." Mediaite's Wikipedia page was modified to label the site as a "sexist transphobic" publication.
The Internet

Two Cities Ask the FCC To Preempt State Laws Banning Municipal Fiber Internet 200

Jason Koebler writes Two cities—Chattanooga, Tennessee, and Wilson, North Carolina—have officially asked the federal government to help them bypass state laws banning them from expanding their community owned, gigabit fiber internet connections. In states throughout the country, major cable and telecom companies have battled attempts to create community broadband networks, which they claim put them at a competitive disadvantage. The FCC will decide if its able to circumvent state laws that have been put in place restricting the practice.
United States

Lawrence Krauss: Congress Is Trying To Defund Scientists At Energy Department 342

Lasrick writes Physicist Lawrence Krauss blasts Congress for their passage of the 2015 Energy and Water Appropriations bill that cut funding for renewable energy, sustainable transportation, and energy efficiency, and even worse, had amendments that targeted scientists at the Department of Energy: He writes that this action from the US Congress is worse even than the Australian government's move to cancel their carbon tax, because the action of Congress is far more insidious: "Each (amendment) would, in its own way, specifically prohibit scientists at the Energy Department from doing precisely what Congress should mandate them to do—namely perform the best possible scientific research to illuminate, for policymakers, the likelihood and possible consequences of climate change." Although the bill isn't likely to become law, Krauss is fed up with Congress burying its head in the sand: The fact that those amendments "...could pass a house of Congress, should concern everyone interested in the appropriate support of scientific research as a basis for sound public policy."

Social Security Administration Joins Other Agencies With $300M "IT Boondoggle" 144

alphadogg (971356) writes with news that the SSA has joined the long list of federal agencies with giant failed IT projects. From the article: "Six years ago the Social Security Administration embarked on an aggressive plan to replace outdated computer systems overwhelmed by a growing flood of disability claims. Nearly $300 million later, the new system is nowhere near ready and agency officials are struggling to salvage a project racked by delays and mismanagement, according to an internal report commissioned by the agency. In 2008, Social Security said the project was about two to three years from completion. Five years later, it was still two to three years from being done, according to the report by McKinsey and Co., a management consulting firm. Today, with the project still in the testing phase, the agency can't say when it will be completed or how much it will cost.

Sony Agrees To $17.75m Settlement For 2011 PSN Attack 66

mrspoonsi (2955715) writes with word that Sony has agreed to settle a class action lawsuit brought by PSN users affected by the 2011 breach. From the article: Sony has finally agreed to a preliminary settlement of $15m, which may be able to appease most of the customers that suffered from this attack. The PlayStation Network users that did not partake in the "Welcome Back" program that Sony unveiled shortly after their online services were brought back will be able to choose from two of several options for compensation: One PlayStation 3 or PlayStation Portable game selected from a list of 14 games; three PlayStation 3 themes selected from a list of six themes; or a three-month subscription to PlayStation Plus free of charge. Claiming these benefits will be done on a first come, first serve basis ...The settlement isn't just about free games or services. Customers with documented identity theft charges are eligible for up to $2,500 per claim.

Dutch Court Says Government Can Receive Bulk Data from NSA 109

jfruh (300774) writes Dutch law makes it illegal for the Dutch intelligence services to conduct mass data interception programs. But, according to a court in the Hague, it's perfectly all right for the Dutch government to request that data from the U.S.'s National Security Agency, and doing so doesn't violate any treaties or international law.

The Psychology of Phishing 128

An anonymous reader writes Phishing emails are without a doubt one of the biggest security issues consumers and businesses face today. Cybercriminals understand that we are a generation of clickers and they use this to their advantage. They will take the time to create sophisticated phishing emails because they understand that today users can tell-apart spam annoyances from useful email, however they still find it difficult identifying phishing emails, particularly when they are tailored to suit each recipient individually. Fake emails are so convincing and compelling that they fool 10% of recipients into clicking on the malicious link. To put that into context a legitimate marketing department at a FTSE 100 company typically expects less than a 2% click rate on their advertising campaigns. So, how are the cybercriminals out-marketing the marketing experts?

Dropbox Head Responds To Snowden Claims About Privacy 176

First time accepted submitter Carly Page writes When asked for its response to Edward Snowden's claims that "Dropbox is hostile to privacy", Dropbox told The INQUIRER that users concerned about privacy should add their own encryption. The firm warned however that if users do, not all of the service's features will work. Head of Product at Dropbox for Business Ilya Fushman says: "We have data encrypted on our servers. We think of encryption beyond that as a users choice. If you look at our third-party developer ecosystem you'll find many client-side encryption apps....It's hard to do things like rich document rendering if they're client-side encrypted. Search is also difficult, we can't index the content of files. Finally, we need users to understand that if they use client-side encryption and lose the password, we can't then help them recover those files."

Verizon's Offer: Let Us Track You, Get Free Stuff 75

mpicpp points out a new program from Verizon that is perfect if you don't mind being tracked. Are you comfortable having your location and Web browsing tracked for marketing purposes? If so, Verizon's got a deal for you. The wireless giant announced a new program this week called 'Smart Rewards' that offers customers credit card-style perks like discounts for shopping, travel and dining. You accrue points through the program by doing things like signing onto the Verizon website, paying your bill online and participating in the company's trade-in program. Verizon emphasizes that the data it collects is anonymized before it's shared with third parties. The program is novel in that offers Verizon users some compensation for the collection of their data, which has become big business for telecom and tech companies. Some privacy advocates have pushed data-collecting companies to reward customers for their personal information in the interest of transparency.

VP Biden Briefs US Governors On H-1B Visas, IT, and Coding 225

theodp writes: Back in 2012, Computerworld blasted Vice President Joe Biden for his ignorance of the H-1B temporary work visa program. But Joe's got his H-1B story and he's sticking to it, characterizing the visa program earlier this month in a speech to the National Governors Association as "apprenticeships" of sorts that companies provide to foreign workers to expand the Information Technology industry only after proving there are no qualified Americans to fill the jobs. Biden said he also learned from his talks with tech's top CEOs that 200,000 of the jobs that companies provide each year to highly-skilled H-1B visa holders could in fact be done by Americans with no more than a two-year community college degree.
United States

The Secret Government Rulebook For Labeling You a Terrorist 242

Advocatus Diaboli sends this report: The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither "concrete facts" nor "irrefutable evidence" to designate an American or foreigner as a terrorist, according to a key government document obtained by The Intercept. ...The heart of the document revolves around the rules for placing individuals on a watchlist. "All executive departments and agencies," the document says, are responsible for collecting and sharing information on terrorist suspects with the National Counterterrorism Center. It sets a low standard—"reasonable suspicion"—for placing names on the watchlists, and offers a multitude of vague, confusing, or contradictory instructions for gauging it. In the chapter on "Minimum Substantive Derogatory Criteria"—even the title is hard to digest—the key sentence on reasonable suspicion offers little clarity.

The Department of Homeland Security Needs Its Own Edward Snowden 190

blottsie writes: Out of all the U.S. government agencies, the Department of Homeland Security is one of the least transparent. As such, the number of Freedom of Information Act requests it receives have doubled since 2008. But the DHS has only become more adamant about blocking FOIA requests over the years. The problem has become so severe that nothing short of an Edward Snowden-style leak may be needed to increase transparency at the DHS.

Researchers Design Bot To Conduct National Security Clearance Interviews 102

meghan elizabeth (3689911) writes Advancing a career in the U.S. government might soon require an interview with a computer-generated head who wants to know about that time you took ketamine. A recent study by psychologists at the National Center for Credibility Assessment, published in the journal Computers and Human Behavior, asserts that not only would a computer-generated interviewer be less "time consuming, labor intensive, and costly to the Federal Government," people are actually more likely to admit things to the bot. Eliza finds a new job.

Firefox 33 Integrates Cisco's OpenH264 194

NotInHere (3654617) writes As promised, version 33 of the Firefox browser will fetch the OpenH264 module from Cisco, which enables Firefox to decode and encode H.264 video, for both the <video> tag and WebRTC, which has a codec war on this matter. The module won't be a traditional NPAPI plugin, but a so-called Gecko Media Plugin (GMP), Mozilla's answer to the disliked Pepper API. Firefox had no cross-platform support for H.264 before. Note that only the particular copy of the implementation built and blessed by Cisco is licensed to use the h.264 patents.

Privacy Lawsuit Against Google Rests On Battery Drain Claims 175

Jason Koebler writes: According to plaintiffs in a class-action lawsuit against Google, personal information about you and your browsing, email, and app-using habits that is regularly sent between apps on you Android phone is harming your battery life. As odd as it sounds, this minor yet demonstrable harm is what will allow their lawsuit to go forward. A federal judge ruled that the claim "requires a heavily and inherently fact-bound inquiry." That means there's a good chance we're about to get a look into the ins and outs of Google's advertising backbone: what information is shared with whom, and when.
Electronic Frontier Foundation

EFF Releases Wireless Router Firmware For Open Access Points 56

klapaucjusz writes: The EFF has released an experimental router firmware designed make it easy to deploy open (password-less) access points in a secure manner. The EFF's firmware is based on the CeroWRT fork of OpenWRT, but appears to remove some of its more advanced routing features. The EFF is asking for help to further develop the firmware. They want the open access point to co-exist on the same router as your typical private and secured access point. They want the owner to be able to share bandwidth, but with a cap, so guests don't degrade service for the owner. They're also looking to develop a network queueing, a minimalist web UI, and an auto-update mechanism. The EFF has also released the beta version of a plug-in called Privacy Badger for Firefox and Chrome that will prevent online advertisers from tracking you.

Black Hat Presentation On Tor Cancelled, Developers Working on Bug Fix 52

alphadogg writes A presentation on a low-budget method to unmask users of a popular online privacy tool Tor will no longer go ahead at the Black Hat security conference early next month. The talk was nixed by the legal counsel with Carnegie Mellon's Software Engineering Institute after a finding that materials from researcher Alexander Volynkin were not approved for public release, according to a notice on the conference's website. Tor project leader Roger Dingledine said, "I think I have a handle on what they did, and how to fix it. ... Based on our current plans, we'll be putting out a fix that relays can apply that should close the particular bug they found. The bug is a nice bug, but it isn't the end of the world." Tor's developers were "informally" shown materials about the bug, but never saw any details about what would be presented in the talk.
United Kingdom

UK Users Overwhelmingly Spurn Broadband Filters 115

nk497 (1345219) writes "Broadband customers are overwhelmingly choosing not to use parental-control systems foisted on ISPs by the government — with takeup in the single-digits for three of the four major broadband providers. Last year, the government pushed ISPs to roll out network-level filters, forcing new customers to make an "active" decision about whether they want to use them or not. Only 5% of new BT customers signed up, 8% opted in for Sky and 4% for Virgin Media. TalkTalk rolled out a parental-control system two years before the government required it and has a much better takeup, with 36% of customers signing up for it. The report, from regulator Ofcom, didn't bother to judge if the filters actually work, however."

For Now, UK Online Pirates Will Get 4 Warnings -- And That's It 143

New submitter Tmackiller writes with an excerpt from The British government has decriminalised online video game, music and movie piracy, scrapping fuller punishment plans after branding them unworkable. Starting in 2015, persistent file-sharers will be sent four warning letters explaining their actions are illegal, but if the notes are ignored no further action will be taken. The scheme, named the Voluntary Copyright Alert Programme (VCAP), is the result of years of talks between ISPs, British politicians and the movie and music industries. The UK's biggest providers – BT, TalkTalk, Virgin and Sky – have all signed up to VCAP, and smaller ISPs are expected to follow suit. VCAP replaces planned anti-piracy measures that included cutting users' internet connections and creating a database of file-sharers. Geoff Taylor, chief executive of music trade body the BPI, said VCAP was about "persuading the persuadable, such as parents who do not know what is going on with their net connection." He added: "VCAP is not about denying access to the internet. It's about changing attitudes and raising awareness so people can make the right choice." Officials will still work to close and stem funding to file-sharing sites, but the news appears to mean that the British authorities have abandoned legal enforcement of online media piracy. Figures recently published by Ofcom said that nearly a quarter of all UK downloads were of pirated content." Tmackiller wants to know "Will this result in more private lawsuits against file sharers by the companies involved?"

A New Form of Online Tracking: Canvas Fingerprinting 194

New submitter bnortman (922608) was the first to write in with word of "a new research paper discussing a new form of user fingerprinting and tracking for the web using the HTML 5 <canvas> ." globaljustin adds more from an article at Pro Publica: Canvas fingerprinting works by instructing the visitor's Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user's device a number that uniquely identifies it. ... The researchers found canvas fingerprinting computer code ... on 5 percent of the top 100,000 websites. Most of the code was on websites that use the AddThis social media sharing tools. Other fingerprinters include the German digital marketer Ligatus and the Canadian dating site Plentyoffish. ... Rich Harris, chief executive of AddThis, said that the company began testing canvas fingerprinting earlier this year as a possible way to replace cookies ...

The Loophole Obscuring Facebook and Google's Transparency Reports 18

Jason Koebler writes The number of law enforcement requests coming from Canada for information from companies like Facebook and Google are often inaccurate thanks to a little-known loophole that lumps them in with U.S. numbers. For example, law enforcement and government agencies in Canada made 366 requests for Facebook user data in 2013, according to the social network's transparency reports. But that's not the total number. An additional 16 requests are missing, counted instead with U.S. requests thanks to a law that lets Canadian agencies make requests with the U.S. Department of Justice.

Activist Group Sues US Border Agency Over New, Vast Intelligence System 83

An anonymous reader writes with news about one of the latest unanswered FOIA requests made to the Department of Homeland Security and the associated lawsuit the department's silence has brought. The Electronic Privacy Information Center (EPIC) has sued the United States Customs and Border Protection (CBP) in an attempt to compel the government agency to hand over documents relating to a relatively new comprehensive intelligence database of people and cargo crossing the US border. EPIC's lawsuit, which was filed last Friday, seeks a trove of documents concerning the 'Analytical Framework for Intelligence' (AFI) as part of a Freedom of Information Act (FOIA) request. EPIC's April 2014 FOIA request went unanswered after the 20 days that the law requires, and the group waited an additional 49 days before filing suit. The AFI, which was formally announced in June 2012 by the Department of Homeland Security (DHS), consists of "a single platform for research, analysis, and visualization of large amounts of data from disparate sources and maintaining the final analysis or products in a single, searchable location for later use as well as appropriate dissemination."

Researcher Finds Hidden Data-Dumping Services In iOS 98

Trailrunner7 writes There are a number of undocumented and hidden features and services in Apple iOS that can be used to bypass the backup encryption on iOS devices and remove large amounts of users' personal data. Several of these features began as benign services but have evolved in recent years to become powerful tools for acquiring user data.

Jonathan Zdziarski, a forensic scientist and researcher who has worked extensively with law enforcement and intelligence agencies, has spent quite a bit of time looking at the capabilities and services available in iOS for data acquisition and found that some of the services have no real reason to be on these devices and that several have the ability to bypass the iOS backup encryption. One of the services in iOS, called mobile file_relay, can be accessed remotely or through a USB connection can be used to bypass the backup encryption. If the device has not been rebooted since the last time the user entered the PIN, all of the data encrypted via data protection can be accessed, whether by an attacker or law enforcement, Zdziarski said.
Update: 07/21 22:15 GMT by U L : Slides.

New York Judge OKs Warrant To Search Entire Gmail Account 150

jfruh writes While several U.S. judges have refused overly broad warrants that sought to grant police access to a suspect's complete Gmail account, a federal judge in New York State OK'd such an order this week. Judge Gabriel W. Gorenstein argued that a search of this type was no more invasive than the long-established practice of granting a warrant to copy and search the entire contents of a hard drive, and that alternatives, like asking Google employees to locate messages based on narrowly tailored criteria, risked excluding information that trained investigators could locate.

California In the Running For Tesla Gigafactory 172

An anonymous reader writes Thanks to some clean-energy tax incentives approved late this spring, California appears to be in the running again for Tesla's "Gigafactory". From the article: "The decision should have been made by now, and ground broken, according to the company's timeline, but is on hold, allowing California, which was not in the race initially — CEO Elon Musk has called California an improbable choice, citing regulations — to throw its hat in the ring. 'In terms of viability, California has progressed. Now it's a four-plus-one race,' said Simon Sproule, Tesla's vice president of global communication and marketing, referring to the four named finalists — Texas, Arizona, New Mexico and Nevada — for the prize. That's heartening. Having the Gigafactory would be a vindication of Gov. Jerry Brown's drive to make California the home of advanced manufacturing, of which Tesla's battery technology is a prime example. With its technology, 'Tesla may be in position to disrupt industries well beyond the realm of traditional auto manufacturing. It's not just cars,' a Morgan Stanley analyst told Quartz, an online business publication last year.

Snowden Seeks To Develop Anti-Surveillance Technologies 129

An anonymous reader writes Speaking via a Google Hangout at the Hackers on Planet Earth Conference, Edward Snowden says he plans to work on technology to preserve personal data privacy and called on programmers and the tech industry to join his efforts. "You in this room, right now have both the means and the capability to improve the future by encoding our rights into programs and protocols by which we rely every day," he said. "That is what a lot of my future work is going to be involved in."
United States

Ars Editor Learns Feds Have His Old IP Addresses, Full Credit Card Numbers 217

mpicpp writes with the ultimate results of Ars's senior business editor Cyrus Farivar's FOIA request. In May 2014, I reported on my efforts to learn what the feds know about me whenever I enter and exit the country. In particular, I wanted my Passenger Name Records (PNR), data created by airlines, hotels, and cruise ships whenever travel is booked. But instead of providing what I had requested, the United States Customs and Border Protection (CBP) turned over only basic information about my travel going back to 1994. So I appealed—and without explanation, the government recently turned over the actual PNRs I had requested the first time.

The 76 new pages of data, covering 2005 through 2013, show that CBP retains massive amounts of data on us when we travel internationally. My own PNRs include not just every mailing address, e-mail, and phone number I've ever used; some of them also contain: The IP address that I used to buy the ticket, my credit card number (in full), the language I used, and notes on my phone calls to airlines, even for something as minor as a seat change.

EPA Mulling Relaxed Radiation Protections For Nuclear Power 230

mdsolar sends this news from Forbes: Both proponents and opponents of nuclear power expect the Environmental Protection Agency in coming months to relax its rules restricting radiation emissions from reactors and other nuclear facilities. EPA officials say they have no such intention, but they are willing to reconsider the method they use to limit public exposure—and the public's level of risk.

At issue is a 1977 rule that limits the total whole-body radiation dose to any member of the public from the normal operation of the uranium fuel cycle—fuel processing, reactors, storage, reprocessing or disposal—to 0.25 millisieverts per year. (This rule, known as 40 CFR part 190, is different from other EPA regulations that restrict radionuclides in drinking water and that limit public exposure during emergencies. Those are also due for revision.) "We have not made any decisions or determined any specifics on how to move forward with any of these issues. We do, however, believe the regulation uses outdated science, and we are thinking about how to bring the regulation more in line with current thinking," said Brian Littleton, a chemical engineer with EPA's Office of Radiation and Indoor Air."

Drone Search and Rescue Operation Wins Fight Against FAA 77

An anonymous reader writes: Back in February, officials at the Federal Aviation Administration told a Texas search-and-rescue team they couldn't use drones help locate missing persons. The team, which is called EquuSearch, challenged the FAA in court. On Friday, the court ruled (PDF) in favor of EquuSearch, saying the FAA's directive was "not a formal cease-and-desist letter representing the agency's final conclusion." EquuSearch intends to resume using the drones immediately. This puts the FAA in the position of having to either initiate formal proceedings against EquuSearch, which is clearly operating to the benefit of society (as opposed to purely commercial drone use), or to revisit and finalize its rules for small aircraft entirely. The latter would be a lengthy process because "Congress has delegated rule making powers to its agencies, but the Administrative Procedures Act requires the agencies to provide a public notice and comment period first."

Japan To Offer $20,000 Subsidy For Fuel-Cell Cars 156

An anonymous reader writes "Toyota is on track to launch the first consumer fuel-cell car in Japan next year, and the country's Prime Minister says the government wants to assist the new alternative to gas-driven vehicles. Shinzo Abe announced that Japan will offer subsidies of almost $20,000 for fuel cell cars, which will decrease the Toyota model's cost by about 28%. He said, "This is the car of a new era because it doesn't emit any carbon dioxide and it's environmentally friendly. The government needs to support this. Honda is also planning to release a fuel-cell car next year, but experts expect widespread adoption to take decades, since hydrogen fuel station infrastructure is still in its infancy."

World Health Organization Calls For Decriminalization of Drug Use 474

An anonymous reader writes: We've known for a while: the War on Drugs isn't working. Scientists, journalists, economists, and politicians have all argued against continuing the expensive and ineffective fight. Now, the World Health Organization has said flat out that nations should work to decriminalize the use of drugs. The recommendations came as part of a report released this month focusing on the prevention and treatment of HIV. "The WHO's unambiguous recommendation is clearly grounded in concerns for public health and human rights. Whilst the call is made in the context of the policy response to HIV specifically, it clearly has broader ramifications, specifically including drug use other than injecting. In the report, the WHO says: 'Countries should work toward developing policies and laws that decriminalize injection and other use of drugs and, thereby, reduce incarceration. ...Countries should ban compulsory treatment for people who use and/or inject drugs." The bottom line is that the criminalization of drug use comes with substantial costs, while providing no substantial benefit.

Australian Website Waits Three Years To Inform Customers of Data Breach 35

AlbanX (2847805) writes Australian daily deals website Catch of the Day waited three years to tell its customers their email addresses, delivery addresses, hashed passwords, and some credit card details had been stolen. Its systems were breached in April 2011 and the company told police, banks and credit cards issuers, but didn't tell the Privacy Commissioner or customers until July 18th.
United Kingdom

UK Government Faces Lawsuit Over Emergency Surveillance Bill 44

judgecorp (778838) writes The British Government has had to produce an emergency surveillance Bill after the European Court of Justice ruled that European rules on retaining metadata were illegal. That Bill has now been passed by the House of Commons with almost no debate, and will become law if approved by the House of Lords. But the so-called DRIP (Data retention and Investigatory Powers) Bill could face a legal challenge: the Open Rights Group (ORG) is fundraising to bring a suit which would argue that blanket data retention is unlawful, so these emergency measures would be no more legal than the ones they replaced.

Appeals Court Affirms Old Polaroid Patent Invalid 45

mpicpp (3454017) writes with news of a notoriously abused (basically "method of displaying images on a machine") software patent being declared invalid. From the article: The ruling from last week is one of the first to apply new Supreme Court guidance about when ideas are too "abstract" to be patented. ... The patents in this case describe a type of "device profile" that allows digital images to be accurately displayed on different devices. US Patent No. 6,128,415 was originally filed by Polaroid in 1996. After a series of transfers, in 2012 the patent was sold to Digitech Image Technologies, a branch of Acacia Research Corporation, the largest publicly traded patent assertion company. ... In the opinion, a three-judge panel found that the device profile described in the patent is a "collection of intangible color and spatial information," not a machine or manufactured object. "Data in its ethereal, non-physical form is simply information that does not fall under any of the categories of eligible subject matter under section 101," wrote Circuit Judge Jimmie Reyna on behalf of the panel.