×
The Courts

Supreme Court Decides Your Silence May Be Used Against You 662

crackspackle writes "The Supreme Court ruled in favor of the State of Texas earlier today in a murder trial where the defendant, prior to be taken into custody, had been questioned by the police and chose to remain silent on key questions. This fact was bought up at trial and used to convict him. Most of us have seen at least enough cop shows to know police must read a suspect their Miranda rights when placing them in custody. The issue was a bit murkier here in that the defendant had not yet been detained and while we all probably thought the freedom from self-incrimination was an implicit right as stated in the Constitution, apparently SCOTUS now thinks you have to claim that right or at least be properly mirandized first." It appears that if you are "free to leave at any time" you lose a few rights. Fancy trick, up there with getting kids to write apology letters.
Privacy

State Photo-ID Databases Mined By Police 205

Rick Zeman writes "Showing once again that once a privacy door is opened every law enforcement agency will run through it, The Washington Post details how state drivers license photo databases are being mined by various LEOs in their states--and out. From the article: '[L]aw enforcement use of such facial searches is blurring the traditional boundaries between criminal and non-criminal databases, putting images of people never arrested in what amount to perpetual digital lineups. The most advanced systems allow police to run searches from laptop computers in their patrol cars and offer access to the FBI and other federal authorities. Such open access has caused a backlash in some of the few states where there has been a public debate. As the databases grow larger and increasingly connected across jurisdictional boundaries, critics warn that authorities are developing what amounts to a national identification system — based on the distinct geography of each human face.'"
Biotech

DNA Fog Helps Identify Trespassers, Thieves, and Brigands 129

Zothecula writes "Applied DNA Sciences (ADNAS) has developed a new approach to solve crimes using DNA tagging. The difference is that instead of tagging the objects being stolen, the company's system tags the perpetrator with DNA. While this has been tried before by applying the DNA to a fleeing criminal with a gun, ADNAS has adopted a more subtle approach."
Privacy

Apple Details US Requests For Customer Data 116

An anonymous reader writes "Not to be left out Apple has released details about government requests for customer data. The company said it received between 4,000-5,000 government requests, affecting as many as 10,000 accounts or devices. From the article: 'The iPad maker said that it received between 4,000 and 5,000 requests from U.S. law enforcement agencies for customer data from December 1, 2012 to May 31, 2013, and that 9,000 to 10,000 accounts or devices were specified in the requests. Apple did not state how many of the requests were from the National Security Agency or how many affected accounts or devices may have been tied to any NSA requests.' Facebook and Microsoft released their numbers this weekend."
United States

Officials Say NSA Probed Fewer Than 300 Numbers - Broke Plots In 20 Nations 419

cold fjord writes "Yet more details about the controversy engulfing the NSA. From CNET: 'Rep. Mike Rogers (R-Mich.), chairman of the House Intelligence Committee, explained how the program worked without violating individuals' civil rights. "We take the business records by a court order, and it's just phone numbers — no names, no addresses — put it in a lock box," Rogers told CBS News' "Face The Nation." "And if they get a foreign terrorist overseas that's dialing in to the United Sates, they take that phone number... they plug it into this big pile, if you will, of just phone numbers — it's like a phonebook without any names and any addresses with it — to see if there's a connection, a foreign terrorist connection to the United States." "When a number comes out of that lock box, it's just a phone number — no names, no addresses," he said. "If they think that's relevant to their counterterrorism investigation, they give that to the FBI. Then upon the FBI has to go out and meet all the legal standards to even get whose phone number that is."' From the AP: ' ... programs run by the National Security Agency thwarted potential terrorist plots in the U.S. and more than 20 other countries — and that gathered data is destroyed every five years. Last year, fewer than 300 phone numbers were checked against the database of millions of U.S. phone records ... the intelligence officials said in arguing that the programs are far less sweeping than their detractors allege.... both NSA programs are reviewed every 90 days by the secret court authorized by the Foreign Intelligence Surveillance Act. Under the program, the records, showing things like time and length of call, can only be examined for suspected connections to terrorism, they said. The ... program helped the NSA stop a 2009 al-Qaida plot to blow up New York City subways.'"
AI

Google Aims To Cull Child Porn By Algorithm, Not Human Review 306

According to a story at VentureBeat, "Google is working on a new database of flagged images of child porn and abuse that can be shared with other search engines and child protection organizations. The database will help create systems that automatically eliminate that sort of content. ... If the database is used effectively, any flagged image in the database would not be searchable through participating search engines or web hosting providers. And maybe best of all, computers will automatically flag and remove these images without any human needing to see them." Here's the announcement.
Censorship

Saudi Arabia Set To Ban WhatsApp, Skype 122

Reuters reports that Saudi Arabia's government, after banning Viber within the kingdom, is poised to prohibit at least two other such communication apps: Skype and WhatsApp. Says the article: "Conventional international calls and texts are a lucrative earner for telecom operators in Saudi Arabia, which hosts around nine million expatriates. These foreign workers are increasingly using Internet-based applications such as Viber to communicate with relatives in other countries, analysts say." With fewer legal options, a wide-scale Internet censorship regime would be easier to implement, too.
Government

Microsoft Antitrust Judge Thomas Penfield Jackson Dead at 76 193

McGruber writes "The NY Times has the news that federal judge Thomas Penfield Jackson, who ruled in 2000 that Microsoft was a predatory monopoly and must be split in half, has died. He was 76 years old. 'A technological novice who wrote his opinions in longhand and used his computer mainly to e-mail jokes, Judge Jackson refuted Microsoft's assertion that it was impossible to remove the company's Internet Explorer Web browser from its operating system by doing it himself. When a Microsoft lawyer complained that too many excerpts from Bill Gates's videotaped deposition — liberally punctuated with the phrase "I don't remember" — were shown in the courtroom, Judge Jackson said, "I think the problem is with your witness, not the way his testimony is being presented."'"
Communications

Revealed: How the UK Spied On Its G20 Allies At London Summits 262

Writing "Wow, this is going to really set the cat amongst the pigeons once this gets around," an anonymous reader links to a story at The Guardian about some good old fashioned friendly interception, and the slide-show version of what went on at recent G20 summits in London: "Foreign politicians' calls and emails intercepted by UK intelligence; Delegates tricked into using fake internet cafes; GCHQ analysts sent logs of phone calls round the clock; Documents are latest revelations from whistleblower Edward Snowden."
United Kingdom

ISPs To Censor Porn By Default In the UK By 2014 310

An anonymous reader writes "Parental filters for pornographic content will come as a default setting for all homes in the UK by the end of 2013, says David Cameron's special advisor on preventing the sexualization and commercialization of childhood, Claire Perry MP. Internet service providers will be expected to provide filtering technology to new and existing customers with an emphasis on opting out, rather than opting in."
Cellphones

AT&T Rolls Out iPhone Wireless Emergency Alerts 199

First time accepted submitter TigerPlish writes "AT&T has rolled out Wireless Emergency Alerts for iPhones. The alerts are for huge catastrophes (a Presidential Alert), for weather / natural calamities, and for AMBER alerts. One can turn off the latter two, but the Presidential alert cannot be turned off. The article mentions only 4S and 5 get this update. That said, I have a 4 and it got the update this morning. This was enacted in 2006, for those keeping track of such things. I, for one, do not care for this any more than I like the idea of them reading my communications to begin with. Oh, I'm sorry, the "metadata" from my communications." As promised.
IBM

SCO v. IBM Is Officially Reopened 104

stoilis writes "Groklaw reports that the SCO vs IBM case is officially reopened: 'The thing that makes predictions a bit murky is that there are some other motions, aside from the summary judgment motions, that were also not officially decided before SCO filed for bankruptcy that could, in SCO's perfect world, reopen certain matters. I believe they would have been denied, if the prior judge had had time to rule on them. Now? I don't know.'"
Privacy

Snowden NSA Claims Partially Confirmed, Says Rep. Jerrold Nadler 337

bill_mcgonigle writes with this news from from CNET: "Rep. Jerrold Nadler (D NY) disclosed that NSA analysts eavesdrop on Americans' domestic telephone calls without court orders during a House Judiciary hearing. After clearing with FBI director Robert Mueller that the information was not classified, Nadler revealed that during a closed-door briefing to Congress, the Legislature was informed that the spying organization had implemented and uses this capability. This appears to confirm Edward Snowden's claim that he could, in his position at the NSA, 'wiretap anyone from you or your accountant to a federal judge to even the president.' Declan McCullagh writes, 'Because the same legal standards that apply to phone calls also apply to e-mail messages, text messages, and instant messages, Nadler's disclosure indicates the NSA analysts could also access the contents of Internet communications without going before a court and seeking approval.' The executive branch has defended its general warrants, claiming that 'the president had the constitutional authority, no matter what the law actually says, to order domestic spying without [constitutional] warrants,' while Kurt Opsahl, senior staff attorney at EFF claims such government activity 'epitomizes the problem of secret laws.'" Note that "listening in" versus "collecting metadata" is a distinction that defenders of government phone spying have been emphasizing. Tracking whom you called and when, goes the story, doesn't impinge on expectations of privacy. Speaking of the metadata collection, though, reader Bruce66423 writes "According to the Washington Post, the Bush administration took 'bulk metadata' from the phone companies under voluntary agreements for more than four years after 9/11 until a court agreed they could have it compulsorily." Related: First time accepted submitter fsagx writes that Brewster Kahle of the Internet Archive has calculated the cost to store every phone call made in the U.S. over the course of a year: "It's surprisingly inexpensive. It puts the recent NSA stories (and reports from the Boston bombings about the FBI's ability to listen to past phone conversions) into perspective."
The Courts

Ortiz-Heymann: the Prior Generation 57

theodp writes "Two decades before the White House was petitioned to remove U.S. Attorney Carmen Ortiz and her Assistant U.S. Attorney Stephen Heymann from their jobs for the allegedly overzealous prosecution of Aaron Swartz, the Boston Globe reported on allegations of 'sometimes heavy-handed tactics and inaccuracies' of an NFL investigation into sexual harassment charges made by a sportswriter against the New England Patriots that was led by Watergate prosecutor Philip Heymann (Stephen's father) and included Ortiz. 'From the day Philip Heymann and his colleagues walked into Foxboro Stadium to investigate Lisa Olson's charges of sexual harassment,' the Globe reported, 'the New England Patriots were on the defensive, and apparently, they stayed there to the end. One day after conducting a preliminary six-hour interview with Olson, Heymann introduced each investigator to the Patriots and outlined their backgrounds at a meeting he later called benign. Yet he also said two weeks ago, "They were frightened from the beginning by the way I introduced people. I said that Jerry O'Sullivan had been US Attorney. I said Jim Ring had been FBI special agent in charge of organized crime."'

Regarding Ortiz, the Globe reported, 'Heymann investigator Carmen Ortiz wrote in a memo of her Oct. 18, 1990, interview with [Lisa Olson] that she took no notes and did not tape-record the conversation. Yet she used direct quotes when writing up her 15-page report on the session. When asked to explain, she referred the Globe to Heymann.' Aside from transcripts of two interviews (the tapes of which were destroyed), the Globe reported the NFL kept no notes on its interviews with 89 other people. '"It was contemplated that there would be a motion such as this [a lawsuit by Olson] and we did not want to create that type of document," an NFL attorney explained. According to the Globe, an attorney representing the Patriots said that 'one reason the tapes were destroyed may be that the NFL did not want anyone to hear raised voices or pounding of tables. He said some of those interviewed were not allowed to leave the room and had their livelihoods threatened if they did not cooperate.' Curiously, the elder Heymann featured prominently in a recently-upheld DOJ motion to keep the names of key people involved in the Aaron Swartz case secret — a postcard threat received by Philip Heymann was cited by Ortiz's office as evidence of why such secrecy was necessary."
Facebook

Facebook and Microsoft Disclose Government Requests For User Data 140

wiredmikey writes "Facebook and Microsoft say they received thousands of requests for information from U.S. authorities last year but are prohibited from listing a separate tally for security-related requests or secret court orders related to terror probes. The two companies have come under heightened scrutiny since reports leaked of a vast secret Internet surveillance program U.S. authorities insist targets only foreign terror suspects and is needed to prevent attacks. Facebook said Friday it had received between 9,000 and 10,000 requests for user data affecting 18,000 to 19,000 accounts during the second half of last year and Microsoft said it had received 6,000 to 7,000 requests affecting 31,000 to 32,000 accounts during the same period." Meanwhile, an article at the Guardian is suggesting the government may have better targets to pursue than Edward Snowden. "[U.S. director of national intelligence James Clapper] has come out vocally to condemn Snowden as a traitor to the public interest and the country, yet a review of Booz Allen's own history suggests that the government should be investigating his former employer, rather than the whistleblower."
Television

Legislators Introduce Bill To Stop Set Top Boxes From Watching You 161

An anonymous reader writes "For a few years now, we've been hearing about TV-related devices that have built-in cameras and microphones. Their stated purpose is to monitor consumers and gather data — often to target advertising. (We'll set aside any unstated purposes — the uses they tell us about are bad enough.) Now, two members of the U.S. House of Representatives have submitted legislation to regulate this sort of technology. '[They] said they want to get out ahead of the release of this new technology and pass legislation that ensures it would include beefed up privacy protections for consumers. They added that this legislation is particularly relevant given the recent revelations about the National Security Agency's Internet surveillance programs. ... Additionally, the bill requires a cable box or set-top device to notify consumers when the monitoring technology is activated and in use by posting the phrase "We are watching you" across their TV screens.'"
Government

Kickass Torrents' KAT.ph Domain Seized By Philippine Authorities 122

hypnosec writes "Kickass Torrents hasn't been accessible since sometime yesterday, and now it has been confirmed that the domain name of the torrent website has been seized by Philippine authorities. Local record labels and the Philippine Association of the Recording Industry said that the torrent site was doing 'irreparable damages' to the music industry and following a formal complaint the authorities resorted to seizure of the main domain name. The site hasn't given up, and is operating as usual under a new domain name. The government of the Philippines has confirmed that the domain name has been seized based on formal complaints and copyright grounds."
Security

Confirmed: CBS News Reporter's Computer Compromised 176

New submitter RoccamOccam writes "Shortly after the news broke that the Department of Justice had been secretly monitoring the phones and email accounts of Associated Press and Fox News reporters (and the parents of Fox News Correspondent James Rosen), CBS News' Sharyl Attkisson said her computer seemed like it had been compromised. Turns out, it was. 'A cyber security firm hired by CBS News has determined through forensic analysis that Sharyl Attkisson's computer was accessed by an unauthorized, external, unknown party on multiple occasions late in 2012. Evidence suggests this party performed all access remotely using Attkisson's accounts. While no malicious code was found, forensic analysis revealed an intruder had executed commands that appeared to involve search and exfiltration of data.'"
Security

FDA Calls On Medical Devicemakers To Focus On Cybersecurity 40

alphadogg writes "Medical device makers should take new steps to protect their products from malware and cyberattacks or face the possibility that U.S. Food and Drug Administration won't approve their devices for use, the FDA said. The FDA issued new cybersecurity recommendations for medical devices on Thursday, following reports that some devices have been compromised. Recent vulnerabilities involving Philips fetal monitors and in Oracle software used in body fluid analysis machines are among the incidents that prompted the FDA to issue the recommendations."

Slashdot Top Deals