×
Censorship

South Park Game Censored On Consoles Outside North America 221

RogueyWon writes "South Park has long been vocal in its opposition to media censorship from any source, launching scathing attacks on everything from 'think of the children' moral crusades to the censorship of religious imagery. In a curious twist, therefore, Ubisoft, the publisher of the upcoming video game South Park: The Stick of Truth, has decided to censor certain scenes from the game's Xbox 360 and Playstation 3 versions from release in Europe, Australia, the Middle East and Africa. American versions, as well as the European PC release, so far appear to have escaped the censor's pen."
The Courts

Copyright Ruling On Publishing Calculated Results: Common Sense Breaks Out 54

bfwebster writes "During the past few years, I served as an IT expert witness in BanxCorp v. Costco et al., in which BanxCorp sued Costco and Capital One for citing (with credit) its web-published national averages for CD and money market rates in their advertising. Judge Kenneth M. Karas issued his summary judgment opinion last fall, finding that BanxCorp's published averages are 'uncopyrightable facts' due to the simple calculation involved and the lack of ongoing human judgment in what banks were involved. Here is my summary of his findings, along with a link to the actual ruling."
Privacy

NSA and GHCQ Employing Shills To Poison Web Forum Discourse 347

Advocatus Diaboli writes with this excerpt from an article by Glenn Greenwald on the pervasiveness of shills poisoning web forums: "One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It's time to tell a chunk of that story, complete with the relevant documents.. ... Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the Internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: 'false flag operations' (posting material to the Internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting 'negative information' on various forums." I guess Cryptome was right. Check out the the training materials provided to future forum spies.
Crime

DARPA Looks To End the Scourge of Counterfeit Computer Gear 75

coondoggie writes "Few things can mess up a highly technical system and threaten lives like a counterfeit electronic component, yet the use of such bogus gear is said to be widespread. A new Defense Advanced Research Projects Agency (DARPA) program will target these phony products and develop a tool to 'verify, without disrupting or harming the system, the trustworthiness of a protected electronic component.'"
Books

Ghostwriter Reveals the Secret Life of WikiLeaks Founder Julian Assange 359

An anonymous reader writes "From the Telegraph, 'He is vain, secretive, paranoid and jealous, prone to leering at young women and making frequent sexist jokes – and that's not the view of one of his many enemies, but of a friend ... A damning picture of Julian Assange ... has emerged in a detailed account by his ghostwriter. Assange behaves ... like an egotistical tyrant interested more in his own self-publicity than in changing the world. Worse still, he turns on his friends with increasing regularity ... Assange describes the Ecuadorean ambassador offering him diplomatic asylum as 'mad', 'fat' and 'ludicrous'. Even Assange's girlfriend, WikiLeaks researcher Sarah Harrison, grew increasingly frustrated at his behaviour. 'He openly chats girls up and has his hands on their a**e and goes nuts if I even talk to another guy,' she says. O'Hagan, who had hoped to find an anti-authoritarian rebel figure worthy of admiration, says he comes to regard Assange as someone who sacrificed the moral high-ground by attempting to evade trial over the rape charges.' — The Scotsman adds, 'Canongate director Jamie Byng yesterday hailed O'Hagan's account of the "impossibility of trying to ghost Assange's memoirs". He tweeted: "Andy O'Hagan's compelling, ring side account of Being (& being around) Julian Assange is smart, accurate and fair."'"
The Courts

Why Copyright Trolling In Canada Doesn't Pay 98

An anonymous reader writes "In the aftermath of the Canadian file sharing decision involving Voltage Pictures that includes an order to disclose thousands of subscriber names, the big question is what comes next. Michael Geist examines the law and economics behind file sharing litigation in Canada and concludes that copyright trolling doesn't pay as the economics of suing thousands of Canadians for downloading a movie for personal purposes is likely to lead to hundreds of thousands in losses for rights holders."
The Internet

NY State Grants $9M For Upstate Broadband Projects 36

An anonymous reader writes "According to a news report, New York State is giving about $9 million in grants to give broadband connection to 33,000 households and 4,500 businesses in rural areas of the state. This works out to $240 per connection. This second round of grants by Empire State Development is part of a Cuomo administration program to reach more than 500,000 residents with no high-speed Internet access, many in rural areas."
Businesses

Exxon Mobile CEO Sues To Stop Fracking Near His Texas Ranch 317

Hugh Pickens DOT Com writes "Exxon Mobile's CEO Rex Tillerson's day job is to do all he can to protect and nurture the process of hydraulic fracturing—aka 'fracking'—so that his company can continue to rake in billions via the production and sale of natural gas. 'This type of dysfunctional regulation is holding back the American economic recovery, growth, and global competitiveness,' said Tillerson in 2012 of attempts to increase oversight of drilling operations. But now Rick Unger reports at Forbes that Tillerson has joined a lawsuit seeking to shut down a fracking project near his Texas ranch. Why? Because the 160 foot water tower being built next to Tillerson's house that will supply the water to the near-by fracking site, means the arrival of loud trucks, an ugly tower next door, and the general unpleasantness that will interfere with the quality of his life and the real estate value of his sizeable ranch. The water tower is being built by Cross Timbers Water Supply Corp., a nonprofit utility that has supplied water to the region for half a century. Cross Timbers says that it is required by state law to build enough capacity to serve growing demand. In 2011, Bartonville denied Cross Timbers a permit to build the water tower, saying the location was reserved for residences. The water company sued, arguing that it is exempt from municipal zoning because of its status as a public utility. In May 2012, a state district court judge agreed with Cross Timbers and compelled the town to issue a permit. The utility resumed construction as the town appealed the decision. Later that year, the Tillersons and their co-plaintiffs sued Cross Timbers, saying that the company had promised them it wouldn't build a tower near their properties. An Exxon spokesman said Tillerson declined to comment. The company 'has no involvement in the legal matter' and its directors weren't told of Mr. Tillerson's participation, the spokesman said."
Microsoft

Lumia Phones Leaking Private Data To Microsoft 110

New submitter Albietta writes "Two independent sources inside Nokia have confirmed that Nokia Lumia phones send private information to Nokia and Microsoft servers around the world. Location data, SMS-messages and browser identification is uploaded. The Nokia leadership has known about the privacy violation since 2011 when the Lumia phones were introduced. In spring 2013, after suspicions of leaks and during the negotiations for selling off the mobile phone branch to Microsoft, the Finnish state communications department sent an inquiry to Nokia regarding leaking of private data, asking Nokia to assure that users' private data is not leaked. Nokia did not want to (or could not) provide an assurance due to the delicate business negotiations. After two more inquiries with narrower demands, Nokia assured that the phone, excluding third-party software such as the operating system, did not violate Finnish privacy laws. Microsoft is apparently also following Lumia user accounts. On one occasion a parent's Lumia account was closed without warning when they uploaded pictures from the phone displaying their kids playing naked on the beach at their summer cottage."
Crime

Indian Hustle: How Fraudsters Prey On Would-be US Tech Workers 124

New submitter angel115 points out this article on the widespread fraud committed in India against many thousands of those seeking visas to work in the U.S. Many Indian techies rely on the services of visa brokers (or people who claim to be), and end up burned by the transaction. From the article: "Some are lucky enough to get a visa — only to find that the promised job in the US doesn’t materialize. Then the visa holders are forced to return to India after spending thousands of dollars just surviving. ... No official figures are available for the number of frauds in India, but an unclassified document released by Wikileaks showed that in 2009, US consular officials cited H-1B scams as one of the two most common fraud categories in India." Another interesting detail: As part of a U.S. government investigation, "Officers investigated 150 companies in the city and discovered that 77 percent 'turned out to be fraudulent or highly suspect.' ... Officials uncovered a scheme where Hyderabadis were claiming to work for made-up companies in Pune so the Mumbai consulate would be less suspicious about their applications. 'The Hyderabadis claimed that they had opened shell companies in Bangalore because "everyone knows Hyderabad has fraud and Bangalore is reputable,” according to the internal communiqué [later published by Wikileaks]."
Crime

Slashdot Asks: Do You Label Your Tech Gear, and If So, How? 250

At last month's CES, I mislaid a microphone that I'd just bought: too many items in little black pouches, and that one disappeared on a patch of dark carpet when I got something else out of my bag. A few minutes later, when I realized this, I walked back to find (no shocker) that it had walked away, and the lost mic somehow never made it to the Lost & Found office. Dumb as I felt for having let it get away, the real sting is knowing that I didn't so much as have my name on it, which I like to think might have nudged a morally ambivalent finder into returning it. My question is this: How do you personalize, label, or mark your expensive tech goodies, so it's harder for them to be innocently or less-innocently taken away? Even at a LAN party, it's easy for items to get swapped around and confused. I've sometimes put my name or initials (in permanent ink) on any flat surface I can find that will fit it, but even the "permanent" ink of Sharpies seems to fade on many surfaces. Stickers degrade with heat, time, and bag jostling, but they certainly help. Is engraving the best permanent option? Have you used one of the physical tag services, like Boomerang, and has that ever actually come in handy for you? There's theft-deterrent (or at least post-theft tracking) software, as we've mentioned a few times on Slashdot, but many things aren't suited to it, like my lost mic. What do you do to keep your stuff yours?
Microsoft

"Microsoft Killed My Pappy" 742

theodp writes "A conversation with an angry young developer prompts Microsoft Program Manager Scott Hanselman to blog about 'Microsoft Haters: The Next Generation.' 'The ones I find the most interesting,' says Hanselman, are the 'Microsoft killed my Pappy' people, angry with generational anger. My elders hated Microsoft so I hate them. Why? Because, you wronged me.' The U.S. and Japan managed to get over the whole World War II thing, Hanselman notes, so why can't people manage to get past the Microsoft antitrust thing, which was initiated in 1998 for actions in 1994? 'At some point you let go,' he suggests, 'and you start again with fresh eyes.' Despite the overall good-humored, why-can't-we-get-along tone of his post, Hanselman can't resist one dig that seems aimed at putting things into perspective for those who would still Slashdot like it's 1999: 'I wonder if I can swap out Chrome from Chrome OS or Mobile Safari in iOS.'"
Censorship

Internet Shutdown Adds To Venezuela's Woes 194

Slashgear reports that many state-run internet links in Venezuela have been shut down by that country's government, as censorship efforts there step up along with widespread turmoil, partly in the form of widespread anti-government protests. The article begins: "Don’t expect one whole heck of a lot of tweets coming out of Venezuela in the immediate future as President Nicolas Maduro’s government has shut down the internet and select TV channels. Having shut down Twitter access for the area this past week, Venezuela’s state-run ISP CANTV has been cut in areas such as San Cristobal. This area is a regional capital in the west of the country and CANTV controls the vast majority of internet connectivity in the area. The Electronic Frontier Foundation made note that Venezuelans working with several different ISPs lost all connectivity on Thursday of this past week. Users lost connectivity to the major content delivery network Edgecast and the IP address which provides access to Twitter’s image hosting service while another block stopped Venezuelan access to the text-based site Pastebin."
Privacy

Microsoft Lync Server Gathers Employee Data Just Like NSA 207

coondoggie writes "Microsoft's Lync communications platform gathers enough readily analyzable data to let corporations spy on their employees like the NSA can on U.S. citizens, and it's based on the same type of information — call details. At Microsoft's Lync 2014 conference, software developer Event Zero detailed just how easy it would be, for instance, to figure out who is dating whom within the company and pinpoint people looking for another job."
Education

All In All, Kids Just Another Brick In the Data Wall 110

theodp writes "If you don't have kids of school age, you may not be aware that Data Walls — typically a low-tech "dashboard" of color-coded sticky notes on a wall bearing the names of pupils to highlight their achievement level, absences, or discipline problems — are apparently quite the rage. This is much to the chagrin of some teachers, including Peter A. Greene, who rails against the walls-of-shame in Up Against the Data Wall. Why stop there, Greene asks, tongue-in-cheek. Why not have data-driven dress codes? Data-driven recess? Pooh-poohing concerns of teachers who think Data Walls are mean but feel pressure to create them, the Supt. of Holyoke Public Schools said, "It's not a mandate whatsoever." Still, he went on to add, "I would say 99 percent of teachers see the benefit of it," which some might take as an implicit mandate. In other student privacy news, New York's Supreme Court has ruled that parental permission is not required to disclose student data to the Bill and Melinda Gates Foundation-funded inBloom, perhaps paving the way for the Great Data Wall of the U.S."
Communications

Steve Jobs To Appear On US Postage Stamp 184

Hugh Pickens DOT Com writes "Steven Musil writes at Cnet that the US Postal Service hopes Steve Jobs can do for it what he once did for Apple as the late Apple co-founder will be featured on a commemorative US postage stamp along with Johnny Carson, Ingrid Bergman, Elvis Presley, and James Brown. The former Apple CEO's stamp is still in the design stages and will be released at some point in 2015. Jobs, who passed away in 2011 after a battle with pancreatic cancer, has also been posthumously honored for his visionary achievements with a special Grammy Merit Award and a Disney Legends Award. Jobs was also inducted into the Bay Area Business Hall of Fame, has had a building at Pixar named after him, and was featured in an exhibit at the US Patent Office Museum. "The profitable first class mail business has been decimated by email over the past decade, thanks in no small part to the contributions of Steve Jobs and Apple," writes Derek Kessler. "It's no small feat to be so impactful that the USPS feels compelled to honor you despite the fact that the work that you've done is dismantling the core of their business.""
Privacy

Why Is Dropbox Back On the Chinese Market? 46

Nerval's Lobster writes "Dropbox has renewed access to the Chinese market for the first time in four years. But why? The Chinese government first blocked access to Dropbox in 2010, most likely to prevent people within China from sharing data via the cloud. Now Dropbox is back online in China, albeit at slower speeds. Despite repeated queries from Slashdot, however, Dropbox has declined to comment on why China may have dropped the in-country restrictions to its services. "We still have nothing to share," the company responded after the third email. Dropbox isn't the only foreign cloud service available on the Chinese market (although Google Drive remains blocked): in late 2013, Amazon announced it would open an Amazon Web Services (AWS) region in the country; at the time, the Amazon Web Services Blog alluded to the "legal and regulatory requirements" that this new AWS region will obey. So questions remain: Did Dropbox know it would regain entry to the Chinese market? If so, did it need to agree to certain conditions before the Chinese government would "flip the switch," as it were?"
The Courts

Canadian Court Tries to Dampen Copyright Trolls In P2P Lawsuits 60

An anonymous reader writes "The Canadian federal court has released its much-anticipated decision in Voltage Pictures v. Does, a case involving demands that TekSavvy, a leading independent ISP, disclose the identities of roughly 2,000 subscribers alleged to have downloaded movies without authorization. Michael Geist notes that the court was sensitive to the copyright troll concern, noting that 'given the issues in play the answers require a delicate balancing of privacy rights versus the rights of copyright holders. This is especially so in the context of modern day technology and users of the Internet.' In order to strike the balance, the court required full court approval of the content of any demand letters and bold warnings that no court had found a recipient liable for any damages."
Bug

Stack Overflow Could Explain Toyota Vehicles' Unintended Acceleration 664

New submitter robertchin writes "Michael Barr recently testified in the Bookout v. Toyota Motor Corp lawsuit that the likely cause of unintentional acceleration in the Toyota Camry may have been caused by a stack overflow. Due to recursion overwriting critical data past the end of the stack and into the real time operating system memory area, the throttle was left in an open state and the process that controlled the throttle was terminated. How can users protect themselves from sometimes life endangering software bugs?"
Privacy

We Can Avoid a Surveillance State Dystopia 267

An anonymous reader writes "After the past year's revelations about NSA spying, it's hard to read any commentary about society without dire warnings of the coming (or already present) surveillance state. Sci-fi author Ramez Naam makes the point that while government surveillance needs to be fought, it's actually not as bad as what we were promised in decades past. 'Aldous Huxley published Brave New World in 1932. And while Brave New World is remembered more for predicting government-controlled biological engineering of the masses, it also features government surveillance, media manipulation, and thought control. This is an old idea. Yet somehow, today, in most of the world, governments have dramatically less control over their people than they did when Huxley and Orwell wrote those words. Indeed, the average person on Earth is more free today, in 2014, than he or she would have been in the actual year 1984. The arc of history has bent towards more freedom.' Naam also explains that the technological advances allowing the bulk collection of personal data also provide us with cheap and easy means to fight government overreach."

Slashdot Top Deals