Earth

Doomsday Clock Could Move 145

Posted by samzenpus
from the closer-to-midnight dept.
Lasrick writes The ominous minute hand of the 'Doomsday Clock' has been fixed at 5 minutes to midnight for the past three years. But it could move tomorrow. The clock is a visual metaphor that was created nearly 70 years ago by The Bulletin of the Atomic Scientists, whose Board of Governors boasts 18 Nobel laureates. Each year, the Bulletin's Science and Security Board assesses threats to humanity — with special attention to nuclear warheads and climate change — to decide whether the Doomsday Clock needs an adjustment. The event will be streamed live from the Bulletin's website at 11 am EST.
Crime

Silk Road 2.0 Deputy Arrested 126

Posted by samzenpus
from the book-him dept.
An anonymous reader writes With the Ulbricht trial ongoing in a case over the original Silk Road, Homeland Security agents have made another arrest in the Silk Road 2.0 case more than two and a half months after the site was shut down. This time they arrested Brian Richard Farrell who went by the moniker "DoctorClu." From the article: "Homeland Security agents tracked Silk Road 2.0 activity to Farrell's Bellevue home in July, according to an affidavit by Special Agent Michael Larson. In the months that followed, agents watched his activities and interviewed a roommate who said Farrell received UPS, FedEx and postal packages daily. One package was found to contain 107 Xanax pills, Larson said. That led to a search on Jan. 2 that recovered computers, drug paraphernalia, silver bullion bars worth $3,900, and $35,000 in cash, Larson said."
Earth

US Senate Set To Vote On Whether Climate Change Is a Hoax 666

Posted by samzenpus
from the who's-to-blame dept.
sciencehabit writes The U.S. Senate's simmering debate over climate science has come to a full boil today, as lawmakers prepare to vote on measures offered by Democrats that affirm that climate change is real—with one also noting that global warming is not "a hoax." In an effort to highlight their differences with some Republicans on climate policy, several Democrats have filed largely symbolic amendments to a bill that would approve the Keystone XL pipeline. They are designed to put senators on the record on whether climate change is real and human-caused.
Advertising

Healthcare.gov Sends Personal Data To Over a Dozen Tracking Websites 204

Posted by Soulskill
from the a-bit-too-standard dept.
An anonymous reader tips an Associated Press report saying that Healthcare.gov is sending users' personal data to private companies. The information involved is typical ad-related analytic data: "...it can include age, income, ZIP code, whether a person smokes, and if a person is pregnant. It can include a computer's Internet address, which can identify a person's name or address when combined with other information collected by sophisticated online marketing or advertising firms." The Electronic Frontier Foundation confirmed the report, saying that data is being sent from Healthcare.gov to at least 14 third-party domains.

The EFF says, "Sending such personal information raises significant privacy concerns. A company like Doubleclick, for example, could match up the personal data provided by healthcare.gov with an already extensive trove of information about what you read online and what your buying preferences are to create an extremely detailed profile of exactly who you are and what your interests are. It could do all this based on a tracking cookie that it sets which would be the same across any site you visit. Based on this data, Doubleclick could start showing you smoking ads or infer your risk of cancer based on where you live, how old you are and your status as a smoker. Doubleclick might start to show you ads related to pregnancy, which could have embarrassing and potentially dangerous consequences such as when Target notified a woman's family that she was pregnant before she even told them. "
Privacy

Police Nation-Wide Use Wall-Penetrating Radars To Peer Into Homes 290

Posted by timothy
from the shoot-anything-that-looks-like-a-blob dept.
mi writes At least 50 U.S. law enforcement agencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside. The device the Marshals Service and others are using, known as the Range-R, looks like a sophisticated stud-finder. Its display shows whether it has detected movement on the other side of a wall and, if so, how far away it is — but it does not show a picture of what's happening inside. The Range-R's maker, L-3 Communications, estimates it has sold about 200 devices to 50 law enforcement agencies at a cost of about $6,000 each. Other radar devices have far more advanced capabilities, including three-dimensional displays of where people are located inside a building, according to marketing materials from their manufacturers. One is capable of being mounted on a drone. And the Justice Department has funded research to develop systems that can map the interiors of buildings and locate the people within them.
Communications

FBI Seeks To Legally Hack You If You're Connected To TOR Or a VPN 382

Posted by timothy
from the well-you-look-guilty-from-here dept.
SonicSpike writes The investigative arm of the Department of Justice is attempting to short-circuit the legal checks of the Fourth Amendment by requesting a change in the Federal Rules of Criminal Procedure. These procedural rules dictate how law enforcement agencies must conduct criminal prosecutions, from investigation to trial. Any deviations from the rules can have serious consequences, including dismissal of a case. The specific rule the FBI is targeting outlines the terms for obtaining a search warrant. It's called Federal Rule 41(b), and the requested change would allow law enforcement to obtain a warrant to search electronic data without providing any specific details as long as the target computer location has been hidden through a technical tool like Tor or a virtual private network. It would also allow nonspecific search warrants where computers have been intentionally damaged (such as through botnets, but also through common malware and viruses) and are in five or more separate federal judicial districts. Furthermore, the provision would allow investigators to seize electronically stored information regardless of whether that information is stored inside or outside the court's jurisdiction.
Cellphones

Moscow To Track Cell-phone Users In 2015 For Traffic Analysis 63

Posted by timothy
from the why-do-you-hate-freedom? dept.
An anonymous reader links to this story at The Stack (based on this translated report) that "The Moscow authorities will begin using the signal from Muscovites' cell-phones in 2015 to research patterns of traffic and points of congestion, with a view to changes in travel infrastructure including roads, the Moscow metro and bus services. The tracking, which appears to opt all users in unilaterally, promises not to identify individual cell-phone numbers, and will use GSM in most cases, but also GPS in more densely-constructed areas of the old city. The system is already in limited use on the roads, but will be extended to pedestrians and subway users in 2015. The city of 11.5 million people has three main cell providers, all of whom cooperate fully with authorities' request for information. A representative of one, Beeline, said: "We prepare reports that detail where our subscribers work, live, move, and other aspects."
United Kingdom

UK ISPs EE, Virgin and Vodafone Back Net Neutrality 36

Posted by timothy
from the in-favor-of-babies-and-pie dept.
Amanda Parker (3946253) writes EE, Virgin Media and Vodafone have thrown their support behind net neutrality by signing up to the Open Internet Code. Launched in 2012 by the Broadband Stakeholder Group (BSG), the UK code commits the three internet service providers (ISPs) to provide full internet access with no data blocked "on the basis of commercial rivalry." Content providers can now lodge a complaint with the BSG if they feel their services are being discriminated against. This latest development means that all major ISPs providing fixed and mobile networks are signed up to the code. BSG CEO Matthew Evans said: "Unlike some countries, where net neutrality has become a controversial topic for discussion, the UK benefits from a fiercely competitive market and high levels of transparency — which together offer the best assurance of an open internet."
Japan

Japanese Nobel Laureate Blasts His Country's Treatment of Inventors 191

Posted by Soulskill
from the let-the-makers-make dept.
schwit1 writes: Shuji Nakamura won the 2014 Nobel Prize in Physics (along with two other scientists) for his work inventing blue LEDs. But long ago he abandoned Japan for the U.S. because his country's culture and patent law did not favor him as an inventor. Nakamura has now blasted Japan for considering further legislation that would do more harm to inventors.

"In the early 2000s, Nakamura had a falling out with his employer and, it seemed, all of Japan. Relying on a clause in Japan's patent law, article 35, that assigns patents to individual inventors, he took the unprecedented step of suing his former employer for a share of the profits his invention was generating. He eventually agreed to a court-mediated $8 million settlement, moved to the University of California, Santa Barbara (UCSB) and became an American citizen. During this period he bitterly complained about Japan's treatment of inventors, the country's educational system and its legal procedures. 'The problem is now the Japanese government wants to eliminate patent law article 35 and give all patent rights to the company. If the Japanese government changes the patent law it means basically there would no compensation [for inventors].'"

There is a similar problem with copyright law in the U.S., where changes to the law in the 1970s and 1990s have made it almost impossible for copyrights to ever expire. The changes favor the corporations rather than the individuals who might actually create the work.
The Internet

A State-By-State Guide To Restrictive Community Broadband Laws 160

Posted by samzenpus
from the have-and-have-nots dept.
blottsie writes On Tuesday, President Obama will unveil a dramatic push to improve broadband Internet service for people around the country through community-built municipal broadband networks. Problem is, state legislatures around the country have passed laws making it considerably more difficult for these public Internet projects to get off the ground. In some states, building municipal broadband is prohibited altogether. This piece dives into the state laws standing between us and more competitive Internet service markets.
Censorship

Microsoft Outlook Users In China Hit With MITM Attack 35

Posted by samzenpus
from the right-back-at-you dept.
DavidGilbert99 writes A month after it blocked Google's Gmail, the Chinese government now stands accused of hacking Microsoft's Outlook email service, carrying out man-in-the-middle attack to snoop on private conversations. From ZDNet: " On Monday, online censorship watchdog Greatfire.org said the organization received reports that Outlook was subject to a man-in-the-middle (MITM) attack in China....After testing, Greatfire says that IMAP and SMTP for Outlook were under a MITM attack, while the email service's web interfaces were not affected.
Government

NSA Hack of N. Korea Convinced Obama NK Was Behind Sony Hack 181

Posted by timothy
from the that's-how-clever-it-was dept.
Mike Lape links to a NYTimes piece which says "The evidence gathered by the 'early warning radar' of software painstakingly hidden to monitor North Korea's activities proved critical in persuading President Obama to accuse the government of Kim Jong-un of ordering the Sony attack, according to the officials and experts, who spoke on the condition of anonymity about the classified N.S.A. operation." From the linked article: For about a decade, the United States has implanted “beacons,” which can map a computer network, along with surveillance software and occasionally even destructive malware in the computer systems of foreign adversaries. The government spends billions of dollars on the technology, which was crucial to the American and Israeli attacks on Iran’s nuclear program, and documents previously disclosed by Edward J. Snowden, the former security agency contractor, demonstrated how widely they have been deployed against China. ... The extensive American penetration of the North Korean system also raises questions about why the United States was not able to alert Sony as the attacks took shape last fall, even though the North had warned, as early as June, that the release of the movie “The Interview,” a crude comedy about a C.I.A. plot to assassinate the North’s leader, would be “an act of war.”
Government

NSA Prepares For Future Techno-Battles By Plotting Network Takedowns 81

Posted by timothy
from the your-friends-and-mine dept.
Advocatus Diaboli (1627651) writes According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money. Also check out — New Snowden documents show that the NSA and its allies are laughing at the rest of the world.
The Internet

Republican Bill Aims To Thwart the FCC's Leaning Towards Title II 182

Posted by timothy
from the belief-in-authority dept.
SpzToid writes U.S. congressional Republicans on Friday proposed legislation that would set "net neutrality" rules for broadband providers, aiming to head off tougher regulations backed by the Obama administration. Republican lawmakers hope to counter the Federal Communications Commission's vote on Feb. 26 for rules that are expected to follow the legal path endorsed by President Barack Obama, which Internet service providers (ISPs) and Republicans say would unnecessarily burden the industry with regulation. Net neutrality activists, now with Obama's backing, have advocated for regulation of ISPs under a section of communications law known as Title II, which would treat them more like public utilities. The White House on Thursday said legislation was not necessary to settle so-called "net neutrality" rules because the Federal Communications Commission had the authority to write them.
Censorship

Cuba's Pending Tech Revolution 122

Posted by timothy
from the are-we-supposed-to-be-grateful? dept.
dcblogs writes The White House order last week lifting economic sanctions against Cuba specifically singles out technology, from telecommunication networks to consumer tech. There's much potential and many obstacles. Cuba has an educated population craving technology, but it has little income for new tech. The Cuban government wants to trade with the U.S., but is paranoid about the outside world and has limited Internet access to 5% to 10% of the population, at best. "The government has been very reluctant to have open Internet access," said Harley Shaiken, chairman of the Center for Latin American Studies at the University of California, Berkeley. But "there is real hunger for technology," and with the easing of the embargo, the government "will be facing new pressures," he said. The country needs a complete technology upgrade, including to its electric grid, and the money to finance these improvements. "Markets like Cuba, which will require a wholesale construction of new infrastructure, don't come along often, if ever," said Todd Thibodeaux, president and CEO of CompTIA, a tech industry trade group. "The flood of companies lining up to get in should be quite substantial," he said. Cuba has a population of about 11 million, about the same size as the Dominican Republic, which spends about $1 billion annually on technology and related services, according to IDC. But capital spending today on IT in Cuba may be no more than $200 million annually.
Privacy

Being Pestered By Drones? Buy a Drone-Hunting Drone 151

Posted by timothy
from the you'll-also-want-a-drone-hunting-drone-hunting-drone dept.
schwit1 writes, "Are paparazzi flying drones over your garden to snap you sunbathing? You may need the Rapere, the drone-hunting drone which uses 'tangle-lines' to quickly down its prey." From The Telegraph's article: It has been designed to be faster and more agile than other drones to ensure that they can't escape - partly by limiting flight time and therefore reducing weight. “Having worked in the UAS industry for years, we've collectively never come across any bogus use of drones. However it's inevitable that will happen, and for people such as celebrities, where there is profit to be made in illegally invading their privacy, there should be an option to thwart it,” the group say on their website. This seems more efficient than going after those pesky paparazzi drones with fighting kites (video), but it should also inspire some skepticism: CNET notes that the team behind it is anonymous, and that "Rapere works in a lab setting, however there aren't any photos or videos of the killer drone in action. The website instead has only a slideshow of the concept."
Communications

Feds Operated Yet Another Secret Metadata Database Until 2013 102

Posted by timothy
from the problem-with-authority dept.
A story at Ars Technica describes yet another Federal database of logged call details maintained by the Federal government which has now come to light, this one maintained by the Department of Justice rather than the NSA, and explains how it came to be discovered: [A] three-page partially-redacted affidavit from a top Drug Enforcement Agency (DEA) official, which was filed Thursday, explained that the database was authorized under a particular federal drug trafficking statute. The law allows the government to use "administrative subpoenas" to obtain business records and other "tangible things." The affidavit does not specify which countries records were included, but specifically does mention Iran. ... This database program appears to be wholly separate from the National Security Agency’s metadata program revealed by Edward Snowden, but it targets similar materials and is collected by a different agency. The Wall Street Journal, citing anonymous sources, reported Friday that this newly-revealed program began in the 1990s and was shut down in August 2013. From elsewhere in the article: "It’s now clear that multiple government agencies have tracked the calls that Americans make to their parents and relatives, friends, and business associates overseas, all without any suspicion of wrongdoing," [said ACLU lawyer Patrick Toomey]. "The DEA program shows yet again how strained and untenable legal theories have been used to secretly justify the surveillance of millions of innocent Americans using laws that were never written for that purpose."
Crime

Innocent Adults Are Easy To Convince They Committed a Serious Crime 291

Posted by timothy
from the well-you-did-you-know dept.
binarstu (720435) writes "Research recently published [link is to abstract only; full text requires subscription] in Psychological Science quantifies how easy it is to convince innocent, "normal" adults that they committed a crime. The Association for Psychological Science (APS) has posted a nice summary of the research. From the APS summary: "Evidence from some wrongful-conviction cases suggests that suspects can be questioned in ways that lead them to falsely believe in and confess to committing crimes they didn't actually commit. New research provides lab-based evidence for this phenomenon, showing that innocent adult participants can be convinced, over the course of a few hours, that they had perpetrated crimes as serious as assault with a weapon in their teenage years."
Communications

Obama: Gov't Shouldn't Be Hampered By Encrypted Communications 562

Posted by timothy
from the some-animals-more-equal-than-others-by-jingo dept.
According to an article at The Wall Street Journal, President Obama has sided with British Prime Minister David Cameron in saying that police and government agencies should not be blocked by encryption from viewing the content of cellphone or online communications, making the pro-spying arguments everyone has come to expect: “If we find evidence of a terrorist plot and despite having a phone number, despite having a social media address or email address, we can’t penetrate that, that’s a problem,” Obama said. He said he believes Silicon Valley companies also want to solve the problem. “They’re patriots.” ... The president on Friday argued there must be a technical way to keep information private, but ensure that police and spies can listen in when a court approves. The Clinton administration fought and lost a similar battle during the 1990s when it pushed for a “clipper chip” that would allow only the government to decrypt scrambled messages.
Crime

What Africa Really Needs To Fight Ebola 83

Posted by timothy
from the infrastructure-matters dept.
Lasrick writes Laura Kahn, a physician on the research staff of Princeton University's Program on Science and Global Security, writes that the high tech solutions being promoted to help fight Ebola in Africa will make no difference. What Africa really needs is anti-corruption efforts, now. "A case in point is Liberia, which has received billions of dollars in international aid for over a decade, with little to show for it. The country ranks near the bottom of the United Nation's Human Development Index and near the bottom of Transparency International's Global Corruption Barometer. And while international aid groups and non-governmental organizations such as Doctors Without Borders and the International Medical Corps provide important humanitarian assistance and medical care, they also inadvertently absolve African political leaders from developing medical and public health infrastructures."