Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×
Crime

2 Arrested In Plot To Fly Contraband Into Prison With Drone 118

An anonymous reader writes: Using a drone to get contraband into prison seems to be all the rage lately. Police say two men attempting to fly drugs, tobacco and pornography into a Maryland state prison with a drone were arrested Monday. Stephen T. Moyer, secretary of the Maryland Department of Public Safety and Correctional Services worries that someone will try to use a drone to deliver a gun. "That's my biggest fear," he told a news conference. "The use of these drones to bring this type of contraband into a facility is very, very troubling, and we're going to address it."
Security

Court: FTC Can Punish Companies With Sloppy Cybersecurity 86

jfruh writes: The Congressional act that created the Federal Trade Commission gave that agency broad powers to punish companies engaged in "unfair and deceptive practices." Today, a U.S. appeals court affirmed that sloppy cybersecurity falls under that umbrella. The case involves data breaches at Wyndham Worldwide, which stored customer payment card information in clear, readable text, and used easily guessed passwords to access its important systems.
Windows

A Breakdown of the Windows 10 Privacy Policy 318

WheezyJoe writes: The Verge has a piece on Windows 10 privacy that presents actual passages from the EULA and privacy policy that suggest what the OS is capturing and sending back to Microsoft. The piece takes a Microsoft-friendly point of view, arguing that all Microsoft is doing is either helpful or already being done either by Google or older releases of Windows, and also touches on how to shut things off (which is also explained here). But the quoted passages from the EULA and the privacy policy are interesting to review, particularly if you look out for legal weasel words that are open to Microsoft's interpretation, such as "various types (of data)", diagnostic data "vital" to the operation of Windows (cannot be turned off), sharing personal data "as necessary" and "to protect the rights or property of Microsoft". And while their explanations following the quotes may attempt an overly friendly spin, the article may be right about one thing: "In all, only a handful of these new features, and the privacy concerns they bring, are actually in fact new... Most people have just been either unaware or just did not care of their existence in past operating systems and software." Even pirates are having privacy concerns and blocking Windows 10 users.
Businesses

Swatch Trademarks "One More Thing..." 102

AmiMoJo writes: It's the famous line Steve Jobs often used on stage to introduce unexpected Apple gadgets since 1999. Of course he wasn't the only one to utter it — TV detective Columbo was catching out criminals with the phrase way back in the 1970s and '80s too. Now Swiss watchmaker Swatch has acquired a trademark on the phrase "one more thing".
Privacy

Ashley Madison Hack Claims First Victims 706

wired_parrot writes: Toronto police are reporting that 2 unconfirmed suicides have been linked to the data breach. This follows pleas from other users of the site for the hackers to not release the data before it was exposed- an anonymous gay Reddit user from Saudi Arabia, where homosexuality is illegal, pleaded for the data to be kept private: "I am about to be killed, tortured, or exiled," he wrote. "And I did nothing." And when The Intercept published a piece condemning the puritanical glee over the data dump, one user who commented on the article said she's been "a long term member" of the site because her spouse's medical condition has affected their intimate life. Her spouse knows she's engaged with other Ashley Madison members, she says, but now fears she will likely lose friends and have to find a new job now that her association with the site is out there. Ashley Madison has now offered a $380,000 reward for information that leads to the arrest and conviction of the hackers who leaked the data. Security researcher Troy Hunt has also posted about the kind of emails he's received from users after the data leak.
Censorship

Judge Rules That Inglewood, California Cannot Copyright Public Videos 67

UnknowingFool writes: Recently a judge ruled in California that the city of Inglewood cannot hold copyrights of videos of public city council meetings which they published on their YouTube account and thus cannot sue individuals for copyright infringement for using them. In several YouTube videos, Joseph Teixeira, a resident of Inglewood, California, criticized the mayor, James Butts. Under the account name Dehol Truth, Teixeira took city council meetings posted on their YouTube account and edited them to make pointed criticisms about the mayor.

The city responded by registering the videos with copyrights and then suing Teixeira for copyright infringement. Many would say it was a thinly veiled attempt to silence a critic. Teixeira filed a motion to dismiss, arguing that (1) the city cannot claim copyright over public records (videos of public city council meetings) and (2) even if they could, his videos fell under Fair Use.

Unsurprisingly, a judge dismissed the city's case, citing California law which bars the city from holding copyrights on most public records. (This case may not be over as Teixeira's pro bono lawyer has not filed for attorney's fees. The ruling can be found here.) What is notable is that the judge dismissed the case with prejudice, so the city cannot refile. Normally judges do not do this unless they feel that the plaintiff's case was so weak that he feels no judge should hear the case ever again. Since the judge agreed with the defendant on the first point, he would not normally need to address Teixeira's Fair Use defense, but he did anyway. Anticipating that the city may appeal his decision, judge ruled that Teixeira's videos substantially met all four factors for Fair Use:
  1. There is no evidence Teixeira used the videos for commercial gain and was transformative
  2. His work was creative by adding music and commentary to the normally boring council videos
  3. Despite the city's claim he used their "entire work", it clear that he only used portions of meetings that lasted as long as four hours editing them down to a max of 15 minutes.
  4. Teixeira did not harm the city's market for the videos because the city is barred by state law from recouping more than direct costs of duplication. Even if the city could sell the videos (which they published themselves for free on YouTube), his short videos are not a substitute.
Sci-Fi

FBI Informant: Ray Bradbury's Sci-fi Written To Induce Communistic Mass Hysteria 282

v3rgEz writes: The FBI followed Ray Bradbury's career very closely, in part because an informant warned them that his writing was not enjoyable fantasy, but rather tantamount to psychological warfare. "The general aim of these science fiction writers is to frighten the people into a state of paralysis or psychological incompetence bordering on hysteria," the informant warned. "Which would make it very possible to conduct a Third World War in which the American people would believe could not be won since their morale had seriously been destroyed."
Twitter

Twitter Blocks API Access For Sites Monitoring Politicians' Deleted Tweets 114

An anonymous reader writes: Politwoops is/was a site that monitored the Twitter feeds of politicians and posted any tweets that those politicians later deleted. On May 15, Twitter suspended API access for the U.S. version of Politwoops, and now they've blocked access to the versions of Politwoops running in 30 other countries. Twitter has also blocked access for similar site Diplotwoops, which focused on deleted tweets from diplomats and embassies. Twitter said, "'Imagine how nerve-racking – terrifying, even – tweeting would be if it was immutable and irrevocable? No one user is more deserving of that ability than another. Indeed, deleting a tweet is an expression of the user's voice." Arjan El Fassed, director of the Open State Foundation, which developed Politwoops, disagrees: "What politicians say in public should be available to anyone. This is not about typos but it is a unique insight on how messages from elected politicians can change without notice."
Stats

Mostly Theater? Taking Aim At White House 'We the People' Petitions 68

theodp writes: "Since we launched We the People in 2011," wrote the White House last month, "millions of Americans have engaged with their government on the issues that matter to them. This groundbreaking online platform has made petitioning the government, a First Amendment right, more accessible than ever. Over the past few years, the Obama administration has taken a stance on a number of causes that citizens really care about and used the We the People petition platform to voice their concerns." Sounds good, but even if the White House is listening to We the People petitions, as it assured skeptics, one wonders what — and who — exactly they are listening to. Petitions suffer from being aye-only, lack identity and location verification, and appear to have other data quality issues. One attempting to explore the petition data for the 67,022-and-counting signers of a new petition urging a quick response to a court decision that could cut the time international STEM students can work in the U.S. on student visas after graduation, for example, would be stymied by thousands of missing and non-U.S. postal codes. Plotting what location info is available does show that the petitioners are clustered around tech and university hubs, hardly a surprise, but it sheds no context on whether these represent corporate, university, and/or international student interests.
Democrats

Judge Orders State Dept, FBI To Expand Clinton Email Server Probe 303

An anonymous reader writes: In a hearing over Freedom of Information Act requests to the State Department, U.S. District Judge Emmet Sullivan said that former US Secretary of State Hillary Clinton didn't comply with government policies. He ordered the State Department to reach out to the FBI to see if any relevant emails exist on Hillary Clinton's email server. Judge Sullivan was surprised that the State Department and FBI were not already communicating on the issue following the FBI's seizure of Clinton's email server and three thumb drives of emails. More than 300 emails are being examined for containing classified information, and dozens of the emails were "born classified" based on content. Some of those emails were forwarded outside the government. There are also clues emerging about how some of the classified information made its way onto Clinton's server. The email controversy is beginning to show up on the campaign trail, an unwelcome development for Secretary Clinton. Reporter Bob Woodward, who helped bring down President Nixon, said the scandal reminds him of the Nixon tapes. It is interesting to note that the post-Watergate reforms have helped move the investigation forward.
Censorship

Proposed Rules Would Require Gov't Registration For Malaysian Press Sites 39

Malaysia's Communications and Multimedia Minister Datuk Seri Dr Salleh Said Keruak has proposed mandatory government registration for web sites operating within Malaysia. This comes after the Malaysian government blocked the online Sarawak Report, and suspended a newspaper called the The Edge "for allegedly posting unverified information." Officials accused these news outlets of publishing inaccurate documents about a corruption scandal that linked the Prime Minister to 1MDB, a state-managed investment firm that reportedly lost billions of taxpayers’ money. ... The proposal to require news websites to register is seen by some as part of the government’s response to the rising outrage over the corruption issue.
Cellphones

In Baltimore and Elsewhere, Police Use Stingrays For Petty Crimes 211

USA Today reports on the widespread use of stingray technology by police to track down even petty criminals and witnesses, as well as their equally widespread reluctance to disclose that use. The article focuses mostly on the city of Baltimore; by cross-checking court records against a surveillance log from the city’s Advanced Technical Team, the USA Today reporters were able to determine at least several hundred cases in which phony ("simulated") cell phone towers were used to snoop traffic. In court, though, and even in the information that the police department provides to the city's prosecutors, the use of these devices is rarely disclosed, thanks to a non-disclosure agreement with the FBI and probably a general reluctance to make public how much the department is using them, especially without bothering to obtain search warrants. From the article: In at least one case, police and prosecutors appear to have gone further to hide the use of a stingray. After Kerron Andrews was charged with attempted murder last year, Baltimore's State's Attorney's Office said it had no information about whether a phone tracker had been used in the case, according to court filings. In May, prosecutors reversed course and said the police had used one to locate him. "It seems clear that misrepresentations and omissions pertaining to the government's use of stingrays are intentional," Andrews' attorney, Assistant Public Defender Deborah Levi, charged in a court filing.

Judge Kendra Ausby ruled last week that the police should not have used a stingray to track Andrews without a search warrant, and she said prosecutors could not use any of the evidence found at the time of his arrest.
Businesses

Not All Uber Drivers Like Surge Pricing, Either 250

CNET reports that Uber's practice of surge pricing, which sometimes raises the ire of passengers, isn't universally acclaimed by the company's drivers, either. "[M]ost Uber riders," according the the linked article, "despise surge pricing," though it's not clear quite how that "most" is arrived at. From the piece: They've complained about running up bills totaling hundreds of dollars, and have criticized the company for using surge pricing during emergencies, like Hurricane Sandy and the Sydney hostage crisis. The San Francisco Better Business Bureau gave Uber the grade of an F because of complaints related to surge pricing. And New York lawmakers have even proposed legislation to put limits on how high fares can go. Now some drivers, like [San Francisco Uber driver Peter] Ashlock, are also having second thoughts on surge pricing." On the other hand, what system would you propose to better reward drivers for working at high-demand times?
Windows

Underground Piracy Sites Want To Block Windows 10 Users 394

An anonymous reader writes: Some smaller pirate sites have become concerned about Windows 10 system phoning home too many hints regarding that the users are accessing their site. Therefore, the pirate administrators have started blocking Windows 10 users from accessing the BitTorrent trackers that the sites host. The first ones to hit the alarm button were iTS, which have posted a statement and started redirecting Windows 10 users to a YouTube video called Windows 10 is a Tool to Spy on Everything You Do. Additionally, according to TorrentFreak, two other similar dark web torrent trackers are also considering following suit. "As we all know, Microsoft recently released Windows 10. You as a member should know, that we as a site are thinking about banning the OS from FSC," said one of the FSC staff. Likewise, in a message to their users, a BB admin said something similar: "We have also found [Windows 10] will be gathering information on users' P2P use to be shared with anti piracy group."
Portables

Yet Another Compromising Preinstalled "Glitch" In Lenovo Laptops 89

New submitter execthis writes: Japanese broadcaster NHK is reporting that yet another privacy/security-compromising "glitch" has been found to exist in preinstalled software on Lenovo laptops. The article states that the glitch was found in Spring and that in late July Lenovo began releasing a program to uninstall the difficult-to-remove software. The article does not specify, but it could be referring to a BIOS utility called Lenovo Service Engine (LSE) for which Lenovo has released a security advisory with links to removal tools for various models.
Crime

Two US Marines Foil Terrorist Attack On Train In France 468

hcs_$reboot writes: A heavily armed gunman opened fire aboard a packed high-speed train traveling from Amsterdam to Paris late Friday afternoon, wounding several passengers before he was tackled and subdued by two Americans Marines. The assault was described as a terrorist attack. President Barack Obama has expressed his gratitude for the "courage and quick thinking" of the passengers on a high-speed train in France, including U.S. service members, who overpowered the gunman. Bernard Cazeneuve, the French interior minister, paid tribute to the Marines as he arrived at the scene, and said "Thanks to them we have averted a drama. The Americans were particularly courageous and showed extreme bravery in extremely difficult circumstances."
Canada

Extortionists Begin Targeting AshleyMadison Users, Demand Bitcoin 286

tsu doh nimh writes: It was bound to happen: Brian Krebs reports that extortionists have begun emailing people whose information is included in the leaked Ashleymadison.com user database, threatening to find and contact the target's spouse and alert them if the recipient fails to cough up 1 Bitcoin. Krebs interviews one guy who got such a demand, a user who admits to having had an affair after meeting a woman on the site and who is now worried about the fallout, which he said could endanger his happily married life with his wife and kids. Perhaps inevitable: two Canadian law firms have filed a class action lawsuit against the company, seeking more than half a billion dollars in damages.
The Courts

Do You Have a Right To Use Electrical Weapons? 693

An anonymous reader writes: David Cravets points out a growing debate in U.S. constitutional law: does the second amendment grant the same rights regarding electrical weapons as it does for traditional firearms? A Massachusetts ban on private ownership of stun-guns is being considered by the Supreme Court, and it's unclear whether such ownership has constitutional protection. The state's top court didn't think so: "... although modern handguns were not in common use at the time of enactment of the Second Amendment, their basic function has not changed: many are readily adaptable to military use in the same way that their predecessors were used prior to the enactment. A stun gun, by contrast, is a thoroughly modern invention (PDF). Even were we to view stun guns through a contemporary lens for purposes of our analysis, there is nothing in the record to suggest that they are readily adaptable to use in the military." The petitioner is asking the court (PDF) to clarify that the Second Amendment covers non-lethal weapons used for self-defense. Constitutional law expert Eugene Volokh agrees: "Some people have religious or ethical compunctions about killing. ... Some adherents to these beliefs may therefore conclude that fairly effective non-deadly defensive tools are preferable to deadly tools."
Government

City of Munich Struggling With Basic Linux Functionality 394

jones_supa writes: Just like the city planned a year ago, Munich is still calling for a switch back to Windows from LiMux, their Ubuntu derivative. The councilors from Munich's conservative CSU party have called the operating system installed on their laptops "cumbersome to use" and "of very limited use." The letter from the two senior members of the city's IT committee (PDF in German) asks the mayor to consider removing the Linux-based OS and to install Windows and Office. "There are no programs for text editing, Skype, Office etc. installed and that prevents normal use," the letter argues. Another complaint from councilors is that "the lack of user permissions makes them of limited use." These kind of arguments raise eyebrows, as all that functionality is certainly found on Linux.
Encryption

Jeb Bush Comes Out Against Encryption 494

An anonymous reader writes: Presidential candidate Jeb Bush has called on tech companies to form a more "cooperative" arrangement with intelligence agencies. During a speech in South Carolina, Bush made clear his opinion on encryption: "If you create encryption, it makes it harder for the American government to do its job — while protecting civil liberties — to make sure that evildoers aren't in our midst." He also indicated he felt the recent scaling back of the Patriot Act went too far. Bush says he hasn't seen any indication the bulk collection of phone metadata violated anyone's civil liberties.