×
Piracy

5-Year Suspended Sentence For S. Africa's First Online Pirate 45

An anonymous reader writes "South Africa's first prosecution for online piracy was concluded this morning, with a five-year, wholly suspended sentence handed down to a filesharer who uploaded local movie Four Corners to The Pirate Bay. The man — who lost his job recently — said he's relieved by the verdict, which was the result of a plea bargain. Director Ian Gabriel, who made the film, recently said he was 'philosophical' about piracy."
AT&T

Bidding At FCC TV Spectrum Auction May Be Restricted For Large Carriers 91

An anonymous reader writes "Rumors have surfaced that the Federal Communications Commission (FCC) will restrict bidding at their TV spectrum auction in 2015 to effectively favor smaller carriers. Specifically, when 'auction bidding hits an as-of-yet unknown threshold in a given market, the FCC would set aside up to 30MHz of spectrum in that market. Companies that hold at least one-third of the low-band spectrum in that market then wouldn't be allowed to bid on the 30MHz of spectrum that has been set aside.' Therefore, 'in all band plans less than 70MHz, restricted bidders—specifically AT&T and Verizon (and in a small number of markets, potentially US Cellular or CSpire)—would be limited to bidding for only three blocks.' The rumors may be true since AT&T on Wednesday threatened to not participate in the auction at all as a protest against what it sees as unfair treatment."
Government

Vintage 1960s Era Film Shows IRS Defending Its Use of Computers 146

coondoggie (973519) writes "It's impossible to imagine the Internal Revenue Service or most other number-crunching agencies or companies working without computers. But when the IRS went to computers — the Automatic Data Processing system --there was an uproar. The agency went so far as to produce a short film on the topic called Right On The Button, to convince the public computers were a good thing."
United States

FBI Drone Deployment Timeline 33

An anonymous reader writes "The FBI insists that it uses drone technology to conduct surveillance in 'very limited circumstances.' What those particular circumstances are remain a mystery, particularly since the Bureau refuses to identify instances where agents deployed unmanned aerial vehicles, even as far back as 2006. In a letter to Senator Ron Paul last July, the FBI indicated that it had used drones a total of ten times since late 2006—eight criminal cases and two national security cases—and had authorized drone deployments in three additional cases, but did not actually fly them. The sole specific case where the FBI is willing to confirm using a drone was in February 2013, as surveillance support for a child kidnapping case in Alabama. New documents obtained by MuckRock as part of the Drone Census flesh out the timeline of FBI drone deployments in detail that was previously unavailable. While heavily redacted—censors deemed even basic facts that were already public about the Alabama case to be too sensitive for release, apparently—these flight orders, after action reviews and mission reports contain new details of FBI drone flights."
The Courts

Lavabit Loses Contempt Appeal 128

After being forced to turn over encryption keys (being held in contempt of court for several weeks after initially refusing to comply), secure mail provider Lavabit halted all operations last year. With the assistance of the EFF, an appeal was mounted. Today, the appeals court affirmed the district court decision and rejected the appeal. From Techdirt: "The ruling does a decent job explaining the history of the case, which also details some of the (many, many) procedural mistakes that Lavabit made along the way, which made it a lot less likely it would succeed here. ... The procedural oddities effectively preclude the court even bothering with the much bigger and important question of whether or not a basic pen register demand requires a company to give up its private keys. The hail mary attempt in the case was to argue that because the underlying issues are of 'immense public concern' (and they are) that the court should ignore the procedural mistakes. The court flatly rejects that notion: 'exhuming forfeited arguments when they involve matters of “public concern” would present practical difficulties. For one thing, identifying cases of a “public concern” and “non-public concern” –- divorced from any other consideration –- is a tricky task governed by no objective standards..... For another thing, if an issue is of public concern, that concern is likely more reason to avoid deciding it from a less-than-fully litigated record....'"
Debian

All Packages Needed For FreedomBox Now In Debian 54

Eben Moglen's FreedomBox concept (personal servers for everyone to enable private communication) is getting closer to being an easy-to-install reality: all packages needed for FreedomBox are now in Debian's unstable branch, and should be migrating to testing in a week or two. Quoting Petter Reinholdtsen: "Today, the last of the packages currently used by the project to created the system images were accepted into Debian Unstable. It was the freedombox-setup package, which is used to configure the images during build and on the first boot. Now all one need to get going is the build code from the freedom-maker git repository and packages from Debian. And once the freedombox-setup package enter testing, we can build everything directly from Debian. :) Some key packages used by Freedombox are freedombox-setup, plinth, pagekite, tor, privoxy, owncloud, and dnsmasq. There are plans to integrate more packages into the setup. User documentation is maintained on the Debian wiki." You can create your own image with only three commands, at least if you have a DreamPlug or Raspberry Pi (you could also help port it to other platforms).
Media

Bill Gates Patents Detecting, Responding To "Glassholes" 140

theodp (442580) writes "As Google Glass goes on sale [ed: or rather, went on sale] to the general public, GeekWire reports that Bill Gates has already snagged one patent for 'detecting and responding to an intruding camera' and has another in the works. The invention proposes to equip computer and device displays with technology for detecting and responding to any cameras in the vicinity by editing or blurring the content on the screen, or alerting the user to the presence of the camera. Gates and Nathan Myhrvold are among the 16 co-inventors of the so-called Unauthorized Viewer Detection System and Method, which the patent application notes is useful 'while a user is taking public transportation, where intruding cameras are likely to be present.' So, is Bill's patent muse none other than NYC subway rider Sergey Brin?" A more cynical interpretation: closing the analog hole. Vaguely related, mpicpp pointed out that Google filed a patent for cameras embedded in contact lenses.
Education

Student Records Kids Who Bully Him, Then Gets Threatened With Wiretapping Charge 798

An anonymous reader tips news of an incident in a Pennsylvania high school in which a student, Christian Stanfield, was being bullied on a regular basis. He used a tablet to make an audio recording of the bullies for the purpose of showing his mother how bad it was. She was shocked, and she called school officials to tell them what was going on. The officials brought in a police lieutenant — but not to deal with the bullies. Instead, the officer interrogated Stanfield and made him delete the recording. The officer then threatened to charge him with felony wiretapping. The charges were later reduced to disorderly conduct, and Stanfield was forced to testify before a magistrate, who found him guilty. Stanfield's mother said, "Christian's willingness to advocate in a non-violent manner should be championed as a turning point. If Mr. Milburn and the South Fayette school district really want to do the right thing, they would recognized that their zero-tolerance policies and overemphasis on academics and athletics have practically eliminated social and emotional functioning from school culture."

Update: 04/17 04:36 GMT by T : The attention this case has gotten may have something to do with the later-announced decision by the Allegheny County District Attorney's office to withdraw the charges against Stanfield.
Government

52 Million Photos In FBI's Face Recognition Database By Next Year 108

Advocatus Diaboli writes "The EFF has been investigating the FBI's Next-Generation Identification (NGI) scheme, an enormous database of biometric information. It's based on the agency's fingerprint database, which already has 100 million records. But according to the documents EFF dug up, the NGI database will include 52 million images of people's faces by 2015. At least 4.3 million images will have been taken outside any sort of criminal context. 'Currently, if you apply for any type of job that requires fingerprinting or a background check, your prints are sent to and stored by the FBI in its civil print database. However, the FBI has never before collected a photograph along with those prints. This is changing with NGI. Now an employer could require you to provide a 'mug shot' photo along with your fingerprints. If that's the case, then the FBI will store both your face print and your fingerprints along with your biographic data.'"
Encryption

Snowden Used the Linux Distro Designed For Internet Anonymity 171

Hugh Pickens DOT Com writes: "When Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. Now Klint Finley reports that Snowden also used The Amnesic Incognito Live System (Tails) to keep his communications out of the NSA's prying eyes. Tails is a kind of computer-in-a-box using a version of the Linux operating system optimized for anonymity that you install on a DVD or USB drive, boot your computer from and you're pretty close to anonymous on the internet. 'Snowden, Greenwald and their collaborator, documentary film maker Laura Poitras, used it because, by design, Tails doesn't store any data locally,' writes Finley. 'This makes it virtually immune to malicious software, and prevents someone from performing effective forensics on the computer after the fact. That protects both the journalists, and often more importantly, their sources.'

The developers of Tails are, appropriately, anonymous. They're protecting their identities, in part, to help protect the code from government interference. 'The NSA has been pressuring free software projects and developers in various ways,' the group says. But since we don't know who wrote Tails, how do we know it isn't some government plot designed to snare activists or criminals? A couple of ways, actually. One of the Snowden leaks show the NSA complaining about Tails in a Power Point Slide; if it's bad for the NSA, it's safe to say it's good for privacy. And all of the Tails code is open source, so it can be inspected by anyone worried about foul play. 'With Tails,' say the distro developers, 'we provide a tongue and a pen protected by state-of-the-art cryptography to guarantee basic human rights and allow journalists worldwide to work and communicate freely and without fear of reprisal.'"
Government

Intuit, Maker of Turbotax, Lobbies Against Simplified Tax Filings 423

McGruber (1417641) writes "Return-free filing might allow tens of millions of Americans to file their taxes for free and in minutes. Under proposals authored by several federal lawmakers, it would be voluntary, using information the government already receives from banks and employers and that taxpayers could adjust. The concept has been endorsed by Presidents Obama and Reagan and is already a reality in some parts of Europe. Sounds great, except to Intuit, maker of Turbotax: last year, Intuit spent more than $2.6 million on lobbying, some of it to lobby on four bills related to the issue, federal lobbying records show."
The Internet

Netflix Gets What It Pays For: Comcast Streaming Speeds Skyrocket 328

jfruh (300774) writes "Back in February, after a lengthy dispute, Netflix agreed to pay Comcast for network access after being dogged by complaints of slow speeds from Comcast subscribers. Two months later, it appears that Comcast has delivered on its promises, jumping up six places in Netflix's ISP speed rankings. The question of whether this is good news for anyone but Comcast is still open."
Government

Slashdot Asks: How Do You Pay Your Taxes? 386

April 15, 2014 isn't just a full moon: it's Tax Day in the U.S. That means most American adults have already submitted a tax return, or an extension request, to the IRS and -- except for a few lucky states -- to their state governments as well. I filed my (very simple) tax return online. After scanning the free options, since I live in a state -- Texas -- that does not collect personal income tax, I chose Tax Act's free services. That meant enduring a series of annoying upgrade plugs throughout the process, but I could live with that; I have no reason to think it was better or worse than TurboTax or any of the other e-Filing companies, but I liked Tax Act’s interface, and it seemed less skeevy in all those upgrade plugs than the others I glanced at. The actual process took an hour and 19 minutes once I sat down with the papers I needed. My financial life is pretty simple, though: I didn't buy or sell a house, didn't buy or sell stocks outside of a retirement account mutual fund, and didn't move from one state to another. How do you do your taxes? Do you have an argument for one or another of the online services, or any cautionary tales? Do you prefer to send in forms on paper? Do you hire an accountant? (And for readers outside the U.S., it's always interesting to hear how taxes work in other countries, too. Are there elements of the U.S. system you'd prefer, or that you're glad you don't need to deal with?)
Government

Is Crimea In Russia? Internet Companies Have Different Answers 304

judgecorp (778838) writes "Three weeks after Russia asserted that Crimea is part of its territory, the social networks have a problem: how to categories their users from the region? Facebook and the largest Russian social network, Vkontakte, still say Crimeans are located in Ukraine, while other Russian social networks say they are Russians. Meanwhile, on Wikipedia, an edit war has resulted in Crimea being part of Russia, but shaded a different colour to signify the territory is disputed. Search engine Yandex is trying to cover both angles: its maps service gives a different answer, depending on which location you send your query from."
The Media

Guardian and WaPo Receive Pulitzers For Snowden Coverage 78

Late Yesterday, the Pulitzer Prize board announced (PDF) the 2014 Pulitzer Prize winners. The public service prize was awarded to the Guardian and the Washington Post. The Washington Post was given the award for its role in revealing widespread surveillance by the NSA, "...marked by authoritative and insightful reports that helped the public understand how the disclosures fit into the larger framework of national security," and the Guardian for sparking "...a debate about the relationship between the government and the public over issues of security and privacy." Snowden released a statement praising the Pulitzer board: "Today's decision is a vindication for everyone who believes that the public has a role in government. We owe it to the efforts of the brave reporters and their colleagues who kept working in the face of extraordinary intimidation, including the forced destruction of journalistic materials, the inappropriate use of terrorism laws, and so many other means of pressure to get them to stop what the world now recognizes was work of vital public importance. This decision reminds us that what no individual conscience can change, a free press can. "
The Almighty Buck

IRS Can Now Seize Your Tax Refund To Pay a Relative's Debt 632

Hugh Pickens DOT Com (2995471) writes "Just in time for the April 15 IRS filing deadline comes news from the Washington Post that hundreds of thousands of taxpayers expecting refunds are instead getting letters informing them of tax debts they never knew about: often a debt incurred by their parents. The government is confiscating their checks, sometimes over debts 20—30 years old. For example, when Mary Grice was 4 (in 1960), her father died ... 'Until the kids turned 18, her mother received survivor benefits from Social Security ... Now, Social Security claims it overpaid someone in the Grice family in 1977. ... Four years after Sadie Grice died, the government is coming after her daughter. ... "It was a shock," says Grice, 58. "What incenses me is the way they went about this. They gave me no notice, they can't prove that I received any overpayment, and they use intimidation tactics, threatening to report this to the credit bureaus."' The Treasury Department has intercepted ... $75 million from debts delinquent for more than 10 years according to the department's debt management service. 'The aggressive effort to collect old debts started three years ago — the result of a single sentence tucked into the farm bill lifting the 10-year statute of limitations on old debts to Uncle Sam.'"
Cellphones

Inside the Stolen Smartphone Black Market In London 109

First time accepted submitter WebAgeCaveman (3615807) writes in with news about just how big the stolen smartphone black market is. "A black market of shops and traders willing to deal in stolen smartphones has been exposed by a BBC London undercover investigation. Intelligence was received that some shops across a swathe of east London were happy to buy phones from thieves. Two traders were filmed buying Samsung S3 and iPhone 4 devices from a researcher posing as a thief - despite him making it clear they were stolen. The shops involved have declined to comment."
Crime

US Takes Out Gang That Used Zeus Malware To Steal Millions 38

coondoggie (973519) writes "The US Department of Justice charged nine members of a group that used Zeus malware to infect thousands of business computers and illegally siphon-off millions of dollars into over-seas bank accounts. The DoJ said an indictment was unsealed in connection with the arraignment this week at the federal courthouse in Lincoln, Neb., of two Ukrainian nationals, Yuriy Konovalenko, 31, and Yevhen Kulibaba, 36. Konovalenko and Kulibaba were recently extradited from the United Kingdom."
Encryption

Obama Says He May Or May Not Let the NSA Exploit the Next Heartbleed 134

An anonymous reader writes "The White House has joined the public debate about Heartbleed. The administration denied any prior knowledge of Heartbleed, and said the NSA should reveal such flaws once discovered. Unfortunately, this statement was hedged. The NSA should reveal these flaws unless 'a clear national security or law enforcement need' exists. Since that can be construed to apply to virtually any situation, we're left with the same dilemma as before: do we take them at their word or not? The use of such an exploit is certainly not without precedent: 'The NSA made use of four "zero day" vulnerabilities in its attack on Iran's nuclear enrichment sites. That operation, code-named "Olympic Games," managed to damage roughly 1,000 Iranian centrifuges, and by some accounts helped drive the country to the negotiating table.' A senior White House official is quoted saying, 'I can't imagine the president — any president — entirely giving up a technology that might enable him some day to take a covert action that could avoid a shooting war.'" Side note: CloudFlare has named several winners in its challenge to prove it was possible to steal private keys using the Heartbleed exploit.
Windows

IRS Misses XP Deadline, Pays Microsoft Millions For Patches 322

An anonymous reader writes "When Microsoft terminated official support for Windows XP on April 8th, many organizations had taken the six years of warnings to heart and migrated to another operating system. But not the U.S. Internal Revenue Service. Only 52,000 of their 110,000 Windows-powered computers have been upgraded to Windows 7. They'll now be forced to pay Microsoft for Custom Support. How much? Using Microsoft's standard rate of $200 per PC, it'll be $11.6 million for one year. That leaves $18.4 million of their $30 million budget to finish the upgrades themselves, which works out to $317 per computer."

Slashdot Top Deals