×
Education

MIT President Tells Grads To 'Hack the World' 86

theodp writes "On Friday, MIT President L. Rafael Reif exhorted grads to 'hack the world until you make the world a little more like MIT'. A rather ironic choice of words, since 'hack the world' is precisely what others said Aaron Swartz was trying to do in his fateful run-in with MIT. President Reif presumably received an 'Incomplete' this semester for the promised time-is-of-the-essence review of MIT's involvement in the events that preceded Swartz's suicide last January. By the way, it wasn't so long ago that 2013 commencement speaker Drew Houston and Aaron Swartz were both welcome speakers at MIT."
Government

In Praise of the King: 1.7M Social Media Comments In Thailand 104

An anonymous reader writes with this excerpt from Prachatai.com: "Thailand's Rangers Task Force 45, in response to Army policy, has put its troops to the task of promoting and protecting the monarchy in cyber space, claiming to have posted 1.69 million comments on webboards and social media during a 4-month period of last year ... According to the video clip, the Army Chief has approved the establishment of an army internet network to promote and protect the monarchy by monitoring websites and webboards which have content alluding to the monarchy and countering them by posting comments which worship the institution. ...The unit's military operations personnel provide the troops with information, or what to post, and set them targets for the number of posts they must complete."
Government

What Charles G. Koch Can Teach Us About Campaign Finance Data 238

Lasrick writes "Lee Drutman is a political scientist with the Sunlight Foundation who does terrific work. In this article, he attempts to trace campaign donations made by one of the Koch Brothers and discovers just how difficult it is to do: 'The case of Charles G. Koch is a nice lesson in just how hard it is to determine who is breaking and who is abiding by campaign finance limits. It's hard to make accurate tallies of individual aggregate campaign contributions when the Federal Elections Commission doesn't require donors to have a unique ID, and when campaigns don't always reliably report donor names. Given this, it is unclear how the FEC would even enforce its own aggregate limit rules. The FEC's spokesperson told me that while the FEC welcomes complaints, it does not typically take enforcement initiative."'
Canada

Canadians, Too, Should Demand Surveillance Answers 81

An anonymous reader writes "Privacy and surveillance have taken centre stage this week with the revelations that U.S. agencies have been engaged in massive, secret surveillance programs that include years of capturing the meta-data from every cellphone call on the Verizon network (the meta-data includes the number called and the length of the call) as well as gathering information from the largest Internet companies in the world including Google, Facebook, Microsoft, and Apple in a program called PRISM. Michael Geist explains how many of the same powers exist under Canadian law and that it is very likely that Canadians have been caught up by these surveillance activities."
The Almighty Buck

Apple Files Patent For Digital Wallet and Virtual Currency 84

another random user writes "Apple has applied for a patent on a combined virtual currency and digital wallet technology that would allow you to store money in the cloud, make payments with your iPhone, and maybe communicate with point-of-sale terminals via NFC. The patent application, published [Thursday] by the U.S. Patent and Trademark Organization, details how iPhone users could walk into a store, pay for goods with their phone, and walk out with their merchandise. Though Apple is late to the virtual wallet game, that doesn't seem to stop them trying to patent the process. There does not appear to be anything in the patent application which describes something that can't already be done."
Privacy

Inside PRISM: Why the Government Hates Encryption 457

Lauren Weinstein writes "Now, what's really going on with PRISM? The government admits that the program exists, but says it is being 'mischaracterized' in significant ways (always a risk with secret projects sucking up information about your citizens' personal lives). The Internet firms named in the leaked documents are denying that they have provided 'back doors' to the government for data access. Who is telling the truth? Likely both. Based on previous information and the new leaks, we can make some pretty logical guesses about the actual shape of all this. Here's my take."
Encryption

Seeking Fifth Amendment Defenders 768

Bennett Haselton writes with his take on a case going back and forth in U.S. courts right now about whether a defendant can be ordered to decrypt his own hard drives when they may incriminate him. "A Wisconsin defendant in a criminal child-pornography case recently invoked his Fifth Amendment right to avoid giving the FBI the password to decrypt his hard drive. At the risk of alienating fellow civil-libertarians, I admit I've never seen the particular value of the Fifth Amendment right against self-incrimination. So I pose this logical puzzle: come up with a specific, precisely defined scenario, where the Fifth Amendment makes a positive difference." Read on for the rest of Bennett's thoughts.
Government

Intelligence Director Claims NSA Surveillance Reports Inaccurate 262

Nerval's Lobster writes "James R. Clapper, the nation's Director of National Intelligence, claimed that recent reports about the NSA monitoring Americans' Internet and phone communications are inaccurate. 'The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act,' he wrote in a June 6 statement. 'They contain numerous inaccuracies.' While the statement didn't detail the supposed inaccuracies, it explained why the monitoring described in those articles would, at least in theory, violate the law. 'Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States,' it read. 'It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.' Those newspaper articles describe an NSA project codenamed Prism, which allegedly taps into the internal databases of nine major technology companies: Microsoft, Google, Yahoo, Facebook, PalTalk, YouTube, Skype, AOL, and Apple. Both publications drew their information from an internal PowerPoint presentation used to train intelligence operatives. Speaking to Slashdot, Google, Microsoft and Facebook all again denied knowledge of Prism; the Google spokesperson suggested he didn't 'have any insight' into why Google would have appeared in the NSA's alleged PowerPoint presentation. But many, many questions remain."
EU

EU Countries Closer To Mandatory Minimum Sentence Cap For Hacking 154

angry tapir writes "Hackers would face up to two years or more in prison no matter where they live in the European Union under a new draft law approved by the European Parliament's civil liberties committee. The proposed rule would prevent E.U. countries from capping sentences for any type of hacking at less than two years. Meanwhile the maximum sentence possible for cyberattacks against 'critical infrastructure,' such as power plants, transport networks and government networks would be at least five years in jail. The draft directive, which updates rules that have been in place since 2005, would also introduce a maximum penalty of at least three years' imprisonment for creating botnets."
United States

NHTSA and DOT Want Your Car To Be Able To Disable Your Cellphone Functions 405

savuporo writes "The National Highway Traffic Safety Administration and the Department of Transportation are considering technological solutions for people to stop using their cellphones while driving. Proximity detectors or requiring physical link with the car are the solutions under the scope. From the article: 'NHTSA wants automakers to make it impossible to enter text for messaging and internet browsing while the car is in motion, disable any kind of video functionality and prevent text-based information such as social media content or text messages from being displayed.' Obviously these regulations would need to go beyond cellphones, as laptop, tablet or any other gadget with a 3G data connection or even on a wi-fi hotspot made by your phone would be equally distracting."
Government

Saudi Arabia Blocks Viber Messaging Service 83

another random user writes in with news about Saudi Arabia blocking a popular messaging service for not providing "a means to to be monitored." "The head of the messaging application Viber has said people in Saudi Arabia have had basic freedoms taken away, after his service was blocked there. Talmon Marco told the BBC he did not know the reason for the move, but that Viber would be restored soon. In March Saudi authorities warned Viber and other encrypted messaging services that they would be blocked unless they provided a means to to be monitored. Mr Marco said he had refused to provide data requested by Saudi officials. The fact that Viber's free phone and text messaging service is no longer working in the country is not entirely unexpected. The Saudi telecoms regulator had warned the firm — along with Skype and Whatsapp — that they would be blocked if they did not agree to be monitored."
Handhelds

It's Time To Start Taking Stolen Phones Seriously 282

itwbennett writes "'Find My iPhone' is neat, but it's time for smartphone makers and carriers to stop pretending their anti-theft measures are anything more than minimum viable products, says blogger Kevin Purdy. He's not the first to point this out: As reported in Slashdot, 'NYC Mayor Michael Bloomberg said overall crime in New York City was up 3.3% in 2012 due to iPhone, iPad and other Apple device thefts.' And now San Francisco and New York attorneys general are calling a 'Smartphone Summit' where representatives from Apple, Google, Samsung, and Microsoft are due to meet and discuss the implementation of a industry-wide 'kill switch' system."
Privacy

US Mining Data Directly From 9 Silicon Valley Companies 404

Rick Zeman writes "Hot on the heels of Verizon's massive data dump to NSA comes news of 'PRISM' where The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person's movements and contacts over time. This program, established in 2007, includes major companies such as Apple, Microsoft, Yahoo, Google, Facebook...and more."
Data Storage

NSA Building $860 Million Data Center In Maryland 177

1sockchuck writes "As its current data collection makes headlines, the National Security Agency is continuing to expand its data storage and processing capabilities. The agency recently broke ground on an $860 million data center at Fort Meade, Maryland that will span more than 600,000 square feet. The project will provide additional IT capacity beyond the NSA's controversial Utah data center. The new facility will be supported by 60 megawatts of power and use both air-cooled and liquid-cooled equipment."
The Courts

Amazon: Publishers Strong-Armed Us On E-Books 171

Nerval's Lobster writes "Strengthened by an agreement with Apple that set the prices for their respective e-books higher, publishers strong-armed Amazon into giving them similar terms, an executive for the online retailer has testified in Manhattan federal court. The U.S. Department of Justice has taken Apple to court over the alleged price-fixing, after reaching out-of-court settlements with five publishers (HarperCollins Publishers LLC, Simon & Schuster, Hachette Book Group, Penguin Group, and MacMillian). Apple, which competes with Amazon in the e-book space, refused a similar settlement. "Certainly if someone offered reseller, we would have taken them up on that offer," Russell Grandinetti, Amazon's vice president for Kindle content, testified before the court, according to Reuters. "Reseller" means a company sells goods to a retailer for a particular price (usually wholesale), allowing the retailer to set the actual sales price. Under the terms of that model, Amazon could sell e-books for super-cheap, even if it meant going beneath the publisher's wholesale price. Macmillan and Amazon ended up in conflict over the issue, with Amazon temporarily yanking the publisher's e-books from its digital shelves. "We will have to capitulate and accept Macmillan's terms because Macmillan has a monopoly over their own titles, and we will want to offer them to you even at prices we believe are needlessly high for e-books," Amazon wrote in a statement at the time. "Amazon customers will at that point decide for themselves whether they believe it's reasonable to pay $14.99 for a bestselling e-book." But Amazon eventually relented to Macmillan's demands, along with those of other publishers, and submitted to the agency model, in which publishers have a heavier hand in setting retail pricing."
United States

The NSA: Never Not Watching 568

Trailrunner7 writes "For many observers of the privacy and surveillance landscape, the revelation by The Guardian that the FBI received a warrant from the secretive Foreign Intelligence Surveillance Court to require Verizon to turn over to the National Security Agency piles of call metadata on all calls on its network probably felt like someone telling them that water is wet. There have been any number of signals in the last few years that this kind of surveillance and data collection was going on, little indications that the United States government was not just spying on its own citizens, but doing so on a scale that would dwarf anything that all but the most paranoid would imagine." And now the Obama administration has defended the practice as a "critical tool."
The Courts

Class Action Suit Goodies Await Tech Users 117

jfruh writes "Did you buy an Acer laptop with Vista and less than 1 GB of RAM? The company has a thumb drive it would like to send you. Did you get an unwanted text from Papa John's? The company would like to make it up with you with $50 worth of free pizza. These and other little rewards are available as a result of class action lawsuits that have wound their ways through the court systems and now, years later, are paying off for very large groups of tech users." I wonder how many USB drives the lawyers took as their share.
Education

Hacker Exposes Evidence of Widespread Grade Tampering In India 304

Okian Warrior writes "Hackaday has a fascinating story about Indian college student Debarghya Das: 'The ISC national examination, taken by 65,000 12th graders in India, is vitally important for each student's future: a few points determines which university will accept you and which will reject you. One of [Debraghya]'s friends asked if it was possible to see ISC grades before they were posted. [Debraghya] was able to download the exam records of nearly every student that took the test. Looking at the data, he also found evidence these grades were changed on a massive scale."
Bitcoin

Fake Mt. Gox Pages Aim To Infect Bitcoin Users 74

An anonymous reader writes "Mt. Gox is the the largest Bitcoin exchange in the world, and as such it and its users are being repeatedly targeted by attackers. Some two months ago, it battled a massive DDoS attack that was likely aimed at destabilizing the virtual currency and allow the criminals to profit from the swings. Now, according to Symantec researchers, the criminals have turned to spoofing Mt. Gox' site and tricking its customers into downloading malware — the Ponik downloader Trojan, which is also able to steal passwords."

Slashdot Top Deals