×
Privacy

To Counter Widespread Surveillance, Stealth Clothing 104

In Paul Theroux's dystopian novel O-Zone, wearing masks in public is simply a fact of life, because of the network of cameras that covers the inhabited parts of earth. Earthquake Retrofit writes with a story at the New York Times describing a life-imitating-art reaction to the perception (and reality) that cameras are watching more of your life than you might prefer: clothing that obscures your electronic presence. "[Adam Harvey] exhibited a number of his stealth-wear designs and prototypes in an art show this year in London. His work includes a series of hoodies and cloaks that use reflective, metallic fabric — like the kind used in protective gear for firefighters — that he has repurposed to reduce a person’s thermal footprint. In theory, this limits one’s visibility to aerial surveillance vehicles employing heat-imaging cameras to track people on the ground. He also developed a purse with extra-bright LEDs that can be activated when someone is taking unwanted pictures; the effect is to reduce an intrusive photograph to a washed-out blur. In addition, he created a guide for hairstyling and makeup application that might keep a camera from recognizing the person beneath the elaborate get-up. The technique is called CV Dazzle — a riff on 'computer vision' and 'dazzle,' a type of camouflage used during World War II to make it hard to detect the size and shape of warships."
EU

Snowden: NSA Spying On EU Diplomats and Administrators 417

An anonymous reader writes "According to a report dated 2010 recently provided by [former NSA contractor Edward] Snowden to the German news magazine 'Der Spiegel', the NSA has systematically been spying on institutions of the EU in Washington DC, New York, and Brussels. Methods of spying include bugging, phone taps, and network intrusions and surveillance according to the documents." All part of a grand tradition.
Privacy

Ask Slashdot: Explaining Cloud Privacy Risks To K-12 Teachers? 168

hyperorbiter writes "With the advent of Google Apps for Education, there has been a massive uptake by the K12 schools I deal with on signing students up with their own Google powered email address under the school domain. In addition, the students' work when using Google Apps is stored offshore and out of our control — with no explicit comeback if TOS are breached by Google. It seems to me that the school cannot with integrity maintain it has control over the data and its use. I have expressed a concern that it is unethical to use these services without informing the students' parents of what is at stake e.g. the students are getting a digital footprint from the age of seven and are unaware of the implications this may have later in life. The response has often been that I'm over-reacting and that the benefits of the services far outweigh the concerns, so rather than risk knee jerk reactions by parents (a valid concern) and thereby hampering 'education', it's better to not bring this stuff up. My immediate issue isn't so much about the use of the cloud services now, but the ethics over lack of disclosure in the parental consent process. Does anyone have ideas about defining the parameters of 'informed consent' where we inform of risks without bringing about paranoia? (Google Apps is just an example here, I think it applies to many cloud services.)"
United States

Number of Federal Wiretaps Rose 71 Percent In 2012 84

cold fjord writes "Looks like last year was pretty busy. I wonder how many were leaks and media? From the Washington Post: 'The number of wiretaps secured in federal criminal investigations jumped 71 percent in 2012 over the previous year, according to newly released figures. Federal courts authorized 1,354 interception orders for wire, oral and electronic communications, up from 792 the previous year, ... There was a 5 percent increase in state and local use of wiretaps in the same period. ... There is no explanation of why the federal figures increased so much, and it is generally out of line with the number of wiretaps between 1997 and 2009, which averaged about 550 annually. There was also a large number of wiretaps in 2010, when 1,207 were secured. A single wiretap can sweep up thousands of communications. One 30-day local wiretap in California, for instance, generated 185,268 cellular telephone interceptions, of which 12 percent were incriminating, according to the report. The vast majority of the wiretaps in both federal and state cases were obtained as part of drug investigations, and they overwhelmingly were directed at cellphones ... Only 14 court orders were for personal residences. Most jurisdictions limit the period of surveillance to 30 days, but extensions can be obtained.'"
Government

NSA Revelation Leads FTC To Propose "Reclaim Your Name" Initiative 82

First time accepted submitter clegrand writes "Julie Brill, a member of the Federal trade Commission, has proposed a voluntary big data industry initiative to allow consumers access to their personal records and the ability to correct them. She has coined it 'Reclaim Your Name.' While some big data companies such as Acxiom already allow such access, it is not an industry-wide practice. She sees this campaign as a natural extension of the Fair Credit Reporting Act and a logical partner for the ongoing effort of the Do Not Track mechanism currently under standardization review with the W3C."
Education

L.A. School District's 30,000 iPads May Come With Free Lock-In 232

lpress writes "The Los Angeles Unified School District will spend $30 million over the next two years on iPads for 30,000 students. Coverage of the announcement has focused on Apple winning over other tablets, but that is not the key point. The top three proposals each included an app to deliver Pearson's K-12 Common Core System of Courses along with other third-party educational apps. The Common Core curriculum is not yet established, but many states are committed to it, starting next year. The new tablets and the new commitment to the Common Core curriculum will arrive around the same time, and busy faculty (and those hired to train them) will adopt the Pearson material. The tablets will be obsolete in a few years and the hardware platform may change, but lock-in to Pearson's default curriculum may last for generations."
The Internet

AT&T Gets Patent To Monitor and Track File-Sharing Traffic 75

An anonymous reader writes "Internet provider AT&T has patented a new technology that allows the company to accurately track content being shared via BitTorrent and other P2P networks. The company explains that the technology can be utilized to detect pirated downloads and combat congestion on its network. Whether the company is already using the system to track infringing content, or has plans to do so, is unknown."
The Media

FBI Paid Informant Inside WikiLeaks 458

An anonymous reader writes with this excerpt from Wired: "On an August workday in 2011, a cherubic 18-year-old Icelandic man named Sigurdur 'Siggi' Thordarson walked through the stately doors of the U.S. embassy in Reykjavik, his jacket pocket concealing his calling card: a crumpled photocopy of an Australian passport. The passport photo showed a man with a unruly shock of platinum blonde hair and the name Julian Paul Assange. Thordarson was long time volunteer for WikiLeaks with direct access to Assange and a key position as an organizer in the group. With his cold war-style embassy walk-in, he became something else: the first known FBI informant inside WikiLeaks. For the next three months, Thordarson served two masters, working for the secret-spilling website and simultaneously spilling its secrets to the U.S. government in exchange, he says, for a total of about $5,000. The FBI flew him internationally four times for debriefings, including one trip to Washington D.C., and on the last meeting obtained from Thordarson eight hard drives packed with chat logs, video and other data from WikiLeaks."
Robotics

DARPA-Funded Software Could Usher In the Era of Open-Source Robotics 17

malachiorion writes "The best thing to come out of the DARPA Robotics Challenge, so far, isn't the lineup of nifty rescue bots being developed by teams around the world, or even Boston Dynamics' incredible Atlas humanoid. It's the pumped-up version of Gazebo, the free, open-source robotics simulation software whose expansion and further development is being funded by DARPA. This article has a look at how the software was used in the recent virtual leg of the competition, as well as how it could change the way robotics R&D is conducted (and create more roboticists, with its low-cost, cloud-based architecture)."
Input Devices

Apple Files Patent For New Proprietary Port 282

rwise2112 writes "Apple proposes a solution to multiple port requirements within limited space: the two in one port. The port is described as a 'Combined Input Port,' where two different interfaces could be in one port. The input port includes an outer wall defining a receiving aperture, a substrate positioned within the receiving aperture. One set of contacts is configured to communicate with a first connector and the second set of contacts is configured to communicate with a second connector. Looks like another addition to the special Apple cable lineup."
The Courts

Teenage League of Legends Player Jailed For Months For Facebook Joke 743

Kohath writes "Eighteen-year-old Justin Carter of Austin, Texas was arguing with a friend on Facebook about League of Legends back in February. After being called 'insane,' he responded with 'Oh yeah, I'm real messed up in the head, I'm going to go shoot up a school full of kids and eat their still, beating hearts.' Below that, he wrote 'lol' and 'jk.' He was arrested March 27, 2013 and has been in jail since that time. A hearing to review his case is scheduled for July 1, 2013. His parents have launched a change.org petition to convince the authorities to release their son."
The Courts

Boston Marathon Bomber Charged With Using 'Weapon of Mass Destruction' 533

New submitter bunkymag writes "Dzhokhar Tsarnaev has now been indicted on over 30 charges relating to his part in the Boston Marathon bombing. Of particular note however is a charge of using a 'Weapon of Mass Destruction.' It's a bit out of line with the commonly-held perception of the term, most notably used in justifying the invasion of Iraq. However, U.S. criminal law defines a 'weapon of mass destruction' much more broadly, including virtually any explosive device: bombs, grenades, rockets, missiles, mines, etc. The question arises: is it wise for Tsarnaev to face such a politically-loaded charge? From an outsider perspective, it would seem easy enough to leverage any number of domestic anti-terror laws to achieve anything up to and including the death penalty if required. Why, then, muddy the waters with this new WMD claim, when the price could be giving further ammunition to groups outside of America that already clearly feel the rules are set up to indict them on false pretenses, and explicitly use this sense of outrage to attract new terrorist recruits?"
The Military

U.S. Army Block Access To The Guardian's Website Over NSA Leaks 331

New submitter crashcy writes "According to a spokesman for the U.S. Army, the military organization is 'blocking all access to The Guardian newspaper's reports about the National Security Agency's sweeping collection of data about Americans' email and phone communications.' The spokesman goes on to state that it is routine to block access where classified materials may be distributed. The term used was 'network hygiene.' 'Campos wrote if an employee accidentally downloaded classified information, it would result in "labor intensive" work, such as the wipe or destruction of the computer's hard drive. He wrote that an employee who downloads classified information could face disciplinary action if found to have knowingly downloaded the material on an unclassified computer.'"
Privacy

Richard Stallman Speaks About Back Doors After NSA Documents Leak 332

An anonymous reader writes "Companies such as Microsoft, Facebook, Apple, and Google are scrambling to restore trust amid fresh litigation over the PRISM surveillance program. Richard Stallman, the founder of the Free Software Foundation and a newly-inducted member of the 2013 Internet Hall of Fame, speaks about not only abandoning the cloud, which he warned about 5 years ago, but also escaping software with back doors. 'I don't think the US government should use operating systems made in China,' he says in this new interview, 'for the same reason that most governments shouldn't use operating systems made in the US and in fact we just got proof since Microsoft is now known to be telling the NSA about bugs in Windows before it fixes them.'"
United States

FTC Wins Huge $7.5 Million Penalty Against "Do Not Call" List Violator 136

coondoggie writes "The Federal Trade Commission today said it has won a $7.5 million civil penalty – the largest ever — against Mortgage Investors Corporation, one of the nation's biggest refinancers of veterans' home loans for allegedly violating 'Do Not Call' requirements. According to the FTC’s complaint, Mortgage Investors Corporation called consumers on the Federal Trade Commission’s National Do Not Call Registry, failed to remove consumers from its company call list upon demand, and misstated the terms of available loan products during telemarketing calls."
Government

Tesla Faces Tough Regulatory Hurdle From State Dealership Laws 309

First time accepted submitter vinnyjames writes "States like Arizona, Texas, Massachusetts and North Carolina either have or have recently added legislation to prevent Tesla from selling its cars directly to consumers. Now there's a petition on whitehouse.gov to allow them to sell cars directly to consumers." Laws that protect auto dealerships aren't newly created for Tesla, though, as explained in this interview with Duke University's Mike Munger.
Crime

TN Man Indicted For Romney Blackmail Attempt: Wanted $1M In Bitcoins 92

OakDragon writes "A Franklin, Tennessee man has been indicted for his attempt to blackmail Mitt Romney. Michael Mancil Brown allegedly claimed his intent to release some of Romney's pre-2010 tax documents unless one million dollars was converted to Bitcoins and deposited into an account which he specified. Demand letters were sent to Republican and Democratic Party offices in Tennessee, and Pricewaterhouse Coopers (whom he claimed to have stolen the documents from). Pricewaterhouse Coopers denies that he ever obtained such documents. Brown was also attempting to "sell" the documents to others (presumably the Democrats or other interested parties) for the same amount. And yes, he was apparently well aware of the Dr. Evil reference."
Privacy

Automated Plate Readers Let Police Collect Millions of Records On Drivers 276

schwit1 writes with a report on just how extensive always-on license plate logging has gotten. The article focuses on California; how different is your state? "In San Diego, 13 federal and local law enforcement agencies have compiled more than 36 million license-plate scans in a regional database since 2010 with the help of federal homeland security grants. The San Diego Association of Governments maintains the database. Unlike the Northern California database, which retains the data for between one and two years, the San Diego system retains license-plate information indefinitely. Can we get plate with code to delete the database?"
United Kingdom

Meet PRISM's English Little Brother: Socmint 76

An anonymous reader writes with a story at Ars Technica, according to which "For the past two years, a secretive unit in the Metropolitan Police has been developing the tools for blanket surveillance of the public's social media conversations. Operating 24 hours a day, seven days a week, a staff of 17 officers in the National Domestic Extremism Unit (NDEU) has been scanning the public's tweets, YouTube videos, Facebook profiles, and anything else UK citizens post in the public online sphere. ... Surveillance operations often require a ministerial sign-off or permission from a superior, but it is unclear whether targeting of public social media data requires the same level of oversight, as head of research at Privacy International Eric King points out."
Crime

RC Plane Attack 'Foiled,' Say German Authorities 233

garymortimer writes with this excerpt from Sky News as carried by Yahoo UK: "German authorities are holding two men of Tunisian origin who they say are facing possible charges for the 'preparation of a serious, state-threatening act of violence.' Prosecutors say the men are suspected of 'procuring information and objects to commit Islamic extremist explosive attacks with remote-controlled model airplanes,' prosecutors added. Police investigating the terror plot on Tuesday launched a series of raids in Stuttgart and Munich in southern Germany and Saxony in the east. They also carried out one raid in Belgium. No-one was arrested. The suspects had been under surveillance for more than a year and authorities had recently detected 'an increased interest in explosives and model aircraft,' according to an unnamed security source quoted by a German news agency."

Slashdot Top Deals