Forgot your password?
typodupeerror

Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

Privacy

Journalist Arrested In Greece For Publishing List of Possible Tax-Evaders 344

Posted by samzenpus
from the naughty-list dept.
kyriacos writes "The Greek government is charging journalist Kostas Vaxevanis with violation of the data privacy law for publishing a list of about 2,000 Greeks who hold accounts with the HSBC bank in Switzerland. While more and more austerity measures are being taken against the people of Greece, there is still no investigation of tax evasion for the people on this list by the government. The list has been in the possession of the Greek government since 2010."
Canada

US and Canada Launch Joint Cybersecurity Plan 42

Posted by samzenpus
from the when-our-powers-combine dept.
wiredmikey writes "Canada and the United States announced Friday they were launching a joint cybsersecurity plan that aims to better protect critical digital infrastructure and improve the response to cyber incidents. Under the action plan, the US Department of Homeland Security and Public Safety Canada will cooperate to protect vital cyber systems and respond to and recover from any cyber disruptions, by improving collaboration on managing cyber incidents between their respective cyber security operation centers, enhancing information sharing and engagement with the private sector and pursuing US-Canadian collaboration to promote cyber security awareness to the public."
Censorship

Pakastani Politician Detained By US Customs Over Opposition To Drone Strikes 560

Posted by samzenpus
from the think-differently dept.
First time accepted submitter Serious Callers Only writes "According to reports, Imran Khan was detained yesterday by US officials for questioning on his views on United States drone strikes in Pakistan. Glenn Greenwald writing for the guardian: 'On Saturday, Khan boarded a flight from Canada to New York in order to appear at a fundraising lunch and other events. But before the flight could take off, U.S. immigration officials removed him from the plane and detained him for two hours, causing him to miss the flight. On Twitter, Khan reported that he was "interrogated on [his] views on drones" and then added: "My stance is known. Drone attacks must stop." He then defiantly noted: "Missed flight and sad to miss the Fundraising lunch in NY but nothing will change my stance."'"
Google

To Google Friends Or Not To Google, That Is the Question 117

Posted by samzenpus
from the how-about-just-asking dept.
Hugh Pickens writes writes "Henry Alford writes that in an ideal world, we would all use Google to be better friends by having better recall and to research our new friends and acquaintances to get to know them better. 'It's perfectly natural and almost always appropriate,' says social anthropologist Kate Fox. 'Obviously, one is always going to have to be discreet when talking about what you've found. But our brains haven't changed since the Stone Age, and humans are designed to live in small groups in which everyone knows one another. Googling is an attempt to recreate a primeval, preindustrial pattern of interaction.' But the devil is in the details. If we tell a new friend that we've read her LinkedIn entry or her wedding announcement, it probably won't be perceived as trespassing, as long we bear no ulterior motives. If we happen to reveal that we've also read her long-ago abandoned blog about her cat, we're more likely to be seen as chronically bored than menacing. 'I'm so baffled by this idea that we're not supposed to Google people,' says Dean Olsher. 'Why would there be a line? Like everyone else is allowed to know something but I'm not?' But doesn't taking the google shortcut to a primeval, preindustrial pattern of recognition sometimes rob encounters of their inherent mystery or even get us in trouble? Tina Jordan, an executive in book publishing who has the same name as a former girlfriend of Hugh Hefner, says, 'I typically tell any blind dates before I meet them that they probably shouldn't Google my name, otherwise they'll be sorely disappointed when they meet me.'"
Canada

Canadian Police Want New Internet Surveillance Tools 64

Posted by Soulskill
from the don't-we-all dept.
danomac writes "Police agencies in Canada want to have better tools to do online surveillance. Bill C-30 was to include new legislation (specifically Section 34) that would give police access to information without a warrant. This can contain your name, your IP address, and your mobile phone number. This, of course, creates all sorts of issues with privacy online. The police themselves say they have concerns with Section 34. Apparently, the way it is worded, it is not just police that can request the information, but any government agent. Would you trust the government with this kind of power?"
Government

Cash-Strapped States Burdened By Expensive Data Security Breaches 58

Posted by Soulskill
from the states-such-as-south-carolina dept.
CowboyRobot writes "As budgets are pinched by reduced tax collection, many U.S. states are facing a possibility of not being able to handle the ever-increasing number of data breaches. 70% of state chief information security officers (CISOs) reported a data breach this year, each of which can cost up to $5M in some states. 'Cybersecurity accounts for about 1 to 2 percent of the overall IT budget in state agencies. ... 82 percent of the state CISOs point to phishing and pharming as the top threats to their agencies, a threat they say will continue in 2013, followed by social engineering, increasingly sophisticated malware threats, and mobile devices.' The full 2012 Deloitte-National Association of State Chief Information Officers (NASCIO) Cybersecurity Study is available online (PDF)."
Networking

Cisco Pricing Undercut By $100M In Big Cal State University Network Project 220

Posted by Soulskill
from the added-an-extra-zero dept.
alphadogg writes "The $100 million price differential between the Alcatel-Lucent and Cisco proposals to refresh California State University's 23-campus network revealed earlier this week was based on an identical number of switches and routers in various configurations. CSU allowed Network World to review spreadsheets calculating the eight-year total cost of ownership of each of the five bidders for the project. 'Everybody had to comply with this spreadsheet,' said CSU's director of cyberinfrastructure. 'Alcatel-Lucent won the project with a bid of $22 million. Cisco was the high bidder with a cost just under $123 million. Not only was Cisco's bid more than five-and-a-half times that of Alcatel-Lucent's, it was three times that of the next highest bidder: HP, at $41 million.'"
Electronic Frontier Foundation

Secret Stingray Warrantless Cellphone Tracking 62

Posted by Soulskill
from the your-phone-is-broadcasting-an-ip-address dept.
Penurious Penguin writes "Last year a Slashdot story mentioned the case of Daniel David Rigmaiden, or 'the Hacker.' With the help of an IMSI-catcher device, law enforcement had been able to locate and arrest the elusive 'Hacker,' leading to U.S. v. Rigmaiden. But far more elusive than the 'Hacker,' is the IMSI-catcher device itself — particularly the legalities governing its use. The secrecy and unconstitutionality of these Man In The Middle devices, i.e. 'stingrays,' has caught some attention. The EFF and ACLU have submitted an amicus brief in the Rigmaiden case; and EPIC, after filing an FOIA request in February and receiving a grossly redacted 67 out of 25,000 (6,000 classified) pages on the "stingray" devices, has now requested a district judge expedite disclosure of all documents. Some Judges also seem wary of the 'stingray,' having expressed concerns that their use violates the Fourth Amendment; and additionally, that information explaining how the technology is used remains too obscure. Perhaps the most controversial aspect of ISMI-catchers is their several-kilometer range. When a "stingray" is used to spoof a cellphone tower, thousands of innocent users may be collaterally involved. And while the government claims to delete all gathered data unrelated to the target, it also means no one else can know what that data really was. The government claims that because only attributes of calls — but not their content — are captured in the attack, search warrants aren't necessary." (More, below.)
The Courts

Supreme Court To Hear First Sale Doctrine Case 242

Posted by Soulskill
from the can't-wait-to-hear-what-thomas-has-to-say dept.
Registered Coward v2 writes "The U.S. Supreme Court is set to hear a case to determine how copyright law and the doctrine of first sale applies to copyrighted works bought overseas, then imported to the U.S. and then re-sold. The case involves a foreign student who imported textbooks from Asia and the resold them in the U.S. to help fund his education. He was sued by the publisher, lost, and was ordered to pay $600,000 in damages. Now SCOTUS gets to weigh in on the issue. 'The idea -- upheld by the Supreme Court since 1908 -- is that once a copyright holder legally sells a product initially, the ownership claim is then exhausted, giving the buyer the power to resell, destroy, donate, whatever. It's a limited idea -- involving only a buyer's distribution right, not the power to reproduce that DVD or designer dress for sale. ... The tricky part is whether that first-sale doctrine applies to material both manufactured and first purchased outside the United States. Federal law gives that authority to a purchaser's work "lawfully made under this title." Does "this title" apply to any copyrighted work — whether manufactured all or in part in the United States and around the world?"
China

China Blocks NYT Over Critical Article 94

Posted by timothy
from the modern-and-progressive dept.
Taco Cowboy writes "The New York Times has become the latest target of Chinese censorship. Censors of the People's Republic of China, in an almost unheard of, truly remarkable feat of neck-breaking speed, blocked the (paywalled) website of the New York Times, all because of one news article. That particular article was about the enormous wealth of the family members of a very prominent figure in the Chinese Communist Party (CCP) — Chinese Premier Wen Jia Bao. The wealth in question totals some USD 2.7 billion. " (Also covered at the BBC.)
Crime

Paul Ceglia Arrested and Charged With Fraud Over Facebook Ownership Claims 109

Posted by Soulskill
from the know-when-to-fold-'em dept.
whoever57 writes "The man who claimed ownership of 50% of Facebook has been arrested and charged with fraud in connection with his claims. The United States attorney in Manhattan said, 'Ceglia's alleged conduct not only constitutes a massive fraud attempt, but also an attempted corruption of our legal system through the manufacture of false evidence.' 'Dressing up a fraud as a lawsuit does not immunize you from prosecution.'"
Government

South Carolina Department of Revenue Hacked, 3.6 Million SSNs Taken 112

Posted by Soulskill
from the boy-are-their-faces-red dept.
New submitter Escape From NY writes "3.6 million Social Security numbers and 387,000 credit and debit card numbers were stolen from the SC Department of Revenue. Most of the credit and debit card numbers were encrypted — all but about 16,000. There were several different attacks, all of which originated outside the country. The first they're aware of happened on August 27, and four more happened in September. Officials first learned of the breach on October 10, and the security holes were closed on October 20. This is still a developing story, but anyone who filed a SC state tax return since 1998 my be at risk. Governor Nikki Haley today signed an executive order (PDF) to beef up the state's IT security."
Government

TechCrunch Launches CrunchGov, a Tech Policy Platform 24

Posted by Soulskill
from the series-of-tubes dept.
An anonymous reader writes "TechCrunch has launched a project called CrunchGov, which aims to bring educated people together to work on tech-related government policy. 'It includes a political leaderboard that grades politicians based on how they vote on tech issues, a light legislative database of technology policy, and a public markup utility for crowdsourcing the best ideas on pending legislation.' They give politicians scores based on how their votes align with consensus on policy in the tech industry. 'A trial run of the public markup utility in Congress has already proven successful. When Rep. Issa opened his own alternative to SOPA for public markup, Project Madison participants came in droves with surprisingly specific legal suggestions. For instance, one savvy user noticed that current piracy legislation could mistakenly leave a person who owns a domain name legally responsible for the actions of the website administrator (the equivalent of holding a landlord responsible if his tenant was growing pot in the backyard). The suggestion was included in the updated bill before Congress, representing perhaps the first time that the public, en masse, could have a realistic shot at contributing to federal law purely based on the merit of their ideas.'"
Handhelds

Apple Posts Non-Apology To Samsung 413

Posted by Soulskill
from the we're-sorry-we're-so-much-cooler-than-you dept.
We recently discussed news of a UK court ruling in which the judge decided Apple must publicly acknowledge that Samsung's Galaxy Tab did not infringe upon the iPad's design, both on the Apple website and in several publications. The acknowledgement has now been posted, and it's anything but apologetic. It states the court's ruling, helpfully referring to "Apple's registered design No. 000018607-0001," and quotes the judges words as an advertisement. The judge wrote, "The informed user's overall impression of each of the Samsung Galaxy Tablets is the following. From the front they belong to the family which includes the Apple design; but the Samsung products are very thin, almost insubstantial members of that family with unusual details on the back. They do not have the same understated and extreme simplicity which is possessed by the Apple design. They are not as cool." They go on to mention German and U.S. cases which found in Apple's favor. Apple's statement concludes, "So while the U.K. court did not find Samsung guilty of infringement, other courts have recognized that in the course of creating its Galaxy tablet, Samsung willfully copied Apple's far more popular iPad."
Your Rights Online

Mother Found Guilty After Protesting TSA Pat-down of Daughter 652

Posted by Unknown Lamer
from the guess-it's-not-political-speech dept.
Penurious Penguin writes "In 2011, en route to Baltimore, Tennessee mother Andrea Abbott was arrested after squabbling with the TSA over their pat-down and "naked" body-scan process. Initially Abbott had protested a pat-down of her 14 year-old daughter, though eventually backed off. When her own turn came, she refused both a pat-down and body-scan. This week, despite having no criminal record, Abbott was found guilty of disorderly conduct and sentenced to one year of probation. A surveillance video of the affair shows what appears an agitated Abbott surrounded by various TSA agents, but seemingly contradicts the premise by which she was convicted. In the case against Abbott it was claimed that her behavior impeded the flow security-lines and lawful activity. Beyond Abbott's confession of issuing some verbal abuse, the video does not appear to display a significant blockage of traffic nor anything noticeably criminal."
DRM

Feds Continue To Consider Linux Users Criminals For Watching DVDs 423

Posted by Unknown Lamer
from the don't-watch-that-movie-you-paid-for dept.
An anonymous reader sent in a link to an article in Wired about the latest DMCA loophole hearing. Bad news: the federal government rejected requests that would make console modding and breaking DRM on DVDs to watch them legal. So, you dirty GNU/Linux hippies using libdvdcss better watch out: "Librarian of Congress James Billington and Register of Copyrights Maria Pallante rejected the two most-sought-after items on the docket, game-console modding and DVD cracking for personal use and 'space shifting.' Congress plays no role in the outcome. The regulators said that the controls were necessary to prevent software piracy and differentiated gaming consoles from smart phones, which legally can be jailbroken. ... On the plus side, the regulators re-authorized jailbreaking of mobile phones. On the downside, they denied it for tablets, saying an 'ebook reading device might be considered a tablet, as might a handheld video game device.'" So you can jailbreak a phone, but if it's 1" larger and considered a "tablet" you are breaking the law.
Google

What an Anti-Google Antitrust Case By the FTC May Look Like 167

Posted by timothy
from the follow-the-competitors'-blueprint dept.
hessian writes "It's not certain that Google will face a federal antitrust lawsuit by year's end. But if that happens, it seems likely to follow an outline sketched by Thomas Barnett, a Washington, D.C., lawyer on the payroll of Google's competitors. Barnett laid out his arguments during a presentation here last night: Google is unfairly prioritizing its own services such as flight search over those offered by rivals such as Expedia, and it's unfairly incorporating reviews from Yelp without asking for permission. 'They systematically reinforce their dominance in search and search advertising,' Barnett said during a debate on search engines and antitrust organized by the Federalist Society. 'Google's case ought to have been brought a year or two ago.'"
Encryption

Anonymous' WikiLeaks-Like Project Tyler To Launch In December 101

Posted by timothy
from the those-are-nice-words-you've-leaked dept.
hypnosec writes "A hacker who claims to be a member of the hacking collective Anonymous has revealed that the hacktivist group is working on a Wikileaks-like service dubbed Tyler and that it will be launched on December 21. The Anonymous member revealed that the service will be decentralized and will be based on peer-to-peer service, unlike Wikileaks, thus making Tyler rather immune to closure and raids. The site will serve as a haven for whistleblowers, where they can publish classified documents and information. The hacker said in an emailed interview that 'Tyler will be P2P encrypted software, in which every function of a disclosure platform will be handled and shared by everyone who downloads and deploys the software.'" That sounds like a lot to live up to. Decentralized, attack-resistant and encrypted all sound nice, but I'm curious both about the funding it would take, and whether it matches Wikileaks' own security.
Privacy

UK Gov't Official Advises Using Fake Details On Social Networks 175

Posted by timothy
from the all-hail-sacred-tax-collection dept.
another random user writes "A senior government official has sparked anger by advising internet users to give fake details to websites to protect their security. Andy Smith, an internet security chief at the Cabinet Office, said people should only give accurate details to trusted sites such as government ones. He said names and addresses posted on social networking sites 'can be used against you' by criminals. ... 'When you put information on the internet do not use your real name, your real date of birth,' he told a Parliament and the Internet Conference in Portcullis House, Westminster. 'When you are putting information on social networking sites don't put real combinations of information, because it can be used against you.' But he stressed that internet users should always give accurate information when they were filling in government forms on the internet, such a tax returns."

"If I do not want others to quote me, I do not speak." -- Phil Wayne

Working...