An anonymous reader writes "According to a report at The Daily Beast, the Obama administration has decided to give the drone program to the Pentagon, taking it away from the CIA. This could lead to increased transparency for the program and stricter requirements for drone strikes. From the article: 'Officials anticipate a phased-in transition in which the CIA’s drone operations would be gradually shifted over to the military, a process that could take as little as a year. Others say it might take longer but would occur during President Obama’s second term. “You can’t just flip a switch, but it’s on a reasonably fast track,” says one U.S. official. During that time, CIA and DOD operators would begin to work more closely together to ensure a smooth hand-off. The CIA would remain involved in lethal targeting, at least on the intelligence side, but would not actually control the unmanned aerial vehicles. Officials told The Daily Beast that a potential downside of the agency’s relinquishing control of the program was the loss of a decade of expertise that the CIA has developed since it has been prosecuting its war in Pakistan and beyond. At least for a period of transition, CIA operators would likely work alongside their military counterparts to target suspected terrorists.'"
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×
judgecorp writes "A new manual for cyber war has been compiled by international legal experts and published by NATO. The manual proposes that hospitals and dams should be off-limits for online warfare, and says that a conventional response is justified if an attack causes death or serious damage to property. The manual might get its first practical application today — South Korea's TV stations and banks have come under an attack which may well originate from North Korea."
An anonymous reader writes "I'm an indie developer about to release a small ($5 — $10 range) utility for graphic designers. I'd like to employ at least a basic deterrent to pirates, but with the recent SimCity disaster, I'm wondering: what is a reasonable way to deter piracy without ruining things for legitimate users? A simple serial number? Online activation? Encrypted binaries? Please share your thoughts."
coondoggie writes "Commercial grade green and red laser pointers emit energy far beyond what is safe, posing skin, eye and fire hazards. That was the conclusion of a National Institute of Standards and Technology study on the properties of handheld lasers. The study tested 122 of the devices and found that nearly 90% of green pointers and about 44% of red pointers tested were out of federal safety regulation compliance."
c0lo writes "U.S. federal authorities are examining Microsoft's involvement with companies and individuals that allegedly paid bribes to overseas government officials in exchange for business. The United States Department of Justice and the Securities and Exchange Commission have both opened preliminary investigations into the bribery allegations involving Microsoft in China, Italy and Romania. The China allegations were first shared with United States officials last year by an unnamed whistle-blower who had worked with Microsoft in the country, according to the person briefed on the inquiry. The whistle-blower said that a Microsoft official in China directed the whistle-blower to pay bribes to government officials to win business deals. U.S. government investigators are also reviewing whether Microsoft had a role in allegations that resellers offered bribes to secure software deals with Romania's Ministry of Communications. In Italy, Microsoft's dealings with consultants that specialize in customer-loyalty programs are under scrutiny, with allegations that Microsoft's Italian unit used such consultants as vehicles for lavishing gifts and trips on Italian procurement officials in exchange for government business. In a blog post Tuesday afternoon, John Frank, a vice president and deputy general counsel at Microsoft, said the company could not comment about continuing investigations. Mr. Frank said it was not uncommon for such government reviews to find that the claims were without merit. Somehow, given the way OOXML became a standard, it wouldn't surprise me if it were an actual fire that caused this smoke."
cylonlover writes with news that another police department has received authorization to start using drones for tasks like "...photographing crime scenes and searching for missing people." From the article: "The police department in Arlington can now use new tools in support of public safety over the Texas urban community — two small helicopter Unmanned Aerial Vehicles. The FAA has granted permission for the Arlington police to fly these unmanned aircraft under certain circumstances: they must fly under 400 feet, only in the daytime, be in sight of the operator and a safety observer, and be in contact with the control tower at the nearby Dallas-Fort Worth airport — one of the busiest in the country." They're using a Leptron Avenger, which "has been designed with military grade features" but don't worry, "police are quick to emphasize that the 4- to 5-foot-long aircraft aren’t the same as military drones."
concealment sends this quote from an article about evading internet censorship with the sneakernet: "Dissident Cuban blogger Yoani Sanchez on Saturday told newspaper publishers from around the Western Hemisphere that 'nothing is changing' in Cuba’s ossified political system and that 'the situation of press freedom in my country is calamitous.' But Sanchez said underground blogs, digital portals and illicit e-magazines proliferate, passed around on removable computer drives known as memory sticks. The small computer memories, also known as flash drives or thumb drives, are dropped into friendly hands on buses and along street corners, offering a surprising number of Cubans access to information. 'Information circulates hand to hand through this wonderful gadget known as the memory stick,' Sanchez said, 'and it is difficult for the government to intercept them. I can't imagine that they can put a police officer on every corner to see who has a flash drive and who doesn't.'"
An anonymous reader writes "The Charleston Gazette is reporting that the state of West Virginia hired a consulting firm for over $100,000 to investigate the state's use of Federal stimulus money (which included the purchase of $22,000 routers for tiny buildings). Unfortunately, the state government is now refusing a FOIA request to release the firm's report. The reason? The findings 'might be embarrassing to some people,' according to Commerce Secretary Keith Burdette."
Velcroman1 writes "The Children's Online Privacy Protection Act (COPPA) was enacted in 1998. In 2011, the FTC beefed up the measure, preventing sites from collecting personal information from kids such as name, location and date of birth without a parent's consent. This July, new amendments for kids under 13 will go into effect, approved by the FTC in December. The rules are targeted at sites that market specifically to kids. However, even a site like Facebook could be fined for allowing minors to post self-portraits, audio recordings of their voice, and images with geo-location data. There are also new restrictions on tracking data, with cookies or a unique identifier that follow registrants from one site to another."
Jeremy Allison - Sam writes "Ian Hickson, author and maintainer of the HTML5 specification, comments about the real reasons for DRM. They're not what you might think. Ian nails it in my opinion. He wrote, 'The purpose of DRM is not to prevent copyright violations. The purpose of DRM is to give content providers leverage against creators of playback devices. Content providers have leverage against content distributors, because distributors can't legally distribute copyrighted content without the permission of the content's creators. But if that was the only leverage content producers had, what would happen is that users would obtain their content from those content distributors, and then use third-party content playback systems to read it, letting them do so in whatever manner they wanted. ... Arguing that DRM doesn't work is, it turns out, missing the point. DRM is working really well in the video and book space. Sure, the DRM systems have all been broken, but that doesn't matter to the DRM proponents. Licensed DVD players still enforce the restrictions. Mass market providers can't create unlicensed DVD players, so they remain a black or gray market curiosity."
r5r5 writes "European Commission's Institute for Prospective Technological Studies has published a study which concludes that the impact of piracy on the legal sale of music is virtually nonexistent or even slightly positive. The study's results suggest that Internet users do not view illegal downloading as a substitute for legal digital music and that a 10% increase in clicks on illegal downloading websites leads to a 0.2% increase in clicks on legal purchase websites. Online music streaming services are found to have a somewhat larger (but still small) effect on the purchases of digital sound recordings, suggesting a complementary relationship between these two modes of music consumption. According to the results, a 10% increase in clicks on legal streaming websites leads to up to a 0.7% increase in clicks on legal digital purchase websites." It's worth noting that this study only measured the effect of piracy on online purchases, not on revenue from physical formats.
Diamonddavej writes "The Guardian warns that Bloggers in the U.K. could face costly fines for libel with exemplary damages imposed if they do not sign up with a new press regulator under legislation (Clause 21A — Awards of exemplary damages) recommended by The Leveson Inquiry into press behavior and ethics. Kirsty Hughes, the chief executive of Index on Censorship, said this a 'sad day' for British democracy. 'This will undoubtedly have a chilling effect on everyday people's web use.' Exemplary damages, imposed by a court to penalize publishers who remain outside regulation, could run into hundreds of thousands of pounds, easily enough to close down smaller publishers such as Private Eye and local newspapers. Harry Cole, who contributes to the Guido Fawkes blog says he does not want to join a regulator, he hopes his blog will remain as irreverent and rude as ever, and continue to hold public officials to account; its servers are located in the U.S. Members of Parliament voted on Clause 21A late last night, it passed 530 to 13."
langelgjm writes "In a closely-watched case, the U.S. Supreme Court today vindicated the first-sale doctrine, declaring that it "applies to copies of a copyrighted work lawfully made abroad." The case involved a Thai graduate student in the U.S. who sold cheap foreign versions of textbooks on eBay without the publisher's permission. The 6-3 decision has important implications for goods sold online and in discount stores. Justice Stephen Breyer said in his opinion (PDF) that the publisher lost any ability to control what happens to its books after their first sale abroad."
theodp writes "The Boston Globe reports that the estate of Aaron Swartz filed a motion in federal court in Boston Friday to allow the release of documents in the case that has generated national controversy over the U.S. attorney's aggressive pursuit of a stiff sentence. The Court filing (PDF) suggests that the U.S. attorney's office is still up for jerking Aaron around a little posthumously, seeking what his lawyers termed overbroad redactions, including names and titles that are already publicly known. Swartz's family also seeks the return of his seized property (PDF). Last week, Swartz's girlfriend accused MIT of dragging its feet on investigating his suicide. Meanwhile, Slate's Justin Peters asks if the Justice Department learned anything from the Aaron Swartz case, noting that Matthew Keys, who faces 25 years in prison for crimes that include aiding-and-abetting the display of humorously false content, could replace Swartz as the poster boy for prosecutorial overreach."
sarysa writes "The Supreme Court has refused to hear the latest appeal of the 7 year old Jammie Thomas case, regarding a single mother who was fined $222,000 in her most recent appeal for illegally sharing 24 songs. Those of us hoping for an Eighth Amendment battle over this issue will not be seeing it anytime soon. In spite of the harsh penalties, the journalist suggests that: 'Still, the RIAA is sensitive about how it looks if they impoverish a woman of modest means. Look for them to ask her for far less than the $222,000.'"
rcade writes "Jeff Dee and Jack Herman, the creators of the old-school super-hero roleplaying game Villains & Vigilantes, have won a copyright and trademark lawsuit over the game's publisher Scott Bizar of Fantasy Games Unlimited. Magistrate Judge Mark E. Aspey of the U.S. District Court of Arizona ruled that Jeff Dee and Jack Herman own the rights to the game based on the 1979 contract they reached with Bizar. The court also found that Bizar never had the right to sell derivative products or ebook PDF editions, which are a big deal to tabletop publishers these days. Too bad this judge didn't hear Jerry Siegel and Joe Shuster's case."
In 2010, querying a public AT&T database yielded over 114,000 email address for iPad owners who were subscribed to the carrier. One of the people who found these emails, Andrew 'weev' Auernheimer, sent them to a news site to publicize AT&T's security flaw. He later ended up in court for his actions. Auernheimer was found guilty, and today he was sentenced to 41 months in prison. 'Following his release from prison, Auernheimer will be subject to three years of supervised release. Auernheimer and co-defendant Daniel Spitler were also ordered to pay $73,000 in restitution to AT&T. (Spitler pled guilty in 2011.) The pre-sentencing report prepared by prosecutors recommended four years in federal prison for Auernheimer.' A journalist watching the sentencing said, 'I felt like I was watching a witch trial as prosecutors admitted they didn't understand computers.'
An anonymous reader writes "When cell phone unlocking became illegal last month, it set off a firestorm of debate over what rights people should have for phones they have legally purchased. But this is really just one facet of a much larger problem with property rights in general. 'Silicon permeates and powers almost everything we own. This is a property rights issue, and current copyright law gets it backwards, turning regular people — like students, researchers, and small business owners — into criminals. Fortune 500 telecom manufacturer Avaya, for example, is known for suing service companies, accusing them of violating copyright for simply using a password to log in to their phone systems. That's right: typing in a password is considered "reproducing copyrighted material." Manufacturers have systematically used copyright in this manner over the past 20 years to limit our access to information. Technology has moved too fast for copyright laws to keep pace, so corporations have been exploiting the lag to create information monopolies at our expense and for their profit. After years of extensions and so-called improvements, copyright has turned Mickey Mouse into a monster who can never die.' We need to win the fight for unlocking phones, and then keep pushing until we actually own the objects we own again."
iComp writes "A sophisticated scheme to use a casino's own security systems against it has netted scammers $33 million in a high-stakes poker game after they were able to gain a crucial advantage by seeing the opposition's cards. The team used a high-rolling accomplice from overseas who was known to spend large amounts while gambling at Australia's biggest casino, the Crown in Melbourne, according to the Herald Sun. He and his family checked into the Crown and were accommodated in one of its $30,000-a-night villas. The player then joined a private high-stakes poker game in a private suite. At the same time, an unnamed person got access to the casino's CCTV systems in the poker room and fed the information he gleaned back to the player via a wireless link. Over the course of eight hands the team fleeced the opposition to the tune of $33 million."
dstates writes "SAM (Systems for Awards Management) is a financial management system that the US government requires all contractors and grantees to use. This system has recently been rolled out to replace the older CCR system. Friday night, thousands of SAM users received the following message: 'Dear SAM user, The General Services Administration (GSA) recently has identified a security vulnerability in the System for Award Management (SAM), which is part of the cross-government Integrated Award Environment (IAE) managed by GSA. Registered SAM users with entity administrator rights and delegated entity registration rights had the ability to view any entity's registration information, including both public and non-public data at all sensitivity levels.' From March 8 to 10, any registered user who searched the system could view confidential information including account and social security numbers for any other user of the system. Oops! The Government Services Administration says that they have fixed the problem."