hypnosec writes "Authorities in Japan are presumably worried about their inability to tackle cybercrime and, in a bid to stem one of the sources of anonymous traffic, the National Police Agency (NPA) is asking ISPs to block Tor. The recommendation comes from the special panel formed by the NPA after a hacker going by the name Demon Killer was found to regularly use Tor to anonymize his online activities, like posting of death threats on public message boards."
Want business-intelligence news delivered to your inbox? Signup for SlashBI Update now.
An anonymous reader writes "What do you get mugged in Central London and the local police are too incompetent to find a mugger even with his address and photograph? You may not be able to get to the laptop, but you still own the photos and data on it, so you set up the NSFW Plumpergeddon blog which gives details of the subsequent 'owner's' 'Brick House Butts' fetishes. Now of course later the IT media might get interested and offer an interview with a promise to let him review the article and keep his name secret. luckily our hero is not so innocent and demonstrates the value of using a false name on the internet as well as planting your own monitoring software on your laptop."
New submitter JoeyRox writes "On 3/22 the Senate approved a non-binding proposal to allow states to tax online sales to residents outside their state. That vote was a trial balloon to gauge the support for the Marketplace Fairness Act. This week Senate Majority Leader Harry Reid filed a cloture to allow the law to be voted on for real this time. The vote may occur as soon as tomorrow. eBay is attempting to rally Americans against the bill via a massive email campaign."
First time accepted submitter thejezus writes "A spy cabinet has been exposed on a public road in The Hague, the Netherlands (Google translate here). The cabinet was disguised as telecom-cabinet and was detected by the maintenance crew of Ziggo (a triple-play provider) because it was not listed as a property of the company. Upon opening, it was revealed the cabinet contained a camera and UMTS equipment. Later that day, the cabinet disappeared. 1984 much?"
An anonymous reader writes "My Skype account was hijacked, which I discovered after Skype suspended it for suspicious activity, including a number of paid calls and an attempt to debit my card. Now that I've secured the account again, I can see the call history — there are several numbers called in Senegal, Mali, Benin and Philippines. Obviously I could call them myself and create a bit of havoc in their lives, but ideally I'd like to trace the hijacker himself — perhaps with some kind of 'social engineering' approach. Or is it just a waste of time?" How would you do this, and would you bother?