Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Communications

BART Defends Mobile Service Shutdown 149

Posted by Soulskill
from the ay-carumba dept.
itwbennett writes "In a filing to the FCC, Bay Area Rapid Transit general manager Grace Crunican defended last August's mobile shutdown, saying that 'a temporary disruption of cell phone service, under extreme circumstances where harm and destruction are imminent, is a necessary tool to protect passengers.' Taking the opposing position, digital rights groups, including Public Knowledge, Free Press, the Electronic Frontier Foundation and the Center for Democracy and Technology, told the FCC (PDF) that 'wireless interruption will necessarily prohibit the communications of completely innocent parties — precisely those parties closest to the site where the emergency is located or anticipated.'"
Crime

NY Times: 'FBI Foils Its Own Terrorist Plots' 573

Posted by Soulskill
from the you-have-been-called-out dept.
Fluffeh writes "Breaking up terrorist plots is one of the main goals of the FBI these days. If it can't do that, well, it seems making plots up and then valiantly stopping them is okay too — but the NY Times is calling them on it. 'The United States has been narrowly saved from lethal terrorist plots in recent years — or so it has seemed. A would-be suicide bomber was intercepted on his way to the Capitol; a scheme to bomb synagogues and shoot Stinger missiles at military aircraft was developed by men in Newburgh, N.Y.; and a fanciful idea to fly explosive-laden model planes into the Pentagon and the Capitol was hatched in Massachusetts. But all these dramas were facilitated by the F.B.I., whose undercover agents and informers posed as terrorists offering a dummy missile, fake C-4 explosives, a disarmed suicide vest and rudimentary training. Suspects naïvely played their parts until they were arrested.'"
Oracle

Oracle and the End of Programming As We Know It 577

Posted by Soulskill
from the unbounded-can-of-worms dept.
An anonymous reader writes "An article at Dr. Dobb's looks into the consequences of a dangerous idea from Oracle during their legal battle with Google: 'that Google had violated Oracle's Java copyrights by reimplementing Java APIs in Android.' The issue is very much unsettled in the courts, but the judge in this case instructed the jury to assume the APIs were copyrightable. 'In a nutshell, if the jury sides with Oracle that the copyrights in the headers of every file of the Java source base apply specifically to the syntax of the APIs, then Oracle can extract payment and penalties from Google for having implemented those APIs without Oracle's blessing (or, in more specific terms, without a license). Should this come to pass, numerous products will suddenly find themselves on an uncertain legal standing in which the previously benign but now newly empowered copyright holders might assert punitive copyright claims. Chief among these would be any re-implementation of an existing language. So, Jython, IronPython, and PyPy for Python; JRuby, IronRuby, and Rubinius for Ruby; Mono for C# and VB; possibly C++ for C, GCC for C and C++ and Objective-C; and so forth. And of course, all the various browsers that use JavaScript might owe royalties to the acquirers of Netscape's intellectual property.'"
Piracy

Stop Being Poor: U.S. Piracy Watch List Hits a New Low With 2012 Report 310

Posted by Soulskill
from the expectations-met dept.
An anonymous reader writes "The U.S. Trade Representative released its annual Special 301 Report yesterday, unsurprisingly including Canada on the Priority Watch list. While inclusion on the list is designed to generate embarrassment on target countries, Michael Geist explains why this year's report should elicit outrage. Not only is the report lacking in objective analysis, it targets some of the world's poorest countries with no evidence of legal inadequacies and picks fights with any country that dare adopt a contrary view on intellectual property issues."
Privacy

Hacked Skype IP Address Search Shows Who's Speaking From Where 84

Posted by timothy
from the we-see-you-mr-appelbaum dept.
mask.of.sanity writes "An online search portal has been launched that reveals the IP addresses of any Skype user. The portal needs only a Skype username entered in a search bar for it to produce the IP address of a target user. It then uses IP addresses to geo-locate users on a map and reveal their ISP information."
Communications

German Authorities Find Al Qaeda Plans Disguised In Porn 332

Posted by timothy
from the will-just-be-in-the-other-room-looking-for-more dept.
According to CNN, which credits Hamburg-based newspaper Die Zeit, German investigators have uncovered a trove of more than 100 Al Qaeda documents recovered from a "digital storage device" (and memory cards) which were found hidden in the underpants of Austrian citizen Maqsood Lodin, who had recently traveled to Pakistan. The documents "included an inside track on some of the terror group's most audacious plots and a road map for future operations." Among these future plots: "[S]eizing cruise ships and carrying out attacks in Europe similar to the gun attacks by Pakistani militants that paralyzed the Indian city of Mumbai in November 2008." The documents were reportedly neither in plain view nor simply encrypted, but instead steganographically embedded in a pornographic video.
Google

Data Engineer In Google Case Is Identified 186

Posted by timothy
from the under-the-bus dept.
theodp writes "Meet Engineer Doe. A NY Times report has identified Marius Milner as the software engineer at the center of the uproar over a Google project that used Wi-Fi sniffing Google Street View cars to collect e-mail and other personal data from potentially millions of unsuspecting people. Milner, creator of the wardriving software NetStumbler, referred questions to his lawyer. Google declined to comment. A patent search shows the USPTO awarded Google and Milner a patent in June 2011 for protecting Internet users from 'hackers and other ne'er-do-wells [who] may seek to tap into communications on a network.'"
Security

"Cyber War" Is Just the Latest Grab for Defense Money 161

Posted by Unknown Lamer
from the monocle-polishing-terrorists-are-stealing-our-yachts dept.
New submitter Curseyoukhan writes "The phrase 'cyber war' is being used to scare us into coughing up money and liberties, just like 'anarchist' once was, and 'terror' still is. To quote H.L. Mencken, 'The whole aim of practical politics is to keep the populace alarmed (and hence clamorous to be led to safety) by menacing it with an endless series of hobgoblins, all of them imaginary.'"
Censorship

Tor Researchers' Tool Aims To Map Out Internet Censorship 71

Posted by Unknown Lamer
from the developers-mysteriously-disappear-during-senate-csipa-vote dept.
Sparrowvsrevolution writes "Tor developers Arturo Filasto and Jacob Appelbaum have released OONI-probe, an open-source software tool designed to be installed on any PC and run to collect data about local meddling with the computer's network connections, whether it be website blocking, surveillance or selective bandwidth slowdowns. Unlike other censorship tracking projects like HerdictWeb or the Open Net Initiative, OONI will allow anyone to run the testing application and share their results publicly. The tool has already been used to expose censorship by T-Mobile of its prepaid phones' browser and also by the Palestinian Authority, which was found to be blocking opposition websites. The minister responsible for the Palestinian censorship was forced to resign last week."
The Internet

How Online Black Markets Work 98

Posted by Soulskill
from the probably-better-than-most-real-markets-these-days dept.
CWmike writes "The internet is no stranger to crime, writes corporate investigator Brandon Gregg. From counterfeit and stolen products, to illegal drugs, stolen identities and weapons, nearly anything can be purchased online with a few clicks of the mouse. The online black market not only can be accessed by anyone with an Internet connection, but the whole process of ordering illicit goods and services is alarmingly easy and anonymous, with multiple marketplaces to buy or sell anything you want. Gregg started with $1000 and a took journey into the darker side of the Internet using two tools: Bitcoin and the Tor Bundle."
Piracy

UK ISPs Ordered To Block Pirate Bay 188

Posted by samzenpus
from the do-not-surf-list dept.
Barence writes "Five of Britain's biggest ISPs have been ordered to block access to The Pirate Bay. Sky, Everything Everywhere, TalkTalk, O2 and Virgin Media have been told to block access to the site. Britain's biggest ISP, BT, has been given a few further weeks to 'consider its position.' Music lobby group, the BPI, welcomed the move, saying music creators 'deserve to be paid for their work just like everyone else' and calling for those who use The Pirate Bay to illegally download content to 'explore the many digital music services operating ethically and legally in the UK.'"
Patents

Congress Asks Patent Office To Consider Secret Patents 285

Posted by samzenpus
from the prior-secret-art dept.
Fluffeh writes "The USPTO is considering a rather interesting request straight from lobbyists via congress: that certain 'Economically Significant' patents should be kept secret during the process (PDF Warning) of being evaluated and granted. While this does occur at the moment on a very select few patents 'due to national security' for things like nuclear energy and the like — this would allow it to go much, much further. 'By statute, patent applications are published no earlier than 18 months after the filing date, but it takes an average of about three years for a patent application to be processed. This period of time between publication and patent award provides worldwide access to the information included in those applications. In some circumstances, this information allows competitors to design around U.S. technologies and seize markets before the U.S. inventor is able to raise financing and secure a market.'"
Google

Report Finds Google Supervisors Knew About Wi-Fi Data Harvesting 197

Posted by samzenpus
from the who's-to-blame dept.
bonch writes "According to the FCC report, Google's collection of Street View data was not the unauthorized act of a rogue engineer, as Google had portrayed it, but an authorized program known to supervisors and at least seven other engineers. The original proposal contradicts Google's claim that there was no intent to gather payload data: 'We are logging user traffic along with sufficient data to precisely triangulate their position at a given time, along with information about what they were doing.'"
Microsoft

Not Just Apple, How Microsoft Sidestepped Billions In State Taxes 595

Posted by samzenpus
from the birds-of-a-feather dept.
reifman writes "Apple's not the only company to save billions in taxes through Nevada as The New York Times reported yesterday. Here's how Microsoft's saved $4.37 billion in tax payments to Washington State and how it's led indirectly to $4 billion in K-12 and Higher Education cuts since 2008. 18% of University of Washington freshman are now foreigners (because they pay more) up from 2% six years ago. Washington State ranks 47th nationally in 18-24 yo college enrollment and 48th in K-12 class size. This hasn't stopped the architect of the company's Nevada tax dodge from writing in The Seattle Times: 'it's [Washington] state's paramount duty to provide for the public education of all children. Unfortunately, steady declines in public resources now threaten our ability to live up to that commitment.' Yes, indeed."
Iphone

Apple Patent Reveals Gift-Giving Platform For NFC-Based iDevices 110

Posted by samzenpus
from the it's-on-me dept.
redletterdave writes "While downloading and storing digital media with online service providers has become commonplace — more so than purchasing DVDs and CDs at physical retail stores — it's not very easy to transfer digital files from one individual to another, usually because of copyright laws. Some digital distributors have systems for limiting usage and distribution of their products from the original purchaser to others, but often times, transferring a copyright-protected file from one device to another can result in the file being unplayable or totally inaccessible. Apple believes it has a solution to this issue: A gift-giving platform where users have a standardized way for buying, sending and receiving media files from a provider (iTunes) between multiple electronic devices (iPhones, iPads). The process is simply called, 'Gifting.'"

If I have seen farther than others, it is because I was standing on the shoulders of giants. -- Isaac Newton

Working...