Fluffeh writes "Breaking up terrorist plots is one of the main goals of the FBI these days. If it can't do that, well, it seems making plots up and then valiantly stopping them is okay too — but the NY Times is calling them on it. 'The United States has been narrowly saved from lethal terrorist plots in recent years — or so it has seemed. A would-be suicide bomber was intercepted on his way to the Capitol; a scheme to bomb synagogues and shoot Stinger missiles at military aircraft was developed by men in Newburgh, N.Y.; and a fanciful idea to fly explosive-laden model planes into the Pentagon and the Capitol was hatched in Massachusetts. But all these dramas were facilitated by the F.B.I., whose undercover agents and informers posed as terrorists offering a dummy missile, fake C-4 explosives, a disarmed suicide vest and rudimentary training. Suspects naïvely played their parts until they were arrested.'"
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×
An anonymous reader writes "The U.S. Trade Representative released its annual Special 301 Report yesterday, unsurprisingly including Canada on the Priority Watch list. While inclusion on the list is designed to generate embarrassment on target countries, Michael Geist explains why this year's report should elicit outrage. Not only is the report lacking in objective analysis, it targets some of the world's poorest countries with no evidence of legal inadequacies and picks fights with any country that dare adopt a contrary view on intellectual property issues."
mask.of.sanity writes "An online search portal has been launched that reveals the IP addresses of any Skype user. The portal needs only a Skype username entered in a search bar for it to produce the IP address of a target user. It then uses IP addresses to geo-locate users on a map and reveal their ISP information."
According to CNN, which credits Hamburg-based newspaper Die Zeit, German investigators have uncovered a trove of more than 100 Al Qaeda documents recovered from a "digital storage device" (and memory cards) which were found hidden in the underpants of Austrian citizen Maqsood Lodin, who had recently traveled to Pakistan. The documents "included an inside track on some of the terror group's most audacious plots and a road map for future operations." Among these future plots: "[S]eizing cruise ships and carrying out attacks in Europe similar to the gun attacks by Pakistani militants that paralyzed the Indian city of Mumbai in November 2008." The documents were reportedly neither in plain view nor simply encrypted, but instead steganographically embedded in a pornographic video.
theodp writes "Meet Engineer Doe. A NY Times report has identified Marius Milner as the software engineer at the center of the uproar over a Google project that used Wi-Fi sniffing Google Street View cars to collect e-mail and other personal data from potentially millions of unsuspecting people. Milner, creator of the wardriving software NetStumbler, referred questions to his lawyer. Google declined to comment. A patent search shows the USPTO awarded Google and Milner a patent in June 2011 for protecting Internet users from 'hackers and other ne'er-do-wells [who] may seek to tap into communications on a network.'"
New submitter Curseyoukhan writes "The phrase 'cyber war' is being used to scare us into coughing up money and liberties, just like 'anarchist' once was, and 'terror' still is. To quote H.L. Mencken, 'The whole aim of practical politics is to keep the populace alarmed (and hence clamorous to be led to safety) by menacing it with an endless series of hobgoblins, all of them imaginary.'"
Sparrowvsrevolution writes "Tor developers Arturo Filasto and Jacob Appelbaum have released OONI-probe, an open-source software tool designed to be installed on any PC and run to collect data about local meddling with the computer's network connections, whether it be website blocking, surveillance or selective bandwidth slowdowns. Unlike other censorship tracking projects like HerdictWeb or the Open Net Initiative, OONI will allow anyone to run the testing application and share their results publicly. The tool has already been used to expose censorship by T-Mobile of its prepaid phones' browser and also by the Palestinian Authority, which was found to be blocking opposition websites. The minister responsible for the Palestinian censorship was forced to resign last week."
CWmike writes "The internet is no stranger to crime, writes corporate investigator Brandon Gregg. From counterfeit and stolen products, to illegal drugs, stolen identities and weapons, nearly anything can be purchased online with a few clicks of the mouse. The online black market not only can be accessed by anyone with an Internet connection, but the whole process of ordering illicit goods and services is alarmingly easy and anonymous, with multiple marketplaces to buy or sell anything you want. Gregg started with $1000 and a took journey into the darker side of the Internet using two tools: Bitcoin and the Tor Bundle."
Barence writes "Five of Britain's biggest ISPs have been ordered to block access to The Pirate Bay. Sky, Everything Everywhere, TalkTalk, O2 and Virgin Media have been told to block access to the site. Britain's biggest ISP, BT, has been given a few further weeks to 'consider its position.' Music lobby group, the BPI, welcomed the move, saying music creators 'deserve to be paid for their work just like everyone else' and calling for those who use The Pirate Bay to illegally download content to 'explore the many digital music services operating ethically and legally in the UK.'"
Fluffeh writes "The USPTO is considering a rather interesting request straight from lobbyists via congress: that certain 'Economically Significant' patents should be kept secret during the process (PDF Warning) of being evaluated and granted. While this does occur at the moment on a very select few patents 'due to national security' for things like nuclear energy and the like — this would allow it to go much, much further. 'By statute, patent applications are published no earlier than 18 months after the filing date, but it takes an average of about three years for a patent application to be processed. This period of time between publication and patent award provides worldwide access to the information included in those applications. In some circumstances, this information allows competitors to design around U.S. technologies and seize markets before the U.S. inventor is able to raise financing and secure a market.'"
bonch writes "According to the FCC report, Google's collection of Street View data was not the unauthorized act of a rogue engineer, as Google had portrayed it, but an authorized program known to supervisors and at least seven other engineers. The original proposal contradicts Google's claim that there was no intent to gather payload data: 'We are logging user traffic along with sufficient data to precisely triangulate their position at a given time, along with information about what they were doing.'"
reifman writes "Apple's not the only company to save billions in taxes through Nevada as The New York Times reported yesterday. Here's how Microsoft's saved $4.37 billion in tax payments to Washington State and how it's led indirectly to $4 billion in K-12 and Higher Education cuts since 2008. 18% of University of Washington freshman are now foreigners (because they pay more) up from 2% six years ago. Washington State ranks 47th nationally in 18-24 yo college enrollment and 48th in K-12 class size. This hasn't stopped the architect of the company's Nevada tax dodge from writing in The Seattle Times: 'it's [Washington] state's paramount duty to provide for the public education of all children. Unfortunately, steady declines in public resources now threaten our ability to live up to that commitment.' Yes, indeed."
redletterdave writes "While downloading and storing digital media with online service providers has become commonplace — more so than purchasing DVDs and CDs at physical retail stores — it's not very easy to transfer digital files from one individual to another, usually because of copyright laws. Some digital distributors have systems for limiting usage and distribution of their products from the original purchaser to others, but often times, transferring a copyright-protected file from one device to another can result in the file being unplayable or totally inaccessible. Apple believes it has a solution to this issue: A gift-giving platform where users have a standardized way for buying, sending and receiving media files from a provider (iTunes) between multiple electronic devices (iPhones, iPads). The process is simply called, 'Gifting.'"
bs0d3 writes "The FCC has voted to require broadcast TV stations to post online advertising rates they charge political candidates and advocacy groups. The vote came despite strong opposition from many broadcasters. 'By law, television stations offer political candidates advertising rates that are much lower than those offered to other advertisers.' Advocates argue the public should have easy access to information about how much candidates and other groups are spending on television to suck in voters. 'Network-affiliated stations in the top 50 markets will have six months to comply. For all others, the deadline is 2014.'"