helix2301 writes with this snippet from NBC News: "The U.S. government is expanding a cybersecurity program that scans Internet traffic headed into and out of defense contractors to include far more of the country's private, civilian-run infrastructure. As a result, more private sector employees than ever before, including those at big banks, utilities and key transportation companies, will have their emails and Web surfing scanned as a precaution against cyber attacks." Further on, the story notes that "By using DHS as the middleman, the Obama administration hopes to bring the formidable overseas intelligence-gathering of the NSA closer to ordinary U.S. residents without triggering an outcry from privacy advocates who have long been leery of the spy agency's eavesdropping."
itwbennett writes "Do you know what data the 1300+ tracking companies have on you? Privacy blogger Dan Tynan didn't until he had had enough of being stalked by grandpa-friendly Jitterbug phone ads. Tracking company BlueKai and its partners had compiled 471 separate pieces of data on him. Some surprisingly accurate, some not (hence the Jitterbug ad). But what's worse is that opting out of tracking is surprisingly hard. On the Network Advertising Initiative Opt Out Page you can ask the 98 member companies listed there to stop tracking you and on Evidon's Global Opt Out page you can give some 200 more the boot — but that's only about 300 companies out of 1300. And even if they all comply with your opt-out request, it doesn't mean that they'll stop collecting data on you, only that they'll stop serving you targeted ads."
redletterdave writes "After a French civil court ruled on Jan. 24 that Twitter must identify anyone who broke France's hate speech laws, Twitter has since refused to identify the users behind a handful of hateful and anti-Semitic messages, resulting in a $50 million lawsuit. Twitter argues it only needs to comply with U.S. laws and is thus protected by the full scope of the First Amendment and its free speech privileges, but France believes its Internet users should be subject to the country's tighter laws against racist and hateful forms of expression."
Newsubmitter davek writes with news that the U.S. will be applying money-laundering laws to Bitcoin and other 'virtual currencies.' "The move means that firms that issue or exchange the increasingly popular online cash will now be regulated in a similar manner as traditional money-order providers such as Western Union Co. WU +0.17% They would have new bookkeeping requirements and mandatory reporting for transactions of more than $10,000. Moreover, firms that receive legal tender in exchange for online currencies or anyone conducting a transaction on someone else's behalf would be subject to new scrutiny, said proponents of Internet currencies. 'I think it's inevitable that just like you have U.S. dollars used by thieves and criminals, it's sadly inevitable you will have criminals use a virtual currency. We want to work with authorities,' said Jeff Garzik, a Bitcoin developer. Still, law enforcement, regulators and financial institution have expressed worries about the hard-to-trace attributes of virtual currencies, helping trigger this week's move from the Treasury's Financial Crimes Enforcement Network, or FinCen."
coondoggie writes "Researchers at DARPA want to take the science of machine learning — teaching computers to automatically understand data, manage results and surmise insights — up a couple notches. Machine learning, DARPA says, is already at the heart of many cutting edge technologies today, like email spam filters, smartphone personal assistants and self-driving cars. 'Unfortunately, even as the demand for these capabilities is accelerating, every new application requires a Herculean effort. Even a team of specially-trained machine learning experts makes only painfully slow progress due to the lack of tools to build these systems,' DARPA says."
tsamsoniw writes "Hoping to strike a blow against sexism in the tech industry , developer and tech evangelist Adria Richards took to Twitter to complain about two male developers swapping purportedly offensive jokes at PyCon. The decision has set into motion a chain of events that illustrate the impact a tweet or two can make in this age of social networking: One the developers and Richards have since lost their jobs, and even the chair of PyCon has been harassed for his minor role in the incident."
skade88 writes "Ars is reporting that GoPro, the company that makes cameras used in extreme sports such as sky diving and swimming with dolphins has issued a DMCA take down notice on a review at DigitalRev that they do not like. See DMCA notice here. From the article: 'DigitalRev has a blog post up about the takedown, suggesting that most DMCA takedowns are "abusive" in nature. "We hope GoPro is not suggesting, with this DMCA notice, that camera reviews should be done only when they are authorized by the manufacturers," writes DigitalRev. "GoPro (or should we call you Go*ro instead?), we'd be interested to hear what you have to say" about the infringement notice.'"
Nerval's Lobster writes "Cyber-attacks are much in the news lately, thanks to some well-publicized hacks and rising concerns over malware. Many of these attacks are likely backed in some way by governments anxious to seize intellectual property, or simply probe other nations' IT infrastructure. But do nations actually have a right to fire off a bomb or a clip of ammunition at cyber-attackers, especially if a rival government is backing the latter as part of a larger hostile action? Should a military hacker, bored and exhausted from twelve-hour days of building malware, be regarded in the same way as a soldier with a rifle? Back in 2009, the NATO Cooperative Cyber Defence Centre of Excellence (which also exists under the lengthy acronym NATO CCD COE) commissioned a panel of experts to produce a report on the legal underpinnings of cyber-warfare. NATO CCD COE isn't funded by NATO, and nor is it a part of that organization's command-and-control structure—but those experts did issue a nonbinding report (known as "The Tallinn Manual on the International Law Applicable to Cyber Warfare") exploring the ramifications of cyber-attacks, and what targeted nations can do in response. It's an interesting read, and the experts do suggest that, under circumstances, a nation under cyber-attack can respond to the cyber-attackers with "kinetic force," so long as that force is proportional. Do you agree?"
Trepidity writes "The extensive NASA Technical Report Archive was just taken offline, following pressure from members of U.S. Congress, worried that Chinese researchers could be reading the reports. U.S. Representative Frank Wolf (R-VA) demanded that 'NASA should immediately take down all publicly available technical data sources until all documents that have not been subjected to export control review have received such a review,' and NASA appears to have complied. Although all reports are in the public domain, there doesn't appear to be a third-party mirror available (some university libraries do have subsets on microfiche)."
SonicSpike excerpts from CNet's coverage of the latest in the seemingly inevitable path toward consistently applied Internet sales taxes for U.S citizens: "Internet tax supporters are hoping that a vote in the U.S. Senate as early as today will finally give them enough political leverage to require Americans to pay sales taxes when shopping online. Sens. Mike Enzi (R-Wy.) and Dick Durbin (D-Ill.) are expected to offer an amendment to a Democratic budget resolution this week that, by allowing states to 'collect taxes on remote sales,' is intended to usher in the first national Internet sales tax." There goes one of the best ways to vote with your dollars.
psykocrime writes "The crazy kids at Fogbeam Labs have started a discussion about Google and their relationship with the Open Web, and questioning who will step up to defend these principles, even as Google seem to be abdicating their position as such a champion. Some candidates mentioned include Yahoo, IBM, Red Hat, Mozilla, Microsoft and The Wikimedia Foundation, among others. The question is, what organization(s) have both the necessary clout and the required ethical principles, to truly champion the Open Web, in the face of commercial efforts which are clearly inimical to Open Source, Open Standards, Libre Culture and other elements of an Open Web?"
wiredog writes "Microsoft has released a report of all the subpoenas and other requests it got from law enforcement in 2012, and the way it responded to them. This is similar to the Google Transparency Report."
First time accepted submitter danhuby writes "Apple have removed sweatshop-themed game Sweatshop HD by UK developers LittleLoud from their app store citing clause 16.1 — 'Apps that present excessively objectionable or crude content will be rejected.' According to the PocketGamer article, Littleloud's head of games, Simon Parkin, told Pocket Gamer that 'Apple removed Sweatshop from the App Store last month stating that it was uncomfortable selling a game based around the theme of running a sweatshop.'"
jfruh writes "Defense Distributed, a U.S. nonprofit that aims to make plans for guns available owners of 3-D printers, recently received a federal firearms license from the Bureau of Alcohol, Tobacco and Firearms. That license doesn't cover semi-automatic weapons and machine guns, though — and there are questions about whether the legislation that defines that license really apply to the act of giving someone 3-D printing patterns. Experts on all sides of the issue seemed to agree that no clarification of the law would happen until a high-profile crime involving a 3-D printed weapon was committed."
sgroyle (author Simon Royle) writes with an excerpt from an article he wrote about discovering that publisher WHSmith has been adding DRM to books without their authors' permission, and against their intent: "DRM had, without my knowledge, been added to my book. I quickly checked my other books; same thing. Then I checked the books of authors who, because of their vocal and public opposition, I know are against DRM – Konrath, Howey, and Doctorow, to name a few – same result. ALL books on WHSmith have DRM in them. Rather than assume WHSmith where at fault, I checked with my distributor, Draft2Digital. They send my books to Kobo, who in turn send my books to WHSmith. D2D assured me the DRM was not being added by them and were distressed to hear that this was the case. Kobo haven't replied to any of the messages in this thread: 'WHSmith putting DRM in books distributed via Kobo'. I'm not holding my breath." Update: 03/22 21:02 GMT by T : Problem resolved. Hanno Liem of the Kobo team wrote with good news that the DRM notices that were appended were done so in error, and since corrected: "The original site has been updated – it was just a bug on our site, and was resolved within a day I think. We're all slashdot readers here at Kobo Operations, and this is kinda painful :p" Thanks, Hanno.
Hugh Pickens writes writes "After the Watergate scandal taught Richard Nixon the consequences of recording White House conversations, none of his successors has dared to do it. But Nixon wasn't the first. He got the idea from his predecessor Lyndon Johnson, who felt there was an obligation to allow historians to eventually eavesdrop on his presidency. Now David Taylor reports on BBC that the latest set of declassified tapes of President Lyndon Johnson's telephone calls show that by the time of the Presidential election in November 1968, LBJ had evidence that Nixon had sabotaged the Vietnam war peace talks — or, as he put it, that Nixon was guilty of treason and had 'blood on his hands'. It begins in the summer of 1968. Nixon feared a breakthrough at the Paris Peace talks designed to find a negotiated settlement to the Vietnam war that he knew would derail his campaign. Nixon therefore set up a clandestine back-channel to the South Vietnamese involving Anna Chennault, a senior campaign adviser. In late October 1968 there were major concessions from Hanoi which promised to allow meaningful talks to get underway in Paris. This was exactly what Nixon feared. Chennault was dispatched to the South Vietnamese embassy with a clear message: the South Vietnamese government should withdraw from the talks, refuse to deal with Johnson, and if Nixon was elected, they would get a much better deal. Meanwhile the FBI had bugged the ambassador's phone and transcripts of Chennault's calls were sent to the White House. Johnson was told by Defense Secretary Clark Clifford that the interference was illegal and threatened the chance for peace. The president gave Humphrey enough information to sink his opponent but by then, a few days from the election, Humphrey had been told he had closed the gap with Nixon and would win the presidency so Humphrey decided it would be too disruptive to the country to accuse the Republicans of treason, if the Democrats were going to win anyway. In the end Nixon won by less than 1% of the popular vote, escalated the war into Laos and Cambodia with the loss of an additional 22,000 American lives, and finally settled for a peace agreement in 1973 that was within grasp in 1968."
jrepin writes "There's a new front in the battle against digital restrictions management (DRM)technologies. These technologies, which supposedly exist to enforce copyright, have never done anything to get creative people paid. Instead, by design or by accident, their real effect is to interfere with innovation, fair use, competition, interoperability, and our right to own things. That's why we were appalled to learn that there is a proposal currently before the World Wide Web Consortium's HTML5 Working Group to build DRM into the next generation of core Web standards. The proposal is called Encrypted Media Extensions, or EME. Its adoption would be a calamitous development, and must be stopped."
An anonymous reader writes "According to a report at The Daily Beast, the Obama administration has decided to give the drone program to the Pentagon, taking it away from the CIA. This could lead to increased transparency for the program and stricter requirements for drone strikes. From the article: 'Officials anticipate a phased-in transition in which the CIA’s drone operations would be gradually shifted over to the military, a process that could take as little as a year. Others say it might take longer but would occur during President Obama’s second term. “You can’t just flip a switch, but it’s on a reasonably fast track,” says one U.S. official. During that time, CIA and DOD operators would begin to work more closely together to ensure a smooth hand-off. The CIA would remain involved in lethal targeting, at least on the intelligence side, but would not actually control the unmanned aerial vehicles. Officials told The Daily Beast that a potential downside of the agency’s relinquishing control of the program was the loss of a decade of expertise that the CIA has developed since it has been prosecuting its war in Pakistan and beyond. At least for a period of transition, CIA operators would likely work alongside their military counterparts to target suspected terrorists.'"
judgecorp writes "A new manual for cyber war has been compiled by international legal experts and published by NATO. The manual proposes that hospitals and dams should be off-limits for online warfare, and says that a conventional response is justified if an attack causes death or serious damage to property. The manual might get its first practical application today — South Korea's TV stations and banks have come under an attack which may well originate from North Korea."
An anonymous reader writes "I'm an indie developer about to release a small ($5 — $10 range) utility for graphic designers. I'd like to employ at least a basic deterrent to pirates, but with the recent SimCity disaster, I'm wondering: what is a reasonable way to deter piracy without ruining things for legitimate users? A simple serial number? Online activation? Encrypted binaries? Please share your thoughts."