Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.
hypnosec writes "Aaron Gustafson and two of his fellow contributors, Bruce Lawson and Steph Troeth, have announced the closure of The Web Standards Project (WaSP). It was formed back in 1998 by Glenn Davis, George Olsen, and Jeffrey Zeldman to get browser makers support the open standards established by World Wide Web Consortium (W3C). The project described itself as a 'coalition fighting for standards which ensure simple, affordable access to web technologies for all.' Founded at a time when Microsoft and Netscape were battling it out for browser dominance, WaSP aimed to mitigate the risks arising out of this war – an imminent fragmentation that could lead to browser incompatibilities. Noting that '..Tim Berners-Lee's vision of the web as an open, accessible, and universal community is largely the reality' Aaron noted that it was time to 'close down The Web Standards Project.'"
Hugh Pickens writes writes "Katherine Rosenberg reports that the Texas Department of Public Safety has unveiled a new web site dedicated to unsolved cold case homicides to make sure the victims are not forgotten and to try to catch a break in even the coldest of cases. DPS spokeswoman Katherine Cesinger says continual strides in technology make focusing on cold cases more important than ever because there are more opportunities to solve them with each emerging process or device. The web site was created because the more readily available information is the more people may be apt to pick up the phone and report what they know. 'It helps to refresh these cases in the public's mind and hopefully we'll shed new light on it. In some cases, we can also re-examine evidence if there's an opportunity or need there as well,' says Cesinger. One featured case from 1993 is Kathleen Suckley who was 29 when her throat was slashed and she was stabbed about 40 times inside her rented duplex, while her two sons, ages 4 and 1, were home. Officials said they interviewed numerous witnesses but never got enough information for an arrest. Capt. Tim Wilson maintains that in any homicide case there always is someone who knows something. At some point, he believes, the murderer will tell someone out of guilt or pride, or simply the pressure of holding it in. Cesinger points out that over time as relationships change, if prompted by something like the website or a news article, that confidant finally may come forward. 'I think we owe it to Kathleen to be this tenacious. It drives me nuts that somebody can do this and get away with it,' says Kathleen's mother-in-law Luann Suckley. 'I think the website is great ... maybe someone will finally speak up because I'm tired of sitting back and waiting.'"
jjp9999 writes "Manhattan District Attorney Cyrus Vance says cybercrimes are the fastest growing crimes in New York City, and criminals of all types are finding uses for digital tools. The Epoch Times reports that during a Feb. 28 event, Vance said it has reached a point where 'It is rare that a case does not involve some kind of cyber or computer element that we prosecute in our office — whether it is homicide, whether it's financial crime case, whether it's a gang case where the gang members are posting on Facebook where they're going to meet.' He also noted that organized crime groups in New York are shifting their focus to cybercrime, and that many local criminals are working with international hackers."
alphadogg writes "Cisco has offered to 'take back' routers it sold to West Virginia if the state finds they are inappropriate for its needs, according to a post on wvgazette.com. The offer is in response to a state auditor's finding (PDF) that West Virginia wasted $8 million — and perhaps as much as $15 million — in acquiring 1,164 ISR model 3945 branch routers from Cisco in 2010 for $24 million in federal stimulus funds, or over $20,000 per router. The auditor found that hundreds of sites around the state — libraries, schools and State Police facilities — could have been just as suitably served with lower-end, less expensive routers."
Bradley Manning, the 25-year-old U.S. Army soldier who allegedly leaked hundreds of thousands of internal memos about the wars in Afghanistan and Iraq, has been held by the government for two and a half years. On Thursday he pleaded guilty 10 of 22 charges brought against him, and now he has released an official statement. Here's an excerpt: "On 3 February 2010, I visited the WLO website on my computer and clicked on the submit documents link. Next I found the submit your information online link and elected to submit the SigActs via the onion router or TOR anonymizing network by special link. ... I attached a text file I drafted while preparing to provide the documents to the Washington Post. It provided rough guidelines saying ‘It’s already been sanitized of any source identifying information. You might need to sit on this information– perhaps 90 to 100 days to figure out how best to release such a large amount of data and to protect its source. This is possibly one of the more significant documents of our time removing the fog of war and revealing the true nature of twenty-first century asymmetric warfare. Have a good day. After sending this, I left the SD card in a camera case at my aunt’s house in the event I needed it again in the future. I returned from mid-tour leave on 11 February 2010. Although the information had not yet been publicly by the WLO, I felt this sense of relief by them having it. I felt I had accomplished something that allowed me to have a clear conscience based upon what I had seen and read about and knew were happening in both Iraq and Afghanistan everyday."
An anonymous reader writes "Remember The Right Honourable Professor Sir Robin Jacob, Retired Lord Justice, who staged a temporary comeback on the bench of the England and Wales Court of Appeals last fall? He's the one who required Apple to publicly retract its claims that Samsung copied the iPad and imposed sanctions on Cupertino when he concluded Tim Cook's lawyers hadn't fully complied. He has now made worldwide headline news again because he signed up as a Samsung expert witness at the U.S. International Trade Commission. Samsung says he was hired by its law firm, not the company, but the ITC filing says 'Sir Robin Jacob working on behalf of Samsung.' His clerk issued a statement according to which Sir Robin had no idea of Samsung's desire to hire him before January — two months after he gave Apple a blast. Leading legal blogs agree that there is no evidence any law was violated, but they suspect that 'the general issue of what engagements retired judges are permitted to accept will be very much up for discussion' and that this was 'a less than savvy public relations move by Samsung' because it casts doubt on the widely-noticed ruling in its favor. As one of them puts it, in the U.K. you 'never know if the judge might be looking for a new job,' so you better 'make sure [you] have fat rolls of cash spilling out of [your] pockets' in front of a U.K. judge."
An anonymous reader writes "We've talked previously about Texan gunsmith Cody Wilson's efforts to create 3-D-printable parts for firearms. He has a printed magazine that can withstand normal operation for quite a while. But he's also been working on building parts of the gun itself. An early version of a 3-D printed 'lower receiver' — the part of the gun holding the operating parts — failed after firing just 6 rounds. Now, a new video posted by Wilson's organization shows their design has improved enough to withstand over 600 rounds. Plus, their test only ended because they used up their ammunition; they say the receiver could have easily withstood a thousand rounds or more. Speaking to Ars, Wilson gave some insight into his reasoning behind this creation with regard to gun laws. 'I believe in evading and disintermediating the state. It seemed to be something we could build an organization around. Just like Bitcoin can circumvent financial mechanisms. ... The message is in what we're doing—the message is: download this gun.' A spokesperson for the ATF said that while operating a business as a firearm manufacturer requires a license, an individual manufacturing one for personal use is legal."
Dangerous_Minds writes "This last week, the Copyright Alert System was rolled out. Now that everyone is getting a better idea of what the alert system looks like, criticisms are building against the system. Freezenet says that the mere fact that ISPs are using a browser pop-up window opens the floodgates for fraudsters to hijack the system and scam users out of money. The EFF criticized the system because the educational material contains numerous flaws. Meanwhile, Web Pro News said that this system will also hurt small business and consumers."
aws910 points to an L.A. Times article which explains that "Cablevision (a huge cable network) is suing Viacom (owner of MTV, Nickelodeon, etc), alleging that Viacom is violating U.S. federal anti-trust laws by requiring programming packages to be bundled. If they are victorious, it would be a tiny step closer to 'a la carte cable,' but not much — Cablevision just wants to make their own bundles, and not give the customer the freedom to choose which channels they get. Where can I get my "Kill your TV" bumper sticker?" The thing I care more about buying separately is no-TV internet service, which the major cable companies seem reluctant to admit is even possible.
Edgewood_Dirk writes "In response to the recent White House petition, the FCC will be investigating the viability and possible harm of the ban on cell-phone unlocking. Gregory Ferenstein met with FCC Chairman Julius Genachowski at a TechCrunch CrunchGov event Wednesday, where the Chairman said the 'ban raises competition concerns; it raises innovation concerns.'" This line from the end of the article fails to inspire confidence: "Genachowski isn’t sure what authority he has, but if he finds any, given the tone of the conversation, it’s likely he will exert his influence to reverse the decision."
TrueSatan writes "In an utterly craven move, the Canadian government has launched a bill to bring Canada into full compliance with the discredited, U.S.-led ACTA agreement — an agreement to which most of the world does not agree. To further pressure the acceptance of this awful bill, the U.S., on the same day, released their Trade Policy and Agenda Annual Report (PDF), which calls on Canada to comply with ACTA obligations. For ACTA to take effect, it would require six signatures from the major economic blocks. Tt appears to have no remaining possibility of getting them, yet the U.S., and now Canada, continue to push it forward. The Canadian bill features claims based on spurious health and safety concerns that have been thoroughly debunked by a U.S. report. Despite these claims being so dubious, they remain a cornerstone of the Canadian bill. Similarly, the claimed losses due to counterfeiting ($30 billion USD) stated in the bill have also been debunked. The Canadian bill seeks to give border guards an unprecedented level of control, without the possibility of judicial oversight. Despite a lack of evidence to suggest that Canada is a major source of counterfeit product, the bill puts at risk the fully-legal parallel import of generic items — pharmaceuticals, for instance. The bill would also change copyright infringement from a civil dispute to a breach of criminal law. Pity Canada if this bill is enacted!"
New submitter charlesj68 writes with news that U.S. District Judge Lucy Koh has cut Apple's $1.05 billion patent infringement award from Samsung down by $450.5 million. She also said Samsung deserves a new trial over claims related to some of its smartphones. "Koh rejected Apple’s request to enhance the jury’s award, saying the amount Samsung owed was heavily disputed and the jury wasn’t bound to accept either side’s damages estimate. 'It is not the proper role of the court to second-guess the jury’s factual determination as to the proper amount of compensation,' Koh said in her ruling. Apple is entitled to additional damages for sales of infringing products that weren’t considered by the jury, Koh ruled, saying she intends to calculate the amount beginning on Aug. 25, the day after the jury reached its verdict. As the case has been appealed, Koh said she would delay considering evidence of actual post-verdict sales and pre-judgment interest until the appeals are completed."
Later today, the U.S. government will enter the sequestration process, a series of across-the-board budget cuts put into place automatically because U.S. politicians are bad at agreeing on things. "At that moment, somewhere in the bowels of the Treasury Department, officials will take offline the computers that process payments for school construction and clean energy bonds to reprogram them for reduced rates. Payments will be delayed while they are made manually for the next six weeks." The cuts will directly affect science- and tech-related spending throughout the country. Tom Levenson writes, '[s]equester cuts will strike bluntly across the scientific community. The illustrious can move a bit of money around, but even in large labs, a predictable result will be a reduction in the number of graduate student and post – doc slots available — and as those junior and early-stage researchers do a whole lot of the at-the-bench level research, such cuts will have an immediate effect on research productivity. The longer term risk is obvious too: fewer students and post-docs mean on an ongoing drop from baseline in the amount of work to be done year over year.' The former director of the National Institute of Health says it will set back medical science for a generation. NASA Administrator Charles Bolden has laid out how the cuts will affect the U.S. space program. He said, "The Congress wasn’t able to do what they were supposed to do, so we’re going to suffer." The sequester will also prevent billions of dollars from flowing into the tech industry. This comes at a time when there's a pressing need in the tech sector for professionals versed in the use of Linux, and salaries for those workers are on the rise.
Dr Max sends this excerpt from an AP report: "U.S. prosecutors won a New Zealand court victory Friday in their battle to extradite Megaupload founder Kim Dotcom and three colleagues accused of facilitating massive copyright fraud through the now-defunct online file-sharing site. The appeals court overturned an earlier ruling that would have allowed Dotcom and the others broad access to evidence in the case against them at the time of their extradition hearing, which is scheduled for August. The appeals court ruled that extensive disclosure would bog down the process and that a summary of the U.S. case would suffice. Dotcom says he's innocent and can't be held responsible for those who chose to use the site to illegally download songs or movies."
An anonymous reader writes with this excerpt from TorrentFreak: "The website blocking phenomenon has continued today in the UK, with the High Court adding three major torrent sites to the country's unofficial ban list. Following complaints from the music industry led by the BPI, the Court ordered the UK's leading Internet service providers to begin censoring subscriber access to Kickass Torrents, H33T and Fenopy." Unlike when the Pirate Bay was blocked, none of the ISPs contested this. They did, however, refuse to block things without a court order. Looks like the flood gates have been opened. On the topic of filesharing, Japan arrested 27 file sharers, using the recent changes to their copyright law that allow criminal charges to be brought against file sharers.
Entropy98 sends this quote from the LA Times: "Army Pfc. Bradley Edward Manning pleaded guilty Thursday to 10 charges that he illegally acquired and transferred highly classified U.S. government secrets, agreeing to serve [up to] 20 years in prison for causing a worldwide uproar when WikiLeaks published documents describing the inner workings of U.S. military and diplomatic efforts in Iraq, Afghanistan and around the globe. The 25-year-old soldier, however, pleaded not guilty to 12 more serious charges, including espionage for aiding the enemy, meaning that his criminal case will go forward at a general court-martial in June. If convicted at trial, he risks a sentence of life in prison at Ft. Leavenworth, Kan."
Zordak writes "According to Law 360, H.R. 845, the 'Saving High-Tech Innovators from Egregious Legal Disputes' (SHIELD) Act of 2013 would require non-practicing entities that lose in patent litigation to pay the full legal costs of accused infringers. The new bill (PDF) would define a 'non-practicing entity' as a plaintiff that is neither the original inventor or assignee of a patent, and that has not made its own 'substantial investment in exploiting the patent.' The bill is designed to particularly have a chilling effect on 'shotgun' litigation tactics by NPEs, in which they sue numerous defendants on a patent with only a vague case for infringement. Notably, once a party is deemed to be an NPE early in the litigation, they will be required to post a bond to cover the defendants' litigation costs before going forward."
An anonymous reader writes "Officials at the Chinese Defense Ministry say hackers from the U.S. have been attacking Chinese military websites. 'The sites were subject to about 144,000 hacking attacks each month last year, two thirds of which came from the U.S., according to China's defense ministry. The issue of cyber hacking has strained relations between the two countries.' This follows recent hacks from people in China on high-profile U.S. sites, as well as a report accusing the Chinese government of supporting a hacking group. '[Defense Ministry spokesman Geng Yansheng] called on U.S. officials to "explain and clarify" what he said were recent U.S. media reports that Washington would carry out "pre-emptive" cyber attacks and expand its online warfare capabilities. Such efforts are "not conducive to the joint efforts of the international community to enhance network security," he said.'"
The new Copyright Alert System, a.k.a. the 'Six Strikes' policy, went into effect on Monday. Comcast and Verizon activated it today. Ars Technica asked them and other participating ISPs to see the copyright alerts that will be sent to customers who have been identified as infringing. Comcast was the only one to grant their request, saying that a "small number" of the alerts have already been sent out. The alerts will be served to users in the form of in-browser popups. They explain what triggered the alert and ask the user to sign in and confirm they received the alert. (Not admitting guilt, but at least closing off the legal defense of "I didn't know.") The article points out that the alerts also reference an email sent to the Comcast email address associated with the account, something many users not be aware of. The first two notices are just notices. Alert #5 indicates a "Mitigation Measure" is about to be applied, and that users will be required to call Comcast's Security Assurance group and to be lectured on copyright infringement. The article outlines some of the CAS's failings, such as being unable to detect infringement through a VPN, and disregarding fair use. Comcast said, "We will never use account termination as a mitigation measure under the CAS. We have designed the pop-up browser alerts not to interfere with any essential services obtained over the Internet." Comcast also assures subscribers that their privacy is being protected, but obvious that's only to a point. According to TorrentFreak, "Comcast can be asked to hand over IP-addresses of persistent infringers, and the ISP acknowledges that copyright holders can then obtain a subpoena to reveal the personal details of the account holder for legal action."
Weezul writes "The Ada Initiative's Valerie Aurora got Violet Blue's Hackers As A High-Risk Population (29c3 abstract) talk on harm reduction methodology pulled from the Security BSides meeting in San Francisco by claiming it contained rape triggers [ed note: you might not want to visit the main page of the weblog as it contains a few pictures that might be considered NSFW in more conservative places]. It's frankly asinine to object to work around hacker ethics as 'off topic' at such broad hacker conference. Is Appelbaum's 29c3 keynote 'off topic' for asking hackers to work for the 'good guys' rather than military, police, their contractors, Facebook, etc.? Yes, obviously harm reduction is a psychological hack that need not involve a computer, but this holds for 'social engineering' as well. It's simply that hacking isn't nearly as specialized or inaccessible as say theoretical physics. Worse, there is no shortage of terrible technology laws like the CFAA, DMCA, etc. that exist partially because early hackers failed to communicate an ethics that seemed coherent and reasoned to outsiders." The Ada Initiative responds that such talks do more harm than good. It could also be argued that "not working for the bad guys" type talks aren't off-topic, since the hacker community has traditionally cared about things like information freedom.