An anonymous reader writes "The Federal Bureau of Investigation (FBI) is finally stepping up its game when it comes to hackers. Maybe it was Anonymous that did it or maybe it was statements from the US Secretary of Defense two weeks ago, but either way, the FBI is now hunting hackers 24/7." I'm happy that the FBI no longer has an investigation schedule when it comes to online crime, but I have to think that I'm not the only one who assumed they were doing this before.
concealment writes "A month before the controversial 'six strikes' anti-piracy plan goes live in the U.S., the responsible Center of Copyright Information (CCI) is dealing with a small crisis. As it turns out the RIAA failed to mention to its partners that the 'impartial and independent' technology expert they retained previously lobbied for the music industry group. In a response to the controversy, CCI is now considering whether it should hire another expert to evaluate the anti-piracy monitoring technology."
wiredmikey writes "When delegates gather in Dubai in December for an obscure UN agency meeting, the mother of all cyber diplomatic battles is expected, with an intense debate over proposals to rewrite global telecom rules to effectively give the United Nations control over the Internet. Russia, China and other countries back a move to place the Internet under the authority of the International Telecommunications Union (ITU), a UN agency that sets technical standards for global phone calls. While US officials have said placing the Internet under UN control would undermine the freewheeling nature of cyberspace, some have said there is a perception that the US owns and manages the Internet. The head of the ITU, Hamadoun Toure, claims his agency has 'the depth of experience that comes from being the world's longest established intergovernmental organization.' But Harold Feld of the US-based non-government group Public Knowledge said any new rules could have devastating consequences. Some are concerned over a proposal by European telecom operators seeking to shift the cost of communication from the receiving party to the sender. This could mean huge costs for US Internet giants like Facebook and Google."
kyriacos writes "The Greek government is charging journalist Kostas Vaxevanis with violation of the data privacy law for publishing a list of about 2,000 Greeks who hold accounts with the HSBC bank in Switzerland. While more and more austerity measures are being taken against the people of Greece, there is still no investigation of tax evasion for the people on this list by the government. The list has been in the possession of the Greek government since 2010."
wiredmikey writes "Canada and the United States announced Friday they were launching a joint cybsersecurity plan that aims to better protect critical digital infrastructure and improve the response to cyber incidents. Under the action plan, the US Department of Homeland Security and Public Safety Canada will cooperate to protect vital cyber systems and respond to and recover from any cyber disruptions, by improving collaboration on managing cyber incidents between their respective cyber security operation centers, enhancing information sharing and engagement with the private sector and pursuing US-Canadian collaboration to promote cyber security awareness to the public."
First time accepted submitter Serious Callers Only writes "According to reports, Imran Khan was detained yesterday by US officials for questioning on his views on United States drone strikes in Pakistan. Glenn Greenwald writing for the guardian: 'On Saturday, Khan boarded a flight from Canada to New York in order to appear at a fundraising lunch and other events. But before the flight could take off, U.S. immigration officials removed him from the plane and detained him for two hours, causing him to miss the flight. On Twitter, Khan reported that he was "interrogated on [his] views on drones" and then added: "My stance is known. Drone attacks must stop." He then defiantly noted: "Missed flight and sad to miss the Fundraising lunch in NY but nothing will change my stance."'"
Hugh Pickens writes writes "Henry Alford writes that in an ideal world, we would all use Google to be better friends by having better recall and to research our new friends and acquaintances to get to know them better. 'It's perfectly natural and almost always appropriate,' says social anthropologist Kate Fox. 'Obviously, one is always going to have to be discreet when talking about what you've found. But our brains haven't changed since the Stone Age, and humans are designed to live in small groups in which everyone knows one another. Googling is an attempt to recreate a primeval, preindustrial pattern of interaction.' But the devil is in the details. If we tell a new friend that we've read her LinkedIn entry or her wedding announcement, it probably won't be perceived as trespassing, as long we bear no ulterior motives. If we happen to reveal that we've also read her long-ago abandoned blog about her cat, we're more likely to be seen as chronically bored than menacing. 'I'm so baffled by this idea that we're not supposed to Google people,' says Dean Olsher. 'Why would there be a line? Like everyone else is allowed to know something but I'm not?' But doesn't taking the google shortcut to a primeval, preindustrial pattern of recognition sometimes rob encounters of their inherent mystery or even get us in trouble? Tina Jordan, an executive in book publishing who has the same name as a former girlfriend of Hugh Hefner, says, 'I typically tell any blind dates before I meet them that they probably shouldn't Google my name, otherwise they'll be sorely disappointed when they meet me.'"
danomac writes "Police agencies in Canada want to have better tools to do online surveillance. Bill C-30 was to include new legislation (specifically Section 34) that would give police access to information without a warrant. This can contain your name, your IP address, and your mobile phone number. This, of course, creates all sorts of issues with privacy online. The police themselves say they have concerns with Section 34. Apparently, the way it is worded, it is not just police that can request the information, but any government agent. Would you trust the government with this kind of power?"
CowboyRobot writes "As budgets are pinched by reduced tax collection, many U.S. states are facing a possibility of not being able to handle the ever-increasing number of data breaches. 70% of state chief information security officers (CISOs) reported a data breach this year, each of which can cost up to $5M in some states. 'Cybersecurity accounts for about 1 to 2 percent of the overall IT budget in state agencies. ... 82 percent of the state CISOs point to phishing and pharming as the top threats to their agencies, a threat they say will continue in 2013, followed by social engineering, increasingly sophisticated malware threats, and mobile devices.' The full 2012 Deloitte-National Association of State Chief Information Officers (NASCIO) Cybersecurity Study is available online (PDF)."
alphadogg writes "The $100 million price differential between the Alcatel-Lucent and Cisco proposals to refresh California State University's 23-campus network revealed earlier this week was based on an identical number of switches and routers in various configurations. CSU allowed Network World to review spreadsheets calculating the eight-year total cost of ownership of each of the five bidders for the project. 'Everybody had to comply with this spreadsheet,' said CSU's director of cyberinfrastructure. 'Alcatel-Lucent won the project with a bid of $22 million. Cisco was the high bidder with a cost just under $123 million. Not only was Cisco's bid more than five-and-a-half times that of Alcatel-Lucent's, it was three times that of the next highest bidder: HP, at $41 million.'"
Penurious Penguin writes "Last year a Slashdot story mentioned the case of Daniel David Rigmaiden, or 'the Hacker.' With the help of an IMSI-catcher device, law enforcement had been able to locate and arrest the elusive 'Hacker,' leading to U.S. v. Rigmaiden. But far more elusive than the 'Hacker,' is the IMSI-catcher device itself — particularly the legalities governing its use. The secrecy and unconstitutionality of these Man In The Middle devices, i.e. 'stingrays,' has caught some attention. The EFF and ACLU have submitted an amicus brief in the Rigmaiden case; and EPIC, after filing an FOIA request in February and receiving a grossly redacted 67 out of 25,000 (6,000 classified) pages on the "stingray" devices, has now requested a district judge expedite disclosure of all documents. Some Judges also seem wary of the 'stingray,' having expressed concerns that their use violates the Fourth Amendment; and additionally, that information explaining how the technology is used remains too obscure. Perhaps the most controversial aspect of ISMI-catchers is their several-kilometer range. When a "stingray" is used to spoof a cellphone tower, thousands of innocent users may be collaterally involved. And while the government claims to delete all gathered data unrelated to the target, it also means no one else can know what that data really was. The government claims that because only attributes of calls — but not their content — are captured in the attack, search warrants aren't necessary." (More, below.)
Registered Coward v2 writes "The U.S. Supreme Court is set to hear a case to determine how copyright law and the doctrine of first sale applies to copyrighted works bought overseas, then imported to the U.S. and then re-sold. The case involves a foreign student who imported textbooks from Asia and the resold them in the U.S. to help fund his education. He was sued by the publisher, lost, and was ordered to pay $600,000 in damages. Now SCOTUS gets to weigh in on the issue. 'The idea -- upheld by the Supreme Court since 1908 -- is that once a copyright holder legally sells a product initially, the ownership claim is then exhausted, giving the buyer the power to resell, destroy, donate, whatever. It's a limited idea -- involving only a buyer's distribution right, not the power to reproduce that DVD or designer dress for sale. ... The tricky part is whether that first-sale doctrine applies to material both manufactured and first purchased outside the United States. Federal law gives that authority to a purchaser's work "lawfully made under this title." Does "this title" apply to any copyrighted work — whether manufactured all or in part in the United States and around the world?"
Taco Cowboy writes "The New York Times has become the latest target of Chinese censorship. Censors of the People's Republic of China, in an almost unheard of, truly remarkable feat of neck-breaking speed, blocked the (paywalled) website of the New York Times, all because of one news article. That particular article was about the enormous wealth of the family members of a very prominent figure in the Chinese Communist Party (CCP) — Chinese Premier Wen Jia Bao. The wealth in question totals some USD 2.7 billion. " (Also covered at the BBC.)
dsinc writes "And so it begins... Yahoo has made it official: it won't honor the Do Not Track request issued by Internet Explorer 10. Their justification? '[T]he DNT signal from IE10 doesn't express user intent" and "DNT can be easily abused.'" Wonder what percentage of users would rather be tracked by default.
whoever57 writes "The man who claimed ownership of 50% of Facebook has been arrested and charged with fraud in connection with his claims. The United States attorney in Manhattan said, 'Ceglia's alleged conduct not only constitutes a massive fraud attempt, but also an attempted corruption of our legal system through the manufacture of false evidence.' 'Dressing up a fraud as a lawsuit does not immunize you from prosecution.'"
New submitter Escape From NY writes "3.6 million Social Security numbers and 387,000 credit and debit card numbers were stolen from the SC Department of Revenue. Most of the credit and debit card numbers were encrypted — all but about 16,000. There were several different attacks, all of which originated outside the country. The first they're aware of happened on August 27, and four more happened in September. Officials first learned of the breach on October 10, and the security holes were closed on October 20. This is still a developing story, but anyone who filed a SC state tax return since 1998 my be at risk. Governor Nikki Haley today signed an executive order (PDF) to beef up the state's IT security."
An anonymous reader writes "TechCrunch has launched a project called CrunchGov, which aims to bring educated people together to work on tech-related government policy. 'It includes a political leaderboard that grades politicians based on how they vote on tech issues, a light legislative database of technology policy, and a public markup utility for crowdsourcing the best ideas on pending legislation.' They give politicians scores based on how their votes align with consensus on policy in the tech industry. 'A trial run of the public markup utility in Congress has already proven successful. When Rep. Issa opened his own alternative to SOPA for public markup, Project Madison participants came in droves with surprisingly specific legal suggestions. For instance, one savvy user noticed that current piracy legislation could mistakenly leave a person who owns a domain name legally responsible for the actions of the website administrator (the equivalent of holding a landlord responsible if his tenant was growing pot in the backyard). The suggestion was included in the updated bill before Congress, representing perhaps the first time that the public, en masse, could have a realistic shot at contributing to federal law purely based on the merit of their ideas.'"
We recently discussed news of a UK court ruling in which the judge decided Apple must publicly acknowledge that Samsung's Galaxy Tab did not infringe upon the iPad's design, both on the Apple website and in several publications. The acknowledgement has now been posted, and it's anything but apologetic. It states the court's ruling, helpfully referring to "Apple's registered design No. 000018607-0001," and quotes the judges words as an advertisement. The judge wrote, "The informed user's overall impression of each of the Samsung Galaxy Tablets is the following. From the front they belong to the family which includes the Apple design; but the Samsung products are very thin, almost insubstantial members of that family with unusual details on the back. They do not have the same understated and extreme simplicity which is possessed by the Apple design. They are not as cool." They go on to mention German and U.S. cases which found in Apple's favor. Apple's statement concludes, "So while the U.K. court did not find Samsung guilty of infringement, other courts have recognized that in the course of creating its Galaxy tablet, Samsung willfully copied Apple's far more popular iPad."
Penurious Penguin writes "In 2011, en route to Baltimore, Tennessee mother Andrea Abbott was arrested after squabbling with the TSA over their pat-down and "naked" body-scan process. Initially Abbott had protested a pat-down of her 14 year-old daughter, though eventually backed off. When her own turn came, she refused both a pat-down and body-scan. This week, despite having no criminal record, Abbott was found guilty of disorderly conduct and sentenced to one year of probation. A surveillance video of the affair shows what appears an agitated Abbott surrounded by various TSA agents, but seemingly contradicts the premise by which she was convicted. In the case against Abbott it was claimed that her behavior impeded the flow security-lines and lawful activity. Beyond Abbott's confession of issuing some verbal abuse, the video does not appear to display a significant blockage of traffic nor anything noticeably criminal."
An anonymous reader sent in a link to an article in Wired about the latest DMCA loophole hearing. Bad news: the federal government rejected requests that would make console modding and breaking DRM on DVDs to watch them legal. So, you dirty GNU/Linux hippies using libdvdcss better watch out: "Librarian of Congress James Billington and Register of Copyrights Maria Pallante rejected the two most-sought-after items on the docket, game-console modding and DVD cracking for personal use and 'space shifting.' Congress plays no role in the outcome. The regulators said that the controls were necessary to prevent software piracy and differentiated gaming consoles from smart phones, which legally can be jailbroken. ... On the plus side, the regulators re-authorized jailbreaking of mobile phones. On the downside, they denied it for tablets, saying an 'ebook reading device might be considered a tablet, as might a handheld video game device.'" So you can jailbreak a phone, but if it's 1" larger and considered a "tablet" you are breaking the law.