aws910 points to an L.A. Times article which explains that "Cablevision (a huge cable network) is suing Viacom (owner of MTV, Nickelodeon, etc), alleging that Viacom is violating U.S. federal anti-trust laws by requiring programming packages to be bundled. If they are victorious, it would be a tiny step closer to 'a la carte cable,' but not much — Cablevision just wants to make their own bundles, and not give the customer the freedom to choose which channels they get. Where can I get my "Kill your TV" bumper sticker?" The thing I care more about buying separately is no-TV internet service, which the major cable companies seem reluctant to admit is even possible.
Trust the World's Fastest VPN with Your Internet Security & Freedom - A Lifetime Subscription of PureVPN at 88% off. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×
Edgewood_Dirk writes "In response to the recent White House petition, the FCC will be investigating the viability and possible harm of the ban on cell-phone unlocking. Gregory Ferenstein met with FCC Chairman Julius Genachowski at a TechCrunch CrunchGov event Wednesday, where the Chairman said the 'ban raises competition concerns; it raises innovation concerns.'" This line from the end of the article fails to inspire confidence: "Genachowski isn’t sure what authority he has, but if he finds any, given the tone of the conversation, it’s likely he will exert his influence to reverse the decision."
TrueSatan writes "In an utterly craven move, the Canadian government has launched a bill to bring Canada into full compliance with the discredited, U.S.-led ACTA agreement — an agreement to which most of the world does not agree. To further pressure the acceptance of this awful bill, the U.S., on the same day, released their Trade Policy and Agenda Annual Report (PDF), which calls on Canada to comply with ACTA obligations. For ACTA to take effect, it would require six signatures from the major economic blocks. Tt appears to have no remaining possibility of getting them, yet the U.S., and now Canada, continue to push it forward. The Canadian bill features claims based on spurious health and safety concerns that have been thoroughly debunked by a U.S. report. Despite these claims being so dubious, they remain a cornerstone of the Canadian bill. Similarly, the claimed losses due to counterfeiting ($30 billion USD) stated in the bill have also been debunked. The Canadian bill seeks to give border guards an unprecedented level of control, without the possibility of judicial oversight. Despite a lack of evidence to suggest that Canada is a major source of counterfeit product, the bill puts at risk the fully-legal parallel import of generic items — pharmaceuticals, for instance. The bill would also change copyright infringement from a civil dispute to a breach of criminal law. Pity Canada if this bill is enacted!"
New submitter charlesj68 writes with news that U.S. District Judge Lucy Koh has cut Apple's $1.05 billion patent infringement award from Samsung down by $450.5 million. She also said Samsung deserves a new trial over claims related to some of its smartphones. "Koh rejected Apple’s request to enhance the jury’s award, saying the amount Samsung owed was heavily disputed and the jury wasn’t bound to accept either side’s damages estimate. 'It is not the proper role of the court to second-guess the jury’s factual determination as to the proper amount of compensation,' Koh said in her ruling. Apple is entitled to additional damages for sales of infringing products that weren’t considered by the jury, Koh ruled, saying she intends to calculate the amount beginning on Aug. 25, the day after the jury reached its verdict. As the case has been appealed, Koh said she would delay considering evidence of actual post-verdict sales and pre-judgment interest until the appeals are completed."
Later today, the U.S. government will enter the sequestration process, a series of across-the-board budget cuts put into place automatically because U.S. politicians are bad at agreeing on things. "At that moment, somewhere in the bowels of the Treasury Department, officials will take offline the computers that process payments for school construction and clean energy bonds to reprogram them for reduced rates. Payments will be delayed while they are made manually for the next six weeks." The cuts will directly affect science- and tech-related spending throughout the country. Tom Levenson writes, '[s]equester cuts will strike bluntly across the scientific community. The illustrious can move a bit of money around, but even in large labs, a predictable result will be a reduction in the number of graduate student and post – doc slots available — and as those junior and early-stage researchers do a whole lot of the at-the-bench level research, such cuts will have an immediate effect on research productivity. The longer term risk is obvious too: fewer students and post-docs mean on an ongoing drop from baseline in the amount of work to be done year over year.' The former director of the National Institute of Health says it will set back medical science for a generation. NASA Administrator Charles Bolden has laid out how the cuts will affect the U.S. space program. He said, "The Congress wasn’t able to do what they were supposed to do, so we’re going to suffer." The sequester will also prevent billions of dollars from flowing into the tech industry. This comes at a time when there's a pressing need in the tech sector for professionals versed in the use of Linux, and salaries for those workers are on the rise.
Dr Max sends this excerpt from an AP report: "U.S. prosecutors won a New Zealand court victory Friday in their battle to extradite Megaupload founder Kim Dotcom and three colleagues accused of facilitating massive copyright fraud through the now-defunct online file-sharing site. The appeals court overturned an earlier ruling that would have allowed Dotcom and the others broad access to evidence in the case against them at the time of their extradition hearing, which is scheduled for August. The appeals court ruled that extensive disclosure would bog down the process and that a summary of the U.S. case would suffice. Dotcom says he's innocent and can't be held responsible for those who chose to use the site to illegally download songs or movies."
An anonymous reader writes with this excerpt from TorrentFreak: "The website blocking phenomenon has continued today in the UK, with the High Court adding three major torrent sites to the country's unofficial ban list. Following complaints from the music industry led by the BPI, the Court ordered the UK's leading Internet service providers to begin censoring subscriber access to Kickass Torrents, H33T and Fenopy." Unlike when the Pirate Bay was blocked, none of the ISPs contested this. They did, however, refuse to block things without a court order. Looks like the flood gates have been opened. On the topic of filesharing, Japan arrested 27 file sharers, using the recent changes to their copyright law that allow criminal charges to be brought against file sharers.
Entropy98 sends this quote from the LA Times: "Army Pfc. Bradley Edward Manning pleaded guilty Thursday to 10 charges that he illegally acquired and transferred highly classified U.S. government secrets, agreeing to serve [up to] 20 years in prison for causing a worldwide uproar when WikiLeaks published documents describing the inner workings of U.S. military and diplomatic efforts in Iraq, Afghanistan and around the globe. The 25-year-old soldier, however, pleaded not guilty to 12 more serious charges, including espionage for aiding the enemy, meaning that his criminal case will go forward at a general court-martial in June. If convicted at trial, he risks a sentence of life in prison at Ft. Leavenworth, Kan."
Zordak writes "According to Law 360, H.R. 845, the 'Saving High-Tech Innovators from Egregious Legal Disputes' (SHIELD) Act of 2013 would require non-practicing entities that lose in patent litigation to pay the full legal costs of accused infringers. The new bill (PDF) would define a 'non-practicing entity' as a plaintiff that is neither the original inventor or assignee of a patent, and that has not made its own 'substantial investment in exploiting the patent.' The bill is designed to particularly have a chilling effect on 'shotgun' litigation tactics by NPEs, in which they sue numerous defendants on a patent with only a vague case for infringement. Notably, once a party is deemed to be an NPE early in the litigation, they will be required to post a bond to cover the defendants' litigation costs before going forward."
An anonymous reader writes "Officials at the Chinese Defense Ministry say hackers from the U.S. have been attacking Chinese military websites. 'The sites were subject to about 144,000 hacking attacks each month last year, two thirds of which came from the U.S., according to China's defense ministry. The issue of cyber hacking has strained relations between the two countries.' This follows recent hacks from people in China on high-profile U.S. sites, as well as a report accusing the Chinese government of supporting a hacking group. '[Defense Ministry spokesman Geng Yansheng] called on U.S. officials to "explain and clarify" what he said were recent U.S. media reports that Washington would carry out "pre-emptive" cyber attacks and expand its online warfare capabilities. Such efforts are "not conducive to the joint efforts of the international community to enhance network security," he said.'"
The new Copyright Alert System, a.k.a. the 'Six Strikes' policy, went into effect on Monday. Comcast and Verizon activated it today. Ars Technica asked them and other participating ISPs to see the copyright alerts that will be sent to customers who have been identified as infringing. Comcast was the only one to grant their request, saying that a "small number" of the alerts have already been sent out. The alerts will be served to users in the form of in-browser popups. They explain what triggered the alert and ask the user to sign in and confirm they received the alert. (Not admitting guilt, but at least closing off the legal defense of "I didn't know.") The article points out that the alerts also reference an email sent to the Comcast email address associated with the account, something many users not be aware of. The first two notices are just notices. Alert #5 indicates a "Mitigation Measure" is about to be applied, and that users will be required to call Comcast's Security Assurance group and to be lectured on copyright infringement. The article outlines some of the CAS's failings, such as being unable to detect infringement through a VPN, and disregarding fair use. Comcast said, "We will never use account termination as a mitigation measure under the CAS. We have designed the pop-up browser alerts not to interfere with any essential services obtained over the Internet." Comcast also assures subscribers that their privacy is being protected, but obvious that's only to a point. According to TorrentFreak, "Comcast can be asked to hand over IP-addresses of persistent infringers, and the ISP acknowledges that copyright holders can then obtain a subpoena to reveal the personal details of the account holder for legal action."
Weezul writes "The Ada Initiative's Valerie Aurora got Violet Blue's Hackers As A High-Risk Population (29c3 abstract) talk on harm reduction methodology pulled from the Security BSides meeting in San Francisco by claiming it contained rape triggers [ed note: you might not want to visit the main page of the weblog as it contains a few pictures that might be considered NSFW in more conservative places]. It's frankly asinine to object to work around hacker ethics as 'off topic' at such broad hacker conference. Is Appelbaum's 29c3 keynote 'off topic' for asking hackers to work for the 'good guys' rather than military, police, their contractors, Facebook, etc.? Yes, obviously harm reduction is a psychological hack that need not involve a computer, but this holds for 'social engineering' as well. It's simply that hacking isn't nearly as specialized or inaccessible as say theoretical physics. Worse, there is no shortage of terrible technology laws like the CFAA, DMCA, etc. that exist partially because early hackers failed to communicate an ethics that seemed coherent and reasoned to outsiders." The Ada Initiative responds that such talks do more harm than good. It could also be argued that "not working for the bad guys" type talks aren't off-topic, since the hacker community has traditionally cared about things like information freedom.
Zaatxe writes with a bit of news about the music industry; sales are slightly up (basically flat). From the article: "The music industry, the first media business to be consumed by the digital revolution, said on Tuesday that its global sales rose last year for the first time since 1999, raising hopes that a long-sought recovery might have begun. The increase, of 0.3 percent, was tiny, and the total revenue, $16.5 billion, was a far cry from the $38 billion that the industry took in at its peak more than a decade ago. Still, even if it is not time for the record companies to party like it's 1999, the figures, reported Tuesday by the International Federation of the Phonographic Industry, provide significant encouragement. 'At the beginning of the digital revolution it was common to say that digital was killing music,' said Edgar Berger, chief executive of the international arm of Sony Music Entertainment. Now, he added, it could be said 'that digital is saving music.'" Because CDs aren't digital. CD sales are declining, and being replaced by the sale of lossy files. I wonder how much more money they could be making if they'd just sell folks lossless music on the open market (not just iTunes) since at least that's all that keeps me buying a CD or three a year (I own way too many CDs personally, and stopped buying music until discovering Bandcamp and easy lossless downloads rekindled my desire to find new stuff).
An anonymous reader sends this excerpt from a blog post by Taren Stinebrickner-Kauffman, founder of corporate watchdog SumOfUs.org and partner of the late Aaron Swartz: "The DOJ has told Congressional investigators that Aaron's prosecution was motivated by his political views on copyright. I was going to start that last paragraph with 'In a stunning turn of events,' but I realized that would be inaccurate — because it's really not that surprising. Many people speculated throughout the whole ordeal that this was a political prosecution, motivated by anything/everything from Aaron's effective campaigning against SOPA to his run-ins with the FBI over the PACER database. But Aaron actually didn't believe it was — he thought it was overreach by some local prosecutors who didn't really understand the internet and just saw him as a high-profile scalp they could claim, facilitated by a criminal justice system and computer crime laws specifically designed to give prosecutors, however incompetent or malicious, all the wrong incentives and all the power they could ever want. But this HuffPo article, and what I’m hearing from sources on the Hill, suggest that that’s not true. That Ortiz and Heymann knew exactly what they were doing: Shutting up, and hopefully locking up, an extremely effective activist whose political views, including those on copyright, threatened the Powers That Be."
schwit1 writes "New Jersey Gov. Chris Christie signed a bill Tuesday legalizing Internet gambling. While the bill only allows Atlantic City casino companies to take online bets, the WSJ believes that those casinos will partner with overseas companies that provide services for online gambling, potentially opening up a bigger market. Furthermore, the bill (PDF) will allow bettors from other states to gamble online, so long as regulators determine that the activity isn't prohibited by any federal or state laws. They included setting a 10-year trial period for online betting, and raising the taxes on the Atlantic City casinos' online winnings from 10 to 15 percent. New Jersey became the third state in the nation to legalize gambling over the Internet. Nevada and Delaware have passed laws legalizing Internet betting, which also is going on offshore, untaxed and unregulated."
eegad writes "I've been thinking a lot about how much information I give to technology companies like Google and Facebook and how I'm not super comfortable with what I even dimly know about how they're handling and selling it. Is it time for major companies like this, who offer arguably utility-like services for free in exchange for info, to start giving customers a choice about how to 'pay' for their service? I'd much rather pony up a monthly fee to access all the Google services I use, for example, and be assured that no tracking or selling of my information is going on. I'm not aware of how much money these companies might make from selling data about a particular individual, but could it possibly be more than the $20 or $30 a month I'd fork over to know that my privacy is a little more secure? Is this a pipe dream, or are there other people who would happily pay for their private use of these services? What kinds of costs or problems could be involved with companies implementing this type of dual business model?"
New submitter ThatsNotPudding writes "The U.S. Supreme court has rejected pleas to allow any challenges to the FISA wiretapping law unless someone can prove they've been harmed by it. 'The Foreign Intelligence Surveillance Act, or FISA, was originally designed to allow spying on the communications of foreign powers. But after the September 11 attacks, FISA courts were authorized to target a wide array of international communications, including communications between Americans and foreigners. ... In this case, the plaintiffs' groups said their communications were likely being scooped up by the government's expanded spying powers in violation of their constitutional rights. Today's decision, a 5-4 vote along ideological lines by the nation's highest court, definitively ends their case. In an opinion (PDF) by Justice Samuel Alito, the court ruled that these groups don't have the right to sue at all, because they can't prove they were being spied on.'" Further coverage at SCOTUSblog.
dp619 writes "Penn State law professor Clark Asay has written an editorial on F/OSS patent risk, saying, '...under the current patent system, it's entirely possible to obtain a patent that reads on software that FOSS communities independently create. Consequently, FOSS communities and their users are vulnerable to third party patent claims, even absent any sort of wrongdoing or copying on their part.' He suggests that developers collaborate to prevent bad or frivolous patents from being issued in the first place. The ongoing work of Linux Defenders and Peer-to-Patent are cited as good examples of how the FOSS community's collaborative spirit can help it counteract potential legal threats."
New submitter mynameiskhan writes "Major internet service providers today will start monitoring the internet traffic to their customers' computers and will warn them if they download copyrighted materials using peer to peer network. The article says, 'A person will be given up to six opportunities to stop before the Internet provider will take more drastic steps, such as temporarily slowing their connection, or redirecting Internet traffic until they acknowledge they received a notice or review educational materials about copyright law.' Furthermore, if you appeal the warning you will be required to pay $35 to state your case. Have the ISPs have had enough of RIAA pestering, or are they siding with RIAA?"
Google Hangout interview with Keith Bergelt, Chief Executive Officer of the Open Invention Network (OIN), which was jointly founded by IBM, NEC, Novell, Philips, Red Hat, and Sony to share their relevant patents with all Linux and Open Source developers and users in order to prevent patent troll attacks on FOSS, such as the famous SCO vs. IBM lawsuits that hampered Linux adoption during the early 2000s. It costs nothing to become a an OIN licensee, and over 500 companies have done so. Few people know, however, that individual developers and FOSS users can become OIN licensees; that you are welcome to do so, and it costs nothing. Read their license agreement, sign it, and send it in. That's all it takes. They also buy patents and accept patent donations. And "...if your company is being victimized by any entity seeking to assert its patent portfolio against Linux, please contact us so that we can aid you in your battle with these dark forces." This OIN service is called Linux Defenders 911. We hope you never need to use it, but it's good to know it's there if you do need it.
An anonymous reader writes "It appears that two weeks ago my email address got into the wrong database. Since that time there have been continuing attempts to access my accounts and create new accounts in my name. I have received emails asking me to click the link below to confirm I want to create an account with Twitter, Facebook, Apple Games Center, Facebook mobile account, and numerous pornographic sites. I have not attempted to create accounts on any of these services. I have also received 16 notices from Apple about how to reset my Apple ID. I am guessing these notices are being automatically generated in response to too many failed login attempts. At this point I have no reason to believe any of my accounts have been compromised but I see no good response."
concealment writes "Many of us have had the experience of going to Amazon to buy one thing but checking out with a huge shopping cart of items that we didn't initially seek—or even know were available. Amazon's merchandising often benefits Amazon's customers, but trademark owners who lose sales to their competition due to it aren't as thrilled. Fortunately for Amazon, a California federal court recently upheld Amazon's merchandising practices in its internal search results."
An anonymous reader writes with this news (excerpted from IT World) that follows up on the report of pressure put on Sweden's Pirate Party for its connection to The Pirate Bay: "The Pirate Bay has opened two new gateways to its internal network in order to shield its current Internet provider, the Swedish Pirate Party, which had been threatened with legal action if it did not stop providing Internet access to the torrent search site by Tuesday. The Swedish Pirate Party had provided bandwidth to The Pirate Bay for about three years because it was hard for the site to find anyone else who would do so. But last Tuesday the Rights Alliance, an organization that represents the film industry, gave it an ultimatum: The Pirate Party had to cut off Internet access to the torrent search site or face legal action. The Pirate Bay's administrators said in a post on Facebook that, because of the legal threat and the potential cost of fighting it, 'We've taken the decision to move on to Norway and Spain.'"
chicksdaddy writes "The security firm Bit9 released a more detailed analysis of the hack of its corporate network was part of a larger operation that was aimed a firms in a 'very narrow market space' and intended to gather information from the firms. The analysis, posted on Monday on Bit9's blog is the most detailed to date of a hack that was first reported on February 8 by the blog Krebsonsecurity.com, but that began in July, 2012. In the analysis, by Bit9 Chief Technology Officer Harry Sverdlove said 32 separate malware files and malicious scripts were whitelisted in the hack. Bit9 declined to name the three customers affected by the breach, or the industry segment that was targeted, but denied that it was a government agency or a provider of critical infrastructure such as energy, utilities or banking. The small list of targets — just three — and the fact that one malware program was communicating with a system involved in a recent 'sinkholing operation' raises the specter that the hack of Bit9 may have played a part in the recent attacks on Facebook, Twitter and Apple, though Bit9 declined to name the firms or the market they serve."
skade88 writes "As I get older, I find the little details of my life slip away from my memory after years and decades pass. I find myself wishing I had a way to record at least sound and video of my entire life. It would be nice to be able to go back and see what I was like when I was younger without the fog of memory clouding my view of the past. It would be cool to share with my boy friend and future kids how I was when I was younger by just showing them video from my life. Do y'all know of any good way to do this? I would settle for recording what I see from a first person point of view. There is also concerns that range beyond the technical. If I were to record my entire life, that would mean also recording other people, when they are interacting with me on a daily basis. What sort of privacy laws pertain to this? Even without laws, would others act differently around me because they were being recorded with my life record? How would it make you feel if your friend or family member did this?"
An anonymous reader writes "A small U.S. university has come up with a novel solution to reduce the possibility of using a dead person's hand to get past a fingerprint scanner through the use of hemoglobin detection. The device quickly checks the fingerprint and hemoglobin 'non-intrusively' to verify the identity and whether the individual is alive. This field of research is called Biocryptology and seeks to ensure that biometric security devices can't be easily bypassed."
New submitter C0R1D4N writes "Carl Bergmanson, a New Jersey gubernatorial democrat running in the 2013 primary, has recently spoken out against the new 'six strike policy' being put in place this week by major ISPs. He said: 'The internet has become an essential part of living in the 21st century, it uses public infrastructure and it is time we treat it as a public utility. The electric company has no say over what you power with their service, the ISPs have no right to decide what you can and can not download.'"
An anonymous reader writes "Days after the killing of leftist blogger Thaba Baba, mosques throughout Bangladesh called for a popular uprising to demand the killing of other bloggers who had held a rally calling for the death of Jama'at-e-Islami leaders convicted of war crimes. This happens in an atmosphere of ongoing tension between Left and Right, with the leftist government threatening to outlaw rightist parties while the right uses violence to quiet selected enemies."
theodp writes "Before iTunes, Netflix, MySpace, Facebook, and the Kindle, 17-year-old Shawn Fanning and 18-year-old Sean Parker gave the world Napster. And it was very good. The Observer's Tom Lamont reports on VH1's soon-to-premiere Downloaded, a documentary that tells the story of the rise and fall of the file-sharing software that started the digital music revolution, and shares remembrances of how Napster rocked his world. 'I was 17,' writes Lamont, 'and the owner of an irregular music collection that numbered about 20 albums, most of them a real shame (OMC's How Bizarre, the Grease 2 soundtrack). One day I had unsupervised access to the family PC and, for reasons forgotten, an urge to hear the campy orchestral number from the film Austin Powers. I was a model Napster user: internet-equipped, impatient and mostly ignorant of the ethical and legal particulars of peer-to-peer file-sharing. I installed the software, searched Napster's vast list of MP3 files, and soon had Soul Bossa Nova plinking kilobyte by kilobyte on to my hard drive.' Sound familiar?"
An anonymous reader writes "Dozens of fans attending a NASCAR race at Daytona Speedway were injured when a crash during the last lap triggered a chain reaction, culminating in the front section of Kyle Larson's car ricocheting into the fence in front of the stands (Larson escaped injury). While the footage accompanying the article is dramatic enough, an even more riveting clip showing the chaotic scene in the stands from up close was posted on YouTube, but was taken down after NASCAR claimed it violated their copyright . YouTube has since restored the fan's video. A NASCAR spokesman has issued a clarification, saying that the takedown request was done out of respect for those injured. The race was an opening act for the main event, the Daytona 500, which officials say will proceed as scheduled. 'With the fence being prepared tonight to our safety protocols, we expect to go racing tomorrow with no changes,' Speedway President Joie Chitwood told CNN."
Hugh Pickens writes "The rules for papal elections are steeped in tradition. John Paul II last codified them in 1996, and Benedict XVI left the rules largely untouched. The 'Universi Dominici Gregis on the Vacancy of the Apostolic See and the Election of the Roman Pontiff' is surprisingly detailed. Now as the College of Cardinals prepares to elect a new pope, security people like Bruce Schneier wonder about the process. How does it work, and just how hard would it be to hack the vote? First, the system is entirely manual, making it immune to the sorts of technological attacks that make modern voting systems so risky. Second, the small group of voters — all of whom know each other — makes it impossible for an outsider to affect the voting in any way. The chapel is cleared and locked before voting. No one is going to dress up as a cardinal and sneak into the Sistine Chapel. In short, the voter verification process is about as good as you're ever going to find. A cardinal can't stuff ballots when he votes. Then the complicated paten-and-chalice ritual ensures that each cardinal votes once — his ballot is visible — and also keeps his hand out of the chalice holding the other votes. Ballots from previous votes are burned, which makes it harder to use one to stuff the ballot box. What are the lessons here? First, open systems conducted within a known group make voting fraud much harder. Every step of the election process is observed by everyone, and everyone knows everyone, which makes it harder for someone to get away with anything. Second, small and simple elections are easier to secure. This kind of process works to elect a pope or a club president, but quickly becomes unwieldy for a large-scale election. And third: When an election process is left to develop over the course of a couple of thousand years, you end up with something surprisingly good."
cervesaebraciator writes "U.S. Representative Judy Chu (D-CA) will be starting a new caucus with the ostensible purpose of protecting the intellectual property rights of filmmakers, musicians and other artists. The new caucus, styled the Congressional Creative Rights Caucus, will be formed along with Rep. Howard Coble (R-NC). Chu's office released a statement, including the following: 'American innovation hinges on creativity – it is what allows our kids to dream big and our artists to create works that inspire us all. The jobs that result are thanks entirely to our willingness to foster creative talent, and an environment where it can thrive and prosper. [...] The Congressional Creative Rights Caucus will serve to educate Members of Congress and the general public about the importance of preserving and protecting the rights of the creative community in the U.S. American creators of motion pictures, music, software and other creative works rely on Congress to protect their copyrights, human rights, First Amendment rights and property rights.'"
hypnosec writes "Ex-LulzSec leader Hector Xavier Monsegur, aka Sabu, has been handed another sentencing delay, possibly because of his continued cooperation with the U.S. government that led to the arrest of several Lulzsec members. Sabu plead guilty to all counts of bank fraud and identity theft offenses, and was to receive up to 124 years of imprisonment — but was granted a six-month breather back in August 2012 after the U.S. government asked the District Attorney to consider adjournment of Monsegur's trial 'in light of the defendant's ongoing cooperation with the Government.' New reports indicate that Sabu has dodged sentencing for a second time, with no dates set for the next hearing."
New submitter haberb writes "I always thought my HTC phones were of average or above average quality, and certainly no less secure than an vanilla Android install, but it turns out someone was still not impressed. 'Mobile device manufacturer HTC America has agreed to settle Federal Trade Commission charges that the company failed to take reasonable steps to secure the software it developed for its smartphones and tablet computers, introducing security flaws that placed sensitive information about millions of consumers at risk.' Perhaps this will push HTC to release some of the ICS upgrades they promised a few months ago but never delivered, or perhaps the reason they fell through in the first place?"
An anonymous reader writes "Stanford researcher Jonathan Mayer has contributed a Firefox patch that will block third-party cookies by default. It's now on track to land in version 22. Kudos to Mozilla for protecting their users and being so open to community submissions. The initial response from the online advertising industry is unsurprisingly hostile and blustering, calling the move 'a nuclear first strike.'"
walterbyrd writes with news that Nikon is the latest company to agree to pay Microsoft for the privilege of using Android on its devices — as you might expect from Nikon, the devices in this case are cameras. (Microsoft's press release.)
Z80xxc! writes "The White House Office of Science and Technology Policy announced a "policy memorandum" today requiring any federal agency with over $100 million in R&D expenditures each year to develop plans for making all research funded by that agency freely available to the public within one year of publication in any peer-reviewed scholarly journal. The full memorandum is available on the White House website. It appears that this policy would not only apply to federal agencies conducting research, but also to any university, private corporation, or other entity conducting research that arises from federal funding. For those in academia and the public at large, this is a huge step towards free open access to publicly funded research." Edward Tufte calls the move timid and unimaginative, linking to a Verge article that explains that it's not quite as sweeping as the summary above sounds.
Hugh Pickens writes "William D. Hartung, director of the Arms and Security Project at the Center for International Policy, writes that although we have been bombarded with tales of woe about the potentially devastating impacts of cutting the Pentagon budget 8% under the sequester, examples of egregious waste and misplaced spending priorities at the Pentagon abound. One need look no further than the department's largest weapons program, the F-35 combat aircraft, which has just been grounded again after a routine inspection revealed a crack on a turbine blade in the jet engine of an F-35 test aircraft in California. Even before it has moved into full-scale production, the plane has already increased in price by 75%, and it has so far failed to meet basic performance standards. By the Pentagon's own admission, building and operating three versions of the F-35 — one for the Air Force, one for the Navy and one for the Marines — will cost more than $1.4 trillion over its lifetime, making it the most expensive weapons program ever undertaken. And in an era in which aerial combat is of diminishing importance and upgraded versions of current generation U.S. aircraft can more than do the job, it is not at all clear that we need to purchase more than 2,400 of these planes. Cutting the two most expensive versions of the F-35 will save over $60 billion in the next decade."
judgecorp writes "France is planning a €20 billion programme to get super-fast broadband to its rural population. About half the funds will come from government investment, and President Hollande believes the work will create 10,000 jobs. Half the population should have fast broadband in the next five years, and the whole country in ten years. France is at a disadvantage for broadband as it is a large country with a lot of rural areas. However, it also has a more left-leaning government willing to take on infrastructure projects."
s122604 writes "Automakers aren't too happy about a recent U.S. Federal Communications Commission (FCC) proposal, which uses part of the wireless spectrum assigned to vehicle-to-vehicle technology for Wi-Fi instead. The FCC announced that it plans to free up 195 MHz of spectrum in the 5 GHz band for unlicensed use in an effort to address the U.S.' spectrum crisis. This could potentially lead to Wi-Fi speeds faster than 1 gigabit per second."
An anonymous reader writes "Back in late 2012, New York City Mayor Michael Bloomberg attributed the increase in statistical city-wide crime to Apple, noting that thieves had a propensity to target folks using iPhones and iPads. As an illustration of the problem, there were 3,890 more Apple product thefts than in 2012 than there were in 2011. At the time, Mayor Bloomberg's press secretary Marc La Vorgna explained that 'if you just took away the jump in Apple', crime in New York City would have been down year over year. Indeed, the number of major crimes reported in 2011 in NYC came in at 104,948 compared to 108.432 in 2012. If you exclude Apple related thefts from the figures, then the crime rate in 2012 is essentially the same as it was in 2011. In light of that, a new report from the New York Post details that Apple is now working with the NYPD in an effort to curb iPhone and other Apple related thefts."
An anonymous reader sends this excerpt from the Daily Dot: "Starting next week, most U.S. Internet users will be subject to a new copyright enforcement system that could force them to complete educational programs, and even slow their Internet speeds to a crawl. A source with direct knowledge of the Copyright Alert System [said] the five participating Internet service providers will start the controversial program Monday. The ISPs — industry giants AT&T, Cablevision, Comcast, Time Warner, and Verizon — will launch their versions of the CAS on different days throughout the week. Comcast is expected to be the first, on Monday." Of course, there are many ways around the Copyright Alert System, so it probably won't be terribly effective.
eldavojohn writes "A new report from China's environment ministry has resulted in long-overdue self-realizations as well as possible explanations for 'cancer villages.' The term refers to villages (anywhere from 247 to 400 known of them) that have increased cancer rates due to pollution from nearby factories and industry. The report revealed that many harmful chemicals that are prohibited and banned in developed nations are still found in China's water and air. Prior research has shown a direct correlation between industrialization/mining and levels of poisonous heavy metals in water. As a result, an air pollution app has grown in popularity and you can see the pollution from space. China has also released a twelve-year plan for environmental protection."
Nerval's Lobster writes "Earlier this month, a very public argument erupted between Tesla Motors CEO Elon Musk and New York Times reporter John Broder, who claimed in a Feb. 8 column that his electric-powered Model S sedan had ground to a halt on a lonely stretch of Connecticut highway, starved for power. Musk retaliated by publishing the data from Broder's test drive, which suggested the reporter had driven the vehicle at faster speeds than he had claimed in the article (which would have drained the battery at a quicker rate) and failed to fully charge the car at available stations. Musk seems to have let the whole thing drop, but the whole brouhaha raises a point that perhaps deserves further exploration: the rising use of sensors in cars, and whether an automobile company—or any other entity, for that matter—has the right to take data from those sensors and use it for their own ends without the owner's permission. (For his part, Musk has claimed that Tesla only turns on data logging with 'explicit written permission from customers.') What do you think, Slashdot? Do we need the equivalent of a 'Do-Not-Track' option for cars?"
An anonymous reader writes "Michael Arrington, founder of TechCrunch, lives near Seattle and bought a boat there. He ordered it from a company based near him, but across the border in Canada. Yesterday, the company tried to deliver it to him, and it had to clear customs. An agent for the Department of Homeland Security asked him to sign a form. The form contained information about the boat, including its cost. The price was correct, but it was in U.S. dollars rather than Canadian dollars. Since the form contained legal warnings about making sure everything on it is true and accurate, Arrington suggested to the agent that they correct the error. She responded by seizing the boat. 'As in, demanded that we get off the boat, demanded the keys and took physical control of it. What struck me the most about the situation is how excited she got about seizing the boat. Like she was just itching for something like this to happen. This was a very happy day for her. ... A person with a gun and a government badge asked me to swear in writing that a lie was true today. And when I didn't do what she wanted she simply took my boat and asked me to leave.'"
Nerval's Lobster writes "The Recording Industry Association of America (RIAA) claims that Google has failed in its attempt to lower the search-results rankings of so-called 'pirate' Websites. "We have found no evidence that Google's policy has had a demonstrable impact on demoting sites with large amounts of piracy," read the report's summary (PDF). 'These sites consistently appear at the top of Google's search results for popular songs or artists.' Last August, Google indicated that it would start lowering the search-result rankings of Websites with high numbers of 'valid' copyright removal notices. 'This ranking change should help users find legitimate, quality sources of content more easily—whether it's a song previewed on NPR's music website, a TV show on Hulu or new music streamed on Spotify,' Amit Singhal, Google's senior vice president of Engineering, wrote in a corporate blog posting at the time. Google, which receives millions of copyright removal notices every month, also offers a counter-notice tool for those who believe their Websites have been unfairly targeted for copyright violations."
concealment writes "Three independent bookstores are taking Amazon and the so-called Big Six publishers (Random House, Penguin, Hachette, HarperCollins, Simon & Schuster and Macmillan) to court in an attempt to level the playing field for book retailers. If successful, the lawsuit could completely change how ebooks are sold. The class-action complaint, filed in New York on Feb 15., claims that by entering into confidential agreements with the Big Six publishers, who control approximately 60 percent of print book revenue in the U.S., Amazon has created a monopoly in the marketplace that is designed to control prices and destroy independent booksellers."
New submitter OhSoLaMeow writes with a story at The Daily Caller with unpleasant news from the Illinois state Senate, where a state senator has introduced a bill that "would require anonymous website comment posters to reveal their identities if they want to keep their comments online." From the article (warning — obnoxious ads with sound): "The bill, called the Internet Posting Removal Act, is sponsored by Illinois state Sen. Ira Silverstein. It states that a 'web site administrator upon request shall remove any comments posted on his or her web site by an anonymous poster unless the anonymous poster agrees to attach his or her name to the post and confirms that his or her IP address, legal name, and home address are accurate.'"
NewYorkCountryLawyer writes "The courts are finally starting to get it, that the subscriber to an internet access account which has been used for a copyright infringement is not necessarily the infringer. In AF Holdings v. Rogers, a case in the Southern District of California, the Chief Judge of the Court has granted a motion to dismiss the complaint for failure to state a claim where the only evidence the plaintiff has against defendant is that defendant appears to have been the subscriber to the internet access account in question. In his 7-page opinion (PDF), Chief Judge Barry Ted Moskowitz noted that 'just because an IP address is registered to an individual does not mean that he or she is guilty of infringement when that IP address is used to commit infringing activity.'"
SpaceGhost writes "The Washington Post reports that the United States Postal Service has contracted with Wahconah Group, Inc. to produce a line of USPS-branded smart clothing. Per USPS Licensing manager Steven Mills 'This agreement will put the Postal Service on the cutting edge of functional fashion... The main focus will be to produce Rain Heat & Snow apparel and accessories using technology to create 'smart apparel' — also known as wearable electronics.' USPS Spokesman Roy Betts reports that the line will be found in premium department stores and specialty stores starting in 2014. The Washington Post points out that the USPS had done a similar retail line in the 1980s sold exclusively at Post Offices, but the line was discontinued after lobbyists complained of competition with the private sector." I hope it has hidden pockets for lost letters, and a loop for the package smashing mallet.