An anonymous reader writes "The Charleston Gazette is reporting that the state of West Virginia hired a consulting firm for over $100,000 to investigate the state's use of Federal stimulus money (which included the purchase of $22,000 routers for tiny buildings). Unfortunately, the state government is now refusing a FOIA request to release the firm's report. The reason? The findings 'might be embarrassing to some people,' according to Commerce Secretary Keith Burdette."
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
Velcroman1 writes "The Children's Online Privacy Protection Act (COPPA) was enacted in 1998. In 2011, the FTC beefed up the measure, preventing sites from collecting personal information from kids such as name, location and date of birth without a parent's consent. This July, new amendments for kids under 13 will go into effect, approved by the FTC in December. The rules are targeted at sites that market specifically to kids. However, even a site like Facebook could be fined for allowing minors to post self-portraits, audio recordings of their voice, and images with geo-location data. There are also new restrictions on tracking data, with cookies or a unique identifier that follow registrants from one site to another."
Jeremy Allison - Sam writes "Ian Hickson, author and maintainer of the HTML5 specification, comments about the real reasons for DRM. They're not what you might think. Ian nails it in my opinion. He wrote, 'The purpose of DRM is not to prevent copyright violations. The purpose of DRM is to give content providers leverage against creators of playback devices. Content providers have leverage against content distributors, because distributors can't legally distribute copyrighted content without the permission of the content's creators. But if that was the only leverage content producers had, what would happen is that users would obtain their content from those content distributors, and then use third-party content playback systems to read it, letting them do so in whatever manner they wanted. ... Arguing that DRM doesn't work is, it turns out, missing the point. DRM is working really well in the video and book space. Sure, the DRM systems have all been broken, but that doesn't matter to the DRM proponents. Licensed DVD players still enforce the restrictions. Mass market providers can't create unlicensed DVD players, so they remain a black or gray market curiosity."
r5r5 writes "European Commission's Institute for Prospective Technological Studies has published a study which concludes that the impact of piracy on the legal sale of music is virtually nonexistent or even slightly positive. The study's results suggest that Internet users do not view illegal downloading as a substitute for legal digital music and that a 10% increase in clicks on illegal downloading websites leads to a 0.2% increase in clicks on legal purchase websites. Online music streaming services are found to have a somewhat larger (but still small) effect on the purchases of digital sound recordings, suggesting a complementary relationship between these two modes of music consumption. According to the results, a 10% increase in clicks on legal streaming websites leads to up to a 0.7% increase in clicks on legal digital purchase websites." It's worth noting that this study only measured the effect of piracy on online purchases, not on revenue from physical formats.
Diamonddavej writes "The Guardian warns that Bloggers in the U.K. could face costly fines for libel with exemplary damages imposed if they do not sign up with a new press regulator under legislation (Clause 21A — Awards of exemplary damages) recommended by The Leveson Inquiry into press behavior and ethics. Kirsty Hughes, the chief executive of Index on Censorship, said this a 'sad day' for British democracy. 'This will undoubtedly have a chilling effect on everyday people's web use.' Exemplary damages, imposed by a court to penalize publishers who remain outside regulation, could run into hundreds of thousands of pounds, easily enough to close down smaller publishers such as Private Eye and local newspapers. Harry Cole, who contributes to the Guido Fawkes blog says he does not want to join a regulator, he hopes his blog will remain as irreverent and rude as ever, and continue to hold public officials to account; its servers are located in the U.S. Members of Parliament voted on Clause 21A late last night, it passed 530 to 13."
langelgjm writes "In a closely-watched case, the U.S. Supreme Court today vindicated the first-sale doctrine, declaring that it "applies to copies of a copyrighted work lawfully made abroad." The case involved a Thai graduate student in the U.S. who sold cheap foreign versions of textbooks on eBay without the publisher's permission. The 6-3 decision has important implications for goods sold online and in discount stores. Justice Stephen Breyer said in his opinion (PDF) that the publisher lost any ability to control what happens to its books after their first sale abroad."
theodp writes "The Boston Globe reports that the estate of Aaron Swartz filed a motion in federal court in Boston Friday to allow the release of documents in the case that has generated national controversy over the U.S. attorney's aggressive pursuit of a stiff sentence. The Court filing (PDF) suggests that the U.S. attorney's office is still up for jerking Aaron around a little posthumously, seeking what his lawyers termed overbroad redactions, including names and titles that are already publicly known. Swartz's family also seeks the return of his seized property (PDF). Last week, Swartz's girlfriend accused MIT of dragging its feet on investigating his suicide. Meanwhile, Slate's Justin Peters asks if the Justice Department learned anything from the Aaron Swartz case, noting that Matthew Keys, who faces 25 years in prison for crimes that include aiding-and-abetting the display of humorously false content, could replace Swartz as the poster boy for prosecutorial overreach."
sarysa writes "The Supreme Court has refused to hear the latest appeal of the 7 year old Jammie Thomas case, regarding a single mother who was fined $222,000 in her most recent appeal for illegally sharing 24 songs. Those of us hoping for an Eighth Amendment battle over this issue will not be seeing it anytime soon. In spite of the harsh penalties, the journalist suggests that: 'Still, the RIAA is sensitive about how it looks if they impoverish a woman of modest means. Look for them to ask her for far less than the $222,000.'"
rcade writes "Jeff Dee and Jack Herman, the creators of the old-school super-hero roleplaying game Villains & Vigilantes, have won a copyright and trademark lawsuit over the game's publisher Scott Bizar of Fantasy Games Unlimited. Magistrate Judge Mark E. Aspey of the U.S. District Court of Arizona ruled that Jeff Dee and Jack Herman own the rights to the game based on the 1979 contract they reached with Bizar. The court also found that Bizar never had the right to sell derivative products or ebook PDF editions, which are a big deal to tabletop publishers these days. Too bad this judge didn't hear Jerry Siegel and Joe Shuster's case."
In 2010, querying a public AT&T database yielded over 114,000 email address for iPad owners who were subscribed to the carrier. One of the people who found these emails, Andrew 'weev' Auernheimer, sent them to a news site to publicize AT&T's security flaw. He later ended up in court for his actions. Auernheimer was found guilty, and today he was sentenced to 41 months in prison. 'Following his release from prison, Auernheimer will be subject to three years of supervised release. Auernheimer and co-defendant Daniel Spitler were also ordered to pay $73,000 in restitution to AT&T. (Spitler pled guilty in 2011.) The pre-sentencing report prepared by prosecutors recommended four years in federal prison for Auernheimer.' A journalist watching the sentencing said, 'I felt like I was watching a witch trial as prosecutors admitted they didn't understand computers.'
An anonymous reader writes "When cell phone unlocking became illegal last month, it set off a firestorm of debate over what rights people should have for phones they have legally purchased. But this is really just one facet of a much larger problem with property rights in general. 'Silicon permeates and powers almost everything we own. This is a property rights issue, and current copyright law gets it backwards, turning regular people — like students, researchers, and small business owners — into criminals. Fortune 500 telecom manufacturer Avaya, for example, is known for suing service companies, accusing them of violating copyright for simply using a password to log in to their phone systems. That's right: typing in a password is considered "reproducing copyrighted material." Manufacturers have systematically used copyright in this manner over the past 20 years to limit our access to information. Technology has moved too fast for copyright laws to keep pace, so corporations have been exploiting the lag to create information monopolies at our expense and for their profit. After years of extensions and so-called improvements, copyright has turned Mickey Mouse into a monster who can never die.' We need to win the fight for unlocking phones, and then keep pushing until we actually own the objects we own again."
iComp writes "A sophisticated scheme to use a casino's own security systems against it has netted scammers $33 million in a high-stakes poker game after they were able to gain a crucial advantage by seeing the opposition's cards. The team used a high-rolling accomplice from overseas who was known to spend large amounts while gambling at Australia's biggest casino, the Crown in Melbourne, according to the Herald Sun. He and his family checked into the Crown and were accommodated in one of its $30,000-a-night villas. The player then joined a private high-stakes poker game in a private suite. At the same time, an unnamed person got access to the casino's CCTV systems in the poker room and fed the information he gleaned back to the player via a wireless link. Over the course of eight hands the team fleeced the opposition to the tune of $33 million."
dstates writes "SAM (Systems for Awards Management) is a financial management system that the US government requires all contractors and grantees to use. This system has recently been rolled out to replace the older CCR system. Friday night, thousands of SAM users received the following message: 'Dear SAM user, The General Services Administration (GSA) recently has identified a security vulnerability in the System for Award Management (SAM), which is part of the cross-government Integrated Award Environment (IAE) managed by GSA. Registered SAM users with entity administrator rights and delegated entity registration rights had the ability to view any entity's registration information, including both public and non-public data at all sensitivity levels.' From March 8 to 10, any registered user who searched the system could view confidential information including account and social security numbers for any other user of the system. Oops! The Government Services Administration says that they have fixed the problem."
NewYorkCountryLawyer writes "Veoh has once again beaten the record companies; in fact it has beaten them in every round, only to have been forced out of business by the attorneys fees it expended to do so. I guess that's the record companies' strategy to do an 'end around' the clear wording of the DMCA 'safe harbor': outspend them until they fold. Back in 2009 the lower court dismissed UMG's case (PDF) on the ground that Veoh was covered by the DMCA 'safe harbor' and had complied with takedown notices. The record companies of course appealed. And they of course lost. Then, after the Viacom v. YouTube decision by the 2nd Circuit, which ruled that there were factual issues as to some of the videos, they moved for rehearing in UMG v. Veoh. Now, in a 61-page decision (PDF), the 9th Circuit has once again ruled that the statute means what it says, and rejected each and every argument the record companies made. Sadly, though, it did not award attorneys fees."
An anonymous reader writes "Bruce Schneier has written a blunt article in CNN about the state of privacy on the internet. Quoting: 'The Internet is a surveillance state. Whether we admit it to ourselves or not, and whether we like it or not, we're being tracked all the time. Google tracks us, both on its pages and on other pages it has access to. Facebook does the same; it even tracks non-Facebook users. Apple tracks us on our iPhones and iPads. One reporter used a tool called Collusion to track who was tracking him; 105 companies tracked his Internet use during one 36-hour period. ... This is ubiquitous surveillance: All of us being watched, all the time, and that data being stored forever. This is what a surveillance state looks like, and it's efficient beyond the wildest dreams of George Orwell. Sure, we can take measures to prevent this. We can limit what we search on Google from our iPhones, and instead use computer web browsers that allow us to delete cookies. We can use an alias on Facebook. We can turn our cell phones off and spend cash. But increasingly, none of it matters. There are simply too many ways to be tracked."
An anonymous reader writes "The Obama Administration has put forth a proposal to collect $2 billion over the next 10 years from revenues generated by oil and gas development to fund scientific research into clean energy technologies. The administration hopes the research would help 'protect American families from spikes in gas prices and allow us to run our cars and trucks on electricity or homegrown fuels.' In a speech at Argonne National Laboratory, Obama said the private sector couldn't afford such research, which puts the onus on government to keep it going. Of course, it'll still be difficult to get everyone on board: 'The notion of funding alternative energy research with fossil fuel revenues has been endorsed in different forms by Republican politicians, including Alaskan senator Lisa Murkowsi. But the president still faces an uphill battle passing any major energy law, given how politicized programs to promote clean energy have become in the wake of high-profile failures of government-backed companies.'"
An anonymous reader writes "ComputerWeekly reports that the U.K. government 'has, for the first time, mandated a preference for using open source software for future developments.' This comes from the newly released version of the Government Service Design Manual, which has a section about when government agencies should use open source. It says: 'Use open source software in preference to proprietary or closed source alternatives, in particular for operating systems, networking software, web servers, databases and programming languages.' The document also warns against vendor lock-in. This policy shift comes under the direction of government CTO Liam Maxwell, who said, 'In digital public services, open source software is clearly the way forward.' He added, 'We're not dogmatic about this – we'll always use the best tool for the job – but open source has major advantages for the public sector.'"
An anonymous reader writes "An article at TechCrunch bemoans the naysayers of ubiquitous video camera headsets, which seems like a near-term certainty whether it comes in the form of Google Glass or a similar product. The author points out, rightly, that surveillance cameras are already everywhere, and increasingly sophisticated government drones and satellites mean you're probably on camera more than you think already. 'But there's something about being caught on video, not by some impersonal machine but by another human being, that sticks in people's craws and makes them go irrationally berserk.' However, he also seems happy to trade privacy for security, which may not be palatable to others. He references a time he was mugged in Mexico as well as a desire to keep an eye on abuses of authority from police and others. 'If pervasive, ubiquitous networked cameras ultimately make public privacy impossible, which seems likely, then at least we can balance the scales by ensuring that we have two-way transparency between the powerful and the powerless.'"
JayRott writes "According to Ars, 'The embattled copyright trolling firm Prenda Law is seeking to contain the fallout from a looming identity theft scandal by voluntarily dismissing lawsuits filed by the shell company AF Holdings. A Minnesota man named Alan Cooper has charged that Prenda fraudulantly used his name as the CEO of AF Holdings, allegations that have attracted the attention of a California judge. Ken at the legal blog Popehat broke the news that Prenda attorney Paul Duffy has sought dismissal of at least four pending infringement cases involving the Prenda-linked shell company AF Holdings. All four dismissals occurred in the Northern District of Illinois.' I don't see how Prenda thinks this is going to make one lick of difference to an already angry Judge."
RedLeg writes "ArsTechnica reports that Brian Krebs, of KrebsOnSecurity.com, formerly of the Washington Post, recently got SWATted. For those not familiar with the term, SWATting is the practice of spoofing a call to emergency responders (911 in the U.S.) to induce an overwhelming and potentially devastating response from law enforcement and/or other first responders to the home or residence of the victim. Brian's first-person account of the incident and what he believes to be related events are chronicled here. Krebs has been prominent in the takedown of several cyber-criminal groups in the past, and has been subject to retaliation. I guess this time he poked the wrong bear."
redletterdave writes "Apple is facing a potential class action suit in San Francisco's California Northern District Court after an owner of its MacBook Pro with Retina display accused the computer company on Wednesday of 'tricking' consumers into paying for a poor-quality screen, citing an increasingly common problem that causes images to be burned into the display, also known as 'image persistence' or 'ghosting.' The lawsuit claims only LG-made screens are affected by this problem, but 'none of Apple's advertisements or representations disclose that it produces display screens that exhibit different levels of performance and quality.' Even though only one man filed the lawsuit, it can become a class action suit if others decide to join him in his claim, which might not be an issue: An Apple.com support thread for this particular problem, entitled 'MacBook Pro Retina display burn-in,' currently has more than 7,200 replies and 367,000 views across more than 500 pages."
A U.S. District Court Judge in California today ruled that so-called National Security Letters, used by government agencies to force business and organizations to turn over information on citizens, are unconstitutional. Judge Susan Illston ordered the government to stop using them, but gave the government a 90-day window to appeal the decision, during which the NSLs may still be sent out. The letters were challenged by the Electronic Frontier Foundation on behalf of a telecom who was ordered to provide data. "The telecom took the extraordinary and rare step of challenging the underlying authority of the National Security Letter, as well as the legitimacy of the gag order that came with it. Both challenges are allowed under a federal law that governs NSLs, a power greatly expanded under the Patriot Act that allows the government to get detailed information on Americans’ finances and communications without oversight from a judge. The FBI has issued hundreds of thousands of NSLs and been reprimanded for abusing them — though almost none of the requests have been challenged by the recipients. After the telecom challenged the NSL, the Justice Department took its own extraordinary measure and sued the company, arguing in court documents that the company was violating the law by challenging its authority. The move stunned the Electronic Frontier Foundation, which is representing the anonymous telecom. ... After heated negotiations with EFF, the Justice Department agreed to stay the civil suit and let the telecom’s challenge play out in court. The Justice Department subsequently filed a motion to compel in the challenge case, but has never dropped the civil suit."
An anonymous reader writes "Previous reports of a Microsoft provided backdoor to Skype has been unconfirmed. However, there are now reports that Russian federal security service FSB is able to tap call and locate users. 'FSB and the Internal Affairs Ministry (MVD) have been capable to wiretap and locate Skype users for some years already, reported Vedomosti on Thursday [Google translation of Russian original]. The newspaper is citing experts on information security. "Special services have been capable for several years not only to wiretap but also to locate a Skype user. That's why, for instance, employees of our company are forbidden to discuss business-related topics on Skype," General Director of Group-IB, Ilya Sachkov, says to Vedomosti. "After Microsoft acquired Skype in May 2011, it updated the software with technology allowing legitimate wiretapping," says Maksim Emm, Director of Peak Systems.'"
B3ryllium writes "Matthew Keys, a Reuters social media editor, is accused of deliberately encouraging Anonymous to hack his previous employer, and even gave them access credentials to do it. An indictment appears to recommend charges that could result in up to 30 years in prison and a $750,000 fine. From the article: 'He is alleged to have identified himself on an internet chat forum as a former Tribune Company employee and then provided members of Anonymous with the login and password to the Tribune Company server. The indictment alleges that Mr Keys had a conversation with the hacker who claimed credit for the defacement of the Los Angeles Times website. The hacker allegedly told him that Tribune Company system administrators had locked him out. Mr Keys allegedly tried to regain access for the hacker, and when he learned that the hacker had made changes to a page, Mr Keys is said to have responded: "Nice."'"
destinyland writes "Jacob Appelbaum, the Tor Project's main advocate, argues that Open Source software is necessary 'to both verify and improve' available cryptography. (Adding 'We also need that to ensure that everyone has a reasonable baseline — which is part of the cypherpunk ethos.') In this new interview, he's critical of a general public silence over government encroachments on privacy, but points to the current impact of the Tor network now as something that 'runs, is open and is supported by a large community spread across all walks of life.' And he ultimately identifies Tor as 'part of an ecosystem of software that helps people regain and reclaim their autonomy,' saying the distributed anonymous network 'helps to enable people to have agency of all kinds; it helps others to help each other and it helps you to help yourself.'"
An anonymous reader writes "Of the 42,000 Internet Service Providers (ISPs) surveyed, just 20 were found to be responsible for nearly half of all the spamming IP addresses — and some ISPs have more than 60% of compromised hosts, mostly in Asia. Phishing Bad Neighborhoods, on the other hand, are mostly in the U.S. Also, there is a silent ticking 'spam' bomb in BRIC countries: if India would have the same Internet penetration rate as the United States while keeping its current ratio of malicious IP addresses, we would observe 200% more spamming IP addresses worldwide. These are just few of the striking results of an extensive study from the University of Twente, in The Netherlands, which scrutinizes the Internet Bad Neighborhoods to develop next-generation algorithms and solutions to better secure networks."
Sparrowvsrevolution writes "At the Fast Software Encryption conference in Singapore earlier this week, University of Illinois at Chicago Professor Dan Bernstein presented a method for breaking TLS and SSL web encryption when it's combined with the popular stream cipher RC4 invented by Ron Rivest in 1987. Bernstein demonstrated that when the same message is encrypted enough times--about a billion--comparing the ciphertext can allow the message to be deciphered. While that sounds impractical, Bernstein argued it can be achieved with a compromised website, a malicious ad or a hijacked router." RC4 may be long in the tooth, but it remains very widely used.
judgecorp writes "The British Serious Fraud Office (SFO) is investigating whether British software firm Autonomy fiddled its accounts to inflate the price which HP paid for it to a whopping $10 billion. There's a problem though. Autonomy's Introspect software is used to trawl large data sets for information and is in use at the SFO for jobs such as this fraud investigation. It's not just ironic: the SFO says its £4.6 million contract with Autonomy could create a conflict of interest and it may have to pull out of the investigation."
hypnosec writes "The US government's National Vulnerability Database (NVD) maintained by National Institute of Standards and Technology (NIST) has been offline for a few days because of malware infestation. The public-facing site has been taken offline because traces of malware were found on two of the web servers that house it. A post on Google+ containing an email from Gail Porter details the discovery of suspicious activity and subsequent steps taken by NIST. As of this writing the NVD website is still serving a page not found message."
New submitter KrisJon writes "The Obama administration is drawing up plans to give all U.S. spy agencies full access to a massive database that contains financial data on American citizens and others who bank in the country, according to a Treasury Department document seen by Reuters. Financial institutions that operate in the United States are required by law to file reports of 'suspicious customer activity.' A move like the FinCEN proposal 'raises concerns as to whether people could find their information in a file as a potential terrorist suspect without having the appropriate predicate for that and find themselves potentially falsely accused,' said Sharon Bradford Franklin, senior counsel for the Rule of Law Program at the Constitution Project, a non-profit watchdog group."
itwbennett writes "Daiyuu Nobori, a Ph.D. student at Japan's Tsukuba University designed 'VPN Gate' to help individuals in countries that restrict Internet use circumvent government firewalls. The service, which has drawn 77,000 users since its launch last Friday, encourages members of the public to set up VPN servers and offer free connections to individual users, aiming to make the technology more accessible. Nobori had originally planned to host the service on his university's servers, but they have been down recently so he switched it to the Windows Azure cloud platform. He has spent about US$9,000 keeping it up so far."
moon_unit2 writes "In an op-ed piece over at Technology Review, Bruce Schneier says that the cyber espionage between the U.S., China, and other nations, has been rampant for the past decade. But he also worries that the media frenzy over recent attacks is fostering a new kind of Internet-nationalism and spurring a cyber arms race that has plenty of negative side-effects for the Internet and its users. From the piece: 'We don't know the capabilities of the other side, and we fear that they are more capable than we are. So we spend more, just in case. The other side, of course, does the same. That spending will result in more cyber weapons for attack and more cyber-surveillance for defense. It will result in move government control over the protocols of the Internet, and less free-market innovation over the same. At its worst, we might be about to enter an information-age Cold War: one with more than two "superpowers." Aside from this being a bad future for the Internet, this is inherently destabilizing.'"
theodp writes "When Aaron Swartz tapped into MIT's network and scooped up data from one non-profit company, the U.S. Attorney threatened him with 35 years in prison and a $1 million fine. So what kind of jail time did 38 Attorneys General threaten Google with for using its Street View cars to scoop up passwords, e-mail and other personal information by tapping into the networks of their states' unsuspecting citizens? None. In agreeing to settle the case, the NY Times reports, Google is required to police its own employees on privacy issues, lecture the public on how to fend off privacy violations like the one Google perpetrated, and forfeit about 20% of one day's net income. Given the chance, one imagines that Aaron Swartz would have happily jumped at a comparable deal." The fine being $7 million. At least EPIC isn't as cynical and thinks the outcome was positive.
A bit over a year since having their case rejected by the Swedish Supreme Court and appealing to the European Human Rights Court, it looks like basically all legal options have been exhausted for the Pirate Bay Founders: their case has been rejected. From the article: "The EHCR recognizes that the Swedish verdict interferes with the right to freedom of expression, but ruled that this was necessary to protect the rights of copyright holders. In its decision the Court also considered the fact that The Pirate Bay did not remove torrents linking to copyrighted material when they were asked to. 'The Court held that sharing, or allowing others to share files of this kind on the Internet, even copyright-protected material and for profit-making purposes, was covered by the right to "receive and impart information" under Article 10 ... However, the Court considered that the domestic courts had rightly balanced the competing interests at stake – i.e. the right of the applicants to receive and impart information and the necessity to protect copyright – when convicting the applicants and therefore rejected their application as manifestly ill-founded.'"
An anonymous reader writes "We recently discussed what appeared to be a positive response from the Obama administration on the legality of cell phone unlocking. Unfortunately, the Obama administration may not be able to do anything about it. It has already signed away our rights under a trade agreement with South Korea. Lawyer Jonathan Band, who works for the Association of Research Libraries, wrote, 'The White House position, however, may be inconsistent with the U.S. proposal in the Trans-Pacific Partnership Agreement (TPP) and existing obligations in the Korea-U.S. Free Trade Agreement (KORUS) and other free trade agreements to which the United States is a party. This demonstrates the danger of including in international agreements rigid provisions that do not accommodate technological development.'You can read more about this issue in a short eight page legal primer by Jonathan Band (PDF). An interesting, related note that the U.S.-KOREA FTA is possibly inconsistent with our domestic patent/drug law in the Hatch-Waxman Act as well. The trade agreement requires us to grant injunctions until the patent is invalidated as opposed to thirty months under current domestic law."
xclr8r writes "James Holmes representation did not enter a plea today in with regards to the Aurora, Co. Movie theater shooting so the Judge entered a plea of not guilty for James that could be changed at a later date by Holmes' attorney. The judge entered an advisory that if the plea was changed to Not Guilty by insanity that Holmes would be subject to a 'narcoanalytic interview' with the possibility of medically appropriate substances could be used e.g. so called truth serums. Holmes defense looks to have initially objected to this but as the previous article seems to infer that some compromises are being worked out. This certainly raises legal questions on how this is being played out 5th, 14th amendments. The legal expert in the second article states this is legal under Co. law but admits there's not a huge amount of cases regarding this. I was only able to find Harper v State where a defendant willingly underwent truth serum and wanted to submit the interview on his behalf but was rejected due to the judge not recognizing sufficient scientific basis to admit the evidence."
An anonymous reader writes "The European Parliament passed a proposal Tuesday which included a blanket ban on pornography, including Internet porn, in European Union member states. However, Members of European Parliament (MEPs) removed explanatory wording from the porn ban section, essentially limiting the ban to advertising and print media. The proposal, titled 'Eliminating gender stereotypes in the EU,' was put to a vote in Strasbourg. MEPs passed it 368-159."
jfruh writes "Skype made a name for itself by largely bypassing the infrastucture — and the costs, and the regulations — of the legacy telecommunications industry. But now the French telecom regulator wants to change that, at least in France. At issue is not the service's VoIP offering, but rather the Skype Out service that allows users to dial phones on traditional networks. Regulators say that this service necessitates that Skype face the same regulations as other telecoms."
adeelarshad82 writes "The SimCity launch debacle is only the latest in an increasingly frustrating string of affronts to gamers' rights as customers. Before SimCity, we had Ubisoft's always-on DRM (that the company only ended quietly after massive outcry from gamers). We had the forced online and similarly unplayable launch of Diablo III. We had games like Asura's Wrath and Final Fantasy: All the Bravest that required you to pay more money just to complete them after you purchase them. And let us never forget the utter infamy of StarForce, SecuROM, and Sony's copy protection, which installed rootkits on computers without users' knowledge. As one recently published article argues, maybe it's time for gamers to demand adoption of a Bill of Rights."
New submitter trickymyth writes "For the first time, the United States has mentioned the People's Republic of China in relation to cyber crime, officially acknowledging what has been long suspected by private security experts and the U.S. business community. The Obama Administration seeks to get the Chinese government to acknowledge the problem, to cease any state-sponsored hacker activity, and to start a dialogue on normative behavior on the internet. This announcement follows the recent 60-page report from the American cybersecurity firm Mandiant, who spent two years compiling evidence against the so-called 'Comment Crew.' They traced IP addresses, common behavior, and tools to track the group's activity, which led to a Shanghai neighborhood home to the People's Liberation Army (PLA's) Unit 61398. This tracking came at the behest of the Times, who has experienced some trouble with hacking in the past. The Chinese government rejected the report as 'unprofessional' and 'lacking technical evidence.' This announcement also comes amid a delicate leadership transition in China and numerous new reports on the vulnerability of U.S. business and government networks to attack."
www.muckrock.com/about/. And that is exactly what MuckRock is all about: Making FOIA (Freedom of Information Act) requests for you (and investigative reporters) so you don't have to deal with the often-daunting paperwork and runarounds you may run into when you try to pry information out of a recalcitrant government agency. In theory, most government information is public. In practice, many local, state and federal government bodies would just as soon never tell you anything. This is why Tim Lord talked with MuckRock co-founder Michael Morisy, and why we're running this interview in the middle of Sunshine Week, which exists "...to educate the public about the importance of open government and the dangers of excessive and unnecessary secrecy."
New submitter jader3rd writes "Intrade, a popular Irish website that lets people bet on anything, has shut down. In addition to being used by gamblers, Intrade has been used by academics and pundits to track public sentiment. '"... broad crowds have a lot of information and that markets are an effective way of aggregating that information," says Justin Wolfers, "and they often turn out to be much better than experts."' Being forced to lose their U.S. customers couldn't have helped.
An anonymous reader writes "Canipre, a Montreal-based intellectual property rights enforcement firm, has admitted that it is behind the Voltage file sharing lawsuits involving TekSavvy in what is described as a 'speculative invoicing' scheme. Often referred to as copyright trolling, speculative invoicing involves sending hundreds or thousands of demand letters alleging copyright infringement and seeking thousands of dollars in compensation. Those cases rarely — if ever — go to court as the intent is simply to scare enough people into settling in order to generate a profit. The Canipre admission is important because it is consistent with arguments that the case involves copyright trolling and that the Canadian Federal Court should not support the scheme by ordering the disclosure of subscriber contact information."
Sparrowvsrevolution writes that at this year's SXSW, Defense Distributed founder Code Wilson has announced a for-profit spinoff of his gun-printing project, from which people will be able to search for and download gun-related CAD files. "Though the search engine will index all types of files, Wilson says he hopes the group's reputation for hosting politically incendiary content will mean users trust that it won't censor search results. 'When we say you should have access to these files, people believe we mean that,' says Wilson. 'No takedowns. No removals. We'd fight everything to the full extent of the law.' Along with the SXSW announcement, Wilson also released a provocative video where he lays out the plan for Defcad.com and criticizes gun control advocates and 'collusive' 3D printing companies like Makerbot."
New submitter minstrelmike points outs a two-page editorial in the NYTimes "about what would have been different legally, morally, and security-wise," had the military information released through WikiLeaks been published by the Times instead. "'If Manning had delivered his material to The Times, WikiLeaks would not have been able to post the unedited cables, as it ultimately did, heedless of the risk to human rights advocates, dissidents and informants named therein. In fact, you might not have heard of WikiLeaks. The group has had other middling scoops, but Manning put it on the map.' The writers also discusses what the Times would and would not have done, admitting they probably wouldn't have shared with other news outlets, but also admitting they would definitely have not shared everything."
eldavojohn writes "Reporters without Borders has released a report on governments and the companies they employ to spy on their own citizens online. Syria and China were singled out as the worst with Iran, Bahrain and Vietnam not far behind. In addition, RSF named names when it came to the corporate entities (a market worth 5 billion dollars) that provided specific services to these oppressive governments: Gamma, Trovicor, Hacking Team, Amesys and Blue Coat. The report is aptly titled 'Enemies of the Internet' and, though lengthy, provides a detailed examination in the destruction of online rights as well as very specific attacks each government employs. RSF also noted the many attempted solutions to these problems and a link to their online survival kit."
NewYorkCountryLawyer writes "The Electronic Frontier Foundation has entered the fray to defend the bloggers sued by Prenda Law Firm. Prenda, oblivious to such well known legal niceties as the Federal Rules of Civil Procedure, the affirmative defense of truth, the difference between a defamatory statement of fact and the expression of a negative opinion, and the First Amendment, has immediately — and illegally — sought to subpoena information leading to the identities of the bloggers. I would not be surprised to see these "lawyers" get into even more hot water than they're already in. And I take my hat off to the EFF for stepping in here."
Hugh Pickens writes writes "Not that there's anything wrong with that — as the Guardian reports that Facebook users are unwittingly revealing their sexual orientation, drug use and political beliefs– using only public 'like' updates. A study of 58,000 Facebook users in the US found that sensitive personal characteristics about people can be accurately inferred from information in the public domain. Researchers were able to accurately infer a Facebook user's race, IQ, sexuality, substance use, personality or political views (PDF) using only a record of the subjects and items they had 'liked' on Facebook – even if users had chosen not to reveal that information. 'It is good that people's behavior is predictable because it means Facebook can suggest very good stories on your news feed,' says Michal Kosinski, 'But what is shocking is that you can use the same data to predict your political views or your sexual orientation. This is something most people don't realize you can do.' For example, researchers were able to predict whether men were homosexual with 88% accuracy by their likes of Facebook pages such as 'Human Rights Campaign' and 'Wicked the Musical' – even if those users had not explicitly shared their sexuality on the site. According to the study other personality traits linked to predictive likes include for High IQ — 'The Godfather,' 'Lord of the Rings,' 'The Daily Show'; for Low IQ — 'Harley Davidson,' 'I Love Being A Mom,' 'Tyler Perry'; and for male heterosexuality — 'Wu Tang Clan,' 'Shaq,' and 'Being Confused after Waking Up from Naps.' Facebook's default privacy settings mean that your 'likes' are public to anyone and Facebook's own algorithms already use these likes to dictate what stories end up in users' news feeds, while advertisers can access them to determine which are the most effective ads to show you as you browse."
kenekaplan writes "Sensor technology and data analytics are becoming foundations of urban planning. Herman D'Hooge, Intel engineer and University of Oregon Instructor, says that so-called smart cities aren't merely defined by optimized energy or transportation systems. 'The analytics behind them have become more sophisticated so you can make sense out of sensor data,' he said. 'If we start mixing data from the transportation system with data from the building system and the schools system and start meshing that data together, we may start seeing efficiencies and opportunity that weren’t visible within each of those silos'"
quantr writes in with a story about backlash to Amazon's request for ownership of new top-level domain names. "Large and small companies are vying for control of an array of new Internet domain names, but Amazon.com Inc.'s plans are coming under particular scrutiny. Two publishing industry groups, the Authors Guild and the Association of American Publishers, are objecting to the online retailer's request for ownership of new top-level domain names that are part of a long-awaited expansion of the Web's addressing scheme. They argue that giving Amazon control over such addresses—which include '.book,' '.author' and '.read'—would be a threat to competition and shouldn't be allowed. 'Placing such generic domains in private hands is plainly anti-competitive,' wrote Scott Turow, Authors Guild president, to the Internet Corporation for Assigned Names and Numbers, or ICANN, the nonprofit that oversees the world's Internet domain names. 'The potential for abuse seems limitless.'"