wiredmikey writes "A new report from the Pentagon marked the most explicit statement yet from the United States that it believes China's cyber espionage is focused on the U.S. government, as well as American corporations. China kept up a steady campaign of hacking in 2012 that included attempts to target U.S. government computer networks, which could provide Beijing a better insight into America's policy deliberations and military capabilities, according to the Pentagon's annual assessment of China's military. 'China is using its computer network exploitation capability to support intelligence collection against the U.S. diplomatic, economic, and defense industrial base sectors that support U.S. national defense programs,' said the report to Congress (PDF). The digital espionage was part of a broader industrial espionage effort that seeks to secure military-related U.S. and Western technology, allowing Beijing to scale back its reliance on foreign arms manufacturers, the report said. One day later, Beijing dismissed the Pentagon's report that accused it of widespread cyberspying on the U.S. government, rejecting it as an 'irresponsible' attempt to drum up fear of China as a military threat."
Have you META-MODERATED today? Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. ×
SternisheFan writes with an excerpt from Ars Technica: "Attacks exploiting a previously unknown and currently unpatched vulnerability in Microsoft's Internet Explorer browser have spread to at least nine other websites, including those run by a big European company operating in the aerospace, defense, and security industries as well as non-profit groups and institutes, security researchers said. The revelation, from a blog post published Sunday by security firm AlienVault, means an attack campaign that surreptitiously installed malware on the computers of federal government workers involved in nuclear weapons research was broader and more ambitious than previously thought. Earlier reports identified only a website belonging to the US Department of Labor as redirecting to servers that exploited the zero-day remote-code vulnerability in IE version 8. ... 'The specific Department of Labor website that was compromised provides information on a compensation program for energy workers who were exposed to uranium,' CrowdStrike said. 'Likely targets of interest for this site include energy-related US government entities, energy companies, and possibly companies in the extractive sector. Based on the other compromised sites other targeted entities are likely to include those interested in labor, international health and political issues, as well as entities in the defense sector.'"
SternisheFan tipped us to news that the infamous copyright trolls Prenda Law are in a bit of trouble with the law. Today, U.S. District Court judge Otis Wright issued sanctions against Prenda. He recommends that the lawyers involved be disbarred and fined, granted court and lawyer fees to the defendants (doubled for punishment), and has referred them for criminal prosecution. Among the findings of fact are that they set up dozens of shell companies to disguise the true owners, actually committed identity theft, dodged taxes on settlement money, lied to the court, and abused the court by setting settlements on flimsy charges just below the cost of a defense.
On Friday, we mentioned that Defense Distributed had created a (near-enough-to) fully 3-D printed pistol. Sparrowvsrevolution now writes that "Last week, the Liberator was fired for the first time at a firing range and successfully shot a .380 caliber bullet using a remote firing setup. Over the weekend, Defense Distributed's founder, the anarchist and radical libertarian Cody Wilson, was bold enough to try firing it by hand. The results of that test, witnessed by a reporter, indicate that the era of the 3D-printed firearm may be upon us, for better or for worse." Predictably, certain politicians are — so to speak — up in arms about it.
An anonymous reader writes "A Methusen, Mass. high schooler, who goes by the rapper name 'Cammy Dee' has been arrested after posting lyrics that police felt were 'communicating terrorist threats.' This wouldn't be the first time rap lyrics were investigated, but if formally charged for 'communicating terrorist threats' this would a set a chilling low bar for terrorist investigations."
New submitter davesays writes "CNN anchors Erin Burnett and Carol Costello have interviewed Former FBI Counterterrorisim specialist Tim Clemente. In the interviews he asserts that all digital communications are recorded and stored. Clemente: 'No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not.' 'All of that stuff' — meaning every telephone conversation Americans have with one another on U.S. soil, with or without a search warrant — 'is being captured as we speak.' 'No digital communication is secure,' by which he means not that any communication is susceptible to government interception as it happens (although that is true), but far beyond that: all digital communications — meaning telephone calls, emails, online chats and the like — are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is."
dryriver writes "Dear Slashdotters, We are a two man crew who have spent almost three years developing a video processing algorithm that 'upgrades' the visual quality of digital video footage. We take video footage that is "of average quality" — think an amateur shooting on a cheap digital camcorder or on a smartphone camera — and use various mathematical tricks we have developed to make the footage look better — optically sharper, better lit, more vivid colours, improved contrast, enhanced sense of three-dimensionality and of 'being-there realism.' In about a month, we will be presenting our algorithm to some venture capitalists. We have the obligatory before-and-after video demos prepared for this, of course. But there will also be a short PowerPoint presentation where we explain our tech in some detail. Now here is our main question: What, in your opinion, should we — or indeed should we NOT — put in the PowerPoint presentation to impress a Venture Capitalist? Should we talk about how we developed the algorithm at all — what kind of R&D and testing was involved? Should we try to walk the VCs through how our algorithm works under the hood — simplified a bit for a 'non-engineer' audience of course? Or should we stick to talking about market potential, marketing strategy & money-related stuff only? If you were in our shoes — presenting a digital video-quality improvement technology to professional VCs — what would and would you not put in your PowerPoint? Any advice on this from Slashdotters with some experience would be most welcome!"
theodp writes "E-mails and other communications between employees,' explains Google in a newly-published patent application for its Policy Violation Checker invention, 'can implicate potential violations of company policy or local, state or federal law that can go unchecked by attorneys or other legal personnel.' So how can you avoid those embarrassing Goldman Sachs and Enron e-mail gaffes? Use Google's 'methods and systems for identifying problematic phrases in an electronic document'! From the patent application: 'Documents may be used as evidence in court, administrative, or other proceedings. It is in a company's best interest to minimize or eliminate policy violations and/or situations that could give rise to legal liability. It is also often in a company's best interest to be able to Pack [?] these situations. Problematic phrases include, but are not limited to, phrases that present policy violations, have legal implications, or are otherwise troublesome to a company, business, or individual.' So, if you can't Do-No-Evil, at least you can Do-No-Discoverable-Evil!"
Why does a car rated for 47mpg fall so far short? The Houston Chronicle features an article on just why EPA gas estimates can be so different from real-world drivers' experience at the pump (or in looking at the dashboard display), in particular for hybrid cars. From the article: "A geometric average of the FTP-75 and HFET results (with city driving weighted at 55 percent and highway driving weighted at 45 percent) produces a vehicle's CAFE fuel economy, which is then incorporated into a manufacturer's corporate average. CAFE is measured using these tests to the present day. In fact, this methodology will be 50 years old when it's used to gauge compliance with the forthcoming 54.5-mpg CAFE requirements in 2025. That kind of continuity is admirable in baseball, but not in transportation. These tests are irrelevant to contemporary real-world driving. For example, the maximum acceleration on either test is 3.3 mph per second. At that rate, it takes more than 18 seconds to hit 60 mph. Even in the horsepower-deprived 1970s, most people were driving harder than that. And the 60-mph maximum speed on the highway test does not accord with the 75-mph truth of today's interstate traffic."
freddienumber13 writes "The CCTV cameras operated by the local government in the country town of Nowra, NSW (Australia) have been turned off following an order by the Administrative Decisions Tribunal. The local government is crying because it believes that it is losing an effective method in combating crime in public. Locals however are rejoicing that they are no longer being recorded whilst walking down the street."
Techdirt explains the strange story of a lawsuit-happy bus company in Illinois which managed to tick off a cadre of determined redditors by calling them uncomplimentary names in the reddit forums. This all started when a bus passenger, Jeremy Leval, reported unsavory behavior by a company employee (telling an exchange student "If you don't understand English, you don't belong at the University of Illinois or any 'American' University.") and said so online. Besides the name calling on reddit, the bus company threatened the forum moderator with libel charges, and over insults posted by the bus company employees which the moderator had deleted. Further, company owner "[Dennis] Toeppen threatened to sue Leval, saying, 'The attorneys for Suburban Express are reviewing this incident with a view towards filing the appropriate legal action against this meddlesome MBA student.'" Attorney Ken White of Popehat got involved, though, and asked with good effect whether the company had fully considered the Streisand Effect. The strangest part? Toeppen's former involvement as a domain squatter.
puddingebola writes with a New York Times article about how mundane PC equipment — not just more esoteric and eyebrow-raising network monitoring equipment from Blue Coat — makes its way to Syria: "Large amounts of computer equipment from Dell have been sold to the Syrian government through a Dubai-based distributor despite strict trade sanctions intended to ban the selling of technology to the regime, according to documents obtained by The New York Times. The disclosure of the computer sales is the latest example of how the Syrian government has managed to acquire technology, some of which is used to censor Internet activity and track opponents of the Syrian president, Bashar al-Assad."
Jeremiah Cornelius writes "Bruce Schneier, security expert (and rational voice in the wilderness), explains in an editorial on CNN why 'Connecting the Dots' is a 'Hindsight Bias.' In heeding calls to increase the amount of surveillance data gathered and shared, agencies like the FBI have impaired their ability to discover actual threats, while guaranteeing erosion of personal and civil freedom. 'Piling more data onto the mix makes it harder, not easier. The best way to think of it is a needle-in-a-haystack problem; the last thing you want to do is increase the amount of hay you have to search through. The television show Person of Interest is fiction, not fact.'"
hypnosec writes "U.S. officials have told the Indian Government that they will not be able to serve summons to the executives of companies like Google and Facebook because they are not convinced that the content hosted on these sites can cause violence and that these summons impact 'free speech principles.' The reply comes as a response to India's request to the US to help serve papers to 11 Internet companies accused of hosting content on their sites that was meant to fuel communal hatred and violence. The U.S. authorities said that there are limitations when it comes to protection on free speech — when the speech comprises a true threat or provokes imminent violence — but in this particular case there is not sufficient evidence of either of these."
A year ago today, we noted that Sen. Rand Paul of Kentucky called for the abolition of the Transportation Security Administration. It's now nearly 12 years since the hijacked-plane terror attacks of 2001; the TSA was created barely two months later, and has been (with various rules, procedures, and equipment, all of it controversial for reasons of privacy, safety, and efficacy) a major presence ever since at American commercial airports. "The American people shouldn't be subjected to harassment, groping, and other public humiliation simply to board an airplane," wrote Paul last year, and in June of 2012, he followed up by introducing two bills on the topic; the first calling for a "bill of rights" for air travelers, the other for privatizing airport screening practices. Neither bill went far. Should they have? Libertarian-leaning Paul did not succeed in knocking back the TSA, never mind privatizing its functions (currently funded at nearly $8 billion annually), though some of the things called for in his bill of rights are manifest now at least in muted form. (Very young passengers, as well as elderly passengers, face less stringent security requirements, for instance, and TSA has ended its prohibition of certain items aboard planes.) Whether you're from the U.S. or not, what practical changes would you like to see implemented? What shouldn't be on the bill of rights for airplane passengers?
First time accepted submitter carlypage3 writes "Benefits claimants in the UK are being forced to use Microsoft's now obsolete Windows XP and Internet Explorer 6 software. The Department of Work and Pensions (DWP) states that its online forms are not compatible with Internet Explorer 7, 8, 9 and 10, Safari, Google Chrome or Firefox. As if that wasn't unnerving enough, the Gov.UK website says that users cannot submit claims using Mac OS X or Linux operating systems, either." (Note: as we noted not long ago, it's not just the DWP that's stuck using IE6.)
nk497 writes "Dutch police are set to get the power to hack people's computers or install spyware as part of investigations — but antivirus experts say they won't help police reach their targets. Mikko Hypponen, chief research officer at F-Secure, said the Dutch bill could lead to antivirus firms being asked asked to cooperate with authorities to let an attack reach the target. So far, Hypponen hasn't seen a single antivirus vendor cooperate with such a request, and said his own firm wouldn't want to take part. Purely for business reasons, it doesn't make sense to fail to protect customers and let malware through 'regardless of the source.'"
hypnosec writes "Google has indirectly walked right into one of the Middle East's most obstinate conflicts by labeling Palestine as an independent nation — wiping off the term 'Palestinian Territories' and replacing it with 'Palestine' in its localized search page. Google's move is more or less in line with the UN's October decision to name Palestine as a non-member observer state. The status given to Palestine will allow the state to join UN debates as well as global bodies such as the International Criminal Court, in theory at least. Up until May 1, anyone visiting http://www.google.ps were shown the phrase Palestinian Territories. This change is definitely not a huge one but, it has attracted criticism from politicians in Israel."
rjupstate writes "The Pentagon is quickly moving to approve the latest devices and platforms from BlackBerry, Samsung, and Apple. That's good news for two of those companies. It's not-so-good news for BlackBerry. 'The Pentagon currently has about 600,000 smartphone users – almost all using BlackBerrys – but ultimately aims to have as many as 8m smartphones and tablets, under the terms of a scheme made public last November.' 'In its effort to expand into the high security government niche, one that BlackBerry has enjoyed near singular control of for years, Samsung recently created a government advisory board made up of Samsung executives and security experts from various U.S. and foreign government security agencies. ... In the end, the program will likely elevate that status of both Apple and Samsung within military and civilian government agencies in the U.S. and other western countries.'"
An anonymous reader writes "In a case stemming from a Jacksonville burglary, the Florida Supreme Court ruled 5-2 Thursday that police must get a search warrant before searching someone's cell phone. 'At this time, we cannot ignore that a significant portion of our population relies upon cell phones for email communications, text message information, scheduling, and banking,' read the majority opinion (PDF), authored by Justice Fred Lewis. 'The position of the dissent, which would permit the search here even though no issue existed with regard to officer safety or evidence preservation, is both contrary to, and the antithesis of, the fundamental protections against government intrusion guaranteed by the Fourth Amendment.'"
Krazy Kanuck sends this quote from the BBC: "Warner Bros is being sued for the alleged unauthorized use of two cats that have achieved internet fame. ... The complaint alleged that the cats were used without permission in Scribblenauts, a series of games on the Nintendo DS and other platforms. Court documents alleged that Warner Bros and 5th Cell 'knowingly and intentionally infringed' both claimant's ownership rights. 'Compounding their infringements,' court papers (PDF) said, 'defendants have used "Nyan Cat" (designed by Christopher Torres) and "Keyboard Cat" (created in 1984 by Charles Schmidt), even identifying them by name, to promote and market their games, all without plaintiffs' permission and without any compensation to plaintiffs.' "
jrepin writes "Digital restrictions management (DRM) creates damaged goods that users cannot control or use freely. It requires users to give-up control of their computers and restricts access to digital data and media. Device manufacturers and corporate copyrights holders have already been massively infecting their products with user-hostile DRM. Tablets, mobile phones and other minicomputers are sold with numerous restrictions embedded that cripple users freedom. The proposal at table in W3C to put DRM into HTML goes even further. Fight it: use today's today is international Day Against DRM, so spread the word and make yourself heard!" The EFF suggests making every day a day against DRM.
An anonymous reader writes "The Dutch government today presented a draft bill that aims to give law enforcement the power to hack into computer systems — including those located in foreign countries — to do research, gather and copy evidence or block access to certain data. Law enforcement should be allowed to block access to child pornography, read emails that contain information exchanged between criminals and also be able to place taps on communication, according to a draft bill published Thursday and signed by Ivo Opstelten, the Minister of Security and Justice. Government agents should also be able to engage in activities such as turning on a suspect's phone GPS to track their location, the bill said. Opstelten announced last October he was planning to craft this bill."
mikejuk writes with news of an advancement for homomorphic encryption and open source: "To be fully homomorphic the code has to be such that a third party can add and multiply numbers that it contains without needing to decrypt it. In other words they can change the data by working with just the encrypted version. This may sound like magic but a fully homomorphic scheme was invented in 2009 by Craig Gentry. This was a step in the right direction but the problem was that it is very inefficient and computationally intensive. Since then there have been a number of improvements that make the scheme practical in the right situations Now Victor Shoup and Shai Halevi of the IBM T J Watson Research Center have released an open source (GPL) C++ library, HElib, as a Github project. The code is said to incorporate many optimizations to make the encryption run faster. Homomorphic encryption has the potential to revolutionize security by allowing operations on data without the need to decrypt it."
Nerval's Lobster writes "In March, the U.S. Department of Commerce's Bureau of Industry and Security added T-Platforms' businesses in Germany, Russia and Taiwan to the 'Entity List,' which includes those believed to be acting contrary to the national security or foreign policy interests of the United States. Commerce felt, according to the notice, that T-Platforms may be illegally assisting the Russian military and/or its nuclear program. In the meantime, Russian president Vladimir Putin has reportedly weighed in on the T-Platforms question. 'That's right. The use of political levers for unfair competition,' Putin said, according to RBTH.ru. 'Our European colleagues are independent people and they claim they want to work with us in certain spheres, yet they act as though they are absolutely dependent and unable to make their own decision. Is that so?' It's odd that Putin was quoted talking about 'European colleagues' when the Americans were responsible for cutting T-Platforms off."
First time accepted submitter ruhri writes "A 16 year-old girl in Florida not only has been expelled from her high school but also is being charged as an adult with a felony after replicating the classic toilet-bowl cleaner and aluminum foil experiment. This has quite a number of scientists and science educators up in arms. The fact that she's African American and that the same assistant state attorney has decided not to charge a white teenager who accidentally killed his brother with a BB gun has some thinking whether this is a case of doing science while black."
DavidGilbert99 writes "Last November Matt Brittin, Google's European chief gave a pretty convincing account of himself as he tried to explain why Google wasn't paying more tax in the UK. All the sales staff were based in Ireland apparently and the UK-based staff were there just to promote the platform for advertisers. Great. Nothing to see here. Move on please. Well, actually there is a little more to the story, as an investigation by Reuters has discovered. There are many sales staff in the UK with titles and responsibilities curiously close to what most people would call sales staff and as a result Mr. Brittin will once again have to face Margaret Hodge and the PAC to explain just what is happening."
Nate the greatest writes "Remember last year when Apple received a patent on the faux page curl in iBooks? Lots of people laughed at the idea that Apple could patent the page turn, but not Samsung. The gadget maker has just filed for their own page turn patent. The paperwork explains in great detail what the page turn looks like, how the software would work, and what on screen gestures could be used to turn the page."
mask.of.sanity writes "Australia's plans for a data breach notification scheme have been revealed which will force organizations to report serious breaches to affected victims. The plans, which are still in a draft form, show that the country's privacy commissioner could force businesses to inform press if the breaches are bad enough, pursue fines of up to $1.7 million for organizations that are repeatedly breached and force businesses to adopt stronger security controls."
JoeyRox writes "Over the course of playing $12 million worth of video poker, Las Vegas resident John Kane stumbled onto a firmware bug in IGT's 'Game King' machines that allowed him to cash out for 10x the amount of his winnings. John and his friends took advantage of the vulnerability to the tune of $429,945. John's friend was arrested by U.S. marshals and charged with violation of the Computer Fraud and Abuse Act, but a federal magistrate ruled that the law doesn't apply and recommended dismissal. The case is currently being argued in a U.S. District Court."
An anonymous reader writes with this tidbit from PC World about Sabam's latest demand for copyright levies: "Sabam, the Belgian association of authors, composers and publishers, has sued the country's three biggest ISPs, saying that they should be paying copyright levies for offering access to copyright protected materials online. Sabam wants the court to rule that Internet access providers Belgacom, Telenet and Voo should pay 3.4 percent of their turnover in copyright fees, because they profit from offering high speed Internet connections that give users easy access to copyright protected materials, the collecting organization said in a news release Tuesday." Sabam has previously demanded money from truckers for listening to the radio, and wanted to charge libraries royalties for reading to children.
An anonymous reader writes with bad news for operators of SIP gateways. From the article: "VoIP-to-PSTN termination providers and SIP vendors will be watching their inboxes for a lawyer's letter from BT, which has kicked off a licensing program levying a fee on the industry, based on a list of 99 patents .. The British incumbent is offering to allow third parties to use the Session Initiation Protocol under a license agreement... BT is requesting either $US50,000 or a combination of 0.3 percent of future revenue from affected products, plus 0.3 percent of the last six months' sales for products as 'past damages.' It's kindly offering a discount for customers that pay up within six weeks of receiving a BT letter of demand, and there's a premium to $US60,000 and 0.36 percent of revenue for those who hold out."
tdog17 writes "Verizon and MySpace scored a zero out of a possible six stars in a test of how far 18 technology service providers will go to protect user data from government data demands. Twitter and Internet service provider Sonic.net scored a perfect six in the third annual Electronic Frontier Foundation 'Who Has Your Back?' report. Apple, AT&T and Yahoo ranked near the bottom, each scoring just one star. 'While we are pleased by the strides these companies have made over the past couple years, there’s plenty of room for improvement. Amazon holds huge quantities of information as part of its cloud computing services and retail operations, yet does not promise to inform users when their data is sought by the government, produce annual transparency reports, or publish a law enforcement guide. Facebook has yet to publish a transparency report. Yahoo! has a public record of standing up for user privacy in courts, but it hasn't earned recognition in any of our other categories. Apple and AT&T are members of the Digital Due Process coalition, but don’t observe any of the other best practices we’re measuring. ... We remain disappointed by the overall poor showing of ISPs like AT&T and Verizon in our best practice categories.'"
New submitter coolnumbr12 writes "For the second time in a week, The Pirate Bay has found a new home for its popular torrent website. A complaint issued Tuesday by Swedish prosecutors threated the Icelandic domain, forcing the file-sharing pirates to take harbor in the Caribbean island of Sint Maarten with a new .sx domain name. 'Control of the island, which has just 78,000 residents, is split between France and the Netherlands. Around 41,000 live on the Dutch side and 37,000 on the French. ... Even if the court grants the prosecutor’s request it remains to be seen how effective any seizures will be. Time and again the BitTorrent site has responded by relocating to new domains.'"
symbolset writes "The Wall Street Journal and others are reporting that longtime telecomm lobbyist Tom Wheeler will be nominated to head the Federal Communications Commission. According to the LA Times: 'Wheeler is a former president of the National Cable Television Assn. and the Cellular Telecommunications and Internet Assn. Despite his close ties to industries he will soon regulate, some media watchdogs are willing to give him the benefit of the doubt. "As someone who has known Tom for years, I believe that he will be an independent, proactive chairman," said Gigi B. Sohn, president and chief executive of Public Knowledge, adding that she has "no doubt that Tom will have an open door and an open mind, and that ultimately his decisions will be based on what he genuinely believes is best for the public interest, not any particular industry."'"
v3rgEz writes "The Supreme Court ruled Monday morning that states have the right to restrict public records access to locals, meaning one more hurdle to would-be muckrakers everywhere. Even in-state requesters are harmed: It means one more bureaucratic hurdle and another excuse for agencies to respond in paper rather than electronically. MuckRock has helped file requests in all 50 states — important for projects like the Drone Census — and we're looking for more volunteers to help ensure transparency from sea to shining sea. States impacted: Alabama; Arkansas; Delaware; Georgia; New Hampshire; New Jersey; Tennessee; and Virginia. If you live in one of the above, fill out a simple form and we can help ensure that sunshine isn't restricted depending on where you live."
sl4shd0rk writes "Remember SOPA? If not, perhaps the name Lamar Smith will ring a bell. The U.S. House Committee on Science, Space and Technology chose Smith to Chair as an overseer for the National Science Foundation's funding process. Smith is preparing a bill (PDF) which will require that every grant must benefit 'national defense,' be of 'utmost importance to society,' and not be 'duplicative of other research.' Duplicating research seems reasonable until you consider that this could also mean the NSF will not provide funding for research once someone has already provided results — manufactured or otherwise. A strange target since there is a process in place which makes an effort to limit duplicate funding already. The first and second requirements, even when read in context, still miss the point of basic research. If we were absolutely without-a-doubt-certain of the results, there would be little point in doing the research in the first place."
An anonymous reader writes "German IT magazine Heise reports (original in German) that the Ministry of Education in Schwerin had a Conficker virus infection on 170 machines, that was dealt with by simply throwing them on the trash. Other German authorities have now decided that 'the approach taken is not up to the principle of efficiency and economy' and that the 187,300 Euro invested in this radical form of virus removal were inappropriate. The ministry had earlier estimated the cost of cleaning their desktops and servers by more conventional means to 130,000 Euro."
jrepin writes "The government of Spain's autonomous region of Extremadura has begun the switch to open source of it desktop PCs. The government expects the majority of its 40,000 PCs to be migrated this year, the region's CIO Theodomir Cayetano announced on 18 April. Extremadura estimates that the move to open source will help save 30 million euro per year. Extremadura in 2012 completed the inventory of all the software applications and computers used by its civil servants. It also tailored a Linux distribution, Sysgobex, to meet the majority of requirements of government tasks. It has already migrated to open source some 150 PCs at several ministries, including those for Development, Culture and Employment."
Jeremiah Cornelius writes with what looks to be part of CISPA III: Children of CISPA. From the article: "A government task force is preparing legislation that would pressure companies such as Facebook and Google to enable law enforcement officials to intercept online communications as they occur. ... 'The importance to us is pretty clear,' says Andrew Weissmann, the FBI's general counsel. 'We don't have the ability to go to court and say, "We need a court order to effectuate the intercept." Other countries have that.' Under the draft proposal, a court could levy a series of escalating fines, starting at tens of thousands of dollars, on firms that fail to comply with wiretap orders, according to persons who spoke on the condition of anonymity to discuss internal deliberations. 'This proposal is a non-starter that would drive innovators overseas and cost American jobs,' said Greg Nojeim, a senior counsel at the Center for Democracy and Technology. 'They might as well call it the Cyber Insecurity and Anti-Employment Act.'"
kodiaktau writes "The UK govt passed the Enterprise and Regulatory Reform Act which effectively makes so-called 'orphaned' content posted on social media sites public domain. Corporations now only need to have made a "diligent search" to find the owner of the content before use. From the article: 'The Act contains changes to UK copyright law which permit the commercial exploitation of images where information identifying the owner is missing, so-called "orphan works", by placing the work into what's known as "extended collective licensing" schemes. Since most digital images on the internet today are orphans - the metadata is missing or has been stripped by a large organization - millions of photographs and illustrations are swept into such schemes.'"
John Wagger writes "When Greenheart Games released their very first game, Game Dev Tycoon (for Mac, Windows and Linux) yesterday, they did something unusual and as far as I know unique. They released a cracked version of the game, minutes after opening their Store. The pirated copy was completely same as the real copy, except that after a few hours into the game, players started noticing widespread piracy of their games in the game development simulator."
bizwriter writes "Nobody would ever say that the world of patent law is a roller coaster of excitement but every now and then something interesting happens. Take this attorney who was angry over a patent examiner's rejection of his client's application. Here are a few snippets from the lawyers letter to the examiner: 'Are you drunk? No, seriously... are you drinking scotch and whiskey with a side of crack cocaine while you "examine" patent applications? (Heavy emphasis on the quotes.) Do you just mail merge rejection letters from your home? Is that what taxpayers are getting in exchange for your services? Have you even read the patent application? I'm curious. Because you either haven't read the patent application or are... (I don't want to say the "R" word) "Special."....Your job is not a joke, but you are turning it into a regular three ring circus. If you can't motivate yourself to take your job seriously, then you need to quit and let someone else take over what that actually wants to do the job right.'"
gmfeier writes "The EPA has significantly lowered its estimate of how much methane leaks during natural gas production. This has major implications for the fracking debate, but puts the EPA at odds with NOAA. From the article: 'The scope of the EPA's revision was vast. In a mid-April report on greenhouse emissions, the agency now says that tighter pollution controls instituted by the industry resulted in an average annual decrease of 41.6 million metric tons of methane emissions from 1990 through 2010, or more than 850 million metric tons overall. That's about a 20 percent reduction from previous estimates. The agency converts the methane emissions into their equivalent in carbon dioxide, following standard scientific practice.'"
First time accepted submitter Thorhs writes "According to preliminary results (all votes counted, no official word yet) the Icelandic Pirate Party was able to secure 3 members of the national Parliament, the first PP to reach a national Parliament. Things were hairy election night, the PP lost all their MPs when they dropped below the 5% barrier 'needed' in the somewhat complex election system. Thankfully they managed to slip back up above, with 5.1% of the total votes. The old 'crash parties', the ones in charge before our epic financial crash, (Independent and Progressive parties) are the prime candidates to form a new government with just over 51% of the votes, getting 40 of 63 seats. RUV (Icelandic) has good coverage."
An anonymous reader writes "TorrentFreak reports on an internet piracy case from Finland, which saw four men found guilty and fined €45,000. During the trial, the defense attorney took note of inconsistencies in log files used as evidence against the men. An investigator for international recording industry organization IFPI revealed after questioning that the files had been tampered with. He said an MPAA executive was present when the evidence gathering took place, and altered the files to hide the identity of 'one of their spies.' 'No one from the MPAA informed the defense that the edits had been made and the tampering was revealed at the worst possible time – during the trial. This resulted in the prosecutor ordering a police investigation into the changes that had been made. "Police then proceeded by comparing the 'work copy' that the IFPI investigator produced with the material that police and the defending counsels had received. Police found out that the material had differences in over 10 files," Hietanen reveals.'"
Lauren Weinstein writes "Are you ready for the imagery war — the war against personal photography and capturing of video? You'd better be. 'In some cities, like New York, the surveillance-industrial complex has its fangs deeply into government for the big bucks. It's there we heard the Police Commissioner — just hours ago, really — claim that "privacy is off the table." And of course, there's the rise of wearable cameras and microphones by law enforcement, generally bringing praise from people who assume they will reduce police misconduct, but also dangerously ignoring a host of critical questions. Will officers be able to choose when the video is running? How will the video be protected from tampering? How long will it be archived? Can it be demanded by courts? ... All of this and more is the gung-ho, government surveillance side of the equation. But what about the personal photography and video side? What of individual or corporate use of these technologies in public and private spaces? Will the same politicians promoting government surveillance in all its glory take a similar stance toward nongovernmental applications? Writing already on the wall suggests not. Inklings of the battles to come are already visible, if you know where to look."
Avantare writes "The first sci-fi novel I read was A Wrinkle in Time; the next was Dune. Why don't more people read these extraordinarily imaginative books? Delegate Ray Canterbury, who represents Greenbrier County in southern WV, wants to help with that. Canterbury introduced House Bill 2983, which reads, 'To stimulate interest in math and science among students in the public schools of this state, the State Board of Education shall prescribe minimum standards by which samples of grade-appropriate science fiction literature are integrated into the curriculum of existing reading, literature or other required courses for middle school and high school students.' For decades, walking around with a paperback sci-fi novel in your back pocket at school was the quickest way to find yourself permanently excluded from the cool-kid clique. But what if it wasn't just the geeks who read Isaac Asimov and Arthur C. Clarke? What if science fiction was mandatory reading for all students?"