Mobile photo-sharing app SnapChat has one claim to fame, compared to other ways people might share photos from their cellphones: the photos, once viewed, disappear from view, after a pre-set length of time. However, it turns out they don't disappear as thoroughly as users might like. New submitter nefus writes with this excerpt from Forbes: "Richard Hickman of Decipher Forensics found that it's possible to pull Snapchat photos from Android phones simply by downloading data from the phone using forensics software and removing a '.NoMedia' file extension that was keeping the photos from being viewed on the device. He published his findings online and local TV station KSL has a video showing how it's done."
Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. ×
An anonymous reader writes "A recurring theme in comments on Slashdot since the 9/11 attacks has been concern about the use of government power to monitor or suppress political activity unassociated with terrorism but rather based on ideology. It has just been revealed that the IRS has in fact done that. From the story: "The Internal Revenue Service inappropriately flagged conservative political groups for additional reviews during the 2012 election . . . Organizations were singled out because they included the words 'tea party' or 'patriot' in their applications for tax-exempt status, said Lois Lerner, who heads the IRS division that oversees tax-exempt groups. In some cases, groups were asked for their list of donors, which violates IRS policy in most cases, she said. 'That was wrong. That was absolutely incorrect, it was insensitive and it was inappropriate. That's not how we go about selecting cases for further review,' Lerner said . . . 'The IRS would like to apologize for that,' she added. . . . Lerner said the practice was initiated by low-level workers in Cincinnati and was not motivated by political bias. . . . she told The AP that no high level IRS officials knew about the practice. Tea Party groups were livid on Friday. ... In all, about 300 groups were singled out for additional review. . . Tea Party groups weren't buying the idea that the decision to target them was solely the responsibility of low-level IRS workers. ... During the conference call it was stated that no disciplinary action had been taken by those who engaged in this activity. President Obama has previously joked about using the IRS to target people." So it's not how they choose cases for review (except when it is), and was not motivated by political bias (except that it was). Also at National Review, with more bite.
An anonymous reader writes "John McCain, Republican Senator for Arizona and former U.S. presidential candidate, is drafting a new bill that would pressure TV providers to allow customers to select and pay for only the channels they want to watch. The bill will also 'bar TV networks from bundling their broadcast stations with cable channels they own during negotiations with the cable companies, according to industry sources. So for example, the Disney Company, which owns both ABC and ESPN, could not force a cable provider to pay for ESPN in order to carry ABC.' Perhaps most importantly, the bill could 'end the sports blackout rule, which prohibits cable companies from carrying a sports event if the game is blacked out on local broadcast television stations.' This would hamstring the ludicrous practice of blacking out TV broadcasts in order to drive fans to buy actual tickets to a game. The cable and satellite TV industry is expected to push back very strongly against the bill."
Doug Otto writes "Buried deep in the bowels of a bi-partisan immigration reform bill is a 'photo tool.' The goal is to create a photo database consisting of every citizen. Wired calls it 'a massive federal database administered by the Department of Homeland Security and containing names, ages, Social Security numbers and photographs of everyone in the country with a driver’s license or other state-issued photo ID.' Of course the database would be used only for good, and never evil. 'This piece of the Border Security, Economic Opportunity, and Immigration Modernization Act is aimed at curbing employment of undocumented immigrants. But privacy advocates fear the inevitable mission creep, ending with the proof of self being required at polling places, to rent a house, buy a gun, open a bank account, acquire credit, board a plane or even attend a sporting event or log on the internet.'"
In an overdue but welcome move, President Obama today issued an executive order mandating "open and machine-readable data" for government-published information. Also, kodiaktau writes "In a move to make data more readily available, the United States of America has announced the Project Open Data and has chosen GitHub to host the content." Ars has a great article on the announced policy, but as you might expect, it comes with caveats, exceptions, sub-goals and committees; don't expect too much change per day, or assume you have a right to open data, exactly, in the eyes of the government, but — "subject to appropriations" — it sounds good on paper. (I'd like the next step to be requiring that all file formats used by the government be open source.)
An anonymous reader writes with this snippet from Ars Technica: "Righthaven, the Las Vegas operation that sought to turn newspaper article copyright lawsuits into a business model, can now slap a date on its death certificate: May 9, 2013. This morning, the U.S. Court of Appeals for the Ninth Circuit ruled on the two Righthaven appeals that could have given the firm a final glimmer of hope — and the court told Righthaven to take a hike (PDF)."
First time accepted submitter He Who Has No Name writes "While the ATF appears to have no open objection to 3D printed firearms at this time, the Department of Defense apparently does. A short while ago, '#DEFCAD has gone dark at the request of the Department of Defense Trade Controls. Take it up with the Secretary of State' appeared on the group's site, and download links for files hosted there began to give users popups warning of the DoD takeover." Well, that didn't take long. Note: As of this writing, the site is returning an error, rather than the message above, but founder Cody Wilson has posted a similar message to twitter. At least the Commander in Chief is in town to deliver the message personally. Update: 05/09 21:17 GMT by T : Tweet aside, that should be Department of State, rather than Department of Defense, as many readers have pointed out. (Thanks!)
Wired has published a book review of sorts of a freely downloadable book called Untangling the Web: A Guide to Internet Research. If that title came from O'Reilly, Apress, or other big name in tech-publishing, it might be perfectly nice but less interesting. Instead, it was prepared as an internal guide for the NSA, and came to public attention through a FOIA request by MuckRock. (See this video interview with MuckRock's Michael Morisy at this year's SXSW.) The version that's been released is several years old. From Wired's report: "Although the author's name is redacted in the version released by the NSA, Muckrock's FOIA indicates it was written by Robyn Winder and Charlie Speight. A note the NSA added to the book before releasing it under FOIA says that the opinions expressed in it are the authors', and not the agency's. ... Lest you think that none of this is new, that Johnny Long has been talking about this for years at hacker conferences and in his book Google Hacking, you’d be right. In fact, the authors of the NSA book give a shoutout to Johnny, but with the caveat that Johnny’s tips are designed for cracking — breaking into websites and servers. 'That is not something I encourage or advocate,' the author writes." (Hat tip to ThinkGeek's Jacob Rose.)
Sparrowvsrevolution writes "The promise of a fully 3D-printable gun is that it can spread via the Internet and entirely circumvent gun control laws. Two days after that digital weapon's blueprint first appeared online, it seems to be fulfilling that promise. Files for the printable gun known as that 'Liberator' have been downloaded more than 100,000 times in two days, according to Defense Distributed, the group that created it. Those downloads were facilitated by Kim Dotcom's startup Mega, which Defense Distributed is using to host the Liberator's CAD files. And it's also been uploaded to the Pirate Bay, where it's one of the most popular files in the filesharing site's uncensorable 3D printing category."
judgecorp writes "The city of San Francisco has abandoned a law proposed in 2010 which would have required mobile phones to be labelled with their radiation level. Mobile phone industry body the CTIA fought the bill in court, arguing that there is not enough evidence of harm. The city is not convinced phones are safe — it says its decision to abandon the law is simply based on the legal costs."
Drishmung writes "The New Zealand Commerce Minister Craig Foss today (9 May 2013) announced a significant change to the Patents Bill currently before parliament, replacing the earlier amendment with far clearer law and re-affirming that software really will be unpatentable in New Zealand. An article on the Institute of IT Professionals web site by IT Lawyer Guy Burgess looks at the the bill and what it means, with reference to the law in other parts of the world such as the USA, Europe and Britain (which is slightly different from the EU situation)."
DavidGilbert99 writes "This time last year the Queen officially introduced the Communications Data Bill (known as the Snooper's Charter to those opposing it). Last month it was effectively killed when the UK deputy prime minister Nick Clegg said it went too far and he wouldn't support it. Today the Queen was back and while there was no official mention of the Communications Data Bill, there was mention of 'crime in cyberspace' and a very strong hint that more legislation to monitor people's online activity is on the way."
gannebraemorr writes "The U.S. Department of Justice and the FBI believe they don't need a search warrant to review Americans' e-mails, Facebook chats, Twitter direct messages, and other private files, internal documents reveal. Government documents obtained by the American Civil Liberties Union and provided to CNET show a split over electronic privacy rights within the Obama administration, with Justice Department prosecutors and investigators privately insisting they're not legally required to obtain search warrants for e-mail."
New submitter giveen1 writes "I recieved this email as a former Demonoid.me user. I tried to go to the website and link is dead. ... 'Dear Demonoid Community Member, We have all read the same news stories: The Demonoid servers shut down and seized in the Ukraine. The Demonoid admin team detained in Mexico. The demonoid.me domain snatched and put up for sale. The Demonoid trackers back online in Hong Kong, but then disappearing. ... Now for some good news: The heart and soul of Demonoid lives on! Through an amazing sequence of unlikely events, the data on those Ukrainian servers has made its way into the safe hands of members of our community and has now been re-launched as d2.vu.'" But it turns out that the site was distributing malware, hosted on an American VPS, and quickly shut down after the provider discovered this. No word yet on how the Demonoid user database was acquired, but if you did make the mistake of trying to log in Torrent Freak warns: "New information just in suggests that if you logged into the fake Demonoid and used the same user/password combo on any other site (torrent, email, Steam, PayPal) you should change them immediately."
hypnosec tipped us to news that India is rolling out a new intrusive monitoring system, using the authority of a 2000 telecom law. Quoting The Times of India: "However, Pavan Duggal, a Supreme Court advocate specialising in cyberlaw, said the government has given itself unprecedented powers to monitor private Internet records of citizens. 'This system is capable of abuse,' he said. The Central Monitoring System, being set up by the Centre for Development of Telematics, plugs into telecom gear and gives central and state investigative agencies a single point of access to call records, text messages, and emails as well as the geographical location of individuals." Privacy advocates are worried about abuse, partially because India has no effective privacy legislation, and the "...Indian government under PM Manmohan Singh has taken an increasingly uncompromising stance when it comes to online freedoms, with the stated aim usually to preserve social order and national security or fight 'harmful' defamation."
FuzzNugget writes "According to Wired, the two CFAA charges that were laid against the man who exploited a software bug on a video poker machine have been officially dismissed. Says Wired: '[U.S. District Judge Miranda] Du had asked prosecutors to defend their use of the federal anti-hacking law by Wednesday, in light of a recent 9th Circuit ruling that reigned in the scope of the CFAA. The dismissal leaves John Kane, 54, and Andre Nestor, 41, facing a single remaining charge of conspiracy to commit wire fraud.' Kane's lawyer agreed, stating, 'The case never should have been filed under the CFAA, it should have been just a straight wire fraud case. And I'm not sure its even a wire fraud. I guess we'll find out when we go to trial.'"
wiredmikey writes "A new report from the Pentagon marked the most explicit statement yet from the United States that it believes China's cyber espionage is focused on the U.S. government, as well as American corporations. China kept up a steady campaign of hacking in 2012 that included attempts to target U.S. government computer networks, which could provide Beijing a better insight into America's policy deliberations and military capabilities, according to the Pentagon's annual assessment of China's military. 'China is using its computer network exploitation capability to support intelligence collection against the U.S. diplomatic, economic, and defense industrial base sectors that support U.S. national defense programs,' said the report to Congress (PDF). The digital espionage was part of a broader industrial espionage effort that seeks to secure military-related U.S. and Western technology, allowing Beijing to scale back its reliance on foreign arms manufacturers, the report said. One day later, Beijing dismissed the Pentagon's report that accused it of widespread cyberspying on the U.S. government, rejecting it as an 'irresponsible' attempt to drum up fear of China as a military threat."
SternisheFan writes with an excerpt from Ars Technica: "Attacks exploiting a previously unknown and currently unpatched vulnerability in Microsoft's Internet Explorer browser have spread to at least nine other websites, including those run by a big European company operating in the aerospace, defense, and security industries as well as non-profit groups and institutes, security researchers said. The revelation, from a blog post published Sunday by security firm AlienVault, means an attack campaign that surreptitiously installed malware on the computers of federal government workers involved in nuclear weapons research was broader and more ambitious than previously thought. Earlier reports identified only a website belonging to the US Department of Labor as redirecting to servers that exploited the zero-day remote-code vulnerability in IE version 8. ... 'The specific Department of Labor website that was compromised provides information on a compensation program for energy workers who were exposed to uranium,' CrowdStrike said. 'Likely targets of interest for this site include energy-related US government entities, energy companies, and possibly companies in the extractive sector. Based on the other compromised sites other targeted entities are likely to include those interested in labor, international health and political issues, as well as entities in the defense sector.'"
SternisheFan tipped us to news that the infamous copyright trolls Prenda Law are in a bit of trouble with the law. Today, U.S. District Court judge Otis Wright issued sanctions against Prenda. He recommends that the lawyers involved be disbarred and fined, granted court and lawyer fees to the defendants (doubled for punishment), and has referred them for criminal prosecution. Among the findings of fact are that they set up dozens of shell companies to disguise the true owners, actually committed identity theft, dodged taxes on settlement money, lied to the court, and abused the court by setting settlements on flimsy charges just below the cost of a defense.
On Friday, we mentioned that Defense Distributed had created a (near-enough-to) fully 3-D printed pistol. Sparrowvsrevolution now writes that "Last week, the Liberator was fired for the first time at a firing range and successfully shot a .380 caliber bullet using a remote firing setup. Over the weekend, Defense Distributed's founder, the anarchist and radical libertarian Cody Wilson, was bold enough to try firing it by hand. The results of that test, witnessed by a reporter, indicate that the era of the 3D-printed firearm may be upon us, for better or for worse." Predictably, certain politicians are — so to speak — up in arms about it.
An anonymous reader writes "A Methusen, Mass. high schooler, who goes by the rapper name 'Cammy Dee' has been arrested after posting lyrics that police felt were 'communicating terrorist threats.' This wouldn't be the first time rap lyrics were investigated, but if formally charged for 'communicating terrorist threats' this would a set a chilling low bar for terrorist investigations."
New submitter davesays writes "CNN anchors Erin Burnett and Carol Costello have interviewed Former FBI Counterterrorisim specialist Tim Clemente. In the interviews he asserts that all digital communications are recorded and stored. Clemente: 'No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not.' 'All of that stuff' — meaning every telephone conversation Americans have with one another on U.S. soil, with or without a search warrant — 'is being captured as we speak.' 'No digital communication is secure,' by which he means not that any communication is susceptible to government interception as it happens (although that is true), but far beyond that: all digital communications — meaning telephone calls, emails, online chats and the like — are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is."
dryriver writes "Dear Slashdotters, We are a two man crew who have spent almost three years developing a video processing algorithm that 'upgrades' the visual quality of digital video footage. We take video footage that is "of average quality" — think an amateur shooting on a cheap digital camcorder or on a smartphone camera — and use various mathematical tricks we have developed to make the footage look better — optically sharper, better lit, more vivid colours, improved contrast, enhanced sense of three-dimensionality and of 'being-there realism.' In about a month, we will be presenting our algorithm to some venture capitalists. We have the obligatory before-and-after video demos prepared for this, of course. But there will also be a short PowerPoint presentation where we explain our tech in some detail. Now here is our main question: What, in your opinion, should we — or indeed should we NOT — put in the PowerPoint presentation to impress a Venture Capitalist? Should we talk about how we developed the algorithm at all — what kind of R&D and testing was involved? Should we try to walk the VCs through how our algorithm works under the hood — simplified a bit for a 'non-engineer' audience of course? Or should we stick to talking about market potential, marketing strategy & money-related stuff only? If you were in our shoes — presenting a digital video-quality improvement technology to professional VCs — what would and would you not put in your PowerPoint? Any advice on this from Slashdotters with some experience would be most welcome!"
theodp writes "E-mails and other communications between employees,' explains Google in a newly-published patent application for its Policy Violation Checker invention, 'can implicate potential violations of company policy or local, state or federal law that can go unchecked by attorneys or other legal personnel.' So how can you avoid those embarrassing Goldman Sachs and Enron e-mail gaffes? Use Google's 'methods and systems for identifying problematic phrases in an electronic document'! From the patent application: 'Documents may be used as evidence in court, administrative, or other proceedings. It is in a company's best interest to minimize or eliminate policy violations and/or situations that could give rise to legal liability. It is also often in a company's best interest to be able to Pack [?] these situations. Problematic phrases include, but are not limited to, phrases that present policy violations, have legal implications, or are otherwise troublesome to a company, business, or individual.' So, if you can't Do-No-Evil, at least you can Do-No-Discoverable-Evil!"
Why does a car rated for 47mpg fall so far short? The Houston Chronicle features an article on just why EPA gas estimates can be so different from real-world drivers' experience at the pump (or in looking at the dashboard display), in particular for hybrid cars. From the article: "A geometric average of the FTP-75 and HFET results (with city driving weighted at 55 percent and highway driving weighted at 45 percent) produces a vehicle's CAFE fuel economy, which is then incorporated into a manufacturer's corporate average. CAFE is measured using these tests to the present day. In fact, this methodology will be 50 years old when it's used to gauge compliance with the forthcoming 54.5-mpg CAFE requirements in 2025. That kind of continuity is admirable in baseball, but not in transportation. These tests are irrelevant to contemporary real-world driving. For example, the maximum acceleration on either test is 3.3 mph per second. At that rate, it takes more than 18 seconds to hit 60 mph. Even in the horsepower-deprived 1970s, most people were driving harder than that. And the 60-mph maximum speed on the highway test does not accord with the 75-mph truth of today's interstate traffic."
freddienumber13 writes "The CCTV cameras operated by the local government in the country town of Nowra, NSW (Australia) have been turned off following an order by the Administrative Decisions Tribunal. The local government is crying because it believes that it is losing an effective method in combating crime in public. Locals however are rejoicing that they are no longer being recorded whilst walking down the street."
Techdirt explains the strange story of a lawsuit-happy bus company in Illinois which managed to tick off a cadre of determined redditors by calling them uncomplimentary names in the reddit forums. This all started when a bus passenger, Jeremy Leval, reported unsavory behavior by a company employee (telling an exchange student "If you don't understand English, you don't belong at the University of Illinois or any 'American' University.") and said so online. Besides the name calling on reddit, the bus company threatened the forum moderator with libel charges, and over insults posted by the bus company employees which the moderator had deleted. Further, company owner "[Dennis] Toeppen threatened to sue Leval, saying, 'The attorneys for Suburban Express are reviewing this incident with a view towards filing the appropriate legal action against this meddlesome MBA student.'" Attorney Ken White of Popehat got involved, though, and asked with good effect whether the company had fully considered the Streisand Effect. The strangest part? Toeppen's former involvement as a domain squatter.
puddingebola writes with a New York Times article about how mundane PC equipment — not just more esoteric and eyebrow-raising network monitoring equipment from Blue Coat — makes its way to Syria: "Large amounts of computer equipment from Dell have been sold to the Syrian government through a Dubai-based distributor despite strict trade sanctions intended to ban the selling of technology to the regime, according to documents obtained by The New York Times. The disclosure of the computer sales is the latest example of how the Syrian government has managed to acquire technology, some of which is used to censor Internet activity and track opponents of the Syrian president, Bashar al-Assad."
Jeremiah Cornelius writes "Bruce Schneier, security expert (and rational voice in the wilderness), explains in an editorial on CNN why 'Connecting the Dots' is a 'Hindsight Bias.' In heeding calls to increase the amount of surveillance data gathered and shared, agencies like the FBI have impaired their ability to discover actual threats, while guaranteeing erosion of personal and civil freedom. 'Piling more data onto the mix makes it harder, not easier. The best way to think of it is a needle-in-a-haystack problem; the last thing you want to do is increase the amount of hay you have to search through. The television show Person of Interest is fiction, not fact.'"
hypnosec writes "U.S. officials have told the Indian Government that they will not be able to serve summons to the executives of companies like Google and Facebook because they are not convinced that the content hosted on these sites can cause violence and that these summons impact 'free speech principles.' The reply comes as a response to India's request to the US to help serve papers to 11 Internet companies accused of hosting content on their sites that was meant to fuel communal hatred and violence. The U.S. authorities said that there are limitations when it comes to protection on free speech — when the speech comprises a true threat or provokes imminent violence — but in this particular case there is not sufficient evidence of either of these."
A year ago today, we noted that Sen. Rand Paul of Kentucky called for the abolition of the Transportation Security Administration. It's now nearly 12 years since the hijacked-plane terror attacks of 2001; the TSA was created barely two months later, and has been (with various rules, procedures, and equipment, all of it controversial for reasons of privacy, safety, and efficacy) a major presence ever since at American commercial airports. "The American people shouldn't be subjected to harassment, groping, and other public humiliation simply to board an airplane," wrote Paul last year, and in June of 2012, he followed up by introducing two bills on the topic; the first calling for a "bill of rights" for air travelers, the other for privatizing airport screening practices. Neither bill went far. Should they have? Libertarian-leaning Paul did not succeed in knocking back the TSA, never mind privatizing its functions (currently funded at nearly $8 billion annually), though some of the things called for in his bill of rights are manifest now at least in muted form. (Very young passengers, as well as elderly passengers, face less stringent security requirements, for instance, and TSA has ended its prohibition of certain items aboard planes.) Whether you're from the U.S. or not, what practical changes would you like to see implemented? What shouldn't be on the bill of rights for airplane passengers?
First time accepted submitter carlypage3 writes "Benefits claimants in the UK are being forced to use Microsoft's now obsolete Windows XP and Internet Explorer 6 software. The Department of Work and Pensions (DWP) states that its online forms are not compatible with Internet Explorer 7, 8, 9 and 10, Safari, Google Chrome or Firefox. As if that wasn't unnerving enough, the Gov.UK website says that users cannot submit claims using Mac OS X or Linux operating systems, either." (Note: as we noted not long ago, it's not just the DWP that's stuck using IE6.)
nk497 writes "Dutch police are set to get the power to hack people's computers or install spyware as part of investigations — but antivirus experts say they won't help police reach their targets. Mikko Hypponen, chief research officer at F-Secure, said the Dutch bill could lead to antivirus firms being asked asked to cooperate with authorities to let an attack reach the target. So far, Hypponen hasn't seen a single antivirus vendor cooperate with such a request, and said his own firm wouldn't want to take part. Purely for business reasons, it doesn't make sense to fail to protect customers and let malware through 'regardless of the source.'"
hypnosec writes "Google has indirectly walked right into one of the Middle East's most obstinate conflicts by labeling Palestine as an independent nation — wiping off the term 'Palestinian Territories' and replacing it with 'Palestine' in its localized search page. Google's move is more or less in line with the UN's October decision to name Palestine as a non-member observer state. The status given to Palestine will allow the state to join UN debates as well as global bodies such as the International Criminal Court, in theory at least. Up until May 1, anyone visiting http://www.google.ps were shown the phrase Palestinian Territories. This change is definitely not a huge one but, it has attracted criticism from politicians in Israel."
rjupstate writes "The Pentagon is quickly moving to approve the latest devices and platforms from BlackBerry, Samsung, and Apple. That's good news for two of those companies. It's not-so-good news for BlackBerry. 'The Pentagon currently has about 600,000 smartphone users – almost all using BlackBerrys – but ultimately aims to have as many as 8m smartphones and tablets, under the terms of a scheme made public last November.' 'In its effort to expand into the high security government niche, one that BlackBerry has enjoyed near singular control of for years, Samsung recently created a government advisory board made up of Samsung executives and security experts from various U.S. and foreign government security agencies. ... In the end, the program will likely elevate that status of both Apple and Samsung within military and civilian government agencies in the U.S. and other western countries.'"
An anonymous reader writes "In a case stemming from a Jacksonville burglary, the Florida Supreme Court ruled 5-2 Thursday that police must get a search warrant before searching someone's cell phone. 'At this time, we cannot ignore that a significant portion of our population relies upon cell phones for email communications, text message information, scheduling, and banking,' read the majority opinion (PDF), authored by Justice Fred Lewis. 'The position of the dissent, which would permit the search here even though no issue existed with regard to officer safety or evidence preservation, is both contrary to, and the antithesis of, the fundamental protections against government intrusion guaranteed by the Fourth Amendment.'"
Krazy Kanuck sends this quote from the BBC: "Warner Bros is being sued for the alleged unauthorized use of two cats that have achieved internet fame. ... The complaint alleged that the cats were used without permission in Scribblenauts, a series of games on the Nintendo DS and other platforms. Court documents alleged that Warner Bros and 5th Cell 'knowingly and intentionally infringed' both claimant's ownership rights. 'Compounding their infringements,' court papers (PDF) said, 'defendants have used "Nyan Cat" (designed by Christopher Torres) and "Keyboard Cat" (created in 1984 by Charles Schmidt), even identifying them by name, to promote and market their games, all without plaintiffs' permission and without any compensation to plaintiffs.' "
jrepin writes "Digital restrictions management (DRM) creates damaged goods that users cannot control or use freely. It requires users to give-up control of their computers and restricts access to digital data and media. Device manufacturers and corporate copyrights holders have already been massively infecting their products with user-hostile DRM. Tablets, mobile phones and other minicomputers are sold with numerous restrictions embedded that cripple users freedom. The proposal at table in W3C to put DRM into HTML goes even further. Fight it: use today's today is international Day Against DRM, so spread the word and make yourself heard!" The EFF suggests making every day a day against DRM.
An anonymous reader writes "The Dutch government today presented a draft bill that aims to give law enforcement the power to hack into computer systems — including those located in foreign countries — to do research, gather and copy evidence or block access to certain data. Law enforcement should be allowed to block access to child pornography, read emails that contain information exchanged between criminals and also be able to place taps on communication, according to a draft bill published Thursday and signed by Ivo Opstelten, the Minister of Security and Justice. Government agents should also be able to engage in activities such as turning on a suspect's phone GPS to track their location, the bill said. Opstelten announced last October he was planning to craft this bill."
mikejuk writes with news of an advancement for homomorphic encryption and open source: "To be fully homomorphic the code has to be such that a third party can add and multiply numbers that it contains without needing to decrypt it. In other words they can change the data by working with just the encrypted version. This may sound like magic but a fully homomorphic scheme was invented in 2009 by Craig Gentry. This was a step in the right direction but the problem was that it is very inefficient and computationally intensive. Since then there have been a number of improvements that make the scheme practical in the right situations Now Victor Shoup and Shai Halevi of the IBM T J Watson Research Center have released an open source (GPL) C++ library, HElib, as a Github project. The code is said to incorporate many optimizations to make the encryption run faster. Homomorphic encryption has the potential to revolutionize security by allowing operations on data without the need to decrypt it."
Nerval's Lobster writes "In March, the U.S. Department of Commerce's Bureau of Industry and Security added T-Platforms' businesses in Germany, Russia and Taiwan to the 'Entity List,' which includes those believed to be acting contrary to the national security or foreign policy interests of the United States. Commerce felt, according to the notice, that T-Platforms may be illegally assisting the Russian military and/or its nuclear program. In the meantime, Russian president Vladimir Putin has reportedly weighed in on the T-Platforms question. 'That's right. The use of political levers for unfair competition,' Putin said, according to RBTH.ru. 'Our European colleagues are independent people and they claim they want to work with us in certain spheres, yet they act as though they are absolutely dependent and unable to make their own decision. Is that so?' It's odd that Putin was quoted talking about 'European colleagues' when the Americans were responsible for cutting T-Platforms off."
First time accepted submitter ruhri writes "A 16 year-old girl in Florida not only has been expelled from her high school but also is being charged as an adult with a felony after replicating the classic toilet-bowl cleaner and aluminum foil experiment. This has quite a number of scientists and science educators up in arms. The fact that she's African American and that the same assistant state attorney has decided not to charge a white teenager who accidentally killed his brother with a BB gun has some thinking whether this is a case of doing science while black."
DavidGilbert99 writes "Last November Matt Brittin, Google's European chief gave a pretty convincing account of himself as he tried to explain why Google wasn't paying more tax in the UK. All the sales staff were based in Ireland apparently and the UK-based staff were there just to promote the platform for advertisers. Great. Nothing to see here. Move on please. Well, actually there is a little more to the story, as an investigation by Reuters has discovered. There are many sales staff in the UK with titles and responsibilities curiously close to what most people would call sales staff and as a result Mr. Brittin will once again have to face Margaret Hodge and the PAC to explain just what is happening."
Nate the greatest writes "Remember last year when Apple received a patent on the faux page curl in iBooks? Lots of people laughed at the idea that Apple could patent the page turn, but not Samsung. The gadget maker has just filed for their own page turn patent. The paperwork explains in great detail what the page turn looks like, how the software would work, and what on screen gestures could be used to turn the page."
mask.of.sanity writes "Australia's plans for a data breach notification scheme have been revealed which will force organizations to report serious breaches to affected victims. The plans, which are still in a draft form, show that the country's privacy commissioner could force businesses to inform press if the breaches are bad enough, pursue fines of up to $1.7 million for organizations that are repeatedly breached and force businesses to adopt stronger security controls."
JoeyRox writes "Over the course of playing $12 million worth of video poker, Las Vegas resident John Kane stumbled onto a firmware bug in IGT's 'Game King' machines that allowed him to cash out for 10x the amount of his winnings. John and his friends took advantage of the vulnerability to the tune of $429,945. John's friend was arrested by U.S. marshals and charged with violation of the Computer Fraud and Abuse Act, but a federal magistrate ruled that the law doesn't apply and recommended dismissal. The case is currently being argued in a U.S. District Court."
An anonymous reader writes with this tidbit from PC World about Sabam's latest demand for copyright levies: "Sabam, the Belgian association of authors, composers and publishers, has sued the country's three biggest ISPs, saying that they should be paying copyright levies for offering access to copyright protected materials online. Sabam wants the court to rule that Internet access providers Belgacom, Telenet and Voo should pay 3.4 percent of their turnover in copyright fees, because they profit from offering high speed Internet connections that give users easy access to copyright protected materials, the collecting organization said in a news release Tuesday." Sabam has previously demanded money from truckers for listening to the radio, and wanted to charge libraries royalties for reading to children.