The Courts

Harvard Students Move Fossil Fuel Stock Fight To Court 203

mdsolar writes A group of Harvard students, frustrated by the university's refusal to shed fossil fuel stocks from its investment portfolios, is looking beyond protests and resolutions to a new form of pressure: the courts. The seven law students and undergraduates filed a lawsuit on Wednesday in Suffolk County Superior Court in Massachusetts against the president and fellows of Harvard College, among others, for what they call "mismanagement of charitable funds." The 11-page complaint, with 167 pages of supporting exhibits, asks the court to compel divestment on behalf of the students and "future generations."
Australia

UNSW Has Collected an Estimated $100,000 In Piracy Fines Since 2008 98

Jagungal (36053) writes The SMH reports that The University of NSW says it has issued 238 fines estimated to total around $100,000 - to students illicitly downloading copyright infringing material such as movies and TV shows on its Wi-Fi network since 2008. The main issues are that the University is not returning any money to the copyright holders but is instead using the money raised for campus facilities and that it is essentially enforcing a commonwealth law.
Bitcoin

Tracking a Bitcoin Thief, Part II: Illustrating the Issue of Trust In Altcoins 46

An anonymous reader writes The team over at the BITCOMSEC (Bitcoin Community Security) project released a second part to their 'Tracking a Bitcoin Thief' series in which they disclose what happened to a once-rising alternate crypto currency project that promised to place guaranteed value of its MidasCoins by backing it with actual Gold. Dealing with the reality of user compromise, the projects founder ups and runs away with all of the communities coins; cashing them out at an exchange for Bitcoins. A sobering tale of trust issues within the alternate crypto currency community. (The first part is interesting, too.)
Privacy

Amnesty International Releases Tool To Combat Government Spyware 95

New submitter Gordon_Shure_DOT_com writes Human rights charity Amnesty International has released Detekt, a tool that finds and removes known government spyware programs. Describing the free software as the first of its kind, Amnesty commissioned the tool from prominent German computer security researcher and open source advocate Claudio Guarnieri, aka 'nex'. While acknowledging that the only sure way to prevent government surveillance of huge dragnets of individuals is legislation, Marek Marczynski of Amnesty nevertheless called the tool (downloadable here) a useful countermeasure versus spooks. According to the app's instructions, it operates similarly to popular malware or virus removal suites, though systems must be disconnected from the Internet prior to it scanning.
Communications

WhatsApp To Offer End-to-End Encryption 93

L-One-L-One (173461) writes In a surprise move, nine months after being bought by Facebook, WhatsApp has begun rolling out end-to-end encryption for its users. With true end-to-end encryption data becomes unaccessible to admins of WhatsApp or law enforcement authorities. This new feature first proposed on Android only has been developed in cooperation with Open Whisper Systems, based on TextSecure. With hundreds of million users, WhatsApp becomes by far the largest secure messaging application. FBI Director James Comey might not be pleased. Do you have a current favorite for encrypted online chat?
The Courts

US Gov't Seeks To Keep Megaupload Assets Because Kim Dotcom Is a Fugitive 173

mrspoonsi writes with this excerpt from Billboard: 'On Tuesday, the U.S. Department of Justice told a Virginia federal judge that Kim Dotcom and cohorts have no business challenging the seizure of an estimated $67 million in assets because the Megaupload founder is evading prosecution. The government brought criminal charges against Dotcom in early 2012, but he's been holed up in New Zealand awaiting word on whether he'll be extradited. The government got antsy and this past July, brought a civil complaint for forfeiture in rem, a maneuver to firmly establish a hold over money from bank accounts around the world, luxury cars, big televisions, watches, artwork and other property allegedly gained by Megaupload in the course of crimes. Dotcom is fighting the seizures by questioning the government's basis for asserting a crime, saying "there is no such crime as secondary criminal copyright infringement," as well as challenging how the seized assets are tied to the charges against Dotcom. But according to the U.S. government, Dotcom doesn't get the pleasure of even making the arguments. In a motion to strike, the government cites the doctrine of fugitive disentitlement, which bars a person from using the resources of the court if that person is aware of prosecution and is evading it.
United States

US Intelligence Unit Launches $50k Speech Recognition Competition 62

coondoggie writes The $50,000 challenge comes from researchers at the Intelligence Advanced Research Projects Activity (IARPA), within the Office of the Director of National Intelligence. The competition, known as Automatic Speech recognition in Reverberant Environments (ASpIRE), hopes to get the industry, universities or other researchers to build automatic speech recognition technology that can handle a variety of acoustic environments and recording scenarios on natural conversational speech.
The Courts

Court Shuts Down Alleged $120M Tech Support Scam 129

wiredmikey writes A federal court has temporarily shut down and frozen the assets of two telemarketing operations accused by the FTC of scamming customers out of more than $120 million by deceptively marketing computer software and tech support services. According to complaints filed by the FTC, since at least 2012, the defendants used software designed to trick consumers into believing there were problems with their computers and then hit them with sales pitches for tech support products and services to fix their machines.

According to the FTC, the scams began with computer software that claimed to improve the security or performance of the customer's computer. Typically, consumers downloaded a free, trial version of the software that would run a computer system scan. The scan always identified numerous errors, whether they existed or not. Consumers were then told that in order to fix the problems they had to purchase the paid version of the software for between $29 and $49. In order to activate the software after the purchase, consumers were then directed to call a toll-free number and connected to telemarketers who tried to sell them unneeded computer repair services and software, according to the FTC complaint. The services could cost as much as $500, the FTC stated.
United States

Number of Coders In Congress To Triple (From One To Three) 163

jfruh writes Last weekend, Tim Berners-Lee said that the UK needs more members of parliament who can code. Well, the most recent U.S. congressional election has obliged him on this side of the Atlantic: the number of coders in Congress has tripled, with the downside being that their numbers have gone from one to three.
The Internet

Head of FCC Proposes Increasing Internet School Fund 107

Rambo Tribble writes: The commissioners at the FCC are expected to vote, on December 11, on a proposal by Chairman Tom Wheeler to increase the funding for the nation's largest educational technology subsidy program, E-Rate, by 62 percent. The proposal is intended to be paid for by higher fees on phone service. The increased cost is pegged at $1.92 a year, per telephone line. Support for the proposal, or lack thereof, appears to be falling along partisan lines. To quote Wheeler, however, "Almost two-thirds of American schools cannot appropriately connect their students to the 21st century."
Republicans

Republicans Block Latest Attempt At Curbing NSA Power 445

Robotron23 writes: The latest attempt at NSA reform has been prevented from passage in the Senate by a margin of 58 to 42. Introduced as a means to stop the NSA collecting bulk phone and e-mail records on a daily basis, the USA Freedom Act has been considered a practical route to curtailment of perceived overreach by security services, 18 months since Edward Snowden went public. Opponents to the bill said it was needless, as Wall Street Journal raised the possibility of terrorists such as ISIS running amok on U.S. soil. Supporting the bill meanwhile were the technology giants Google and Microsoft. Prior to this vote, the bill had already been stripped of privacy protections in aid of gaining White House support. A provision to extend the controversial USA Patriot Act to 2017 was also appended by the House of Representatives.
United Kingdom

UK Hotel Adds Hefty Charge For Bad Reviews Online 307

Bizzeh writes: A British couple has been "fined" £100 by a Blackpool hotel for leaving critical comments on Trip Advisor. The UK's Trading Standards organization is investigating the incident, saying it may breach regulations. The Broadway Hotel's booking policy reads (in small print), "Despite the fact that repeat customers and couples love our hotel, your friends and family may not. "For every bad review left on any website, the group organizer will be charged a maximum £100 per review."
Canada

City of Toronto Files Court Injunction Against Uber 169

Sebolains writes: The city of Toronto in Ontario, Canada has filed a court injunction on Uber Canada Inc. today that requests for all operations in the city to cease. Uber has been operating there since 2012 without a license from the city, and so officials are concerned that Uber's operations pose a risk to both drivers and riders. How quickly this will happen, we don't know, but the city has asked the courts to be expedient in hearing this application.
Privacy

NYT: Privacy Concerns For ClassDojo, Other Tracking Apps For Schoolchildren 66

theodp writes: The NY Times' Natasha Singer files a report on popular and controversial behavior tracking app ClassDojo, which teachers use to keep a running tally of each student's score, award virtual badges for obedience, and to communicate with parents about their child's progress. "I like it because you get rewarded for your good behavior — like a dog does when it gets a treat," was one third grader's testimonial. Some parents, teachers and privacy law scholars say ClassDojo (investors) — along with other unproven technologies that record sensitive information about students — is being adopted without sufficiently considering the ramifications for data privacy and fairness. "ClassDojo," writes Singer, "does not seek explicit parental consent for teachers to log detailed information about a child's conduct. Although the app's terms of service state that teachers who sign up guarantee that their schools have authorized them to do so, many teachers can download ClassDojo, and other free apps, without vetting by school supervisors. Neither the New York City nor Los Angeles school districts, for example, keep track of teachers independently using apps."

A high school teacher interviewed for the article confessed to having not read ClassDojo's policies on handling student data, saying: "I'm one of those people who, when the terms of service are 18 pages, I just click agree." And, if all this doesn't make you parents just a tad nervous, check out this response to the "Has anyone ran a data analysis on their CD data?" question posed to the Class Dojo Community: "I needed to analyze data in regards to a student being placed on ADHD medicine to see whether or not he made any improvements. I have also used it to determine any behavioral changes depending on if a student was with mom/dad for a custody review. I use dojo consistently, so I LOVE getting to use the data to evaluate and share with parents, or even administrators."
Encryption

Launching 2015: a New Certificate Authority To Encrypt the Entire Web 212

Peter Eckersley writes: Today EFF, Mozilla, Cisco, and Akamai announced a forthcoming project called Let's Encrypt. Let's Encrypt will be a certificate authority that issues free certificates to any website, using automated protocols (demo video here). Launching in summer 2015, we believe this will be the missing piece that deprecates the woefully insecure HTTP protocol in favor of HTTPS.
The Media

Uber Threatens To Do 'Opposition Research' On Journalists 299

Nerval's Lobster writes A senior executive at Uber reportedly told a Buzzfeed writer that the company "should consider hiring a team of opposition researchers to dig up dirt on its critics in the media — and specifically to spread details of the personal life of a female journalist who has criticized the company." As detailed by the executive, Uber would spend a million dollars on the effort, which would involve "four top opposition researchers and four journalists," and dig into personal lives and families. Uber has pushed back against the report, insisting that it's never done opposition research, but the idea of any company engaging in such practices seems more like something Nixon would have dreamed up at his worst than a strategy by a "disruptive" startup.
Google

Court Rules Google's Search Results Qualify As Free Speech 137

wabrandsma writes with this news from Ars Technica: The regulation of Google's search results has come up from time to time over the past decade, and although the idea has gained some traction in Europe (most recently with "right to be forgotten" laws), courts and regulatory bodies in the U.S. have generally agreed that Google's search results are considered free speech. That consensus was upheld last Thursday, when a San Francisco Superior Court judge ruled in favor of Google's right to order its search results as it sees fit.
Privacy

Tor Eyes Crowdfunding Campaign To Upgrade Its Hidden Services 106

apexcp writes The web's biggest anonymity network is considering a crowdfunding campaign to overhaul its hidden services. From the article: "In the last 15 months, several of the biggest anonymous websites on the Tor network have been identified and seized by police. In most cases, no one is quite sure how it happened. The details of such a campaign have yet to be revealed. With enough funding, Tor could have developers focusing their work entirely on hidden services, a change in developer priorities that many Tor users have been hoping for in recent years."
Canada

What the US Can Learn From Canada's Internet Policy 144

blottsie writes As the U.S. continues to debate how best to establish net neutrality regulations over Internet service providers, author and journalist Peter Nowak explains how how Canada has already dealt with these issues, and what the U.S. can learn from its neighbor to the north."[Canadian Prime Minister Stephen] Harper has made the connection between telecom policy and actual votes, and that has had enormous impact on public policy," says Michael Geist, the Canada Research Chair in internet and e-commerce law at the University of Ottawa. "This is a ballot-box or pocket-book issue that hasn't really been seen yet in the United States."
Biotech

Group Tries To Open Source Seeds 100

jenwike writes The Open Source Seed Initiative is a passionate group that wants to ensure their seeds are never patented, but making sure seeds are free for use and distribution by anyone isn't as easy as you might think. Part of the equation are plant characteristics, like an extended head on lettuce — is that an invention? Or, would you argue that it is the product of the collective sharing of material that improves the whole crop over time? In this report, one farmer says, "If you're not exchanging germplasm, you're cutting your own throat."
Government

Sweden Considers Adding "Sexism" Ratings To Video Games 642

An anonymous reader writes A government-funded agency in Sweden is considering creating special labels for video games based on whether or not the games' portrayals of women are sexist. From the article: "Avoiding sexism and gender stereotypes in video games produced in Sweden will become a key goal for the association, which has been given a 272,000 kronor ($36,672) grant by Sweden's government-funded innovation agency, Vinnova. Inspired by the Bechdel test, which looks at whether fictional films or books feature at least two women talking about a topic other than men, Dataspelsbranchen will work with several game developers to analyze how Swedish video games portray female characters and gender issues.
United States

State Department Joins NOAA, USPS In Club of Hacked Federal Agencies 54

Hot on the heels of recent cyber attacks on NOAA, the USPS, and the White House, the New York Times reports that the U.S. State Department has also suffered an online security breach, though it's not clear who to blame. “This has impacted some of our unclassified email traffic and our access to public websites from our main unclassified system,” said one senior State Department official, adding that the department expected its systems to be up soon. ....The breach at the White House was believed to be the work of hackers in Russia, while the breaches at NOAA and the Postal Service were believed to the work of hackers inside China. Attributing attacks to a group or nation is difficult because hackers typically tend to route their attack through compromised web servers all over the world. A senior State Department official said the breach was discovered after “activity of concern” was detected on portions of its unclassified computer system. Officials did not say how long hackers may have been lurking in those systems, but security improvements were being added to them on Sunday.
Crime

Ask Slashdot: Dealing With VoIP Fraud/Phishing Scams? 159

An anonymous reader writes I run the IT department for a medium-sized online retailer, and we own a set of marketing toll-free numbers that route to our VoIP system for sales. Yesterday we began receiving dozens and now hundreds of calls from non-customers claiming that we're calling out from our system and offering them $1 million in prizes and asking for their checking account details (a classic phishing scheme). After verifying that our own system wasn't compromised, we realized that someone was spoofing the Caller ID of our company on a local phone number, and then they were forwarding call-backs to their number to one of our 1-800 numbers. We contacted the registered provider of the scammer's phone number, Level3, but they haven't been able to resolve the issue yet and have left the number active (apparently one of their sub-carriers owns it). At this point, the malicious party is auto-dialing half of the phone book in the DC metro area and it's causing harm to our business reputation. Disabling our inbound 800 number isn't really possible due to the legitimate marketing traffic. Do you have any suggestions?
Networking

Can the US Actually Cultivate Local Competition in Broadband? 135

New submitter riskkeyesq writes with a link to a blog post from Dane Jasper, CEO of Sonic.net, about what Jasper sees as the deepest problem in the U.S. broadband market and the Internet in general: "There are a number of threats to the Internet as a system for innovation, commerce and education today. They include net neutrality, the price of Internet access in America, performance, rural availability and privacy. But none of these are the root issue, they're just symptoms. The root cause of all of these symptoms is a disease: a lack of competition for consumer Internet access." Soft landings for former legislators, lobbyists disguised as regulators, hundreds of thousands of miles of fiber sitting unused, the sham that is the internet provider free market is keeping the US in a telecommunications third-world. What, exactly, can American citizens do about it? One upshot, in Jasper's opinion (hardly disinterested, is his role at CEO at an ISP that draws praise from the EFF for its privacy policies) is this: "Today’s FCC should return to the roots of the Telecom Act, and reinforce the unbundling requirements, assuring that they are again technology neutral. This will create an investment ladder to facilities for competitive carriers, opening access to build out and serve areas that are beyond our reach today."
Supercomputing

US DOE Sets Sights On 300 Petaflop Supercomputer 127

dcblogs writes U.S. officials Friday announced plans to spend $325 million on two new supercomputers, one of which may eventually be built to support speeds of up to 300 petaflops. The U.S. Department of Energy, the major funder of supercomputers used for scientific research, wants to have the two systems – each with a base speed of 150 petaflops – possibly running by 2017. Going beyond the base speed to reach 300 petaflops will take additional government approvals. If the world stands still, the U.S. may conceivably regain the lead in supercomputing speed from China with these new systems. How adequate this planned investment will look three years from now is a question. Lawmakers weren't reading from the same script as U.S. Energy Secretary Ernest Moniz when it came to assessing the U.S.'s place in the supercomputing world. Moniz said the awards "will ensure the United States retains global leadership in supercomputing." But Rep. Chuck Fleischmann (R-Tenn.) put U.S. leadership in the past tense. "Supercomputing is one of those things that we can step up and lead the world again," he said.
AT&T

AT&T Stops Using 'Super Cookies' To Track Cellphone Data 60

jriding (1076733) writes AT&T Mobility, the nation's second-largest cellular provider, says it's no longer attaching hidden Internet tracking codes to data transmitted from its users' smartphones. The practice made it nearly impossible to shield its subscribers' identities online. Would be nice to hear something similar from Verizon.
Censorship

Former Police Officer Indicted For Teaching How To Pass a Polygraph Test 328

George Maschke (699175) writes On Friday afternoon, the U.S. Department of Justice announced the indictment (2.6 mb PDF) of Douglas Gene Williams, a 69-year-old former Oklahoma City police polygraphist turned anti-polygraph activist for teaching two undercover agents posing as federal law enforcement applicants how to pass (or beat) a polygraph test. Williams offers instruction on how to pass polygraph tests through his website, Polygraph.com, which remains online. Marisa Taylor of McClatchy, who has been covering polygraph policy issues for several years, has written an informative report. This appears to be a case where an individual was targeted for criminal prosecution to suppress speech that the U.S. government dislikes. AntiPolygraph.org, which may also have been the target of an attempted entrapment, has a commentary.
Government

Comcast Kisses-Up To Obama, Publicly Agrees On Net Neutrality 258

MojoKid writes Comcast is one of two companies to have earned Consumerist's "Worst Company in America" title on more than one occasion and it looks like they're lobbying for a third title. That is, unless there's another explanation as to how the cable giant can claim (with straight face) that it's in agreement with President Barack Obama for a free and open Internet. Comcast issued a statement of its own saying they back the exact same things, it just doesn't want to go the utility route. Comcast went on to list specific bullet points that they're supposedly in wholehearted agreement with, such as: Free and open Internet. We agree — and that is our practice. No blocking. We agree — and that is our practice. No throttling. We agree — and that is our practice. Increased transparency. We agree — and that is our practice. No paid prioritization. We agree — and that is our practice. Really? Comcast conveniently fails to address the giant elephant in the room whose name is Netflix. Earlier this year, Netflix begrudgingly inked a multi-year deal with Comcast in which the streaming service agreed to pay a toll to ensure faster delivery into the homes of Comcast subscribers, who prior to the deal had been complaining of frequent buffering and video degradation when watching content on Netflix. Comcast would undoubtedly argue that it's not a paid fast lane, but it's hard to see the deal as anything other than that.
The Almighty Buck

The Downside to Low Gas Prices 554

HughPickens.com writes Pat Garofalo writes in an op-ed in US News & World Report that with the recent drop in oil prices, there's something policymakers can do that will offset at least some of the negative effects of the currently low prices, while also removing a constant thorn in the side of American transportation and infrastructure policy: Raise the gas tax. The current 18.4 cent per gallon gas tax has not been raised since 1993, making it about 11 cents per gallon today, in constant dollars. Plus, as fuel efficiency has gotten better and Americans have started driving less, the tax has naturally raised less revenue anyway. And that's a problem because the tax fills the Highway Trust Fund, which is, not to put too fine a point on it, broke so that in recent years Congress has had to patch it time and time again to fill the gap. According to the Tax Policy Center's Howard Gleckman, if Congress doesn't make a move, "it will fumble one of those rare opportunities when the economic and policy stars align almost perfectly." The increase can be phased in slowly, a few cents per month, perhaps, so that the price of gas doesn't jump overnight. When prices eventually do creep back up thanks to economic factors, hopefully the tax will hardly be noticed.

Consumers are already starting to buy the sort of gas-guzzling vehicles, including Hummers, that had been going out of style as gas prices rose; that's bad for both the environment and consumers, because gas prices are inevitably going to increase again. According to data from the U.S. Energy Information Administration, taxes last year, even before the current drop in prices, made up 12 percent of the cost of a gallon of gasoline, down from 28 percent in 2000. And compared to other developed countries, US gas taxes are pretty much a joke. While we're at it, an even better idea, as a recent report from the Urban Institute makes clear, would be indexing the gas tax to inflation, so this problem doesn't consistently arise. "The status quo simply isn't sustainable, from an infrastructure or environmental perspective," concludes Garofalo. "So raise the gas tax now; someday down the line, it will look like a brilliant move."
The Courts

FCC Says Net Neutrality Decision Delay Is About Courts, Not Politics 60

blottsie writes with this news from The Daily Dot: "The Federal Communications Commission's seemingly suspicious timing in delaying its net neutrality decision has absolutely nothing to do with recent politics, according to an FCC official. Instead, it's a matter of some people in the agency insisting they be more prepared before going to court to defend their eventual plan. In January, the U.S. Court of Appeals in Washington, D.C., ruled in favor of Verizon, which challenged the FCC's 2010 Open Internet rules, striking down the agency's net neutrality protections. The court found that the FCC did not use the proper legal structure to establish its regulatory authority over broadband service—something that many legal experts say would not be the case if the FCC invokes Title II. The FCC's move to delay the net neutrality decision, which followed President Obama's support of Title II reclassification, was just a coincidence, according to the FCC official:" Before the president weighed in, several of our staff felt like the record was a little thin in areas, and the last thing you want when you go to court for the third time is for a court to say the record was too thin, or you didn't give adequate notice. We are going to be so careful this time that we have crossed every T and dotted every I. Some of the staff felt we're not quite there yet."
Censorship

Cameron Says People Radicalized By Free Speech; UK ISPs Agree To Censor Button 316

An anonymous reader writes with this excerpt from Techdirt: A few years ago, we mocked then Senator Joe Lieberman's request that internet companies put "report this content as terrorist content" buttons on various types of online content. The plan went nowhere, because it's a really bad idea, prone to massive abuse. Yet, over in the UK, some apparently think it's such a grand idea that they're actually moving forward with it. This isn't a huge surprise — the current UK government has been going on for quite some time about banning "extremist" content, and just recently ramped up such efforts. And now it appears that a bunch of big UK broadband access providers have agreed to play along: The UK's major Internet service providers – BT, Virgin, Sky and Talk Talk – have this week committed to host a public reporting button for terrorist material online, similar to the reporting button which allows the public to report child sexual exploitation. They have also agreed to ensure that terrorist and extremist material is captured by their filters to prevent children and young people coming across radicalising material.
Communications

81% of Tor Users Can Be De-anonymized By Analysing Router Information 136

An anonymous reader writes A former researcher at Columbia University's Network Security Lab has conducted research since 2008 indicating that traffic flow software included in network routers, notably Cisco's 'Netflow' package, can be exploited to deanonymize 81.4% of Tor clients. Professor Sambuddho Chakravarty, currently researching Network Anonymity and Privacy at the Indraprastha Institute of Information Technology, uses a technique which injects a repeating traffic pattern into the TCP connection associated with an exit node, and then compares subsequent aberrations in network timing with the traffic flow records generated by Netflow (or equivalent packages from other router manufacturers) to individuate the 'victim' client. In laboratory conditions the success rate of this traffic analysis attack is 100%, with network noise and variations reducing efficiency to 81% in a live Tor environment. Chakravarty says: 'it is not even essential to be a global adversary to launch such traffic analysis attacks. A powerful, yet non- global adversary could use traffic analysis methods [] to determine the various relays participating in a Tor circuit and directly monitor the traffic entering the entry node of the victim connection.'
United States

Department of Justice Harvests Cell Phone Data Using Planes 202

Tyketto writes The US Department of Justice has been using fake communications towers installed in airplanes to acquire cellular phone data for tracking down criminals, reports The Wall Street Journal. Using fix-wing Cessnas outfitted with DRT boxes produced by Boeing, the devices mimic cellular towers, fooling cellphones into reporting "unique registration information" to track down "individuals under investigation." The program, used by the U.S. Marshals Service, has been in use since 2007 and deployed around at least five major metropolitan areas, with a flying range that can cover most of the US population. As cellphones are designed to connect to the strongest cell tower signal available, the devices identify themselves as the strongest signal, allowing for the gathering of information on thousands of phones during a single flight. Not even having encryption on one's phone, like found in Apple's iPhone 6, prevents this interception. While the Justice Department would not confirm or deny the existence of such a program, Verizon denies any involvement in this program, and DRT (a subsidiary of Boeing), AT&T, and Sprint have all declined to comment.
Government

Internet Voting Hack Alters PDF Ballots In Transmission 148

msm1267 (2804139) writes Threats to the integrity of Internet voting have been a major factor in keeping the practice to a bare minimum in the United States. On the heels of the recent midterm elections, researchers at Galois, a computer science research and development firm in Portland, Ore., sent another reminder to decision makers and voters that things still aren't where they should be. Researchers Daniel M. Zimmerman and Joseph R. Kiniry published a paper called 'Modifying an Off-the-Shelf Wireless Router for PDF Ballot Tampering' that explains an attack against common home routers that would allow a hacker to intercept a PDF ballot and use another technique to modify a ballot before sending it along to an election authority. The attack relies on a hacker first replacing the embedded Linux firmware running on a home router. Once a hacker is able to sit in the traffic stream, they will be able to intercept a ballot in traffic and modify code strings representing votes and candidates within the PDF to change the submitted votes.
The Internet

No, You Can't Seize Country TLDs, US Court Rules 120

itwbennett writes A U.S. court has quashed an attempt to seize Iran's, Syria's and North Korea's domains as part of a lawsuit against those countries' governments. The plaintiffs in the case wanted to seize the domains after they successfully sued Iran, Syria and North Korea as state sponsors of terrorism. But the court found the domains have the nature of a contractual right, and ruled that rights arising under a contract cannot be seized as part of a judgment.
Privacy

Carmakers Promise Not To Abuse Drivers' Privacy 98

schwit1 provides this excerpt from an Associated Press report: "Nineteen automakers accounting for most of the passenger cars and trucks sold in the U.S. have signed onto a set of principles they say will protect motorists' privacy in an era when computerized cars pass along more information about their drivers than many motorists realize. The principles were delivered in a letter Wednesday to the Federal Trade Commission, which has the authority to force corporations to live up to their promises to consumers. Industry officials say they want to assure their customers that the information that their cars stream back to automakers or that is downloaded from the vehicle's computers won't be handed over to authorities without a court order, sold to insurance companies or used to bombard them with ads for pizza parlors, gas stations or other businesses they drive past, without their permission. The principles also commit automakers to 'implement reasonable measures' to protect personal information from unauthorized access." Also at the Detroit News. Adds schwit1: "It's a meaningless gesture without being codified into law. A greedy car manufacturer or NSL trumps any 'set of principles'." The letter itself (PDF) isn't riveting, but it's more readable than some such documents, and all the promises it makes are a good reminder of just how much data modern cars can collect, and all the ways that it can be passed on.
Advertising

Overbilled Customer Sues Time Warner Cable For False Advertising 223

An anonymous reader writes According to a lawsuit filed Friday in a New York court, when Jeremy Zielinski signed up for Time Warner Internet service after seeing an ad that it was $34.99 a month, he didn't expect his first bill to be more than $94. He didn't expect he'd have to fight for weeks to resolve it. And he didn't expect that, Time Warner's next step would be to sell him faster speeds, not bother to tell him his modem couldn't handle them, send him a bill anyway, then demand that he drive to the local office at his own expense to get a compatible modem. So he's taking the cable giant to court, accusing it of false advertising and deceptive business practices. While a lone individual fighting in court against the second largest cable company in the world certainly doesn't have the odds in his favor, this could get interesting. According to the complaint, he opted out of TWC's binding arbitration clause a few days after he opened his account, so he might have a shot of keeping this issue in real court. Stay tuned for more.
United States

Senate May Vote On NSA Reform As Soon As Next Week 127

apexcp writes Senate Majority Leader (for now) Harry Reid announced he will be taking the USA FREEDOM Act to a floor vote in the Senate as early as next week. While the bill, if passed, would be the first significant legislative reform of the NSA since 9/11, many of the act's initial supporters have since disavowed it, claiming that changes to its language mean it won't do enough to curb the abuses of the American surveillance state
EU

European Parliament Considers Sharing Passenger Information By Default 58

An anonymous reader writes The EU Passenger Name Record (PNR) proposal which was defeated in April of last year has returned to consideration in the European Parliament today. The law would require that airlines provide extensive personal details of anyone flying into or out of Europe. The information would include name, address, phone numbers, credit card information and travel itinerary. Director of Europol Rob Wainwright says that PNR is within the bounds of "reasonable measures" in the struggle against terrorism, and that possible threats against Europe have increased in the more than 12 months since the law was last rejected. Dutch MEP Sophie In't Veld is arguing that the Data Protection Directive should be put into place before any such systematized disclosure be ratified. "They want unlimited powers," she said. "they don't want to be bound by rules or data protection authorities and that's the reality."
The Internet

AT&T To "Pause" Gigabit Internet Rollout Until Net Neutrality Is Settled 308

An anonymous reader writes AT&T says it will halt its investment on broadband Internet service expansion until the federal rules on open Internet are clarified. "We can't go out and just invest that kind of money, deploying fiber to 100 cities other than these two million [covered by the DirecTV deal], not knowing under what rules that investment will be governed," AT&T Chief Randall Stephenson said during an appearance at a Wells Fargo conference, according to a transcript provided by AT&T. "And so, we have to pause, and we have to just put a stop on those kind of investments that we're doing today."
United States

Hacker Builds a Dark Net Version of the FBI Tip Form 41

Daniel_Stuckey writes A London-based programmer has set up a new hidden service for anyone using Tor to submit anonymous tips to the FBI. With the new .onion hidden service link, which accesses the FBI's tips page through a reverse proxy, Mustafa Al-Bassam told me in an IRC chat that he's engineered a "proof-of-concept," demonstrating how the bureau might go about setting up a more secure system for receiving crime tips.
China

How Baidu Tracked the Largest Seasonal Migration of People On Earth 48

KentuckyFC writes During the Chinese New Year earlier this year, some 3.6 billion people traveled across China making it the largest seasonal migration on Earth. These kinds of mass movements have always been hard to study in detail. But the Chinese web services company Baidu has managed it using a mapping app that tracked the location of 200 million smartphone users during the New Year period. The latest analysis of this data shows just how vast this mass migration is. For example, over 2 million people left the Guandong province of China and returned just a few days later--that's equivalent to the entire population of Chicago upping sticks. The work shows how easy it is to track the movement of large numbers of people with current technology--assuming they are willing to allow their data to be used in this way.
The Almighty Buck

Internet Sales Tax Bill Dead In Congress 257

jfruh writes: Last year, a bipartisan coalition helped get the Main Street Fairness Act approved by the U.S. Senate. The bill would have allowed state and local governments to collect sales taxes on Internet sales by companies in different jurisdictions. But House Speaker John Boehner, a longtime opponent of Internet taxes, won't bring the matter to a vote in the House before the end of the year, which should kill it for the immediate future.
Earth

U.S. and China Make Landmark Climate Deal 285

An anonymous reader writes: After extended talks on the issue of climate change, the U.S. and China have reached a landmark accord to curb emissions in the near future. The two countries are the top carbon polluters, so their actions are likely to have a major effect on world pollution levels and also set the standard for other countries. The agreement includes China's first-ever commitment to stop the growth of its emissions by 2030. They plan on shifting a big chunk of their energy production to renewables in that time. The U.S. agreed to emit 26-28% less carbon in 2025 than it did in 2005. Their efforts could spur greater enthusiasm for a new global climate agreement in 2015. Reader jones_supa adds details of another interesting part of the U.S.-China talks: Technology products look likely to gain more access to international markets as a result of upgrade between the U.S. and China on a 1996 tariff-eliminating trade agreement that President Obama announced Tuesday in Beijing. The agreement is expected to lower prices on a raft of new technology products by eliminating border tariffs — a price impact that's expected to be larger outside the United States, since U.S. tariffs on high-tech goods are generally lower than those overseas. "This is a win-win-win agreement for information and communication technology industries in the U.S., Europe, Japan and China, for businesses and consumers who purchase IT products and for the global economy."
The Internet

After Silk Road 2.0 Shutdown, Rival Dark Net Markets Grow Quickly 86

apexcp writes: A week ago, Silk Road 2.0 was theatrically shut down by a global cadre of law enforcement. This week, the dark net is realigning. "In the wake of the latest police action against online bazaars, the anonymous black market known as Evolution is now the biggest Dark Net market of all time. Today, Evolution features 20,221 products for sale, a 28.8 percent increase from just one month ago and an enormous 300 percent increase over the past six months."
Encryption

ISPs Removing Their Customers' Email Encryption 245

Presto Vivace points out this troubling new report from the Electronic Frontier Foundation: Recently, Verizon was caught tampering with its customer's web requests to inject a tracking super-cookie. Another network-tampering threat to user safety has come to light from other providers: email encryption downgrade attacks. In recent months, researchers have reported ISPs in the U.S. and Thailand intercepting their customers' data to strip a security flag — called STARTTLS — from email traffic. The STARTTLS flag is an essential security and privacy protection used by an email server to request encryption when talking to another server or client.

By stripping out this flag, these ISPs prevent the email servers from successfully encrypting their conversation, and by default the servers will proceed to send email unencrypted. Some firewalls, including Cisco's PIX/ASA firewall do this in order to monitor for spam originating from within their network and prevent it from being sent. Unfortunately, this causes collateral damage: the sending server will proceed to transmit plaintext email over the public Internet, where it is subject to eavesdropping and interception.
The Internet

FCC Confirms Delay of New Net Neutrality Rules Until 2015 127

blottsie writes: The Federal Communications Commission will abandon its earlier promise to make a decision on new net neutrality rules this year. Instead, FCC Press Secretary Kim Hart said, "there will not be a vote on open internet rules on the December meeting agenda. That would mean rules would now be finalized in 2015." The FCC's confirmation of the delay came just as President Barack Obama launched a campaign to persuade the agency to reclassify broadband Internet service as a public utility. Opensource.com is also running an interview with a legal advisor at the FCC. He says, "There will be a burden on providers. The question is, 'Is that burden justified?' And I think our answer is 'Yes.'"
Security

US Postal Service Suspends Telecommuting Following Massive Breach 50

An anonymous reader writes: The folks at the USPS have responded to the recent breach that exposed data on 800K employees and another some 2.8 million customers. They have suspended telecommuting for all employees until further notice while they replace their VPN with a more secure version. "Additionally, the postal service will upgrade some of its equipment and systems in the coming weeks and months as part of a broad security overhaul in response to the breach."
Privacy

Police Body Cam Privacy Exploitation 301

blindbat writes: A new YouTube account is pushing local police agencies to reconsider their use of body-mounted cameras. Poulsbo Police have been wearing body cameras for about a year, and the department says the results have been good. But last month reality hit, in the form of a new YouTube user website, set up by someone under the name, "Police Video Requests." The profile says it posts dash and body cam videos received after public records requests to Washington state police departments. "They're just using it to post on the internet," said Chief Townsend, "and I suspect it's for commercial purposes." In September, "Police Video Requests" anonymously asked Poulsbo PD for every second of body cam video it has ever recorded. The department figures it will take three years to fill that request. And Chief Townsend believes it is a huge privacy concern, as officers often see people on their worst days. "People with mental illness, people in domestic violence situations; do we really want to have to put that video out on YouTube for people? I think that's pushing it a little bit," he said.
GNOME

GNOME Project Seeks Donations For Trademark Battle With Groupon 268

Drinking Bleach writes Groupon has released a tablet-based point of sale system called Gnome, despite the well-known desktop environment's existence and trademark status. This is also not without Groupon's internal knowledge of the GNOME project; they were contacted about the infringement and flatly refused to change the name of their own product, in addition to filing many new trademark applications for theirs. The GNOME project is seeking donations to help them in a legal battle against these trademark applications, and to get Groupon to stop using their name. They are seeking at least $80,000 to challenge a first set of ten trademark applications from Groupon, out of 28 applications that have been filed.

Slashdot Top Deals