Psychotic_Wrath writes "The Salt Lake Police department will be much more transparent with their law enforcement. A program is being rolled out to require officers wear glasses equipped with a camera to record what they see. Of course, there are several officers opposed to this idea, who will resist the change. One of the biggest shockers to me is that the police chief is in strong support of this measure: 'If Chief Burbank gets his way, these tiny, weightless cameras will soon be on every police officer in the state.' With all the opposition of police officers being recorded by citizens that we are seeing throughout the country, it is quite a surprise that they would make a move like this. The officers would wear them when they are investigating crime scenes, serving warrants, and during patrols. Suddenly Utah isn't looking like such a bad place to be. Now we just need to hope other states and departments would follow suit. It sure will be nice when there is video evidence to show the real story."
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's now on IFTTT. Check it out! Check out the new SourceForge HTML5 Internet speed test! ×
sfcrazy writes "Samsung is clearly accusing Hogan in its recent filing of influencing the jury in favor of Apple. Samsung said in its filing: 'Mr. Hogan's own statements to the media suffice if such a showing is required. Once inside the jury room, Mr. Hogan acted as a "de facto technical expert" who touted his high-tech experience to bring the divided jury together. Contrary to this Court's instructions, he told other jurors incorrectly that an accused device infringes a utility patent unless it is "entirely different"; that a prior art reference could not be invalidating unless that reference was "interchangeable"; and that invalidating prior art must be currently in use. He thus failed "to listen to the evidence, not to consider extrinsic facts, [and] to follow the judge's instructions."'"
An anonymous reader writes "On the opening day of a patent trial between Microsoft and Google-owned Motorola Mobility, Motorola filed a brief (PDF) arguing that the WiFi tech central to the case is also critical to Microsoft's new Surface tablet. Motorola says royalties totaling 2.25% of all Surface revenues is a good starting point. They wrote, 'Microsoft's new Surface tablet will use only 802.11, instead of cellular or wired connections, to connect to the internet. Without 802.11 capability, the Surface tablet would be unable to compete in the market, because consumers can readily select tablet devices other than the Surface that have 802.11 capability.' Microsoft, of course, says this figure is outrageous, given 'Motorola's promise to standards bodies to offer access to the "standard essential" patents on fair and reasonable terms.'"
An anonymous reader writes "Certain iPhone and iPad applications from a Japanese company have broken software piracy detection mechanisms that are sending out tweets on the user's own Twitter account, saying, 'How about we all stop using pirated iOS apps? I promise to stop. I really will. #softwarepirateconfession.' The trouble is, it's sending these out on accounts of users who actually paid up to $50 or more for the software and who are legally using it. The app is asking for access to users' Twitter accounts, but does not give the reason why it is asking, so the author of the article concluded (rightly) that things were being done deliberately. Would you want your legally purchased software to send out messages to all of your contacts on Twitter or on other social networks saying that you were a software pirate? Would you excuse the writers of the software if it was just an error in their piracy detection measures?"
SternisheFan writes with news that Google has updated is Transparency Report for the sixth time, and the big takeaway this time around is a significant increase in government surveillance. From the article: "In a blog post, Google senior policy analyst Dorothy Chou says, ' [G]overnment demands for user data have increased steadily since we first launched the Transparency Report.' In the first half of 2012, the period covered in the report, Chou says there were 20,938 inquiries from government organizations for information about 34,614 Google-related accounts. Google has a long history of pushing back against governmental demands for data, going back at least to its refusal to turn over search data to the Department of Justice in 2005. Many other companies have chosen to cooperate with government requests rather than question or oppose them, but Chou notes that in the past year, companies like Dropbox, LinkedIn, Sonic.net and Twitter have begun making government information requests public, to inform the discussion about Internet freedom and its limits. According to the report, the U.S. continues to make the most requests for user data, 7,969 in the first six months of the year. Google complied with 90% of these requests. Google's average compliance rate for the 31 countries listed in the report is about 47%."
New submitter patella.whack writes "A guilty plea for six counts of selling counterfeit media gets a defendant 15 years in Mississippi. An undercover reporter from the Attorney General's Intellectual Property Theft Task Force managed to buy a total of five copied movies and one music CD from the defendant, who had 10,500 pirated discs at home and two prior convictions: one for assaulting a police officer 17 years ago and one for CD piracy that got him a year under house arrest. Says the RIAA: '[This] highlights the fact that the individuals engaging in these activities are frequently serial criminals for whom IP theft is simply the most convenient and profitable way they could steal from others.' Frequently serial criminals? 15 years? I wonder how much of his sentence can be attributed to his priors rather than to other factors."
An anonymous reader writes "Back in April, we discussed how the 1986 Electronic Communications Privacy Act says email that has resided on a server for more than six months can be considered abandoned. The recent investigation of General Petraeus brings this issue to light again, and perhaps to a broader audience. Under current U.S. law, federal authorities need only a subpoena approved by a federal prosecutor — not a judge — to obtain electronic messages that are six months old or older. Do you know anyone these days who doesn't have IMAP accounts with 6+-month-old mail on them?"
According to a story at Northwest Public Radio, the state of Virginia's board of education has decided to institute different passing scores for standardized tests, based on the racial and cultural background of the students taking the test. Apparently the state has chosen to divide its student population into broad categories of black, white, Hispanic, and Asian — which takes painting with a rather broad brush, to put it mildly. From the article (there's an audio version linked as well): "As part of Virginia's waiver to opt out of mandates set out in the No Child Left Behind law, the state has created a controversial new set of education goals that are higher for white and Asian kids than for blacks, Latinos and students with disabilities. ... Here's what the Virginia state board of education actually did. It looked at students' test scores in reading and math and then proposed new passing rates. In math it set an acceptable passing rate at 82 percent for Asian students, 68 percent for whites, 52 percent for Latinos, 45 percent for blacks and 33 percent for kids with disabilities." (If officially determined group membership determines passing scores, why stop there?) Florida passed a similar measure last month.
theodp writes "GeekWire's Taylor Soper reports that the University of Washington has capped live sports coverage at 20 Tweets per basketball game (45 for football) and threatens to revoke the credentials of journalists who dare exceed the Twitter limits. Tacoma News Tribune reporter Todd Dybas was reportedly 'reprimanded' after drawing the ire of the UW Athletic Dept. for apparently Tweeting too much during UW's 85-63 Sunday win over Loyola."
New submitter thn writes "John McAfee, who started the antivirus software giant named after him, has been accused of murder in Belize and is wanted. McAfee had taken to 'posting on a drug-focused Russian message board...about his attempts to purify the psychoactive compounds colloquially known as "bath salts,"' Gizmodo wrote. The scariest aspect of this story may be the fact that an entire lab was constructed for John McAfee's research purposes. Because of his efforts to extract chemicals from natural chemical plans McAfee was able to justify his experiments in a country that is largely unregulated."
hypnosec writes "Kim Dotcom has revealed that Megaupload's successor, Mega, which is reportedly launching on January 20, 2013, will be operating through a new domain name: Mega.co.nz. Through a tweet Dotcom announced that Mega has found a new home and that the new domain name is protected by the law. Dotcom also revealed that lobbyists won't be able to do anything about this, as 'judges are not influenced by politics in New Zealand.' Recent announcements about Mega's domain — Me.ga — didn't go as planned following a decision by the Government of Gabon to suspend the domain name. Dotcom had announced at the time that despite the blockage, Mega would launch as planned."
Hugh Pickens writes "The WSJ reports that widespread disruptions to Google in China over the weekend, halting use of everything from Google's search engine to its Gmail email service to its Google Play mobile-applications store, underscore the uncertainty surrounding Beijing's effort to control the flow of information into the country, as well as the risks that effort poses to the government's efforts to draw global businesses. The source of the disruptions couldn't be determined, but Internet experts pointed to China's Internet censorship efforts, which have been ratcheted up ahead of the 18th Party Congress. 'There appears to be a throttling under way of Web access,' says David Wolf, citing recent articles in foreign media about corruption and wealth in China spurred by the party congress and the fall of former party star Bo Xilai, 'that's their primary concern, people getting news either through Google or through its services.' Beijing risks a backlash if it were to block Google outright on a long-term basis, says Wolf and such a move could put Beijing in violation of its free-trade commitment under the World Trade Organization and make China a less-attractive place to do business. 'If China insists in the medium and long term of creating another Great Firewall between the China cloud and the rest of the world, China will be an increasingly untenable place to do business.'"
Barence writes "A British man has been arrested for posting a picture of a burning poppy on Facebook. The poppy is a symbol of remembrance for those who died in war, and the arrest was made on Remembrance Sunday. 'A man from Aylesham has tonight been arrested on suspicion of malicious telecommunications,' Kent police said in a statement after the arrest. 'This follows a posting on a social network site of a burning poppy. He is currently in police custody awaiting interview.' The arrest has been criticized by legal experts. 'What was the point of winning either World War if, in 2012, someone can be casually arrested by @Kent_police for burning a poppy?' tweeted David Allen Green, who helped clear the British man who was prosecuted for a joke tweet threatening to blow up an airport."
Sparrowvsrevolution writes "Since 2008, Dallas, Texas attorney Erich Spangenberg and his company TQP have been launching suits against hundreds of firms, claiming that merely by using SSL, they've violated a patent TQP acquired in 2006. Nevermind that the patent was actually filed in 1989, long before the World Wide Web was even invented. So far Spangenberg's targets have included Apple, Google, Intel, Dell, Hewlett-Packard, every major bank and credit card company, and scores of web startups and online retailers, practically anyone who encrypts pages of a web sites to protect users' privacy. And while most of those lawsuits are ongoing, many companies have already settled with TQP rather than take the case to trial, including Apple, Amazon, Dell, and Exxon Mobil. The patent has expired now, but Spangenberg can continue to sue users of SSL for six more years and seems determined to do so as much as possible. 'When the government grants you the right to a patent, they grant you the right to exclude others from using it,' says Spangenberg. 'I don't understand why just because [SSL is] prevalent, it should be free.'"
jjp9999 writes "Nextgov reports, 'The Homeland Security Department has commissioned Accenture to test technology that mines open social networks for indications of pandemics, according to the vendor.' This will kick off a year-long biosurveillance program, costing $3 million, that will log trends in public health by looking through public posts. This ties back to White House guidelines released in July that ask federal agencies to 'Consider social media as a force multiplier that can empower individuals and communities to provide early warning and global situational awareness.'"
chicksdaddy writes "We hear a lot about vulnerabilities in industrial control system (ICS) software. But what about real evidence of compromised SCADA and industrial control systems? According to security researcher Michael Toecker, a consultant at the firm Digital Bond, the evidence for infected systems with links to industrial automation and control systems is right under our eyes: buried in public support forums. Toecker audited support sites like bleepingcomputer.com, picking through data dumps from free malware scanning tools like HijackThis and DDS. He found scans of infected systems that were running specialized ICS software like Schweitzer Engineering Labs (SEL) AcSELerator Software and GE Power's EnerVista Software (used to configure GE electric power protection products). The infected end user systems could be the pathway to compromising critical infrastructure, including electrical infrastructure. 'With access to a protection relay through a laptop, a malicious program could alter settings in the configuration file, inject bad data designed to halt the relay, or even send commands directly to the relay when a connection was made,' Toecker wrote."
An anonymous reader writes "HTC and Apple have reached a global settlement that includes the dismissal of all current lawsuits and a ten-year license agreement. The license extends to current and future patents held by both parties. The terms of the settlement are confidential. From the article: '"HTC is pleased to have resolved its dispute with Apple, so HTC can focus on innovation instead of litigation," Peter Chou, HTC's chief executive, said in a statement. Tim Cook, Apple's chief executive, also expressed relief in a statement. "We will continue to stay laser focused on product innovation," he said.'"
MojoKid writes "Nike+ FuelBand is a $149 wristband with LED display that tracks your daily activity, tells you how many calories you've burned, lets you know how much fuel you have left in the tank, and basically keeps track of 'every move you make.' If you think that sounds like a privacy nightmare waiting to happen, it pretty much is. A source directly connected to Nike reported an amusing, albeit startling anecdote about a guy who got caught cheating on his girlfriend because of the Nike+ FuelBand. 'They shared their activity between each other and she noticed he was active at 1-2AM, when he was supposed to be home.' That's just one scenario. What if the wristband gets lost or stolen? How much data is actually stored on these sorts of devices? And remember, you're syncing it to the cloud with an iOS or Android app."
An anonymous reader writes "A man has initiated a class-action suit against Blizzard over a product used to shore up Battle.net security. Benjamin Bell alleges that Blizzard's sale of Authenticators — devices that enable basic two-tier authentication — represents deceptive and unfair additional costs to their basic games. (Blizzard sells the key fob versions for $6.50, and provides a free mobile app as an alternative. Neither are mandatory.) The complaint accuses Blizzard of making $26 million in Authenticator sales. In response, Blizzard made a statement refuting some of the complaint's claims and voicing their intention to 'vigorously defend' themselves."
WOOFYGOOFY writes "The NY Times and Voice Of America are reporting on a study by the U.S. National Research Council (PDF) which was released Friday linking global climate change to national security. The report, which was developed at the request of the C.I.A., characterizes the threats posed by climate change as 'similar to and in many cases greater than those posed by terrorist attacks. 'Climate-driven crises could lead to internal instability or international conflict and might force the United States to provide humanitarian assistance or, in some cases, military force to protect vital energy, economic or other interests, the study said.' If the effect of unaddressed climate change is the functional equivalent of terrorist attacks on the nation, does the Executive Branch, as a matter of national security, have a duty and a right to begin to act unilaterally against climate change irrespective of what Congress currently believes?"