×
Communications

Competition To Identify Sexual Predators In Chat Logs 273

An anonymous reader writes "Researchers from the University of Lugano, Switzerland, and other universities from the U.S. and Europe organize a competition to automatically identify sexual predators in chat logs. The task is described as: 'The goal of this sub-task is to identify classes of authors, namely online predators. You will be given chat logs involving two (or more) people and have to determine who is the one trying to convince the other participants(s) to provide some sexual favor. You will also need to identify the particular conversation where the person exploits his bad behavior.' Their data set covers hundreds of chat logs with dozens of true positives (i.e., chats where one is trying to hit on another)."
Government

The Politics of the F.D.A. 238

A fight over posting calorie counts for popcorn is just one example of the clash between the White House and the agency charged with protecting public health. Dr. Margaret A. Hamburg, the F.D.A. commissioner, was forced to scrap plans to have calorie counts posted for foods served in movie theaters and on airplanes after a phone call from the White House deputy chief of staff in 2010. From the article: "White House officials describe their disagreements with the F.D.A. as part of the normal, constructive give-and-take over policy that has never undermined the agency’s mission. 'Under President Obama’s leadership, the Food and Drug Administration has new authority and resources to help stop kids from smoking, protect our food supply and approve more affordable prescription drugs,' said the White House press secretary, Jay Carney. The administration also views the agency’s hostility to its oversight as hopelessly naïve, given a 24-hour news cycle and a ferocious political environment that punishes any misstep. 'They want a world that doesn’t exist anymore,' an administration official said."
Censorship

Swedish Researchers Expose China's Tor-Blocking Tricks 73

An anonymous reader writes "A pair of researchers at Karlstad University have been able to establish how the Great Firewall of China sets about blocking unpublished Tor bridges. The GFC inspects web traffic looking for potential bridges and then attempts 'to speak Tor' to the hosts. If they reply, they're deemed to be Tor bridges and blocked. While this looks like another example of the cat and mouse game between those wishing to surf the net anonymously and a government intent on curtailing online freedoms, the researchers suggest ways that the latest blocking techniques may be defeated."
United States

Supreme Court Approves Strip Searches For Any Arrestable Offense 747

sl4shd0rk writes "Taking a page out of the TSA handbook, the Supreme Court has voted to allow strip searches for any offense, no matter how minimal. The article cites these two tidbits from Justice Anthony Kennedy: 'Every detainee who will be admitted to the general [jail or prison] population may be required to undergo a close visual inspection while undressed,' and 'Maintaining safety and order at detention centers requires the expertise of correctional officials.'"
Security

UK Proposing Real-Time Monitoring of All Communications 145

An anonymous reader writes "In response to a plans to introduce real time monitoring of all UK Internet communications, a petition has been set up in opposition." Previously covered here, El Reg chimes in with a bit of conspiracy theorizing and further analysis: "It would appear that the story is being managed: the government is looking to make sure that CCDP is an old news story well ahead of the Queen's Speech to Parliament on 9 May. Sundays — especially Sunday April the 1st — are good days to have potentially unpopular news reach the population at large."
Privacy

UK Police Investigate Alleged Phorm Lunch With Officer 46

twoheadedboy writes "City of London Police are looking into claims one of its officers was given hospitality by Phorm months before the Crown Prosecution Service (CPS) decided to not take the company or BT, which was using the software, to court. BT was trialling Phorm, which uses uses cookies to build a profile of users' habits and interests based on websites they visit, in 2006 and 2007, attracting the scorn of privacy campaigners. After much back and forth, the CPS dropped the case in April 2011. Now, privacy campaigner Alex Hanff, who discovered a document appearing to show an officer had been taken to lunch by Phorm in 2010, wants the case to be reopened."
Australia

Bill Introduced To Ban Sale of MA15+ Games To Anyone Under 18 in SA 161

dotarray writes "The introduction of an R18+ rating for video games into Australia has been designed to bring game classification in line with the current system in place for films and other media. One state, however, would like to widen that gap." This is being billed (by John Rau's office) as a saner approach than eliminating the MA15+ rating entirely.
Google

Oracle and Google Settlement Talks Falter; Trial Set for April 16 118

Fluffeh writes "Recently, a Judge ordered Oracle and Google to have yet another sit down and chat, but these talks have come to an impasse: 'Despite their diligent efforts and those of their able counsel, the parties have reached an irreconcilable impasse in their settlement discussions,' Judge Paul Grewal of US District Court for the Northern California wrote Monday. 'No further conferences shall be convened. The parties should instead direct their entire attention to the preparation of their trial presentations. Good luck.'"
Censorship

More Fuel For Facebook Censorship Advocates In India 122

thodelu writes "Close on the heels of Friday's communal clashes in a town in India that were triggered by a Facebook post which contained morphed images apparently deriding a religious place of worship, there has been another incident. City police have removed images from another similar blog post citing 'cyber criminal' laws. There has been an ongoing effort in India to censor the web which would get more backing as a result of these events. Could we be seeing another Great Firewall of China?"
Music

Despite Drop In Piracy, French Music Industry Still In Decline 272

New submitter Hentes writes "France has one of the strictest anti-piracy laws. After 17 months of operation, Hadopi has released a report, claiming that illegal P2P downloads have been reduced significantly in the country: the studies they cite measured 43% and 66% decrease in copyright infringement. But that huge amount of 'lost revenue' doesn't seem to show up in the French recording industry, as the overall recorded music market has decreased by 3.9% in 2011. Even more interesting is that digital music sales have skyrocketed in France. Could it be that it's not piracy killing the traditional recording industry but digital distribution?"
Privacy

Many Police Departments Engage in Warrantless Cell Phone Tracking 85

alphadogg writes with a distressing bit of analysis of the training materials acquired by the ACLU last week. From the article: "Many law enforcement agencies across the U.S. track mobile phones as part of investigations, but only a minority ask for court-ordered warrants, according to a report released Monday by the American Civil Liberties Union. More than 90 law enforcement agencies said they track mobile phones during investigations, but only six reported receiving court-approved warrants after demonstrating that there's probable cause of a crime, according to an ACLU report based on public information requests filed by the group last year." The ACLU has a handy page allowing you to see if your local PD engages in such practices.
Iphone

World's Creepiest iPhone App Pulled After Outcry 459

Hugh Pickens writes "Ben Grubb reports that an iPhone app that essentially allowed users to stalk women nearby using a location-based social networking service has been pulled from the iTunes app store by its developer after an outcry of criticism including a comment by Gizmodo labelling the 'Girls Around Me' app as the 'world's creepiest' app and a comment in The New York Times Bits blog, which said it 'definitely' won the prize for being 'too creepy'. The 'Girls Around Me' app utilized publicly available data to show a map with women who had checked-in to locations nearby using Foursquare and let users view Facebook information of those ladies if they had tied their Facebook account to their Foursquare account and if their Facebook account privacy settings were lax enough to allow any user to access it. The promotional website used for marketing the app states that the service 'helps you see where nearby girls are checking in, and shows you what they look like and how to get in touch, adding 'In the mood for love, or just after a one-night stand? Girls Around Me puts you in control! Reveal the hottest nightspots, who's in them, and how to reach them.' Foursquare yanked the Girls Around Me app's access to its data, which in turn led to the app's developer removing it from iTunes as it didn't work properly. In a statement to the Wall Street Journal, the company behind the app defended its creation: 'Since the app's launch till last Friday nobody ever raised a privacy concern because, again, it is clearly stated that Girls Around Me cannot show the user more data than [what Foursqure or Facebook] already does.'"
Security

Up To 1.5 Million Visa, MasterCard Credit Card Numbers Stolen 189

An anonymous reader writes "Global Payments, the U.S.-based credit card processor company that experienced a security breach affecting Visa and MasterCard, confirmed that the breached portion of its processing system was confined to North America. The company also finally revealed how many credit card numbers were stolen: around 1,500,000."
EU

Apple Is Forced By EU To Give 2 Years Warranty On All Its Products 270

dsmalle writes "Apple has adapted its warranty to cover 2 years, under pressure of the European Union and after European consumer organizations sued Apple. From the article: 'The warranty conditions have been changed and these changes can be found on the website of Apple. Products that are purchased on the website of the manufacturer or in stores are now under warranty for two years, as it is required by the EU warranty guidelines. However, the warranty for Apple products that have been purchased elsewhere will not change and they will only be given a limited one-year warranty.'"
The Courts

Federal Judge Rules P2P Users Aren't In a Conspiracy 66

Fluffeh writes "Judge Holderman ruled against copyright holders who were trying to paint a rather distorted picture. They sue just one Internet user, but use that lawsuit as a pretext to subpoena other defendants who had participated in the same BitTorrent swarm. The plaintiffs in these lawsuits claim that the other users had participated in a "conspiracy" to assist one another in distributing particular copyrighted works. Because the copyright holder's threat is based on the cost of litigation (and risk of public embarrassment — as this is a tactic used increasingly by the pron industry) more so than the damages a defendant would face in the event of a loss, innocent defendants have virtually as much incentive to settle as guilty ones do. That's not how things are supposed to work, and more and more judges are refusing to play along. Coupled with recent rulings in Florida, the copyright holders seem to be finding less and less favor with judges."
Electronic Frontier Foundation

EFF Files Brief To Allow Users Access To Their MegaUpload Files 60

Fluffeh writes "The EFF has filed a brief in Federal Court on behalf of Kyle Goodwin (and potentially millions of other users) so that he can access his legally sound backup files. 'Goodwin is a local high school sports reporter and the sole proprietor of the company OhioSportsNet, who stored his video footage on Megaupload.com as a backup to his video library on his hard drive. He had paid €79.99 (about $107) for a two-year premium membership. Just days before the government seized the site, Goodwin's hard drive crashed. The brief states that his lost videos include footage to make highlight reels for parents to send to their children's prospective colleges, and an unfinished full-length documentary about the Strongsville girls soccer team's season.' According to the EFF, authorities told Carpathia (the hosting company that MegaUpload was using to host their content to the tune of $9,000 a day) that after it was done examining the servers and had copied portions of the data, the hosting company could delete the files and re-purpose its servers. Carpathia noted in a statement last week that it would like to allow Megaupload users to recover their data, but has struggled to find a way to do so."
Privacy

ACLU Obtains Cell Phone Tracking Training Materials 33

guttentag writes "The New York Times has published a large collection of law enforcement training documents obtained by the ACLU. The documents describe in detail what kind of information can be obtained from cell phones and cell phone carriers, and how to obtain it. The 189-page PDF also contains dozens of invoices from the major carriers for their services to law enforcement that describe the fees for those services."
Crime

Forensic Experts Say Screams Were Not Zimmerman's 1046

Hugh Pickens writes "As the Trayvon Martin controversy splinters into a debate about self-defense, a central question remains: Who was heard crying for help on a 911 call in the moments before the teen was shot? Now the Orlando Sentinel reports that Tom Owen, a leading expert in the field of forensic voice identification sought to answer that question by analyzing the recordings. His result: It was not George Zimmerman who called for help. Owen, forensic consultant for Owen Forensic Services LLC and chair emeritus for the American Board of Recorded Evidence, used voice identification software to rule out Zimmerman. Another expert contacted by the Sentinel, utilizing different techniques, came to the same conclusion. Owen used software called Easy Voice Biometrics to compare Zimmerman's voice to the 911 call screams. 'I took all of the screams and put those together, and cut out everything else,' says Owen. The software compared that audio to Zimmerman's voice and returned a 48 percent match. Owen says to reach a positive match with audio of this quality, he'd expect higher than 90 percent. Owen cannot confirm the voice as Trayvon's, because he didn't have a sample of the teen's voice to compare however 'you can say with reasonable scientific certainty that it's not Zimmerman.'"
Government

Exclusive Look at FBI's New Sentinel System 27

gManZboy writes "Six years and $450 million into the project, the FBI's Sentinel case-management system appears to be almost ready for deployment. Sentinel aims to replace a hodge-podge of digital and paper processes with purely digital workflows, helping FBI agents collaborate and "connect the dots" on investigations. The question now is how well the problem-plagued system will live up to those expectations. FBI CIO Chad Fulgham demonstrated Sentinel for InformationWeek on March 28, the first time the agency has shown its new case-management system to an outsider. 'This isn't just a case-management system. It's a great platform to grow on,' Fulgham said during the demo at FBI headquarters. The agency's IT team plans to move other apps over to Sentinel, giving them a similar look and feel on the same underlying hardware."

Slashdot Top Deals