netbuzz writes "Forging ahead with an initiative that proved controversial when introduced last year, the Electronic Frontier Foundation and nine other groups today are advancing the Open Wireless Movement to encourage ubiquitous sharing of Internet access. 'We envision a world where sharing one's Internet connection is the norm,' said EFF Activist Adi Kamdar, in a press release. 'A world of open wireless would encourage privacy, promote innovation, and benefit the public good, giving us network access whenever we need it. And everyone — users, businesses, developers, and Internet service providers — can get involved to help make it happen.'"
Migrate from GitHub to SourceForge quickly and easily with this tool. Check out all of SourceForge’s recent improvements.×
coondoggie writes "In one of the photos, the dark-haired, bearded hacker is peering into his computer's screen, perhaps puzzled at what's happening. Minutes later, he cuts his computer's connection, realizing he has been discovered. In an unprecedented move, the country of Georgia — irritated by persistent cyber-spying attacks — has published two photos of a Russia-based hacker who, the Georgians allege, waged a persistent, months-long campaign that stole confidential information from Georgian government ministries, parliament, banks and NGOs."
sfcrazy writes "Ubuntu 12.10 met with some controversy before and after its launch about the inclusion of Amazon product listings alongside local search results. Now, the Electronic Frontier Foundation has raised concerns around data leaks and Amazon Ads. The EFF has asked Canonical to update Ubuntu so it disables 'Include online search results' by default. 'Users should be able to install Ubuntu and immediately start using it without having to worry about leaking search queries or sending potentially private information to third party companies. Since many users might find this feature useful, consider displaying a dialog the first time a user logs in that asks if they would like to opt-in.'"
Qedward writes "France may introduce a law to make Google pay to republish news snippets if it doesn't strike a deal with French news publishers before the end of the year, the office of French President François Hollande said. French publishers want to share in the revenue that Google earns from advertising displayed alongside their news snippets in search results. Readers are often satisfied by reading the headline and summary published by Google News, and don't feel the need to click through to the news site, the publishers say. In this way, Google profits and the content creators don't. The publishers want to be able to charge Google to compensate them for ad revenue losses."
Presto Vivace writes "Murdoch's Pirates is a business book that reads like a thriller. The chapter excerpted in the Sydney Morning Herald explains how Operation Duck, an effort to discover the identify Canadian pay TV pirates, went horribly wrong. 'By October 25 Oliver had been in Toronto four days and had programmed a swag of pirate cards, using a program he had ripped off another pirate hack. And he had been paid a lot of money. That evening, he met with two piracy dealers in a car and programmed a few cards for them with his portable programmer box, to demonstrate that it worked. The following night Oliver received a call from a friend in London, a partner in his old piracy ring, who was sleeping with a woman who worked for Federal Express. 'He told me, these guys [from the previous night] sent a parcel to Larry Rissler,' Oliver recalls. Rissler was a former FBI agent who headed the Office of Signal Integrity—the operational security division—of DirecTV, and he had been hunting Oliver for some time. One of the dealers Oliver had met was a Rissler informant and he had despatched a re-programmed smartcard by FedEx to his boss. The parcel would be with Rissler early the next morning—if it wasn't already there.' The story reads like some perverse blend of James Bond and the Pink Panther. It is just amazing."
eldavojohn writes "Inside the land of the Great Firewall censorship is rampant although rarely transparent. Foreign Policy has a lengthy but eyeopening recounting of what it's like being an editor for the only officially sanctioned English business publication inside the most populated country on Earth. Eveline Chao of the magazine 'China International Business' writes in her piece 'Me and My Censor' about her censor named Snow, the three taboo T's (Taiwan, Tibet, and Tiananmen), a bizarre government aversion to flags and how she was 'offered red envelopes stuffed with cash at press junkets, sometimes discovered footprints on the toilet seats at work, and had to explain to the Chinese assistants more than once that they could not turn in articles copied word for word from existing pieces they found online.' Anecdotes abound in this piece including the story of a photojournalist who 'once ran a picture he'd taken in Taiwan alongside an article, but had failed to notice a small Taiwanese flag in the background. As a result, the entire staff of his newspaper had been immediately fired and the office shut down.' " (Read more, below.)
An anonymous reader writes "The Federal Bureau of Investigation (FBI) is finally stepping up its game when it comes to hackers. Maybe it was Anonymous that did it or maybe it was statements from the US Secretary of Defense two weeks ago, but either way, the FBI is now hunting hackers 24/7." I'm happy that the FBI no longer has an investigation schedule when it comes to online crime, but I have to think that I'm not the only one who assumed they were doing this before.
concealment writes "A month before the controversial 'six strikes' anti-piracy plan goes live in the U.S., the responsible Center of Copyright Information (CCI) is dealing with a small crisis. As it turns out the RIAA failed to mention to its partners that the 'impartial and independent' technology expert they retained previously lobbied for the music industry group. In a response to the controversy, CCI is now considering whether it should hire another expert to evaluate the anti-piracy monitoring technology."
wiredmikey writes "When delegates gather in Dubai in December for an obscure UN agency meeting, the mother of all cyber diplomatic battles is expected, with an intense debate over proposals to rewrite global telecom rules to effectively give the United Nations control over the Internet. Russia, China and other countries back a move to place the Internet under the authority of the International Telecommunications Union (ITU), a UN agency that sets technical standards for global phone calls. While US officials have said placing the Internet under UN control would undermine the freewheeling nature of cyberspace, some have said there is a perception that the US owns and manages the Internet. The head of the ITU, Hamadoun Toure, claims his agency has 'the depth of experience that comes from being the world's longest established intergovernmental organization.' But Harold Feld of the US-based non-government group Public Knowledge said any new rules could have devastating consequences. Some are concerned over a proposal by European telecom operators seeking to shift the cost of communication from the receiving party to the sender. This could mean huge costs for US Internet giants like Facebook and Google."
kyriacos writes "The Greek government is charging journalist Kostas Vaxevanis with violation of the data privacy law for publishing a list of about 2,000 Greeks who hold accounts with the HSBC bank in Switzerland. While more and more austerity measures are being taken against the people of Greece, there is still no investigation of tax evasion for the people on this list by the government. The list has been in the possession of the Greek government since 2010."
wiredmikey writes "Canada and the United States announced Friday they were launching a joint cybsersecurity plan that aims to better protect critical digital infrastructure and improve the response to cyber incidents. Under the action plan, the US Department of Homeland Security and Public Safety Canada will cooperate to protect vital cyber systems and respond to and recover from any cyber disruptions, by improving collaboration on managing cyber incidents between their respective cyber security operation centers, enhancing information sharing and engagement with the private sector and pursuing US-Canadian collaboration to promote cyber security awareness to the public."
First time accepted submitter Serious Callers Only writes "According to reports, Imran Khan was detained yesterday by US officials for questioning on his views on United States drone strikes in Pakistan. Glenn Greenwald writing for the guardian: 'On Saturday, Khan boarded a flight from Canada to New York in order to appear at a fundraising lunch and other events. But before the flight could take off, U.S. immigration officials removed him from the plane and detained him for two hours, causing him to miss the flight. On Twitter, Khan reported that he was "interrogated on [his] views on drones" and then added: "My stance is known. Drone attacks must stop." He then defiantly noted: "Missed flight and sad to miss the Fundraising lunch in NY but nothing will change my stance."'"
Hugh Pickens writes writes "Henry Alford writes that in an ideal world, we would all use Google to be better friends by having better recall and to research our new friends and acquaintances to get to know them better. 'It's perfectly natural and almost always appropriate,' says social anthropologist Kate Fox. 'Obviously, one is always going to have to be discreet when talking about what you've found. But our brains haven't changed since the Stone Age, and humans are designed to live in small groups in which everyone knows one another. Googling is an attempt to recreate a primeval, preindustrial pattern of interaction.' But the devil is in the details. If we tell a new friend that we've read her LinkedIn entry or her wedding announcement, it probably won't be perceived as trespassing, as long we bear no ulterior motives. If we happen to reveal that we've also read her long-ago abandoned blog about her cat, we're more likely to be seen as chronically bored than menacing. 'I'm so baffled by this idea that we're not supposed to Google people,' says Dean Olsher. 'Why would there be a line? Like everyone else is allowed to know something but I'm not?' But doesn't taking the google shortcut to a primeval, preindustrial pattern of recognition sometimes rob encounters of their inherent mystery or even get us in trouble? Tina Jordan, an executive in book publishing who has the same name as a former girlfriend of Hugh Hefner, says, 'I typically tell any blind dates before I meet them that they probably shouldn't Google my name, otherwise they'll be sorely disappointed when they meet me.'"
danomac writes "Police agencies in Canada want to have better tools to do online surveillance. Bill C-30 was to include new legislation (specifically Section 34) that would give police access to information without a warrant. This can contain your name, your IP address, and your mobile phone number. This, of course, creates all sorts of issues with privacy online. The police themselves say they have concerns with Section 34. Apparently, the way it is worded, it is not just police that can request the information, but any government agent. Would you trust the government with this kind of power?"
CowboyRobot writes "As budgets are pinched by reduced tax collection, many U.S. states are facing a possibility of not being able to handle the ever-increasing number of data breaches. 70% of state chief information security officers (CISOs) reported a data breach this year, each of which can cost up to $5M in some states. 'Cybersecurity accounts for about 1 to 2 percent of the overall IT budget in state agencies. ... 82 percent of the state CISOs point to phishing and pharming as the top threats to their agencies, a threat they say will continue in 2013, followed by social engineering, increasingly sophisticated malware threats, and mobile devices.' The full 2012 Deloitte-National Association of State Chief Information Officers (NASCIO) Cybersecurity Study is available online (PDF)."
alphadogg writes "The $100 million price differential between the Alcatel-Lucent and Cisco proposals to refresh California State University's 23-campus network revealed earlier this week was based on an identical number of switches and routers in various configurations. CSU allowed Network World to review spreadsheets calculating the eight-year total cost of ownership of each of the five bidders for the project. 'Everybody had to comply with this spreadsheet,' said CSU's director of cyberinfrastructure. 'Alcatel-Lucent won the project with a bid of $22 million. Cisco was the high bidder with a cost just under $123 million. Not only was Cisco's bid more than five-and-a-half times that of Alcatel-Lucent's, it was three times that of the next highest bidder: HP, at $41 million.'"
Penurious Penguin writes "Last year a Slashdot story mentioned the case of Daniel David Rigmaiden, or 'the Hacker.' With the help of an IMSI-catcher device, law enforcement had been able to locate and arrest the elusive 'Hacker,' leading to U.S. v. Rigmaiden. But far more elusive than the 'Hacker,' is the IMSI-catcher device itself — particularly the legalities governing its use. The secrecy and unconstitutionality of these Man In The Middle devices, i.e. 'stingrays,' has caught some attention. The EFF and ACLU have submitted an amicus brief in the Rigmaiden case; and EPIC, after filing an FOIA request in February and receiving a grossly redacted 67 out of 25,000 (6,000 classified) pages on the "stingray" devices, has now requested a district judge expedite disclosure of all documents. Some Judges also seem wary of the 'stingray,' having expressed concerns that their use violates the Fourth Amendment; and additionally, that information explaining how the technology is used remains too obscure. Perhaps the most controversial aspect of ISMI-catchers is their several-kilometer range. When a "stingray" is used to spoof a cellphone tower, thousands of innocent users may be collaterally involved. And while the government claims to delete all gathered data unrelated to the target, it also means no one else can know what that data really was. The government claims that because only attributes of calls — but not their content — are captured in the attack, search warrants aren't necessary." (More, below.)
Registered Coward v2 writes "The U.S. Supreme Court is set to hear a case to determine how copyright law and the doctrine of first sale applies to copyrighted works bought overseas, then imported to the U.S. and then re-sold. The case involves a foreign student who imported textbooks from Asia and the resold them in the U.S. to help fund his education. He was sued by the publisher, lost, and was ordered to pay $600,000 in damages. Now SCOTUS gets to weigh in on the issue. 'The idea -- upheld by the Supreme Court since 1908 -- is that once a copyright holder legally sells a product initially, the ownership claim is then exhausted, giving the buyer the power to resell, destroy, donate, whatever. It's a limited idea -- involving only a buyer's distribution right, not the power to reproduce that DVD or designer dress for sale. ... The tricky part is whether that first-sale doctrine applies to material both manufactured and first purchased outside the United States. Federal law gives that authority to a purchaser's work "lawfully made under this title." Does "this title" apply to any copyrighted work — whether manufactured all or in part in the United States and around the world?"
Taco Cowboy writes "The New York Times has become the latest target of Chinese censorship. Censors of the People's Republic of China, in an almost unheard of, truly remarkable feat of neck-breaking speed, blocked the (paywalled) website of the New York Times, all because of one news article. That particular article was about the enormous wealth of the family members of a very prominent figure in the Chinese Communist Party (CCP) — Chinese Premier Wen Jia Bao. The wealth in question totals some USD 2.7 billion. " (Also covered at the BBC.)
dsinc writes "And so it begins... Yahoo has made it official: it won't honor the Do Not Track request issued by Internet Explorer 10. Their justification? '[T]he DNT signal from IE10 doesn't express user intent" and "DNT can be easily abused.'" Wonder what percentage of users would rather be tracked by default.