theodp writes "Back in Biblical times, creating abundance was considered innovative. That was then. Last Tuesday, GeekWire reports, the USPTO awarded Amazon.com a broad patent on reselling and lending 'used' digital goods for an invention that Amazon boasts can be used to 'maintain scarcity' of digital objects, including audio files, eBooks, movies, apps, and pretty much anything else."
Have you META-MODERATED today? Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25.×
An anonymous reader writes "In a move that might dampen the popularity of Airbnb's site for Amsterdam, the city government is now using the accommodation listing service as a source of tips about illegal rental property. 'Airbnb is never a smoking gun,' said Jan-Jaap Eikelboom, spokesman for the city of Amsterdam, regarding use of the service. But the government does use Airbnb and its competitors to compare its own nuisance data with street listings on sites like Airbnb, and has been doing so for a while, he said. This combined information can come in handy when investigating suspicious buildings and can help with spotting illegal activity, he said."
ahziem writes "As author of the BleachBit system cleaner, I received a polite but firm request from Piriform, makers of the similar application CCleaner, to remove a two-year-old feature from BleachBit that allows individual BleachBit users to import winapp2.ini data files created by the community that define which files to delete for applications. Does Piriform's request have merit? Do I need a lawyer? What is a good response to avoid any ugly situation?"
Nate the greatest writes "The developer of the popular Android app Moon+ Reader was surprised to discover this weekend that he is a filthy stinking pirate. Google informed him via an automated email that Moon+ Reader had been removed from Google Play because the app had switched to using pirate sites as the main sources of ebooks. Or at least, that's what LitRes claims, but when they complained to Google LitRes didn't tell the whole truth. What was really happening is that users of the app are enabling piracy, not the app itself. Thanks to the way Moon+ Reader is designed to let users share links to ebook sources some of the sources are indeed pirate sites (less than your average Google Search). In reality the app was no more a source of pirated content than your average web browser. What do you say when an ebook distributor's anti-piracy plan involves going after app developers rather than pirate sites? Something printable, IMO."
lcam writes "A Richard Stallman opinion piece appears at Reuters addressing the 'Too big to fail' view that has recently caused large corporations to be bailed out by taxpayer dollars. His solution is elegant: 'We tax a company’s gross income, with a tax rate that increases as the company gets bigger. Companies would be able to reduce their tax rates by splitting themselves up.' However, it could use some refining. For example, his measure would create a required minimum 'Return on Investment' scale that corporations need to follow to be viable, and these types of metrics are very industry specific. Another issue is that many large corporations stay in business because they don't take unnecessary risk. Companies like Intel, Lockheed, Walmart are very large and have a very low chance of failure, yet Stallman would have them split up as a result of the excessive risks that banks and insurance companies were seen to have taken. It also has the potential to cause problems with the global market; some multinationals may find it better to simply 'move out' to a country that doesn't compromise their business models. How can this idea be made better?"
mask.of.sanity writes "Security researchers have shown how to raid Africa micro-finance bank accounts en masse using fake audio one time passwords. The banks use audio one-time passwords to authenticate users logging into their accounts, but failed to implement properly security controls across numerous systems. Crucially, the researchers did not reveal how they cracked the encryption in order to protect users."
An anonymous reader writes "SCO, now calling itself TSG, has just filed a motion (Pdf) with the bankruptcy court in Delaware asking it to authorize 'the abandonment, disposal, and/or destruction of certain surplus, obsolete, non-core or burdensome, property, including, without limitation, shelving, convention materials, telecommunications and computer equipment, accounting and sales documents, and business records.'"
schwit1 writes "A proposal by the Prince George's County Board of Education to copyright work created by staff and students for school could mean that a picture drawn by a first-grader, a lesson plan developed by a teacher or an app created by a teen would belong to the school system, not the individual. It's not unusual for a company to hold the rights to an employee's work, copyright policy experts said. But the Prince George's policy goes a step further by saying that work created for the school by employees during their own time and using their own materials is the school system's property."
An anonymous reader writes "My company has been contacted by certified letter by Delaware law firm. They are seeking license fees for a Wi-fi patent. I believe this is a patent troll (not that this matters in relation to dealing with this issue). This is a newly formed law firm less than 4 months old. This patent is U.S. Patent No. 5,506,866. This patent covers equipment and method related to the transmission of information involving the multiplexing information into a stream of signal points (and demultiplexing the same), and related technology. They have 'offered' to license this patent with no amounts specified. Unfortunately we are a small free software company. The company is setup as a sole proprietorship. I'm not asking for legal advise from the Slashdot community. The question is where might one look for 'legal counsel' with the expertise to answer these types of legal questions as it relates to this inquiry. I would prefer to avoid legal fees, court cases, or license fees running the company into the ground. The company is registered in New Jersey."
coondoggie writes "When it comes to relatively new technologies, few have been developing at the relentless pace of mobile. But with that development has come a serious threat to the security of personal information and privacy. The Federal Trade Commission has issued a report (PDF) on mobility issues and said less than one-third of Americans feel they are in control of their personal information on their mobile devices. 'The report makes recommendations for critical players in the mobile marketplace: mobile platforms (operating system providers, such as Amazon, Apple, BlackBerry, Google, and Microsoft), application (app) developers, advertising networks and analytics companies, and app developer trade associations. ... The report recommends that mobile platforms should: Provide just-in-time disclosures to consumers and obtain their affirmative express consent before allowing apps to access sensitive content like geolocation; Consider developing a one-stop “dashboard” approach to allow consumers to review the types of content accessed by the apps they have downloaded; Consider offering a Do Not Track (DNT) mechanism for smartphone users.'"
concealment sends this excerpt from the NY Times: "Late last year, Zoe Keating, an independent musician from Northern California, provided an unusually detailed case in point. In voluminous spreadsheets posted to her Tumblr blog, she revealed the royalties she gets from various services, down to the ten-thousandth of a cent. Even for an under-the-radar artist like Ms. Keating, who describes her style as “avant cello,” the numbers painted a stark picture of what it is like to be a working musician these days. After her songs had been played more than 1.5 million times on Pandora over six months, she earned $1,652.74. On Spotify, 131,000 plays last year netted just $547.71, or an average of 0.42 cent a play. 'In certain types of music, like classical or jazz, we are condemning them to poverty if this is going to be the only way people consume music,' Ms. Keating said. ... The question dogging the music industry is whether these micropayments can add up to anything substantial. 'No artist will be able to survive to be professionals except those who have a significant live business, and that’s very few,' said Hartwig Masuch, chief executive of BMG Rights Management."
An anonymous reader writes "Today Steven Chu, U.S. Secretary of Energy, released a letter indicating he won't continue to hold the job for President Obama's second term. He'll continue until the ARPA-E Summit at the end of February, and then perhaps a bit longer until a replacement is found. MIT's Technology Review sums up his contributions thus: 'Under his leadership, the U.S. Department of Energy has changed the way it does energy research and development. He leaves behind new research organizations that are intently focused on solving specific energy problems, particularly the Advanced Research Projects Agency for Energy as well as several Innovation Hubs. The latter were modeled closely on Chu's experience working at the legendary Bell labs, where researchers solving basic problems rubbed shoulders with engineers who knew how to build things. At one Innovation Hub, for example, researchers who are inventing new materials that can absorb sunlight or split water are working together with engineers who are building prototypes that could use those materials to generate fuel from sunlight. Chu also brought an intense focus on addressing climate change through technical innovation, speaking clearly and optimistically about the potential for breakthroughs to change what's possible.'"
An anonymous reader writes "Facebook has brought back its photo Tag Suggestions feature to the U.S. after temporarily suspending it last year to make some technical improvements. Facebook says it has re-enabled it so that its users can use facial recognition 'to help them easily identify a friend in a photo and share that content with them.' Facebook first rolled out the face recognition feature across the U.S. in late 2010. The company eventually pushed photo Tag Suggestions to other countries in June 2011, but in the US there was quite a backlash. Yet Facebook doesn't appear to have made any privacy changes to the feature: it's still on by default."
pigrabbitbear writes "It always sounded like a hoax, didn't it? Silk Road: an Internet website where you can buy any drug in the world? Yeah, right. But it's real. It was almost two years ago that we first heard about the site, which hosts everything from Adderall to Ketamine, LSD to MDMA and tons and tons of weed. After it started to pick up a ton of press and exposure, we all thought that certainly the Silk Road would get shut down. It's super illegal to sell drugs or even to help people sell drugs. But it didn't. Silk Road survives to this day. However, with the arrival this week of the first conviction of a Silk Road-related crime, you have to wonder if Silk Road's days might be numbered after all. The trouble is brewing in Australia, where a guy named Paul Leslie Howard is facing as many as five years in prison for selling drugs on Silk Road. We're not talking millions of dollars worth of drugs, but we are talking about thousands of dollars worth. And just as Silk Road natives had feared, Howard was one of those Silk Road n00bs who read a newspaper article about the site and decided to try it out for himself."
New submitter Matt Slaybaugh writes "John Foley at InformationWeek has an editorial saying that the missing piece in the new gun control legislation is adequate data management. 'President Obama introduced 23 executive orders on Jan. 16 aimed at reducing gun violence through a combination of tougher regulation and enforcement, research, training, education and attention to mental healthcare. Several of the proposed actions involve better information sharing, including requiring federal agencies to make relevant data available to the FBI's background check system and easing legal barriers that prevent states from contributing data to that system.' But concrete plans are needed now to improve the current poor system of data collection and sharing. Federal CIO Steven VanRoekel's Digital Government Strategy, introduced in May, 'defines an IT architecture and processes for sharing digitized content securely, using Web APIs and with attention to protecting privacy. ... Unfortunately, on top of the data quality issues identified by the White House, and the FBI's and ATF's outdated IT systems, there's a lack of transparency about the systems used to enforce federal gun-control laws.'"
Dangerous_Minds writes "On Wednesday, we discussed news that RIANZ convicted its first file-sharer under the New Zealand three strikes law. While the fine totaled $616.57, a New Zealand Herald report points out that in order to get that fine, RIANZ had to spend $250,000. Freezenet makes an interesting point that HADOPI (France's version of the three strikes law) faced similar problems when the Socialist party commented that 12 million euros was a lot of money to pay 60 agents to send out 1 million e-mails. The question raised is whether or not this money pit trend will continue when the Copyright Alert System starts processing strike notices in the United States."
An anonymous reader writes "The Federation of German Consumer Organizations (VZVB) has sued computer game distributor Valve because it prohibits Steam-gamers from reselling their games. Steam users own the games they purchase and should be able to resell them when they want to, just like owners of traditional card or board games can, said Carola Elbrecht, project manager for consumer rights in the digital world at the VZVB, on Thursday. But while those traditional game owners can resell their games whenever they like, Steam users often cannot, she said."
sfcrazy writes "In a nutshell there won't be a new trial in the Apple V. Samsung case, as Samsung wanted, because the judge thinks that the trial was fair despite allegations that the jury foreman could have been biased. She also ruled that there won't be any more money for Apple as the iPhone maker failed to prove they were 'undercompensated' by the jury. The most important ruling was that she found that 'Samsung did not willfully infringe.'"
Diamonddavej writes "Leading privacy expert Caspar Bowden warned European citizens not to use cloud services hosted in the U.S. over spying fears. Bowden, former privacy adviser to Microsoft Europe, explained at a panel discussion hosted at the recent Computers, Privacy and Data Protection conference in Brussels, that a section in the Foreign Intelligence Surveillance Act Amendments Act 2008 (FISAAA) permits U.S. intelligence agencies to access data owned by non-U.S. citizens on cloud storage hosed by U.S. companies, if their activity is deemed to affect U.S. foreign policy. Bowden claimed the Act allows for purely political spying of activists, protesters and political groups. Bowden also pointed out that amendments to the EU's data protection regulation proposal introduce specific loopholes that permit FISAAA surveillance. The president of Estonia, Toomas Hendrik Ilves (at a separate panel discussion) commented, 'If it is a U.S. company it's the FBI's jurisdiction and if you are not a U.S. citizen then they come and look at whatever you have if it is stored on a U.S. company server.' The European Data Protection Supervisor declined to comment but an insider indicated that the authority is looking into the matter."
coondoggie writes "The Federal Trade Commission today said the submission period for its Robocall Challenge had ended and it got 744 new ideas for ways to shut down the annoying automated callers. The FTC noted that the vast majority of telephone calls that deliver a prerecorded message trying to sell something to the recipient are illegal. The FTC regulates these calls under the Telemarketing Sales Rule and the Challenge was issued to developing technical or functional solutions and proofs of concepts that can block illegal robocalls which, despite the agency's best efforts, seem to be increasing."
Zordak writes "Micron has recently landed U.S. Patent 8,352,745, which claims priority back to a February 2000 application---well before Apple's 2004 slide-to-unlock application. While claim construction is a highly technical art, the claims here are (for once) almost as broad as they sound, and may cover the bulk of touch screen smart phones on the market today. Dennis Crouch's Patently-O has a discussion."
Master Moose writes "Kim Dotcom's Mega file sharing site has been stung with 150 copyright warnings, according to an international report. Dotcom launched the new fire-sharing website on January 20 in a blaze of fireworks and publicity.Less than two weeks later and Computerworld.com is reporting the company removed content after receiving 150 copyright infringement notices." Raise your hand if you're shocked, simply shocked.
Rick Zeman writes "According to a headline article in the New York Times, they admit to being hacked by the Chinese, and covers the efforts of Mandiant to investigate, and then to eradicate their custom Advanced Persistent Threats (APT). This was alleged to be in reaction to an article which details the sleazy business dealings of the family of Wen Jiabao, China's newest Prime Minister. China's Ministry of National Defense said in denial, 'Chinese laws prohibit any action including hacking that damages Internet security.'" Update: 01/31 15:00 GMT by T : The Times used Symanetic's suite of malware protection software; Symantec has issued a statement that could be taken as slightly snippy about its role in (not) preventing the spyware from taking hold.
First time accepted submitter DiscountBorg(TM) writes "An employee of the Canada Revenue Agency lost his job after releasing a humorous game in which the player answers customer service calls for the Agency, usually leading to his termination. In an email National Revenue Minister Gail Shea said: 'The Minister considers this type of conduct offensive and completely unacceptable. The Minister has asked the Commissioner (of Revenue, Andrew Treusch) to investigate and take any and all necessary corrective action. The Minister has asked the CRA to investigate urgently to ensure no confidential taxpayer information was compromised.'"
itwbennett writes "Now that the ridiculous phone unlocking law is a done deal, and we all understand exactly what that means (i.e., 'fines of up to $500,000 and imprisonment of up to five years'), you might be left wondering what can you do about it. Well, you could start by lending your John Hancock to this petition at the White House's 'We The People' platform. It's already over halfway to the number of signatures required to get a response from the executive branch."
First time accepted submitter 3seas writes in about DMVs across the country learning textspeak in order to keep vulgar acronyms off the road. "You can have txtspeak on your plate in Arizona, but only if you keep it clean. 'ROFLMAO' is a no-go. Arkansas, however, seems to be a little slower on the uptake. 'ROFLMAO' doesn't appear on the state's prohibited list. That doesn't necessarily mean the plate would pass DMV scrutiny should someone request it."
redletterdave writes "According to the 30-count indictment released by the Central District of California, 27-year-old hacker Karen 'Gary' Kazaryan allegedly hacked his way into hundreds of online accounts, using personal information and nude or semi-nude photos of his victims to coerce more than 350 female victims to show him their naked bodies, usually over Skype. By posing as a friend, Kazaryan allegedly tricked these women into stripping for him on camera, capturing more than 3,000 images of these women to blackmail them. Kazaryan was arrested by federal agents on Tuesday; if convicted on all 30 counts, including 15 counts of computer intrusion and 15 counts of aggravated identity theft, Kazaryan could face up to 105 years in federal prison."
An anonymous reader writes with news that the first successful case was brought before the copyright tribunal under NZ's three strikes law. From the article: "The first music pirate stung under new file-sharing laws has been fined $616 but 'didn't realise' the actions were illegal. The Recording Industry Association of New Zealand (RIANZ) — which represents music studios — took an unnamed offender to the Copyright Tribunal last year for sharing songs on the Internet — a track by Barbadian pop-star Rihanna on two occasions and the other by Nashville band Hot Chelle Rae. In a decision released today, the tribunal found in RIANZ's favor and ordered the offender ... to pay a penalty $616.57." Torrent Freak has a slightly different perspective: a lack of evidence and pushback from the tribunal resulted in much smaller fines than the RIANZ wanted.
Lasrick writes "This article starts with an interesting anecdote: 'In 1998, President Bill Clinton read a novel about biological warfare that deeply disturbed him. In fact, the story reportedly kept him up all night. It’s one of the reasons that Clinton became personally invested in protecting the United States from bioterrorism threats. The book was The Cobra Event (Preston, 1998), a sci-fi thriller by journalist and novelist Richard Preston that told of a mad scientist who brewed a lethal, genetically engineered virus in his New York City apartment. Preston’s tale highlighted the potential ease with which individuals or small groups with access to advanced bioweapons capabilities could launch attacks on major US cities.1 After reading The Cobra Event, Clinton called several advisory meetings and ordered classified assessments and simulation exercises to examine the threat depicted in the story. As a result of these deliberations, by the end of his administration Clinton had increased funding for biodefense preparedness efforts fourfold, to more than $400 million per year.' The article goes on to describe the two trajectories of bioweapons threats, and puts them both in perspective. It may or may not calm everyone who's ever spent a sleepless night after reading one of the many bioterrorism novels"
redletterdave writes "Mozilla announced on Tuesday that it has been named the 'Most Trusted Internet Company For Privacy' in 2012, according to a new independent study released by the Ponemon Institute early this morning (PDF). Ponemon Institute surveyed more than 100,000 adult-aged consumers over a 15-week period ending in December 2012; of the 6,704 respondents, representing 25 different industries, Mozilla was ranked the top Internet and social media company. While this is a great achievement for Mozilla, especially considering this was their first year making the list, Mozilla's team took note of the fact that 'Internet and social media' was still the least trustworthy sector out of the 25 total industries listed. 'It means we as an industry all have a lot more work to do,' Mozilla wrote on its blog."
Okian Warrior writes with word that, as of Monday evening, multiple police agencies and the military were "conducting training exercises over Miami and elsewhere in the county. The exercise includes military helicopters firing machine-gun blanks while flying over highways and buildings. This YouTube video shows helicopters strafing highways with blank rounds near the Adrian Arts center. There are reports of similar actions in Houston From the Houston article: 'if you see the helicopters or hear gunfire, it's only a drill.'" Note: this time, it's not in The Onion.
hydrofix writes "On Thursday TorrentFreak broke the story (verified by BBC) that the government of Antigua and Barbuda, a tiny island nation on the Caribbean, was planning to launch a legal 'pirate' website selling movies, music and software without paying a penny to U.S. copyright holders. Now, the World Trade Organization has given its final approval for the Antigua government to launch the website. The decision follows from long-running trade dispute between the countries, related to online gambling, which was ruled in Antigua's favor in 2005. After the United States refused to compensate, the WTO granted Antigua the right to 'suspend' U.S. copyrights for up to $21 million annually." From the article: "The Antiguan government further reiterated today that the term 'piracy' doesn’t apply in this situation, as they are fully authorized to suspend U.S. copyrights. It is a legal remedy that was approved by all WTO members, including the United States."
tukang writes "According to a report in the Massachusetts Lawyers Weekly, State prosecutors had planned to let Swartz off with a warning and Swartz would not have faced any criminal proceedings or prison time had it not been for the decision of Carmen Ortiz's office to intervene and take over the case." Although the CNET article focuses on Aaron Swartz's particular case, the original article calls attention to general abuse of power within the DOJ: "It seems never to have occurred to Ortiz, nor to the career prosecutors in her office in charge of the prosecution, Stephen Heymann and Scott Garland, that there is something wrong with overcharging, and then raising the ante, merely to wring a guilty plea to a dubious statute. Nor does it occur generally to federal prosecutors that there’s something wrong with bringing prosecutions so complex that they are guaranteed to bankrupt all but the wealthiest. These tactics have become so normal within the Department of Justice that few who operate within the bowels of this increasingly corrupt system can even see why it is corrupt. Even most journalists, who are supposedly there to tell truth to power, no longer see what’s wrong and even play cheerleader."
Sparrowvsrevolution writes with news of some particularly insecure security cameras. From the article: "Eighteen brands of security camera digital video recorders are vulnerable to an attack that would allow a hacker to remotely gain control of the devices to watch, copy, delete or alter video streams at will, as well as to use the machines as jumping-off points to access other computers behind a company's firewall, according to tests by two security researchers. And 58,000 of the hackable video boxes, all of which use firmware provided by the Guangdong, China-based firm Ray Sharp, are accessible via the Internet. Early last week a hacker who uses the handle someLuser found that commands sent to a Swann DVR via port 9000 were accepted without any authentication. That trick would allow anyone to retrieve the login credentials for the DVR's web-based control panel. To compound the problem, the DVRs automatically make themselves visible to external connections using a protocol known as Universal Plug And Play, (UPnP) which maps the devices' location to any local router that has UPnP enabled — a common default setting. ...Neither Ray Sharp nor any of the eighteen firms have yet released a firmware fix."
Nerval's Lobster writes "All your Tweets are belong to us... with a court order. Twitter's second transparency report reinforces what many already know: governments want online user data, and to yank select content from the Internet. Twitter's first two transparency reports cover the entirety of 2012, so there's not a deep historical record to mine for insight. Nonetheless, that year's worth of data shows all types of government inquiry—information requests, removal requests, and copyright notices—either on the increase or holding relatively steady. Governments requested user information from Twitter some 1,009 times in the second half of 2012, up slightly from 849 requests in the first half of that year. Content-removal requests spiked from 6 in the first half of 2012 to 42 in the second. Meanwhile, copyright notices declined a bit, from 3378 in the first half of 2012 to 3268 in the second."
snydeq writes "Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet, InfoWorld reports. 'A cyber war has been brewing for at least the past year, and although you might view this battle as governments going head to head in a shadow fight, security experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. The cyber war has seen various attacks around the world, with incidents such as Stuxnet, Flame, and Red October garnering attention. Some attacks have been against government systems, but increasingly likely to attack civilian entities. U.S. banks and utilities have already been hit.'"
Frequent contributor Bennett Haselton writes "With the announcement of Verizon's "six strikes plan" for movie pirates (which includes reporting users to the RIAA and MPAA), and content companies continuing to sue users en masse for peer-to-peer downloads, I think it's inevitable that we'll see the rise of p2p software that proxifies your downloads through other users. In this model, you would not only download content from other users, but you also use other users' machines as anonymizing proxies for the downloads, which would make it impossible for third parties to identify the source or destination of the file transfer. This would hopefully put an end to the era of movie studios subpoenaing ISPs for the identities of end users and taking those users to court." Read below for the rest of Bennett's thoughts.
Dupple writes "After settling with the FTC, Google is under pressure again regarding user privacy. From the BBC: 'A group of Apple's Safari web browser users has launched a campaign against Google over privacy concerns. They claim that Google bypassed Safari's security settings to install cookies which tracked their movements on the internet. Between summer 2011 and spring 2012 they were assured by Google this was not the case, and believed Safari's settings to be secure. Judith Vidal-Hall, former editor of Index On Censorship magazine, is the first person in the UK to begin legal action. 'Google claims it does not collect personal data but doesn't say who decides what information is "personal,"' she said. 'Whether something is private or not should be up to the internet surfer, not Google. We are best placed to decide, not them.'"
jfruh writes "Last week the CEO ServiceNow made a minor splash by claiming that it was awfully easy for a cloud provider to spy on the data they stored for you or discriminate based on pricing. But while that's possible, in many cases it turns out to be simply not practical enough to be beneficial. Even moves like restoring outages for higher-paying customers first turn out to be more trouble than they're worth."
theodp writes "On Saturday, questions for MIT's Aaron Swartz investigation were posted on Slashdot with the hope that MIT'ers might repost some to the MIT Swartz Review site. So it's good to see that MIT's Hal Abelson, who is leading the analysis of MIT's involvement in the matter, is apparently open to this workaround to the ban on questions from outsiders. In fact, on Sunday Abelson himself reposted an interesting question posed by Boston College Law School Prof. Sharon Beckman: 'What, if anything, did MIT learn from its involvement in the federal prosecution of its student David LaMacchia back in 1994?' Not much, it would appear. LaMacchia, an apparent student of Abelson's whose defense team included Beckman, was indicted in 1994 and charged with the 'piracy of an estimated million dollars' in business and entertainment computer software after MIT gave LaMacchia up to the FBI. LaMacchia eventually walked from the charges, thanks to what became known as the LaMacchia Loophole, which lawmakers took pains to close. 'MIT collaborated with the FBI to wreck LaMacchia's life,' defense attorney Harvey Silverglate charged in 1995 after a judge dismissed the case. 'I hope that this case causes a lot of introspection on the part of MIT's administration. Unfortunately, I doubt it will.'"
According to the Daily Yomiuri, "Japan launched two satellites on Jan. 27 to strengthen its surveillance capabilities, including keeping a closer eye on North Korea which has vowed to stage another nuclear test. One of them was a radar-equipped unit to complete a system of surveillance satellites that will allow Tokyo to monitor any place in the world at least once a day. The other was a demonstration satellite to collect data for research and development." The Defense News version of the story says "Japan developed a plan to use several satellites as one group to gather intelligence in the late 1990s as a response to a long-range missile launch by Pyongyang in 1998. The space agency has said the radar satellite would be used for information-gathering, including data following Japan’s 2011 quake and tsunami, but did not mention North Korea by name."
bargainsale writes with an account at Ars Technica of "the inspiring story of Newegg vs the patent troll. Perhaps the system does work after all." Newegg's lawyer Lee Cheng has some choice words for the business model employed by Soverain Software, the patent troll which tried, with some success, to exact money from online retailers for using online shopping carts. Newegg has prevailed, though, and Soverain's claims are toast. From Ars: "The ruling effectively shuts down dozens of the lawsuits Soverain filed last year against Nordstrom's, Macy's, Home Depot, Radioshack, Kohl's, and many others (see our chart on page 2). All of them did nothing more than provide shoppers with basic online checkout technology. Soverain used two patents, numbers 5,715,314 and 5,909,492, to claim ownership of the "shopping carts" commonly used in online stores. In some cases, it wielded a third patent, No. 7,272,639."
The TV show Glee may have borrowed Jonathan Coulton's arrangement of "Baby Got Back" without asking him first, but he's got a response of the kind that it'd be hard for the show's makers to criticize without looking churlish. Borrowing it back, and using it to raise money for charity. As CNET puts it, "Coulton has foxily tossed up on iTunes his own version of the song and titled it 'Baby Got Back (In the Style of Glee).' He terms it 'my cover of Glee's cover of my cover.'"
Now that unlocking a new phone is under many circumstances illegal in the U.S. (!), Digital Trends has collected a useful set of answers outlining just what that means. As they put it, a "quick guide to answer all your why, how, and WTF questions." Among them, some explanation of the rule-making process, the reasoning that led to the end to the unlocking exception to the DMCA (including the Ninth Circuit's 2010 Vernor v. Autodesk decision), and illustrations of situations in which it is not illegal to unlock your phone.
CowboyRobot writes "Once the 'Second City' of the British Empire, scrappy Glasgow — whose now-demolished Gorbals was once known for urban grimness on a par with Chicago's South Side or New York's Hell's Kitchen — has the chance for a whole new lease on life as the UK's first 'smart city.' The UK's government has just announced a $38 million (£24 million) grant to fund pilot projects in the city that show how mass deployment of sensors and real-time information can help local government run more efficiently while also boosting the quality of life for its 600,000 citizens. Glasgow won the prize in a competition among 30 British towns and cities for state help in looking at the possible contribution of smart technology."
theodp writes "Late Friday, Violet Blue reports, the U.S. Sentencing Commission website was hacked and government files distributed by Anonymous in 'Operation Last Resort.' The U.S. Sentencing Commission sets guidelines for sentencing in United States Federal courts, and on the defaced ussc.gov website Anonymous cited the recent suicide of Aaron Swartz as 'a line that has been crossed.' Calling the launch of its new campaign a "warhead," Anonymous vowed, 'This time there will be change, or there will be chaos.'" Adds reader emil: "Anonymous has not specified exactly what files they have obtained. The various files were named after Supreme Court judges. At a regular interval commencing today, Anonymous will choose one media outlet and supply them with heavily redacted partial contents."
An anonymous reader writes "The H.265 codec standard, the successor of H.264, has been approved, promising support for 8k UHD and lower bandwidth, but the patent issues plaguing H.264 remain." Here's the announcement from the ITU. From the article: "Patents remain an important issue as it was with H.264, Google proposing WebM, a new codec standard based on VP8, back in 2010, one that would be royalties free. They also included it in Chrome, with the intent to replace H.264, but this attempt never materialized. Mozilla and Opera also included WebM in their browsers with the same purpose, but they never discarded H.264 because most of the video out there is coded with it. MPEG LA, the owner of a patent pool covering H.264, promised that H.264 internet videos delivered for free will be forever royalty free, but who knows what will happen with H.265? Will they request royalties for free content or not? It remains to be seen. In the meantime, H.264 remains the only codec with wide adoption, and H.265 will probably follow on its steps."
Damien1972 writes "The Brazilian government has begun fixing trees in the Amazon rainforest with a wireless device, known as Invisible Tracck, which will allow trees to contact authorities once they are felled and moved. Here's how it works: Brazilian authorities fix the Invisible Tracck onto a tree. An illegal logger cuts down the tree and puts it onto a truck for removal, unaware that they are carrying a tracking device. Once Invisible Tracck comes within 20 miles (32 kilometers) of a cellular network it will 'wake up' and alert authorities."
chicksdaddy writes "The U.S. Department of Defense has stopped updating its main reference list of vital defense technologies that are banned from export, according to a new report from the Government Accountability Office (GAO), The Security Ledger reports. The Militarily Critical Technologies List (MCTL) is used to identify technologies that are critical to national defense and that require extra protection — including bans on exports and the application of anti-tamper technology. GAO warned six years ago that the Departments of State and Commerce, which are supposed to use the list, found it too broad and outdated to be of much use. The latest report (GAO 13-157) finds that the situation has worsened: budget cuts forced the DOD to largely stop updating and grooming the list in 2011. Sections on emerging technologies are outdated, while other sections haven't been updated since 1999. Without the list to rely on, the DOD has turned to a hodgepodge of other lists, while officials in the Departments of State and Commerce who are responsible for making decisions about whether to allow a particular technology to be exported have turned to ad-hoc networks of subject experts. Other agencies are looking into developing their own MCTL equivalents, potentially wasting government resources duplicating work that has already been done, GAO found."
FunPika writes "Jonathan Coulton, who is known for songs such as "Code Monkey", is claiming that his cover of "Baby Got Back" was used without permission on Glee, a television show aired by Fox Broadcasting Company. When the Glee version appeared on YouTube last week, Coulton suspected that it sounded similar to his cover, and several of his fans confirmed this by analyzing the two tracks. Despite Coulton contacting Fox, they continued with airing the episode and have placed the song on sale in iTunes."