×
Privacy

UCSD Lecturer Releases Geotagging Application For "Dangerous Guns and Owners" 976

NF6X writes "UCSD Lecturer Brett Stallbaum has released an Android app called Gun Geo Marker to allow people to 'Geolocate Dangerous Guns and Owners.' The app description states: 'The Gun Geo Marker operates very simply, letting parents and community members mark, or geolocate, sites associated with potentially unsafe guns and gun owners. These locations are typically the homes or businesses of suspected unsafe gun owners, but might also be public lands or other locations where guns are not handled safely, or situations where proper rights to own or use any particular type of firearm may not exist.' I question how the motivation behind developing this app differs from, say, developing an app to allow others to publicly geotag homes of people believed to belong to a particular religion or political party."
Electronic Frontier Foundation

Federal Judge Rejects State Secrets Claims: EFF Case To Proceed 146

The EFF has been attempting to sue the government over illegal surveillance since the Bush administration, and, despite repeated attempts to have the case dismissed because of State Secrets, a federal judge has now ruled that the case must go forward in public court, throwing out the government's State Secrets argument. From the order: Having thoroughly considered the parties' papers, Defendants' public and classified declarations, the relevant legal authority and the parties' arguments, the Court GRANTS the Jewel Plaintiffs' motion for partial summary adjudication by rejecting the state secrets defense as having been displaced by the statutory procedure prescribed in 50 U.S.C. 1806(f) of FISA. In both related cases, the Court GRANTS Defendants' motions to dismiss Plaintiffs' statutory claims on the basis of sovereign immunity. The Court further finds that the parties have not addressed the viability of the only potentially remaining claims, the Jewel Plaintiffs' constitutional claims under the Fourth and First Amendments and the claim for violation of separation of powers and the Shubert Plaintiffs' fourth cause of action for violation of the Fourth Amendment. Accordingly, the Court RESERVES ruling on Defendants' motion for summary judgment on the remaining, non-statutory claims." Although some statutory claims were dismissed, the core Constitutional questions will be litigated.
United Kingdom

UK Government Surveillance Faces Legal Challenge.. In Secret Court 137

judgecorp writes "Privacy International is mounting a legal challenge against snooping by the UK government's intelligence agency GCHQ. But the case will be held in secret The group is challenging UK government access to Privacy, and the UK's own Tempora system, arguing that both allow 'indiscriminate' snooping because they operate in secrecy with a lack of legal oversight. All well and good — but the authorities have ruled that Privacy's challenge must be heard by the Investigatory Powers Tribunal, which hears cases in secret and is under no obligation to explain or justify its verdicts."
AI

Sent To Jail Because of a Software Bug 239

First time accepted submitter toshikodo writes "The BBC is reporting a claim that some sub-post office workers in the UK have been sent to jail because of a bug in the accounting software that they use. The Post Office admits Horizon computer defect. I've worked on safety critical system in the past, and I am well aware of the potential for software to ruin lives (thankfully AFAIK nobody has been harmed by my software), but how many of us consider the potential for bugs in ordinary software to adversely affect those that use it?"
United Kingdom

Fears of Olympic Cyber Attack Detailed After Snooping Revealed 109

First time accepted submitter Dr_Ish writes "The BBC is reporting that the opening ceremonies of last the Olympics last year were potentially subject to a cyber attack that could have cut all the lights and power. Of course, it did not happen. However, the interesting question is whether this is real, or whether this is a FUD story promoted by GCHQ to help shore up some credibility issues."
United States

MIT Project Reveals What PRISM Knows About You 221

judgecorp writes "MIT's Immersion project sifts your Gmail, and constructs a map of your associations. Without opening a single message, it gives a clear view of who you connect with. It's a glimpse of some of what the NSA PRISM can do. From the article: 'You can assume that if the NSA is looking at your email, the information in Immersion is similar to what they will see. Consider that they probably see all of your email addresses (and not just Gmail) and that the metadata is examined along with the metadata from everyone you’ve corresponded with, and you can see just how much can be inferred from this data alone.'"
Security

Security Researchers Submit Brief For Andrew "Weev" Auernheimer 161

USSJoin writes "Andrew Auernheimer (or Weev, as he's often better known) is serving a 41-month sentence under the Computer Fraud and Abuse Act. The case is currently on appeal to the Third Circuit Court of Appeals; his lawyer filed the appellate brief last week. Now, a group of 13 security researchers, led by Meredith Patterson, and including include Peiter "Mudge" Zatko, Space Rogue, Jericho, Shane MacDougall, and Dan Kaminsky, are making their own thoughts heard by the court. They are submitting a brief to the Third Circuit Court of Appeals that argues that not only is Weev's conviction bad law, but if upheld, it will destroy independent security research, and perhaps the rest of consumer safety research as well."
United States

Snowden Claims That NSA Collaborated With Israel To Write Stuxnet Virus 491

andrewa writes "In an interview with Der Spiegel Snowden claims that the NSA, amongst other things, collaborated with Israel to write the Stuxnet virus. Not that this is news, as it has been suspected that it was a collaborative effort for some time. When asked about active major programs and how international partners help, Snowden says: 'The partners in the "Five Eyes" (behind which are hidden the secret services of the Americans, the British, the Australians, New Zealanders and Canadians -- ed.) sometimes go even further than the NSA people themselves. Take the Tempora program of the British intelligence GCHQ for instance. Tempora is the first "I save everything" approach ("Full take") in the intelligence world. It sucks in all data, no matter what it is, and which rights are violated by it. This buffered storage allows for subsequent monitoring; not a single bit escapes. Right now, the system is capable of saving three days’ worth of traffic, but that will be optimized. Three days may perhaps not sound like a lot, but it's not just about connection metadata. "Full take" means that the system saves everything. If you send a data packet and if makes its way through the UK, we will get it. If you download anything, and the server is in the UK, then we get it. And if the data about your sick daughter is processed through a London call center, then ... Oh, I think you have understood.'"
Electronic Frontier Foundation

Inside the Electronic Frontier Foundation 98

First time accepted submitter qwerdf writes "The Electronic Frontier Foundation's goal is 'defending your rights in the digital world', and its activities span the full gamut of freedom fighting: providing help with court cases; issuing white papers that explain current threats; running campaigns to spread awareness of various issues; and developing technologies that make our online activities safer from prying eyes. Here's a short history of how the EFF came together, what it has done so far, and how it's preparing for upcoming battles."
United States

US Spies Have "Security Agreements" With Foreign Telecoms 181

McGruber writes "The Washington Post is reporting the existence of 'Team Telecom', lawyers from the FBI and the departments of Defense, Justice and Homeland Security, who ensure that Global Crossing and other foreign-owned telecoms, quickly and confidentially fulfill the USA's surveillance requests. Team Telecom leverages the authority of the Federal Communications Commission (FCC) to approve cable licenses. The security agreement for Global Crossing, whose fiber-optic network connected 27 nations and four continents, required the company to have a 'Network Operations Center' on U.S. soil that could be visited by government officials with 30 minutes of warning. Surveillance requests, meanwhile, had to be handled by U.S. citizens screened by the government and sworn to secrecy — in many cases prohibiting information from being shared even with the company's executives and directors. A spokesman for Level 3 Communications declined to comment for the Washington Post's article."
Bitcoin

Bitcoins Seized In Drug Bust 198

First time accepted submitter Salo2112 writes "In a case believed to be the first of its kind, federal authorities have seized a Charleston man's virtual currency due to an alleged drug law violation with possible links to a shadowy online black market. From the article: 'The U.S. Drug Enforcement Administration recently posted a forfeiture notice indicating that agents had seized 11.02 Bitcoins worth $814 from 31-year-old Eric Daniel Hughes for allegedly violating the federal Controlled Substances Act. No other details were provided.'"
Privacy

According To YouGov Poll, Snowden Support Declining Among Americans 658

eldavojohn writes "A recent poll from the YouGov consisting of one thousand responses shows that Snowden's support among Americans has shifted. Now, according to the poll, more Americans think he did the wrong thing rather than the right thing when asked: 'Based on what you've heard, do think Snowden's leak of top-secret information about government surveillance programs to the media was the right thing to do or the wrong thing to do?' The results and breakdown are available online (PDF). Without getting into racial or political breakdowns, the results now show that 38% say he did the wrong thing, 33% say he did the right thing and 29% remain undecided about the results of his actions. Instead of charging the populace into action Snowden may be facing apathy at best and public disapproval at worst."
Books

The Price of Amazon 298

An anonymous reader writes "As physical book stores continue to struggle and disappear, the NY Times puts the changing book industry into perspective as a cost of the existence of Amazon. Further, it's a cost that hasn't been fully paid, as other effects of Amazon's ascendancy have yet to be felt. Quoting: 'One consequence of this shift is that soon no one will know what a book's "real" price is. Price will be determined by demand and perhaps by whim. The first seeds of this can be seen in the Justice Department's suit against the leading publishers, who felt that Amazon was pricing their e-books so low that it threatened their viability. The government accused the publishers of colluding to raise prices in an anti-consumer move. Amazon was not a party to the case, but it emerged the big winner.' Economists, publishers, and readers no longer have confidence that a book will cost the same amount this week as it did the last."
AT&T

How To Stop AT&T From Selling Your Private Data To Advertisers 88

An anonymous reader writes "AT&T is ready to follow in its rivals' footsteps and begin selling the private usage data it collects from its subscribers' phones to advertisers. The data in question is anonymized, according to AT&T, but it includes very sensitive information such as customers' locations, Web browsing history, mobile app usage and more. Privacy is something of a hot button issue right now, so it is likely that a number of AT&T subscribers would prefer to not have their private data sold to advertisers. Luckily, there is a fast and easy way to opt out of AT&T's 'External Marketing and Analytics Reporting' program."
United States

Lincoln's Surveillance State 343

An anonymous reader writes "The N.S.A.'s program is indeed alarming — but not, from a historical perspective, unprecedented. And history suggests that we should worry less about the surveillance itself and more about when the war in whose name the surveillance is being conducted will end. In 1862, after President Abraham Lincoln appointed him secretary of war, Edwin M. Stanton penned a letter to the president requesting sweeping powers, which would include total control of the telegraph lines. By rerouting those lines through his office, Stanton would keep tabs on vast amounts of communication, journalistic, governmental and personal. On the back of Stanton's letter Lincoln scribbled his approval: 'The Secretary of War has my authority to exercise his discretion in the matter within mentioned.'"
Encryption

Ask Slashdot: Will the NSA Controversy Drive People To Use Privacy Software? 393

Nerval's Lobster writes "As the U.S. government continues to pursue former NSA contractor Edward Snowden for leaking some of the country's most sensitive intelligence secrets, the debate over federal surveillance seems to have abated somewhat — despite Snowden's stated wish for his revelations to spark transformative and wide-ranging debate, it doesn't seem as if anyone's taking to the streets to protest the NSA's reported monitoring of Americans' emails and phone-call metadata. Even so, will the recent revelations about the NSA cause a spike in demand for sophisticated privacy software, leading to a glut of new apps that vaporize or encrypt data? While there are quite a number of tools already on the market (SpiderOak, Silent Circle, and many more), is their presence enough to get people interested enough to install them? Or do you think the majority of people simply don't care? Despite some polling data that suggests people are concerned about their privacy, software for securing it is just not an exciting topic for most folks, who will rush to download the latest iteration of Instagram or Plants vs. Zombies, but who often throw up their hands and profess ignorance when asked about how they lock down their data."
Crime

Detroit's Emergency Dispatch System Fails 191

dstates writes "For most of Friday, police and firefighters in Detroit were forced to operate without their usual dispatch radio when the emergency dispatch system failed. The radio system used for communication between 911 dispatchers and Detroit's police, fire and EMS crews went down around 5:30 a.m. Friday morning, causing a backlog of hundreds of calls and putting public safety at risk. Michigan State Police allowed Detroit's emergency system to use the state's communication towers, but access was restricted to top priority calls out of fear of overloading the State system. More than 60 priority-1 calls and more than 170 non-emergency calls were backed up. With no dispatch to communicate if something went wrong and backup was needed, police were forced to send officers out in pairs for safety concerns on priority-1 calls. Detroit's new police chief, James Craig, says he's 'appalled' that a redundant system did not kick in. The outage occurred only days after Craig took office. The $131 million Motorola system was installed in 2005 amid controversy over its funding. Spokesmen for Motorola said parts of the system were regularly maintained but acknowledged that backup systems had not been tested in the past two years. They said the problem was a hardware glitch in the link between dispatch and the individual radios. As of 9 p.m. Friday, a Motorola spokesman said the system was stable and the company would continue troubleshooting next week."
United States

Snowden Offered Asylum By Venezuelan President 380

First time accepted submitter aBaldrich writes "Edward Snowden was offered 'humanitarian asylum' by Nicolás Maduro, the president of Venezuela. The country's official news agency reports (original Spanish, Google translation) that the decision was taken after a meeting of the presidents of Argentina, Bolivia, Ecuador, Suriname, Uruguay and Venezuela. Maduro denounced an attempt to 'colonize' several European countries, and that he is acting 'on behalf of the dignity of the Americas.'" The Guardian confirms.
Bug

Group Chat Vulnerability Discovered in Cryptocat, Project Fixes and Apologizes 83

alphadogg writes "The founder of an eavesdropping-resistant instant messaging application called Cryptocat has apologized over a now-fixed bug that made some types of messages more vulnerable to snooping. Cryptocat, which runs inside a web browser, is an open-source application intended to provide users with a high degree of security by using encryption to scramble messages. But Cryptocat warns that users should still be very cautious with communications and not to trust their life with the application. The vulnerability affected group chats and not private conversations. The encryption keys used to encode those conversations were too short, which in theory made it easier for an attacker to decrypt and read conversations." The bug report/merge request, and an analysis of the bug (although, in light of the Cryptocat's gracious response, overly acerbic and dismissive of the project).
Government

Revelations On the French Big Brother 98

Wrath0fb0b writes "Days after President François Hollande sternly told the United States to stop spying on its allies, the newspaper Le Monde disclosed on Thursday that France has its own large program of data collection, which sweeps up nearly all the data transmissions, including telephone calls, e-mails and social media activity, that come in and out of France. The report notes that 'our email messages, SMS messages, itemized phone bills and connections to FaceBook and Twitter are then stored for years.' For those Slashdot readers that grok Français, you can read the original at Le Monde or the translated version from LM."

Slashdot Top Deals