Techmeology writes "Just days after the UK Pirate Party was forced to kill its proxy service Pirate Parties in Argentina and Luxembourg have created their own proxies. In a statement, the Pirate Party in Argentina said: 'We wish the UK Pirate Party best of luck in their continued fight for free access to culture and knowledge. We have put up our own Pirate Bay proxy which is accessible from anywhere in the world, including the UK and other places where it has been censored.'"
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Check out the new SourceForge HTML5 Internet speed test! ×
An anonymous reader writes "2 Player Productions, the producers of Minecraft: The Story of Mojang, on Saturday uploaded the documentary to The Pirate Bay. The news comes as a surprise move after an announcement earlier this week that the film is premiering today for free on Xbox Live to Gold subscribers. You can download it here."
An anonymous reader writes "After the rubber-banding, 'Steve Jobs' heuristics and pinch-to-zoom patents, another Apple patent in use against Samsung comes under pressure. An anonymous filer, most likely Samsung, has filed a reexamination request against Apple's RE41,922 patent on a 'method and apparatus for providing translucent images on a computer display.' It's not among the patents a California jury evaluated this summer, but one of four patents an ITC judge preliminarily found Samsung to infringe. The reexamination request features five new pieces of prior art (three U.S. patents from the early 1990s and two Japanese patents), all of which dealt with translucent images. The patent office will decide next year whether to grant or deny the request for reexamination. Expect more such petitions targeting Apple patents."
jonklinger writes with the lead from his report on a move to hamper internet freedom in Israel: "Israel is to attempt, again, to pass a bill that authorizes police officers to issue warrants to Internet service providers to block or restrict access to specific websites involved either in gambling, child pornography or copyright infringement. The bill itself proposes that such administrative procedures shall be clandestine and that court decisions shall be made ex-parte, where some of the court's ruling will not be even dislosed to the owner of the website, and the court may hear and use inadmissible evidence."
Hugh Pickens writes "Michael Wilson writes in the NY Times that top intelligence officials in the New York Police Department are looking for ways to target 'apolitical or deranged killers before they become active shooters' using techniques similar to those being used to spot terrorists' chatter online. The techniques would include 'cyber-searches of language that mass-casualty shooters have used in e-mails and Internet postings,' says Police Commissioner Raymond W. Kelly. 'The goal would be to identify the shooter in cyberspace, engage him there and intervene, possibly using an undercover to get close, and take him into custody or otherwise disrupt his plans.' There are also plans to send officers to Newtown and to scenes of other mass shootings to collect information says the department's chief spokesman Paul. J. Browne adding that potential tactics include creating an algorithm that would search online 'for terms used by active shooters in the past that may be an indicator of future intentions.' The NYPD's counter-terrorism division released a report last year, 'Active Shooter (PDF),' after studying 202 mass shooting incidents. 'So, we think this is another logical step,' says Kelly."
First time accepted submitter gannebraemorr writes with this news, snipped from a CBS News report out of New Jersey:"'The Superintendent of the Greater Egg Harbor Regional High School District said around 2 pm Tuesday, a 16 year old student demonstrated behavior that caused concern. A teacher noticed drawings of what appeared to be weapons in his notebook. School officials made the decision to contact authorities. Police removed the 16-year-old boy from Cedar Creek High School in Galloway Township Tuesday afternoon after school officials became concerned about his behavior. The student was taken to the Galloway Township Police Department. Police then searched the boy's home on the 300 block of East Spencer Lane and found several electronic parts and several types of chemicals that when mixed together, could cause an explosion, police say. The unidentified teen was charged with possession of a weapon an [sic] explosive device and the juvenile was placed in Harbor Fields.' If 'chemicals that when mixed together, could cause an explosion' is a crime, I'm pretty sure everyone's cleaning cabinets are evidence just waiting to be found. Bottle of Coke and Mentos... BRB, someone knocking at the door."
mbstone writes "The Air Force has a problem: Its drones generate thousands of hours of video (I almost said 'footage.') And most of it is miles of endless desert. USAF needs to distill the highlights, if you will, and nobody does it better than ESPN, the TV sports network. Air Force officials have asked ESPN for help in analyzing the 327,384 hours collected just this year. What we really need in times like these is sportscaster Warner Wolf. 'Let's go to the videotape, pick it up right here, Taliban in the home black.'"
Dupple sends this news from Reuters: "The European Commission charged Samsung Electronics on Friday with abusing its dominant position in seeking to bar rival Apple from using a patent deemed essential to mobile phone use. The Commission sent a 'statement of objections' to the South Korean group, with its preliminary view that Samsung was not acting fairly. 'Intellectual property rights are an important cornerstone of the single market. However, such rights should not be misused when they are essential to implement industry standards, which bring huge benefits to businesses and consumers alike,' Competition Commissioner Joaquin Almunia said in statement."
Today Nokia announced an agreement with Research In Motion to resolve all patent legislation between the two. The companies have been fighting over patents for almost a decade, most recently over devices with wireless LAN capabilities. The terms of today's agreement were not disclosed but it involved a one-time payment from RIM as well as ongoing payments. This agreement comes shortly after RIM's announcement that it pulled in $9 million in profit last quarter, down 97% from the $265 million they earned in the same quarter the year before. The company has pinned its hopes on BlackBerry 10, scheduled to launch next month: "So this is RIM at the end of 2012: losing subscribers and revenue, facing significant opponents, but with more cash on hand and at least one long-running lawsuit settled. If nothing else, it means the way is clear for RIM to launch its Hail Mary pass: BlackBerry 10."
Lasrick writes "For the first time since 1946, Congress is seriously debating whether the U.S. nuclear weapons complex should be under civilian or military control. That the article is in the Bulletin of Atomic Scientists is significant, as it was many of the scientists who founded BAS who argued for civilian control in the wake of Hiroshima and Nagasaki. They believed that atomic energy was too destructive, and the military too secretive, which would possibly thwart scientific discovery and erect a major obstacle to international control and cooperation. The article talks about how management has changed over the decades and explains the discussion that needs to happen before Congress acts."
New submitter Likes Microsoft writes "Yesterday, Senator Ron Wyden (D-Oregon) introduced a Net Neutrality bill aimed at ISPs using data caps soley for profiteering purposes, rather than the 'traffic management' purpose they often claim. The text of the bill is available at Wyden's Senate page. It would require ISPs to be certified by the FCC before implementing data caps. It says, in part, 'The [FCC] shall evaluate a data cap proposed by an Internet service provider to determine whether the data cap functions to reasonably limit network congestion in a manner that does not unnecessarily discourage use of the Internet.' In a statement, Wyden said, 'Americans are increasingly tethered to the Internet and connecting more devices to it, but they don’t really have the tools to effectively manage data consumption across their networks. Data caps create challenges for consumers and run the risk of undermining innovation in the digital economy if they are imposed bluntly and not designed to truly manage network congestion.'"
First time accepted submitter Seeteufel writes "The controversial Anti-Counterfeiting Trade Agreement is now officially pronounced dead in the E.U. The European Parliament broadly rejected the Anti-Counterfeiting Agreement a while ago, but there was still a court case pending at the European Court of Justice about the legality of ACTA. The Commission was open about its intent to reintroduce ACTA ratification to the Parliament after a positive Court decision. Now we learn the Commission has withdrawn its questions to the Court."
An anonymous reader writes "Jobseekers will be offered the chance to look for work through the new Universal Jobmatch website, which automatically pairs them up with opportunities that suit their skills after scanning their CVs. It will also allow employers to search for new workers among the unemployed and send messages inviting them to interviews. However, their activities may also be tracked using cookies, so their Job Centre advisers know how many searches they have been doing and whether they are turning down viable opportunities. Iain Duncan-Smith, the Work and Pensions Secretary, said the scheme would 'revolutionize' the process of looking for work. He said anyone without a job after signing up to the scheme would be lacking 'imagination.'"
identity0 writes "According to Japan Probe, Hiroyuki Nishimura, the founder of 2ch.net, has been charged with drug offenses by Japanese police over a forum post made on 2ch in 2010. He is not even accused of making the post, but of failure to have moderators delete it. The post apparently discussed drugs. 2ch.net (also called 2channel) is Japan's biggest forum, with over a million posts a day, of which the post in question was one. The site inspired image board 2chan.net (but is not directly related to it), which spawned copycat English site 4chan.net. More info at Slashdot Japan, if you can read Japanese."
OverTheGeicoE writes "TSA gets discussed on Slashdot from time to time, usually negatively. Have you ever wondered about the TSA screeners' perspective? Taking Sense Away is a blog, allegedly written by a former TSA screener, offering insider perspectives on TSA topics. For example, there's the Insider's TSA Dictionary, whose entries are frequently about the code screeners use to discuss attractive female passengers (like 'Code Red,' 'Fanny Pack,' and 'Hotel Bravo'). Another posting explains what goes on in private screening rooms, which the author claims is nothing compared to screener conduct in backscatter image operator rooms. Apparently what happens in the IO room stays in the IO room. Today's posting covers how TSA employees feel about working for 'a despised agency'. For many the answer is that they hate working for 'the laughing stock of America's security apparatus,' try to hide that they work for TSA, and want to transfer almost anywhere else ASAP."
An anonymous reader writes "Russian firm ElcomSoft on Thursday announced the release of Elcomsoft Forensic Disk Decryptor (EFDD), a new forensic tool that can reportedly access information stored in disks and volumes encrypted with desktop and portable versions of BitLocker, PGP, and TrueCrypt. EFDD runs on all 32-bit and 64-bit editions of Windows XP, Windows Vista, and Windows 7, as well as Windows 2003 and Windows Server 2008." All that for $300.
SternisheFan writes with a story at PC Mag that New York Attorney General Eric T. Schneiderman has announced that more than 2000 registered sex offenders have been kicked off various online gaming platforms, in an cooperative effort involving both the state and various gaming companies. From that article: "Earlier this year, the accounts of 3,500 additional offenders were removed from platforms operated by Microsoft, Apple, Blizzard Entertainment, Electronic Arts, Disney Interactive Media Group, and Warner Brothers. New York State's Electronic Securing and Targeting of Online Predators Act (e-STOP) law requires convicted sex offenders to register all of their email addresses, screen names, and other Internet identifiers with the state. Schneiderman's office then makes that information available to certain websites so they can make sure that their communities were not being used by predators. Operation: Game Over, however, is the first time e-STOP has been applied to online gaming platforms, he said. Since many online gaming platforms let users send messages to other players anonymously, it's unsafe to have convicted offenders using these services, Schneiderman said."
nk497 writes "Earlier this year, the UK's data watchdog the ICO started enforcing an EU rule that means websites must ask visitors before dropping cookies onto their computers. However, it was willing to accept 'implied consent' — telling visitors that cookies are used on the site, and assuming they were fine with that if they keep using the site. That led to banners popping up on every major website, including the ICO's site, warning users about cookies. Now, the ICO has revealed that many of the cookie-related complaints it's received in the past six months are actually about those banners — and the law itself. The ICO said people 'are unhappy with implied consent mechanisms, especially where cookies are placed immediately on entry to the site,' adding 'a significant number of people also raised concerns about the new rules themselves and the effect of usability of websites.'"
An anonymous reader writes "The internet control in China seems to have been tightened recently, according to the Guardian. Several VPN providers claimed that the censorship system can 'learn, discover and block' encrypted VPN protocols. Using machine learning algorithms in protocol classification is not exactly a new topic in the field. And given the fact that even the founding father of the 'Great Firewall,' Fan Bingxing himself, has also written a paper about utilizing machine learning algorithm in encrypted traffic analysis, it would be not surprising at all if they are now starting to identify suspicious encrypted traffic using numerically efficient classifiers. So the arm race between anti-censorship and surveillance technology goes on."