theodp writes "The e-mail that Defendant Swartz's supplemental memorandum (pdf) cites as paramount to his fifth motion to suppress [evidence against him] is relevant, but not nearly as important as he tries to make it out to be,' quipped United States Attorney Carmen M. Ortiz (pdf) in a court filing made on the same day Aaron Swartz committed suicide. In the 1-7-2011 e-mail Ortiz refers to, which was not produced for Swartz until Dec. 14th — almost two years after his 1-6-2011 arrest — a Secret Service agent reported to the Assistant U.S. Attorney that he was 'prepared to take custody anytime' of Swartz's laptop, although no one had yet sought a warrant to search the computer. In Prosecutor as Bully, Larry Lessig laments, 'They [JSTOR] declined to pursue their own action against Aaron, and they asked the government to drop its. MIT, to its great shame, was not as clear, and so the prosecutor had the excuse he needed to continue his war against the "criminal" who we who loved him knew as Aaron.' Swartz's family also had harsh words for MIT and prosecutors: 'Decisions made by officials in the Massachusetts U.S. Attorney's office and at MIT contributed to his death. The US Attorney's office pursued an exceptionally harsh array of charges, carrying potentially over 30 years in prison, to punish an alleged crime that had no victims. Meanwhile, unlike JSTOR, MIT refused to stand up for Aaron.' With MIT President Emeritus Charles M. Vest currently serving as a Trustee of JSTOR parent Ithaka as well as a Trustee of The MIT Corporation, one might have expected MIT to issue a statement similar to the let's-put-this-behind-us one JSTOR made on the Swartz case back in 2011."
New submitter LordLucless writes "ASIO, Australia's spy agency, is pushing for the ability to lawfully hijack peoples' computers — even if they are not under suspicion of any crime. They seek the ability to gain access to a third party's computer in order to facilitate gaining access to the real target — essentially using any person's personal computer as a proxy for their hacking attempts. The current legislation prohibits any action by ASIO that, among other things, interferes with a person's legitimate use of their computer. Conceivably, over-turning this restriction would give ASIO the ability to build their own bot-net of compromised machines. Perhaps inevitably, they say these changes are required to help them catch terrorists."
Qedward writes "The Norwegian Ministry of Finance seems to be taking a bit of stick at the moment. It wants all the existing cash registers in the country thrown out and replaced with new ones. Not surprisingly, this massive upgrade is not popular. But it is apparently being pushed through in an attempt to prevent cash registers' figures being massaged downwards in use so as to reduce tax. The Norwegian association of tax auditors said: 'The source code must be opened.' 'Without source code it is not possible to determine whether or "hidden" functionality exists or not. Just knowing that the tax authorities have access to the source code of the application, will reduce the effort to implement hidden functionality in the software.'"
New submitter fractalVisionz writes "The White House has officially responded to the petition to secure resources and funding to begin Death Star construction by 2016, as previously discussed on Slashdot. With costs estimated over $850,000,000,000,000,000 (that's $850 quadrillion), and a firm policy stating 'The Administration does not support blowing up planets,' the U.S. government will obviously decline. However, that is not to say we don't already have a Death Star of our own, floating approximately 120 miles above the earth's surface. The response ends with a call to those interested in STEM (Science, Technology, Engineering, and Mathematics) fields of study: 'If you do pursue a career in a science, technology, engineering or math-related field, the Force will be with us! Remember, the Death Star's power to destroy a planet, or even a whole star system, is insignificant next to the power of the Force.'"
Trailrunner7 writes "A 24-year-old Algerian man remains in a Thai jail awaiting extradition to the United States, where he is suspected of masterminding more than $100 million in global bank heists using the ZeuS and SpyEye Trojans. Malaysian authorities believe they've apprehended the hacker Hamza Bendelladj, who they say has been jetsetting around the world using millions of dollars stolen online from various banks. He was arrested at a Bangkok airport en route from Malaysia to Egypt. The hacker had developed a considerable reputation as a major operator of ZeuS-powered botnets and bragged about his exploits"
Dangerous_Minds writes "Next month, tribunals will begin for the first people receiving their third strikes in the New Zealand 'Three Strikes Law.' In all, 11 people will have their cases heard, including one who said that her connection was used without her knowledge. Freezenet notes that there has been a long history of controversy for the law from the Internet blackout protests of 2008 to the cablegate leak which revealed that the law was financed and pushed by the United States."
An anonymous reader writes "With the 'six-strikes' anti-piracy plan set to begin in the U.S. soon, TorrentFreak has gotten its hands on a document showing how Verizon in particular will be dealing with copyright-infringing users. For your first and second strike, Verizon will email you and leave you a voicemail informing you that your account is involved in copyright infringement. For your third and fourth strikes, the ISP will automatically redirect your browser to a page that requires you to acknowledge receiving the alerts. They'll also play a video about the dangers of infringement. For your fifth and sixth strikes, they give you three options: massively throttle your connection for a few days, wait two weeks and then throttle your connection, or file an appeal with an arbitration service for $35. TorrentFreak points out that the MPAA and RIAA can obtain the connection information of repeat infringers, with which they can then take legal action."
redletterdave writes "Only a small number of U.S. cities can boast fiber optic connections, but in China, it's either fiber or bust. China's Ministry of Industry and Information Technology has now ordered all newly built residences to install fiber optic connections in any city or county 'where a public fiber optic telecom network is available.' The new standards will take effect starting on April 1, 2013, and residents will be able to choose their own ISP with equal connections to services. The Chinese government reportedly hopes to have 40 million families connected to fiber networks by 2015."
Dupple sends word from the BBC that the U.S. Federal Aviation Administration will be conducting a safety review of the Boeing 787 Dreamliner after a number of incidents have called the aircraft's hardiness into question. "An electrical fire, a brake problem, a fuel spill and cracks in the cockpit's windshield have affected Dreamliner flights in the past week. ... The Boeing 787 Dreamliner is one of the most advanced aeroplanes ever created. Much of it is made from very strong, light carbon-fibre composite material. However, a spate of technical issues has hurt its image. On Friday, two new problems were found, adding to Boeing's woes." A spokesman for Boeing said they were "absolutely confident in the reliability and performance of the 787," and were cooperating fully with the FAA's investigation. The 787 went into service in 2011, and 50 have been delivered to various airlines since then, with hundreds more on order. Qatar Airways has received five of them, and it has criticized Boeing for manufacturing faults.
angry tapir writes "Australia's Classification Board today announced the first video game to receive the new R18+ classification which came into effect at the start of 2013, indicating the title is to be sold only to adults. Ninja Gaiden 3: Razor's Edge, developed by Team Ninja, is published by Nintendo for the company's new Wii U console. The R18+ classification was created after a long campaign by gamers and game publishers. Previously games had a maximum rating of MA, and titles that didn't meet the criteria had to be reworked or not released in Australia."
bednarz writes "It's official: IBM has dominated the U.S. patent race for two decades. IBM earned 6,478 utility patents last year, topping the list of patent winners for the 20th year in a row, according to data published today from IFI CLAIMS Patent Services. Samsung was the second most prolific patent winner, with 5,081 patents received in 2012, followed by Canon (3,174), Sony (3,032), Panasonic (2,769), Microsoft (2,613), Toshiba (2,447), Hon Hai Precision Industry (2,013), GE (1,652), and LG Electronics (1,624). Earning its first appearance among the top 50, Google increased its 2012 patent count by 170% to 1,151 patents and landed at 21 in IFI's rankings, up from 65 in 2011. Google narrowly beat Apple, which earned 1,136 patents (an increase of 68%) and landed at 22 in the rankings."
Nerval's Lobster writes "One of the first servers used by notorious torrent tracker The Pirate Bay has ended up at the Computer Museum in Linköping. A picture of the exhibit sent to TorrentFreak shows the server in its original tower casing. The hardware will headline an exhibit on 50 years of file sharing. As the exhibit notes, The Pirate Bay is one of the focal points for the file-sharing phenomenon, used to share both copyrighted works (such as music and movies) and free-for-all material (open-source Linux distributions and the like). The sharing of the former has created a worldwide cat-and-mouse game, with governments doing their best to block file-sharing sites, capture their servers, and prosecute their operators. 'In less than ten years The Pirate Bay has become a contemporary historical phenomenon, due to its distinguished position in the file-sharing debate,' according to the museum exhibit. 'The discussions that have sprung from this simple computer server concerns serious subjects as freedom of speech, global democracy and of course the sole existence of copyright.'"
tsu doh nimh writes "The miscreants who maintain Blackhole and Nuclear Pack — competing crimeware products that are made to be stitched into hacked sites and use browser flaws to foist malware — say they've added a brand new exploit that attacks a previously unknown and currently unpatched security hole in Java. The curator of Blackhole, a miscreant who uses the nickname 'Paunch,' announced yesterday on several Underweb forums that the Java zero-day was a 'New Year's Gift,' to customers who use his exploit kit. The exploit has since been verified to work on all Java 7 versions by AlienVault Labs. The news comes days after it was revealed that Paunch was reserving his best exploits for a more closely-held exploit pack called Cool Exploit Kit, a license for which costs $10,000 per month."
judgecorp writes "Nokia has admitted that it routinely decrypts user's HTTPS traffic, but says it is only doing it so it can compress it to improve speed. That doesn't convince security researcher Gaurang Pandya, who accuses the company of spying on customers." From the article, Nokia says: "'Importantly, the proxy servers do not store the content of web pages visited by our users or any information they enter into them. When temporary decryption of HTTPS connections is required on our proxy servers, to transform and deliver users' content, it is done in a secure manner. ... Nokia has implemented appropriate organisational and technical measures to prevent access to private information. Claims that we would access complete unencrypted information are inaccurate.'"
coondoggie writes "With China once again playing games with the rare earth materials it largely holds sway over, the U.S. Department of Energy today said it would set up a research and development hub that will bring together all manner of experts to help address the situation. The DOE awarded $120 million to Ames Laboratory to set up an Energy Innovation Hub that will develop solutions to the domestic shortages of rare earth metals and other materials critical for U.S. energy security, the DOE stated."
cervesaebraciator writes "Tim Lee over at Ars Technica recently interviewed Derek Khanna, a former staffer for the Republican Study Committee. As reported on Slashdot, Khanna wrote a brief suggesting the current copyright law might not constitute free market thinking. He was rewarded for his efforts with permanent time off of work. Khanna continues to speak out about the need for copyright reform as well as its potential as a winning electoral issue and, according to Lee, he's actually beginning to receive some positive attention for his efforts. 'I encourage Hill staffers to bring forth new ideas. Don't be discouraged by the potential consequences,' Khanna told Ars. 'You work for the American people. It's your job, your obligation to be challenging existing paradigms and put forward novel solutions to existing problems.' Would that more in both major parties thought like this."
BeatTheChip writes "The day Andrea Hernandez lost her federal case against expulsion for refusing a school mandated RFID badge, Rep. Lois Kolkhorst moved to file two bills on the first day of the Texas Legislative session. Kolkhorst has sponsored several anti-RFID bills for schools over the years. This year they are HB 101 and HB 102."
New submitter Bugs42 writes "CNN.com has an opinion piece on the possibility of cramming guns full of computers and sensors to disable them in certain buildings or around children. The author, in true mainstream media fashion, completely fails to see any possible technical problems with this. Quoting: 'How might this work? Start with locational "self-awareness." Guns should know where they are and if another gun is nearby. Global positioning systems can meet most of the need, refining a gun's location to the building level, even within buildings. Control of the gun would remain in the hand of the person carrying it, but the ability to fire multiple shots in crowded areas or when no other guns are present would be limited by software that understands where the gun is being used. Guns should also be designed to sense where they are being aimed. Artificial vision and optical sensing technology can be adapted from military and medical communities. Sensory data can be used by built-in software to disable firing if the gun is pointed at a child or someone holding a child."
Bob the Super Hamste writes "The St. Paul Pioneer Press is reporting that Andrew Henderson was recording Ramsey County sheriff's deputies frisking a bloody-faced man, who was then loaded into an ambulance by paramedics. Then sheriff's deputy Jacqueline Muellner approached Henderson and confiscated his video camera, stating, 'We'll just take this for evidence,' which was recorded on Henderson's cell phone. On October 30th, Henderson went to the Arden Hills sheriff's office to retrieve his video camera, where he was told where he would have to wait to receive his camera back. A week later, Henderson was charged with obstruction of legal process and disorderly conduct, with the citation stating, 'While handling a medical/check the welfare (call), (Henderson) was filming it. Data privacy HIPAA violation. Refused to identify self. Had to stop dealing with sit(uation) to deal w/Henderson.' In mid November, Henderson went back to the sheriff's office to attempt to retrieve his camera and get a copy of the report when Deputy Dan Eggers refused. ... Jennifer Granick, a specialist on privacy issues at Stanford University Law School, states that the alleged violation of HIPAA rules by Andrew Henderson is nonsense, stating, 'There's nothing in HIPAA that prevents someone who's not subject to HIPAA from taking photographs on the public streets, HIPAA has absolutely nothing to say about that.'" The article notes that the Deputy in question basically told the guy he was arrested for being a "buttinski" and recording someone in the midst of a violent mental health breakdown. Supposedly the footage was deleted from the camera while in police custody.
judgecorp writes "British Members of Parliament have warned that the UK's cyber warfare strategy is getting it wrong. According to a defense committee report, the country's IT security forces are inadequately prepared for a cyber attack, rely too heavily on inadequately protected systems, and do not sufficiently appreciate the difficulty of attributing the source of an attack."