×
The Almighty Buck

MasterCard and Visa Start Banning VPN Providers 353

Nyder sends this quote from TorrentFreak: "Swedish payment service provider Payson received an email stating that VPN services are no longer allowed to accept Visa and MasterCard payments due to a recent policy change. ... The new policy went into effect on Monday, leaving customers with a two-day window to find a solution. While the email remains vague about why this drastic decision was taken, in a telephone call Payson confirmed that it was complying with an urgent requirement from Visa and MasterCard to stop accepting payments for VPN services. 'It means that U.S. companies are forcing non-American companies not to allow people to protest their privacy and be anonymous, and thus the NSA can spy even more.'" Oddly, this comes alongside news that MasterCard has backed down on its financial blockade against WikiLeaks.
Government

Egyptian President Overthrown, Constitution Suspended 413

Al Jazeera and other publications are reporting that Egyptian President Mohamed Morsi has been overthrown by the country's army. General Abdel Fattah al-Sisi, head of the Egyptian armed forces, said in a televised announcement that Morsi had been removed from power, the Constitution had been suspended, and Adli al-Mansour, leader of Egypt's Supreme Constitutional Court, had been appointed to lead the country until elections can be held. "Sisi called for presidential and parliamentary elections, a panel to review the constitution and a national reconciliation committee that would include youth movements. He said the roadmap had been agreed by a range of political groups." According to the BBC's report, "General Sisi said on state TV that the armed forces could not stay silent and blind to the call of the Egyptian masses," and "The army is currently involved in a show of force, fanning out across Cairo and taking control of the capital."
Privacy

USPS Logs All Snail Mail For Law Enforcement 324

The NY Times reports on a program in use by the United States Postal Service that photographs the exterior of every piece of mail going through the system and keeps it for law enforcement agencies. While the volume of snail mail is dropping, there were still over 160 billion pieces of mail last year. "The Mail Isolation Control and Tracking program was created after the anthrax attacks in late 2001 that killed five people, including two postal workers. Highly secret, it seeped into public view last month when the F.B.I. cited it in its investigation of ricin-laced letters sent to President Obama and Mayor Michael R. Bloomberg. It enables the Postal Service to retroactively track mail correspondence at the request of law enforcement. No one disputes that it is sweeping." This is in addition to the "mail covers" program, which has been used to keep tabs on mailings sent to and from suspicious individuals for over a century. "For mail cover requests, law enforcement agencies simply submit a letter to the Postal Service, which can grant or deny a request without judicial review. Law enforcement officials say the Postal Service rarely denies a request. In other government surveillance program, such as wiretaps, a federal judge must sign off on the requests. The mail cover surveillance requests are granted for about 30 days, and can be extended for up to 120 days. There are two kinds of mail covers: those related to criminal activity and those requested to protect national security. The criminal activity requests average 15,000 to 20,000 per year, said law enforcement officials who spoke on the condition of anonymity because they are prohibited by law from discussing the requests. The number of requests for antiterrorism mail covers has not been made public."
EU

Bolivian President's Plane 'Rerouted Over Snowden Suspicions' 621

niftydude writes with the latest news on the Edward Snowden saga. It appears that the Bolivian President's plane was denied access to French and Spanish airspace due to suspicions that Snowden was on board. Quoting a few pieces from the Guardian: "In an extraordinary move, France and Portugal revoked flight clearances for the Bolivian President's plane on Tuesday after representations were reportedly made by the U.S. State Department. Mr Morales was flying home from an energy conference in Moscow and his aircraft was hastily rerouted to Vienna, Austria. Bolivian Foreign Minister David Choquehuanca angrily denied that Mr Snowden was on the President's aircraft, a fact later confirmed by Austrian authorities, and said France and Portugal would have to explain why they abruptly canceled authorization for the flight. AP reports that Venezuela's foreign minister Elias Jaua has condemned the decision by France and Portugal to block the plane from its airspace. He claimed that changing a flight's route without checking on how much fuel was left in the plane, put Morales' life at risk." Spain claims they only agreed to allow the plane to refuel there if it were subject to search, and France did end up authorizing use of their air space today. In related news, Julian Assange and the general secretary of Reporters Without Borders Christophe Deloire published an Op-Ed today why Europe must protect Snowden. And: dryriver sends news that Ecuador discovered that their embassy in London was bugged, describing the incident as "another instance of a loss of ethics at the international level in relations between governments."
Government

Obamacare Employer Mandate Delayed Until After Congressional Elections 600

theodp writes "If you hoped your employer would finally provide health insurance in 2014, take two aspirin and call your doctor in the morning — the morning of January 1st, 2015. The Obama administration will delay a crucial provision of its signature health-care law until 2015, giving businesses an extra year to comply with a requirement that they provide their workers with insurance. The government will postpone enforcement of the so-called employer mandate until 2015, after the congressional elections, the administration said Tuesday. Under the provision, companies with 50 or more workers face a fine of as much as $3,000 per employee if they don't offer affordable insurance."
Privacy

US Director of National Intelligence Admits He Was Wrong About Data Collection 296

Gunkerty Jeb writes "In a highly unusual move, James Clapper, the director of national intelligence, said Tuesday that he misspoke when he told a Congressional committee in March that the National Security Agency does not collect data on millions of Americans. Clapper said at the time that the agency does not do so 'wittingly,' but in a letter to the chair of the Senate Select Committee on Intelligence, Clapper admitted this statement was 'erroneous.' Clapper, the top U.S. intelligence official, has been quite vocal in his defense of the NSA's now-public surveillance programs such as PRISM and the metadata collection program. In statements published shortly after the leak of classified documents by Edward Snowden about those collection efforts Clapper said that they both have been repeatedly authorized by Congress and the executive and judicial branches over the years."
Encryption

Calif. Attorney General: We Need To Crack Down On Companies That Don't Encrypt 127

tsamsoniw writes "California Attorney Kamala Harris says her office will start cracking down on companies in the Golden State that don't encrypt customer data and fall victim to data breaches; she's also calling on the state to pass a law requiring companies to use encryption. That's just one of the recommendations in the state's newly released data breach report, which says 131 companies in California suffered data breaches in 2012, affecting 2.5 million residents."
Communications

Technology, Not Law, Limits Mass Surveillance 191

holy_calamity writes "U.S. citizens have historically been protected from government surveillance by technical limits, not legal ones, writes independent security researcher Ashkan Soltani at MIT Tech Review. He claims that recent leaks show that technical limits are loosening, fast, with data storage and analysis cheap and large Internet services taking care of data collection for free. 'Spying no longer requires following people or planting bugs, but rather filling out forms to demand access to an existing trove of information,' writes Soltani."
Privacy

What Does Six Months of Meta-Data Look Like? 60

SpicyBrownMustard sends in a fascinating data visualization at Zeit Online showing what information about a person's life can be gleaned from cellphone metadata. Quoting: "Green party politician Malte Spitz sued to have German telecoms giant Deutsche Telekom hand over six months of his phone data that he then made available to ZEIT ONLINE. We combined this geolocation data with information relating to his life as a politician, such as Twitter feeds, blog entries and websites, all of which is all freely available on the internet. By pushing the play button, you will set off on a trip through Malte Spitz's life. The speed controller allows you to adjust how fast you travel, the pause button will let you stop at interesting points. In addition, a calendar at the bottom shows when he was in a particular location and can be used to jump to a specific time period. Each column corresponds to one day."
Cellphones

Motorola Is Listening 287

New submitter pbritt writes "Ben Lincoln was hooking up to Microsoft ActiveSync at work when he 'made an interesting discovery about the Android phone (a Motorola Droid X2) which [he] was using at the time: it was silently sending a considerable amount of sensitive information to Motorola, and to compound the problem, a great deal of it was over an unencrypted HTTP channel.' He found that photos, passwords, and even data about his home screen config were being sent regularly to Motorola's servers. He has screenshots showing much of the data transmission."
Privacy

NSA Backdoors In Open Source and Open Standards: What Are the Odds? 407

New submitter quarrelinastraw writes "For years, users have conjectured that the NSA may have placed backdoors in security projects such as SELinux and in cryptography standards such as AES. However, I have yet to have seen a serious scientific analysis of this question, as discussions rarely get beyond general paranoia facing off against a general belief that government incompetence plus public scrutiny make backdoors unlikely. In light of the recent NSA revelations about the PRISM surveillance program, and that Microsoft tells the NSA about bugs before fixing them, how concerned should we be? And if there is reason for concern, what steps should we take individually or as a community?" Read more below for some of the background that inspires these questions.
Security

Edward Snowden Files For Political Asylum In Russia 447

vikingpower writes "The official Russian Press agency Interfax has the scoop: Edward Snowden asks for political asylum in Russia (Google Translate). Russia Today, however, denies the news. Is this part of a clever disinformation move by Snowden, who reportedly is still in the Moscow airport Sheremetyevo 2?" The Washington Post is also reporting Snowden did apply for asylum in Russia. Snowden released a statement last night through Wikileaks, quoting: "For decades the United States of America has been one of the strongest defenders of the human right to seek asylum. Sadly, this right, laid out and voted for by the U.S. in Article 14 of the Universal Declaration of Human Rights, is now being rejected by the current government of my country. The Obama administration has now adopted the strategy of using citizenship as a weapon. Although I am convicted of nothing, it has unilaterally revoked my passport, leaving me a stateless person. Without any judicial order, the administration now seeks to stop me exercising a basic right. A right that belongs to everybody. The right to seek asylum."
Patents

FTC Chairwoman Speaks On Growing US Patent Problem 87

ectoman writes "In a recent policy speech, Federal Trade Commission Chairwoman Edith Ramirez indicated that the FTC might be preparing to seriously address patent abuse in the United States. Mark Bohannon, Vice President of Corporate Affairs and Global Public Policy at Red Hat, has reviewed Ramirez's remarks, calling them 'some of the most direct and specific to date from a senior U.S. Government official regarding "harmful PAE [patent assertion entities] activities."' Bohannon writes that the FTC's proposed roadmap for patent reform 'is both ambitious and doable,' and he discusses how the agency could make its potential contributions to reforms most effective. The piece arrives one week after Bohannon analyzed other patent reform efforts currently ongoing in Washington—in a piece Slashdot readers have been discussing."
United States

More Details Emerge On How the US Is Bugging Its European Allies 442

dryriver writes with this excerpt from the Guardian: "U.S. intelligence services are spying on the European Union mission in New York and its embassy in Washington, according to the latest top secret U.S. National Security Agency documents leaked by the whistleblower Edward Snowden. One document lists 38 embassies and missions, describing them as 'targets.' It details an extraordinary range of spying methods used against each target, from bugs implanted in electronic communications gear to taps into cables to the collection of transmissions with specialised antennae. Along with traditional ideological adversaries and sensitive Middle Eastern countries, the list of targets includes the E.U. missions and the French, Italian and Greek embassies, as well as a number of other American allies, including Japan, Mexico, South Korea, India and Turkey. ... One of the bugging methods mentioned is codenamed Dropmire, which, according to a 2007 document, is 'implanted on the Cryptofax at the E.U. embassy, DC' – an apparent reference to a bug placed in a commercially available encrypted fax machine used at the mission. The NSA documents note the machine is used to send cables back to foreign affairs ministries in European capitals."
Displays

Why Apple and Samsung Still Get Along, Behind the Courtroom Battles 125

After suing each other for the last few years in various courts around the world, you'd think that if Apple and Samsung were human beings they would have walked away from their rocky relationship a while back. The Wall Street Journal explains (beside the larger fact that they're both huge companies with complex links, rather than a squabbling couple) why it's so hard for Apple to take up with another supplier. Things are starting to look different, though: "Apple's deal this month to start buying chips from TSMC is a milestone. Apple long wanted to build its own processors, and it bought a chip company in 2008 to begin designing the chips itself. But it continued to rely on Samsung to make them. ... TSMC plans to start mass-producing the chips early next year using advanced '20-nanometer' technology, which makes the chips potentially smaller and more energy-efficient."
Communications

WA Post Publishes 4 More Slides On Data Collection From Google, Et Al 180

anagama writes "Lots of new program names, flowcharts, and detail in four previously unreleased PRISM slides published by the Washington Post today. These slides provide some additional detail about PRISM and outline how the NSA gets information from those nine well known internet companies. Apparently, the collection is done by the FBI using its own equipment on the various companies' premises and then passed to the NSA where it is filtered and sorted."
Privacy

To Counter Widespread Surveillance, Stealth Clothing 104

In Paul Theroux's dystopian novel O-Zone, wearing masks in public is simply a fact of life, because of the network of cameras that covers the inhabited parts of earth. Earthquake Retrofit writes with a story at the New York Times describing a life-imitating-art reaction to the perception (and reality) that cameras are watching more of your life than you might prefer: clothing that obscures your electronic presence. "[Adam Harvey] exhibited a number of his stealth-wear designs and prototypes in an art show this year in London. His work includes a series of hoodies and cloaks that use reflective, metallic fabric — like the kind used in protective gear for firefighters — that he has repurposed to reduce a person’s thermal footprint. In theory, this limits one’s visibility to aerial surveillance vehicles employing heat-imaging cameras to track people on the ground. He also developed a purse with extra-bright LEDs that can be activated when someone is taking unwanted pictures; the effect is to reduce an intrusive photograph to a washed-out blur. In addition, he created a guide for hairstyling and makeup application that might keep a camera from recognizing the person beneath the elaborate get-up. The technique is called CV Dazzle — a riff on 'computer vision' and 'dazzle,' a type of camouflage used during World War II to make it hard to detect the size and shape of warships."
EU

Snowden: NSA Spying On EU Diplomats and Administrators 417

An anonymous reader writes "According to a report dated 2010 recently provided by [former NSA contractor Edward] Snowden to the German news magazine 'Der Spiegel', the NSA has systematically been spying on institutions of the EU in Washington DC, New York, and Brussels. Methods of spying include bugging, phone taps, and network intrusions and surveillance according to the documents." All part of a grand tradition.
Privacy

Ask Slashdot: Explaining Cloud Privacy Risks To K-12 Teachers? 168

hyperorbiter writes "With the advent of Google Apps for Education, there has been a massive uptake by the K12 schools I deal with on signing students up with their own Google powered email address under the school domain. In addition, the students' work when using Google Apps is stored offshore and out of our control — with no explicit comeback if TOS are breached by Google. It seems to me that the school cannot with integrity maintain it has control over the data and its use. I have expressed a concern that it is unethical to use these services without informing the students' parents of what is at stake e.g. the students are getting a digital footprint from the age of seven and are unaware of the implications this may have later in life. The response has often been that I'm over-reacting and that the benefits of the services far outweigh the concerns, so rather than risk knee jerk reactions by parents (a valid concern) and thereby hampering 'education', it's better to not bring this stuff up. My immediate issue isn't so much about the use of the cloud services now, but the ethics over lack of disclosure in the parental consent process. Does anyone have ideas about defining the parameters of 'informed consent' where we inform of risks without bringing about paranoia? (Google Apps is just an example here, I think it applies to many cloud services.)"
United States

Number of Federal Wiretaps Rose 71 Percent In 2012 84

cold fjord writes "Looks like last year was pretty busy. I wonder how many were leaks and media? From the Washington Post: 'The number of wiretaps secured in federal criminal investigations jumped 71 percent in 2012 over the previous year, according to newly released figures. Federal courts authorized 1,354 interception orders for wire, oral and electronic communications, up from 792 the previous year, ... There was a 5 percent increase in state and local use of wiretaps in the same period. ... There is no explanation of why the federal figures increased so much, and it is generally out of line with the number of wiretaps between 1997 and 2009, which averaged about 550 annually. There was also a large number of wiretaps in 2010, when 1,207 were secured. A single wiretap can sweep up thousands of communications. One 30-day local wiretap in California, for instance, generated 185,268 cellular telephone interceptions, of which 12 percent were incriminating, according to the report. The vast majority of the wiretaps in both federal and state cases were obtained as part of drug investigations, and they overwhelmingly were directed at cellphones ... Only 14 court orders were for personal residences. Most jurisdictions limit the period of surveillance to 30 days, but extensions can be obtained.'"

Slashdot Top Deals