×
Patents

Intuit Beats SSL Patent Troll That Defeated Newegg 59

Last fall, Newegg lost a case against patent troll TQP for using SSL with RC4, despite arguments from Diffie of Diffie-Hellman key exchange. Intuit was also targeted by a lawsuit for infringing the same patent, and they were found not to be infringing. mpicpp (3454017) sends this excerpt from Ars: U.S. Circuit Judge William Bryson, sitting "by designation" in the Eastern District of Texas, has found in a summary judgment ruling (PDF) that the patent, owned by TQP Development, is not infringed by the two defendants remaining in the case, Intuit Corp. and Hertz Corp. In a separate ruling (PDF), Bryson rejected Intuit's arguments that the patent was invalid. Not a complete victory (a clearly bogus patent is still not invalidated), but it's a start.
Medicine

Hospitals Begin Data-Mining Patients 162

schwit1 (797399) sends word of a new and exciting use for all of the data various entities are collecting about you. From the article: You may soon get a call from your doctor if you've let your gym membership lapse, made a habit of ordering out for pizza or begin shopping at plus-sized stores. That's because some hospitals are starting to use detailed consumer data to create profiles on current and potential patients to identify those most likely to get sick, so the hospitals can intervene before they do. Acxiom Corp. (ACXM) and LexisNexis are two of the largest data brokers who collect such information on individuals. They say their data are supposed to be used only for marketing, not for medical purposes or to be included in medical records. While both sell to health insurers, they said it's to help those companies offer better services to members.
Privacy

Australian Government Seeks To Boost Spy Agencies' Powers 54

angry tapir writes The Australian government has indicated it intends to seek a boost to the powers of Australia's spy agencies, particularly ASIO (the Australian Security Intelligence Organization). The attorney-general told the Senate today that the government would introduce legislation based on recommendations of a parliamentary committee that last year canvassed "reforms" including boosting ASIO's power to penetrate third party computer systems to intercept communications to and from a target. That report also covered other issues such as the possibility of introducing a mandatory data retention scheme for ISPs and telcos.
The Courts

Supreme Court Rules Cell Phones Can't Be Searched Without a Warrant 249

New submitter CarlThansk (3713681) writes The courts have long debated on if cell phones can be searched during an arrest without a warrant. Today, the Supreme Court unanimously ruled that the police need warrants to search the cellphones of people they arrest. "Chief Justice John G. Roberts Jr., writing for the court, said the vast amount of data contained on modern cellphones must be protected (PDF) from routine inspection." Phones may still be searched under limited circumstances (imminent threats), but this looks like a clear win for privacy. Quoting the decision: "We cannot deny that our decision today will have an impact on the ability of law enforcement to combat crime. Cell phones have become important tools in facilitating coordination and communication among members of criminal enterprises, and can provide valuable incriminating information about dangerous criminals. Privacy comes at a cost."
The Courts

Supreme Court Rules Against Aereo Streaming Service 484

New submitter Last_Available_Usern (756093) writes that the Aereo saga is likely over. "The U.S. Supreme Court today dealt a potentially fatal blow to Aereo, an Internet service that allows customers to watch broadcast TV programs on mobile devices by renting a small DVR and antennas (in supported cities) to record and then retransmit local programming on-demand over the internet." Ruling (PDF). Aereo was found to be publicly transmitting, according to SCOTUSBlog "The essence of the Aereo ruling is that Aereo is equivalent to a cable company, not merely an equipment provider."
Security

Banking Fraud Campaign Steals 500k Euros In a Week 35

An anonymous reader writes The experts at Kaspersky Lab have discovered evidence of a targeted attack against the clients of a large European bank. According to the logs found in the server used by the attackers, apparently in the space of just one week cybercriminals stole more than half a million euros from accounts in the bank. The experts also detected transaction logs on the server, containing information about which sums of money were taken from which accounts. All in all, more than 190 victims could be identified, most of them located in Italy and Turkey. The sums stolen from each bank account, according to the logs, ranged between 1,700 to 39,000 euros.
Wikipedia

Wikipedia Editors Hit With $10 Million Defamation Suit 268

New submitter Andreas Kolbe writes: "Businessman, philanthropist and musician Yank Barry and the Global Village Champions Foundation are suing four Wikipedia editors for defamation, claiming they have maliciously conspired to keep Barry's Wikipedia biography unduly negative. The Daily Dot article includes a copy of the legal brief and quotes Barry as saying, "My page was so ridiculously false and made me sound like a terrible person and people believed it causing deals to fall through. I finally had enough."
Transportation

Federal Judge Rules US No-fly List Violates Constitution 276

New submitter dmitrygr sends this news from Reuters: The U.S. government's no-fly list banning people accused of links to terrorism from commercial flights violates their constitutional rights because it gives them no meaningful way to contest that decision, a federal judge ruled on Tuesday. ... "The court concludes international travel is not a mere convenience or luxury in this modern world. Indeed, for many international travel is a necessary aspect of liberties sacred to members of a free society," [U.S. District Judge Anna Brown] wrote in her 65-page ruling (PDF). "Accordingly, on this record the court concludes plaintiff's inclusion on the no-fly list constitutes a significant deprivation of their liberty interests in international travel," Brown said.
Government

FAA Bans Delivering Packages With Drones 199

An anonymous reader sends this report from Ars Technica: The Federal Aviation Administration has said that online shopping powerhouse Amazon may not employ drones to deliver packages, at least not anytime soon. The revelation was buried in an FAA document (PDF) unveiled Monday seeking public comment on its policy on drones, or what the agency calls "model aircraft." The FAA has maintained since at least 2007 that the commercial operation of drones is illegal. ... In Monday's announcement, published in the Federal Register, the FAA named Amazon's December proposal as an example of what is barred under regulations that allow the use of drones for hobby and recreational purposes. The agency did not mention Amazon Prime Air by name, but it didn't have to. Under a graphic that says what is barred, the FAA mentioned the "Delivering of packages to people for a fee." A footnote added, "If an individual offers free shipping in association with a purchase or other offer, FAA would construe the shipping to be in furtherance of a business purpose, and thus, the operation would not fall within the statutory requirement of recreation or hobby purpose."
Businesses

Ask Slashdot: How Do You Ensure Creative Commons Compliance At Your Company? 64

An anonymous reader writes At the non-profit where I work, there isn't a lot of money for buying stock photos or licensing professional images. So, we've turned to sources of 'free' imagery, notably Creative Commons-licensed photos on Flickr. While we're not a huge organization, we do have 100+ individuals creating content in one way or another. We're now wrestling with compliance of the CC licensing, like including links for By Attribution images, etc. Our legal counsel is also scared of photographers changing their licenses and suing us after the fact. How do you document the images you find were licensed one way in the past, especially when numerous people from across the country are acquiring the images?
Bitcoin

Venture-Backed Bitcoin Miner Startup Can't Deliver On Time, Gets Sued 120

mpicpp (3454017) points out this story illustrating the problem of betting on the differential between the price of deliverable bitcoin-mining hardware and the price of bitcoin itself: Yet another Bitcoin miner manufacturer, CoinTerra, now faces legal action for not fulfilling an order when it originally promised to. CoinTerra is the third Bitcoin-related startup to face litigation for breach of contract and/or fraud in recent months. The CoinTerra lawsuit was filed in late April 2014 by an Oakland, California-based man seeking to be the lead plaintiff in a proposed class-action lawsuit. Lautaro Cline, the suit alleges, purchased a TerraMiner IV in October 2013 for delivery by January 2014. The company promised, he claims, that this miner would operate at two terahashes per second and would consume 1,200 watts of power. It did neither. However, Cline's suit also claims that CoinTerra did not deliver the miner until February 2014, and it "operated well below the speed advertised and consumed significantly more power than CoinTerra represented, causing Plaintiff to suffer significant lost profits and opportunities."
Government

They're Spying On You: Hacking Team Mobile Malware, Infrastructure Uncovered 48

msm1267 (2804139) writes Controversial spyware commercially developed by Italy's Hacking Team and sold to governments and law enforcement for the purpose of surveillance has a global command and control infrastructure. For the first time, security experts have insight into how its mobile malware components work. Collaborating teams of researchers from Kaspersky Lab and Citizen Lab at the Monk School of Global Affairs at the University of Toronto today reported on their findings during an event in London. The breadth of the command infrastructure supporting Hacking Team's Remote Control System (RCS) is extensive, with 326 servers outed in more than 40 countries; the report also provides the first details on the inner workings of the RCS mobile components for Apple iOS and Android devices. Adds reader Trailrunner7: [T]he report also provides the first details on the inner workings of the RCS mobile components for Apple iOS and Android devices. The new modules enable governments and law enforcement officers with extensive monitoring capabilities over victims, including the ability to report on their location, steal data from their device, use the device's microphone in real time, intercept voice and SMS messages sent via applications such as Skype, WhatsApp, Viber, and much more.
Cellphones

Florida Man Faces $48k Fine For Jamming Drivers' Cellphones 358

An anonymous reader writes with this news from The Independent: An American driver is facing a $48,000 fine after using a mobile signal jammer in his car to block motorists around him from using their phones on the road. Jason Humphreys reportedly used the jammer from the back seat of his Toyota Highlander for around two years before being caught by Florida police. The 60-year-old said that he used the jammer – which transmits radio signals that interfere with mobile phones – because he was 'fed up' with watching others use their phones on the road. A story from late April (before the fine was levied) gives more detail: The case along I-4 started on April 29, 2013, when the cellular company Metro PCS contacted the Federal Communications Commission because a transmission tower along I-4 would suffer in the morning and evening. A week later, agents from the FCC's enforcement division in Tampa staked out the freeway on May 7, 8, and 9 and pinpointed a “strong wideband emission” in the cellphone wireless range “emanating from a blue Toyota Highlander sport utility vehicle,” with Florida license plates, according to a complaint issued by the FCC on Tuesday. Another clue: When Hillsborough County Sheriffs deputies stopped the SUV, their own two-way radios were jammed."
Privacy

US Court Dings Gov't For Using Seized Data Beyond Scope of Warrant 63

An anonymous reader writes The U.S. Court of Appeals for the 2nd Circuit last week reversed a tax evasion conviction against an accountant because the government had used data from his computers that were seized under a warrant targeting different suspects. The Fourth Amendment, the court pointed out, "prevents the seizure of one thing under a warrant describing another." Law enforcement originally made copies of his hard drives and during off-site processing, separated his personal files from data related to the original warrant. However, 1.5 years later, the government sifted through his personal files and used what it found to build a case against him. The appeals court held that "[i]f the Government could seize and retain non-responsive electronic records indefinitely, so it could search them whenever it later developed probable cause, every warrant to search for particular electronic data would become, in essence, a general warrant," which the Fourth Amendment protects against. The EFF hopes that the outcome of this appeal will have implications for the NSA's dragnet surveillance practice.
Math

Improperly Anonymized Logs Reveal Details of NYC Cab Trips 192

mpicpp (3454017) writes with news that a dump of fare logs from NYC cabs resulted in trip details being leaked thanks to using an MD5 hash on input data with a very small key space and regular format. From the article: City officials released the data in response to a public records request and specifically obscured the drivers' hack license numbers and medallion numbers. ... Presumably, officials used the hashes to preserve the privacy of individual drivers since the records provide a detailed view of their locations and work performance over an extended period of time.

It turns out there's a significant flaw in the approach. Because both the medallion and hack numbers are structured in predictable patterns, it was trivial to run all possible iterations through the same MD5 algorithm and then compare the output to the data contained in the 20GB file. Software developer Vijay Pandurangan did just that, and in less than two hours he had completely de-anonymized all 173 million entries.
United States

Court Releases DOJ Memo Justifying Drone Strike On US Citizen 371

An anonymous reader writes in with news that the memo presenting a case for killing Anwar al-Awlaki has been released thanks to a Freedom of Information Act lawsuit. The U.S. Court of Appeals for the Second Circuit on Monday released a secret 2010 Justice Department memo justifying the killing of Anwar al-Awlaki, a U.S citizen killed in a drone strike in 2011. The court released the document as part of a Freedom of Information Act lawsuit filed by The New York Times and the American Civil Liberties Union to make the document public. Then-acting Assistant Attorney General David Barron, in the partially redacted 41-page memo, outlines the justification of the drone strike in Yemen to take out al-Awlaki, an alleged operational leader of al Qaeda.
The Courts

Supreme Court Upholds Most EPA Rules On Greenhouse Gases 109

UnknowingFool writes In Utility Air Regulatory Group v. EPA, the Supreme Court ruled against the EPA on some limits to greenhouse gases but also upheld other limits. In a 5-4 partial decision, the high court ruled that EPA overstepped their authority in requiring permits only for greenhouse gases for new and modified facilities using the Clean Air act. Such regulatory action can only be granted by Congress. But in the same case on a 7-2 decision, the court ruled that the EPA can enforce greenhouse gas limits on facilities that already require permits for other air pollutants. This leaves intact most of the new regulations proposed by the Obama administration earlier this month as many coal plants produce other air pollutants that can be regulated by the EPA.
Government

Interviews: Ask Lawrence Lessig About His Mayday PAC 308

samzenpus (5) writes "Lawrence Lessig's list of achievements and areas of influence is not small. He's co-founder of the Creative Commons, but it is his Mayday PAC however that has garnered the most attention recently. The crowdfunded "Super PAC to end all Super PACs" was launched in May with the goal of raising money to elect candidates who would pass campaign finance reform. It raised over $1 million in the first 13 days and has the support of some influential people. With the help of matching contributions, Mayday hopes to raise $12 million by the end of June. Lessig has agreed to answer any questions about the PAC that you might have. As usual, ask as many as you'd like, but please, one question per post."
Government

New Sensors Will Scoop Up "Big Data" On Chicago 64

Graculus writes with news about a plan to install sensors to collect environmental data and count people in Chicago. Chicago plans to install sensors in light poles to observe air quality, light intensity, sound volume, heat, precipitation, and wind. The sensors will also count people by observing cell phone traffic. The curled metal fixtures set to go up on a handful of Michigan Avenue light poles later this summer may look like delicate pieces of sculpture, but researchers say they'll provide a big step forward in the way Chicago understands itself by observing the city's people and surroundings. Some experts caution that efforts like the one launching here to collect data from people and their surroundings pose concerns of a Big Brother intrusion into personal privacy. In particular, sensors collecting cell phone data make privacy proponents nervous. But computer scientist Charlie Catlett said the planners have taken precautions to design their sensors to observe mobile devices and count contact with the signal rather than record the digital address of every device.
The Internet

Robert McMillen: What Everyone Gets Wrong In the Debate Over Net Neutrality 270

ygslash writes "Robert McMillen of Wired claims that we have gotten Net Neutrality all wrong. While we are all busy arguing about whether there should be regulations preventing large content providers from getting preferential bandwidth, McMillen says that not only have the large content providers already had preferential bandwidth for ten years, but that by now this has become an inherent part of the structure of the Internet and in practice cannot be changed. Instead, he says, the Net Neutrality discussion should be about ensuring a free and open competitive market for bandwidth, so that anyone who wants bandwidth can purchase it at a fair price.

Slashdot Top Deals