New submitter ThatsNotPudding writes "The U.S. Supreme court has rejected pleas to allow any challenges to the FISA wiretapping law unless someone can prove they've been harmed by it. 'The Foreign Intelligence Surveillance Act, or FISA, was originally designed to allow spying on the communications of foreign powers. But after the September 11 attacks, FISA courts were authorized to target a wide array of international communications, including communications between Americans and foreigners. ... In this case, the plaintiffs' groups said their communications were likely being scooped up by the government's expanded spying powers in violation of their constitutional rights. Today's decision, a 5-4 vote along ideological lines by the nation's highest court, definitively ends their case. In an opinion (PDF) by Justice Samuel Alito, the court ruled that these groups don't have the right to sue at all, because they can't prove they were being spied on.'" Further coverage at SCOTUSblog.
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×
dp619 writes "Penn State law professor Clark Asay has written an editorial on F/OSS patent risk, saying, '...under the current patent system, it's entirely possible to obtain a patent that reads on software that FOSS communities independently create. Consequently, FOSS communities and their users are vulnerable to third party patent claims, even absent any sort of wrongdoing or copying on their part.' He suggests that developers collaborate to prevent bad or frivolous patents from being issued in the first place. The ongoing work of Linux Defenders and Peer-to-Patent are cited as good examples of how the FOSS community's collaborative spirit can help it counteract potential legal threats."
New submitter mynameiskhan writes "Major internet service providers today will start monitoring the internet traffic to their customers' computers and will warn them if they download copyrighted materials using peer to peer network. The article says, 'A person will be given up to six opportunities to stop before the Internet provider will take more drastic steps, such as temporarily slowing their connection, or redirecting Internet traffic until they acknowledge they received a notice or review educational materials about copyright law.' Furthermore, if you appeal the warning you will be required to pay $35 to state your case. Have the ISPs have had enough of RIAA pestering, or are they siding with RIAA?"
Google Hangout interview with Keith Bergelt, Chief Executive Officer of the Open Invention Network (OIN), which was jointly founded by IBM, NEC, Novell, Philips, Red Hat, and Sony to share their relevant patents with all Linux and Open Source developers and users in order to prevent patent troll attacks on FOSS, such as the famous SCO vs. IBM lawsuits that hampered Linux adoption during the early 2000s. It costs nothing to become a an OIN licensee, and over 500 companies have done so. Few people know, however, that individual developers and FOSS users can become OIN licensees; that you are welcome to do so, and it costs nothing. Read their license agreement, sign it, and send it in. That's all it takes. They also buy patents and accept patent donations. And "...if your company is being victimized by any entity seeking to assert its patent portfolio against Linux, please contact us so that we can aid you in your battle with these dark forces." This OIN service is called Linux Defenders 911. We hope you never need to use it, but it's good to know it's there if you do need it.
An anonymous reader writes "It appears that two weeks ago my email address got into the wrong database. Since that time there have been continuing attempts to access my accounts and create new accounts in my name. I have received emails asking me to click the link below to confirm I want to create an account with Twitter, Facebook, Apple Games Center, Facebook mobile account, and numerous pornographic sites. I have not attempted to create accounts on any of these services. I have also received 16 notices from Apple about how to reset my Apple ID. I am guessing these notices are being automatically generated in response to too many failed login attempts. At this point I have no reason to believe any of my accounts have been compromised but I see no good response."
concealment writes "Many of us have had the experience of going to Amazon to buy one thing but checking out with a huge shopping cart of items that we didn't initially seek—or even know were available. Amazon's merchandising often benefits Amazon's customers, but trademark owners who lose sales to their competition due to it aren't as thrilled. Fortunately for Amazon, a California federal court recently upheld Amazon's merchandising practices in its internal search results."
An anonymous reader writes with this news (excerpted from IT World) that follows up on the report of pressure put on Sweden's Pirate Party for its connection to The Pirate Bay: "The Pirate Bay has opened two new gateways to its internal network in order to shield its current Internet provider, the Swedish Pirate Party, which had been threatened with legal action if it did not stop providing Internet access to the torrent search site by Tuesday. The Swedish Pirate Party had provided bandwidth to The Pirate Bay for about three years because it was hard for the site to find anyone else who would do so. But last Tuesday the Rights Alliance, an organization that represents the film industry, gave it an ultimatum: The Pirate Party had to cut off Internet access to the torrent search site or face legal action. The Pirate Bay's administrators said in a post on Facebook that, because of the legal threat and the potential cost of fighting it, 'We've taken the decision to move on to Norway and Spain.'"
chicksdaddy writes "The security firm Bit9 released a more detailed analysis of the hack of its corporate network was part of a larger operation that was aimed a firms in a 'very narrow market space' and intended to gather information from the firms. The analysis, posted on Monday on Bit9's blog is the most detailed to date of a hack that was first reported on February 8 by the blog Krebsonsecurity.com, but that began in July, 2012. In the analysis, by Bit9 Chief Technology Officer Harry Sverdlove said 32 separate malware files and malicious scripts were whitelisted in the hack. Bit9 declined to name the three customers affected by the breach, or the industry segment that was targeted, but denied that it was a government agency or a provider of critical infrastructure such as energy, utilities or banking. The small list of targets — just three — and the fact that one malware program was communicating with a system involved in a recent 'sinkholing operation' raises the specter that the hack of Bit9 may have played a part in the recent attacks on Facebook, Twitter and Apple, though Bit9 declined to name the firms or the market they serve."