alphadogg writes "GSM cellular networks leak enough location data to give third-parties secret access to cellphone users' whereabouts, according to new University of Minnesota research. 'We have shown that there is enough information leaking from the lower layers of the GSM communication stack to enable an attacker to perform location tests on a victim's device. We have shown that those tests can be performed silently without a user being aware by aborting PSTN calls before they complete,' write the authors, from the College of Science and Engineering, in a paper titled 'Location Leaks on the GSM Air Interface' (Pdf). The researchers are working with carriers and equipment makers, including AT&T and Nokia, to address the security issues."
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
First time accepted submitter rubeon writes "Companies can get a lot of mileage out of social networking services from the likes of Google or Facebook. Chat, document collaboration, and video conferencing using services like Google+ Hangouts or Facebook's Skype are seductive additions to an IT arsenal. But a lot of people have privacy concerns about these services, and there's no shortage of horror stories how these sites track and exploit their users' habits. Would you work for a company that forced its employees to join a social network?"
Saint Aardvark writes "Canada's proposed online surveillance bill looked bad enough when it was introduced, but it gets worse: Section 34 allows access to any telco place or equipment, and to any information contained there — with no restrictions, no warrants, and no review. From the article: 'Note that such all-encompassing searches require no warrant, and don't even have to be in the context of a criminal investigation. Ostensibly, the purpose is to ensure that the ISP is complying with the requirements of the act — but nothing in the section restricts the inspector to examining or seizing only information bearing upon that issue. It's still "any" information whatsoever.'"
Layzej writes "Bloggers around the world have been commenting on recently leaked Heartland Institute documents that reveal their internal strategies to discredit climate science. These posters are now under threat of legal action. According to the Heartland Institute 'the individuals who have commented so far on these documents did not wait for Heartland to confirm or deny the authenticity of the documents. We believe their actions constitute civil and possibly criminal offenses for which we plan to pursue charges and collect payment for damages'"
First time accepted submitter debiangruven writes "Human rights Groups are making one final plea to save the life of Canadian programmer, Saeed Malekpour, who was sentenced to death for writing a program to upload photos to the Internet. From the article: 'Malekpour's supporters have created Facebook pages and websites in his support dating to at least 2009. Amnesty International has requested on its website that concerned individuals write Iranian authorities inside and outside the country to demand that Malekpour not be executed."
Wowsers writes "In vogue with other countries cracking down on freedom and democracy on the internet as discussed in Slashdot recently, the UK is joining in with plans to track all phone calls, text messages, email traffic and websites visited online, all to be stored in vast databases under new government anti-terror plans. As reported in The Telegraph, security services will have access to information about who has been communicating with each other on social networking sites such as Facebook, direct messages between subscribers on Twitter would also be stored, as well as communications between players in online video games. The scheme is a revised version of a plan drawn up by the ex-Labour government which would have created a central database of all the information. The idea was later dropped in favor of requiring communications providers to store the details at the taxpayers' expense."
New submitter fish waffle writes "The universities of Western Ontario and Toronto have signed a deal with Access Copyright that allows for surveillance of faculty correspondence, defines e-mailing hyperlinks as equivalent to photocopying a document, and imposes an annual $27.50 fee for every full-time equivalent student to pay for it all. Access Copyright is a licensing agency historically used by most universities in Canada to give them blanket permission to reproduce copyrighted works, largely to address photocopying concerns that may extend beyond basic fair-use. Since the expiration of this agreement, and with recognition that many academic uses do not require copyright permissions or payments or are already covered under vendor-specific agreements, Canadian academic institutions have been united in opposing continuation of the agreement with the agency. Access Copyright has countered with a proposal for increased fees, and expansion of the definition of copyright to include linking and the need for online surveillance. In a strange breaking of ranks, the University of Western Ontario and the University of Toronto have capitulated and signed agreements that basically accede to the licensing agency's demands. The Canadian Association of University Teachers bulletin provides detailed background on the issue (PDF)."
PolygamousRanchKid writes with this quote from CNN: "A Kenyan chief in a town far from the bustling capital foiled a predawn robbery recently using Twitter, highlighting the far-reaching effects of social media in areas that don't have access to the Internet. Chief Francis Kariuki said he got a call in the dead of the night that thieves had broken into a neighbor's house. Local residents, who subscribe to his tweets through a free text messaging service, jumped into action. They surrounded the house, sending the thugs fleeing into the night. In the town 100 miles from Nairobi, a majority of residents don't have access to computers, the Internet or smart phones. The sporadic cyber cafes strewn across the landscape charge for Internet access. However, almost every household has a cell phone and text messages are a major form of communication in the nation."
Diamonddavej writes "The BBC reports that software development student Glenn Mangham, a 26-year-old from the UK, was jailed 17 February 2012 for eight months for computer misuse, after he discovered serious Facebook security vulnerabilities. Hacking from his bedroom, Mangham gained access to three of Facebook's servers and was able to download to an external hard drive the social network's 'invaluable' intellectual property (source code). Mangham's defense lawyer, Mr. Ventham, pointed out that Mangham is an 'ethical hacker' and runs a tax registered security company. The court heard Mangham previously breached Yahoo's security, compiled a vulnerability report and passed on to Yahoo. He was paid '$7000 for this achievement,' and claims he was merely trying to repeat the same routine with Facebook. But in passing sentence, Judge Alistair McCreath said despite the fact he did not intend to pass on the information gathered, his actions were not harmless and had 'real consequences and very serious potential consequences' for Facebook. The case's prosecutor, Mr. Patel, said Facebook spent '$200,000 (£126,400) dealing with Mangham's crime.'"
An anonymous reader sends this excerpt from the NY Times: "A new federal law, signed by the president on Tuesday, compels the Federal Aviation Administration to allow drones to be used for all sorts of commercial endeavors — from selling real estate and dusting crops, to monitoring oil spills and wildlife, even shooting Hollywood films. Local police and emergency services will also be freer to send up their own drones. But while businesses, and drone manufacturers especially, are celebrating the opening of the skies to these unmanned aerial vehicles, the law raises new worries about how much detail the drones will capture about lives down below — and what will be done with that information. Safety concerns like midair collisions and property damage on the ground are also an issue."
An anonymous reader writes "A preliminary settlement has been reached in the class-action lawsuit brought against Apple in June 2010 over the 'Antennagate' fiasco. Ira Rothken, co-lead counsel for the case, says there are 21 million people entitled to either $15 or a free bumper. 'The settlement comes from 18 separate lawsuits that were consolidated into one. All share the claim that Apple was "misrepresenting and concealing material information in the marketing, advertising, sale, and servicing of its iPhone 4 — particularly as it relates to the quality of the mobile phone antenna and reception and related software." The settlement has its own Web site, www.iPhone4Settlement.com, which will be up in the coming weeks (the site doesn't go anywhere right now). There, customers will be able to get information about the settlement and how to make a claim. As part of the arrangement, e-mails will also be sent alerting original buyers to the settlement before April 30, 2012. The claims period is then open for 120 days.'"
New submitter i-reek writes "Australian police, along with government agencies, are accessing phone and internet account information, outward and inward call details, phone and internet access location data, and details of IP addresses visited of Australian citizens, all without judicial warrants . In the last two years, some states have shown an increase of more than 50 per cent in these surveillance authorizations, which can be granted by senior police officers and officials instead of a magistrate or judge."
suraj.sun sends this quote from an article at Techdirt: "The federal government has been paying lip service to the idea that it wants to encourage new businesses and startups in the U.S. And this is truly important to the economy, as studies have shown that almost all of the net job growth in this country is coming from internet startups. ... With the JotForm situation unfolding, where the U.S. government shut down an entire website with no notice or explanation, people are beginning to recognize that the U.S is not safe for internet startups. Lots of folks have been passing around [a] rather reasonable list of activities for U.S.-based websites."
New submitter Dave_Minsky writes "The U.S. Secret Service responded to a FOIA request on Monday that reveals the names of the printer companies that cooperate with the government to identify and track potential counterfeiters. The Electronic Frontier Foundation revealed in 2005 that the U.S. Secret Service was in cahoots with selected laser printer companies to identify and track printer paper using tiny microscopic dots encoded into the paper. The tiny, yellow dots — less than a millimeter each — are printed in a pattern over each page and are only viewable with a blue light, a magnifying glass or a microscope. The pattern of dots is encodes identifiable information including printer model, and time and location where the document was printed." Easy enough to avoid government dots; just don't buy printers from Canon, Brother, Casio, HP, Konica, Minolta, Mita, Ricoh, Sharp, or Xerox.
einhverfr writes "Eugene Volokh has posted an interesting discussion of a bill that has been introduced in Arizona, which would tie public school educator conduct to the FCC standards for decency for radio and television. The bill is essentially a three strikes system, firing teachers if they violate FCC standards three times. While the goal of the bill may seem reasonable, the details strike me as silly."