Have you META-MODERATED today? Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25.×
zacharye writes "A lawyer representing Proview International on Monday announced that the Intermediate People's Court in Huizhou, a city in southern China, ruled that distributors should stop selling iPads in China. From the article: 'The ruling, which was also reported widely in China's state media, may not have a far-reaching effect. In its battle with Apple, Proview is utilizing lawsuits in several places and also requesting commercial authorities in 40 cities to block iPad sales. Apple Inc. said in a statement Monday that its case is still pending in mainland China. The company has appealed to Guangdong's High Court against an earlier ruling in Proview's favor.'"
judgecorp writes "The UK government is proposing a law that would require phone and Internet companies to store information on all communications, and hand it to the security services when required. The Communications Capabilities Development Programme (CCDP) abandoned by the last government is back on the table, proposed as a means to increase security, and likely to be pushed through before the Olympics in London, according to reports."
itwbennett writes "Following Tuesday's FCC ruling saying that the company's LTE network interferes with GPS, LightSquared's primary investor Philip Falcone is looking to sue the FCC and the GPS industry. Alternately, Falcone is considering ways to appeal the FCC's decision or even swap spectrum with the Department of Defense."
Hugh Pickens writes "As you weave through interstate traffic, you're unlikely to notice a plain-looking Peterbilt tractor-trailer or have any idea that inside the cab an armed federal agent operates a host of electronic countermeasures to keep outsiders from accessing his heavily armored cargo: a nuclear warhead. Adam Weinstein writes that the Office of Secure Transportation (OST) employs nearly 600 couriers to move bombs, weapon components, radioactive metals for research, and fuel for Navy ships and submarines between a variety of labs, reactors and military bases. Hiding nukes in plain sight and rolling them through major metropolitan centers raises a slew of security and environmental concerns, from theft to terrorist attack to radioactive spills. 'Any time you put nuclear weapons and materials on the highway, you create security risks,' says Tom Clements, a nuclear security watchdog for Friends of the Earth. For security, cabs are fitted with custom composite armor and lightweight armored glass, a redundant communications system that links the convoys to a monitoring center in Albuquerque, and the driver has the ability to disable the truck so it can't be moved or opened. The OST hires military veterans, particularly ex-special-operations forces (PDF), who are trained in close-quarters battle, tactical shooting, physical fitness, and shifting smoothly through the gears of a tractor-trailer. But accidents happen. In 1996, a driver flipped his trailer on a two-lane Nebraska hill road after a freak ice storm, sending authorities scrambling to secure its payload of two nuclear bombs; and in 2003, two trucks operated by private contractors had rollover accidents in Montana and Tennessee while hauling uranium hexafluoride, a compound used to enrich reactor and bomb fuel."
alphadogg writes "GSM cellular networks leak enough location data to give third-parties secret access to cellphone users' whereabouts, according to new University of Minnesota research. 'We have shown that there is enough information leaking from the lower layers of the GSM communication stack to enable an attacker to perform location tests on a victim's device. We have shown that those tests can be performed silently without a user being aware by aborting PSTN calls before they complete,' write the authors, from the College of Science and Engineering, in a paper titled 'Location Leaks on the GSM Air Interface' (Pdf). The researchers are working with carriers and equipment makers, including AT&T and Nokia, to address the security issues."
First time accepted submitter rubeon writes "Companies can get a lot of mileage out of social networking services from the likes of Google or Facebook. Chat, document collaboration, and video conferencing using services like Google+ Hangouts or Facebook's Skype are seductive additions to an IT arsenal. But a lot of people have privacy concerns about these services, and there's no shortage of horror stories how these sites track and exploit their users' habits. Would you work for a company that forced its employees to join a social network?"
Saint Aardvark writes "Canada's proposed online surveillance bill looked bad enough when it was introduced, but it gets worse: Section 34 allows access to any telco place or equipment, and to any information contained there — with no restrictions, no warrants, and no review. From the article: 'Note that such all-encompassing searches require no warrant, and don't even have to be in the context of a criminal investigation. Ostensibly, the purpose is to ensure that the ISP is complying with the requirements of the act — but nothing in the section restricts the inspector to examining or seizing only information bearing upon that issue. It's still "any" information whatsoever.'"
Layzej writes "Bloggers around the world have been commenting on recently leaked Heartland Institute documents that reveal their internal strategies to discredit climate science. These posters are now under threat of legal action. According to the Heartland Institute 'the individuals who have commented so far on these documents did not wait for Heartland to confirm or deny the authenticity of the documents. We believe their actions constitute civil and possibly criminal offenses for which we plan to pursue charges and collect payment for damages'"
First time accepted submitter debiangruven writes "Human rights Groups are making one final plea to save the life of Canadian programmer, Saeed Malekpour, who was sentenced to death for writing a program to upload photos to the Internet. From the article: 'Malekpour's supporters have created Facebook pages and websites in his support dating to at least 2009. Amnesty International has requested on its website that concerned individuals write Iranian authorities inside and outside the country to demand that Malekpour not be executed."
Wowsers writes "In vogue with other countries cracking down on freedom and democracy on the internet as discussed in Slashdot recently, the UK is joining in with plans to track all phone calls, text messages, email traffic and websites visited online, all to be stored in vast databases under new government anti-terror plans. As reported in The Telegraph, security services will have access to information about who has been communicating with each other on social networking sites such as Facebook, direct messages between subscribers on Twitter would also be stored, as well as communications between players in online video games. The scheme is a revised version of a plan drawn up by the ex-Labour government which would have created a central database of all the information. The idea was later dropped in favor of requiring communications providers to store the details at the taxpayers' expense."
New submitter fish waffle writes "The universities of Western Ontario and Toronto have signed a deal with Access Copyright that allows for surveillance of faculty correspondence, defines e-mailing hyperlinks as equivalent to photocopying a document, and imposes an annual $27.50 fee for every full-time equivalent student to pay for it all. Access Copyright is a licensing agency historically used by most universities in Canada to give them blanket permission to reproduce copyrighted works, largely to address photocopying concerns that may extend beyond basic fair-use. Since the expiration of this agreement, and with recognition that many academic uses do not require copyright permissions or payments or are already covered under vendor-specific agreements, Canadian academic institutions have been united in opposing continuation of the agreement with the agency. Access Copyright has countered with a proposal for increased fees, and expansion of the definition of copyright to include linking and the need for online surveillance. In a strange breaking of ranks, the University of Western Ontario and the University of Toronto have capitulated and signed agreements that basically accede to the licensing agency's demands. The Canadian Association of University Teachers bulletin provides detailed background on the issue (PDF)."
PolygamousRanchKid writes with this quote from CNN: "A Kenyan chief in a town far from the bustling capital foiled a predawn robbery recently using Twitter, highlighting the far-reaching effects of social media in areas that don't have access to the Internet. Chief Francis Kariuki said he got a call in the dead of the night that thieves had broken into a neighbor's house. Local residents, who subscribe to his tweets through a free text messaging service, jumped into action. They surrounded the house, sending the thugs fleeing into the night. In the town 100 miles from Nairobi, a majority of residents don't have access to computers, the Internet or smart phones. The sporadic cyber cafes strewn across the landscape charge for Internet access. However, almost every household has a cell phone and text messages are a major form of communication in the nation."
Diamonddavej writes "The BBC reports that software development student Glenn Mangham, a 26-year-old from the UK, was jailed 17 February 2012 for eight months for computer misuse, after he discovered serious Facebook security vulnerabilities. Hacking from his bedroom, Mangham gained access to three of Facebook's servers and was able to download to an external hard drive the social network's 'invaluable' intellectual property (source code). Mangham's defense lawyer, Mr. Ventham, pointed out that Mangham is an 'ethical hacker' and runs a tax registered security company. The court heard Mangham previously breached Yahoo's security, compiled a vulnerability report and passed on to Yahoo. He was paid '$7000 for this achievement,' and claims he was merely trying to repeat the same routine with Facebook. But in passing sentence, Judge Alistair McCreath said despite the fact he did not intend to pass on the information gathered, his actions were not harmless and had 'real consequences and very serious potential consequences' for Facebook. The case's prosecutor, Mr. Patel, said Facebook spent '$200,000 (£126,400) dealing with Mangham's crime.'"
An anonymous reader sends this excerpt from the NY Times: "A new federal law, signed by the president on Tuesday, compels the Federal Aviation Administration to allow drones to be used for all sorts of commercial endeavors — from selling real estate and dusting crops, to monitoring oil spills and wildlife, even shooting Hollywood films. Local police and emergency services will also be freer to send up their own drones. But while businesses, and drone manufacturers especially, are celebrating the opening of the skies to these unmanned aerial vehicles, the law raises new worries about how much detail the drones will capture about lives down below — and what will be done with that information. Safety concerns like midair collisions and property damage on the ground are also an issue."