Fluffeh writes "Recently, a Judge ordered Oracle and Google to have yet another sit down and chat, but these talks have come to an impasse: 'Despite their diligent efforts and those of their able counsel, the parties have reached an irreconcilable impasse in their settlement discussions,' Judge Paul Grewal of US District Court for the Northern California wrote Monday. 'No further conferences shall be convened. The parties should instead direct their entire attention to the preparation of their trial presentations. Good luck.'"
thodelu writes "Close on the heels of Friday's communal clashes in a town in India that were triggered by a Facebook post which contained morphed images apparently deriding a religious place of worship, there has been another incident. City police have removed images from another similar blog post citing 'cyber criminal' laws. There has been an ongoing effort in India to censor the web which would get more backing as a result of these events. Could we be seeing another Great Firewall of China?"
New submitter Hentes writes "France has one of the strictest anti-piracy laws. After 17 months of operation, Hadopi has released a report, claiming that illegal P2P downloads have been reduced significantly in the country: the studies they cite measured 43% and 66% decrease in copyright infringement. But that huge amount of 'lost revenue' doesn't seem to show up in the French recording industry, as the overall recorded music market has decreased by 3.9% in 2011. Even more interesting is that digital music sales have skyrocketed in France. Could it be that it's not piracy killing the traditional recording industry but digital distribution?"
alphadogg writes with a distressing bit of analysis of the training materials acquired by the ACLU last week. From the article: "Many law enforcement agencies across the U.S. track mobile phones as part of investigations, but only a minority ask for court-ordered warrants, according to a report released Monday by the American Civil Liberties Union. More than 90 law enforcement agencies said they track mobile phones during investigations, but only six reported receiving court-approved warrants after demonstrating that there's probable cause of a crime, according to an ACLU report based on public information requests filed by the group last year." The ACLU has a handy page allowing you to see if your local PD engages in such practices.
Hugh Pickens writes "Ben Grubb reports that an iPhone app that essentially allowed users to stalk women nearby using a location-based social networking service has been pulled from the iTunes app store by its developer after an outcry of criticism including a comment by Gizmodo labelling the 'Girls Around Me' app as the 'world's creepiest' app and a comment in The New York Times Bits blog, which said it 'definitely' won the prize for being 'too creepy'. The 'Girls Around Me' app utilized publicly available data to show a map with women who had checked-in to locations nearby using Foursquare and let users view Facebook information of those ladies if they had tied their Facebook account to their Foursquare account and if their Facebook account privacy settings were lax enough to allow any user to access it. The promotional website used for marketing the app states that the service 'helps you see where nearby girls are checking in, and shows you what they look like and how to get in touch, adding 'In the mood for love, or just after a one-night stand? Girls Around Me puts you in control! Reveal the hottest nightspots, who's in them, and how to reach them.' Foursquare yanked the Girls Around Me app's access to its data, which in turn led to the app's developer removing it from iTunes as it didn't work properly. In a statement to the Wall Street Journal, the company behind the app defended its creation: 'Since the app's launch till last Friday nobody ever raised a privacy concern because, again, it is clearly stated that Girls Around Me cannot show the user more data than [what Foursqure or Facebook] already does.'"
An anonymous reader writes "Global Payments, the U.S.-based credit card processor company that experienced a security breach affecting Visa and MasterCard, confirmed that the breached portion of its processing system was confined to North America. The company also finally revealed how many credit card numbers were stolen: around 1,500,000."
dsmalle writes "Apple has adapted its warranty to cover 2 years, under pressure of the European Union and after European consumer organizations sued Apple. From the article: 'The warranty conditions have been changed and these changes can be found on the website of Apple. Products that are purchased on the website of the manufacturer or in stores are now under warranty for two years, as it is required by the EU warranty guidelines. However, the warranty for Apple products that have been purchased elsewhere will not change and they will only be given a limited one-year warranty.'"
Fluffeh writes "Judge Holderman ruled against copyright holders who were trying to paint a rather distorted picture. They sue just one Internet user, but use that lawsuit as a pretext to subpoena other defendants who had participated in the same BitTorrent swarm. The plaintiffs in these lawsuits claim that the other users had participated in a "conspiracy" to assist one another in distributing particular copyrighted works. Because the copyright holder's threat is based on the cost of litigation (and risk of public embarrassment — as this is a tactic used increasingly by the pron industry) more so than the damages a defendant would face in the event of a loss, innocent defendants have virtually as much incentive to settle as guilty ones do. That's not how things are supposed to work, and more and more judges are refusing to play along. Coupled with recent rulings in Florida, the copyright holders seem to be finding less and less favor with judges."
Fluffeh writes "The EFF has filed a brief in Federal Court on behalf of Kyle Goodwin (and potentially millions of other users) so that he can access his legally sound backup files. 'Goodwin is a local high school sports reporter and the sole proprietor of the company OhioSportsNet, who stored his video footage on Megaupload.com as a backup to his video library on his hard drive. He had paid €79.99 (about $107) for a two-year premium membership. Just days before the government seized the site, Goodwin's hard drive crashed. The brief states that his lost videos include footage to make highlight reels for parents to send to their children's prospective colleges, and an unfinished full-length documentary about the Strongsville girls soccer team's season.' According to the EFF, authorities told Carpathia (the hosting company that MegaUpload was using to host their content to the tune of $9,000 a day) that after it was done examining the servers and had copied portions of the data, the hosting company could delete the files and re-purpose its servers. Carpathia noted in a statement last week that it would like to allow Megaupload users to recover their data, but has struggled to find a way to do so."
guttentag writes "The New York Times has published a large collection of law enforcement training documents obtained by the ACLU. The documents describe in detail what kind of information can be obtained from cell phones and cell phone carriers, and how to obtain it. The 189-page PDF also contains dozens of invoices from the major carriers for their services to law enforcement that describe the fees for those services."
Hugh Pickens writes "As the Trayvon Martin controversy splinters into a debate about self-defense, a central question remains: Who was heard crying for help on a 911 call in the moments before the teen was shot? Now the Orlando Sentinel reports that Tom Owen, a leading expert in the field of forensic voice identification sought to answer that question by analyzing the recordings. His result: It was not George Zimmerman who called for help. Owen, forensic consultant for Owen Forensic Services LLC and chair emeritus for the American Board of Recorded Evidence, used voice identification software to rule out Zimmerman. Another expert contacted by the Sentinel, utilizing different techniques, came to the same conclusion. Owen used software called Easy Voice Biometrics to compare Zimmerman's voice to the 911 call screams. 'I took all of the screams and put those together, and cut out everything else,' says Owen. The software compared that audio to Zimmerman's voice and returned a 48 percent match. Owen says to reach a positive match with audio of this quality, he'd expect higher than 90 percent. Owen cannot confirm the voice as Trayvon's, because he didn't have a sample of the teen's voice to compare however 'you can say with reasonable scientific certainty that it's not Zimmerman.'"
gManZboy writes "Six years and $450 million into the project, the FBI's Sentinel case-management system appears to be almost ready for deployment. Sentinel aims to replace a hodge-podge of digital and paper processes with purely digital workflows, helping FBI agents collaborate and "connect the dots" on investigations. The question now is how well the problem-plagued system will live up to those expectations. FBI CIO Chad Fulgham demonstrated Sentinel for InformationWeek on March 28, the first time the agency has shown its new case-management system to an outsider. 'This isn't just a case-management system. It's a great platform to grow on,' Fulgham said during the demo at FBI headquarters. The agency's IT team plans to move other apps over to Sentinel, giving them a similar look and feel on the same underlying hardware."
An anonymous reader writes "You can add this one to the short but growing list of employers demanding access to Facebook accounts. After refusing to give her Facebook password to her supervisors, Kimberly Hester was fired by Lewis Cass Intermediate School District from her job as an aide to Frank Squires Elementary in Cassopolis, Michigan. She is now fighting a legal battle with the school district."
First time accepted submitter cardpuncher writes "Having opposed the previous government's attempts to introduce mass surveillance of Internet communications, the Conservatives are planning to introduce the very same policy they previously described as a 'culture of surveillance which goes far beyond counter terrorism and serious crime.' The plan is essentially to allow stored communication data to be trawled without the inconvenience of needing a warrant or even any reasonable suspicion."
Trailrunner7 writes "Yahoo has decided that it's now time to start implementing a Do Not Track system across its various Web properties. The company is one of the last large Web content providers to officially commit to using a DNT technology, and Yahoo said that it plans to have the system implemented by early summer. Yahoo officials said that their Do Not Track implementation has been in development since 2011 and that it will be a simple way for consumers to turn on the DNT option."