dreamstateseven writes "In a not-so-unexpected move, the Department of Homeland Security has concluded that travelers along the nation's borders may have their electronics seized and the contents of those devices examined for any reason whatsoever — all in the name of national security. According to legal precedent, the Fourth Amendment — the right to be free from unreasonable searches and seizures — does not apply along the border. The memo highlights the friction between today's reality that electronic devices have become virtual extensions of ourselves housing everything from e-mail to instant-message chats to photos and our papers and effects — juxtaposed against the government's stated quest for national security. By the way, the government contends the Fourth-Amendment-Free Zone stretches 100 miles inland from the nation's actual border."
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
New submitter ElDuque writes "Slate's top story today is a long, heavily-researched article about the life of, and case against, Aaron Swartz. It covers the formative years of both Mr. Swartz and the free information / open knowledge movement he felt so strongly about. Quoting: 'Aaron Swartz is a difficult puzzle. He was a programmer who resisted the description, a dot-com millionaire who lived in a rented one-room studio. He could be a troublesome collaborator but an effective troubleshooter. He had a talent for making powerful friends, and for driving them away. He had scores of interests, and he indulged them all. ... He was fascinated by large systems, and how an organization’s culture and values could foster innovation or corruption, collaboration or paranoia. Why does one group accept a 14-year-old as an equal partner among professors and professionals while another spends two years pursuing a court case that’s divorced from any sense of proportionality to the alleged crime? How can one sort of organization develop a young man like Aaron Swartz, and how can another destroy him?'"
Presto Vivace sends this news from the Hill: "House Intelligence Committee Chairman Mike Rogers (R-Mich.) and ranking member Rep. Dutch Ruppersberger (D-Md.) said Friday that they plan to re-introduce the Cyber Intelligence Sharing and Protection Act (CISPA) next week during a speech at the Center for Strategic and International Studies in Washington. The bill is aimed at improving information-sharing about cyber threats between government and industry so cyberattacks can be thwarted in real time. ... It would also encourage companies to share anonymous cyber-threat information with one another, and provide liability protection for businesses so they don't get hit with legal action for sharing data about cyber threats. " You may recall CISPA from last year, when it was hailed as being even worse than SOPA, the Stop Online Piracy Act. We discussed why it was a bad bill back then; the new version is reportedly identical, so all of the same reasons will apply. The bill stalled last year against White House plans to veto it. Congressman Rogers said this about privacy fears: "We're talking about exchanging packets of information, zeroes and ones, if you will, one hundred millions times a second. So some notion that this is a horrible invasion of content reading is wrong. It is not even close to that." Don't worry folks; it's just zeroes and ones.
theodp writes "Got Milk? Got Milk Delivery Patent? Perhaps unfamiliar with the concept of the Milkman, the USPTO has granted Amazon.com a patent for the Recurring Delivery of Products , an idea five Amazon inventors came up with to let customers schedule product deliveries to their doorsteps or mailboxes on a recurring basis, without needing to submit a new order every time. 'For instance,' the filing explains, 'a customer may request delivery of one bunch of bananas every week and two gallons of milk every two weeks.'"
Nerval's Lobster writes "The U.S. Department of Justice has just settled with book publisher Macmillan in an ongoing case over the price of e-books, bringing its number of settlements with big-name publishers up to five. Justice claims that those five publishers, along with Apple, agreed to 'raise retail e-book prices and eliminate price competition, substantially increasing prices paid by consumers.' Apple competes fiercely in the digital-media space against Amazon, which often discounts the prices of Kindle e-books as a competitive gambit; although all five publishers earn significant revenues from sales of Kindle e-books, Amazon's massive popularity among book-buyers — coupled with the slow decline of bricks-and-mortar bookstores — gives it significant leverage when it comes to lowering those e-book prices as it sees fit. But Justice and Apple seem determined to keep their court date later this year."
First time accepted submitter admiral snackbar writes "The European Court of Human Rights has declared that the copyright monopoly stands in direct conflict with fundamental Human Rights, as defined in the European Union and elsewhere. 'For the first time in a judgment on the merits, the European Court of Human Rights has clarified that a conviction based on copyright law for illegally reproducing or publicly communicating copyright protected material can be regarded as an interference with the right of freedom of expression and information under Article 10 of the European Convention [on Human Rights]. Such interference must be in accordance with the three conditions enshrined in the second paragraph of Article 10 of the Convention. This means that a conviction or any other judicial decision based on copyright law, restricting a person's or an organization's freedom of expression, must be pertinently motivated as being necessary in a democratic society, apart from being prescribed by law and pursuing a legitimate aim.'"
Nerval's Lobster writes "Software developer Jeff Cogswell is back with an extensive under-the-hood breakdown of Facebook's Graph Search, trying to see if peoples' privacy concerns about the social network's search engine are entirely justified. His conclusion? 'Some of the news articles I've read talk about how Graph Search will start small and slowly grow as it accumulates more information. This is wrong—Graph Search has been accumulating information since the day Facebook opened and the first connections were made in the internal graph structure,' he writes. 'People were nervous about Google storing their history, but it pales in comparison to the information Facebook already has on you, me, and roughly a billion other people.' There's much more at the link, including a handy breakdown of graph theory."
Frequent contributor Bennett Haselton is still thinking about prediction markets, and giving away money. He writes: "In an article last December I described a problem with prediction markets, where even markets with cap on betting limits could be manipulated by a single trader willing to spend a lot of money to distort the marketplace odds. So I offered a $100 cash prize to be split between readers who collectively came up with the best solution to the problem. Here's an idea that I think would work." Read on for the rest.
New submitter jdela writes "Finnish Minister for Justice Anna-Maja Henriksson backs expanding FInland's child pornography blocklist to also include websites with animal porn and largely-undefined 'violent pornography.' Her proposal does not have the unanimous backing of the Finnish government, with Minister of Interior Päivi Räsänen doubting the need to expand pornography blocks. Under current law, adopted in 2006, the Finnish NBI maintains a blocklist of foreign sites linked to child pornography. This blocklist is enforced on Finnish Internet users."
chicksdaddy writes "To paraphrase a quote attributed to F. Scott Fitzgerald: 'Rich countries aren't like everyone else. They have less malware.' That's the conclusion of a special Security Intelligence Report from Microsoft, anyway. The special supplement, released on Wednesday, investigated the links between rates of computer infections and a range of national characteristics including the relative wealth of a nation, observance of the rule of law and the rate of software piracy. The conclusion: cyber security (by Microsoft's definition: low rates of malware infection) correlated positively with many characteristics of wealthy nations – high Gross Income Per Capita, higher broadband penetration and investment in R&D and high rates of literacy. It correlated negatively with characteristics common in poorer nations – like demographic instability, political instability and lower levels of education.'"
ananyo writes "How open do researchers want open-access papers to be? Apparently, not that open — when given a choice of licenses, most opt to limit the use of data and words in their open-access publications, according to figures released by the open-access journal Scientific Reports. Since July 2012 the journal has been offering researchers a choice of three types of license. The first, most liberal license, CC-BY, allows anyone, even commercial organizations, to re-use it. A more restrictive version, CC-BY-NC-SA, lets others remix, tweak and build on work if they give credit to the original author, but only for non-commercial (NC) purposes, and only if they license what they produce under the same terms (SA, or 'share-alike'). A third licence, CC-BY-NC-ND, is the most restrictive, allowing others to download and share work, but not to change it in any way (ND, 'no derivative works'), or use it commercially. The results from Scientific Reports shows that, for the 685 papers accepted by the journal, authors chose either of the more restrictive licences 95% of the time — and the most restrictive, CC-BY-NC-ND, 68% of the time."
jfruh writes "The MPAA and other entertainment industry groups have been locked for years in a legal struggle against Newzbin2, a Usenet-indexing site. Since Newzbin2 profited from making it easier for users to find pirated movies online, the MPAA contends they can sue to take those profits on behalf of members who produced that content in the first place. But a British court has rejected that argument."
ianare writes "A propaganda video from the North Korean authorities has been removed from YouTube following a copyright claim by games maker Activision. It shows a space craft flying around the world and eventually over a city resembling New York. The buildings are then seen crumbling amid fires and missile attacks. However, the dramatic images (video) were soon recognized as having been lifted from Call of Duty: Modern Warfare 3. By Tuesday, the video had been blocked, with a message notifying users of Activision's complaint shown in its place."
An anonymous reader writes "According to an Al-Jazeera report, 'Charlottesville, Virginia is the first city in the United States to pass an anti-drone resolution. The writing of the resolution coincides with a leaked memo outlining the legal case for drone strikes on U.S. citizens and a Federal Aviation Administration plan to allow the deployment of some 30,000 domestic drones.' The finalized resolution is fairly weak, but it's a start. There is also some anti-drone legislation in the Oregon state Senate, and it has much bigger teeth. It defines public airspace as anything above your shoelaces, and the wording for 'drone' is broad enough to include RC helicopters and the like."
An anonymous reader writes "Michael Geist reports that a coalition of Canadian industry groups, including the Canadian Chamber of Commerce, the Canadian Marketing Association, the Canadian Wireless Telecommunications Association and the Entertainment Software Association of Canada, are demanding legalized spyware for private enforcement purposes. The potential scope of coverage is breathtaking: a software program secretly installed by an entertainment software company designed to detect or investigate alleged copyright infringement would be covered by this exception. This exception could potentially cover programs designed to block access to certain websites (preventing the contravention of a law as would have been the case with SOPA), attempts to access wireless networks without authorization, or even keylogger programs tracking unsuspecting users (detection and investigation)."