Forgot your password?
typodupeerror

Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

Censorship

Putin To Discuss Plans For Disconnecting Russia From the Internet

Posted by Soulskill
from the taking-his-e-toys-and-going-home dept.
New submitter GlowingCat writes: Russian President Vladimir Putin and several high-ranking officials will discuss the security of the Russian segment of the Internet at the meeting of the Russian Security Council next week. According to various reports, the officials will make a number of decisions about regulating the use of the Internet in Russia. This includes the ability to cut off the Russian Internet, known as Runet, from the outside world, in case of emergency.
Crime

Science Has a Sexual Assault Problem 109

Posted by Soulskill
from the not-immune dept.
cold fjord writes: Phys.org reports, "The life sciences have come under fire recently with a study published in PLOS ONE that investigated the level of sexual harassment and sexual assault of trainees in academic fieldwork environments. The study found 71% of women and 41% of men respondents experienced sexual harassment, while 26% of women and 6% of men reported experiencing sexual assault. The research team also found that within the hierarchy of academic field sites surveyed, the majority of incidents were perpetrated by peers and supervisors. The New York Times notes, "Most of these women encountered this abuse very early in their careers, as trainees. The travel inherent to scientific fieldwork increases vulnerability as one struggles to work within unfamiliar and unpredictable conditions."
Music

U2 and Apple Collaborate On 'Non-Piratable, Interactive Format For Music' 231

Posted by Soulskill
from the good-luck-with-that dept.
Squiff writes U2 and Apple are apparently collaborating on a new, "interactive format for music," due to launch in "about 18 months." (A direct interview is available at Time, but paywalled.) Bono said the new tech "can't be pirated" and will re-imagine the role of album artwork. Marco Arment has some suitably skeptical commentary: "Full albums are as interesting to most people today as magazines. Single songs and single articles killed their respective larger containers. ... This alleged new format will cost a fortune to produce: people have to take the photos, design the interactions, build the animations, and make the deals with Apple. Bono’s talking point about helping smaller bands is ridiculous ... There's nothing Apple or Bono can do to make people care enough about glorified liner notes. People care about music and convenience, period. As for “music that can’t be pirated”, I ask again, what decade is this? That ship has not only sailed long ago, but has circled the world hundreds of times, sunk, been dragged up, turned into a tourist attraction, went out of business, and been gutted and retrofitted as a more profitable oil tanker."
Transportation

Dealership Commentator: Tesla's Going To Win In Every State 142

Posted by samzenpus
from the go-ahead-and-sell-it dept.
cartechboy writes Unless you've been in a coma for a while you're aware that many dealer associations have been causing headaches for Tesla in multiple states. The reason? They are scared. Tesla's new, different, and shaking up the ridiculously old way of doing things. But the thing is, Tesla keeps winning. Now Ward's commenter Jim Ziegler, president of Ziegler Supersystems in Atlanta, wrote an opinion piece that basically says Tesla's going to prevail in every state against dealer lawsuits. He says Tesla's basically busy defending what are nuisance suits. This leads to the question of whether there will be some sort of sweeping federal action in Tesla's favor.
Privacy

Apple's "Warrant Canary" Has Died 199

Posted by samzenpus
from the get-out-of-the-mine dept.
HughPickens.com writes When Apple published its first Transparency Report on government activity in late 2013, the document contained an important footnote that stated: "Apple has never received an order under Section 215 of the USA Patriot Act. We would expect to challenge such an order if served on us." Now Jeff John Roberts writes at Gigaom that Apple's warrant canary has disappeared. A review of the company's last two Transparency Reports, covering the second half of 2013 and the first six months of 2014, shows that the "canary" language is no longer there suggesting that Apple is now part of FISA or PRISM proceedings.

Warrant canaries are a tool used by companies and publishers to signify to their users that, so far, they have not been subject to a given type of law enforcement request such as a secret subpoena. If the canary disappears, then it is likely the situation has changed — and the company has been subject to such request. This may also give some insight into Apple's recent decision to rework its latest encryption in a way that makes it almost impossible for the company to turn over data from most iPhones or iPads to police.
Encryption

Next Android To Enable Local Encryption By Default Too, Says Google 122

Posted by timothy
from the keep-it-to-yourself-bub dept.
An anonymous reader writes The same day that Apple announced that iOS 8 will encrypt device data with a local code that is not shared with Apple, Google has pointed out that Android already offers the same feature as a user option and that the next version will enable it by default. The announcements by both major cell phone [operating system makers] underscores a new emphasis on privacy in the wake of recent government surveillance revelations in the U.S. At the same time, it leaves unresolved the tension between security and convenience when both companies' devices are configured to upload user content to iCloud and Google+ servers for backup and synchronization across devices, servers and content to which Apple and Google do have access.
Networking

Once Vehicles Are Connected To the Internet of Things, Who Guards Your Privacy? 126

Posted by timothy
from the I-hope-it's-rob-ford dept.
Lucas123 (935744) writes Carmakers already remotely collect data from their vehicles, unbeknownst to most drivers, but once connected via in-car routers or mobile devices to the Internet, and to roadway infrastructure and other vehicles around them, that information would be accessible by the government or other undesired entities. Location data, which is routinely collected by GPS providers and makers of telematics systems, is among the most sensitive pieces of information that can be collected, according to Nate Cardozo, an attorney with the Electronic Frontier Foundation. "Not having knowledge that a third party is collecting that data on us and with whom they are sharing that data with is extremely troubling," Cardozo said. in-vehicle diagnostics data could also be used by government agencies to track driver behavior. Nightmare scenarios could include traffic violations being issued without law enforcement officers on the scene or federal agencies having the ability to track your every move in a car. That there could be useful data in all that personally identifiable bits made me think of Peter Wayner's "Translucent Databases."
Encryption

Apple Will No Longer Unlock Most iPhones, iPads For Police 471

Posted by timothy
from the just-what-they-want-you-to-think-part-827398 dept.
SternisheFan writes with this selection from a story at the Washington Post: Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user data. The move, announced with the publication of a new privacy policy tied to the release of Apple's latest mobile operating system, iOS 8, amounts to an engineering solution to a legal dilemma: Rather than comply with binding court orders, Apple has reworked its latest encryption in a way that makes it almost impossible for the company – or anyone else but the device's owner – to gain access to the vast troves of user data typically stored on smartphones or tablet computers. The key is the encryption that Apple mobile devices automatically put in place when a user selects a passcode, making it difficult for anyone who lacks that passcode to access the information within, including photos, e-mails, recordings or other documents. Apple once kept possession of encryption keys that unlocked devices for legally binding police requests, but will no longer do so for iOS8, it said in a new guide for law enforcement. "Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data," Apple said on its Web site. "So it's not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8."
Patents

Alice Is Killing Trolls But Patent Lawyers Will Strike Back 89

Posted by timothy
from the waiting-in-the-wings-now-patented dept.
snydeq writes The wheels of justice spin slowly, but they seem finally to be running software patents out of town, writes Simon Phipps in his analysis of how Alice Corp. v CLS Bank is becoming a landmark decision for patent cases in the U.S. 'In case after case, the Court of Appeals is using Alice to resolve patent appeals. In each case so far, the Court of Appeals has found the software patents in question to be invalid. ... As PatentlyO points out, the Alice effect is even reaching to lower courts, saving the Court of Appeals from having to strike down patent findings on appeal.' Although the patent industry broadly speaking sees the Alice verdict as a death knell for many existing patents, some expect Alice to turn software patents into 'draftsmen's art because as you and I have seen over the years, every time there's a court ruling it just means that you have to word the patent claims differently.'
Government

Snowden's Leaks Didn't Help Terrorists 176

Posted by timothy
from the what-they-want-you-to-think dept.
HughPickens.com writes The Intercept reports that contrary to lurid claims made by U.S. officials, a new independent analysis of Edward Snowden's revelations on NSA surveillance that examined the frequency of releases and updates of encryption software by jihadi groups has found no correlation in either measure to Snowden's leaks about the NSA's surveillance techniques. According to the report "well prior to Edward Snowden, online jihadists were already aware that law enforcement and intelligence agencies were attempting to monitor them (PDF)." In fact, concerns about terrorists' use of sophisticated encryption technology predates even 9/11.

Earlier this month former NSA head Michael Hayden stated, "The changed communications practices and patterns of terrorist groups following the Snowden revelations have impacted our ability to track and monitor these groups", while Matthew Olsen of the National Counterterrorism Center would add "Following the disclosure of the stolen NSA documents, terrorists are changing how they communicate to avoid surveillance." Snowden's critics have previously accused his actions of contributing from everything from the rise of ISIS to Russia's invasion of the Ukraine. "This most recent study is the most comprehensive repudiation of these charges to date," says Murtaza Hussain. "Contrary to lurid claims to the contrary, the facts demonstrate that terrorist organizations have not benefited from the NSA revelations, nor have they substantially altered their behavior in response to them."
Australia

Australian Police Arrest 15, Charge 2, For Alleged Islamic State Beheading Plot 152

Posted by timothy
from the even-in-the-nicest-places dept.
The Washington Post reports (building on a short AP report they're also carrying) that "[Australian] police have arrested 15 people allegedly linked to the Islamic State, some who plotted a public beheading." According to the Sydney Morning Herald, of the arrestees, only two have been charged. From the Washington Post story: “Police said the planned attack was to be “random.” The killers were to behead a victim and then drape the body in the black Islamic State flag, according to the Sydney Morning Herald. ... Direct exhortations were coming from an Australian who is apparently quite senior in [the Islamic State] to networks of support back in Australia to conduct demonstration killings here in this country,” Australian Prime Minister Tony Abbott said at a press conference, as the BBC reported. “So this is not just suspicion, this is intent and that’s why the police and security agencies decided to act in the way they have.”
Crime

London's Crime Hot Spots Predicted Using Mobile Phone Data 61

Posted by timothy
from the gotta-get-my-car-out-of-this-bad-area dept.
KentuckyFC (1144503) writes A growing number of police forces around the world are using data on past crimes to predict the likelihood of crimes in the future. These predictions can be made more accurate by combining crime data with local demographic data about the local population. However, this data is time consuming and expensive to collect and so only updated rarely. Now a team of data experts have shown how combing crime data with data collected from mobile phones can make the prediction of future crimes even more accurate. The team used an anonymised dataset of O2 mobile phone users in the London metropolitan area during December 2012 and January 2013. They then used a small portion of the data to train a machine learning algorithm to find correlations between this and local crime statistics in the same period. Finally, they used the trained algorithm to predict future crime rates in the same areas. Without the mobile phone data, the predictions have an accuracy of 62 per cent. But the phone data increases this accuracy significantly to almost 70 per cent. What's more, the data is cheap to collect and can be gathered in more or less real time. Whether the general population would want their data used in this way is less clear but either way Minority Report-style policing is looking less far-fetched than when the film appeared in 2002.
United States

FCC Chairman: Americans Shouldn't Subsidize Internet Service Under 10Mbps 307

Posted by samzenpus
from the reasonable-speed dept.
An anonymous reader writes On Wednesday at a hearing in front of the US House Committee on Small Business, FCC Chairman Tom Wheeler stated that for ISPs to be eligible for government broadband subsidies, they would have to deliver speeds of at least 10 Mbps. Said Wheeler: "What we are saying is we can't make the mistake of spending the people's money, which is what Universal Service is, to continue to subsidize something that's subpar." He further indicated that he would remedy the situation by the end of 2014. The broadband subsidies are collected through bill surcharges paid for by phone customers.
The Almighty Buck

Airbnb To Start Collecting Hotel Tax On Rentals In San Francisco 71

Posted by samzenpus
from the paying-the-price dept.
An anonymous reader writes Airbnb announced that it will begin collecting a 14% occupancy tax on behalf of its San Francisco hosts October 1. "This is the culmination of a long process that began earlier this year when we announced our intent to help collect and remit occupancy taxes in San Francisco," wrote Airbnb public policy leader David Owen. The company already collects taxes in Portland, and has discussed the possibility of collecting taxes in New York.
Government

NSA Director Says Agency Is Still Trying To Figure Out Cyber Operations 103

Posted by Soulskill
from the i-don't-think-the-mr-magoo-routine-is-going-to-work dept.
Trailrunner7 writes: In a keynote speech at a security conference in Washington on Tuesday, new NSA Director Mike Rogers emphasized a need to establish behavioral norms for cyber war. "We're still trying to work our way through distinguishing the difference between criminal hacking and an act of war," said Rogers. "If this was easy, we would have figured it out years ago. We have a broad consensus about what constitutes an act of war, what's an act of defense." Rogers went on to explain that we need to better establish standardized terminology and standardized norms like those that exist in the realm of nuclear deterrence. Unfortunately, unlike in traditional national defense, we can not assume that the government will be able to completely protect us against cyber-threats because the threat ecosystem is just too broad.
Robotics

The Case For a Federal Robotics Commission 70

Posted by Soulskill
from the heading-up-the-anti-singularity-committee dept.
New submitter hmcd31 writes: In a new paper for Brookings' series on the future of civilian robotics, University of Washington Law Professor Ryan Calo argues the need for a Federal Robotics Commission. With advancements such as driverless cars and drones taking to the roads and skies, Calo sees a need for a government agency to monitor these changes. His paper details many benefits a robotics commission could bring, from funding to assisting in law and policy issues. The policies developed by this FRC are argued to be particularly important, as their impact in creating an early infrastructure for robotics could create an environment that lets the technology grow even more.
NASA

NASA's Manned Rocket Contract: $4.2 Billion To Boeing, $2.6 Billion To SpaceX 184

Posted by Soulskill
from the go-big-or-go-home dept.
schwit1 writes NASA has chosen two companies to ferry astronauts to and from the International Space Station, and those companies are Boeing and SpaceX. This decision confirms that SpaceX is ready to go and gives the company the opportunity to finish the job, while also giving Boeing the chance to show that it can still compete. After NASA has certified that each company has successfully built its spacecraft, SpaceX and Boeing will each fly two to six missions. The certification process will be step-by-step, similar to the methods used in the cargo contracts, and will involve five milestones. The contracts will be paid incrementally as they meet these milestones. One milestone will be a manned flight to the ISS, with one NASA astronaut on board. Boeing will receive $4.2 billion, while SpaceX will get $2.6 billion. These awards were based on what the companies proposed and requested.
Privacy

FBI Completes New Face Recognition System 129

Posted by Soulskill
from the they-know-what-you-did-last-summer dept.
Advocatus Diaboli writes: According to a report from Gizmodo, "After six years and over one billion dollars in development, the FBI has just announced that its new biometric facial recognition software system is finally complete. Meaning that, starting soon, photos of tens of millions of U.S. citizen's faces will be captured by the national system on a daily basis. The Next Generation Identification (NGI) program will logs all of those faces, and will reference them against its growing database in the event of a crime. It's not just faces, though. Thanks to the shared database dubbed the Interstate Photo System (IPS), everything from tattoos to scars to a person's irises could be enough to secure an ID. What's more, the FBI is estimating that NGI will include as many as 52 million individual faces by next year, collecting identified faces from mug shots and some job applications." Techdirt points out that an assessment of how this system affects privacy was supposed to have preceded the actual rollout. Unfortunately, that assessment is nowhere to be found.

Two recent news items are related. First, at a music festival in Boston last year, face recognition software was tested on festival-goers. Boston police denied involvement, but were seen using the software, and much of the data was carelessly made available online. Second, both Ford and GM are working on bringing face recognition software to cars. It's intended for safety and security — it can act as authentication and to make sure the driver is paying attention to the road.
Businesses

New Global Plan Would Crack Down On Corporate Tax Avoidance 318

Posted by Soulskill
from the bring-our-benjamins-home dept.
HughPickens.com writes: Reuters reports that plans for a major rewriting of international tax rules have been unveiled by the Organisation for Economic Co-operation and Development (OECD) that could eliminate structures that have allowed companies like Google and Amazon to shave billions of dollars off their tax bills. For more than 50 years, the OECD's work on international taxation has been focused on ensuring companies are not taxed twice on the same profits (and thereby hampering trade and limit global growth). But companies have been using such treaties to ensure profits are not taxed anywhere. A Reuters investigation last year found that three quarters of the 50 biggest U.S. technology companies channeled revenues from European sales into low tax jurisdictions like Ireland and Switzerland, rather than reporting them nationally.

For example, search giant Google takes advantage of tax treaties to channel more than $8 billion in untaxed profits out of Europe and Asia each year and into a subsidiary that is tax resident in Bermuda, which has no income tax. "We are putting an end to double non-taxation," says OECD head of tax Pascal Saint-Amans.For the recommendations to actually become binding, countries will have to encode them in their domestic laws or amend their bilateral tax treaties. Even if they do pass, these changes are likely 5-10 years away from going into effect.
Speaking of international corporate business: U.K. mainframe company Micro Focus announced it will buy Attachmate, which includes Novell and SUSE.
Cloud

Tim Cook Says Apple Can't Read Users' Emails, That iCloud Wasn't Hacked 190

Posted by timothy
from the our-cooperation-was-strictly-reluctant dept.
Apple CEO Tim Cook insists that Apple doesn't read -- in fact, says Cook, cannot read -- user's emails, and that the company's iCloud service wasn't hacked. ZDNet presents highlights from Cook's lengthy, two-part interview with Charlie Rose. One selection of particular interest: Apple previously said that even it can't access iMessage and FaceTime communications, stating that such messages and calls are not held in an "identifiable form." [Cook] claimed if the government "laid a subpoena," then Apple "can't provide it." He said, bluntly: "We don't have a key... the door is closed." He reiterated previous comments, whereby Apple has said it is not in the business of collecting people's data. He said: "When we design a new service, we try not to collect data. We're not reading your email." Cook went on to talk about PRISM in more detail, following the lead from every other technology company implicated by those now-infamous PowerPoint slides.

"An open mind has but one disadvantage: it collects dirt." -- a saying at RPI

Working...