Privacy

French Version of 'Patriot Act' Becomes Law 70

Posted by Soulskill
from the privacy-surrenders dept.
Taco Cowboy writes: Thanks to the Charlie Hebdo massacre and other instances of terrorism, the French legislature has voted 438 to 86 in favor of the "Intelligence Service Bill," essentially a French version of the Patriot Act. It awards the French intelligence services sweeping powers to tap and intercept any kind of digital correspondence, including phone conversations, emails, and social media.

The bill decrees that hosting providers and Internet service providers in France must be equipped with a "black box" that can retain all digital communications from customers. "The new law would create a 13-member National Commission to Control Intelligence Techniques, which would be made up of six magistrates from the Council of State and the Court of Appeals, three representatives of the National Assembly, three senators from the upper house of Parliament and a technical expert. ... The only judicial oversight is a provision that allows the commission to lodge a complaint with the Council of State, but lawyers are doubtful that it could be convened on a routine basis." We previously discussed news that ISPs may leave France in protest if the bill was passed. Now we'll know shortly if those ISPs will live up to their word.
Businesses

Recruiters Use 'Digital Native' As Code For 'No Old Folks' 528

Posted by Soulskill
from the get-off-my-lawn dept.
bizwriter writes: Companies are trying to get around Equal Employment Opportunity Commission restrictions on age-discriminatory language (like "recent college graduate") by saying that they want "digital natives." So far, no one has complained to the EEOC, but that could change. "Since the 1990s dotcom boom, many employers have openly sought to hire young, tech savvy talent, believing that was necessary to succeed in the new digital economy. At the same time, age discrimination complaints have spiraled upward, according to the Equal Employment Opportunity Commission, with 15,785 claims filed in 1997 compared to 20,588 filed in 2014.

Out of the 121 charges filed last year by the EEOC for alleged discriminatory advertising, 111 of them claimed the job postings discriminated against older applicants. The EEOC has said that using phrases like 'college student,' 'recent college graduate,' or 'young blood' violate the Age Discrimination in Employment Act of 1966. That federal law protects individuals who are 40 years of age or older from employment discrimination based on age."
Books

Obama Announces e-Book Scheme For Low-Income Communities 126

Posted by samzenpus
from the you-get-a-book-and-you-get-a-book-and-you-get-a-book dept.
An anonymous reader writes: The White House has today launched an initiative encouraging top book publishers to supply $250 million worth of free e-books to low-income students. Partnering with local governments and schools nationwide, President Obama hopes that the e-book scheme will support low-income households who significantly trail the national average for computer ownership and digital connectivity. At Anacostia Library in Southeast Washington, D.C., Obama announced that libraries and schools in poorer communities would be supported by the scheme and efforts would be made to increase internet access at these establishments. Publishers involved in the program include Penguin Random House, Macmillan, Bloomsbury, HarperCollins and Simon & Schuster. NGOs, such as book donation charity Firstbook, and public libraries will also be working together to develop apps to support the digital reading program.
Bitcoin

Bitcoin Is Disrupting the Argentine Economy 251

Posted by timothy
from the when-promises-are-fulfilled dept.
HughPickens.com writes: Nathaniel Popper writes in the NYT that with its volatile currency and dysfunctional banks, Argentina is the perfect place to experiment with a new digital currency. The number of Bitcoin users in Argentina is relatively small; it barely registers on most charts of global Bitcoin usage. But Argentina has been quietly gaining renown in technology circles as the first, and almost only, place where Bitcoins are being regularly used by ordinary people for real commercial transactions. For example, BitPagos is selling bitcoins in over 8,000 Argentine convenience stores and is helping more than 200 hotels, both cheap and boutique, take credit-card payments from foreign tourists. The money brought to Argentina using Bitcoin circumvents the onerous government restrictions on receiving money from abroad

The Rock Hostel is one of hundreds of hotels in the country using BitPagos to collect credit-card payments from foreign customers. If owner Rodriguez Pons accepted credit-card payments from American customers through the usual financial channels, customers would be billed in dollars, and when those dollars came to Pons's Argentine bank account, they would be converted at the official rate, about 30 percent lower than the black-market rate. It would also take 20 days for Pons to get her pesos. BitPagos helped counter these drawbacks by taking the credit-card payment in the United States and then using the dollars to buy Bitcoins, generally from Coinbase, before sending them to Pons immediately.

Bitcoin proponents like to say that the currency first became popular in the places that needed it least, like Europe and the United States, given how smoothly the currencies and financial services work there. It makes sense that a place like Argentina would be fertile ground for a virtual currency. Inflation is constant: At the end of 2014, for example, the peso was worth 25 percent less than it was at the beginning of the year. And that adversity pales in comparison with past bouts of hyperinflation, defaults on national debts and currency revaluations. "In the long run, Bitcoin will be very disruptive to the developed world," says Dan Morehead, a former Goldman Sachs executive who now runs a hedge fund focused on Bitcoin. Things are happening sooner in Argentina, he says, because its financial system creates hassles for the people there. But, he added, "Argentina is just a more extreme example of the situation in every country."
Education

White House Outsources K-12 CS Education To Infosys Charity 88

Posted by timothy
from the perhaps-someone-besides-mama-cass-is-getting-fat dept.
theodp writes: In December, the White House praised the leadership of Code.org for their efforts to get more computer science into K-12 schools, which were bankrolled by $20 million in philanthropic contributions from the likes of Google, Microsoft, Bill Gates, Steve Ballmer, and Mark Zuckerberg. On Monday, it was announced that Infosys Foundation USA will be partnering with Code.org to bring CS education to millions of U.S. students. Infosys Foundation USA Chair Vandana Sikka, who joins execs from Microsoft, Google, and Amazon execs on Code.org's Board, is the spouse of Infosys CEO Vishal Sikka. The announcement from the tax-deductible charity comes as India-based Infosys finds itself scrutinized by U.S. Senators over allegations of H-1B visa program abuses.
Television

Conde Nast To Announce VR Series 12

Posted by samzenpus
from the more-real-than-real dept.
An anonymous reader writes: Lifestyle and fashion publishing giant Conde Nast is planning to move into virtual reality in an effort to trial new marketing and advertising streams to attract digital consumers. The privately-owned company is expected to announce two new virtual reality series hosted by its TV and film division, Conde Nast Entertainment (CNE), at the Newfronts advertising and digital content showcase in New York tomorrow. The entertainment firm is not revealing much information on the shows that it is producing alongside virtual reality group Jaunt VR. However, it is thought that the series will follow a storytelling narrative – Conde Nast becoming one of the first publishing houses to use the technology in this format. The series will be aired on CNE's The Scene, a digital platform launched in 2014 to showcase video content from Conde Nast publications as well as media partners including BuzzFeed, Forbes, Variety and ABC News.
Space

Cosmologists Find Eleven Runaway Galaxies 60

Posted by samzenpus
from the I'm-outta-here dept.
An anonymous reader writes: Discovery News reports that 11 homeless galaxies have been identified by Igor Chilingarian, an astronomer at the Harvard-Smithsonian Center for Astrophysics, and Moscow State University, and his fellow astronomers. "The 11 runaway galaxies were found by chance while Chilingarian and co-investigator Ivan Zolotukhin, of the L'Institut de Recherche en Astrophysique et Planetologie and Moscow State University, were scouring publicly-available data (via the Virtual Observatory) from the Sloan Digital Sky Survey and the GALEX satellite for compact elliptical galaxies."
Crime

Allegation: Philly Cops Leaned Suspect Over Balcony To Obtain Password 225

Posted by timothy
from the forget-it-jake-it's-the-city-of-brotherly-love dept.
An anonymous reader writes with this news from Ars Technica: If you want access to encrypted data on a drug dealer's digital device, you might try to break the crypto—or you might just try to break the man.

According to testimony from a police corruption trial currently roiling the city of Philadelphia, officers from an undercover drug squad took the latter route back in November 2007. After arresting their suspect, Michael Cascioli, in the hallway outside his 18th floor apartment, the officers took Cascioli back inside. Although they lacked a search warrant, the cops searched Cascioli's rooms anyway. According to a federal indictment (PDF), the officers 'repeatedly assaulted and threatened [Cascioli] during the search to obtain information about the location of money, drugs, and drug suppliers.'
That included, according to Cascioli, lifting him over the edge of his balcony to try to frighten out of him the password to his Palm Pilot. That sounds like a good time for a duress password.
Government

German Intelligence Helped NSA Spy On EU Politicians and Companies 80

Posted by Soulskill
from the der-rubberschtampen dept.
An anonymous reader writes: We've known for some time already that intelligence agencies operate beyond rules, laws, and regulations. Now, we learn that the NSA and the German intelligence service, BND, lied and withheld information about misuse from the German Chancellor's Office.

"The BND realized as early as 2008 that some of the selectors were not permitted according to its internal rules, or covered by a 2002 US-Germany anti-terrorism "Memorandum of Agreement" on intelligence cooperation. And yet it did nothing to check the NSA's requests systematically. It was only in the summer of 2013, after Edward Snowden's revelations of massive NSA and GCHQ surveillance, that the BND finally started an inquiry into all the selectors that had been processed. According to Der Spiegel, investigators found that the BND had provided information on around 2,000 selectors that were clearly against European and German interests. Not only were European businesses such as the giant aerospace and defense company EADS, best-known as the manufacturer of the Airbus planes, targeted, so were European politicians—including German ones.

However, the BND did not inform the German Chancellor's office, which only found out about the misuse of the selector request system in March 2015. Instead, the BND simply asked the NSA to make requests that were fully covered by the anti-terrorism agreement between the two countries. According to Die Zeit, this was because the BND was worried that the NSA might curtail the flow of its own intelligence data to the German secret services if the selector scheme became embroiled in controversy.
Communications

New Privacy Concerns About US Program That Can Track Snail Mail 66

Posted by timothy
from the ask-not-what-your-country-can-do-to-you dept.
Lashdots writes: A lawyers' group has called for greater oversight of a government program that gives state and federal law enforcement officials access to metadata from private communications for criminal investigations and national security purposes. But it's not digital: this warrantless surveillance is conducted on regular mail. "The mail cover has been in use, in some form, since the 1800s," Chief Postal Inspector Guy J. Cottrell told Congress in November. The program targets a range of criminal activity including fraud, pornography, and terrorism, but, he said, "today, the most common use of this tool is related to investigations to rid the mail of illegal drugs and illegal drug proceeds." Recent revelations that the U.S. Postal Service photographs the front and back of all mail sent through the U.S., ostensibly for sorting purposes, has, Fast Company reports, brought new scrutiny—and new legal responses—to this obscure program.
United States

Except For Millennials, Most Americans Dislike Snowden 686

Posted by samzenpus
from the no-sir-I-don't-like-him dept.
HughPickens.com writes: Newsmax reports that according to KRC Research, about 64 percent of Americans familiar with Snowden hold a negative opinion of him. However 56 percent of Americans between the ages of 18 and 34 have a positive opinion of Snowden which contrasts sharply with older age cohorts. Among those aged 35-44, some 34 percent have positive attitudes toward him. For the 45-54 age cohort, the figure is 28 percent, and it drops to 26 percent among Americans over age 55, U.S. News reported. Americans overall say by plurality that Snowden has done "more to hurt" U.S. national security (43 percent) than help it (20 percent). A similar breakdown was seen with views on whether Snowden helped or hurt efforts to combat terrorism, though the numbers flip on whether his actions will lead to greater privacy protections. "The broad support for Edward Snowden among Millennials around the world should be a message to democratic countries that change is coming," says Anthony D. Romero, executive director of the American Civil Liberties Union. "They are a generation of digital natives who don't want government agencies tracking them online or collecting data about their phone calls." Opinions of millennials are particularly significant in light of January 2015 findings by the U.S. Census Bureau that they are projected to surpass the baby-boom generation as the United States' largest living generation this year.
Government

'Aaron's Law' Introduced To Curb Overzealous Prosecutions For Computer Crimes 206

Posted by Soulskill
from the intimidation-is-not-justice dept.
SonicSpike writes: Sens. Rand Paul (R-KY) and Ron Wyden (D-OR), and Rep. Zoe Lofgren (D-CA) introduced bipartisan legislation today to better target serious criminals and curb overzealous prosecutions for non-malicious computer and Internet offenses.

The legislation, inspired by the late Internet innovator and activist Aaron Swartz, who faced up to 35 years in prison for an act of civil disobedience, would reform the quarter-century old Computer Fraud and Abuse Act (CFAA) to better reflect computer and internet activities in the digital age. Numerous and recent instances of heavy-handed prosecutions for non-malicious computer crimes have raised serious questions as to how the law treats violations of terms of service, employer agreements and website notices.

"Aaron’s Law would change the definition of 'access without authorization' in the CFAA so it more directly applies to malicious hacks such as sending fraudulent emails, injecting malware, installing viruses or overwhelming a website with traffic."
Transportation

Automakers To Gearheads: Stop Repairing Cars 649

Posted by samzenpus
from the put-down-the-wrench-and-back-away dept.
Mr_Blank writes Automakers are supporting provisions in copyright law that could prohibit home mechanics and car enthusiasts from repairing and modifying their own vehicles. In comments filed with a federal agency that will determine whether tinkering with a car constitutes a copyright violation, OEMs and their main lobbying organization say cars have become too complex and dangerous for consumers and third parties to handle. The dispute arises from a section of the Digital Millennium Copyright Act that no one thought could apply to vehicles when it was signed into law in 1998. But now, in an era where cars are rolling computing platforms, the U.S. Copyright Office is examining whether provisions of the law that protect intellectual property should prohibit people from modifying and tuning their cars.
Communications

Norway Will Switch Off FM Radio In 2017 293

Posted by timothy
from the video-sought-by-police-for-questioning dept.
New submitter titten writes The Norwegian Ministry of Culture has announced that the transition to DAB will be completed in 2017. This means that Norway, as the first country in the world to do so, has decided to switch off the FM network. Norway began the transition to DAB in 1995. In recent years two national and several local DAB-networks has been established. 56 per cent of radio listeners use digital radio every day. 55 per cent of households have at least one DAB radio, according to Digitalradio survey by TNS Gallup, continuously measuring the Norwegian`s digital radio habits.
Google

Google Helps Homeless Street Vendors Get Paid By Cashless Consumers 142

Posted by samzenpus
from the easy-pay dept.
An anonymous reader writes Starting today Seattle pedestrians can no longer pat their pockets and claim to have no cash when offered a copy of the ironically-named Real Change weekly newspaper by a homeless street vendor. Google has spent two years working with the Real Change organization to develop a barcode-scanning app which lets passers-by purchase a digital edition with their mobile phones. Google's Meghan Casserly believes the Real Change app — available on Android and iOs — represents the first of its kind in North America.
Power

Researchers Design a Self-Powered Digital Camera 85

Posted by Soulskill
from the thankfully-not-a-selfie-powered-camera dept.
Jason Koebler writes: Researchers at Columbia University have designed a fully electric digital camera that powers itself using ambient light. Put in a well-lit room, it would work indefinitely. The camera's image sensor does double duty. It measures the light needed to make the photograph, and it also takes excess light and uses it to power a capacitor (it has no battery) that runs the camera (PDF). The research team says the technology can be used to create self-powered cameras that can live on the internet of things.
Businesses

Nokia To Buy Alcatel-Lucent for $16.6 Billion 66

Posted by Soulskill
from the go-big-or-go-home dept.
totalcaos sends news that Nokia has announced plans to buy Alcatel-Lucent for $16.6 billion worth of stock. Both companies have approved the transaction, though now they must wait for regulatory approval. They said they expect the deal to close in the first half of 2016. The combined company is expected to become the world’s second-largest telecom equipment manufacturer behind Ericsson of Sweden, with global revenues totaling $27 billion and operations spread across Asia, Europe and North America. The companies are betting that, by joining forces, they can better compete against Chinese and European rivals bidding to provide telecom hardware and software to the world’s largest carriers, including AT&T and Verizon in the United States, Vodafone and Orange in Europe, and SoftBank in Japan. ... Analysts say that Nokia has progressively focused on its equipment unit, which now represents roughly 85 percent of the company’s annual revenue. On Wednesday, Nokia confirmed that it had put its digital maps business — a competitor for Google Maps — up for sale.
Piracy

Nearly Half of Game of Thrones Season 5 Leaks Online 148

Posted by samzenpus
from the how-about-leaking-the-books-GRRM dept.
HughPickens.com writes Paul Tassi reports at Forbes that the first four episodes of the new season of "Game of Thrones", nearly half of the ten total episodes, have been leaked online to various torrent sites. The four episodes appeared to come from a screener sent to reviewers with the digital watermark blurred out and are in 480p video format, equivalent to standard-definition TV, not HD.The episodes have already been downloaded almost 800,000 times, and that figure was expected to blow past a million downloads by the season 5 premiere. Game of Thrones has consistently set records for piracy, which has almost been a point of pride for HBO. "Our experience is [piracy] leads to more penetration, more paying subs, more health for HBO, less reliance on having to do paid advertising If you go around the world, I think you're right, Game of Thrones is the most pirated show in the world. Well, you know, that's better than an Emmy."

How the leak happened isn't a mystery. Television critics typically receive the first four episodes of an HBO show before its season premiere, and "Game of Thrones" is no exception. HBO could not immediately say whether the leak could be traced to screener copies of the show. "I suspect HBO may be a bit more restrictive about handing out Game of Thrones screeners to press, given the event-like nature of the show and its reliance on keeping spoilers close to the chest," writes Tassi. "I really don't see why commentary like that needs to exist in the first place." The network can take solace in at least one thing, though. Episode four ends on a heck of a cliffhanger, and those who pirated the episodes will be in the same boat as those of us who received them legally — waiting until May to find out what happens next. "I would imagine it's more fun to just spend the next month watching week to week as nature intended, even if you are watching illegally," concludes Tassi. "Game of Thrones is one of the last true "event" shows where it's something you want to talk about Sunday night or Monday morning with friends and strangers alike."
Data Storage

Ask Slashdot: Best Medium For Storing Data To Survive a Fire (or Other Disaster) 446

Posted by samzenpus
from the burning-down-the-house dept.
First time accepted submitter aka_bigred writes Every year as I file my taxes, I replicate my most important financial data (a couple GB of data) to store an offline copy in my fire-rated home safe. This gets me thinking about what the most reliable data media would be to keep in my fire-rated home safe.

CDs/DVDs/tapes could easily melt or warp rendering them useless, so I'm very hesitant to use them. I've seen more exotic solutions that let you print your digital data to paper an optically re-import it later should you ever need it, but it seems overly cumbersome and error prone should it be damaged or fire scorched. That leaves my best options being either a classic magnetic platter drive, or some sort of solid state storage, like SD cards, USB flash drives, or a small SSD. The problem is, I can't decide which would survive better if ever exposed to extreme temperatures, or water damage should my house burn down.

Most people would just suggest to store it in "the cloud", but I'm naturally averse to doing so because that means someone else is responsible for my data and I could lose it to hackers, the entity going out of business, etc. Once it leaves my home, I no longer fully control it, which is unacceptable. My thought being "they can't hack/steal what they can't physically access." What medium do other Slashdot users use to store their most important data (under say 5GB worth) in an at-home safe to protect it from fire?
Cellphones

The NSA Wants Tech Companies To Give It "Front Door" Access To Encrypted Data 212

Posted by samzenpus
from the let-us-in dept.
An anonymous reader writes The National Security Agency is embroiled in a battle with tech companies over access to encrypted data that would allow it to spy (more easily) on millions of Americans and international citizens. Last month, companies like Google, Microsoft, and Apple urged the Obama administration to put an end to the NSA's bulk collection of metadata. "National Security Agency officials are considering a range of options to ensure their surveillance efforts aren't stymied by the growing use of encryption, particularly in smartphones. Key among the solutions, according to The Washington Post, might be a requirement that technology companies create a digital key that can open any locked device to obtain text messages or other content, but divide the key into pieces so no one group could use it without the cooperation of other parties."