Privacy

French Version of 'Patriot Act' Becomes Law 33

Posted by Soulskill
from the privacy-surrenders dept.
Taco Cowboy writes: Thanks to the Charlie Hebdo massacre and other instances of terrorism, the French legislature has voted 438 to 86 in favor of the "Intelligence Service Bill," essentially a French version of the Patriot Act. It awards the French intelligence services sweeping powers to tap and intercept any kind of digital correspondence, including phone conversations, emails, and social media.

The bill decrees that hosting providers and Internet service providers in France must be equipped with a "black box" that can retain all digital communications from customers. "The new law would create a 13-member National Commission to Control Intelligence Techniques, which would be made up of six magistrates from the Council of State and the Court of Appeals, three representatives of the National Assembly, three senators from the upper house of Parliament and a technical expert. ... The only judicial oversight is a provision that allows the commission to lodge a complaint with the Council of State, but lawyers are doubtful that it could be convened on a routine basis." We previously discussed news that ISPs may leave France in protest if the bill was passed. Now we'll know shortly if those ISPs will live up to their word.
Cellphones

Police Can Obtain Cellphone Location Records Without a Warrant 157

Posted by Soulskill
from the your-data-is-our-data dept.
mi writes: A new ruling from the 11th Circuit Court of Appeals found by a margin of 9-2 that law enforcement does not need to get a warrant to grab your cell phone's location records. The justices ruled that there is no expectation of privacy for your location when you're using a cell phone. This decision (PDF) was based on a case in which a man was convicted of robbery after months of location data was given to authorities by his cell phone carrier, MetroPCS. Police got the information using a court order, rather than a warrant, because there were less stringent requirements involved. One of the judges wrote: "We find no reason to conclude that cellphone users lack facts about the functions of cell towers or about telephone providers' recording cell tower usage."
Communications

How the NSA Converts Spoken Words Into Searchable Text 147

Posted by timothy
from the message-could-not-be-lawfullly-transcribed dept.
Presto Vivace writes: Dan Froomkin reports at The Intercept: "Though perfect transcription of natural conversation apparently remains the Intelligence Community's 'holy grail,' the Snowden documents describe extensive use of keyword searching as well as computer programs designed to analyze and 'extract' the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest." I am torn between admiration of the technical brilliance of building software like this and horror as to how it is being used. It can't just be my brother and me who like to salt all phone conversations with interesting keywords.
Businesses

Appeals Judge Calls Prenda an "Ingenious Crooked Extortionate Operation" 64

Posted by timothy
from the bad-actor-seems-a-fair-description dept.
ktetch-pirate ("pirate politician" Andrew Norton) writes with this news from his blog: [Monday] was the long-awaited appeals court hearing in the ongoing Prenda copyright troll saga. Almost exactly two years after Judge Otis Wright went sci-fi on Prenda and its principles, the 9th Circuit Court of Appeals held an appeals hearing requested by Prenda on the sanctions, and it was not a pretty day for Prenda. Highlights included Senior Judge Pregerson calling Prenda's operation an "Ingenious Crooked Extortionate Operation" after describing in detail how they operate.

Prenda also astonished the judges by welcoming the idea of a criminal contempt hearing, which Legal blog Popehat thinks is likely to happen, on top of the sanctions being sustained.
Windows

Single Verizon IP Address Used For Hundreds of Windows 7 Activations 296

Posted by samzenpus
from the you-might-want-to-tone-it-down-a-little dept.
An anonymous reader writes with this story from TorrentFreak: A presumed pirate with an unusually large appetite for activating Windows 7 has incurred the wrath of Microsoft. In a lawsuit filed [in] a Washington court, Microsoft said that it logged hundreds of suspicious product activations from a single Verizon IP address and is now seeking damages. ... Who he, she or they are behind address 74.111.202.30 is unknown at this point, but according to Microsoft they're responsible for some serious Windows pirating. "As part of its cyberforensic methods, Microsoft analyzes product key activation data voluntarily provided by users when they activate Microsoft software, including the IP address from which a given product key is activated," the lawsuit reads. The company says that its forensic tools allow the company to analyze billions of activations of software and identify patterns "that make it more likely than not" that an IP address associated with activations is one through which pirated software is being activated.
Programming

Singapore's Prime Minister Shares His C++ Sudoku Solver Code 222

Posted by samzenpus
from the prime-programmer dept.
itwbennett writes: Several weeks ago, during a speech at the Founders Forum Smart Nation Singapore Reception, Singapore's prime minister Lee Hsien Loong said that he used to enjoy programming, and that the last program he wrote was a Sudoku solver in C++. To back that up, earlier today he announced (on Facebook and Twitter) that his code is available to download. He wrote on Facebook that he wrote the program 'several years ago' and that the code does 'a backtrack search, choosing the next cell to guess which minimises the fanout.'
Privacy

Researchers Detect Android Apps That Connect to User Tracking and Ad Sites 68

Posted by samzenpus
from the don't-track-me-bro dept.
An anonymous reader writes: A group of European researchers has developed software that tracks the URLs to which cellphone apps connect. After downloading 2,000+ free apps from Google Play, they indexed all the sites those apps connected to, and compared them to a list of known advertising and user tracking sites. "In total, the apps connect to a mind-boggling 250,000 different URLs across almost 2,000 top level domains. And while most attempt to connect to just a handful of ad and tracking sites, some are much more prolific. Vigneri and co give as an example "Music Volume Eq," an app designed to control volume, a task that does not require a connection to any external urls. And yet the app makes many connections. 'We find the app Music Volume EQ connects to almost 2,000 distinct URLs,' they say. [Another major offender] is an app called Eurosport Player which connects to 810 different user tracking sites." The researchers plan to publish their software for users to try out on Google Play soon.
China

China Takes Its Already Strict Internet Regulations One Step Further 48

Posted by samzenpus
from the watch-what-you-say dept.
New submitter DaveS7 writes with this story about new regulations from the Chinese government designed to further crack down on online media. Chinese authorities have released a new set of regulations for online media, raising concerns about tightening control over freedom of expression by the Communist regime. Contained in the ordinance, released on April 28 by the Cyberspace Administration of China, is a clause saying that persons responsible for managing flagged sites will be summoned by state personnel in case of violations. Internet censorship in China is mostly managed by individual websites, which are encouraged to toe the Party line before the Party steps in to rectify things for them. The new ordinance increases the number of conditions that, if met by online media, result in automatic state intervention.
Privacy

US Gov't Will Reveal More About Its Secret Cellphone Tracking Devices 94

Posted by Soulskill
from the they-also-say-you-should-call-your-mom-more dept.
An anonymous reader writes: The U.S. Department of Justice has launched a major review of how law enforcement around the country uses cellphone tracking technology, and they will also begin sharing more information about how it works. So-called "Stingray" devices have been in the news a lot recently, as privacy activists try to piece together how they're used. Police and federal agencies have been notably resistant to sharing how they use this tool, even after we learned that they often don't bother with warrants and may have been drastically overusing it. Still, they're not going to reveal everything about the Stingrays: "Officials said they don't want to reveal so much that it gives criminals clues about how to defeat the devices. Law-enforcement officials also don't want to reveal information that would give new ammunition to defense lawyers in prosecutions where warrants weren't used, according to officials involved in the discussions."
China

Uber Office Raided By Police In China, Accused of Running 'Illegal' Car Business 174

Posted by timothy
from the didn't-ask-enough-permission dept.
albert555 writes: Uber's curse keeps on striking after Uber's office in the southern Chinese city of Guangzhou was raided by authorities on the 30th of April 2015. Uber is accused of running an 'illegal' transport service, according to the Guangzhou Daily. Uber has been implanted in China since August 2013 and is suspected of not having the proper qualifications to run a private car business in the city. Following the recent German court ban two weeks ago, who will win the fight for private transportation? Long-term, established transportation companies with powerful lobbying arms or the newcomer making use of disruptive technology? Does Schumpeter's creative destruction also apply to the transportation sector?
Communications

WikiLeaks' Anonymous Leak Submission System Is Back After Nearly 5 Years 26

Posted by timothy
from the drop-'em-a-line dept.
Sparrowvsrevolution writes: On Friday, WikiLeaks announced that it has finally relaunched a beta version of its leak submission system after a 4.5 year hiatus. That file-upload site, which once served as a central tool in WIkiLeaks' leak-collecting mission, runs on the anonymity software Tor to allow uploaders to share documents and tips while protecting their identity from any network eavesdropper, and even from WikiLeaks itself. In 2010 the original submission system went down amid infighting between WikiLeaks' leaders and several of its disenchanted staffers, including several who left to create their own soon-to-fail project called OpenLeaks. WikiLeaks founder Julian Assange says that the new system, which was delayed by his legal troubles and the banking industry blockade against the group, is the final result of "four competing research projects" WikiLeaks launched in recent years. He adds that it has several less-visible submission systems in addition to the one it's now revealed. "Currently, we have one public-facing and several private-facing submission systems in operation, cryptographically, operationally and legally secured with national security sourcing in mind," Assange writes.
Censorship

Two Gunman Killed Outside "Draw the Prophet" Event In Texas 1050

Posted by timothy
from the unspeakable-acts-undrawable-subjects dept.
cosm writes: ABC news reports that two armed gunman were shot and killed outside a "Draw the Prophet" event hosted in Garland Texas. From the article: "The event, sponsored by the American Freedom Defense Initiative, featured cartoons of the Prophet Muhammad, and scheduled speakers included Dutch MP Geert Wilders, who has campaigned to have the Quran banned in the Netherlands. The winner of the contest was to receive $10,000." In light of the Charlie Hebdo terrorist attacks, the Lars Vilks Muhammad drawing controversies, and the American show South Park's satirical depiction of the state of Muhammad phobia in the US and elsewhere, is there an end in sight to the madness associated with the representation of this religious figure?
Communications

VA Tech Student Arrested For Posting Perceived Threat Via Yik Yak 250

Posted by timothy
from the how-to-win-friends-and-influence-people dept.
ememisya writes: I wonder if I posted, "There will be another 12/7 tomorrow, just a warning." around December, would people associate it with Pearl Harbor and I would find myself arrested, or has enough time passed for people to not look at the numbers 12 and 7 and take a knee jerk reaction? A student was arrested for "Harassment by Computer" (a class 1 misdemeanor in the state of Virginia) due to his post on an "anonymous" website [Yik Yak]. Although the post in and of itself doesn't mean anything to most people in the nation, it managed to scare enough people locally for law enforcement agencies to issue a warrant for his arrest. "Moon, a 21-year-old senior majoring in business information technology, is being charged with Harassment by Computer, which is a class one misdemeanor. Tuesday night, April 28, a threat to the Virginia Tech community was posted on the anonymous social media app Yik Yak. Around 11:15 p.m., an unknown user posted 'Another 4.16 moment is going to happen tomorrow. Just a warning (sic).' The Virginia Tech Police Department released a crime alert statement Wednesday morning via email informing students that VTPD was conducting an investigation throughout the night in conjunction with the Blacksburg Police Department."
The Media

Statues of Assange, Snowden and Manning Go Up In Berlin 157

Posted by timothy
from the and-there-they-are dept.
HughPickens.com writes: RT Times reports that Alexanderplatz square in Berlin has become the stage for a provocative art piece which celebrates whistleblowers and encourages ordinary citizens to speak out. "They have lost their freedom for the truth, so they remind us how important it is to know the truth," says sculptor Davide Dormino. The life-sized statues of the three whistleblowers stand upon three chairs, as if speaking in an impromptu public meeting. Next to them is a fourth, empty chair. "The fourth chair is open to anyone here in Berlin who wants to get up and say anything they want," says the artist. Dormino, who came up with the idea together with the US journalist Charles Glass, specifically chose a classical bronze statue for his depiction – and not an installation or abstract piece – since statues are usually made of establishment figures. According to Domino while men who order others to their deaths get immortalized, those who resist are often forgotten, so "the statue pays homage to three who said no to war, to the lies that lead to war and to the intrusion into private life that helps to perpetuate war." Activists and members of Germany's Green party unveiled the life-size bronze statues on May Day.
Education

Unable To Hack Into Grading System, Georgia Student Torches Computer Lab 244

Posted by timothy
from the our-son dept.
McGruber writes: A 15 year-old Douglas County, Georgia high school student has been charged with five felonies, including burglary and arson, after sheriff's deputies caught him while responding to a 1 AM fire at Alexander High School. The boy admitted to investigators that he set fire to a computer after trying, unsuccessfully, to hack into the school computer system to change his grade on a failed test. "It's very sad and tragic. He could have very easily come to one of his counselors and asked for help," said Lt. Glenn Daniel with the Douglas County Sheriff's Department. "From what we can tell, (the student) was mad and frustrated because he could not hack into the system." Lt. Daniel said the charges could land the young man in prison for several years. The computer lab was cleaned up and re-opened in time for the start of that day's classes.