Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Government

Can New Chicago Taxes On Netflix, Apple, Spotify Withstand Legal Challenges? 188

Mr D from 63 writes: Today, a new "cloud tax" takes effect in the city of Chicago, targeting online databases and streaming entertainment services. Residents who stream movies and music from companies like Netflix and Spotify will now need to pay an additional 9% tax. This also applies to Chicago businesses that pay to use databases online. Chicago expects to collect $12 million a year as a result of the new tax ruling. From the 24/7 Wall St. story: "Also worth noting is that the city’s tax ruling in both cases avoids the issue of whether there is a close-enough connection (nexus, in legalese) to require providers like Netflix or others to collect either tax. International law firm ReedSmith weighs in on this point as well: '[O]nce the Department begins to audit and assess customers located within the city, many of those customers are likely to demand that providers collect the tax going forward. As a result, many providers will likely feel the need to register to collect the taxes, despite lacking nexus, and despite having strong arguments against the Department’s expansive interpretation of its taxing ordinances.'"
Communications

UK Government Illegally Spied On Amnesty International 109

Mark Wilson writes with this excerpt from a story at Beta News: A court has revealed that the UK intelligence agency, GCHQ, illegally spied on human rights organization Amnesty International. It is an allegation that the agency had previously denied, but an email from the Investigatory Powers Tribunal backtracked on a judgement made in June which said no such spying had taken place.

The email was sent to Amnesty International yesterday, and while it conceded that the organization was indeed the subject of surveillance, no explanation has been offered. It is now clear that, for some reason, communications by Amnesty International were illegally intercepted, stored, and examined. What is not clear is when the spying happened, what data was collected and, more importantly, why it happened.
Encryption

Cameron Asserts UK Gov't Will Leave No "Safe Space" For Private Communications 260

An anonymous reader writes with the story from Ars Technica that UK prime minister David Cameron "has re-iterated that the UK government does not intend to 'leave a safe space — a new means of communication — for terrorists to communicate with each other.'" That statement came Monday, as a response to Conservative MP David Bellingham, "who asked [Cameron, on the floor of the House of Commons] whether he agreed that the 'time has come for companies such as Google, Facebook and Twitter to accept and understand that their current privacy policies are completely unsustainable?' To which Cameron replied: 'we must look at all the new media being produced and ensure that, in every case, we are able, in extremis and on the signature of a warrant, to get to the bottom of what is going on.'" This sounds like the UK government is declaring a blustery war on encryption, and it might not need too much war: some companies can be persuaded (or would be eager) to cooperate with the government in handing over all kinds of information. However, the bluster part may leave even the fiercest surveillance mostly show: as Ars writer Glyn Moody asks, what about circumstances "where companies can't hand over keys, or where there is no company involved, as with GnuPG, the open source implementation of the OpenPGP encryption system?" Or Tor?

Submission + - Paradoxical Crystal Baffles Physicists (quantamagazine.org)

An anonymous reader writes: In a deceptively drab black crystal, physicists have stumbled upon a baffling behavior, one that appears to blur the line between the properties of metals, in which electrons flow freely, and those of insulators, in which electrons are effectively stuck in place. The crystal exhibits hallmarks of both simultaneously.

“This is a big shock,” said Suchitra Sebastian, a condensed matter physicist at the University of Cambridge whose findings appeared today in an advance online edition of the journal Science. Insulators and metals are essentially opposites, she said. “But somehow, it’s a material that’s both. It’s contrary to everything that we know.”

Submission + - Soneone is Cutting Fiber Optic Cables in San Francisco

HughPickens.com writes: USA Today reports that the FBI is investigating at least 11 physical attacks on high-capacity Internet cables in California's San Francisco Bay Area dating back to at least July 6, 2014, including one early this week. "When it affects multiple companies and cities, it does become disturbing," says Special Agent Greg Wuthrich. "We definitely need the public's assistance." The pattern of attacks raises serious questions about the glaring vulnerability of critical Internet infrastructure, says JJ Thompson. "When it's situations that are scattered all in one geography, that raises the possibility that they are testing out capabilities, response times and impact," says Thompson. "That is a security person's nightmare."

Mark Peterson, a spokesman for Internet provider Wave Broadband, says an unspecified number of Sacramento-area customers were knocked offline by the latest attack. Peterson characterized the Tuesday attack as "coordinated" and said the company was working with Level 3 and Zayo to restore service. It’s possible the vandals were dressed as telecommunications workers to avoid arousing suspicion, say FBI officials. Backup systems help cushion consumers from the worst of the attacks, meaning people may notice slower email or videos not playing, but may not have service completely disrupted. But repairs are costly and penalties are not stiff enough to deter would-be vandals. "There are flags and signs indicating to somebody who wants to do damage: This is where it is folks," says Richard Doherty. "It's a terrible social crime that affects thousands and millions of people."

Submission + - Federal wiretaps down slightly, encryption impact decreases (networkworld.com)

coondoggie writes: According to the 2014 Wiretap Report, released today by the Administrative Office of the United States Courts a total of a total of 3,554 wiretaps were reported as authorized, with 1,279 authorized by federal judges and 2,275 authorized by state judges. Compared to the applications approved during 2013, the number approved by federal judges decreased 13% in 2014 and the number approved by state judges increased 8%. One state wiretap application was denied in 2014, the report stated.

Submission + - Open Source History: What We've Learned So Far (thevarguy.com)

An anonymous reader writes: The history of open source is long and storied, and fascinating enough to be a book. Which is what The VAR Guy contributing editor Christopher Tozzi is doing. And while he's been plugging away at his trusty Smith-Corona (not really—he's definitely an open source stalwart), The VAR Guy has been lucky enough to be the recipient of the byproducts of his research.

Submission + - Lithium, Beryllium and Boron are the only three elements not made in stars

StartsWithABang writes: From helium up through uranium continuously, every element in the periodic table can be found, created by natural processes, somewhere in the Universe. (With many trans-uranic nuclides found as well.) Yet out of all of those, only three of them aren't created in stars: lithium, beryllium and boron. Boron in particular is necessary for life as we know it, as without it, there would be no such things as plants. Here's the cosmic story of the only three heavy elements to exist that aren't made in stars.

Submission + - Hundreds of Dark Web mirror sites 'booby-trapping' Tor users (thestack.com)

An anonymous reader writes: Tor users are being warned about hundreds of fake and booby-trapped .onion websites after the founder of Dark Web search engine ahmia.fi noticed a clone of his own site online. Juha Nurmi, who operates an open source .onion search engine, found over two hundred fake replicas of Dark Web pages, including the popular Tor version of DuckDuckGo. In a Tor-Talk post [https://lists.torproject.org/pipermail/tor-talk/2015-June/038295.html] he suggests that there are several copies of the targeted websites, each with similar addresses. Unlike on the traditional World Wide Web, unindexed Tor pages are typically located through directories rather than across search engines and often have complicated URLs – thus making it easier for fake addresses to go unnoticed. Nurmi added that the fake sites are working as transparent proxies to the real pages, allowing hackers to launch attacks against their targets.
 

Education

Struggling University of Phoenix Lays Off 900 133

An anonymous reader writes: The struggles facing for-profit colleges continue. The University of Phoenix announced poor quarterly earnings yesterday, and the institution has laid off 900 workers since September. Enrollment is down 14% since last year, and the CEO of its parent company, Apollo Education Group, says enrollment is likely to drop from 206,000 to about 150,000 next year. Apollo's stock has lost more than half its value since the beginning of the year. "Tighter regulations on for-profits and the Obama administration's push to make community college free top the list of headwinds. And non-profit universities have entered the online education space, where for-profit schools once held center stage."
Security

Amazon's New SSL/TLS Implementation In 6,000 Lines of Code 107

bmearns writes: Amazon has announced a new library called "s2n," an open source implementation of SSL/TLS, the cryptographic security protocols behind HTTPS, SSH, SFTP, secure SMTP, and many others. Weighing in at about 6k lines of code, it's just a little more than 1% the size of OpenSSL, which is really good news in terms of security auditing and testing. OpenSSL isn't going away, and Amazon has made clear that they will continue to support it. Notably, s2n does not provide all the additional cryptographic functions that OpenSSL provides in libcrypto, it only provides the SSL/TLS functions. Further more, it implements a relatively small subset of SSL/TLS features compared to OpenSSL.
Earth

Ask Slashdot: What To Do With Empty Toner Cartridges? 189

New submitter MoarSauce123 writes: Over time I accumulated a number of empty toner cartridges for a Brother laser printer. Initially, I wanted to take a local office supply chain store up on their offer to give me store credit for the returned cartridge. For that credit to be issued I would have to sign up for their store card providing a bunch of personal information. The credit is so lousy that after the deduction from the sales price of a new toner cartridge the price is still much higher than from a large online retailer. And the credit only applies to one new cartridge, so I cannot keep collecting the credit and then get a cartridge 'for free' at some point.

I also looked into a local store of a toner refill chain. Their prices are a bit better, but the closest store is about half an hour away with rather odd business hours. Still, at the end they charge more than the large online retailer asks for a brand new cartridge. For now I bring the empty cartridges to the big office supply store and tell them that I do not want their dumb store credit. I rather have big corp make some bucks on me than throw these things in the trash and have it go to a landfill. Are there any better options? Anything from donating it to charity to refilling myself is of interest.

Submission + - Test Pilot Admits the F-35 Can't Dogfight (medium.com)

schwit1 writes: A test pilot has some very, very bad news about the F-35 Joint Strike Fighter. The pricey new stealth jet can't turn or climb fast enough to hit an enemy plane during a dogfight or to dodge the enemy's own gunfire, the pilot reported following a day of mock air battles back in January.

And to add insult to injury, the JSF flier discovered he couldn't even comfortably move his head inside the radar-evading jet's cramped cockpit. "The helmet was too large for the space inside the canopy to adequately see behind the aircraft." That allowed the F-16 to sneak up on him.

The test pilot's report is the latest evidence of fundamental problems with the design of the F-35 — which, at a total program cost of more than a trillion dollars, is history's most expensive weapon.

Your tax dollars at work.

Slashdot Top Deals

Lots of folks confuse bad management with destiny. -- Frank Hubbard

Working...