Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Not enough, (Score 1) 415

The argument against this is that, to be guilty, one must have committed a crime. While Turing did break a law, breaking laws doesn't and shouldn't equate with committing crimes. People break laws all the time doing things that should not be considered a crime. There are all sorts of mitigating factors, including the mental state of the individual breaking the law and the justness of the law itself.

Imagine that you see a disoriented, elderly person in the street with a large truck inbound. You can break the law and save the elderly person by not making use of a cross walk, or you could let the elderly person get hit by a truck. What are you going to do? Probably save the person. Should you receive a ticket from the officer far enough away to see what happened but not to save the person himself? No, of course not. Despite the fact that you broke the law by not using a cross walk, you didn't commit any crime.

Submission + - Alan Turing Pardoned. (cnn.com)

guibaby writes: Alan Turing, a British code-breaker during World War II who was later subjected to chemical castration for homosexual activity, has received a royal pardon nearly 60 years after he committed suicide.

Comment Re:As an American (Score 1) 248

I think it's important to remember that, in order for this movement to be successful, the entire surveillance apparatus needs to be dismantled - not just the US component of it. The US is a terrible offender when it comes to mass surveillance, but the UK is just as bad. If we also don't restrict the actions of the GCHQ and other entities, it would be pretty easy for the US to farm the intelligence work out to foreign countries by making sure that all communications are being routed overseas. It's easy to imagine a deal where the US and UK only collect metadata about foreign communications (which include UK communications rerouted through the US to make them foreign and US communications rerouted through the UK) with the intent of sharing that data in an intelligence partnership.

So... why am I not rioting? Well, I live in the middle of no where and there aren't enough of us TO riot. If I could have attended the anti-NSA protests in Washington, I would have... and I think this is a general problem with US protests. Our country is too large for large protests to be easy from a logistical prospective and the current protest movement hasn't addressed the logistics in the same way that former protest movements have.

Beyond that, I also think that the system fundamentally works. Call me crazy - and there are plenty that do - but I believe that voters still have the power to cause change. I can vote for leaders that will restrict the NSA's actions. Unfortunately, believing in the system means that there isn't much I can do when it comes to restricting the actions of the GCHQ. The best I can do is not give the UK my tourism, despite a life long dream of visiting London.

Comment Re:And they wonder why... (Score 1) 562

Well, there's a couple of technical problems with that. While I'm certainly not a lawyer, I have informally discussed the issue with a friend of mine that is a lawyer. He raised a few of the following points, which I've supplemented.

First, it's not clear that this is actually theft. The crime of theft typically denies the owner of the property access to the property, which isn't the case with electronic documents. Rather, it's more likely to be a violation of the No Electronic Theft (NET) act. NET criminalizes copyright infringement. This may not be a bad approach given what kind of punishments one sees for copyright infringement Massachusetts. More often, the punishment for copyright infringement is fines and I think the prosecutor was looking for jail time.

As far as breaking and entering goes, that seems doubtful. The networking closet he accessed was unlocked. In fact, a homeless man used the area to store belongings. Again, I'm not a lawyer, but it seems to me that breaking and entering would be difficult to argue. Trespassing might be a more successful charge. Trespassing, though, is a relatively minor offense that's unlikely to produce a lengthy jail sentence.

Submission + - FCC Chair: it's Ok to Discriminate Traffic 2

sl4shd0rk writes: Remember when the ex-cable lobbyist Tom Wheeler was appointed to the FCC chair back in may of 2013? Turns out he's currently gunning for Internet Service Providers to be able to "favor some traffic over other traffic". A dangerous precedent considering the Open Internet Order in 2010 forbid such action if it fell under unreasonable discrimination. The bendy interpretation of the 2010 order is apparently aimed somewhat at Netflix as Wheeler stated: "Netflix might say, 'I'll pay in order to make sure that my subscriber might receive the best possible transmission of this movie.'"

Comment Re:And they wonder why... (Score 5, Interesting) 562

I wonder how long it will be before a company attempts to make a DoS case against someone for visiting a site once. I could see the prosecutor in the Aaron Swartz case trying this. He was conducting a denial of service attack simply by visiting the download site for those academic journal articles. It just wasn't a very good DoS attack.

Comment Re:Fuck off (Score 1) 337

That's definitely fair response.

First: While he may have some assaults on his record, he wasn't arrested for doing some kind of violent hacking. In fact, with the exception of the insulin and pacemaker hacks, it's hard to see what a violent hack would actually be.

Second: He actually did uncover some government wrongdoing.

Third: I agree that a second offense should be punished more harshly. That being said, 10 years is way too harsh even for a second offense. His first sentence was also too harsh. You don't see these kinds of punishments for other white collar crimes, do you?

Comment Re:Fuck off (Score 3, Insightful) 337

You might want to read my post a little more carefully. I realize that it's easy to skip over the first sentence, where I stated that "I don't see anyone saying that hackers aren't criminals or that Jeremy Hammond doesn't deserve to go to prison."

The claim that I was making was that the prison sentence was excessive (probably because the Judge's husband was a victim of the crime). Somewhere in the 2-4 year range would probably make more sense.

Comment Re:Fuck off (Score 5, Insightful) 337

I don't see anyone saying that hackers aren't criminals or that Jeremy Hammond didn't deserve to go to prison. What they're saying is that criminals and dangerous people are sets that overlap, but that don't totally overlap. Or, another way to put it: Criminals aren't dangerous. Dangerous criminals are dangerous. Some hackers might be dangerous. Some hackers might not be dangerous. For hackers that are dangerous, 10 years in prison might be appropriate. For hackers that aren't dangerous, like those engaged in political protest, 10 years in prison is overkill.

Submission + - Court: Homeland Security Must Disclose 'Internet Kill Switch' (freebeacon.com)

An anonymous reader writes: The Department of Homeland Security (DHS) must disclose its plans for a so-called Internet “kill switch,” a federal court ruled on Tuesday.

The United States District Court for the District of Columbia rejected the agency’s arguments that its protocols surrounding an Internet kill switch were exempt from public disclosure and ordered the agency to release the records in 30 days. However, the court left the door open for the agency to appeal the ruling.

Submission + - Google Executive To Congress: Government Surveillance Undermines Freedom (reuters.com)

aeranvar writes: Richard Saldago, a Google executive, testified yesterday in a hearing before the Privacy, Technology and the Law Subcommittee of the Senate Judiciary Committee. His testimony, in short, stated that that widespread government surveillance "undermines the freedom and the trust most citizens cherish". This is the first testimony provided to Congress by a major technology company since Snowden's leaks in June. The testimony was specifically mentioned the possibility that government surveillance could cause the development of a splinter 'net, which likely referred to Brazil's plan to reduce the United States' influence on the internet. Additionally, Saldago later told Reuters that there is concern over the growing lack of trust in US cloud service providers. "This is a very real business issue, but it is also a very real issue for the people who are considering using the cloud and for those who currently use the cloud and may have their trust in it rocked by the disclosures."

Submission + - Senate Debates Surveillance Transparency Act, NSA Spying (threatpost.com)

Gunkerty Jeb writes: In a Senate hearing debating the NSA's contentious surveillance programs and a proposed bill that would impose more transparency onto those practices, Sen. Patrick Leahy of (D-Vt.) asked Google's director for law enforcement and information security matters, Richard Salgado, if government imposed gag orders on requests for user data were making the country safer. Salgado answered that he did not believe that his inability answer questions about data requests had any impact on national security.

In addition, the general counsel for the Director of National Intelligence claimed enumerating the exact number of U.S. citizens monitored under NSA surveillance programs would be too difficult and resource-intensive.

The general consensus of those not advocating for the NSA was that the bill introduced by Sen. Al Franken (D-Mich.) would be a great step forward, but that transparency alone would not undo the damages done to U.S. companies and its government by PRISM and other similar surveillance programs. Nor, they seemed to agree, would the addition of transparency make the NSA’s programs lawful or constitutional.

Slashdot Top Deals

UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker

Working...