In late 2011, defense contractor Stratfor suffered a cybersecurity breach that resulted in a leak of millions of internal emails. A few months later, the FBI arrested hacktivist Jeremy Hammond and several others for actions related to the breach. Hammond pleaded guilty to one count of violating the CFAA, and today his sentence was handed down: 10 years in prison followed by three years of supervised release. He said, [The prosecutors] have made it clear they are trying to send a message to others who come after me. A lot of it is because they got slapped around, they were embarrassed by Anonymous and they feel that they need to save face." Reader DavidGilbert99 adds, "Former LulzSec and Anonymous member Jake Davis argues that U.S. lawmakers need to take a leaf out of the U.K.'s legal system and not put Jeremy Hammond behind bars for his part in the hack of Stratfor. 'Jeremy Hammond has a lot to give society too. Prisons are for dangerous people that need to be segmented from the general population. Hackers are not dangerous, they are misunderstood, and while disciplinary action is of course necessary, there is nothing disciplined about locking the door on a young man's life for 10 years.'"
Layzej writes "A new paper shows that global temperature rise of the past 15 years has been greatly underestimated. The reason is that the weather station network covers only about 85% of the planet. Satellite data shows that the parts of the Earth that are not covered by the surface station network, especially the Arctic, have warmed exceptionally fast over the last 15 years. Most temperature reconstructions simply omit any region not covered. A temperature reconstruction developed by NASA somewhat addresses the gaps by filling in missing data using temperatures from the nearest available observations. Now Kevin Cowtan (University of York) and Robert Way (University of Ottawa) have developed a new method to fill the data gaps using satellite data. The researchers describe their methods and findings in this YouTube video. 'The most important part of our work was testing the skill of each of these approaches in reconstructing unobserved temperatures. To do this we took the observed data and further reduced the coverage by setting aside some of the observations. We then reconstructed the global temperatures using each method in turn. Finally, we compared the reconstructed temperatures to the observed temperatures where they are available... While infilling works well over the oceans, the hybrid model works particularly well at restoring temperatures in the vicinity of the unobserved regions.' The authors note that 'While short term trends are generally treated with a suitable level of caution by specialists in the field, they feature significantly in the public discourse on climate change.'"
NewYorkCountryLawyer writes "In a case of major importance, the long simmering battle between the Authors Guild and Google has reached its climax, with the court granting Google's motion for summary judgment, dismissing the case, on fair use grounds. In his 30-page decision (PDF), Judge Denny Chin — who has been a District Court Judge throughout most of the life of the case but is now a Circuit Court Judge — reasoned that, although Google's own motive for its "Library Project" (which scans books from libraries without the copyright owners' permission and makes the material publicly available for search), is commercial profit, the project itself serves significant educational purposes, and actually enhances, rather than detracts from, the value of the works, since it helps promote sales of the works. Judge Chin also felt that it was impossible to use Google's scanned material, either for making full copies, or for reading the books, so that it did not compete with the books themselves."
mahiskali writes with this interesting news via the EFF's Deep Links "The new Renault Zoe comes with a 'feature' that absolutely nobody wants. Instead of selling consumers a complete car that they can use, repair, and upgrade as they see fit, Renault has opted to lock purchasers into a rental contract with a battery manufacturer and enforce that contract with digital rights management (DRM) restrictions that can remotely prevent the battery from charging at all. This coming on the heels of the recent Trans-Pacific Partnership IP Rights Chapter leak certainly makes you wonder how much of that device (car?) you really own. Perhaps Merriam-Webster can simply change the definition of ownership."
jfruh writes "In America we're celebrating the fact that we don't have to stow our Kindles during takeoff and landing anymore, but the EU is going a step further and not requiring passengers to switch their phones to "airplane" mode anymore. If you're on an airplane with a Network Control Unit that regulate cellular connections, you can text and make calls over standard 3G and 4G networks. You'll want to watch out for roaming charges, though, especially if you're on a flight crossing national borders."
An anonymous reader writes "The Department of Homeland Security (DHS) must disclose its plans for a so-called Internet 'kill switch,' a federal court ruled on Tuesday. The United States District Court for the District of Columbia rejected the agency's arguments that its protocols surrounding an Internet kill switch were exempt from public disclosure and ordered the agency to release the records in 30 days. However, the court left the door open for the agency to appeal the ruling."
An anonymous reader writes news of an attempt to erase a bit of history. From the article: "The Conservative Party have attempted to delete all their speeches and press releases online from the past 10 years, including one in which David Cameron promises to use the Internet to make politicians 'more accountable'. The Tory party have deleted the backlog of speeches from the main website and the Internet Archive — which aims to make a permanent record of websites and their content — between 2000 and May 2010."
sproketboy writes "WikiLeaks releases the secret negotiated draft text for the entire TPP (Trans-Pacific Partnership) Intellectual Property Rights Chapter." The Syndney Morning Herald took a look at the leaked documents, from their article: "An expert in intellectual property law, Matthew Rimmer, said the draft was 'very prescriptive' and strongly reflected U.S. trade objectives and multinational corporate interests 'with little focus on the rights and interests of consumers, let alone broader community interests.'"
An anonymous reader writes "A Chinese Bitcoin exchange has vanished without trace, taking more than $4 million of the virtual currency with it and leaving profit-hungry investors out of pocket. GBL, the Chinese Bitcoin exchange was launched in May 2013 and putatively based in Hong Kong, despite its servers being registered in Beijing. However GBL's Hong Kong offices do not exist. GBL mysteriously disappeared in early November taking an estimated $4.1m (£2.6m) of Bitcoins with it." (Beware the auto-playing ads, with sound.)
Nerval's Lobster writes "The GCHQ agency, Britain's equivalent of the National Security Agency, reportedly used fake LinkedIn and Slashdot pages to load malware onto computers at Belgian telecommunications firm Belgacom. In an emailed statement to Slashdot, the GCHQ's Press and Media Affairs Office wrote: 'We have no comment to make on this particular story.' It added: 'All GCHQ's work is carried out in accordance with a strict legal and policy framework which ensure that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Intelligence and Security Committee.' Meanwhile, LinkedIn's representatives suggested they had no knowledge of the reported hack. 'We have read the same stories, and we want to clarify that we have never cooperated with any government agency,' a spokesperson from the social network wrote in an email to Slashdot, 'nor do we have any knowledge, with regard to these actions, and to date, we have not detected any of the spoofing activity that is being reported.' An IT security expert with extensive knowledge of government intelligence operations, but no direct insight into the GCHQ, hypothesized to Slashdot that carrying out a man-in-the-middle attack was well within the capabilities of British intelligence agencies, but that such a 'retail' operation also seemed somewhat out of character. 'Based on what we know they've done, they are doing industrialized, large scale traffic sweeping and net hacking,' he said. 'They operate a wholesale, with statistical techniques. By "statistical" I mean that they send something that may or may not work.' With that in mind, he added, it's plausible that the GCHQ has software that operates in a similar manner to the NSA's EGOTISTICAL GIRAFFE, and used it to redirect Belgacom employees to a fake download. 'However, the story has been slightly garbaged into it being fake [LinkedIn and Slashdot] accounts, as opposed to network spoofing.'" Update: You can read the official statement from Slashdot's parent company, Dice Holdings, here on our blog.
Hugh Pickens DOT Com writes "As we come up on Veteran's Day, Barrie Barber reports for the Dayton Daily News that the last Doolittle Raiders symbolically said goodbye to a decades-old tradition and to a history that changed the course of the Pacific war in World War II. Gathering from across the country together one last time, three surviving Raiders sipped from silver goblets engraved with their names and filled with 1896 Hennessy cognac in a once-private ceremony webcast to the world at the National Museum of the U.S. Air Force. Robert E. Cole, 98, led the final toast to the 80 members of 'the Greatest Generation' who took off in 16 B-25 Mitchell bombers April 18, 1942, from the deck of the USS Hornet to bomb Japan four months after a Japanese surprise naval and air attack on Pearl Harbor. 'Gentleman, I propose a toast,' said Cole, as about 700 spectators watched one final time, 'to those we lost on the mission and those that passed away since. Thank you very much and may they rest in peace.' Acting Secretary of the Air Force Eric Fanning said the raid showed the courage and innovation of the World War II airmen flying from a carrier in a bomber that had never seen combat to attack a heavily defended nation and to attempt to land at unseen airfields in China in a country occupied by Japanese troops. More than 70 years after the attack, Edward J. Saylor, 93, remembered ditching at sea once he and his crew dropped their bombs and several close calls with being discovered by the Japanese Army while making his way through China. 'This may be the last time I see them together,' said the 92-year-old raider who has attended Raider reunions since 1962. 'It's a little sad for me because I've known them so long and know the story of what they did in 1942.'"
An anonymous reader writes "'We can enormously extend the record; yet even in its present bulk we can hardly consult it' wrote Vannevar Bush in a 1945 Atlantic Monthly article. Nearly 70 years later, academics are still wrapping research in inaccessible journal articles. Might they be doing it wrong?"
An anonymous reader writes "The Stranger reports that Seattle's police department has installed a Wi-Fi mesh network paid for by the Department of Homeland Security. FTA: 'The SPD declined to answer more than a dozen questions from The Stranger, including whether the network is operational, who has access to its data, what it might be used for, and whether the SPD has used it (or intends to use it) to geo-locate people's devices via their MAC addresses or other identifiers.'"
First time accepted submitter binarstu writes "The New York Times reports that 'The C.I.A. is paying AT&T more than $10 million a year to assist with overseas counterterrorism investigations by exploiting the company's vast database of phone records, which includes Americans' international calls, according to government officials. The cooperation is conducted under a voluntary contract, not under subpoenas or court orders compelling the company to participate, according to the officials.'"
cold fjord writes "Business Insider reports, Google is beta-testing a program that tracks users' purchasing habits by registering brick-and-mortar store visits via smartphones, according to a report from Digiday. Google can access user data via Android apps or their Apple iOS apps, like Google search, Gmail, Chrome, or Google Maps. If a customer is using these apps while he shops or has them still running in the background, Google's new program pinpoints the origin of the user data and determines if the customer is in a place of business."