Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Privacy

British Court Rules Against Blogger Anonymity 238

An anonymous reader writes "In a dangerous judgment for British bloggers and whistleblowers, a British court has ruled (absurdly) that because blogging itself is a public activity, bloggers have 'no reasonable expectation of privacy' regarding their identities, and newspapers are allowed to publish their identities if they can find them by fair or foul means. A British police detective who recently won the Orwell Prize for his excellent political writing used his blog to write highly critical accounts of police activities and unethical behavior, making very powerful enemies in the process. A well-funded newspaper with powerful connections quickly heard of his blog and decided it was absolutely vital to expose his identity using an investigative journalist. Like any good newspaper, the blogger anonymized the people and the locations in all the cases he discussed on his blog, but the newspaper alleges these were not sufficiently anonymized and complains that they could work out the identities, though British newspapers don't complain that they are allowed to publish the identities of men who are falsely accused of rape and cleared in court. The newspaper also helpfully contacted the blogger's employer, and his job is now threatened."
Media

Submission + - British court rules against whistleblower bloggers (timesonline.co.uk)

An anonymous reader writes: In a dangerous judgment for British bloggers and whistleblowers, a British court has ruled absurdly that simply because blogging itself is a public activity, bloggers have "no reasonable expectation of privacy" regarding their identities, and newspapers are allowed to publish their identities if they can find them by fair or foul means. A British police detective who recently won the Orwell Prize for his excellent political writing used his blog to write highly critical accounts of police activities and unethical behavior, making very powerful enemies in the process. A well-funded newspaper with powerful connections quickly heard of his blog and decided it was absolutely vital to expose his identity using an investigative journalist. Like any good newspaper, the blogger anonymized the people and the locations in all the cases he discussed on his blog, but the newspaper alleges these were not sufficiently anonymized and complains that they could work out the identities, though British newspapers don't complain that they are allowed to publish the identities of men who are falsely accused of rape and cleared in court. The newspaper also helpfully contacted the blogger's employer, and his job is now threatened.
Security

Submission + - Social Networking Sites in the Crosshairs?

An anonymous reader writes: From Technewsworld: Social engineering tactics — scams that depend on user-interaction to execute an attack against them — rose dramatically in 2006. "Social networking sites are goldmines of information, and a social engineers dream. You don't even have to go dumpster diving anymore," Chris Boyd, director of malware research for FaceTime Security Labs said. "The payoff is almost always financial — even if they're stealing login data, they're only doing it to spam Web sites that install adware, such as the recent MySpace worm," Boyd explained. "The impact on these sites can be gigantic. For example, the only real safeguard against the MySpace worm attack was to not use the service. You can't get a bigger impact than that.
United States

Submission + - Bush claims mail can be opened without warrant

don_combatant writes: "President Bush is claiming new powers to search US Mail without a warrant as a result of the postal overhaul bill he signed into law on December 20th.

http://seattletimes.nwsource.com/html/nationworld/ 2003508676_mail04.html

According to white house spokeswoman Emily Lawrimore "In certain circumstances — such as with the proverbial 'ticking bomb' — the Constitution does not require warrants for reasonable searches."

Really? I guess we view warrantless search of US mail "reasonable" now?

"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." Amendment 4, US Constitution."
Biotech

Submission + - Patent-free interferon produced by UK Researchers

vorlich writes: The BBC http://news.bbc.co.uk/2/hi/health/6224601.stm has reported that the London School of Pharmacy has produced version of interferon- used to treat hepatitis C — that has the same therapeutic use as commercially patented interferon owned by Roche. Professor Sunil Shaunak is quoted as saying that medical academics can choose either to make large sums of money from their ideas or to provide affordable medicines for the global community.
Privacy

Submission + - Cameras Help Cops Capture Cold-blooded Killer

CrazedWalrus writes: Philadelphia police recently captured a serial killer using a combination of Homeland Security and private surveillance cameras. Police pieced together relevant video from twelve different cameras, and eventually were able to identify the murderer. Once caught, he confessed to several other murders spanning the past eight years. Without these cameras, this killer would probably be lurking the streets of Philadelphia today. With results like that, is there really a good basis for argument against these cameras?
Linux Business

Submission + - Tamil Nadu (India) may shut door on Microsoft

aprasadh writes: "Government of Tamil Nadu(a state in India) has started initiatives to fully convert their IT systems of all of their departments to OSS based software. A news item appeared recently in Deccan chronicle, an English Daily. A copy of the news item can be retrieved from this link. Mr. Umashankar, managing director of ELCOT(procurement,consulting and training agency for the Government of Tamil Nadu for the procurement and supply of the IT and IT related products) describes us about how he dealt with Microsoft executives and also about the reasons why he has chosen OSS."
Communications

Submission + - Starbucks Responds in Kind to Oxfam YouTube Video

Kligmond writes: "Last week, Starbucks placed a video on YouTube responding to a video posted by the Oxfam Charity. The Oxfam video was launched in conjunction with "Starbucks Day of Action" held December 16th, when activists visited Starbucks across the world in protest of the coffee retailer's alleged mistreatment of Ethiopian farmers.

The Starbucks video calmly addresses the Oxfam allegations, citing an impasse over Ethiopian trademark legalities. Starbucks claims the refusal to sign a trademark agreement with Ethiopia is a stumbling block they hope to resolve on behalf of the farmers. The coffee chain's representative goes on to refute the contention that Starbucks refuses to pay a fair price for its coffee reserves and in fact, routinely pays well above commodity price.

Unlike many recent ineffectual corporate reactions to social journalism and networking eruptions, Starbucks is unique in that the corporation managed Oxfam's unconventional assault in a very unconventional way, via YouTube. Regardless of the outcome of this particular incident, the move on Starbuck's part comes off as unmistakably in touch with today's communication modes and methods."
Space

Submission + - French Space Agency's UFO Archive To Go Online

Anomalous Cowbird writes: For those who still think 'the truth is out there,' MSNBC reports that the French space agency (and who knew they had one?) is planning to publish their archive of 'UFO sightings and other phenomena' online. The archive reportedly includes some 6,000 reports relating to around 1,600 incidents. Time to brush up on that high school French?
Linux Business

Submission + - Virtual Linux

IndioMan writes: This article explores the ideas behind virtualization and then discusses some of the many ways to implement virtualization. We also look at some of the other virtualization technologies out there, such as operating system virtualization on Linux.

Slashdot Top Deals

Every cloud has a silver lining; you should have sold it, and bought titanium.

Working...