Learn to Build 14 Websites with 28 Hours of Instruction on HTML, JavaScript, MySQL & More for $14 ×
Your Rights Online

Ask Slashdot: Should This Photographer Sue A Hotel For $2M? (google.com) 136

Unhappy Windows User writes: An Austrian photographer was contracted by the luxury [hotel] Sofitel in Vienna to photograph the bar with an amazing view over the skyline. He was paid for his time (4200 euros) and arranged a three-year internal usage contract for the photos. After the contract expired, he still found his photos being used -- on external sites too. He is now suing for 2 million euros, based on each individual usage.

My question is: Is this the real market value of his work...? It seems like the largest economic contribution to the work was from Sofitel, who allowed access to the property and closed it to customers. I don't have any issue in a photographer wanting to be paid fairly for his work, and asking for perhaps double or treble the original price for the breach of contract to match what an unlimited license would have cost. [But] with this money they could have employed a professional for a month and automatically obtained full rights to the work...it seems like this guy is trying to take advantage of an oversight by a large corporation, never to have to work again.

Here's the original article in German and an English translation, and it's one of those rare cases where the copyright belongs to an individual instead of a massive entertainment conglomeration. But do you think the photographer should be suing for 2 million euros over this copyright beach?
Electronic Frontier Foundation

Humble Bundle Announces 'Hacker' Pay-What-You-Want Sale (humblebundle.com) 43

An anonymous reader writes: Humble Bundle announced a special "pay what you want" sale for four ebooks from No Starch Press, with proceeds going to the Electronic Frontier Foundation (or to the charity of your choice). This "hacker edition" sale includes two relatively new titles from 2015 -- "Automate the Boring Stuff with Python" and Violet Blue's "Smart Girl's Guide to Privacy," as well as "Hacking the Xbox: An Introduction to Reverse Engineering" by Andrew "bunnie" Huang, and "The Linux Command Line".

Hackers who are willing to pay "more than the average" -- currently $14.87 -- can also unlock a set of five more books, which includes "The Maker's Guide to the Zombie Apocalypse: Defend Your Base with Simple Circuits, Arduino, and Raspberry Pi". (This level also includes "Bitcoin for the Befuddled" and "Designing BSD Rootkits: An Introduction to Kernel Hacking".) And at the $15 level -- just 13 cents more -- four additional books are unlocked. "Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software" is available at this level, as well as "Hacking: The Art of Exploitation" and "Black Hat Python."

Nice to see they've already sold 28,506 bundles, which are DRM-free and available in PDF, EPUB, and MOBI format. (I still remember Slashdot's 2012 interview with Make magazine's Andrew "bunnie" Huang, who Samzenpus described as "one of the most famous hardware and software hackers in the world.")
Your Rights Online

Language Creation Society Says Klingon Language Isn't Covered By Copyright 156

Reader AmiMoJo writes: Earlier this year Paramount Pictures and CBS Studios filed a lawsuit against the makers of a Star Trek inspired fan film, accusing them of copyright infringement. In their amicus brief, which actually uses Klingon language, the Language Creation Society lists many examples of how Klingon has evolved, and it specifically disputes Paramount's earlier claims that there are no human beings who communicate using the Klingon language. "In fact, there are groups of people for whom Klingon is their only common language. There are friends who only speak Klingon to each other. In fact, at least one child was initially raised as a native speaker of Klingon." As such, Paramount should not be allowed to claim copyright over the entire Klingon language, both in written and spoken form. The language is a tool for people to communicate and express ideas, something people should be allowed to do freely under U.S. law, LCS argues.
Government

Bison To Become First National Mammal Of The US (washingtonpost.com) 149

mdsolar quotes a report from Washington Post: North America used to be teeming with bison. But in one century, their numbers plummeted from tens of millions to just a few dozen in the wild after hunters nearly wiped out the continent's largest mammals. Now, the bison is about to become the first national mammal of the United States. The National Bison Legacy Act, which designates the bison as the official mammal of the United States, passed the House on Tuesday and the Senate on Thursday. The legislation now heads to President Obama's desk to be signed into law. At a time of political gridlock and partisan bickering, lawmakers agree on an official national mammal. The bison, which will join the bald eagle as a national symbol, represents the country's first successful foray into wildlife conservation. Lobbying for the official mammal designation was a coalition of conservationists; ranchers, for whom bison are business; and tribal groups, such as the InterTribal Buffalo Council, which wants to "restore bison to Indian nations in a manner that is compatible with their spiritual and cultural beliefs and practices."
Communications

Wireless Carriers To Adopt New Real-Time Text Protocol By December 2017 (engadget.com) 25

An anonymous reader quotes a report from Engadget: The FCC is ready to adopt a proposal that'll bring a new protocol to wireless networks to help people with disabilities communicate. It's called real-time text (RTT) and will be a replacement for the aging teletypewriter devices that let users transmit text conversations over traditional phone lines. According to the FCC's statement, RTT will "allow Americans who are deaf, hard of hearing, speech disabled or deaf-blind to use the same wireless communications devices as their friends, relatives and colleagues, and more seamlessly integrate into tomorrow's communications networks." The big differentiator for RTT over current, commonly-used text-based messaging systems is that RTT messages are sent immediately as they're typed. The RTT technology will let text users communicate with people on voice-based phones and vice versa; it can also work easily in your standard smartphone, eliminating the need for specialized equipment. The proposal calls for RTT to roll out over wireless networks run by "larger carriers" by December of 2017.
Businesses

US Steel Says China Is Using Cyber Stealth To Steal Its Secrets (npr.org) 95

An anonymous reader writes: U.S. Steel Corp. filed a trade complaint with the International Trade Commission: "The Chinese industry has formed a cartel that sets purchase and sale prices, and controls production and export volumes to target export markets. The Chinese industry has used its government to steal U.S. Steel's closely guarded trade secrets and uses those trade secrets to produce advanced steel products it could not make on its own." The steelmaker based in Pittsburgh argues its Chinese rivals must be investigated and that they will "use every tool available to fight for fair trade." The ITC has 30 days to review the complaint and determine whether or not it's worth investigating. In the meantime, China's Commerce Ministry said the complaints "have no factual basis," urging the ITC to reject U.S. Steel's case. The investigation will likely take a while if the ITC decides to proceed with an investigation, as they'll be dealing with three separate issues: price fixing, false labeling to avoid duties, and theft of trade secrets.
Google

Google Files Patent For Injecting A Device Directly Into Your Eyeball (gizmodo.com) 49

An anonymous reader writes: It's no secret Google and their parent company Alphabet are interested in developing smart contact lenses for monitoring diabetes. Well, Google-parent Alphabet has filed a patent which takes their development to another level. The patent specifically covers a method for "injecting a fluid into a lens capsule of an eye, wherein a natural lens of the eye has been removed from the lens capsule." It's powered by "radio frequency energy" received by a small antenna inside. The gadget even has its own data storage. Forbes reports, it is designed to help the focusing of light onto the retina, resulting in the correction of poor vision. Samsung is one of the most recent companies to receive a patent for smart contact lenses. Their lenses are for experimenting with new methods of delivering augmented reality interfaces and data.
Businesses

Cable Industry Threatens To Sue If FCC Tries To Bring Competition To Cable Set Top Boxes (techdirt.com) 95

An anonymous reader quotes a report from Techdirt: Back in February the FCC voted on a new plan to open up the traditional cable box to competition. According to a fact sheet being circulated by the agency (pdf), under the FCC's plan you'd still pay your cable company for the exact same content, cable operators would simply have to design systems -- using standards and copy protection of their choice -- that delivered this content to third-party hardware. The FCC's goal is cheaper, better hardware and a shift away from the insular gatekeeper model the cable box has long protected. Given this would obliterate a $21 billion captive market in set top box rental fees -- and likely direct consumers to more third-party streaming services -- the cable industry has been engaged in an utterly adorable new hissy fit. And now, the industry is also threatening a lawsuit. Former FCC boss turned top cable lobbyist Michael Powell is arguing that the FCC has once again overstepped its regulatory authority: "An agency of limited jurisdiction has to act properly within that jurisdiction," Powell said, making it abundantly clear the NCTA does not believe the FCC has not done so in this case. He said that the statute empowers the FCC to create competition in navigation devices, not new services. "Every problem does not empower an FCC-directed solution. The agency is not an agency with unbridled plenary power to roam around markets and decide to go fix inconveniences everywhere they find them irrespective of the bounds of their authority."
Iphone

FBI Bought $1M iPhone 5C Hack, But Doesn't Know How It Works (theguardian.com) 73

An anonymous reader writes: The FBI has no idea how the hack used in unlocking the San Bernardino shooter's iPhone 5C works, but it paid a sum less than $1m for the mechanism, according to a report. Reuters, citing several U.S. government sources, note that the government intelligence agency didn't pay a value over $1.3m for purchasing the hack from professional hackers, as previously reported by many outlets. The technique can also be used as many times as needed without further payments, the report adds. The FBI director, James Comey, said last week that the agency paid more to get into the iPhone 5C than he will make in the remaining seven years and four months he has in his job, suggesting the hack cost more than $1.3m, based on his annual salary.
Security

GCHQ Has Disclosed Over 20 Vulnerabilities This Year (vice.com) 29

Joseph Cox, reporting for Motherboard: Earlier this week, it emerged that a section of Government Communications Headquarters (GCHQ), the UK's signal intelligence agency, had disclosed a serious vulnerability in Firefox to Mozilla. Now, GCHQ has said it helped fix nearly two dozen individual vulnerabilities in the past few months, including in highly popular pieces of software like iOS. "So far in 2016 GCHQ/CESG has disclosed more than 20 vulnerabilities across a number of software products," a GCHQ spokesperson told Motherboard in an email. CESG, or the National Technical Authority for Information Assurance, is the information security wing of GCHQ. Those issues include a kernel vulnerability in OS X El Captain v10.11.4, the latest version, that would allow arbitrary code execution, and two in iOS 9.3, one of which would have done largely the same thing, and the other could have let an application launch a denial of service attack.
Piracy

US Calls Switzerland An Internet Piracy Haven (torrentfreak.com) 113

An anonymous reader writes: The Office of the United States Trade Representative has published its annual Special 301 Report calling out other nations for failing to live up to U.S. IP enforcement standards. This year European ally Switzerland has been placed on the Watch List for protecting file-sharers and playing host to many pirate sites. "Generally speaking, Switzerland broadly provides high-levels of IPR protection and enforcement in its territory. Switzerland makes important contributions to promoting such protection and enforcement internationally, including in bilateral and multilateral contexts, which are welcomed by the United States," the USTR writes in its assessment.
AI

Google AI Has Access To 1.6M People's NHS Records (newscientist.com) 49

Hal Hodson, reporting for New Scientist:It's no secret that Google has broad ambitions in healthcare. But a document obtained by New Scientist reveals that the tech giant's collaboration with the UK's National Health Service goes far beyond what has been publicly announced. The document -- a data-sharing agreement between Google-owned artificial intelligence company DeepMind and the Royal Free NHS Trust -- gives the clearest picture yet of what the company is doing and what sensitive data it now has access to. The agreement gives DeepMind access to a wide range of healthcare data on the 1.6 million patients who pass through three London hospitals run by the Royal Free NHS Trust -- Barnet, Chase Farm and the Royal Free -- each year. This will include information about people who are HIV-positive, for instance, as well as details of drug overdoses and abortions. The agreement also includes access to patient data from the last five years. According to their original agreement, Google cannot use the data in any other part of its business.
Government

Supreme Court Gives FBI More Hacking Power (theintercept.com) 173

An anonymous reader cites an article on The Intercept (edited and condensed): The Supreme Court on Thursday approved changes that would make it easier for the FBI to hack into computers, many of them belonging to victims of cybercrime. The changes, which will take immediate effect in December unless Congress adopts competing legislation, would allow the FBI go hunting for anyone browsing the Internet anonymously in the U.S. with a single warrant. Previously, under the federal rules on criminal procedures, a magistrate judge couldn't approve a warrant request to search a computer remotely if the investigator didn't know where the computer was -- because it might be outside his or her jurisdiction. The rule change would allow a magistrate judge to issue a warrant to search or seize an electronic device if the target is using anonymity software like Tor."Unbelievable," said Edward Snowden. "FBI sneaks radical expansion of power through courts, avoiding public debate." Ahmed Ghappour, a visiting professor at University of California Hastings Law School, has described it as "possibly the broadest expansion of extraterritorial surveillance power since the FBI's inception."
Communications

The Critical Hole At the Heart Of Our Cell Phone Networks (wired.com) 30

An anonymous reader writes: Kim Zetter from WIRED writes an intriguing report about a vulnerability at the heart of our cell phone networks. It centers around Signaling System No. 7 (SS7), which refers to a data network -- and the protocols or rules that govern how information gets exchanged over it. Zetter writes, "It was designed in the 1970s to track and connect landline calls across different carrier networks, but is now commonly used to calculate cellular billing and send text messages, in addition to routing mobile and landline calls between carriers and regional switching centers. SS7 is part of the telecommunications backbone but is not the network your voice calls go through; it's a separate administrative network with a different function." According to WIRED, the problem is that SS7 is based on trust -- any request a telecom receives is considered legitimate. In addition to telecoms, government agencies, commercial companies and criminal groups can gain access to the network. Most attacks can be defended with readily available technologies, but more involved attacks take longer to defend against. T-Mobile and ATT have vulnerabilities with fixes that have yet to be implemented for example.
Advertising

In Internet Age, Pirate Radio Arises As Surprising Challenge (ap.org) 143

K7DAN writes: Just as the demise of terrestrial radio has been greatly exaggerated, so has the assumed parallel death of pirate radio. Due to the failure of licensed stations to meet the needs of many niche communities, pirate radio continues to increase in popularity. Helping facilitate this growth is the weakening power of the FCC to stop it, reports the Associated Press. Rogue stations can cover up to several square miles thanks largely in part to cheaper technology. The appeal? "The DJs sound like you and they talk about things that you're interested in," said Jay Blessed, an online DJ who has listened to various unlicensed stations since she moved from Trinidad to Brooklyn more than a decade ago. "You call them up and say, 'I want to hear this song,' and they play it for you," Blessed said. "It's interactive. It's engaging. It's communal." It's upsetting many congressional members who are urging the FCC to do more about the "unprecedented growth of pirate radio operations." They're accusing said pirates of undermining licensed minority stations while ignoring consumer protection laws that guard against indecency and false advertising.
The Internet

Dissension Grows Inside Anonymous Because Of Political Propaganda (softpedia.com) 129

An anonymous reader writes from a report on Softpedia: Political tensions relating to the U.S. presidential race are creating turmoil inside the Anonymous hacker collective, muddling waters even more in a group that's known for its lack of leadership and a common goal. The most recent Anonymous infighting relates to the actions of the group's most famous news portal known as AnonHQ, who's been showing downright public support for Bernie Sanders, while being extremely busy at bashing Trump, Cruz, and more recently issuing video threats against Clinton. Ever since Anonymous' official news source has started showing public support for Sanders, many of the group's divisions have publicly disavowed it and have even gone so far as launching constant waves of DDoS attacks at what once used to be the hacker's official news portal. Last month, when a former Anonymous member decided to dox himself, he said in interviews that the group had been infiltrated by government agents.
Encryption

Top Security Experts Say Anti-Encryption Bill Authors Are 'Woefully Ignorant' (dailydot.com) 89

blottsie writes from a report on the Daily Dot: In a Wall Street Journal editorial titled "Encryption Without Tears," Sens. Richard Burr and Dianne Feinstein pushed back on widespread condemnation of their Compliance with Court Orders Act, which would require tech companies to provide authorities with user data in an "intelligible" format if served with a warrant. But security experts Bruce Schneir, Matthew Green, and others say the lawmakers entirely misunderstand the issue. "On a weekly basis we see gigabytes of that information dumped to the Internet," Green told the Daily Dot. "This is the whole problem that encryption is intended to solve." He added: "You can't hold out the current flaws in the Internet as a justification for why the Internet shouldn't be made secure." "These criticisms of Burr and Feinstein's analogy emphasize an important point about digital security: The differences between the levels of encryption protecting certain types of data -- purchase records on Amazon's servers versus photos on an iPhone, for example -- lead to different levels of risk," writes Eric Geller of the Daily Dot.
The Military

North Korea Launches Two Midrange Missiles, Both Tests Fail (cnn.com) 69

An anonymous reader writes: According to South Korean Defense Ministry officials, North Korea fired two midrange Musudan missiles Thursday, and both missiles appear to have failed. The military cannot confirm exactly when the missile exploded but said it "crashed shortly after it was launched," a Defense Ministry official said. U.S. military officials said the missiles traveled an estimated 200 meters from the launchpad. This past weekend, North Korea launched a ballistic missile from a submarine off the east cost of the Korean peninsula. It only traveled about 30 km, well short of the 300 km range that would be considered a successful test. A little more than a week prior to that launch, North Korea failed to launch an intermediate-range missile on the 104th anniversary of the birthday of the country's 'eternal president,' Kim II Sung.
Security

Cisco Finds Backdoor Installed On 12 Million PCs (securityweek.com) 67

Reader wiredmikey writes: Security researchers at Cisco have come across a piece of software that installed backdoors on 12 million computers around the world. Researchers determined that the application, installed with administrator rights, was capable not only of downloading and installing other tools, such as a known scareware called System Healer, but also of harvesting personal information. The software, which exhibits adware and spyware capabilities, was developed by a French online advertising company called Tuto4PC. The "features" have led Cisco Talos to classify the Tuto4PC software as a "full backdoor capable of a multitude of undesirable functions on the victim machine." Tuto4PC said its network consisted of nearly 12 million PCs in 2014, which could explain why Cisco's systems detected the backdoor on 12 million devices. An analysis of a sample set revealed infections in the United States, Australia, Japan, Spain, the UK, France and New Zealand.Tuto4PC has received flak from many over the years, including French regulators.
Bug

American Samoa Domain Registry Was Exposing Client Data Since the Mid-1990s (softpedia.com) 17

An anonymous reader quotes a report from Softpedia: A British security researcher that goes online only by the name of InfoSec Guy revealed today that American Samoa domain registry ASNIC was using an outdated domain name management system that contained a bug allowing anyone to view the personal details of any .as domain owner. The researcher also claims that anyone knowing of this bug would have been able to edit and delete any .as domain, just by altering the ASNIC domain info URL. Some of the big brands that own .as domains include Opera, Flickr, Twitter, McDonald's, British Gas, Bose, Adidas, the University of Texas, and many link shortening services. This flawed system has been online since the mid-1990s. The researcher contacted ASNIC after discovering the flaw at the end of January 2016, but email exchanges with the domain registry were scarce and confusing, with the registry issuing a statement today denying the incident and calling the allegations "inaccurate, misleading and sexed-up to the max," after previously acknowledging and fixing the security flaws.

Slashdot Top Deals