Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 5 declined, 4 accepted (9 total, 44.44% accepted)

Submission + - TPP Change Means Drastically Higher Penalties for Copyright "Infringement" (eff.org)

Mephistophocles writes: A sneaky and underhanded change to the TPP, spotted by the EFF and summarized here by Jeremy Malcom, means much stiffer penalties for copyright "infrigement:"

Under the TPP's original terms, a country could limit the exposure of the owner of such a website to prison time, or to the seizure and possible destruction of their server, on the grounds that by definition their infringement didn't cause any lost sales to the copyright owner. (Note that they would be liable for civil damages to the copyright owner in any case.)

Although a country still has the option to limit criminal penalties to “commercial scale” infringements (which is so broadly defined that it could catch even a non-profit subtitles website), the new language compels TPP signatories to make these penalties available even where those infringements cause absolutely no impact on the copyright holder's ability to profit from the work. This is a massive extension of the provision's already expansive scope.

Perhaps most concerning, however, is the fact that this means those stiff penalties apply even when there is no harm or threat of harm to the copyright owner caused by the infringement.

Think about it. What sense is there in sending someone to jail for an infringement that causes no harm to the copyright holder, whether they complain about it or not? And why should it matter that the copyright holder complains about something that didn't affect them anyway? Surely, if the copyright holder suffers no harm, then a country ought to be able to suspend the whole gamut of criminal procedures and penalties, not only the availability of ex officio action.

This is no error—or if it is, then the parties were only in error in agreeing to a proposal that was complete nonsense to begin with.


Security

Submission + - Israel Infrastructure Proves Too Strong For Anonymous (timesofisrael.com) 1

Mephistophocles writes: Ever since the beginning of Operation Pillar of Defense, hackers have been working overtime to strike a blow against the Israeli government’s computer systems, Finance Minister Yuval Steinitz said Sunday. No fewer than 44 million attacks have been recorded since the operation began five days ago — with nearly all of them failing, thanks to the recent strengthening of computer defense systems in Israel.

Speaking at a special press conference at the Government Computing Center in Jerusalem about the cyber war against Israel that has accompanied Hamas’s rocket attacks, Steinitz said that hackers “are trying to disable the symbols of Israeli sovereignty, to enter web sites and install anti-Israel content, thus compromising information and data and damaging the government’s ability to serve the public.” Most of the attacks, he said, were against government sites, like the Prime Minister’s Office site, and security-related sites, such as that of the Home Front Command, the body charged with informing Israelis on how to protect themselves in the event of an attack.

Out of those 44 million-plus attacks on government and defense related sites, said Steinitz, only one succeeded – partially. One site, which he did not name, was “wobbly for a few minutes,” but quickly recovered. Even though the government has been successful in warding off hack attacks, Steinitz said that government sites were fully backed up and mirrored, meaning that they could be replaced by a duplicate site instantly if the original site were compromised.

Security

Submission + - Cyberespionage For Everyone (darkreading.com)

Mephistophocles writes: A chilling article by Darkreading's Kelly Jackson Higgins describes how the growing accessibility of hacking tools like RAT's (Remote Access Trojans) have made cyber-espionage possible for more than just those financially backed by large nation-states, and speculates on what the implications of this may be:

"Researchers at Norman Security today revealed that they recently analyzed malware used in phishing emails targeting Israeli and Palestinian targets and found that attackers used malware based on the widely available Xtreme RAT crimeware kit. The attacks, which first hit Palestinian targets, this year began going after Israeli targets, including Israeli law enforcement agencies and embassies around the world. Norman says the same attacker is behind the attacks because the attacks use the same command-and-control (C&C) infrastructure, as well as the same phony digital certificates.

This attack campaign just scratches the surface of the breadth and spread of these types of attacks around the world as more players have been turning to cyberspying. "We're just seeing the tip of the iceberg," says Einar Oftedal, deputy CTO at Norman."

Sony

Submission + - Sony Entertainment Head Steps Down (japantimes.co.jp)

Mephistophocles writes: Japan Times reports today that Sony Entertainment Chief Tim Schaaf has stepped down. Schaaf's division has recently drawn the ire of users and governments alike after multiple hacks which resulted in the theft of millions of users' personal information. Schaaf joined Sony after a stint at Apple, and had ambitious plans for unifying the end-user's entertainment experience on Sony products, as well as having some big words for how to help out Sony's music division. Tim will be replaced by Andrew House, currently of Sony's Game Division.

One wonders — is this a continued sign of deterioration in Sony's Entertainment house?

Slashdot Top Deals

When I left you, I was but the pupil. Now, I am the master. - Darth Vader

Working...