Forgot your password?
typodupeerror
The Internet

Is Cyberwarfare Fiction? 205

An anonymous reader writes "In response to calls by Russia and the UN for a 'cyberwarfare arms limitation treaty,' this article explains that 'cyberwar' and 'cyberweapons' are fiction. The conflicts between nation states in cyberspace are nothing like warfare, and the tools hackers use are nothing like weapons. Putting 'cyber' in front of something is just a way for people to grasp technical concepts. The analogies quickly break down, and are useless when taken too far (such as a 'cyber disarmament treaty').'"
Censorship

Filter Vendor Agrees Aussie Censorship Can't Work As Promised 143

Acidspew writes "The Australian Government's plan to filter the Internet has caused furore and has been met with vehement objection. Many people have put their opinions forward regarding this matter, but this time around, M86 Security — the vendor that provided many ISPs equipment during the initial filter trials — has finally weighed in on the discussion. Six of the nine ISP participants in the URL-based Internet filter trial last year used M86's R3000 filtering kit. According to ARN: 'Internet filtering won't prevent people deliberately looking for inappropriate material from accessing blocked content, according to security vendor M86 Security.' The company continues by saying its filter gear was designed to be implemented into schools and enterprise businesses, not for an entire country. The article also touches on M86's views on censorship."
Privacy

PA School Spied On Students Via School-Issued Laptop Webcams 941

jargon82 writes "A Pennsylvania high school is using laptops they issued to students to spy on them in homes and outside of school. According to a class action filling the webcams and microphones in these laptops could be remotely activated by school officials, and have been used in this role. One student was accused of 'improper behavior in his home' and the school provided a photo taken via his laptop as proof."
Microsoft

Anti-Piracy Windows 7 Update Phones Home Quarterly 819

Lauren Weinstein sends in news of a major and disturbing Microsoft anti-piracy initiative called Windows Activation Technologies, or WAT. Here is Microsoft's blog post giving their perspective on what WAT is for. From Lauren's blog: "The release of Windows 7 'Update for Microsoft Windows (KB71033)' will change the current activation and anti-piracy behavior of Windows 7 by triggering automatic 'phone home' operations over the Internet to Microsoft servers, typically for now at intervals of around 90 days. ... These automatic queries will repeatedly — apparently for as long as Windows is installed — validate your Windows 7 system against Microsoft's latest database of pirated system signatures (currently including more than 70 activation exploits known to Microsoft). If your system matches — again even if up to that time (which could be months or even years since you obtained the system) it had been declared to be genuine — then your system will be 'downgraded' to 'non-genuine' status until you take steps to obtain what Microsoft considers to be an authentic, validated, Windows 7 license. ... KB971033... is scheduled to deploy to the manual downloading 'Genuine Microsoft Software' site on February 16, and start pushing out automatically through the Windows Update environment on February 23. ... [F]or Microsoft to assert that they have the right to treat ordinary PC-using consumers in this manner — declaring their systems to be non-genuine and downgrading them at any time — is rather staggering." Update: 02/12 02:08 GMT by KD : Corrected the Microsoft Knowledge Base number to include a leading 9 that had been omitted in the pre-announcement, per L. Weinstein.
Image

Subversive Groups Must Now Register In South Carolina 849

Hugh Pickens writes "The Raw Story reports that terrorists who want to overthrow the United States government must now register with South Carolina's Secretary of State and declare their intentions — or face a $25,000 fine and up to 10 years in prison. The 'Subversive Activities Registration Act' passed last year in South Carolina and now officially on the books states that 'every member of a subversive organization, or an organization subject to foreign control, every foreign agent and every person who advocates, teaches, advises or practices the duty, necessity or propriety of controlling, conducting, seizing or overthrowing the government of the United States ... shall register with the Secretary of State.'"
The Courts

Once Again, US DoJ Opposes Google Book Search 218

angry tapir and several other readers passed along the news that the US Department of Justice has come out against the revised agreement to settle copyright lawsuits brought against Google by authors and publishers. This is a major blow to Google's efforts to build a massive digital-books marketplace and library. From the DoJ filing (PDF): "...the [Amended Settlement Agreement] suffers from the same core problem as the original agreement: it is an attempt to use the class action mechanism to implement forward-looking business arrangements that go far beyond the dispute before the Court in this litigation. As a consequence, the ASA purports to grant legal rights that are difficult to square with the core principle of the Copyright Act that copyright owners generally control whether and how to exploit their works during the term of copyright. Those rights, in turn, confer significant and possibly anticompetitive advantages on a single entity — Google."
Apple

Has Apple Created the Perfect Board Game Platform? 531

andylim writes "recombu.com is running an interesting piece about how Apple has created a 'Jumanji (board game) platform.' The 9.7-inch multi-touch screen is perfect for playing board games at home, and you could use Wi-Fi or 3G to play against other people when you're on your own. What would be really interesting is if you could pair the iPad with iPhones, 'Imagine a Scrabble iPad game that used iPhones as letter holders. You could hold up your iPhone so that no one else could see your letters and when you were ready to make a word on the Scrabble iPad board, you could slide them on to the board by flicking the word tiles off your iPhone.' Now that would be cool."
Communications

FBI Violated Electronic Communications Privacy Act 285

An anonymous reader writes to tell us of a report from the Washington Post which alleges that the FBI "illegally collected more than 2,000 US telephone call records between 2002 and 2006 by invoking terrorism emergencies that did not exist or simply persuading phone companies to provide records." The report continues, "E-mails obtained by The Washington Post detail how counterterrorism officials inside FBI headquarters did not follow their own procedures that were put in place to protect civil liberties. The stream of urgent requests for phone records also overwhelmed the FBI communications analysis unit with work that ultimately was not connected to imminent threats. ... FBI officials told The Post that their own review has found that about half of the 4,400 toll records collected in emergency situations or with after-the-fact approvals were done in technical violation of the law. The searches involved only records of calls and not the content of the calls. In some cases, agents broadened their searches to gather numbers two and three degrees of separation from the original request, documents show."
Microsoft

Microsoft Releases Linux Device Drivers As GPL 362

mjasay writes "Microsoft used to call the GPL 'anti-American.' Now, as Microsoft releases Hyper-V Linux Integration Components (LinuxIC) under the GPL (version 2), apparently Microsoft calls the GPL 'ally.' Of course, there was little chance the device drivers would be accepted into the Linux kernel base unless open source, but the news suggests a shift for Microsoft. It also reflects Microsoft's continued interest in undermining its virtualization competition through low prices, and may suggests concern that it must open up if it wants to fend off insurgent virtualization strategies from Red Hat (KVM), Novell (XEN), and others in the open-source camp. Microsoft said the move demonstrates its interest in using open source in three key areas: 1) Make its software development processes more efficient, 2) product evangelism, and 3) using open source to reduce marketing and sales costs or to try out new features that highlight parts of the platform customers haven't seen before."
The Media

Murdoch Paper Reporters Eavesdropped On Celebrities' Voicemail 186

Michael_Curator writes "Executives at Rupert Murdoch's News Corp.-owned papers (including current Tory spokesman Andy Coulson) allowed reporters to hack into phone conversations of celebrities and then paid hundreds of thousands of dollars to cover it up. How did famously technologically-challenged reporters manage the feat without BT catching on? Voicemail." The New York Times says a preliminary investigation's been ordered, but the BBC's coverage indicates that a large-scale inquiry is unlikely.
The Courts

Cellphones Increasingly Used As Evidence In Court 232

Hugh Pickens writes "The NY Times reports that the case of Mikhail Mallayev, who was convicted in March of murder after data from his cellphone disproved his alibi, highlights the surge in law enforcement's use of increasingly sophisticated cellular tracking techniques to keep tabs on suspects before they are arrested and build criminal cases against them by mapping their past movements. But cellphone tracking is raising concerns about civil liberties in a debate that pits public safety against privacy rights. Investigators seeking warrants must provide a judge with probable cause that a crime has been committed, but investigators often obtain cell-tracking records under lower standards of judicial review — through subpoenas, which are granted routinely, or through an intermediate type of court order based on an argument that the information requested would be relevant to an investigation. 'Cell phone providers store an increasing amount of sensitive data about where you are and when, based on which cell towers your phone uses when making a call. Until now, the government has routinely seized these records without search warrants,' said EFF Senior Staff Attorney Kevin Bankston. Last year the Federal District Court in Pittsburgh ruled that a search warrant is required even for historical phone location records, but the Justice Department has appealed the ruling. 'The cost of carrying a cellphone should not include the loss of one's personal privacy,' said Catherine Crump, a lawyer for the ACLU."
Technology (Apple)

iPhone 3GS Finally Hacked 376

Well, the inevitable hacking of Apple's latest flavor of iPhone has happened. Named "purplera1n," the tool will only allow installation of unauthorized applications instead of a full unlock. "The purplera1n jailbreak will free your iPhone from the limitations imposed on it by AT&T and Apple. After jailbreaking, a user will be able to customize the iPhone with home-screen wallpapers and third-party ringtones. But the biggest advantage of jailbreaking is the support of unapproved apps such as iBlackList (blacklists and whitelists for contacts) and many others."

Slashdot Top Deals

All great discoveries are made by mistake. -- Young

Working...