ilec_geek writes: I'm looking for constructive feedback from IT professionals working at small or large ISPs. When copyright infringement notifications come my way, the only identifying information they provide me with is an IP address and possibly source TCP port number. Because I work at a small ISP, I dynamically assign private (RFC 1918) IP addresses to my subscribers via DHCP. Then I use my sparingly assigned public IP addresses in overloaded NAT pools to translate those private addresses for outbound Internet traffic. This all works very well, except when a copyright infringement notice shows up. I do have the ability to grep my NAT tables which I archive 4 times a day (every 6 hours) which allows me to track down the alleged violating public IP and source port. Then I cross reference that with my DHCP leases to find the associated user account. However, the NAT tables in my router are so volatile and nebulous, even though I capture them every 6 hours, I find many translations in the router that simply are no longer there when I perform my regular archive. My question is, how many of you have encountered the same challenges, and how have you solved them? Sometimes these infringement notifications get to me several days after the fact. The only solution I see is to keep an exact image of my huge NAT tables archived for every minute of the day for several days. This would turn into an administrative nightmare and would quickly reach the level of absurdity in the amount of data I would have to store just for this purpose. The bottom line is, I don't believe an IP address alone is sufficient to identify a person in a copyright infringement issue. My own example illustrates how cumbersome and difficult it is (and sometimes impossible) to identify a person based solely on their IP address. I am not deliberately trying to hide my customer's identities. It is simply the most efficient way for me to design my network.
gandhi_2 writes: The Guardian has a story about an ongoing legal battle over the use of full body scanners in the UK. The Protection of Children Act 1978, includes provisions in which it is illegal to create an indecent image or a "pseudo-image" of a child....which a full body scanner does.
Suki I writes: . . . Appearing at the Consumer Electronics Show in Las Vegas, Chief Executive Alan Mulally and other Ford executives also said it has partnerships with map supplier Mapquest, Internet radio provider Pandora, micro-blogging service Twitter and audio news service Stitcher.
Ford executives didn't detail the nature of their talks withGoogle, which recently unveiled its own branded smartphone. But they suggested the discussions involved designing products based on Google'sAndroid mobile operating system that would be compatible with Ford's on-board entertainment-and-communications platform, known as Sync. "Many of you here inspired us to move at Silicon Valley speeds," Mulally said. "It is challenging. It is fun." . . . Link to Original Source
from the well-not-me-the-guy-who-wrote-the-article dept.
Hoi Polloi writes "Wired News has a series starting on internet crime. The first piece they have up covers the story of a cybercrook who specialized in credit card fraud. Caught in a sting operation in November of 2002, the man who identified himself as 'El Mariachi' on message boards would lead a double life for the next two years working for the FBI. As he reported on credit card scammers, dodged his former associates, and stopped criminals from defrauding the 2004 presidential campaign, he also tried to keep his life together. A fascinating tale that looks at the face of modern crime, and crime-stopping techniques."
MollyB writes: There is a story on the BBC site that announces the discovery of archaeological evidence that Stonehenge was the "first free festival" and was constructed as such: "This is where they went to party — you could say it was the first free festival" Mike Parker Pearson, Sheffield University