Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.

 



Forgot your password?
typodupeerror
Crime

Councilmen Introduce Bills Strongly Regulating UAV Use in NYC 61

Posted by timothy
from the man-vs-the-state dept.
SternisheFan passes on this excerpt from an Ars Technica article: On Wednesday Councilman Dan Garodnick introduced a bill to the New York City council seeking to ban all use of drones except those operated by police officers who obtain warrants. A second, parallel bill introduced by councilman Paul Vallone would place more stringent restrictions on drone use but stop short of banning drones for hobbyists and companies altogether. Both bills have been passed to the city's committee on public safety. An all-out ban on drones within the metropolis would be a quite wide-reaching step, especially as the Federal Aviation Authority (FAA) seems poised to adopt more permissive rules, with respect to commercial interests in particular. Earlier this year, the FAA formally granted six Hollywood companies exemptions to drone ban rules. A couple of months later, the FAA granted similar exemptions for construction site monitoring and oil rig flare stack inspections. The article explains that Vallone's bill is less restrictive, and rather than propose an outright ban "lists 10 instances where operating a UAV would be illegal, including at night, out of the operator's eyesight, or above 400 ft high. Outside of those conditions, hobbyists and commercial interests would be free to fly drones."
Crime

RFID-Blocking Blazer and Jeans Could Stop Wireless Identity Theft 101

Posted by samzenpus
from the keeping-it-in dept.
An anonymous reader writes A pair of trousers and blazer have been developed by San Francisco-based clothing company Betabrand and anti-virus group Norton that are able to prevent identity theft by blocking wireless signals. The READY Active Jeans and the Work-It Blazer contain RFID-blocking fabric within the pockets' lining designed to prevent hacking through radio frequency identification (RFID) signals emitted from e-passports and contactless payment card chips. According to the clothing brand, this form of hacking is an increasing threat, with "more than 10 million identities digitally pick pocketed every year [and] 70% of all credit cards vulnerable to such attacks by 2015."
Verizon

Verizon "End-to-End" Encrypted Calling Includes Law Enforcement Backdoor 162

Posted by Soulskill
from the part-and-parcel dept.
An anonymous reader sends this quote from TechDirt: As a string of whistle blowers like former AT&T employee Mark Klein have made clear abundantly clear, the line purportedly separating intelligence operations from the nation's incumbent phone companies was all-but obliterated long ago. As such, it's relatively amusing to see Verizon announce this week that the company is offering up a new encrypted wireless voice service named Voice Cypher. Voice Cypher, Verizon states, offers "end-to-end" encryption for voice calls on iOS, Android, or BlackBerry devices equipped with a special app made by Cellcrypt.

Verizon says it's initially pitching the $45 per phone service to government agencies and corporations, but would ultimately love to offer it to consumers as a line item on your bill. Of course by "end-to-end encryption," Verizon means that the new $45 per phone service includes an embedded NSA backdoor free of charge. Apparently, in Verizon-land, "end-to-end encryption" means something entirely different than it does in the real world.
Privacy

Uber Limits 'God View' To Improve Rider Privacy 76

Posted by Soulskill
from the enabled-by-typing-iddqd dept.
mpicpp sends this report from CNN: Uber has rolled back employee access to its "God view" mode, which allows the company to track riders' locations and other data. The ride service company was faced with questions about its privacy policies from U.S. Senator Al Franken, following a series of recent privacy debacles. Uber's updated policy is detailed in its response to the senator's questions. Franken sent Uber a letter (PDF, Uber's response) in November after news reports made two things clear: The ride service company collects lots of data on customers — and some executives don't exercise that power responsibly. In one case, an Uber employee using "God View" easily tracked a reporter's movements on her way to a meeting.
Privacy

Microsoft Gets Industry Support Against US Search Of Data In Ireland 137

Posted by timothy
from the encrypt-what-you-must dept.
An anonymous reader writes Tech giants such as Apple and eBay have given their support in Microsoft's legal battle against the U.S. government regarding the handing over of data stored in an Irish datacenter. In connection with a 2014 drugs investigation, U.S. prosecutors issued a warrant for emails stored by Microsoft in Ireland. The firm refused to hand over the information, but in July was ordered by a judge to comply with the investigation. Microsoft has today filed a collection of letters from industry supporters, such as Apple, eBay, Cisco, Amazon, HP, and Verizon. Trade associations including the U.S. Chamber of Commerce and Digital Rights Ireland have also expressed their support.
Electronic Frontier Foundation

Federal Court Nixes Weeks of Warrantless Video Surveillance 431

Posted by timothy
from the if-you-watch-someone-long-enough dept.
An anonymous reader writes with this news from the EFF's Deep Links: The public got an early holiday gift today when a federal court agreed with us that six weeks of continually video recording the front yard of someone's home without a search warrant violates the Fourth Amendment. In United States v. Vargas local police in rural Washington suspected Vargas of drug trafficking. In April 2013, police installed a camera on top of a utility pole overlooking his home. Even though police did not have a warrant, they nonetheless pointed the camera at his front door and driveway and began watching every day. A month later, police observed Vargas shoot some beer bottles with a gun and because Vargas was an undocumented immigrant, they had probable cause to believe he was illegally possessing a firearm. They used the video surveillance to obtain a warrant to search his home, which uncovered drugs and guns, leading to a federal indictment against Vargas.
Privacy

Snowden Leaks Prompt Internet Users Worldwide To Protect Their Data 53

Posted by Soulskill
from the for-differing-values-of-"protect" dept.
Lucas123 writes: A new international survey of internet users from 24 countries has found that more than 39% of them have taken steps to protect their data since Edward Snowden leaked the NSA's spying practices. The survey, conducted by the Center for International Governance Innovation, found that 43% of Internet users now avoid certain websites and applications and 39% change their passwords regularly. Security expert Bruce Schneier chastised the media for trying to downplay the numbers by saying "only" 39%" have taken action and "only 60%" have heard of Snowden. The news articles, "are completely misunderstanding the data," Schneier said, pointing out that by combining data on Internet penetration with data from the international survey, it works out to 706 million people who are now taking steps to protect their online data. Additionally, two-thirds (64%) of users indicated they are more concerned today about online privacy than they were a year ago. Another notable finding: 83% of users believe that affordable access to the Internet should be a basic human right.
Canada

Govt Docs Reveal Canadian Telcos Promise Surveillance Ready Networks 74

Posted by samzenpus
from the we'll-do-it-for-you dept.
An anonymous reader writes "Michael Geist reports that Canadian telecom and Internet providers have tried to convince the government that they will voluntarily build surveillance capabilities into their networks. Hoping to avoid legislative requirements, the providers argue that "the telecommunications market will soon shift to a point where interception capability will simply become a standard component of available equipment, and that technical changes in the way communications actually travel on communications networks will make it even easier to intercept communications."
Google

Eric Schmidt: To Avoid NSA Spying, Keep Your Data In Google's Services 280

Posted by samzenpus
from the no-snooping-zone dept.
jfruh writes Google Chairman Eric Schmidt told a conference on surveillance at the Cato Institute that Edward Snowden's revelations on NSA spying shocked the company's engineers — who then immediately started working on making the company's servers and services more secure. Now, after a year and a half of work, Schmidt says that Google's services are the safest place to store your sensitive data.
Privacy

How Identifiable Are You On the Web? 157

Posted by timothy
from the your-unique-aroma dept.
An anonymous reader writes How identifiable are you on the web? This updated browser fingerprinting tool implements the current state of the art in browser fingerprinting techniques(including canvas fingerprinting) to show you how unique your browser is on the web. Good food for thought when three-letter agencies talk about "mere metadata."
Google

Hollywood's Secret War With Google 175

Posted by Soulskill
from the a-war-they'll-fight-aggressively-to-lose dept.
cpt kangarooski writes: Information has come to light (thanks to the recent Sony hack) that the MPAA and six major studios are pondering the legal actions available to them to compel an entity referred to as 'Goliath,' most likely Google, into taking aggressive anti-piracy action on behalf of the entertainment industry. The MPAA and member studios Universal, Sony, Fox, Paramount, Warner Bros., and Disney have had lengthy email discussions concerning how to block pirate sites at the ISP level, and how to take action at the state level to work around the failure of SOPA in 2012. Emails also indicate that they are working with Comcast (which owns Universal) on some form of traffic inspection to find copyright infringements as they happen.
Businesses

Is Enterprise IT More Difficult To Manage Now Than Ever? 238

Posted by Soulskill
from the get-off-my-virtualized-lawn dept.
colinneagle writes: Who's old enough to remember when the best technology was found at work, while at home we got by with clunky home computers and pokey dial-up modems? Those days are gone, and they don't look like they're ever coming back.

Instead, today's IT department is scrambling to deliver technology offerings that won't get laughed at — or, just as bad, ignored — by a modern workforce raised on slick smartphones and consumer services powered by data centers far more powerful than the one their company uses. And those services work better and faster than the programs they offer, partly because consumers don't have to worry about all the constraints that IT does, from security and privacy to, you know, actually being profitable. Plus, while IT still has to maintain all the old desktop apps, it also needs to make sure mobile users can do whatever they need to from anywhere at any time.

And that's just the users. IT's issues with corporate peers and leaders may be even rockier. Between shadow IT and other Software-as-a-Service, estimates say that 1 in 5 technology operations dollars are now being spent outside the IT department, and many think that figure is actually much higher. New digital initiatives are increasingly being driven by marketing and other business functions, not by IT. Today's CMOs often outrank the CIO, whose role may be constrained to keeping the infrastructure running at the lowest possible cost instead of bringing strategic value to the organization. Hardly a recipe for success and influence.
Privacy

Bank Security Software EULA Allows Spying On Users 135

Posted by timothy
from the even-for-a-eula-that's-bad dept.
An anonymous reader writes Trusteer Rapport, a software package whose installation is promoted by several major banks as an anti-fraud tool, has recently been acquired by IBM and has an updated EULA. Among other things, the new EULA includes this gem: "In addition, You authorize personnel of IBM, as Your Sponsoring Enterprise's data processor, to use the Program remotely to collect any files or other information from your computer that IBM security experts suspect may be related to malware or other malicious activity, or that may be associated with general Program malfunction." Welcome to the future...
Social Networks

How Your In-Store Shopping Affects the Ads You See On Facebook 69

Posted by timothy
from the one-country-one-nation-one-singular-sensation dept.
itwbennett writes Facebook has made several acquisitions over the years to help advertisers target their ads and extend their reach. Custom Audiences is one such targeting tool, allowing retailers to match shoppers in their stores with their accounts on Facebook. It's often done through an email address, phone number or name. Facebook won't give hard numbers, but there seems to be a lot of matching going on. For decades, marketers have been trying to understand more about what's happening at the point of sale, 'so their systems are really robust at capturing a strikingly large amount of transactions,' says Brian Boland, Facebook's VP of advertising technology.
Communications

Congress Passes Bill Allowing Warrantless Forfeiture of Private Communications 378

Posted by timothy
from the stinkin'-badges-apparently-suffice dept.
Prune writes Congress has quietly passed an Intelligence Authorization Bill that includes warrantless forfeiture of private communications to local law enforcement. Representative Justin Amash unsuccessfully attempted a late bid to oppose the bill, which passed 325-100. According to Amash, the bill "grants the executive branch virtually unlimited access to the communications of every American." According to the article, a provision in the bill allows “the acquisition, retention, and dissemination” of Americans’ communications without a court order or subpoena. That type of collection is currently allowed under an executive order that dates back to former President Reagan, but the new stamp of approval from Congress was troubling, Amash said. Limits on the government’s ability to retain information in the provision did not satisfy the Michigan Republican."
Canada

Canadian Supreme Court Rules In Favor of Warrantless Cellphone Searches 104

Posted by timothy
from the eh?-speak-up-sonny dept.
An anonymous reader writes In a surprising decision, a split Supreme Court of Canada ruled this morning that police can search cellphones without a warrant incident to an arrest. The majority established some conditions, but ultimately ruled that it could navigate the privacy balance by establishing some safeguards with the practice. Michael Geist notes that a strongly worded dissent disagreed, emphasizing the privacy implications of access to cellphones and the need for judicial pre-authorization as the best method of addressing the privacy implications. The U.S. Supreme Court's June 2014 decision in Riley addressed similar issues and ruled that a warrant is needed to search a phone.
United States

Microsoft To US Gov't: the World's Servers Are Not Yours For the Taking 192

Posted by Soulskill
from the back-off dept.
Microsoft is currently fighting a legal battle with the U.S. government, who wants to search the company's servers in Ireland using a U.S. search warrant. An anonymous reader points out a new court filing from Microsoft that argues the U.S. itself would never stand for such reasoning from other governments. Microsoft General Counsel Brad Smith writes, If the Government prevails, how can it complain if foreign agents require tech companies to download emails stored in the U.S.? This is a question the Department of Justice hasn’t yet addressed, much less answered. Yet the Golden Rule applies to international relations as well as to other human interaction. In one important sense, the issues at stake are even bigger than this. The Government puts at risk the fundamental privacy rights Americans have valued since the founding of the postal service. This is because it argues that, unlike your letters in the mail, emails you store in the cloud cease to belong exclusively to you. Instead, according to the Government, your emails become the business records of a cloud provider. Because business records have a lower level of legal protection, the Government claims it can use a different and broader legal authority to reach emails stored anywhere in the world.
Advertising

AdNauseam Browser Extension Quietly Clicks On Blocked Ads 285

Posted by timothy
from the you-like-this-and-this-and-this dept.
New submitter stephenpeters writes The AdNauseam browser extension claims to click on each ad you have blocked with AdBlock in an attempt to obfuscate your browsing data. Officially launched mid November at the Digital Labour conference in New York, the authors hope this extension will register with advertisers as a protest against their pervasive monitoring of users online activities. It will be interesting to see how automated ad click browser extensions will affect the online ad arms race. Especially as French publishers are currently planning to sue Eyeo GmbH, the publishers of Adblock. This might obfuscate the meaning of the clicks, but what if it just encourages the ad sellers to claim even higher click-through rates as a selling point?
The Almighty Buck

The Rise of the Global Surveillance Profiteers 33

Posted by samzenpus
from the grab-that-cash-with-both-hands-and-make-a-stash dept.
blottsie writes "A new report takes a deep dive into companies like Hacking Team, which have sprouted up in the years since 9/11 sparked a global war on terror and a wired technological revolution. As the U.S. developed the online surveillance tools that, over a decade later, would eventually be revealed to the world by National Security Agency whistleblower Edward Snowden, savvy businesses across the globe realized there were plenty of countries that might not be able to afford to develop such sophisticated technology in-house but still had money to burn."
United States

FISA Court Extends Section 215 Bulk Surveillance For 90 Days 82

Posted by samzenpus
from the all-the-better-to-hear-you-with dept.
Trailrunner7 notes that the bulk telephone collection program was just extended another 90 days. "The secret Foreign Intelligence Surveillance Court has authorized a 90-day extension to the Section 215 bulk telephone collection program used by the National Security Agency, giving the agency through the end of February to run the program in the absence of legislation establishing a new authority.

On Monday, the Office of the Director of National Intelligence revealed that the administration had applied for a 90-day extension to the existing Section 215 authority, and that the FISC had approved the request, extending the authority through Feb. 27.

'The Administration welcomes the opportunity to work with the new Congress to implement the changes the President has called for. Given that legislation has not yet been enacted, and given the importance of maintaining the capabilities of the telephony metadata program, the government has sought a 90-day reauthorization of the existing program, as modified by the changes the President directed in January,' a statement from the Office of the DNI and the Office of the Attorney General said."

All the simple programs have been written.

Working...