Skip to main content

Home/ Indie Nation/ Group items tagged how to

Rss Feed Group items tagged

John Lemke

FCC to buy out TV broadcasters to free up mobile spectrum | Ars Technica - 0 views

    • John Lemke
       
      I had my first issue at step one, "asks broadcasters to tell the FCC how much it wold take for the agency to buy them out".  They claim that this is a way to keep cost down by hopefully grabbing the least popular via low bids.   I see two issues immediately.  Number one by asking them what they want they are going to immediately INCREASE the bids.  Two, if you are asking me what I want for my business to change how it broadcasts why would I not include any expense to make the switch. By asking them what they think a fair bid would be, they are, more or less, giving them a blank check.
  • the commission will put the newly-freed blocks of spectrum up for auction. If, as expected, the spectrum is more valuable when used for mobile services than broadcast television, then the FCC should reap significantly more from these traditional auctions than it had to pay for the spectrum in the original reverse auctions, producing a tidy profit for taxpayers.
    • John Lemke
       
      The objective at an auction is to purchase the object at the lowest possible cost.  How much mobile providers are willing to pay will determine how high bids will climb.  Based on how our current mobile providers already provide poor service when compared to the rest of the world, how much is that bandwidth actually worth to these companies that, more or less, have a lobbied stranglehold on the consumer?
  • ...6 more annotations...
  • Bergmayer also praised an FCC proposal to update its "spectrum screen," a set of rules that prevent any single provider from gaining too large a share of the spectrum available in a particular market. The current scheme, he said, "treats all spectrum alike, even though some spectrum bands are better-suited to mobile broadband than others." As a result, he argued, it has become ineffective at preventing Verizon and AT&T from gaining enough spectrum to threaten competition. He urged the FCC to revise the rules to ensure the new auctions don't further entrench the dominance of the largest incumbents.
    • John Lemke
       
      It is the stuff like this that worries me, on one hand they want a high bid, and on the other it is going to be regulated.
  • Over the last decade, it has become increasingly obvious that America's spectrum resources are mis-allocated. The proliferation of cell phones, and more recently smartphones and tablets, has given mobile providers a voracious appetite for new spectrum. But a big chunk of the available spectrum is currently occupied by broadcast television stations. With more and more households subscribed to cable, satellite, and Internet video services, traditional broadcast television is looking like an increasingly outmoded use of the scarce and valuable airwaves.
  • incumbent broadcasters have controlled their channels for so long that they've come to be regarded as de facto property rights. And needless to say, the politically powerful broadcasters have fiercely resisted any efforts to force them to relinquish their spectrum.
  • incentive auctions
  • The plan has three phases. In the first phase, the FCC will conduct a reverse auction in which it asks broadcasters to tell the FCC how much it would take for the agency to buy them out. Presumably, the least popular (and, therefore, least profitable) channels will submit the lowest bids. By accepting these low bids, the FCC can free up the maximum possible spectrum at the minimum cost
John Lemke

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputatio... - 0 views

  • “The Art of Deception: Training for Online Covert Operations.”
  • Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. 
  • Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends. The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
    • John Lemke
       
      Wow, how is not changing pictures and creating false victims not identity theft and conspiracy?  
  • ...4 more annotations...
  • it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption.
    • John Lemke
       
      Not only are you now guilty until proven innocent but, if you are guilty enough, we shall create a situation so that you are.
  • Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups. Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).
    • John Lemke
       
      So one of the guys who advocates this and approves of it, gets to be on the NSA review committee?  Isn't that like Ted Kennedy on the Ethics Review Committee or the Warren Commission?
  • Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.
John Lemke

The White House Big Data Report: The Good, The Bad, and The Missing | Electronic Fronti... - 0 views

  • the report recognized that email privacy is critical
  • one issue was left conspicuously unaddressed in the report. The Securities and Exchange Commission, the civil agency in charge of protecting investors and ensuring orderly markets, has been advocating for a special exception to the warrant requirement. No agency can or should have a get-out-of-jail-free card for bypassing the Fourth Amendment.
  • the algorithm is only as fair as the data fed into it.
  • ...22 more annotations...
  • the danger of discrimination remains due to the very digital nature of big data
  • especially the elderly, minorities, and the poor
  • an example of this in Boston, which had a pilot program to allow residents to report potholes through a mobile app but soon recognized that the program was inherently flawed because “wealthy people were far more likely to own smart phones and to use the Street Bump app. Where they drove, potholes were found; where they didn’t travel, potholes went unnoted.”
  • The authors of the report agree, recommending that the Privacy Act be extended to all people, not just US persons.
  • metadata (the details associated with your communications, content, or actions, like who you called, or what a file you uploaded file is named, or where you were when you visited a particular website) can expose just as much information about you as the “regular” data it is associated with, so it deserves the same sort of privacy protections as “regular” data.
    • John Lemke
       
      What is Metadate... then discuss
  • The report merely recommended that the government look into the issue.
    • John Lemke
       
      Did the report give a strong enough recommendation? "looking into" and doing are much different
  • several other government reports have taken a much stronger stance and explicitly stated that metadata deserves the same level of privacy protections as “regular” data.
  • We think the report should have followed the lead of the PCAST report and acknowledged that the distinction between data and metadata is an artificial one, and recommended the appropriate reforms.
    • John Lemke
       
      I very strongly agree.  The report failed in this area.
  • the White House suggested advancing the Consumer Privacy Bill of Rights, which includes the idea that “consumers have a right to exercise control over what personal data companies collect from them and how they use it,” as well as “a right to access and correct personal data.”
  • Consumers have a right to know when their data is exposed, whether through corporate misconduct, malicious hackers, or under other circumstances. Recognizing this important consumer safeguard, the report recommends that Congress “should pass legislation that provides a single national data breach standard along the lines of the Administration's May 2011 Cybersecurity legislative proposal.”
  • While at first blush this may seem like a powerful consumer protection, we don’t think that proposal is as strong as existing California law. The proposed federal data breach notification scheme would preempt state notification laws, removing the strong California standard and replacing it with a weaker standard.
    • John Lemke
       
      In other words, it failed at what can be done and it would actually lower standards when compared to what California has in place currently.
  • We were particularly disconcerted
  • the Fort Hood shooting by Major Nidal Hasan
    • John Lemke
       
      WTF? how did he get in this group?
  • two big concerns
  • First, whistleblowers are simply not comparable to an Army officer who massacres his fellow soldiers
  • Secondly, the real big-data issue at play here is overclassification of enormous quantities of data.
  • Over 1.4 million people hold top-secret security clearances. In 2012, the government classified 95 million documents. And by some estimates, the government controls more classified information than there is in the entire Library of Congress.
    • John Lemke
       
      Don't leave this stat out.  More classified documents than LOC documents.  WTF? A "democracy" with more secret documents than public?
  • The report argues that in today’s connected world it’s impossible for consumers to keep up with all the data streams they generate (intentionally or not), so the existing “notice and consent” framework (in which companies must notify and get a user’s consent before collecting data) is obsolete. Instead, they suggest that more attention should be paid to how data is used, rather than how it is collected.
    • John Lemke
       
      This is the most troubling part perhaps,  isn't the collection without consent where the breech of privacy begins?
    • John Lemke
       
      "notice and consent"
  • An unfortunate premise of this argument is that automatic collection of data is a given
  • While we agree that putting more emphasis on responsible use of big data is important, doing so should not completely replace the notice and consent framework.
  • Despite being a fairly thorough analysis of the privacy implications of big data, there is one topic that it glaringly omits: the NSA’s use of big data to spy on innocent Americans.
    • John Lemke
       
      If we ignore it, it will go away?  Did they not just mostly ignore it and accept it as a given for corporations and completely ignore it regarding the government? Pretty gangster move isn't it?
  • Even though the review that led to this report was announced during President Obama’s speech on NSA reform, and even though respondents to the White House’s Big Data Survey “were most wary of how intelligence and law enforcement agencies are collecting and using data about them,” the report itself is surprisingly silent on the issue.2 This is especially confusing given how much the report talks about the need for more transparency in the private sector when it comes to big data. Given that this same logic could well be applied to intelligence big data programs, we don’t understand why the report did not address this vital issue.
John Lemke

New Zealand Spy Agency Deleted Evidence About Its Illegal Spying On Kim Dotcom | Techdirt - 0 views

  • I have to admit that I'm consistently amazed at just how badly law enforcement in both the US and New Zealand appeared to screw up the raid and the case against Kim Dotcom. I've said it a few times before, but it really feels like authorities in both places actually believed the bogus Hollywood hype being spread by the MPAA about how Dotcom was really a James Bondian-villain, and acted accordingly, while ignoring any evidence to the contrary.
  •  
    "I have to admit that I'm consistently amazed at just how badly law enforcement in both the US and New Zealand appeared to screw up the raid and the case against Kim Dotcom. I've said it a few times before, but it really feels like authorities in both places actually believed the bogus Hollywood hype being spread by the MPAA about how Dotcom was really a James Bondian-villain, and acted accordingly, while ignoring any evidence to the contrary."
John Lemke

The NSA Uses Powerful Toolbox in Effort to Spy on Global Networks - SPIEGEL ONLINE - 0 views

  • According to internal NSA documents viewed by SPIEGEL, these on-call digital plumbers are involved in many sensitive operations conducted by American intelligence agencies. TAO's area of operations ranges from counterterrorism to cyber attacks to traditional espionage. The documents reveal just how diversified the tools at TAO's disposal have become -- and also how it exploits the technical weaknesses of the IT industry, from Microsoft to Cisco and Huawei, to carry out its discreet and efficient attacks. The unit is "akin to the wunderkind of the US intelligence community," says Matthew Aid, a historian who specializes in the history of the NSA. "Getting the ungettable" is the NSA's own description of its duties. "It is not about the quantity produced but the quality of intelligence that is important," one former TAO chief wrote, describing her work in a document. The paper seen by SPIEGEL quotes the former unit head stating that TAO has contributed "some of the most significant intelligence our country has ever seen." The unit, it goes on, has "access to our very hardest targets."
  •  
    Page One of a good three page read on just how extensive the government's illegal spying operations actually are... the worst part is it is just how extensive the portions of it we know about are!
John Lemke

Teaching robots to move like humans (w/ Video) - 0 views

  •  
    "It's important to build robots that meet people's social expectations because we think that will make it easier for people to understand how to approach them and how to interact with them," said Andrea Thomaz, assistant professor in the School of Interactive Computing at Georgia Tech's College of Computing. Thomaz, along with Ph.D. student Michael Gielniak, conducted a study in which they asked how easily people can recognize what a robot is doing by watching its movements.
John Lemke

Surprise: ASCAP and Music Labels Colluded To Screw Pandora | Techdirt - 0 views

  • A key part of this was that the major labels, key members of ASCAP, suddenly started "dropping out" of ASCAP in order to do licensing directly. At first we thought this was a sign of how the labels might be realizing that ASCAP was obsolete and out of touch, but it has since become clear that these "removals" were all something of a scam to force Pandora into higher rates.
  • What happened was that ASCAP and Pandora had first negotiated a higher rate than Pandora had agreed to in the past -- reaching a handshake agreement. However, before that agreement could be finalized, these labels started "withdrawing" from ASCAP in order to negotiate directly. As part of that, both ASCAP and the labels refused to tell Pandora which songs had been withdrawn, meaning that if Pandora accidentally played one of the withdrawn songs (again, without knowing which songs were withdrawn),
  • Your Honor, by the time Pandora asked for this information on November 1st, both ASCAP and Mr. Brodsky [Sony Executive VP] had in their possession this very list. The deposition testimony from ASCAP was that this list as is could have been delivered to Pandora within 24 hours were it only to get the go-ahead from Sony to do so. ASCAP never received the go-ahead. We cited much of the internal back-and-forth on this in our briefs... My favorite is the following exchange between Mr. DeFilippis and Mr. Reimer of ASCAP on December 19th, 2013, PX 193. You see the question being asked by Mr. DeFilippis: why didn't Sony provide the list to Pandora? Mr. Reimer's response: Ask me tomorrow. Mr. DeFilippis: Right. With drink in hand. And the inference here is just incredible. This data was sitting there, your Honor, and nobody was willing to give it to Pandora.
  • ...1 more annotation...
  • There's a lot more in there, but it seems abundantly clear that these labels "withdrawing" from ASCAP had nothing to do with competition or market rates. It appears that it had little to do with even withdrawing from ASCAP. Instead, it seems to have been designed from the start to basically screw over Pandora, in what certainly smells an awful lot like collusion, by forcing Pandora to pay exorbitant rates or suddenly face a massive copyright liability because no one would tell them what songs were being "withdrawn" from an existing licensing agreement.
John Lemke

Lawsuit Claims Accidental Google Search Led To Years Of Government Investigation And Ha... - 0 views

  • Jeffrey Kantor, who was fired by Appian Corporation, sued a host of government officials, including Attorney General Eric Holder, Director of National Intelligence James Clapper, CIA Director John Brennan, Defense Secretary Chuck Hagel and Secretary of State John Kerry in Federal Court, alleging civil rights violations, disclosure of private information and retaliation… He also sued Secretary of Energy Ernest Moniz, Acting Secretary of Homeland Security Rand Beers, Treasury Secretary Jacob Lew, EPA Administrator Regina McCarthy and U.S. Office of Personnel Management Director Katherine Archuleta.
  • "In October of 2009, Kantor used the search engine Google to try to find, 'How do I build a radio-controlled airplane,'" he states in his complaint. "He ran this search a couple weeks before the birthday of his son with the thought of building one together as a birthday present. After typing, 'how do I build a radio controlled', Google auto-completed his search to, 'how do I build a radio controlled bomb.'" From that point on, Kantor alleges coworkers, supervisors and government investigators all began "group stalking" him. Investigators used the good cop/bad cop approach, with the "bad cop" allegedly deploying anti-Semitic remarks frequently. In addition, his coworkers at Appian (a government contractor) would make remarks about regular people committing murder-suicides (whenever Kantor expressed anger) or how normal people just dropped dead of hypertension (whenever Kantor remained calm while being harassed)
  • Kantor also claims he was intensely surveilled by the government from that point forward.
    • John Lemke
       
      Our story begins with auto-complete and, once suspected, always monitored. has an interesting loophole. 
  • ...2 more annotations...
  • the law says that the timeline is based on when the citizen had a reasonable chance to discover the violation. Since the PRISM program was only declassified in July of 2013, these earlier violations should not be time-barred.
  • All in all, the filing doesn't build a very credible case and comes across more as a paranoiac narrative than a coherent detailing of possible government harassment and surveillance. Here are just a few of the highlights.
  •  
    Wait till you see how many and who are involved.
John Lemke

David Byrne and Cory Doctorow Explain Music and the Internet | culture | Torontoist - 0 views

  • Byrne and Doctorow were there to talk about how the internet has affected the music business. While that was certainly a large part of the discussion, the conversation also touched on all the ways technology and music interact, from file sharing to sampling.
  • Doctorow pointed out that two of the best-selling and most critically acclaimed hip-hop records of the 1980s—Public Enemy’s It Takes a Nation of Millions to Hold Us Back, and the Beastie Boys Paul’s Boutique—would have each cost roughly $12 million to make given today’s rules surrounding sample clearance.
  • “In the world of modern music, there are no songs with more than one or two samples, because no one wants to pay for that,” Doctorow said. “So, there’s a genre of music that, if it exists now, exists entirely outside the law. Anyone making music like Paul’s Boutique can’t make money from it, and is in legal jeopardy for having done it. Clearly that’s not what we want copyright to do.” When the conversation turned to downloads and digital music distribution, both men were surprisingly passionate on the topic of digital rights management, and how it’s fundamentally a bad idea.
  • ...1 more annotation...
  • Doctorow argued that the way humans have historically shared music is totally antithetical to the idea of copyright laws. He pointed out that music predates not only the concept of copyright, but language itself. People have always wanted to share music, and, in an odd way, the sharing of someone else’s music is embedded in the industry’s business model, no matter how badly some may want to remove it.
  •  
    "Doctorow pointed out that two of the best-selling and most critically acclaimed hip-hop records of the 1980s-Public Enemy's It Takes a Nation of Millions to Hold Us Back, and the Beastie Boys Paul's Boutique-would have each cost roughly $12 million to make given today's rules surrounding sample clearance."
John Lemke

Snowden Keeps Outwitting U.S. Spies - The Daily Beast - 0 views

  • First, it assumes that Snowden’s master file includes data from every network he ever scanned. Second, it assumes that this file is already in or will end up in the hands of America’s adversaries. If these assumptions turn out to be true, then the alarm raised in the last week will be warranted. The key word here is “if.”
    • John Lemke
       
      The two asumptions
  • One U.S. intelligence official briefed on the report said the DIA concluded that Snowden visited classified facilities outside the NSA station where he worked in Hawaii while he was downloading the documents he would eventually leak to journalists Glenn Greenwald and Barton Gellman. On Tuesday, Clapper himself estimated that less than 10 percent of the documents Snowden took were from the NSA.
    • John Lemke
       
      Seems not many of the documents were actually NSA documents.
  • assume
  • ...10 more annotations...
  • DIA director Gen. Michael Flynn put it this way on Tuesday in testimony before the House Permanent Select Committee on Intelligence: “We
  • that Snowden, everything that he touched, we assume that he took, stole.”
  • The U.S. intelligence official briefed on the report said the DIA was able to retrace the steps Snowden took inside the military’s classified systems to find every site where he rummaged around. “Snowden had a very limited amount of time before he would be detected when he did this, so we
  • assume
  • he zipped up the files and left,” this official said.
  • Bruce Schneier, a cybersecurity expert and cryptographer who Greenwald has consulted on the Snowden archive, said it was prudent to
  • assume
  • that lest some of Snowden’s documents could wind up in the hands of a foreign government.
  • In June, Greenwald told the Daily Beast that he did not know whether or not Snowden had additional documents beyond the ones he gave him. “I believe he does. He was clear he did not want to give to journalists things he did not think should be published.”
    • John Lemke
       
      He is not willing to release stuff he felt that journalist should not publish...
  • Snowden, however, has implied that he does not have control over the files he took. “No intelligence service—not even our own—has the capacity to compromise the secrets I continue to protect,” he wrote in July in a letter to former New Hampshire Republican senator Gordon Humphrey. “While it has not been reported in the media, one of my specializations was to teach our people at DIA how to keep such information from being compromised even in the highest threat counter-intelligence environments (i.e. China). You may rest easy knowing I cannot be coerced into revealing that information, even under torture.”
John Lemke

Ask Ethan #55: Could a Manned Mission to Mars Abort? - Starts With A Bang! - Medium - 0 views

  • No humans have ever traveled farther away from Earth than the crew of Apollo 13 did, as they circled around the far side of the Moon close to lunar apogee, achieving a maximum distance of 400,171 km above the Earth’s surface on April 15, 1970. But when the first manned spaceflight to another planet occurs, that record will be shattered, and in a mere matter of days.
  • The way we currently reach other worlds with our present technology — or any remote location in the Universe — involves three distinct stages:The initial launch, which overcomes the Earth’s gravitational binding energy and starts our spacecraft off with a reasonably large (on the order of a few km/s) velocity relative to the Earth’s motion around the Sun.On-board course corrections, where very small amounts of thrust accelerate the spacecraft to its optimal trajectory.And gravity assists, where we use the gravitational properties of other planets in orbit around the Sun to change our spacecraft’s velocity, either increasing or decreasing its speed with every encounter.It’s through the combination of these three actions that we can reach any location — if we’re patient and we plan properly — with only our current rocket technology.
    • John Lemke
       
      How we can do it now, if we plan right.
  • The initial launch is a very hard part right now. It takes a tremendous amount of resources to overcome the Earth’s gravitational pull, to accelerate a significant amount of mass to the Earth’s escape velocity, and to raise it all the way up through the Earth’s atmosphere.
  • ...2 more annotations...
  • The most optimal one for a one-way trip to Mars, for those of you wondering, that minimizes both flight time and the amount of energy needed, involves simply timing your launch right.
    • John Lemke
       
      The cheapest and the fastest. The one way ticket option.
  • When a planet orbits the Sun, there’s a lot of energy in that system, both gravitational energy and kinetic energy. When a third body interacts gravitationally as well, it can either gain some energy by stealing it from the Sun-planet system, or it can lose energy by giving it up to the Sun-planet system. The amount of energy performed by the spacecraft’s thrusters is often only 20% (or less) of the energy either gained-or-lost from the interaction!
    • John Lemke
       
      The transfer of energy involved to change speeds.
John Lemke

Cops Seize Car When Told To Get A Warrant, Tell Owner That's What He Gets For 'Exercisi... - 0 views

  • Officer Hatch spent most of his time trying to talk Zullo into allowing him to search the vehicle without a warrant. Hatch seemed to be convinced that Zullo was involved with the heroin traffickers he was searching for. Hatch tried everything, including lying.
  • As the officers and Zullo waited for the tow truck, they continued to try to get his permission for a search. Zullo held firm, so the cops ditched him miles from home in 20-degree weather. Mr. Zullo asked Hatch if he could retrieve his money and cell phone from his car, because he did not know how he would get home without either item. Hatch refused, saying that getting home was “not my problem,” and warned Mr. Zullo that if he attempted to retrieve those items from the car he would be arrested. When Mr. Zullo walked towards his car, Hatch placed his hands on Mr. Zullo to restrain him from reaching the car. After the tow truck arrived and took Mr. Zullo’s car, Hatch and the second state trooper left the scene, leaving Mr. Zullo stranded on the side of Route 7.
    • John Lemke
       
      They stranded him.
  • ...2 more annotations...
  • After being seized, Zullo's car was searched by Officer Hatch using an actual drug dog and an actual warrant [pdf link]. Nothing illegal was uncovered.
    • John Lemke
       
      They found nothing other than a possible civil charge.
  • Both the drug angle and the registration sticker angle dead end into a search and seizure based on non-criminal actions. The state does have an out (one that will likely be deployed in its defense against Zully's lawsuit) that still allows law enforcement to search for marijuana, even if what's discovered isn't a criminal amount.
John Lemke

$100 Million Pledged To Indie Film On Kickstarter... And 8,000 Films Made | Techdirt - 0 views

  • And, yes, the "but what about my $100 million movie" crowd will scoff and argue that this number is so "small." But, two points there: first, this number is growing very, very, very fast. And if you can't understand how trends explode, then you're going to be in trouble soon. Second -- and this is the more important point -- those funds helped create 8,000 films. For those who have been arguing about culture and how we're going to lose the ability to make movies... this suggests something amazing and important is happening which goes against all those gloom and doom predictions. By way of comparison, the UN, which keeps track of stats on film production, claimed that in 2009, 7,233 films were made. Worldwide.
  •  
    "Less than a year after being declared the darling of Sundance -- especially for not having "the arrogance of a studio" -- Kickstarter has announced that over $100 million has been pledged to indie film via its platform (which, of course, is hardly the only crowdfunding platform that filmmakers use, though it is the most popular). There are some caveats, of course. This is over Kickstarter's lifetime (since April 2009), but the numbers have been growing rapidly. $60 million of those pledges came in 2012. Also, that's pledges, not actual money given, since only projects that hit their target get the money. The actual total collected is $85.7 million -- which means that'll get over $100 million pretty quickly. "
John Lemke

Bad Police Info Led Spies To Monitor Dotcom, Govt. Suppressed Information | TorrentFreak - 0 views

  • Court documents have revealed how information supplied by New Zealand’s Organised and Financial Crime Agency led to Kim Dotcom and his associates being illegally monitored by GCSB, the Kiwi spy agency comparable to the United States’ CIA. Today a High Court judge expressed concern at the situation, with Dotcom’ legal team calling for an independent inquiry into the fiasco. Meanwhile, pressure continues to mount on Prime Minister John Key as it’s revealed the government issued an information suppression order.
  • According to court documents, GCSB checked with OFCANZ that both Dotcom and der Kolk were indeed foreign nationals. OFCANZ said they were, but in fact neither should have been spied on by GCSB. The monitoring went ahead anyway. In the High Court today, Justice Helen Winkelmann asked lawyers how it could be possible that GCSB hadn’t known about Dotcom’s New Zealand residency.
  • During an earlier hearing, Detective Inspector Grant Wormald of OFCANZ said that apart from surveillance carried out by the police, no other surveillance had been carried out against Dotcom. But with the revelation that GCSB had indeed been monitoring the Megaupload founder at the behest of OFCANZ, questions are now being raised about this apparent inconsistency, not least since Wormald previously acknowledged that a secret government unit had been involved in a pre-raid planning meeting in January.
John Lemke

Another Loss For Righthaven: Court Explains That Its Demand For Domain Names Is Silly |... - 0 views

  •  
    Righthaven hasn't been having too much luck lately. We've already covered how its having a bad day for a few different reasons, and here's another one. As you may know, in nearly every lawsuit Righthaven files, it also demands that the defendant hand over his or her website, in addition to the $75,000 to $150,000 it usually asks for. This has left a bunch of folks scratching their heads, as there's simply no precedent for saying that if you infringe on someone's copyright, they get your domain. And, now, we have a court making that point clear. Eric Goldman points us to a ruling in Las Vegas by judge Roger Hunt (the same judge who unsealed the filing that may kill off most of Righthaven's lawsuits...), in which he points out that asking for the domain name has no basis in law:
John Lemke

Federal Prosecutors, in a Policy Shift, Cite Warrantless Wiretaps as Evidence - NYTimes... - 0 views

  • The practice contradicted what Mr. Verrilli had told the Supreme Court last year in a case challenging the law, the FISA Amendments Act of 2008. Legalizing a form of the Bush administration’s program of warrantless surveillance, the law authorized the government to wiretap Americans’ e-mails and phone calls without an individual court order and on domestic soil so long as the surveillance is “targeted” at a foreigner abroad. A group of plaintiffs led by Amnesty International had challenged the law as unconstitutional. But Mr. Verrilli last year urged the Supreme Court to dismiss the case because those plaintiffs could not prove that they had been wiretapped. In making that argument, he said a defendant who faced evidence derived from the law would have proper legal standing and would be notified, so dismissing the lawsuit by Amnesty International would not close the door to judicial review of the 2008 law. The court accepted that logic, voting 5-to-4 to dismiss the case. In a statement, Patrick Toomey, staff attorney with the American Civil Liberties Union, which had represented Amnesty International and the other plaintiffs, hailed the move but criticized the Justice Department’s prior practice.
  • Still, it remains unclear how many other cases — including closed matters in which convicts are already service prison sentences — involved evidence derived from warrantless wiretapping in which the National Security Division did not provide full notice to defendants, nor whether the department will belatedly notify them. Such a notice could lead to efforts to reopen those cases.
John Lemke

Mars Orbiter Mission looks to sniff methane on comet - The Times of India - 0 views

  • BANGALORE: India's Mars Orbiter Mission (MOM) will look to have a date with the Siding Spring comet, which will pass very close to the Red Planet on October 19, Isro chairman K Radhakrishnan said on Thursday.
  • Asked how Nasa could do reprogramming on its MAVEN spacecraft to study the comet, Radhakrishnan said: "MAVEN reached there before us and has completed the orbit around the Red Planet. I have received mails about what they are going to do, and we know what we should. But MOM has to ascertain its position. It will be known in 2-3 days."
John Lemke

Scientists May Have Decoded One of the Secrets to Superconductors | Science | WIRED - 0 views

  • “In the same way that a laser is a hell of a lot more powerful than a light bulb, room-temperature superconductivity would completely change how you transport electricity and enable new ways of using electricity,” said Louis Taillefer, a professor of physics at the University of Sherbrooke in Quebec.
  • ripples of electrons inside the superconductors that are called charge density waves. The fine-grained structure of the waves, reported in two new papers by independent groups of researchers, suggests that they may be driven by the same force as superconductivity. Davis and his colleagues directly visualized the waves in a study posted online in April, corroborating indirect evidence reported in February by a team led by Riccardo Comin, a postdoctoral fellow at the University of Toronto.
  • Taken together, the various findings are at last starting to build a comprehensive picture of the physics behind high-temperature superconductivity. “This is the first time I feel like we’re making real progress,” said Andrea Damascelli, a professor of physics at the University of British Columbia who led two recent studies on charge density waves. “A lot of different observations which have been made over decades did not make sense with each other, and now they do.”
  • ...4 more annotations...
  • The community remained divided until 2012, when two groups using a technique called resonant X-ray scattering managed to detect charge density waves deep inside cuprates, cementing the importance of the waves. As the groups published their findings in Science and Nature Physics, two new collaborations formed, one led by Damascelli and the other by Ali Yazdani of Princeton University, with plans to characterize the waves even more thoroughly. Finishing in a dead heat, the rival groups’ independent studies appeared together in Science in January 2014. They confirmed that charge density waves are a ubiquitous phenomenon in cuprates and that they strenuously oppose superconductivity, prevailing as the temperature rises.
  • y applying Sachdev’s algorithm to a new round of data, Davis and his group mapped out the structure of the charge density waves, showing that the d-wave distribution of electrons was, indeed, their source.
  • The waves’ structure is particularly suggestive, researchers say, because superconducting pairs of electrons also have a d-wave configuration. It’s as if both arrangements of electrons were cast from the same mold. “Until a few months ago my thought was, OK, you have charge density waves, who cares? What’s the relevance to the high-temperature superconductivity?” Damascelli said. “This tells me these phenomena feed off the same interaction.”
  • In short, antiferromagnetism could generate the d-wave patterns of both superconductivity and its rival, charge density waves.
John Lemke

How LexisNexis and others may have unwittingly aided identity thieves | Ars Technica - 0 views

  • Wednesday's report exposes serious risks in what banks, mortgage companies, and other financial services call "knowledge-based authentication." Representatives from these services frequently rely on a list of about 100 questions such as "What was your previous address?" or "Which company services your mortgage?" when trying to determine if the person on the phone or filling out an application is the individual he claims to be. Ready access to the data stored by the data aggregators can make the difference between a fraudulent application being approved or rejected. Krebs goes on to recount a story told by Gartner fraud analyst Avivah Litan about a fellow analyst who witnessed an identity thief in action.
1 - 20 of 29 Next ›
Showing 20 items per page