Skip to main content

Home/ Indie Nation/ Group items tagged blog

Rss Feed Group items tagged

John Lemke

Rep. Goodlatte Slips Secret Change Into Phone Unlocking Bill That Opens The DMCA Up For... - 0 views

  • Because of section 1201 of the DMCA, the "anti-circumvention" provision, companies have been abusing copyright law to block all sorts of actions that are totally unrelated to copyright. That's because 1201 makes it illegal to circumvent basically any "technological protection measures." The intent of the copyright maximalists was to use this section to stop people from breaking DRM. However, other companies soon distorted the language to argue that it could be used to block certain actions totally unrelated to copyright law -- such as unlocking garage doors, ink jet cartridges, gaming accessories... and phones
  • Separately, every three years, the Librarian of Congress gets to announce "exemptions" to section 1201 where it feels that things are being locked up that shouldn't be. Back in 2006, one of these exemptions involved mobile phone unlocking.
  • Every three years this exemption was modified a bit, but in 2012, for unexplained reasons, the Librarian of Congress dropped that exemption entirely, meaning that starting in late January of 2013, it was possible to interpret the DMCA to mean that phone unlocking was illegal. In response to this there was a major White House petition -- which got over 100,000 signatures, leading the White House to announce (just weeks later) that it thought unlocking should be legal -- though, oddly, it seemed to place the issue with the FCC to fix, rather than recognizing the problem was with current copyright law.
  • ...2 more annotations...
  • While this gives Goodlatte and other maximalists some sort of plausible deniability that this bill is making no statement one way or the other on bulk unlocking, it certainly very strongly implies that Congress believes bulk unlocking is, in fact, still illegal. And that's massively problematic on any number of levels, in part suggesting that the unlocker's motives in unlocking has an impact on the determination under Section 1201 as to whether or not it's legal. And that's an entirely subjective distinction when a bill seems to assume motives, which makes an already problematic Section 1201 much more problematic. Without that clause, this seemed like a bill that was making it clear that you can't use the DMCA to interfere with an issue that is clearly unrelated to copyright, such as phone unlocking. But with this clause, it suggests that perhaps the DMCA's anti-circumvention clause can be used for entirely non-copyright issues if someone doesn't like the "motive" behind the unlocker.
  • Unfortunately, the bill was deemed so uncontroversial that it's been listed on the suspension calendar of the House, which is where non-controversial bills are put to ensure quick passage. That means that, not only did Goodlatte slip in a significant change to this bill that impacts the entire meaning and intent of the bill long after it went through the committee process (and without informing anyone about it), but he also got it put on the list of non-controversial bills to try to have it slip through without anyone even noticing.
John Lemke

$100 Million Pledged To Indie Film On Kickstarter... And 8,000 Films Made | Techdirt - 0 views

  • And, yes, the "but what about my $100 million movie" crowd will scoff and argue that this number is so "small." But, two points there: first, this number is growing very, very, very fast. And if you can't understand how trends explode, then you're going to be in trouble soon. Second -- and this is the more important point -- those funds helped create 8,000 films. For those who have been arguing about culture and how we're going to lose the ability to make movies... this suggests something amazing and important is happening which goes against all those gloom and doom predictions. By way of comparison, the UN, which keeps track of stats on film production, claimed that in 2009, 7,233 films were made. Worldwide.
  •  
    "Less than a year after being declared the darling of Sundance -- especially for not having "the arrogance of a studio" -- Kickstarter has announced that over $100 million has been pledged to indie film via its platform (which, of course, is hardly the only crowdfunding platform that filmmakers use, though it is the most popular). There are some caveats, of course. This is over Kickstarter's lifetime (since April 2009), but the numbers have been growing rapidly. $60 million of those pledges came in 2012. Also, that's pledges, not actual money given, since only projects that hit their target get the money. The actual total collected is $85.7 million -- which means that'll get over $100 million pretty quickly. "
John Lemke

Corn-waste biofuels might be worse than gasoline in the short term | Plugged In, Scient... - 0 views

  • Biofuels made using corn waste could release 7 percent more greenhouse gases in the early years compared to conventional gasoline. As a result, this type of cellulosic ethanol could be inelligible to meet quotas under the 2007 Energy Independence and Security Act (EISA).
  • In the longer-term, the study says that these types of biofuels will result in a net emissions decrease. However, the short term increase is enough to keep this type of biofuel from complying with regulations in the 2007 Energy Independence and Security Act (EISA).
John Lemke

Hackers Using 'Shellshock' Bash Vulnerability to Launch Botnet Attacks - 0 views

  • Researchers on Thursday discovered a critical remotely exploitable vulnerability in the widely used command-line shell GNU Bourne Again Shell (Bash), dubbed "Shellshock" which affects most of the Linux distributions and servers worldwide, and may already have been exploited in the wild to take over Web servers as part of a botnet that is currently trying to infect other servers as well.
  • the vulnerability is already being used maliciously by the hackers.
  • There is as of yet no official patch that completely addresses both vulnerabilities, including the second, which allows an attacker to overwrite files on the targeted system.
  • ...3 more annotations...
  • It's things like CGI scripts that are vulnerable, deep within a website (like CPanel's /cgi-sys/defaultwebpage.cgi)," Graham wrote in a blog post. "Getting just the root page is the thing least likely to be vulnerable. Spidering the site and testing well-known CGI scripts (like the CPanel one) would give a lot more results—at least 10x." In addition, Graham said, "this thing is clearly wormable and can easily worm past firewalls and infect lots of systems. One key question is whether Mac OS X and iPhone DHCP service is vulnerable—once the worm gets behind a firewall and runs a hostile DHCP server, that would be 'game over' for large networks."
  • 32 ORACLE PRODUCTS VULNERABLE
  • PATCH ISSUED, BUT INCOMPLETE
  •  
    "Researchers on Thursday discovered a critical remotely exploitable vulnerability in the widely used command-line shell GNU Bourne Again Shell (Bash), dubbed "Shellshock" which affects most of the Linux distributions and servers worldwide, and may already have been exploited in the wild to take over Web servers as part of a botnet that is currently trying to infect other servers as well."
John Lemke

Man allegedly steals $100k coin collection then spends for face value on pizza and a mo... - 2 views

  • Garren denied the accusation back in May, telling police they, "didn't have any evidence against him," according to a report filed in Cowlitz County Superior Court.
  • But then Garren and Massman allegedly began using the coins at local establishments, spending them at face value, including a quarter that is estimated to be worth thousands of dollars. The Daily News reports the collection includes a variety of rare coins included Liberty Head quarters, Morgan dollars and several others dating back to the early 1800's, After police conducted their investigation, they now say the couple spend several 1930's coins at a Battle Ground area movie theater, using quarters worth between $5 and $68 each. Later on the same day, they then spend more of the coin collection at a local pizza restaurant, including a Liberty quarter with an estimated value between $1,100 and $18,500.
    • John Lemke
       
      I like the "but then" ... like he thought.. better ditch the evidence... no on will notice some of these coins are TWO centuries old"
John Lemke

Little red lawsuit: Prince sues 22 people for pirating his songs | The Verge - 0 views

  • The case, filed as Prince v. Chodera in the Northern District of California, reads, "The Defendants in this case engage in massive infringement and bootlegging of Prince's material." Only two defendants are named in the suit, however — the rest are listed as John Does, though eight do have the distinction of being regarded by their online handles. Nevertheless, Prince, based on "information and belief," alleges that each of the individuals worked together on Facebook and Blogger to conduct infringing activity, and lists extensively the mirror sites and blogs each used to distribute copies of his work. He has thus demanded $1 million with interest in damages from each of the defendants, along with a permanent injunction to prevent all of them from doing further harm.
John Lemke

Snowden documents show British digital spies use viruses and 'honey traps' * The Register - 0 views

  • "deny, disrupt, degrade and deceive" by any means possible.
  • A PowerPoint presentation from 2010 states that JTRIG activities account for five per cent of GCHQ's operations budget and uses a variety of techniques. These include "call bombing" to drown out a target's ability to receive messages, attacking targets in hotels, Psyops (psychological operations) against individuals, and going all the way up to disrupting a country's critical infrastructure.
  • According to reports in Der Spiegel last year, British intelligence has tapped the reservations systems of over 350 top hotels around the world for the past three years to set up Royal Concierge. It was used to spy on trade delegations, foreign diplomats, and other targets with a taste for the high life.
  • ...1 more annotation...
  • Targets can also be discredited with a "honey trap", whereby a fake social media profile is created, maybe backed up by a personal blog to provide credibility. This could be used to entice someone into making embarrassing confessions, which the presentation notes described as "a great option" and "very successful when it works."
  •  
    All that evil spy stuff in the hands of the government.   Big Brother is real.  Too Fin' real.
John Lemke

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputatio... - 0 views

  • “The Art of Deception: Training for Online Covert Operations.”
  • Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. 
  • Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends. The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
    • John Lemke
       
      Wow, how is not changing pictures and creating false victims not identity theft and conspiracy?  
  • ...4 more annotations...
  • it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption.
    • John Lemke
       
      Not only are you now guilty until proven innocent but, if you are guilty enough, we shall create a situation so that you are.
  • Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups. Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).
    • John Lemke
       
      So one of the guys who advocates this and approves of it, gets to be on the NSA review committee?  Isn't that like Ted Kennedy on the Ethics Review Committee or the Warren Commission?
  • Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.
John Lemke

Uroburos Rootkit: Most sophisticated 3-year-old Russian Cyber Espionage Campaign - The ... - 0 views

  • The researchers claimed that the malware may have been active for as long as three years before being discovered and appears to have been created by Russian developers.
  • The two main components of Uroburos are - a driver and an encrypted virtual file system, used to disguise its nasty activities and to try to avoid detection. Its driver part is extremely complex and is designed to be very discrete and very difficult to identify.
  • The virtual file system can’t be decrypted without the presence of drivers, according to the Gdata’s analysis explained in the PDF.
  • ...2 more annotations...
  • we assume that the group behind Uroburos is the same group that performed a cyberattack against the United States of America in 2008 with a malware called Agent.BTZ
  • The attacks carried out with Uroburos are targeting government institutions, research institutions, intelligence agencies, nation states, research institutions or companies dealing with sensitive information as well as similar high-profile targets. The oldest drivers identified by the researchers was compiled in 2011 is the evidence that the malware was created around three years ago and was undetected.
John Lemke

Snowden: I raised NSA concerns internally over 10 times before going rogue - 0 views

  • Snowden wrote that he reported policy or legal issues related to spying programs to more than 10 officials, but as a contractor he had no legal avenue to pursue further whistleblowing.
  • Yes. I had reported these clearly problematic programs to more than ten distinct officials, none of whom took any action to address them. As an employee of a private company rather than a direct employee of the US government, I was not protected by US whistleblower laws, and I would not have been protected from retaliation and legal sanction for revealing classified information about lawbreaking in accordance with the recommended process.
  • lsewhere in his testimony, Snowden described the reaction he received when relating his concer
John Lemke

In News That Will Surprise No One, NSA Has Cracked Mobile Phone Encryption To Listen In... - 0 views

  •  
    Just in case you have spent the past few presidencies in a closet.
John Lemke

South Korean Scientists Use E. Coli to Make Gasoline - Korea Real Time - WSJ - 0 views

  • Using genetically modified E. coli to generate biofuel isn’t new. U.K. scientists said in April they have developed a process under which the bacterium turns biomass into an oil that is almost identical to conventional diesel–a development that followed similar research by U.S. biotechnology firm LS9 in 2010. But the breakthrough this time is important because the reprogrammed E. coli can produce gasoline, a high-premium oil product that’s more expensive than diesel if the biofuel becomes commercially viable, according to Prof. Lee Sang-yup at the Korea Advanced Institute of Science and Technology. His team’s study was published in the international science journal Nature on Monday.
  • The significance of this breakthrough is that you don’t have to go through another process to crack the oil created by E. coli to produce gasoline. We have succeeded in converting glucose or waste biomass directly into gasoline,
  • only a few drops of the fuel per hour—making just 580 milligrams of gasoline from one liter of glucose culture.
John Lemke

The White House Big Data Report: The Good, The Bad, and The Missing | Electronic Fronti... - 0 views

  • the report recognized that email privacy is critical
  • one issue was left conspicuously unaddressed in the report. The Securities and Exchange Commission, the civil agency in charge of protecting investors and ensuring orderly markets, has been advocating for a special exception to the warrant requirement. No agency can or should have a get-out-of-jail-free card for bypassing the Fourth Amendment.
  • the algorithm is only as fair as the data fed into it.
  • ...22 more annotations...
  • the danger of discrimination remains due to the very digital nature of big data
  • especially the elderly, minorities, and the poor
  • an example of this in Boston, which had a pilot program to allow residents to report potholes through a mobile app but soon recognized that the program was inherently flawed because “wealthy people were far more likely to own smart phones and to use the Street Bump app. Where they drove, potholes were found; where they didn’t travel, potholes went unnoted.”
  • The authors of the report agree, recommending that the Privacy Act be extended to all people, not just US persons.
  • metadata (the details associated with your communications, content, or actions, like who you called, or what a file you uploaded file is named, or where you were when you visited a particular website) can expose just as much information about you as the “regular” data it is associated with, so it deserves the same sort of privacy protections as “regular” data.
    • John Lemke
       
      What is Metadate... then discuss
  • The report merely recommended that the government look into the issue.
    • John Lemke
       
      Did the report give a strong enough recommendation? "looking into" and doing are much different
  • several other government reports have taken a much stronger stance and explicitly stated that metadata deserves the same level of privacy protections as “regular” data.
  • We think the report should have followed the lead of the PCAST report and acknowledged that the distinction between data and metadata is an artificial one, and recommended the appropriate reforms.
    • John Lemke
       
      I very strongly agree.  The report failed in this area.
  • the White House suggested advancing the Consumer Privacy Bill of Rights, which includes the idea that “consumers have a right to exercise control over what personal data companies collect from them and how they use it,” as well as “a right to access and correct personal data.”
  • Consumers have a right to know when their data is exposed, whether through corporate misconduct, malicious hackers, or under other circumstances. Recognizing this important consumer safeguard, the report recommends that Congress “should pass legislation that provides a single national data breach standard along the lines of the Administration's May 2011 Cybersecurity legislative proposal.”
  • While at first blush this may seem like a powerful consumer protection, we don’t think that proposal is as strong as existing California law. The proposed federal data breach notification scheme would preempt state notification laws, removing the strong California standard and replacing it with a weaker standard.
    • John Lemke
       
      In other words, it failed at what can be done and it would actually lower standards when compared to what California has in place currently.
  • We were particularly disconcerted
  • the Fort Hood shooting by Major Nidal Hasan
    • John Lemke
       
      WTF? how did he get in this group?
  • two big concerns
  • First, whistleblowers are simply not comparable to an Army officer who massacres his fellow soldiers
  • Secondly, the real big-data issue at play here is overclassification of enormous quantities of data.
  • Over 1.4 million people hold top-secret security clearances. In 2012, the government classified 95 million documents. And by some estimates, the government controls more classified information than there is in the entire Library of Congress.
    • John Lemke
       
      Don't leave this stat out.  More classified documents than LOC documents.  WTF? A "democracy" with more secret documents than public?
  • The report argues that in today’s connected world it’s impossible for consumers to keep up with all the data streams they generate (intentionally or not), so the existing “notice and consent” framework (in which companies must notify and get a user’s consent before collecting data) is obsolete. Instead, they suggest that more attention should be paid to how data is used, rather than how it is collected.
    • John Lemke
       
      This is the most troubling part perhaps,  isn't the collection without consent where the breech of privacy begins?
    • John Lemke
       
      "notice and consent"
  • An unfortunate premise of this argument is that automatic collection of data is a given
  • While we agree that putting more emphasis on responsible use of big data is important, doing so should not completely replace the notice and consent framework.
  • Despite being a fairly thorough analysis of the privacy implications of big data, there is one topic that it glaringly omits: the NSA’s use of big data to spy on innocent Americans.
    • John Lemke
       
      If we ignore it, it will go away?  Did they not just mostly ignore it and accept it as a given for corporations and completely ignore it regarding the government? Pretty gangster move isn't it?
  • Even though the review that led to this report was announced during President Obama’s speech on NSA reform, and even though respondents to the White House’s Big Data Survey “were most wary of how intelligence and law enforcement agencies are collecting and using data about them,” the report itself is surprisingly silent on the issue.2 This is especially confusing given how much the report talks about the need for more transparency in the private sector when it comes to big data. Given that this same logic could well be applied to intelligence big data programs, we don’t understand why the report did not address this vital issue.
John Lemke

Sticky Nanobeads Can Strip Bacteria, Viruses From Blood - D-brief | DiscoverMagazine.com - 0 views

  • Bioengineers at Harvard’s Wyss Institute have developed a blood filter that quickly grabs toxins, such as E.coli or Ebola, from the bloodstream using protein-coated nanobeads and magnets. In early tests, the biomechanical treatment removed more than 90 percent of toxins from infected human blood within a few hours.
  • dubbed an “artificial spleen,” instead mechanically clears pathogens from the bloodstream, thereby reducing reliance on heavy doses of antibiotics. Its trick lies in magnetic nanobeads coated with a modified human protein. This protein binds to sugar molecules on the surfaces of more than 90 different bacteria, viruses and fungi, as well as to the toxins released by dead bacteria.
  • Researchers then tested their device by cleaning 5 liters of human blood spiked with a variety of pathogens. The device cleared blood at a rate of 1 liter per hour, and again removed over 90 percent of the pathogens.
1 - 20 of 35 Next ›
Showing 20 items per page