Skip to main content

Home/ StJulians_ITGS/ Group items tagged 2.6_law_control

Rss Feed Group items tagged

The Zhan

Legislation in Portugal - cybercrime - 2 views

  •  
    Some of the points are: 3. information falsitication The intention to cause errors in juridical relations by introducing, modifying, deleting or suppressing data or by producing non-genuine documents can lead to a fine of 120 to 600 days, or 5 years of jail. 4. Damage relative to programs or data Whoever does not have legal permission or the administrator's consent to delete, alter and impossibilitate utilisation of programs or data, will be punished with up to 3 years in jail or a fine. 5. electronic sabotage Whoever does not have legal permission or the administrator's consent to obstruct, interrupt of gravely disrupt the functioning of an information system through introduction of, alteration of, damaging of, or suppression of programs and data will be punished with up to 5 years in jail or a 600-day fine. 6. Ilegitimate access Whoever does not have legal permission or the administrator's consent and tries to access an IT system will be punished with up to 1 year in jail or a 120-day fine. Punishments also true for users who produce, sell or distribute a set of executable instructions destined to cause the aforementioned unauthorised actions. 7.Ilegitimate interception Whoever does not have legal permission or the administrator's consent and tries to intercept the transmission of data  will be punished with 3 years of jail.
Mr Brooke

Wikipedia to shut for 24 hours to stop anti-piracy act - chicagotribune.com - 0 views

  •  
    For details on the Wikipedia blackout that is planned for January 18, 2012 see Wikipedia:SOPA initiative http://en.wikipedia.org/wiki/Wikipedia:SOPA_initiative and http://en.wikipedia.org/wiki/Stop_Online_Piracy_Act
Jorge F1

DNA link led to sex attack arrest - 4 views

  •  
    The national DNA database proved "uniquely crucial" in an investigation that led to the conviction of a sex attacker in Essex. But police fear the service that helped to link Lawrence Button to the sexual assault of a former University of Essex student, in 2009, may be scaled back.
  • ...3 more comments...
  •  
    This article compromises the privacy of British citizens, as well as the reliability and integrity of the DNA database. I will focus my comment on the latter. It was a matter of fortune that Button's DNA had been collected due to his arrest for a domestic assault in May 2010. This is because according to the Protection of Freedoms Bill, biometric material can only be retained if the holder consents it formally. This consent "can be withdrawn at any time". There are also strict regulations on the amount of time that a DNA profile can be retained by authorities according to the new Bill. In addition to that, what way is there to ensure the 62 million(http://en.wikipedia.org/wiki/United_Kingdom) British citizens have their DNA profile taken and input in the database? This compromises the integrity and completeness of the DNA database. According to the article itself, "The national database is believed to hold over five million DNA profiles". The new Bill also "requires schools to get parents' consent before processing children's biometric information" (http://services.parliament.uk/bills/2010-11/protectionoffreedoms.html) The full official bill on the regulation of biometric data can be found at: http://www.publications.parliament.uk/pa/bills/lbill/2010-2012/0099/lbill_2010-20120099_en_2.htm#pt1-ch1-pb1-l1g1 Hence the sweeping statement "The odds, we were told, were over a billion to one, so we were quite confident we'd got the right man", is certainly misleading, because the database is likely not to include a fraction of the British population. The most disturbing thing is that the responsible chief Richard McNamara states "it was the DNA alone that convicted the man, because we never had any other evidence". Is it really ethical to convict a criminal solely based on a potentially incomplete database? A solution to this problem would be to enforce surveillance systems and active police monitoring in order to obtain more plausible evidence.
  •  
    This article regards the compromising of the privacy of British citizens, as well as the reliability and integrity of the DNA database. I will focus my comment on the latter.
  •  
    "The Zhan" you raise some interesting points on the privacy issues of DNA databases. However I think you may have misunderstood the reliability issue of the DNA test. When two DNA samples are found to be the same then it is 99.99% certain that it is in fact the DNA of the suspect and is a very reliable indicator that it was that person. There are forensic issues involved in the collection and contamination of DNA samples from a crime scene but that is another issue. The main social and ethical issue here that you have rightly pointed out is the collection and storage of DNA from people. This article outlines some of these issues from 2008: http://news.bbc.co.uk/2/hi/uk_news/7177152.stm Here the issue of innocent peoples data being stored has come because ....."following a change in the law in 2001, all DNA collected by forensics - for whatever purpose - can be stored permanently. " It was promised in the recent election in the UK to destroy old data but it appears to be one of the many U turns that the current government has made: http://www.telegraph.co.uk/comment/telegraph-view/8659968/A-Bill-to-curtail-our-liberty.html
  •  
    I agree with your first point to some extent, but I think that implying that it DNA profiling is 99.99% accurate is when in fact it is 99.9999999999% accurate (one to a trillion sir, get it right), is not acceptable - according to this http://www.guardian.co.uk/commentisfree/henryporter/2009/may/25/dna-database-false-positive I think that retaining DNA samples in databases and profiling an individual in a pervasively detailed manner could lead to extremes such as that of convicting criminals for pre-crimes, as portrayed in the film Minority Report. That would heavily compromise a citizen's privacy. http://3.bp.blogspot.com/-I7tBjrA8Mj0/TWPfWNY9-0I/AAAAAAAAADg/QTXlFpTtNvM/s1600/MINORITY+REPORT.jpg "The US government has come up with a Big Brother-esque machine that senses if an individual intends to do harm". The system, "Future Attribute Screening Technology (FAST), determines if a person intends to do harm by using a mal-intent algorithm that uses data from sensors that monitor a person's physiological and behavioral changes." http://news.techworld.com/security/3309928/tom-cruise-pre-crime-minority-report-machine-brought-to-life/
  •  
    Good find Zhan! Would be interesting to see what the bods in the maths department have to say about "adventitious matches" and statistical probability. Maybe any of you who do HL maths can follow it up and add to this? Nice to see a reference to some classic sci-fi as well. This is a favourite read of mine. Also one of my all time top ten films! http://en.wikipedia.org/wiki/Do_Androids_Dream_of_Electric_Sheep%3F http://www.imdb.com/title/tt0083658/
Jorge F1

BBC News - Storage sites unnerved by Megaupload action - 3 views

  •  
    The arrest of Megaupload's founders has led to other file storage sites taking action in an apparent attempt to protect themselves from legal action. The following is a link to a news story describing the disciplinary action taken against the founder of Megaupload: http://www.bbc.co.uk/news/world-asia-16711416
  • ...1 more comment...
  •  
    The manner of his arrest is unnerving. Apparently they used two helicopters, had to break down doors and electronic locks - only to find him in a safe room with sawed off shotgun. Seems like something out of a B-movie. Even more so, when you consider that these things are allowed under the current regulations. If SOPA, ACTA or equivalent passes and gives the government more free reins, it becomes truly terrifying(bit exaggerated, I know). Megaupload is claiming to be "just like youtube". Check this article out, his lawyer is making quite the argument for it. http://arstechnica.com/tech-policy/news/2012/01/were-just-like-youtube-megaupload-lawyer-tells-ars.ars He was the lawyer to defend isohunt.com as well. A well known search engine for torrents.
  •  
    How online storage works Online storage in websites such as Megaupload, upload.to and Rapidshare work using cloud storage. This is similar to the storage used in Gmail, Youtube and Facebook Essentially this is how it works: 1. User accesses websites and selects file he/she wants to upload 2. File is uploaded to the cloud storage server, which is located in the house cloud storage systems called data centers. 3. Usually the files are then copied to other servers around the world in case one of them goes down or needs repairing, this is known as redundancy. Without redundancy cloud storage cannot guarantee that the user will be ble to access his files. Servers are also powered by multiple power supplies in case one of them fails. 4. When the user wants to access the files he uploaded he may do so through a web-based interface. For more information on how cloud storage systems work http://computer.howstuffworks.com/cloud-computing/cloud-storage1.htm
  •  
    http://www.techdirt.com/articles/20120121/16551717500/jonathan-coulton-destroys-rationale-behind-megaupload-seizure-with-single-tweet-follows-up-with-epic-blog-post.shtml In the article above Jonathon Coultron makes a good point. Although there might be a lot of illegal activity on MegaUpload such as: sharing DVDs and CDs, there are also a large group of people that use MegaUpload as a tool to legally upload data that they wish to share with others or keep a backup for themselves. Furthermore, I think his tweet says it all in regards to the millions of dollars the music and film industry will gain from the death of MegaUpload.
The Zhan

A Fair(y) Use Tale - Copyright - 1 views

  •  
    An entertaining video on copyright laws. It covers these topics: Chapter 1: Copyright definition - 0.52 Chapter 2: What things can be copyrighted? - 2.52 Chapter 3: Copyright Duration and the Public Domain - 3.52 Chapter 4: Fair Use - 6.22 Chapter 5: Why use Disney cartoons? - 8.14 Credits - 8.52 Public domain
Morten Nielsen

Feds: We obtained MegaUpload conversations with search warrant | Media Maverick - CNET ... - 2 views

  • there are hints that the FBI managed to place government-issued spyware on the defendants' computers.
  • The FBI cites alleged conversations between DotCom and his top lieutenants, including e-mail and Skype instant-messaging logs. Some of the records go back nearly five years,
  • Sources told CNET yesterday that Skype, the Internet phone service now owned by Microsoft, was not asked by the feds to turn over information and was not served with legal process.
  • ...2 more annotations...
  • Ira Rothken, MegaUpload's attorney, declined to comment yesterday about how his client's internal documents were obtained by the government, but said the government's "allegations are flimsy under the law."
  • On January 19, New Zealand police raided the home of DotCom in a rural area outside of Auckland. The U.S. government is seeking to extradite DotCom; a local judge denied bail and an extradition hearing is scheduled for February 22.
  •  
    The concern is privacy.Apparently the FBI was able to acquire Kim DotCom's messages with other MegaUpload employers by means of spyware, which could access skype conversations stored on a local host. Even though the FBI had a warrant to search for information, this is still rather disconcerting. This software can easily be misused. The software is called CIPAV and it stands for Computer and Internet Protocol Address Verifier. This software is able to send "network-level messages" containing the target computer's IP address, Ethernet MAC address, environment variables, the last-visited Web site, and other registry-type information including the name of the registered owner of the computer and the operating system's serial number. http://news.cnet.com/8301-13578_3-10222294-38.html
  •  
    I agree with you Morten. The social and ethical issue here is privacy. In the article they specify when saying "Sources told CNET yesterday that Skype, the Internet phone service now owned by Microsoft, was not asked by the feds to turn over information and was not served with legal process" that Skype did not give permission to the FBI to access this information. Even though the Data Protection Act states that "Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes." it is still not appropriate to "hack" into Kim DotCom's messages. Here is a link with the rules for Data Protection Act. http://www.legislation.gov.uk/ukpga/1998/29/schedule/1 Privacy is coming to bits, the only way we can talk to people knowing that knowing is going to get hold o f that information is by face-to-face communication, and even by that way people can be hearing the conversation secretly. Where has privacy gone?
Ines Simon

Anonymous invites CIA, others to its weekend party | Security - CNET News - 2 views

  • Anonymous claimed to have hacked into police sites in Texas, Boston, and Salt Lake City, as well as the site of defense lawyers for a U.S.
    • Ines Simon
       
       (This hacker chart lists much of Anonymous' activity since last year.)
  •  
    This is a major security and reliability issue as government servers are not taking the right measures to protect people's personal information. Anonymous claim they only acquired a small amount of information just to prove how incompetent the system is, if it were a hacking group looking to use the data in illegal ways then this would be a big problem.
Jorge F1

BBC News - Apple factories to face independent inspections - 2 views

  •  
    I agree with the fact that Apple factories are going to face independent inspections. Everyone deserves a good to work at a safe environment, just like Apple's chief executive stated "Workers everywhere have the right to a safe and fair work environment.". I think it is a good idea to do so since suicides have occurred in the past and also because "137 workers in eastern China were injured after they used a poisonous chemical - n-hexane - to clean iPhone screens". This shows that the work environment isn't completely safe therefore I agree that Apple factories should be independently inspected.
  •  
    http://www.bbc.co.uk/news/technology-16832106 This link is explaining that factory conditions for Apple are poor
  •  
    As Ines pointed out there are some issues with the use of chemicals in Apple factories which make the work environment unsafe to work in however, I believe that if Apple's factories are independently inspected then all other factories should also go through the same process to ensure other factories aren't making employees work in unsafe environments.
Morten Nielsen

Internet copyright law signed - The Irish Times - Wed, Feb 29, 2012 - 0 views

  • Minister of State for Research and Innovation Seán Sherlock said the statutory instrument was necessary “to ensure compliance with our obligations under EU law
  • Any remedy would also have to respect the rights of an ISP’s customers to protection of personal data and freedom to receive and impart information, he said.
  • SPs and rights holders would now be “stuck in court battles while the policymaking process decides the rule of the game”, Mr Ryan said.
Jorge F1

Google 'fails EU privacy rules' - 1 views

  •  
    28 February 2012 Last updated at 11:58 ET Google's been letting users of services know that its privacy policies will change on 1 March Google's new privacy policy may violate the European Union's data protection laws, according to the French data regulator. The search giant plans to unify 60 different privacy policies across its products from 1 March.
Ines Simon

France Says Google Privacy Plan Likely Violates European Law - NYTimes.com - 1 views

  • The privacy policies of individual Google services, especially its StreetView mapping feature, have also been investigated in a number of European Union countries.
Morten Nielsen

China calls for crackdown on 'toxic' internet rumours | World news | The Guardian - 3 views

  • "Concocting rumours is itself a social malady, and the spread of rumours across the internet presents a massive social threat," Xinhua said.
  • China has a vast and complex censorship system, but microblogs have played an increasing role in spreading news, developing public debate and uncovering scandals.
  • "The rapid advance of this flood [of internet users] has also brought 'mud and sand' - the spread of rumours - and to nurture a healthy internet, we must thoroughly eradicate the soil in which rumours grow,"
  •  
    This is an excellent choice of article. Your choice of tags is spot on. You may find this interesting: http://www.greatfirewallofchina.org/
  •  
    Thank you. Brilliant website that one. Was quite amused about the fact you can enter capitalism.org in China. I would've thought they banned that one. : )
1 - 17 of 17
Showing 20 items per page