Legislation in Portugal - cybercrime - 2 views
-
Some of the points are: 3. information falsitication The intention to cause errors in juridical relations by introducing, modifying, deleting or suppressing data or by producing non-genuine documents can lead to a fine of 120 to 600 days, or 5 years of jail. 4. Damage relative to programs or data Whoever does not have legal permission or the administrator's consent to delete, alter and impossibilitate utilisation of programs or data, will be punished with up to 3 years in jail or a fine. 5. electronic sabotage Whoever does not have legal permission or the administrator's consent to obstruct, interrupt of gravely disrupt the functioning of an information system through introduction of, alteration of, damaging of, or suppression of programs and data will be punished with up to 5 years in jail or a 600-day fine. 6. Ilegitimate access Whoever does not have legal permission or the administrator's consent and tries to access an IT system will be punished with up to 1 year in jail or a 120-day fine. Punishments also true for users who produce, sell or distribute a set of executable instructions destined to cause the aforementioned unauthorised actions. 7.Ilegitimate interception Whoever does not have legal permission or the administrator's consent and tries to intercept the transmission of data will be punished with 3 years of jail.
Wikipedia to shut for 24 hours to stop anti-piracy act - chicagotribune.com - 0 views
-
For details on the Wikipedia blackout that is planned for January 18, 2012 see Wikipedia:SOPA initiative http://en.wikipedia.org/wiki/Wikipedia:SOPA_initiative and http://en.wikipedia.org/wiki/Stop_Online_Piracy_Act
DNA link led to sex attack arrest - 4 views
-
The national DNA database proved "uniquely crucial" in an investigation that led to the conviction of a sex attacker in Essex. But police fear the service that helped to link Lawrence Button to the sexual assault of a former University of Essex student, in 2009, may be scaled back.
- ...3 more comments...
-
I agree with your first point to some extent, but I think that implying that it DNA profiling is 99.99% accurate is when in fact it is 99.9999999999% accurate (one to a trillion sir, get it right), is not acceptable - according to this http://www.guardian.co.uk/commentisfree/henryporter/2009/may/25/dna-database-false-positive I think that retaining DNA samples in databases and profiling an individual in a pervasively detailed manner could lead to extremes such as that of convicting criminals for pre-crimes, as portrayed in the film Minority Report. That would heavily compromise a citizen's privacy. http://3.bp.blogspot.com/-I7tBjrA8Mj0/TWPfWNY9-0I/AAAAAAAAADg/QTXlFpTtNvM/s1600/MINORITY+REPORT.jpg "The US government has come up with a Big Brother-esque machine that senses if an individual intends to do harm". The system, "Future Attribute Screening Technology (FAST), determines if a person intends to do harm by using a mal-intent algorithm that uses data from sensors that monitor a person's physiological and behavioral changes." http://news.techworld.com/security/3309928/tom-cruise-pre-crime-minority-report-machine-brought-to-life/
-
Good find Zhan! Would be interesting to see what the bods in the maths department have to say about "adventitious matches" and statistical probability. Maybe any of you who do HL maths can follow it up and add to this? Nice to see a reference to some classic sci-fi as well. This is a favourite read of mine. Also one of my all time top ten films! http://en.wikipedia.org/wiki/Do_Androids_Dream_of_Electric_Sheep%3F http://www.imdb.com/title/tt0083658/
BBC News - Storage sites unnerved by Megaupload action - 3 views
-
The arrest of Megaupload's founders has led to other file storage sites taking action in an apparent attempt to protect themselves from legal action. The following is a link to a news story describing the disciplinary action taken against the founder of Megaupload: http://www.bbc.co.uk/news/world-asia-16711416
- ...1 more comment...
-
How online storage works Online storage in websites such as Megaupload, upload.to and Rapidshare work using cloud storage. This is similar to the storage used in Gmail, Youtube and Facebook Essentially this is how it works: 1. User accesses websites and selects file he/she wants to upload 2. File is uploaded to the cloud storage server, which is located in the house cloud storage systems called data centers. 3. Usually the files are then copied to other servers around the world in case one of them goes down or needs repairing, this is known as redundancy. Without redundancy cloud storage cannot guarantee that the user will be ble to access his files. Servers are also powered by multiple power supplies in case one of them fails. 4. When the user wants to access the files he uploaded he may do so through a web-based interface. For more information on how cloud storage systems work http://computer.howstuffworks.com/cloud-computing/cloud-storage1.htm
-
http://www.techdirt.com/articles/20120121/16551717500/jonathan-coulton-destroys-rationale-behind-megaupload-seizure-with-single-tweet-follows-up-with-epic-blog-post.shtml In the article above Jonathon Coultron makes a good point. Although there might be a lot of illegal activity on MegaUpload such as: sharing DVDs and CDs, there are also a large group of people that use MegaUpload as a tool to legally upload data that they wish to share with others or keep a backup for themselves. Furthermore, I think his tweet says it all in regards to the millions of dollars the music and film industry will gain from the death of MegaUpload.
A Fair(y) Use Tale - Copyright - 1 views
-
An entertaining video on copyright laws. It covers these topics: Chapter 1: Copyright definition - 0.52 Chapter 2: What things can be copyrighted? - 2.52 Chapter 3: Copyright Duration and the Public Domain - 3.52 Chapter 4: Fair Use - 6.22 Chapter 5: Why use Disney cartoons? - 8.14 Credits - 8.52 Public domain
Feds: We obtained MegaUpload conversations with search warrant | Media Maverick - CNET ... - 2 views
-
there are hints that the FBI managed to place government-issued spyware on the defendants' computers.
-
The FBI cites alleged conversations between DotCom and his top lieutenants, including e-mail and Skype instant-messaging logs. Some of the records go back nearly five years,
-
Sources told CNET yesterday that Skype, the Internet phone service now owned by Microsoft, was not asked by the feds to turn over information and was not served with legal process.
- ...2 more annotations...
-
The concern is privacy.Apparently the FBI was able to acquire Kim DotCom's messages with other MegaUpload employers by means of spyware, which could access skype conversations stored on a local host. Even though the FBI had a warrant to search for information, this is still rather disconcerting. This software can easily be misused. The software is called CIPAV and it stands for Computer and Internet Protocol Address Verifier. This software is able to send "network-level messages" containing the target computer's IP address, Ethernet MAC address, environment variables, the last-visited Web site, and other registry-type information including the name of the registered owner of the computer and the operating system's serial number. http://news.cnet.com/8301-13578_3-10222294-38.html
-
I agree with you Morten. The social and ethical issue here is privacy. In the article they specify when saying "Sources told CNET yesterday that Skype, the Internet phone service now owned by Microsoft, was not asked by the feds to turn over information and was not served with legal process" that Skype did not give permission to the FBI to access this information. Even though the Data Protection Act states that "Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes." it is still not appropriate to "hack" into Kim DotCom's messages. Here is a link with the rules for Data Protection Act. http://www.legislation.gov.uk/ukpga/1998/29/schedule/1 Privacy is coming to bits, the only way we can talk to people knowing that knowing is going to get hold o f that information is by face-to-face communication, and even by that way people can be hearing the conversation secretly. Where has privacy gone?
Anonymous invites CIA, others to its weekend party | Security - CNET News - 2 views
-
Anonymous claimed to have hacked into police sites in Texas, Boston, and Salt Lake City, as well as the site of defense lawyers for a U.S.
-
This is a major security and reliability issue as government servers are not taking the right measures to protect people's personal information. Anonymous claim they only acquired a small amount of information just to prove how incompetent the system is, if it were a hacking group looking to use the data in illegal ways then this would be a big problem.
BBC News - Apple factories to face independent inspections - 2 views
-
I agree with the fact that Apple factories are going to face independent inspections. Everyone deserves a good to work at a safe environment, just like Apple's chief executive stated "Workers everywhere have the right to a safe and fair work environment.". I think it is a good idea to do so since suicides have occurred in the past and also because "137 workers in eastern China were injured after they used a poisonous chemical - n-hexane - to clean iPhone screens". This shows that the work environment isn't completely safe therefore I agree that Apple factories should be independently inspected.
-
http://www.bbc.co.uk/news/technology-16832106 This link is explaining that factory conditions for Apple are poor
-
As Ines pointed out there are some issues with the use of chemicals in Apple factories which make the work environment unsafe to work in however, I believe that if Apple's factories are independently inspected then all other factories should also go through the same process to ensure other factories aren't making employees work in unsafe environments.
Internet copyright law signed - The Irish Times - Wed, Feb 29, 2012 - 0 views
-
Minister of State for Research and Innovation Seán Sherlock said the statutory instrument was necessary “to ensure compliance with our obligations under EU law
-
Any remedy would also have to respect the rights of an ISP’s customers to protection of personal data and freedom to receive and impart information, he said.
-
SPs and rights holders would now be “stuck in court battles while the policymaking process decides the rule of the game”, Mr Ryan said.
Google 'fails EU privacy rules' - 1 views
-
28 February 2012 Last updated at 11:58 ET Google's been letting users of services know that its privacy policies will change on 1 March Google's new privacy policy may violate the European Union's data protection laws, according to the French data regulator. The search giant plans to unify 60 different privacy policies across its products from 1 March.
France Says Google Privacy Plan Likely Violates European Law - NYTimes.com - 1 views
-
The privacy policies of individual Google services, especially its StreetView mapping feature, have also been investigated in a number of European Union countries.
China calls for crackdown on 'toxic' internet rumours | World news | The Guardian - 3 views
-
"Concocting rumours is itself a social malady, and the spread of rumours across the internet presents a massive social threat," Xinhua said.
-
China has a vast and complex censorship system, but microblogs have played an increasing role in spreading news, developing public debate and uncovering scandals.
-
"The rapid advance of this flood [of internet users] has also brought 'mud and sand' - the spread of rumours - and to nurture a healthy internet, we must thoroughly eradicate the soil in which rumours grow,"
-
This is an excellent choice of article. Your choice of tags is spot on. You may find this interesting: http://www.greatfirewallofchina.org/
-
Thank you. Brilliant website that one. Was quite amused about the fact you can enter capitalism.org in China. I would've thought they banned that one. : )
GPS and vehicle surveillance - 0 views
Protect Our Right to Anonymity - 0 views
1 - 17 of 17
Showing 20▼ items per page