Other agencies gripe that NSA, FBI shut them out of data sharing
The New York Times' Eric Lichtblau and Michael S. Schmidt report that the NSA has turned away the majority of requests for information sharing from federal law enforcement agencies, on the grounds that the requests have too little to do with national security and could be misused in ways that violate citizens' privacy.
Obama Administration Sides With Apple on Import Ban Ruling
In a letter from U.S. Trade Representative Michael Froman, the Obama administration overruled an import ban on older iPhone and iPad models issued by the International Trade Commission at Samsung’s request earlier this year.
According to The Wall Street Journal, this is the first time since 1987 that an administration has vetoed a ban ordered by the Commission.
White Hat luxury car hacker to speak at USENIX security event despite UK injunction
The lead author of a controversial research paper about flaws in luxury car lock systems will deliver a presentation at this month’s USENIX Security Symposium even though a court ruling has forced the paper to be pulled from the event’s proceedings.
The argument against allowing publication of the researchers’ investigation into Megamos Crypto flaws is that it could lead to car theft.
FBI spooks use MALWARE to spy on suspects' Android mobes - report
The Federal Bureau of Investigation is using mobile malware to infect, and control, suspects' Android handsets, allowing it to record nearby sounds and copy data without physical access to the devices.
The usual techniques of not opening unknown attachments or unsigned downloads should protect you against the FBI, just as it would against any spear-phishing attempt.
Facebook migrates everyone to https connection
Facebook said Wednesday that https is now the default standard for everyone browsing its social network, meaning that almost all traffic to its Web site and a majority of traffic to its mobile site will be established through a secure connection.
The hope is to insulate people from man-in-the-middle and eavesdropping attacks, and prevent members' accounts from being comprised.
Newly leaked NSA program sees 'nearly everything' you do
According to Snowden's files on X-Keyscore, NSA employees can, with just a few clicks, obtain everything from phone numbers to e-mail addresses. The agency also can see e-mail content, full Internet activity, browser history, and an IP address. According to the files and Snowden, the NSA can essentially see everything a person is doing on the Internet without the need for a warrant.
The U.S. government, meanwhile, has dealt with the fallout from his leaks and has been criticized by foreign governments for its allegedly more-extensive-than-previously-believed intelligence programs. If the latest reports are true, the NSA could again come under fire from those critics.
ASCAP Asks FCC To Block Pandora From Buying Radio Station, Because ASCAP Doesn't Like Pandora
ASCAP has been offering iHeartRadio and other terrestrial stations that also do streaming cheaper licenses for their streaming than it offers to Pandora. Pandora has argued that this violates the antitrust agreement that the DOJ made ASCAP agree to, after it was discovered that ASCAP was engaged in a variety of anti-competitive practices to restrict the market.
ASCAP clearly has discriminatory pricing practices against online-only streaming companies -- and is embarrassed by Pandora making this point very clearly by purchasing this tiny radio station.
Kiwis rally against 'snoops' charter' law
Prime minister John Key dismissed the protests as small, saying that protesters are either “politically aligned” or “misinformed”.
The controversial legislation was introduced after the arrest of Kim Dotcom and fellow operators of the Megadownload Website in 2012 led to the discovery that the GCSB had intercepted his communications. This turned out to be illegal, since at the time Dotcom was a New Zealand resident.
Same Programs + Different Computers = Different Weather Forecasts
Most major weather services (US NWS, Britain's Met Office, etc) have their own supercomputers, and their own weather models. But there are some models which are used globally. A new paper has been published, comparing outputs from one such program on different machines around the world. Apparently, the same code, running on different machines, can produce different outputs due to accumulation of differing round-off errors.
UK Porn Filter: Censorship Extends Beyond Pornography, But One ISP Is Fighting Back
Cameron said the policy is aimed at combating child porn and the “corroding influences” of sexual content in the U.K., but several people are unhappy with the plan.
Users will also be required to opt in for any content tagged as violent, extremist, terrorist, anorexia and eating disorders, suicide, alcohol, smoking, web forums, esoteric material and web-blocking circumvention tools. These will all be filtered by default, and the majority of users never change default settings with online services.