BT's 'illegal' 2007 Phorm trial profiled tens of thousands
BT's covert trial of Phorm's ISP adware technology in summer 2007 involved tracking many thousands more customers without their knowledge than previously reported, it's emerged.
Today Phorm said the 2007 trial was actually performed on "tens of thousands" of lines. It refused to provide a specific figure, but at the absolute least there are 38,000 BT Retail customers unaware their communications have been allegedly criminally intercepted in the last two years. The number could be as high as 108,000.
Don Foster MP, a Liberal Democrat who has taken a lead in parliament over the Phorm controversy, has called on BT to reveal the details of its allegedly illegal action.
Phorm and BT say their lawyers told them the trials were legal, but won't say why.
China being 'demonised'
Fu Ying said Chinese athletes who came to London for the Olympic torch relay last Sunday "were convinced that people here were against them" after "violent attacks on the torch".
"Many who had romantic views of the West are very disappointed at the media's attempt to demonise China."
She said many of those who protested had probably not been to Tibet which she described as a land "loved" by the Chinese people.
"There may be complicated problems of religion mixing with politics, but people are well-fed, well-clothed and and well-housed."
"Many complain about China not allowing enough access to the media. In China, the view is that the Western media need to earn respect."
Network Solutions hijacks customer sub-domains for ad fest
Shameless domain registrar and web hoster Network Solutions is hijacking its customers' sub-domains, filling these pilfered pages with a sea of money-making ad links.
Betteridge hosts GotGame with "NetSol," and somewhere along the way, he realized that his unused GotGame sub-domains resolved to ad-infested "parking" pages.
Yes, you can opt out this questionable program. But first you have to know about it. The EULA housing the above paragraph is 59,000 words long.
Of course, this isn't nearly as bad the company's domain front running scam. Which it continues to call a "security measure."
Mediasentry Violates Cease & Desist Order
On January 2, 2008, the Massachusetts State Police ordered MediaSentry, the RIAA's investigator, to cease and desist from conducting investigations in Massachusetts without a license. Based on what appears to be irrefutable proof that MediaSentry has been violating that order, the Boston University students who tentatively won, in London-Sire v. Doe 1, an order tentatively quashing the subpoena for their identities, have brought a new motion to vacate the RIAA's court papers altogether, on the ground that the RIAA's 'evidence' was procured by criminal behavior.
Breaking into a power station in three easy steps
"I will tell (you) how to break into a nuclear reactor," Ira Winkler, president of security firm ISAG said as he launched into his presentation on "How to Take Down the Power Grid" at RSA 2008 on Tuesday night.
First, you set up a Web server that downloads spyware onto the computers that visit.
Second, you send an e-mail to people who work inside a power station that entices them to click on a hyperlink to the Web server with the spyware.
Third, you wait as the recipients--and everyone else they forwarded the e-mail to--visit the server and get infected.
"Then we had full system control," he said. "Once the malware was downloaded onto their systems...we could see the screens and manipulate the cursors."
"It had to be shut down after a couple of hours because it was working too well," he said.
DVD piracy too rife among police to prosecute
Hundreds of police officers across South Australia caught using their work computers to illegally copy movie DVDs will escape prosecution.
The activity - strictly banned under federal copyright laws - was detected during an audit conducted by the information technology branch of SA Police.
Police sources have told The Advertiser an official investigation, which could lead to criminal charges, will not be conducted because of the large number of police officers involved in copying DVDs.
Torch relay may be dropped for 2012
The tradition of an international torch relay could be discontinued for the London 2012 Olympics, organisers said.
She denied that the uncertainty about an international relay was in response to the pro-Tibetan demonstrations in London.
Police made 37 arrests as thousands of human rights campaigners tried to disrupt the procession.
Organisers were forced to cancel the final series of relays through Paris following another day of anti-China protests.
Lawyer Who Threatened File-Sharers is Banned For 6 months
For anti-piracy company, Logistep, life is becoming more and more difficult by the day. They have been deemed to be operating illegally in Italy and have been slammed over privacy issues in the home country, Switzerland.
Lawyer Elizabeth Martin had been demanding 400 Euros from hundreds of thousands of file-sharers who Logistep say had been infringing the rights of software company Techland, on their game 'Call of Juarez'.
Unfortunately for Elizabeth Martin, it's not just the general public who are disgusted by her actions. She has been the subject of a Conseil de l'Ordre du Barreau de Paris disciplinary investigation - and subsequent condemnation - by none other than her own peers.
Elizabeth Martin was ordered by the disciplinary board to suspend her activities as a lawyer for 6 months. Furthermore, she was banned from belonging to the National Council of the Bars (CNB) and other such professional associations for a period of 10 years.
ISPs Using "Deep Packet Inspection" on 100,000 Users
Some Internet Service Providers (ISP) have been using deep-packet inspection to spy on the communications of more than 100,000 US customers. Deep packet inspection allows the ISP to read the content of communications including every Web page visited, every e-mail sent and every search entered, in short every click and keystroke that comes down the line. The companies involved assert that customers' privacy is protected because no personally identifying details are released, but they make money from advertisers who use the information to target their online pitches.
U.S. reveals plans to hit back at cyberthreats
The U.S. Air Force Cyber Command is developing capabilities to inflict denial of service, confidential data loss, data manipulation, and system integrity loss on its adversaries, and to combine these with physical attacks, according to a senior U.S. general.
"Terrorists and criminals are doing the same thing. We depend so heavily as a military on the use of cyber, we have to be cautious about it," Elder said. "Cyber gives us a huge advantage, but adversaries look at our capabilities and see areas they can undermine. We need to protect our asymmetric advantage--on the one hand by having people further exploit cyber, and on the other by having mission assurance."
"We're trying to move away from clandestine operations. We're looking for real physics--a bigger bang resulting in collateral damage."