Archive for 2011/01/21
Google’s Matt Cutts, principal engineer and lead voice on search-quality issues, said that the company will employ crowd-sourced feedback and other metrics in hopes of penalizing content scrapers and obviously low-content sites within its indexPosted: 2011/01/21 in Education / Awareness, Enforcement, Google
The Federation Against Software Theft, a not-for-profit group that campaigns for the legitimate use of software, has called on UK broadband ISPs to help combat unlawful copyright file sharing by their customers through the development of ‘mutual business models’Posted: 2011/01/21 in Education / Awareness, Enforcement, New Business Models
The European Commission (EC) has approved £1.528bn (€1.8 billion) in state aid (public funds) to help achieve its Digital Agenda targets for broadband development. The agenda promises, among other things, to bring “basic” and “competitively-priced” broadband internet access to all Europeans by 2013.
In addition the EU’s plan goes even further and aims to ensure that, by 2020, all Europeans have access to much higher internet speeds of above 30Mbps and 50% or more of EU households subscribe to internet access above 100Mbps.
The cash, which was all approved for various projects around the EU last year (2010), could potentially generate up to £2.97bn (€3.5 billion) of investment in the sector. The approved aid in 2010 is more than four times the amount allowed in 2009.
Rickard ”Rick” Falkvinge, born Dick Greger Augustsson (aka Dick W Augustsson from Fidonet) on 21 January 1972 in Gothenburg, is a Swedish IT entrepreneur known as the founder and ex party leader of the Swedish Pirate Party. He is currently an “political evangelist” within the party, working with spreading the politics. Falkvinge has previously worked as a project leader at Microsoft.
A man and woman who operated a 50TB capacity file-sharing hub have been found guilty of copyright infringement offensesPosted: 2011/01/21 in Education / Awareness, Enforcement, Illegal File Sharing, Litigation
Despite arguing that their 2,600 member system was set up merely for discussion, the pair now face paying damages to the IFPI of more than $1 million and suspended jail sentences totalling 7 months.
Facebook has defended its record in thwarting rogue applications and other security in the face of criticism from security firms that it ought to adopt tighter application controlsPosted: 2011/01/21 in Education / Awareness, Privacy / Data Protection
Britain’s broadcasters are struggling with the internet. Efforts to design a single, consistent IPTV platform have become mired by the need to accomodate participants’ existing services – some with commercial agendas, others without – and mud slung by competitors is beginning to stickPosted: 2011/01/21 in Education / Awareness, New Business Models, Tech Evolution
EMC, IBM, HP, and SAP Dump the BSA – Gone are the days when customers will pay for software just because there’s a proprietary wrapper on it and a big price tag. They increasingly demand real value for real money. Savvy vendors will embrace this trend rather than blindly fight piracy. They’ll embrace new models that enable efficient distribution of software and still allow payment for value deliveredPosted: 2011/01/21 in Education / Awareness, Enforcement, Illegal File Sharing, New Business Models, Tech Evolution
EMC, IBM, HP, and SAP Dump the BSA
Pirates: Good for Microsoft, great for open sourcers
A website that helps drivers avoid speeding tickets is warning its 10 million registered users that their email addresses and passwords may be in the hands of hackers who breached the site’s securityPosted: 2011/01/21 in Cybercrime, Education / Awareness, Privacy / Data Protection
Friends are likely to associate with people who are similar to them in terms of their DRD2 genotypes, and different when it comes to their CYP2A6 genotypesPosted: 2011/01/21 in Education / Awareness, Stats / reports
Previous studies have linked DRD2 to alcoholism, and it is possible that drinkers gravitate toward social scenes where booze is present, whereas non-drinkers are more likely to congregate in places where alcohol isn’t abundant. CYP2A6 has been associated with openness, and a mechanism driving the negative correlation between CYP2A6 genotypes is less obvious
The music industry has set an explicit goal: get graduated response laws passed everywhere because it “cannot compete with free.”
According to Israeli company Trusteer, which specialises in tracking the activities of Zeus and its variants, there are now at least 26 different configurations to attack one company alone, Money Bookers.
One thing that becomes clear is that along with the other services attacked – Web Money and Nochex, netSpend – this Zeus campaign is going after second-tier companies. Perhaps fearing attention, the criminals appear to be steering clear of large consumer payment services such as PayPal.
WikiLeaks, An all-expenses-paid study trip to the US: that was the offer to a number of prominent Dutch Muslims following the killing of controversial filmmaker Theo van Gogh in 2004Posted: 2011/01/21 in Education / Awareness, Public Policy
Nordin Ghoudani was one of those fortunate enough to be offered such a trip after being invited for a number of conversations at the US Embassy. Now that he is aware of being a cog in the wheel of US policy, he tells Dutch broadcaster NOS that he looks back on the trip with mixed feelings.
“The knowledge that Washington, and former president George W Bush, insisted on these trips… yes, that puts things in a different perspective.”
The most prominent of these contacts is Ahmed Aboutaleb, then Executive Councillor of Integration in Amsterdam and current Mayor of Rotterdam. Reporting on WikiLeaks documents, the NOS says Americans describe him as one of their best Muslim contacts. He too enjoyed an all-expenses-paid three-week study trip to the US.
Pictures of Putin’s Black Sea Palace published by Ruleaks, a group of self-proclaimed activists from the Pirate Party of Russia and Russian-speaking activists from other Pirate Parties around the worldPosted: 2011/01/21 in Education / Awareness, Public Policy
Ruleaks underwent a DDoS attack shortly after the photographs went live on January 18, making it temporarily impossible to access the website.
The photographs come one month after St. Petersburg businessman Sergei Kolesnikov sent an open letter to Russian President Dmitri Medvedev alleging that a palace “for the personal use of the Prime Minister of Russia” was being built on the Black Sea. “To date this palace costs over $1 billion U.S., mainly through a combination of corruption, bribery and theft.” Kolesnikov goes on to painstakingly detail the corrupt business dealings and theft of state funds that culminated in the creation of this complex. After publishing the letter, Kolesnikov reportedly went abroad and is waiting for the president’s reaction.
A Green Party member is considering reporting Foreign Minister Carl Bildt and Migration Minister Tobias Billström to a parliamentary committee following a WikiLeak exposing statements that they made in 2007 about Iraqi refugeesPosted: 2011/01/21 in Education / Awareness, Public Policy
If anyone needed proof that cyber activists can create havoc in the real world, the last few weeks have provided evidence in megabytesPosted: 2011/01/21 in Cybercrime, Education / Awareness
The controversial anti-piracy agreement ACTA is contrary to European law. This statement was recently made by a group of scientists from Dutch, German, British and Spanish universities. In a joint statement they urged the EU Member States, the European Parliament and the Commission to reject the current draft text of the ACTA agreement.
While cyberlockers have plenty of legitimate uses—they’re useful for sharing any type of work-related file one can think of—they can also be used to illegally share copyrighted material. And while the major services themselves don’t provide search engines, there are a number of third-party search engines that go ahead do provide that service. They also advertise what they do (FilesTube.com, for example, advertises right on its front page that it can help a user “search for files on rapidshare and other download sites.”) A search for a popular movie or TV show on one of these specialized search engines, like FilesTube.com, shows there’s plenty of pirated material that’s easily accessed through cyberlocker sites.
Here’s a video demo from BTIG analyst Rich Greenfield explaining to clients (sub. req.) how pirates can use cyberlockers to trade movies as new as Black Swan. (Skip to 1 minute and 35 seconds)
They encourage the stealing of private information for publication, even if it doesn’t pertain to any actual act of corruption, and hold the lives of others as collateral.
The journalist Suelette Dreyfus collaborated with Julian Assange to create Underground, a 1997 book about hackers in Australia and around the globe. Here she reveals the inside story on Assange, the geek who founded WikiLeaks and became the scourge of world governments.
WikiLeaks’ Julian Assange – A CypherPunk
WikiLeaks co-producer Rop Gonggrijp: First Hacker and Techno Anarchist of the Netherlands
Three years ago, at the 2007 (Chaos Computer Club) congress, WikiLeaks founder Julian Assange presented an early sketch of the now-contraversial website. There, he met CCC member, Daniel Domscheit-Berg, (then known by his alias, Daniel Schmitt), who until a few months ago was considered Assange’s number two at WikiLeaks. While the two groups are not formally affiliated, Frank Rosengart, a Chaos Computer Club spokesperson, said that his organization supports WikiLeaks because both groups have similar goals
Appelbaum has been an active member of the Cult of the Dead Cow hacker collective since 2008, and is the co-founder of the San Francisco hackerspace Noisebridge
The American Wikileaks Hacker
Hacker Against Hacker
Then there’s the matter of Lamo’s personal betrayal of Manning.
Evidently the 22-year-old Army intelligence analyst was something of a fan. He knew a lot about Lamo when he contacted him on May 21, and no doubt he believed he was reaching out to a kindred spirit.
From Indymedia to Wikileaks: What a decade of hacking journalistic culture says about the future of news
In the case of both Indymedia and WikiLeaks, developments which have had a serious impact on the newsroom have been powered by what I like to call the “leading politicized edge” of the online geek community.
Cypherpunk the Origin of Wikileaks