Archive for 2012/04/24
Software company Micro Focus is claiming that the police are making unauthorized use of its ViewNow software, which they use to access the COPS criminal intelligence database. In addition, it’s alleged that the police shared the proprietary software with third parties. Micro Focus is fighting the case in court and is demanding at least $10 million in damages.
Hadopi only dealt with peer-to-peer file sharing, rather than cyberlockers such as Megaupload and Rapidshare – but a proposal would be forthcoming soonPosted: 2012/04/24 in Copyright, Education / Awareness, Enforcement, Illegal File Sharing, Public Policy, Stats / reports, Three Strikes
Just as with Dropbox, SkyDrive, or any other cloud service provider, if you have something to hide from the government, don’t put it in the cloud. Here’s whyPosted: 2012/04/24 in Education / Awareness, Privacy / Data Protection, Stats / reports, The Cloud
UK Law grants lifelong anonymity for rape survivors. However, two days after the sentence had been passed on the footballer, the rape victim had been publicly named on TwitterPosted: 2012/04/24 in Education / Awareness
In summary, we urge you to reject legislation that:
- Uses vague language to describe network security attacks, threat indicators, and countermeasures, allowing for the possibility that innocuous online activities could be construed as “cybersecurity” threats.
- Exempts “cybersecurity” activities from existing laws that protect individuals’ privacy and devices, such as the Wiretap Act, the Stored Communications Act, and the Computer Fraud and Abuse Act.
- Gives sweeping immunity from liability to companies even if they violate individuals’ privacy, and without evidence of wrongdoing.
- Allows data originally collected through “cybersecurity” programs to be used to prosecute unrelated crimes.
We appreciate your interest in making our networks more secure, but passing legislation that suffers from the problems above would be a grave mistake for privacy and civil liberties, and will not be a step forward in making us safer.
- Bruce Schneier. Prominent security researcher and cryptographer, published seminal works on applied cryptography. Active in public policy regarding security issues; runs a weblog and writes a regular column for Wired magazine.
- David J. Farber. Distinguished Career Professor of Computer Science and Public Policy, Carnegie Mellon University. Designer of the first electronic switching system. Was a major contributor to early programming languages and computer networking. EFF board member.
- Donald Eastlake. Original architect of DNS Security, network security expert. Chair of IETF TRILL and IETF PPPEXT working groups.
- Peter Swire. C. William O’Neill Professor of Law, Ohio State University. Former Assistant to President Obama for Economic Policy, and former Chief Counselor for Privacy in the U.S. Office of Management and Budget.
- Eric Burger. Research Professor of Computer Science and Director, Georgetown Center for Secure Communications, Georgetown University. Chair of multiple IETF Working Groups.
- Tobin Maginnis. Professor of Computer and Information Science, University of Mississippi. Operating system researcher, GNU/Linux expert, Web architecture researcher and networking expert.
- Sharon Goldberg. Professor of Computer Science, Boston University. Network security researcher, member of FCC CSRIC working group on BGP security.
- Peter G. Neumann. Principal Engineer, SRI International Computer Science Laboratory; moderator, ACM Risks Forum. Affiliation listed for purposes of identification only.
- Stephen H. Unger. Professor Emeritus, Computer Science and Electrical Engineering, Columbia University. Board of Governors of IEEE Society on Social Implications of Technology (SSTI).
- Geoff Kuenning. Professor of Computer Science and CS Clinic Director. Harvey Mudd College. File system researcher, built the SEER predictive hoarding system to predict what files mobile users will need while disconnected from a network.
- Benjamin C. Pierce. Professor of Computer and Information Science, University of Pennsylvania. Research on differential privacy, which allows formal reasoning about real-world privacy.
- Richard F. Forno. Professor of Computer Science focused on cybersecurity, signing as a private citizen.
- Jonathan Weinberg. Professor of Law, Wayne State University. Chair of ICANN working group, and expert on communications policy.
- Joseph “Jay” Moran. Distinguished engineer, AOL technical operations. Experienced executive working in technical operations and engineering for 20+ years.
- Dan Gillmor. Technology writer and columnist. Director of Knight Center for Digital Media Entrepreneurship at Arizona State University, Fellow at the Berkman Center for Internet and Society, Harvard University. EFF pioneed award winner.
- Armando P. Stettner. Technologist and senior member of IEEE, spearheaded native VAX version of Unix.
- Gordon Cook. Technologist, writer, editor and publisher of “COOK report on Internet Protocol” since 1992.
- Alexander McMillen. Entrepreneur and CEO, Sliqua Enterprise Hosting.
- Sid Karin. Professor of Computer Science and Engineering, University of California, San Diego. Former founding Director of the San Diego Supercomputer Center (SDSC) and National Partnership for Advanced Computational Infrastructure (NPACI).
- Eric Brunner-Williams. CTO, Wampumpeag. Signing as an individual.
- Lawence C. Stewart. CTO, Cerissa research. Built the Etherphone at Xerox, the first telephone system working over a local area network; designed early e-commerce systems for the Internet at Open Market.
- Ben Huh. Entrepreneur, CEO Cheezburger Inc.
- Dave Burstein. Editor, DSL Prime.
- Mikki Barry. Managing partner, Making Sense of Compliance.
- Blake Pfankuch. Network engineer.
- John Peach. Systems Administrator with 20+ years of experience.
- Valdis Kletnieks. IT Professional, Virginia Tech University.
- Darrell Hyde. Director of Architecture, Hosting.com.
- Ryan Rawdon. Network and Security Engineer, was on the technical operations team for one of our country’s largest residential ISPs.
- Ken Anderson. VP of Engineering, Pacific Internet.
- Andrew McConachie. Network engineer working on Internet infrastructure.
- Richard Kulawiec. Senior network security architect with over 30 years experience.
- Aaron Wendel. CTO, Whalesale Internet, Inc.
- David Richardson. Center for High Performance Computing, University of Utah.
- David M. Miller. CTO / Executive VP for DNS Made Easy.
- Marshall Eubanks. Entrepreneur and CEO, America Free TV.
- Edward Arthurs. Manager of Network Installations, Legacy Inmate Communications, Legacy Contact Center, Legacy Long Distance Intl. Inc.
- Christopher Liljenstolpe. Chair of the IETF Operations and Management Area Working Group. Chief architect for AS3561 (at the time about 30% of the Internet backbone by traffic) and AS1221 (Australia’s main Internet infrastructure).
- Christopher McDonald. Vice President, PCCW Global.
- Joseph Lorenzo Hall. Research Fellow focused on health information technology and electoral transparency, New York University.
- Ronald D. Edge. IT expert.
- David Henkel-Wallace. Vice President of Engineering. Terrajoule Corporation.
- John Pettitt. Internet commerce pioneer, online since 1983, CEO Free Range Content Inc.; founder/CTO CyberSource & Beyond.com; created online fraud protection software that processes over 2 billion transaction a year
- Ben Kamen. I.T./EE Professional.
- Christopher Soghoian. Graduate Fellow, Center for Applied Cybersecurity Research, Indiana University.
- Jo Young. IT professional.
- Mark Hull-Richter. Senior software engineer.
- Joop Cousteau. VP, Global Network Technology. KLM Airlines USA Ltd.
- Jonathan Mayer. Graduate researcher, Security Lab and the Center for Internet and Society, Stanford University
- Jeremy Sliwinski. Network engineer with 10+ years of experience.
- Nathan Syfrig. Software Engineer and IT Consultant.
Stanford’s public-relations arm proclaims that five thousand companies “trace their origins to Stanford ideas or to Stanford faculty and students.” They include Hewlett-Packard, Yahoo, Cisco Systems, Sun Microsystems, eBay, Netflix, Electronic Arts, Intuit, Fairchild Semiconductor, Agilent Technologies, Silicon Graphics, LinkedIn, and E*Trade…
“… Stanford’s entrepreneurial culture has also turned it into a place where many faculty and students have a gold-rush mentality and where the distinction between faculty and student may blur as, together, they seek both invention and fortune. Corporate and government funding may warp research priorities.”
The details in the 100-plus page financial document are mostly dry, but a few jump out that are different from before. Facebook now reports 901 million total users, with 500 million coming from mobile (which means lots of you are uploading pictures directly from your phone—300 million of them per day, in fact—which helps explain the keen Instagram interest). As for that Instagram deal, the purchase price was known to be a billion dollars, but the S-1 makes it official that it came in the form of $300 million cash, the rest in stock.
As for how much money the free service made off of you last year? On average, anywhere between $4.69 and $4.81. Which, at 901 million users, works out to a whole lot of FarmVille coins
Children who have suffered violence at a young age, it appears, actually suffer from premature ageing of their DNAPosted: 2012/04/24 in Education / Awareness, Stats / reports
An amazing opening-credit sequence can really immerse an audience, setting the tone for the entire filmPosted: 2012/04/24 in Education / Awareness, Stats / reports
Computer scientists have devised an attack that logs phone numbers, Social Security IDs, and personal identification numbers entered into smartphones by monitoring the devices’ integrated motion sensorsPosted: 2012/04/24 in Education / Awareness, Privacy / Data Protection, Stats / reports
Child pornography existed 30 years ago, of course. While investigators used some of the same techniques seen in the Cafferty case today, digital technology in general (and the Internet in particular) means that investigators are really playing a whole new ballgame even when they draw from the same playbook.
After years of speculation, Google Drive was released today, giving users 5GB of free storage to sync across computers, and finally giving Google a viable competitor to Dropbox, Microsoft’s SkyDrive, Apple’s iCloud, and the like.
BREIN vs The Dutch Pirate Party (and Geenstijl.nl) – Democracy, Censorship & The Effectiveness Of Blocking The Pirate BayPosted: 2012/04/24 in Blocking, Copyright, Enforcement, Filtering, Illegal File Sharing, Litigation, Stats / reports
The popular Dutch Blog Geenstijl.nl is targeting BREIN again as the latter has now gone and asked the Dutch Pirate Party to refrain from explaining to the Dutch public just how to go and circumvent The Pirate Bay.
While Geenstijl.nl is discussing democracy, censorship and is hoping that its audience will have a clue who Thorbecke is, the letter BREIN has sent to the Dutch Pirate Party contains a number of interesting findings regarding the effectiveness of the blockade as implemented by Dutch providers ZIGGO and XS4ALL:
1. The following graph showing a decrease of the number of Dutch visitors to the Pirate Bay website:
2. Google Adplanner, which shows how many ZIGGO subscribers ran into ZIGGO’s blockade URL (150,000 in February 2012):
3. Again Google Adplanner data which shows how many ZIGGO subscribers ran into ZIGGO’s blockade URL in March 2012 (92,000):
4. Alexa data showing that 19.88% of Ziggo.nl users ran into the blockade URL:
5. Alexa data showing that Blokkade.ziggo.nl was the most popular subdomain of ZIGGO.nl in March 2012:
BREIN continues by showing the effects of similar Pirate Bay blockades in other countries such as
And Italy (Piratebay in red, Btjunkie in blue):
Dutch language news articles:
In 2009, Microsoft, working with Dartmouth College, developed PhotoDNA, a technology that aids in finding and removing some of the “worst of the worst” images of child sexual exploitations from the Internet. Microsoft donated the PhotoDNA technology to the National Center for Missing & Exploited Children (NCMEC), who established a PhotoDNA-based program for online service providers to help disrupt the spread of child pornography online.
Over the next year, Microsoft, working with NCMEC, implemented a gradual rollout of PhotoDNA on Bing, SkyDrive and Hotmail services.
In early 2011, Facebook joined Microsoft in sublicensing the technology for use on its network. It is our hope that other online service providers will follow Microsoft and Facebook’s lead in adopting this game-changing technology.
March 19, 2012: Microsoft and NetClean make PhotoDNA technology available to law enforcement at no cost to help them fight child pornography.
Today, the Dutch forensic lab NFI will go and work with Microsoft, using this technology.
Dutch language news article: