The internet = unlimited and eternal data retention
Dutch language news article:
The internet = unlimited and eternal data retention
Dutch language news article:
In recent weeks, PayPal has cut off many of the world’s largest filehosting sites from its service including MediaFire, Putlocker and DepositFiles. Growing concern over copyright infringement has resulted in an extremely strict and in some cases privacy-violating set of requirements being laid down by the payment processing company. Cyberlocker owners are disappointed with the apparent witch-hunt which in some cases is paralyzing their business.
Anonymous has a new mission: Operation PedoChat. Yes, that’s right. The hacktivist group is once again targeting pedophiles; its crosshairs are currently aimed at some 100 websites.
Over the weekend, the hacktivist group Anonymous apparently grew tired of pedophilia and decided to launch Operation PedoChat (#OpPedoChat). Several websites used by pedophiles to trade questionable images and videos of children have already been taken down.
A quick check of the attacked portals (I am purposefully not linking them here, for obvious reasons) shows some are still down. Unfortunately, others have already returned. At the time of writing, I counted 85 domains being targeted by Anonymous (the number is higher if you count individual websites). This is a growing number: more and more are being added on a regular basis.
Anonymous has promised “defaces, logs & dox and the occasional domain hijack as well.” In fact, the first round is already complete, and has been split into four parts of doxing (the act of tracing someone or gathering information about an individual using sources on the Internet): one, two, three, and four. The publicly posted information includes the details of hundreds of pedophiles (both users and administrators of these websites) as well as e-mails between some of them.
One in five of our UK sample (20%) share news stories each week via email or social networks – but in general Europe lags behind the United States in both the sharing of news and other forms of digital participation.
Why Protected Domain Services?
It takes time to find a lawyer with experience in DMCA takedowns. Once you do, you’ll have to verify your copyright, negotiate fees and wait for them to start working on your case. This process can takes days or even weeks.
We guarantee to deliver your completed DMCA notice within 1 business day after you have completed this form. We will also help you figure out the appropriate parties to contact with your takedown letter.
Lawyers can and do charge upwards of $400.00/hour! Some brand protection sites charge $1000s per month! The cost of our service is a fraction of what you would pay lawyers or brand protection sites for the same result.
This tool requires only information that you have available to create a properly formatted DMCA letter. Each form is reviewed by a DMCA specialist to ensure that it is properly formatted and ready to be sent to the people who can take the right action. If you need any assistance in completing this form, please email email@example.com or call xxx-xxx-xxxx.
Let us help you enforce your intellectual property rights today!
Internet provider Claranet has today announced the launch of a new security service called Childsafe that, much like TalkTalk’s rival HomeSafe solution, aims to give families on its broadband packages access to an opt-in, network-level filtering service that restricts access to more than just websites.
The ISP claims that its solution, which allows subscribers to choose exactly what services or content are blocked, requires no technical or installation knowledge to setup. Furthermore it is also capable of restricting access to chat-rooms, Instant Messaging (IM), video calls, file-sharing (P2P) services and “other unwanted internet services” that competitors don’t normally block. On top of this it also includes additional protection against computer viruses, worms, phishing attacks and spyware.
From traces of drugs or gun powder on your clothes to what you had for breakfast to the adrenaline level in your body—agents will be able to get any information they want without even touching you.
And without you knowing it.
The technology is so incredibly effective that, in November 2011, its inventors were subcontracted by In-Q-Tel to work with the US Department of Homeland Security. In-Q-Tel is a company founded “in February 1999 by a group of private citizens at the request of the Director of the CIA and with the support of the U.S. Congress.” According to In-Q-Tel, they are the bridge between the Agency and new technology companies.
Their plan is to install this molecular-level scanning in airports and border crossings all across the United States. The official, stated goal of this arrangement is to be able to quickly identify explosives, dangerous chemicals, or bioweapons at a distance.
The machine is ten million times faster—and one million times more sensitive—than any currently available system. That means that it can be used systematically on everyone passing through airport security, not just suspect or randomly sampled people.
Slowly, people are spending more money on digital music, but it does not compensate the losses in physical sales yet. However, music companies become more willing to sign deals with legal online music providers. Also, they try to increase revenues from other services and products, like live performances and merchandising. The so-called ’360 degree deals’ become more common. In this business arrangement, the music company owns all the rights of the artist and receives a percentage of all the income, including income from recordings, live performances, merchandising and the rights for online services, radio plays, use in films, games and TV series. In return, the music company takes on all the business risks.
Because currently they are too ‘loosely-knit‘.
Several other institutions are reconsidering future Mac purchases as well
The fine is expected to be the largest penalty ever levied on a single company by the U.S. Federal Trade Commission. It offers the latest sign of the FTC’s stepped-up approach to policing online privacy violations, coming just six months after The Wall Street Journal reported on Google’s practices.
Solution: Use a fake name that looks like a real name. And stop being a dissident.
That may only provide one with a temporary solution: Facebook is now blocking accounts using suspicious names and is asking account holders to send copies of their passports to Facebook, if they would like to access their accounts again.
Legal experts advise against that practice, as privacy and data protection laws are different in each and every territory and it is unclear what Facebook will go and do with a copy of your passport.
Facebook spokesperson Damaris Beems confirms Facebook’s practices: Facebook has a policy of ‘real people, real names’. Beems did not respond to questions about the safety of dissidents and their need to use aliases.
Dutch language news article:
According to Rothken, twenty-five lawyers around the world – United States, New Zealand, Hong Kong and the Netherlands – are working on the Megaupload defense.
The United States’ court case against Megaupload founders Kim Dotcom, Mathias Ortmann, Finn Batato and Bram van der Kolk for alleged copyright infringement was dealt another setback Tuesday, after the New Zealand extradition hearing for the four was moved to March 2013.
Originally, the hearing was scheduled for August 6 this year, about six months after Dotcom’s home was raided in January, but a series of legal complications have pushed that date forward.
These include a High Court judge invalidating the warrants for seizing Dotcom’s property and funds — thus making the armed raid at dawn illegal. The judge also declared that the FBI shipping cloned hard drive images taken at the raid was unlawful, thanks to the warrants used being too broad and general.
The leader of a gang that hacked into the onboard computers of luxury cars and bugged them with GPS tracking devices before stealing them is facing jail.
Alan Watkins, 42, created false identities for over 150 stolen cars worth up to £3.5m to sell them on in Cyprus. He particularly targeted models of BMWs, Audis and Range Rovers.
Watkins had details of over 500 vehicles and had all the required documentation to create false registrations for over 300 stolen luxury cars – a practice known as ‘ringing’.
Watkins would single out cars based on if similar models had been exported to Cyprus, and chose similar vehicles in car parks across Essex.
When the unsuspecting owners left their car, Watkins’ accomplicies would target the car with a signal blocker, preventing the remote controlled locking systems from working, Southwark Crown Court heard.
The thief would then enter the unlocked car, and hack into its computer system to access information about its key before installing a covert GPS tracking device.
The information from the computer on the was then passed onto Watkins, who created a copy of the key, so that thieves could steal the car, without causing any damage to it, at a later date.
The GPS tracking devices allowed the gang to work out the easiest time and place to steal the car.
The interviewees are no lightweights. Included are former Napster CEO Hank Bank, Imeem founder Dalton Caldwell, Seeqpod founder Kasian Franks, Real Networks founder Rob Glaser, Scour VP & General Counsel Craig Grossman, former Gracenote CEO David Hyman, AudioGalaxy founder Michael Merhej, founder of MP3Tunes Michael Robertson, former RIAA CEO Hilary Rosen, and numerous venture capitalists and label execs.
The result is an unprecedented report on how the shutdown of Napster chilled innovation, discouraged investment, and led to a climate of copyright law-fueled fear that pushed technologists and music further apart.
It started with a drain on cash. Interviewees reported that venture capital funding for digital music “became a wasteland”, a “scorched earth kind of place” housing a “graveyard of music companies.” With the big labels choosing where and when to sue, funding was hard to come by.
The company initially refused to take the proxy offline, but faced with a court order and the prospect of a 1,000 euro per day fine, Greenhost sees no other option than to throw in the towel.
According to an affidavit filed by U.S. authorities in Canada, the U.S. Secret Service began investigating “an international conspiracy” to hack into computer networks of U.S. financial institutions and other businesses in October 2007. As part of that investigation, agents examined network intrusions that occurred in January and February 2008 at OmniAmerican Credit Union, based in Fort Worth, Texas, and Global Cash Card of Irvine, California, a distributor of prepaid debit cards used primarily for payroll payments.
In both cases, the attacker gained access using a SQL injection attack that exploited a vulnerability in the company’s database software. The attacker grabbed credit- and debit-card numbers that were then used by thieves in several countries to withdraw more than $1 million from ATMs.
In April and May 2008, agents investigated two additional hacks at 1st Source Bank in Indiana, and at Symmetrex, a prepaid-debit-card processor based in Florida. The intruder again used SQL injection attacks, and losses added up to more than $3 million.
Investigators traced the intrusions to several servers belonging to HopOne Internet in McLean, Virginia, which turned out to be just a routing point for an attack that originated from servers at the Dutch web hosting company LeaseWeb — one of the largest hosting companies in Europe.
U.S. officials asked Dutch law-enforcement agents on April 7, 2008, to track “all computer traffic pertaining to three servers hosted by LeaseWeb” and intercept “the content of that traffic” for 30 days, according to the affidavit. The interception request was renewed for another 30 days on May 9.
Among the wiretapped traffic, authorities found communications that allegedly occurred between Tenenbaum — using the e-mail address Analyzer22@hotmail.com — and other known hackers, discussing the breaches into the four U.S. institutions, “as well as many other U.S. and foreign financial institutions.”
In one instant message chat in April 2008, Tenenbaum allegedly discussed trying to hack into Global Cash Card after system administrators at the company apparently locked him out from an initial intrusion.
“Yesterday I rechecked [Global Cash Card]. They are still blocking everything,” he allegedly wrote. “So we can’t hack them again.”
Authorities say Tenenbaum gave a co-conspirator the compromised debit- and credit-card account numbers of more than 150 accounts taken from Symmetrex as well as the computer commands he’d used to execute the attack. Then, throughout the night of April 20, 2008, he received updates from accomplices in Russia and Turkey as they successfully withdrew cash from ATMs, and from Pakistan and Italy where the cards apparently failed to work.
The next day, more cards were used in Bulgaria, Canada, Germany, Sweden and the United States. By late afternoon that day, Tenenbaum told an accomplice he’d racked up about “350 – 400″ in earnings. The affidavit notes that this likely referred to thousands of dollars or thousands of euros.
Tenenbaum allegedly gave an accomplice additional cards in an April 20 chat and asked the accomplice to find a “casher” — the underground’s term for the low-level worker whose only job is to withdraw loot.
“I am making a small operation, you have casher?” he allegedly wrote. “I been trying to get a hold of you. I saved for you 25 cards, each one $1,500 limit. Get casher as soon as possible. OK, I will load them.”
According to authorities, after Tenenbaum got into the 1st Source Bank network, he obtained administrator privileges that allowed him to view credit card numbers and ATM output. This latter activity apparently collided with other hackers who were in the system trying to execute shell commands.
“Is HUGE,” he allegedly wrote an accomplice. “I saw ATM outputs, tons of cards. I am admin there, and I already cracked some of the domain.”
His accomplice replied that there were already people inside the network and asked Tenenbaum to get out. Tenenbaum replied, “Dude, like I told ya. It’s [Microsoft] Windows network. I am happy I could help you to get shell there. Now it’s your guys’ job.”
About a month later, Tenenbaum allegedly disclosed that he’d hacked Alpha Bank in Greece, the country’s second largest commercial bank, where he said friends of his worked.
Despite Tenenbaum’s earlier notoriety as The Analyzer, he apparently made no attempt to hide his real identity, using an e-mail address with a name that was previously tied to him, as well as an IP address that was easily connected to him.
“Apparently there is some sort of agreement not to talk about it too much”, Scheepbouwer argues.
He notes that for an adequate battle against cybercrime both a sense of urgency and proper knowledge about security issues is desperately needed. He feels that both elements are lacking within government as well as the private sector.
Dutch language news article:
An expert on electronic eavesdropping, Drake sacrificed his career to blow the whistle on perceived wrongdoings within the NSA. He was charged under the Espionage Act, though the charges were dropped only last year.
He told RT that in America’s ‘soft tyranny’, everyone is subject or suspect in terms of surveillance.
The Q2HD from Zoom, however, is designed to record (and stream) in full HD regardless of the circumstances
Last Friday, the Dutch Ministry of Economic Affairs, Agriculture and Innovation presented a research report ‘Digitale drempels’ (‘Digital Thresholds’) from SEO about the factors that may hinder the supply of and demand for digitally distributed music, audiovisual content, games and books in the Netherlands. The study shows that the four sectors differ substantially in terms of digital distribution.
1. digital music as a product does not offer sufficient advantages for consumers, so they may prefer illegal (free) downloads or physical products
2. The study finds that the supply of digital audiovisual content is fragmented and incomplete due to the problem of clearing rights and the industry’s ‘windowing’ strategy
3. The market for digital games does not meet serious obstacles, but online distribution offers almost no price advantage for consumers
4. The main issue in the market for e-books is the lack of titles. New books are increasingly published as e-books, although often with delay compared to their paper equivalents. Also, the availability of older titles that are not being marketed anymore is poor
…which will leave Google as the final barrier