United Kingdom

UK Government Says App Developers Won't Be Forced To Implement Backdoors (betanews.com) 86

Mark Wilson writes: The UK government is sending mixed messages about how it views privacy and security. Fears have been mounting since Prime Minister David Cameron wondered aloud 'in our country, do we want to allow a means of communication between people which we cannot read?' — his view obviously being that, no, we don't want to allow such a thing. Following the revelations about the spying activities of the NSA and GCHQ, public attention has been focused more than ever on privacy and encryption, Cameron having also suggested a desire to ban encryption. Today, some fears were allayed when it was announced that the government was not seeking to require software developers to build backdoors into their products. That said, the government said that companies should be able to decrypt 'targeted' data when required, and provide access to it.
Government

Is Buying Cuban Software Legal In the US? The Answer is Hazy (blogspot.com) 75

lpress writes: The Treasury Department recently issued new regulations authorizing "the importation of Cuban-origin mobile applications and the employment of Cuban nationals by persons subject to U.S. jurisdiction to develop such mobile applications." Great, but that is ambiguous, so I asked Treasury some follow-up questions: why is the rule restricted to mobile apps, what is the definition of a mobile app and can the Cuban developer work for a Cuban cooperative or government enterprise or must it be an individual? The answers were mostly "no comment" so the best way to clarify the situation is to try it and see what happens.
The Military

Russian Presence Near Undersea Cables Concerns US (nytimes.com) 273

An anonymous reader writes: The NY Times reports that the presence of Russian ships near important, undersea internet cables is raising concern with U.S. military and intelligence officials. From the article: "The issue goes beyond old Cold War worries that the Russians would tap into the cables — a task American intelligence agencies also mastered decades ago. The alarm today is deeper: The ultimate Russian hack on the United States could involve severing the fiber-optic cables at some of their hardest-to-access locations to halt the instant communications on which the West's governments, economies and citizens have grown dependent.
...
Just last month, the Russian spy ship Yantar, equipped with two self-propelled deep-sea submersible craft, cruised slowly off the East Coast of the United States on its way to Cuba — where one major cable lands near the American naval station at Guantánamo Bay. It was monitored constantly by American spy satellites, ships and planes. Navy officials said the Yantar and the submersible vehicles it can drop off its decks have the capability to cut cables miles down in the sea. What worries Pentagon planners most is that the Russians appear to be looking for vulnerabilities at much greater depths, where the cables are hard to monitor and breaks are hard to find and repair.

Facebook

Judge: School's Facebook Post is a Campaign Contribution (coloradoan.com) 86

schwit1 writes: A Colorado judge has ruled that a Facebook post by Liberty Common School amounts to an illegal campaign contribution to a Thompson School District board candidate. In August, the Fort Collins charter school shared with its Facebook followers a newspaper article about a parent of a student running for a board seat in the neighboring school district. Liberty Common's principal, former Colorado Congressman Bob Schaffer, then shared the post and called candidate Tomi Grundvig an "excellent education leader" who would provide "sensible stewardship" of Thompson.

The campaign manager for Grundvig's rival filed a complaint, and it had to be settled by the courts. Administrative law judge Matthew E. Norwood called the violation "minor," and ruled that "no government money of any significant amount was spent to make the contribution." He also focused on the post to the school's specific page, not Schaffer's personal page. "The school's action was the giving of a thing of value to the candidate, namely favorable publicity," Norwood wrote.

Security

Sen. Ron Wyden Explains the Fight Ahead Over CISA 23

blottsie writes: Sen. Ron Wyden has led the fight against the Cybersecurity Information Sharing Act (CISA), which the Senate advanced on Thursday in a 84-14 vote. In a new interview with the Daily Dot, Wyden explains why privacy advocates call CISA a "surveillance bill," and discusses why an amendment from Sen. Whitehouse could make CISA more problematic for Internet users' civil liberties.
Canada

Reactions Split On What Canada's Liberal Majority Means For Tech Policy Future (freezenet.ca) 220

Dangerous_Minds writes: Few could have predicted the Liberal majority win in Canada's recent election. Now that the Canadian government is in a state of transition, some have speculated what the new government will bring to the table when it comes to a policy on technology. Michael Geist is speculating that the people in the new Liberal government may bring about a positive policy change, concluding "All of this points to real change and the chance for a fresh start on Canadian digital policy in the years ahead." Meanwhile, Freezenet has a very different take. Drew Wilson points out that the last time the Liberal government was in power, the party was very combative on digital rights because they were trying to bring in Lawful Access and the Canadian DMCA before Stephen Harper took power. In one very infamous exchange, Sam Bulte lashed out at people like Michael Geist by calling him and his supporters "pro-user zealots". With digital rights not even on the radar during the election outside of Bill C-51 towards the beginning and the Liberals long history on these files, Wilson paints a very bleak future given that the Liberal party now has a majority government and can push through policies unopposed whether controversial or not.
Privacy

House of Representatives Proposal Aims To Regulate Car Privacy (itworld.com) 58

itwbennett writes: Even though, as reported today on Slashdot, 'experts from government, industry, and academia say they have no confidence they'll develop a secure system that can protect users from tracking and privacy breaches,' a subcommittee of the U.S. House of Representatives have 'proposed that the National Highway Traffic Safety Administration set up an Automotive Cybersecurity Advisory Council to develop cybersecurity best-practice.' The draft proposal would require vehicle manufacturers to 'develop and implement' a privacy policy outlining their information-gathering practices, and would make vehicle data hacking illegal and subject to a $100,000 penalty for each violation.
United Kingdom

Big Data Attempts To Find Meaning In 40 Years of UK Political Debate (thestack.com) 44

An anonymous reader writes: International researchers have analyzed 40 years of political speeches from the UK Parliament in an effort to move the study of political theory from social science towards the quantitative analysis offered by Big Data analytics techniques. The group used Python to crunch publicly available data from theyworkforyou.com, comprising 3.7 million individual speeches. A few strange trends emerged in this initial experiment, such as the decline of 'health care' as a trending Parliamentary topic, with 'welfare' consistently on the rise, and the decrease of fervent interest in any particular topic during the more pacific years under Margaret Thatcher and Tony Blair.
Democrats

Clinton Home Servers Had Ports Open (ap.org) 470

Jim Efaw writes: Hillary Clinton's home servers had more than just the e-mail ports open directly to the Internet. The Associated Press discovered, by using scanning results from 2012 "widely available online", that the clintonemail.com server also had the RDP port open; another machine on her network had the VNC port open, and another one had a web server open even though it didn't appear to be configured for a real site. Clinton previously said that her server featured "numerous safeguards," but hasn't explained what that means. Apparently, requiring a VPN wasn't one of them.
Education

Treat Computer Science As a Science: It's the Law 219

theodp writes: Last week, President Obama signed into law H.R. 1020, the STEM Education Act of 2015, which expands the definition of STEM to include computer science for the purposes of carrying out education activities at the NSF, DOE, NASA, NOAA, NIST, and the EPA. The Bill was introduced by Rep. Lamar Smith (R-TX) and Rep. Elizabeth Etsy (D-CT). Smith's February press release linked to letters of support from tech billionaire-backed Code.org (whose leadership includes Microsoft President Brad Smith), and the Microsoft-backed STEM Education Coalition (whose leadership includes Microsoft Director of Education Policy Allyson Knox).
Businesses

Bernie Sanders Comes Out Against CISA 211

erier2003 writes: Sen. Bernie Sanders' opposition to the Cybersecurity Information Sharing Act in its current form aligns him with privacy advocates and makes him the only presidential candidate to stake out that position, just as cybersecurity issues loom large over the 2016 election, from email server security to the foreign-policy implications of data breaches. The Senate is preparing to vote on CISA, a bill to address gaps in America's cyberdefenses by letting corporations share threat data with the government. But privacy advocates and security experts oppose the bill because customers' personal information could make it into the shared data.
Democrats

Electoral System That Lessig Hopes To Reform Is Keeping Him Out of the Debate (usatoday.com) 239

schwit1 writes: Lessig has raised a million dollars, which is nothing to sneeze at, but he's being given the cold shoulder by the Democrats when it comes to participating in the debates. I think he's got a good argument for being included — he's certainly as serious a candidate as some of the others, and I'm hearing a lot about his campaign.

Why are they keeping Lessig out? According to Lessig, it's for the same reason he wants in: "My view is that if we can get this message [of reform] into the debate it would change the dynamics of this Democratic primary entirely. This issue framed in this way totally blows up the Democratic primary."

Hillary and Bernie, he says, are promising the moon to voters, but can't deliver. Lessig told me, "If I can get on that stage and say the rocket can't get off the ground, and we have to change this dynamic first," the narrative shifts in a way that the leading candidates can't address.

United States

2016 Election Cycle Led By Billionaire Donors 370

Nicola Hahn writes: The pluralist stance of American politics contends that true power in the United States has been constitutionally vested in "the people" through mechanisms like the electoral process, freedom of speech, and the ability to establish political parties. The traditional view is that these aspects of our political system result in a broad distribution of power that prevents any one faction from gaining an inordinate amount of influence. And today the New York Times has revealed the shortcomings of this narrative by publishing the names of the 158 wealthy families that have donated almost half of the money spent towards the 2016 presidential race. This group of donors is primarily Republican and is dominated by interests in the banking industry. These facts lend credence to the idea that national policy making is influenced heavily by a relatively small group of people. That the American body politic is largely controlled by a deep state.
China

China Arrests Hackers At Behest of US Government (washingtonpost.com) 74

An anonymous reader writes: For the first time, the Chinese government has arrested a group of hackers at the request of the United States. The hackers are suspected of having "stolen commercial secrets" from companies in the U.S., which were then passed on to Chinese competitors. "The arrests come amid signs of a potential change in the power balance between the U.S. and Chinese governments on commercial cyberespionage, one of the most fraught issues between the two countries. For years, U.S. firms and officials have said Beijing hasn't done enough to crack down on digital larceny." It's a big first step in establishing a functional cybersecurity relationship between the two nations. Now, everyone will be watching to see if China follows up the arrests with prosecution. "A public trial is important not only because that would be consistent with established principles of criminal justice, but because it could discourage other would-be hackers and show that the arrests were not an empty gesture."
DRM

EFF: the Final Leaked TPP Text Is All That We Feared (eff.org) 399

An anonymous reader writes: Wikileaks has released the finalized Intellectual Property text of the Trans-Pacific Partnership (TPP), which international negotiators agreed upon a few days ago. Unfortunately, it contains many of the consumer-hostile provisions that so many organizations spoke out against beforehand. This includes the extension of the copyright term to life plus 70 years, and a ban on the circumvention of DRM. The EFF says, "If you dig deeper, you'll notice that all of the provisions that recognize the rights of the public are non-binding, whereas almost everything that benefits rightsholders is binding. That paragraph on the public domain, for example, used to be much stronger in the first leaked draft, with specific obligations to identify, preserve and promote access to public domain material. All of that has now been lost in favor of a feeble, feel-good platitude that imposes no concrete obligations on the TPP parties whatsoever." The EFF walks us through all the other awful provisions as well — it's quite a lengthy analysis.
Encryption

US Government Will Not Force Companies To Decode Encrypted Data... For Now (washingtonpost.com) 110

Mark Wilson writes: The Obama administration has announced it will not require companies to decrypt encrypted messages for law enforcement agencies. This is being hailed as a "partial victory" by the Electronic Frontier Foundation; partial because, as reported by the Washington Post, the government "will not — for now — call for [such] legislation." This means companies will not be forced to build backdoors into their products, but there is no guarantee it won't happen further down the line. The government wants to continue talks with the technology industry to find a solution, but leaving things in limbo for the time being will create a sense of unease on both sides of the debate. The EFF has also compiled a report showing where the major tech companies stand on encryption.
EU

EU Court of Justice Declares US-EU Data Transfer Pact Invalid 205

Sique writes: Europe's highest court ruled on Tuesday that a widely used international agreement for moving people's digital data between the European Union and the United States was invalid. The decision, by the European Court of Justice, throws into doubt how global technology giants like Facebook and Google can collect, manage and analyze online information from their millions of users in the 28-member bloc. The court decreed that the data-transfer agreement was invalid as of Tuesday's ruling. New submitter nava68 adds links to coverage at the Telegraph; also at TechWeek Europe. From TechWeek Europe's article: The ruling was the court’s final decision in a data-protection case brought by 27-year-old Austrian law student Max Schrems against the Irish data protection commissioner. That case, in turn, was spurred by Schrems’ concerns over the collection of his personal data by Facebook, whose European headquarters is in Ireland, and the possibility that the data was being handed over to US intelligence services.
Education

Soon-to-Be US Ed Chief Was Almost FB CEO's Ed Chief 30

theodp writes: Before President Obama announced John B. King as his pick to replace outgoing U.S. Education Secretary Arne Duncan (who is returning to Chicago, where his kids now attend a $30K-a-year private school), King was Facebook CEO Mark Zuckerberg's pick to lead Zuck's failed $100 million "reform" effort of Newark's Schools. From The Prize: Who's in Charge of America's Schools?: "[Newark Mayor Cory] Booker asked [NJ Governor Chris] Christie to grant him control of the schools by fiat, but the governor demurred, offering him instead a role as unofficial partner in all decisions and policies, beginning with their joint selection of a 'superstar' superintendent to lead the charge. Booker's first choice was John King, then deputy New York State education commissioner, who had led some of the top-performing charter schools in New York City and Boston and who credited public school teachers with inspiring him to persevere after he was orphaned as a young boy in Brooklyn. [Mark] Zuckerberg and [his wife Priscilla] Chan flew King to Palo Alto for a weekend with them and [Facebook executive Sheryl] Sandberg; Christie hosted him at the governor's beach retreat on the Jersey Shore; and Booker led King and his wife, Melissa, on a tour of Newark, with stops at parks and businesses that hadn't existed before his mayoralty. But after much thought, King turned them down. Zuckerberg, Christie, and Booker expected to arrive at their national model within five years. King believed it could take almost that long to change the system's fundamental procedures and to raise expectations across the city for children and schools. "John's view was that no one has achieved what they're trying to achieve: build an urban school district serving high-poverty kids that gets uniformly strong outcomes," said an acquaintance who talked with King about the offer. "You'd have to invest not only a long period of time but tremendous political capital to get it done." King had questions about a five-year plan overseen by politicians who were likely to seek higher office."
HP

Carly Fiorina: I Supplied HP Servers For NSA Snooping 488

MFingS writes: According to an article at Motherboard, shortly after 9/11, NSA director Michael Hayden requested extra computing power and Carly Fiorina, then CEO of HP, responded by re-routing truckloads of servers to the agency. Fiorina acknowledged providing the servers to the NSA during an interview with Michael Isikoff in which she defended warrantless surveillance (as well as waterboarding) and framed her collaboration with the NSA in patriotic terms. Fiorina's compliance with Hayden's request for HP servers is but one episode in a long-running and close relationship between the GOP presidential hopeful and U.S. intelligence agencies.

Slashdot Top Deals