New submitter C0R1D4N writes "Carl Bergmanson, a New Jersey gubernatorial democrat running in the 2013 primary, has recently spoken out against the new 'six strike policy' being put in place this week by major ISPs. He said: 'The internet has become an essential part of living in the 21st century, it uses public infrastructure and it is time we treat it as a public utility. The electric company has no say over what you power with their service, the ISPs have no right to decide what you can and can not download.'"
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
Hugh Pickens writes "The rules for papal elections are steeped in tradition. John Paul II last codified them in 1996, and Benedict XVI left the rules largely untouched. The 'Universi Dominici Gregis on the Vacancy of the Apostolic See and the Election of the Roman Pontiff' is surprisingly detailed. Now as the College of Cardinals prepares to elect a new pope, security people like Bruce Schneier wonder about the process. How does it work, and just how hard would it be to hack the vote? First, the system is entirely manual, making it immune to the sorts of technological attacks that make modern voting systems so risky. Second, the small group of voters — all of whom know each other — makes it impossible for an outsider to affect the voting in any way. The chapel is cleared and locked before voting. No one is going to dress up as a cardinal and sneak into the Sistine Chapel. In short, the voter verification process is about as good as you're ever going to find. A cardinal can't stuff ballots when he votes. Then the complicated paten-and-chalice ritual ensures that each cardinal votes once — his ballot is visible — and also keeps his hand out of the chalice holding the other votes. Ballots from previous votes are burned, which makes it harder to use one to stuff the ballot box. What are the lessons here? First, open systems conducted within a known group make voting fraud much harder. Every step of the election process is observed by everyone, and everyone knows everyone, which makes it harder for someone to get away with anything. Second, small and simple elections are easier to secure. This kind of process works to elect a pope or a club president, but quickly becomes unwieldy for a large-scale election. And third: When an election process is left to develop over the course of a couple of thousand years, you end up with something surprisingly good."
cervesaebraciator writes "U.S. Representative Judy Chu (D-CA) will be starting a new caucus with the ostensible purpose of protecting the intellectual property rights of filmmakers, musicians and other artists. The new caucus, styled the Congressional Creative Rights Caucus, will be formed along with Rep. Howard Coble (R-NC). Chu's office released a statement, including the following: 'American innovation hinges on creativity – it is what allows our kids to dream big and our artists to create works that inspire us all. The jobs that result are thanks entirely to our willingness to foster creative talent, and an environment where it can thrive and prosper. [...] The Congressional Creative Rights Caucus will serve to educate Members of Congress and the general public about the importance of preserving and protecting the rights of the creative community in the U.S. American creators of motion pictures, music, software and other creative works rely on Congress to protect their copyrights, human rights, First Amendment rights and property rights.'"
Z80xxc! writes "The White House Office of Science and Technology Policy announced a "policy memorandum" today requiring any federal agency with over $100 million in R&D expenditures each year to develop plans for making all research funded by that agency freely available to the public within one year of publication in any peer-reviewed scholarly journal. The full memorandum is available on the White House website. It appears that this policy would not only apply to federal agencies conducting research, but also to any university, private corporation, or other entity conducting research that arises from federal funding. For those in academia and the public at large, this is a huge step towards free open access to publicly funded research." Edward Tufte calls the move timid and unimaginative, linking to a Verge article that explains that it's not quite as sweeping as the summary above sounds.
Hugh Pickens writes "William D. Hartung, director of the Arms and Security Project at the Center for International Policy, writes that although we have been bombarded with tales of woe about the potentially devastating impacts of cutting the Pentagon budget 8% under the sequester, examples of egregious waste and misplaced spending priorities at the Pentagon abound. One need look no further than the department's largest weapons program, the F-35 combat aircraft, which has just been grounded again after a routine inspection revealed a crack on a turbine blade in the jet engine of an F-35 test aircraft in California. Even before it has moved into full-scale production, the plane has already increased in price by 75%, and it has so far failed to meet basic performance standards. By the Pentagon's own admission, building and operating three versions of the F-35 — one for the Air Force, one for the Navy and one for the Marines — will cost more than $1.4 trillion over its lifetime, making it the most expensive weapons program ever undertaken. And in an era in which aerial combat is of diminishing importance and upgraded versions of current generation U.S. aircraft can more than do the job, it is not at all clear that we need to purchase more than 2,400 of these planes. Cutting the two most expensive versions of the F-35 will save over $60 billion in the next decade."
New submitter BetterThanCaesar writes "The Swedish Pirate Party and their ISP Serious Tubes have received a letter from 'The Rights Alliance' (formerly Antipiratbyrån, The Swedish Anti-Piracy Bureau), demanding they cease supplying Internet access to The Pirate Bay. Referring to the final sentence on the four Pirate Bay profiles, they threaten with legal action if access is not removed by February 26. On her blog, party leader Anna Troberg calls the letter 'extortion,' pointing out that (translated from Swedish) '[i]t is not illegal to provide The Pirate Bay with Internet access. There is no list of illegal sites that ISPs cannot provide access to.' (google translation to English)." The letter sent (in Swedish). Update: 02/20 14:58 GMT by U L : richie2000 notes that hosting isn't quite right; they're just routing traffic to TPB: "We're not hosting TPB, we're just routing traffic to them. Just like an ISP. Serious Tubes routes traffic to the Pirate Party, so they're even more removed. But, last night, Portlane, one of the ISPs that routes traffic to Serious Tubes, was pressured into cutting their transit to ST, even if they were just a provider to a provider to a provider to TPB."
New submitter kyjellyfish writes "Research published in the journal PLOS ONE, suggests that your parents 'Left or 'Right' party affiliations are not the only factor at work shaping a person's political identity. Differences in opinion between 'Lefties' and 'Righties' may reflect specific physiological processes. In research performed over 10 years ago, brain scans showed that London cab drivers' gray matter grew larger to help them store a mental map of the city." From the article: "Other scans have shown that brain regions associated with risk and uncertainty, such as the fear-processing amygdala, differ in structure in liberals and conservatives. And different architecture means different behavior. Liberals tend to seek out novelty and uncertainty, while conservatives exhibit strong changes in attitude to threatening situations. The former are more willing to accept risk, while the latter tends to have more intense physical reactions to threatening stimuli."
An anonymous reader writes "After a huge meteor recently exploded over Chelyabinsk (population 1,130,132), Russia, NASA has approved $5 million for funding for ATLAS project (Asteroid Terrestrial-impact Last Alert System). From the article: '"There are excellent ongoing surveys for asteroids that are capable of seeing such a rock with one to two days' warning, but they do not cover the whole sky each night, so there's a good chance that any given rock can slip by them for days to weeks. This one obviously did," astronomer John Tonry of the Institute for Astronomy at the University of Hawaii told NBC News Friday.'"
ptorrone writes "In a welcome turn of events, President Barack Obama spoke directly to the patent troll problem and the need for more comprehensive patent reform yesterday in a 'Fireside Hangout' — a live question and answer session (video) hosted in a Google+ hangout. The President was responding to a question by the prominent electrical engineer and entrepreneur Limor 'Ladyada' Fried of Adafruit Industries, who in 2009 won an EFF Pioneer Award for her work with free software and open-source hardware."
First time accepted submitter Daniel_Stuckey writes "Bam! For anyone that's paid a speck of attention to the tedium of political redistricting, which happens while a state grows unevenly, (and must dynamically respond to density, electorate disparity, natural resources and ridgelines, etc.), this is straight out of some psychedelic dream. For Democrats, it could be straight out of a nightmare. That's because Freeman's map necessitates 50 equally populous United States. His methods for creating the map are explained thusly: 'The algorithm was seeded with the fifty largest cities. After that, manual changes took into account compact shapes, equal populations, metro areas divided by state lines, and drainage basins. In certain areas, divisions are based on census tract lines... The suggested names of the new states are taken mainly from geographical features.'"
Dangerous_Minds writes "The International Intellectual Property Alliance (IIPA) is demanding a number of countries be placed back on the special 301 piracy watchlist. One country being recommended for inclusion is Canada (PDF). Apparently, even though Canada passed copyright reform laws, any compromise to protect consumers is reason for inclusion. Michael Geist offers some analysis on this move. Meanwhile, the IIPA is also recommending that Spain be included in the watchlist. In a separate filing, the IIPA makes a host of reasons why Spain should also be included. One of the main reasons seems to be that even though Spain passed the Sinde Law in spite of protests, the courts aren't simply rubberstamping any takedown requests and that cases that were dismissed due to lack of evidence is cause for concern. Freezenet offers some in-depth analysis on this development while noting towards the end that the Special 301 report suffers from credibility problems."
head_dunce writes "A bill introduced Thursday by a bipartisan group of U.S. lawmakers seeks to make it easier for states to collect sales taxes stemming from online purchases. Amazon is among the e-retailers supporting the proposal, while a lobbying group representing eBay and Overstock.com stands opposed. From the article: '"Small businesses and states alike are suffering from the inability to collect due -- not new -- taxes from purchases made online," said Rep. Steve Womack, R-Ark., adding the legislation is a "bipartisan, bicameral, common-sense solution that promotes states' rights and levels the playing field for our Main Street businesses."'"
GovTechGuy writes "A number of lawmakers are using the death of Internet activist Aaron Swartz to speak out against the Justice Department's handling of the case, and application of the Computer Fraud and Abuse Act. The controversy surrounding the Swartz case could finally give activists the momentum they need to halt the steady increase in penalties for even minor computer crimes."
holy_calamity writes "MIT Technology Review reports that efforts by U.S. government agencies and defense contractors to develop malware to attack enemies is driving a black market in zero-day vulnerabilities. Experts warn that could make the internet less secure for everyone, since malicious code is typically left behind on targeted systems and often shows up on untargeted ones, providing opportunities for reverse engineering. '"On the one hand the government is freaking out about cyber-security, and on the other the U.S. is participating in a global market in vulnerabilities and pushing up the prices," says Soghoian, who says he has spoken with people involved in the trade and that prices range from the thousands to the hundreds of thousands. Even civilian law-enforcement agencies pay for zero-days, Soghoian says, in order to sneak spy software onto suspects’ computers or mobile phones.'"