Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
This is the first of several law suits launched by climate scientists against journalists who have published alleged libels and falsehoods. Climate scientist Ben Santer suggests the following explanation for these types of defamations: "if you can't attack the underlying science, you go after the scientist."
ISPs are also now be required to provide your personal info, but only if the copyright owner sues. Search engines also have to remove cached versions of allegedly infringing material that have been removed from a website. Non-compliance allows copyright owners to pursue legal action and claim damages against them as well. Finally, a review of the Copyright Act every five years is now required."
HR files leaked in the hack provided the motive part: a massive restructuring in Spring, 2014, in which many longtime SPE employees were laid off. After researching the online footprint of a list of all the individuals who were fired and had the means to be able to access sensitive data on Sony's network, Norse said it identified a handful who expressed anger in social media posts following their firing. They included one former employee — a 10-year SPE veteran who he described as having a "very technical background." Researchers from the company followed that individual online, noting participation in IRC (Internet Relay Chat) forums where they observed communications with other individuals affiliated with underground hacking and hacktivist groups in Europe and Asia. According to Stammberger, the Norse investigation was eventually able to connect an individual directly involved in conversations with the Sony employee with a server on which the earliest known version of the malware used in the attack was compiled, in July, 2014.