×
The Internet

MA Proposes Two Year Jail Term for Online Gambling 248

tessaiga writes "The Boston Globe reports that Massachusetts Governor Deval Patrick is trying to sneak a provision to criminalize online gambling. The bill, if passed, would make online gambling punishable by up to 2 years in prison and $25k in fines. Ironically, the provision is buried deep within a bill to allow the construction of three new casinos in Massachusetts to bring more gambling revenue into the state. 'If you were cynical about it, you'd think that they're trying to set up a monopoly for the casinos,' said David G. Schwartz, director of the Center for Gaming Research at the University of Nevada, Las Vegas. Democratic House representative Barney Frank, who earlier this year introduced federal legislation to legalize regulated online gambling, also criticized the move as 'giving opponents an argument against him.' Indeed, groups such as the Poker Player's Alliance, who were previously supportive of Patrick's plans to open the new casinos, have already announced opposition to the bill because of the online gambling clause."
Privacy

White House Ordered to Preserve All Email 259

Verunks writes "A federal judge Monday ordered the White House to preserve copies of all its e-mails in response to two lawsuits that seek to determine whether e-mails have been destroyed in violation of federal law. The issue surfaced in the leak probe of administration officials who disclosed Valerie Plame's CIA identity. ' The Federal Records Act details strict standards prohibiting the destruction of government documents including electronic messages, unless first approved by the archivist of the United States. Justice Department lawyers had urged the courts to accept a proposed White House declaration promising to preserve all backup tapes. The judge's order "should stop any future destruction of e-mails, but the White House stopped archiving its e-mail in 2003 and we don't know if some backup tapes for those e-mails were already taped over before we went to court. It's a mystery," said Meredith Fuchs, a lawyer for the National Security Archive.'"
Television

FCC Moves To Regulate Cable TV Competition 104

explosivejared writes "The Federal Communications Commission is likely to impose a new regulation on the largely unregulated cable television industry, the first of what may be more to come. Under a proposed rule circulating at the FCC, cable companies such as Comcast and Time Warner Cable would have to slash the price they charge smaller television programmers to lease access on spare cable channels, a move the FCC says would open up cable viewers to a wider diversity of shows. In addition, the FCC is contemplating a national ownership cap that would prevent one company from having more than 30 percent of all cable subscribers." TechDirt has a jaundiced view of FCC chairman Martin's animus against the cablecos.
Privacy

US Official Urges Americans To Reconsider Privacy 515

Privacy no longer can mean anonymity, says Donald Kerr, a deputy director of national intelligence. Instead, it should mean that government and businesses properly safeguards people's private communications and financial information. "Protecting anonymity isn't a fight that can be won. Anyone that's typed in their name on Google understands that," said Kerr. Kurt Opsahl of the EFF said Kerr ignores the distinction between sacrificing protection from an intrusive government and voluntarily disclosing information in exchange for a service. "There is something fundamentally different from the government having information about you than private parties. We shouldn't have to give people the choice between taking advantage of modern communication tools and sacrificing their privacy." Kerr's comments come as Congress is taking a second look at the Foreign Surveillance Intelligence Act, requiring a court order for surveillance on U.S. soil. The White House argued that the law was obstructing intelligence gathering.
Privacy

Ex AT&T Tech Says NSA Monitors All Web Traffic 566

Sir Tandeth writes "A former technician at AT&T, who alleges that the telecom giant forwards virtually all of its internet traffic into a 'secret room' to facilitate government spying, says the whole operation reminds him of something out of Orwell's 1984. Appearing on MSNBC's Countdown program, whistleblower Mark Klein told Keith Olbermann that all Internet traffic passing over AT&T lines was copied into a locked room at the company's San Francisco office — to which only employees with National Security Agency clearance had access. 'Klein was on Capitol Hill Wednesday attempting to convince lawmakers not to give a blanket, retroactive immunity to telecom companies for their secret cooperation with the government. He said that as an AT&T technician overseeing Internet operations in San Francisco, he helped maintain optical splitters that diverted data en route to and from AT&T customers. '"
The Courts

NY Rejects E-Voting, DOJ Trying to Force the Issue 228

CompaniaHill writes "Hastily passed in the wake of the 2000 election mess, the Help America Vote Act (HAVA) supposedly offered funding to help states update their voting systems. In reality, the short deadlines have been used to push the sale of untested and uncertified new e-voting systems. Many states continue to demonstrate that the new e-voting machines are not reliable. The New York State Board of Elections (NYSBOE) took the time to pass their own voting legislation with additional testing and certification standards which far exceed the HAVA standards. As a result, they missed the HAVA deadlines. In March 2006, the Department of Justice (DOJ) sued New York to comply with HAVA. Now, the DOJ is serving a motion to try to take away New York's right to select and acquire their own voting machine systems — in effect, to force e-voting machines on New York anyway. At the moment it's too soon to say how the NYSBOE will respond."
It's funny.  Laugh.

Babelfish Sparks Minor Diplomatic Row 331

Stony Stevenson writes with a link to a cautionary tale on the ITnews site. A group of journalists heading to The Netherlands were gathering some information prior to the trip. They sent off an email to the Dutch foreign ministry asking some questions, but as they weren't native speakers they needed some help. Unfortunately, they turned to Babelfish for official correspondence. "The beginning of the email read: 'Helloh bud, enclosed five of the questions in honor of the foreign minister: The mother your visit in Israel is a sleep to the favor or to the bed your mind on the conflict are Israeli Palestinian.'"
Privacy

FBI May Have Datamined Grocery Stores With Help From Credit Companies 442

An anonymous reader writes "Recent media reports indicate that in 2005-06, the FBI went trawling through grocery store records in order to track down Iranian terror cells. They hoped to locate 'Middle-Eastern terrorists' through the purchase of specific food items. Many of these items, though, are not sold through big-box supermarket chains, and the majority of mom and pop ethnic markets do not have the detailed computer purchase histories that Safeway or Whole Foods have. What the FBI seems to have done is instead put together a list of everyone who shopped at a Middle Eastern food market. All signs point to the credit card companies providing this data, and not the individual stores. If so, this could be the tip of a (potentially illegal) data-mining iceberg."
The Internet

Congress Pressures DoJ With PIRATE Part II 217

Anonymous Pirate writes "Sen. Patrick Leahy (D-VT) and Sen. John Cornyn (R-TX) have re-introduced the 'PIRATE Act' (pdf) to Congress. According to Ars Technica, the purpose of this act is to get the DoJ to go after individual copyright infringers. It would allow the Department of Justice to bring civil lawsuits instead of criminal ones so that they would be able to prosecute copyright infringers with only a minimal burden of proof, rather than the heavier burden required for criminal prosecution." Took a long time to do a sequel; we first talked about this proposal quite some time ago.
Privacy

EFF Documentation Victory in Telco Spying Case 89

Krishna Dagli sent on a link to Ars Technica's coverage of an EFF victory in a court case related to the NSA/Telco spying scandal. "Judge Vaughn Walker ruled today that AT&T, Verizon, Cingular (now part of AT&T), Sprint, and BellSouth (also part of AT&T now) must all maintain any data or papers related to the NSA spying case that Walker is overseeing in California. The EFF had requested the ruling out of concern that documents would be destroyed as part of routine data deletion practices before the case could even progress to discovery."
United States

House Narrowly Avoids Having to Debate Impeachment of Cheney 1033

An anonymous reader writes "Representative Dennis Kucinich (D-OH) yesterday successfully moved articles of impeachment against Vice President Dick Cheney to the House Judiciary committee. 'Today's resolution from Kucinich (D-Ohio) was essentially the same as the legislation he introduced earlier this year, which included three articles of impeachment against Cheney based largely on allegations that he manipulated intelligence in the run-up to the Iraq war. The last article accuses Cheney of threatening "aggression" against Iran "absent any real threat."'"
Privacy

EU Wants Air Passenger Data Collected 151

An anonymous reader sends news of the EU following in the footsteps of the US in that they are contemplating requiring all 27 member states to collect data on airline passengers and to retain it for up to 13 years. No centralized database would be created; instead states would be encouraged to store and to share their own data as needed. All states would have to pass enabling laws before the measure could come into effect. The rules would not apply to flights entirely within the EU. The proposal is part of an anti-terrorism package that also includes tighter laws to control hate speech and bomb-making instructions.
Yahoo!

Congressional Commitee Rips Yahoo Execs 293

A number of readers sent word of the hearing by the US House Foreign Affairs Committee in which committee members raked two Yahoo execs over the coals. "While technologically and financially you are giants, morally you are pygmies," the committee chairman Tom Lantos, D-Calif., said angrily after hearing from Jerry Yang and Michael Callahan about Yahoo's actions that resulted in the arrest and imprisonment of a Chinese dissident. In 2004 Yahoo turned over information about journalist Shi Tao's online activities requested by Chinese authorities. In Feb. 2006, Yahoo's General Counsel Callahan testified that he had not known the nature of the investigation the authorities were conducting. He later learned that several employees of Yahoo China were aware at the time that the investigation involved "state secrets," but Callahan did not go back to Congress to amend his testimony. Committee members were withering in their disdain for Yahoo's refusal to help Shi Tao's family after his arrest.
Privacy

REAL ID In Its Death Throes, Says ACLU 315

Dr. Eggman points us to Ars Technica for an article on the ACLU's view of the latest loosening and deadline extensions for REAL ID act compliance by the Department of Homeland Security. The rights organization believes that REAL ID is doomed. "The ACLU, which opposes the plan on civil liberties grounds, says that the many changes made since the Act was passed [in 2005] nearly 'negate the original intent of the program.' 'DHS is essentially whittling Real ID down to nothing... all in the name of denying Real ID is a failure,' said ACLU senior legislative counsel Tim Sparapani. 'Real ID is in its death throes, and any signs of life are just last gasps.'"
Wireless Networking

Municipal Wi-Fi - A Promise Unfulfilled? 137

An anonymous reader writes "Jeff Merron at InformationWeek writes about the problems with municipal Wi-Fi, and how despite the high hopes of cities across the country there hasn't been much success deploying it in reality. He also examines the few successful applications of the technology, and tries to explore why more projects don't make it out of their infancy. 'Thus far, there have been a few true municipal Wi-Fi success stories and several spectacular failures. But more than half of municipal Wi-Fi networks remain only in the planning stages. The broad consensus among analysts and providers is that the only viable business models will be centered around municipal government applications, which appear to be able to provide cities with the ability to provide both better and more cost-efficient services for residents and increase city revenue. This will ensure that providers like EarthLink can recoup their capital costs within a few years.'"
Businesses

Target May Discontinue Manhunt 2 Sales 71

Ars Technica's Opposable Thumbs blog is reporting that retail giant Target may be pulling Rockstar's Manhunt 2 from store shelves and their online storefront. "This could be an interesting case: there is no content in Manhunt 2 that goes above and beyond what we've seen in other M-rated games without the extensive hacks needed to unlock the more graphic content. If Target wasn't seeing high sales of the game though, it wouldn't hurt the company financially to pull the game, and it gets to look family-friendly. From a public relations standpoint that's a win-win situation. My question remains: would Target be as quick to pull the game if it were a runaway success? " GamePoltics has up a discussion of the issues surrounding this move, with commentary from analyst Michael Pachter.
Privacy

US Wants Courts to OK Warrantless Email Snooping 476

Erris writes "The Register is reporting that the US government is seeking unprecedented access to private communications between citizens. 'On October 8, 2007, the United States Court of Appeals for the Sixth Circuit in Cincinnati granted the government's request for a full-panel hearing in United States v. Warshak case centering on the right of privacy for stored electronic communications. ... the position that the United States government is taking if accepted, may mean that the government can read anybody's email at any time without a warrant. The most distressing argument the government makes in the Warshak case is that the government need not follow the Fourth Amendment in reading emails sent by or through most commercial ISPs. The terms of service (TOS) of many ISPs permit those ISPs to monitor user activities to prevent fraud, enforce the TOS, or protect the ISP or others, or to comply with legal process. If you use an ISP and the ISP may monitor what you do, then you have waived any and all constitutional privacy rights in any communications or other use of the ISP.'"
Communications

Emailed Threats Less Crazy Than Snail Mail 113

SoyChemist writes "Psychologists at the University of Nebraska have read 300 threatening letters and 99 angry emails to members of Congress. They concluded that the authors of the electronic messages show less signs of serious mental illness, but they are more profane and disorganized. The report was published in the September issue of the Journal of Forensic Sciences."
Music

Study Says P2P Downloaders Buy More Music 158

An anonymous reader writes "Michael Geist posts to his site about a study commissioned by the Canadian government intended to look into the buying habits of music fans. What the study found is that 'there is a positive correlation between peer-to-peer downloading and CD purchasing.' The report is entitled The Impact of Music Downloads and P2P File-Sharing on the Purchase of Music: A Study For Industry Canada, and it was 'conducted collaboratively by two professors from the University of London, Industry Canada, and Decima Research, who surveyed over 2,000 Canadians on their music downloading and purchasing habits. The authors believe this is the first ever empirical study to employ representative microeconomic data.'"
The Military

China's President Hu Talks IT Warfare 170

narramissic writes "In his keynote speech at the Communist Party Congress in October China's president Hu Jintao was specific in his references to one area of IT: defense. 'We must build strong armed forces through science and technology. To attain the strategic objective of building computerized armed forces and winning IT-based warfare, we will accelerate composite development of mechanization and computerization, carry out military training under IT-based conditions, modernize every aspect of logistics, intensify our efforts to train a new type of high-caliber military personnel in large numbers and change the mode of generating combat capabilities.'"

Slashdot Top Deals