itwbennett writes "Speaking at a cloud panel discussion hosted by Reuters on Wednesday, Terry Wise, head of global partner ecosystem for Amazon Web Services, explained how the company handles government requests for data stored on Amazon's cloud: 'If a U.S. entity is serving us with a legally binding subpoena, we contact our customer and work with that customer to fight the subpoena.' But Wise's best advice to customers is to encrypt their data: 'If the data is encrypted, all we'd be handing over would be the cypher text,' he said."
Catch up on stories from the past week (and beyond) at the Slashdot story archive
Contributor Tom Geller writes: "I recently wrote an article about Bitcoin and the law for Communications of the Association for Computing Machinery. In researching it I ran into plenty of wishful thinkers, ridiculous greedheads, and out-and-out nutbags promising a rosy future. I also found the expected blowback from vehement naysayers who think the best way to combat crazy is with more crazy. But despite that, I walked away believing that Bitcoin — or a decentralized cryptocurrency like it (let's call it "Coin") — is here to stay. As an interested outsider to the Coin economy, and a long-time technology commentator, here's what I think its future holds." Read on for Tom's predictions.
MarkWhittington writes "Politico reports in a June 18, 2013 story that House Republicans have added a Mars base to its demands for a lunar base in the draft 2013 NASA Authorization bill. Both the Bush-era Constellation program and President Obama space plan envisioned eventual human expeditions to Mars. But if Politico is correct, the new bill will be the first time an official piece of legislation will call for permanent habitation of the Red Planet. The actual legislative language states, 'The [NASA] Administrator shall establish a program to develop a sustained human presence on the Moon and the surface of Mars.'"
judgecorp writes "BT chief Ian Livingston is leaving the British telecom provider to become a government minister. The executive has been appointed a seat in the House of Lords, which enables him to become Minister for Trade and Investment without having to be elected as a Member of the lower house of Parliament. Livingston has seen BT go from a £134 million loss in 2008 when he was appointed, to a profit of £2.5 billion in 2012. It still has a monopoly over certain sectors of the British telecom market, and has won all the contracts so far for rolling out broadband to rural areas."
Rick Zeman writes "'Confidentiality is critical to national security.' So wrote the Justice Department in concealing the NSA's role in two wiretap cases. However, now that the NSA is under the gun, it's apparently not so critical, according to New York attorney Joshua Dratel: 'National security is about keeping illegal conduct concealed from the American public until you're forced to justify it because someone ratted you out.' The first he heard of the NSA's role in his client's case was 'when [FBI deputy director Sean] Joyce disclosed it on CSPAN to argue for the effectiveness of the NSA's spying.' Dratel challenged the legality of the spying in 2011, and asked a federal judge to order the government to produce the wiretap application the FBI gave the secretive Foreign Intelligence Surveillance Court to justify the surveillance. 'Disclosure of the FISA applications to defense counsel – who possess the requisite security clearance – is also necessary to an accurate determination of the legality of the FISA surveillance, as otherwise the defense will be completely in the dark with respect to the basis for the FISA surveillance,' wrote Dratel. According to Wired, 'The government fought the request in a 60-page reply brief (PDF), much of it redacted as classified in the public docket. The Justice Department argued that the defendants had no right to see any of the filings from the secret court, and instead the judge could review the filings alone in chambers."
The Washington Post reports that Google has filed a motion challenging the gag orders preventing it from disclosing information about the data requests it receives from government agencies. The motion cites the free speech protections of the First Amendment. "FISA court data requests typically are known only to small numbers of a company’s employees. Discussing the requests openly, either within or beyond the walls of an involved company, can violate federal law." From the filing (PDF): "On June 6, 2013, The Guardian newspaper published a story mischaracterizing the scope and nature of Google's receipt of and compliance with foreign intelligence surveillance requests. ... In light of the intense public interest generated by The Guardian's and Post's erroneous articles, and others that have followed them, Google seeks to increase its transparency with users and the public regarding its receipt of national security requests, if any. ... Google's reputation and business has been harmed by the false or misleading reports in the media, and Google's users are concerned by the allegation. Google must respond to such claims with more than generalities. ... In particular, Google seeks a declaratory judgment that Google as a right under the First Amendment to publish ... two aggregate unclassified numbers: (1) the total number of FISA requests it receives, if any; and (2) the total number of users or accounts encompassed within such requests."
chicksdaddy writes "Beware you barons of BitCoin – you World of Warcraft one-percenters: the long arm of the Internal Revenue Service may soon be reaching into your treasure hoard to extract Uncle Sam's fair share of your virtual wealth. A new Government Accountability Office (GAO) report on virtual economies finds that many types of transactions in virtual economies – including Bitcoin mining and virtual transactions that result in real-world profit – are likely taxable under current U.S. law, but that the IRS does a poor job of tracking such business activity and informing buyers and sellers of their duty to pay taxes on virtual earnings. The report, 'Virtual Economies and Currencies: Additional IRS Guidance Could Reduce Tax Compliance Risks' found that the growing use of virtual currencies like BitCoin and virtual game currencies warrants the U.S.'s tax collection agency to mitigate the risks. Those include efforts to educate taxpayers and the publication of basic tax reporting requirements for transactions using virtual currencies, The Security Ledger reports."
Atticus Rex writes "The fact that our social networking services are so centralized is a big part of why they fall so easily to government surveillance. It only takes a handful of amoral Zuckerbergs to hand over hundreds of millions of people's data to PRISM. That's why this Slate article makes the case for a mass migration to decentralized, free software social networks, which are much more robust to spying and interference. On top of that, these systems respect your freedom as a software user (or developer), and they're less likely to pepper you with obnoxious advertisements." On a related note, identi.ca is ditching their Twitter clone platform for pump.io which promises an experience closer to the Facebook news feed. Unfortunately, adoption seems slow since Facebook, Google, et al have an interest in preventing interoperability and it can be lonely on the distributed social network.
benrothke writes "It's said that truth is stranger than fiction, as fiction has to make sense. Had The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests been written as a spy thriller, it would have been a fascinating novel of international intrigue. But the book is far from a novel. It's a dense, well-researched overview of China's cold-war like cyberwar tactics against the US to regain its past historical glory and world dominance." Read below for the rest of Ben's review.
An anonymous reader writes "Not to be left out Apple has released details about government requests for customer data. The company said it received between 4,000-5,000 government requests, affecting as many as 10,000 accounts or devices. From the article: 'The iPad maker said that it received between 4,000 and 5,000 requests from U.S. law enforcement agencies for customer data from December 1, 2012 to May 31, 2013, and that 9,000 to 10,000 accounts or devices were specified in the requests. Apple did not state how many of the requests were from the National Security Agency or how many affected accounts or devices may have been tied to any NSA requests.' Facebook and Microsoft released their numbers this weekend."
cold fjord writes "Yet more details about the controversy engulfing the NSA. From CNET: 'Rep. Mike Rogers (R-Mich.), chairman of the House Intelligence Committee, explained how the program worked without violating individuals' civil rights. "We take the business records by a court order, and it's just phone numbers — no names, no addresses — put it in a lock box," Rogers told CBS News' "Face The Nation." "And if they get a foreign terrorist overseas that's dialing in to the United Sates, they take that phone number... they plug it into this big pile, if you will, of just phone numbers — it's like a phonebook without any names and any addresses with it — to see if there's a connection, a foreign terrorist connection to the United States." "When a number comes out of that lock box, it's just a phone number — no names, no addresses," he said. "If they think that's relevant to their counterterrorism investigation, they give that to the FBI. Then upon the FBI has to go out and meet all the legal standards to even get whose phone number that is."' From the AP: ' ... programs run by the National Security Agency thwarted potential terrorist plots in the U.S. and more than 20 other countries — and that gathered data is destroyed every five years. Last year, fewer than 300 phone numbers were checked against the database of millions of U.S. phone records ... the intelligence officials said in arguing that the programs are far less sweeping than their detractors allege.... both NSA programs are reviewed every 90 days by the secret court authorized by the Foreign Intelligence Surveillance Act. Under the program, the records, showing things like time and length of call, can only be examined for suspected connections to terrorism, they said. The ... program helped the NSA stop a 2009 al-Qaida plot to blow up New York City subways.'"
Reuters reports that Saudi Arabia's government, after banning Viber within the kingdom, is poised to prohibit at least two other such communication apps: Skype and WhatsApp. Says the article: "Conventional international calls and texts are a lucrative earner for telecom operators in Saudi Arabia, which hosts around nine million expatriates. These foreign workers are increasingly using Internet-based applications such as Viber to communicate with relatives in other countries, analysts say." With fewer legal options, a wide-scale Internet censorship regime would be easier to implement, too.
McGruber writes "The NY Times has the news that federal judge Thomas Penfield Jackson, who ruled in 2000 that Microsoft was a predatory monopoly and must be split in half, has died. He was 76 years old. 'A technological novice who wrote his opinions in longhand and used his computer mainly to e-mail jokes, Judge Jackson refuted Microsoft's assertion that it was impossible to remove the company's Internet Explorer Web browser from its operating system by doing it himself. When a Microsoft lawyer complained that too many excerpts from Bill Gates's videotaped deposition — liberally punctuated with the phrase "I don't remember" — were shown in the courtroom, Judge Jackson said, "I think the problem is with your witness, not the way his testimony is being presented."'"
Writing "Wow, this is going to really set the cat amongst the pigeons once this gets around," an anonymous reader links to a story at The Guardian about some good old fashioned friendly interception, and the slide-show version of what went on at recent G20 summits in London: "Foreign politicians' calls and emails intercepted by UK intelligence; Delegates tricked into using fake internet cafes; GCHQ analysts sent logs of phone calls round the clock; Documents are latest revelations from whistleblower Edward Snowden."
First time accepted submitter TigerPlish writes "AT&T has rolled out Wireless Emergency Alerts for iPhones. The alerts are for huge catastrophes (a Presidential Alert), for weather / natural calamities, and for AMBER alerts. One can turn off the latter two, but the Presidential alert cannot be turned off. The article mentions only 4S and 5 get this update. That said, I have a 4 and it got the update this morning. This was enacted in 2006, for those keeping track of such things. I, for one, do not care for this any more than I like the idea of them reading my communications to begin with. Oh, I'm sorry, the "metadata" from my communications." As promised.
bill_mcgonigle writes with this news from from CNET: "Rep. Jerrold Nadler (D NY) disclosed that NSA analysts eavesdrop on Americans' domestic telephone calls without court orders during a House Judiciary hearing. After clearing with FBI director Robert Mueller that the information was not classified, Nadler revealed that during a closed-door briefing to Congress, the Legislature was informed that the spying organization had implemented and uses this capability. This appears to confirm Edward Snowden's claim that he could, in his position at the NSA, 'wiretap anyone from you or your accountant to a federal judge to even the president.' Declan McCullagh writes, 'Because the same legal standards that apply to phone calls also apply to e-mail messages, text messages, and instant messages, Nadler's disclosure indicates the NSA analysts could also access the contents of Internet communications without going before a court and seeking approval.' The executive branch has defended its general warrants, claiming that 'the president had the constitutional authority, no matter what the law actually says, to order domestic spying without [constitutional] warrants,' while Kurt Opsahl, senior staff attorney at EFF claims such government activity 'epitomizes the problem of secret laws.'" Note that "listening in" versus "collecting metadata" is a distinction that defenders of government phone spying have been emphasizing. Tracking whom you called and when, goes the story, doesn't impinge on expectations of privacy. Speaking of the metadata collection, though, reader Bruce66423 writes "According to the Washington Post, the Bush administration took 'bulk metadata' from the phone companies under voluntary agreements for more than four years after 9/11 until a court agreed they could have it compulsorily." Related: First time accepted submitter fsagx writes that Brewster Kahle of the Internet Archive has calculated the cost to store every phone call made in the U.S. over the course of a year: "It's surprisingly inexpensive. It puts the recent NSA stories (and reports from the Boston bombings about the FBI's ability to listen to past phone conversions) into perspective."
McGruber writes "In June of 2012, we discussed news that Larry Ellison, co-founder and chief executive of Oracle, purchased the Hawaiian island Lanai for $300 million. Ellison now owns nearly everything on the island, including many of the candy-colored plantation-style homes and apartments, one of the two grocery stores, the two Four Seasons hotels and golf courses, the community center and pool, water company, movie theater, half the roads and some 88,000 acres of land. (2% of the island is owned by the government or by longtime Lanai families.) Now Ellison is attempting to win over the island's small, but wary, local population, one whose economic future is heavily dependent on his decisions. He and his team have met with experts in desalination and solar energy to change the way water and electricity are generated, collected, stored and delivered on the island. They are refurbishing residential housing intended for workers (Mr. Ellison's Lanai Resorts owns and manages 400 of the more than 1,500 housing units on the island). They've tackled infrastructure, such as lengthening airport runways and paving county roads. And to improve access to Lanai, Mr. Ellison bought Island Air earlier this year and is closing a deal to buy another airline."
An anonymous reader writes "Most of us hear the equivalent of 'let me bring up your record' several times a week or month when dealing with businesses and government agencies; sometimes there's a problem, but clerks are accustomed to dealing with changes in street address, phone numbers, company affiliation, and even personal names (after marriage). But what about gender? Transgendered folks are encountering embarrassing moments when they have to explain that their gender has changed from 'M' to 'F' or vice versa. While there are many issues involved in discrimination against transgendered individuals, I have to confess that the first thing that came to my mind was the impact on database design and maintenance."
wiredmikey writes "Facebook and Microsoft say they received thousands of requests for information from U.S. authorities last year but are prohibited from listing a separate tally for security-related requests or secret court orders related to terror probes. The two companies have come under heightened scrutiny since reports leaked of a vast secret Internet surveillance program U.S. authorities insist targets only foreign terror suspects and is needed to prevent attacks. Facebook said Friday it had received between 9,000 and 10,000 requests for user data affecting 18,000 to 19,000 accounts during the second half of last year and Microsoft said it had received 6,000 to 7,000 requests affecting 31,000 to 32,000 accounts during the same period." Meanwhile, an article at the Guardian is suggesting the government may have better targets to pursue than Edward Snowden. "[U.S. director of national intelligence James Clapper] has come out vocally to condemn Snowden as a traitor to the public interest and the country, yet a review of Booz Allen's own history suggests that the government should be investigating his former employer, rather than the whistleblower."
An anonymous reader writes "For a few years now, we've been hearing about TV-related devices that have built-in cameras and microphones. Their stated purpose is to monitor consumers and gather data — often to target advertising. (We'll set aside any unstated purposes — the uses they tell us about are bad enough.) Now, two members of the U.S. House of Representatives have submitted legislation to regulate this sort of technology. '[They] said they want to get out ahead of the release of this new technology and pass legislation that ensures it would include beefed up privacy protections for consumers. They added that this legislation is particularly relevant given the recent revelations about the National Security Agency's Internet surveillance programs. ... Additionally, the bill requires a cable box or set-top device to notify consumers when the monitoring technology is activated and in use by posting the phrase "We are watching you" across their TV screens.'"