AT&T helped NSA spy on millions of Americans’ private calls, emails; Volkswagen Spent Years Hiding This Huge Security Flaw; 10 Do’s and don’ts for every Android user; Report claims Kaspersky faked malware to trip up competitors’ products; 10 ways your phone has embarrassed you in public; Three Windows 10 Start menu tweaks that subtly improve your experience; Stop the Flash madness – 5 bugs a week; 10 cross-platform messaging apps you shouldn’t overlook; 16 Instagram Tips for the Photo Obsessed; How to get the most out of your rechargeable batteries; Sick of Windows spying on you? Go Linux; Zero-day flaw in Google Admin app allows malicious apps to read its files; Parrot drones easily taken down or hijacked; The 10 Best Wireless Speakers of 2015; The 10 Best HDTVs of 2015; How to Unlock Higher-Quality Xbox Streaming in Windows 10; The 15 best Android puzzle games for teasing your brain.
AT&T helped NSA spy on millions of Americans’ private calls, emails – Newly published documents published Saturday, provided by Edward Snowden in 2013, show the US cellular and telecom giant was in cahoots with the intelligence agency as far back as 1985, a relationship that later intensified following the September 11 terrorist attacks. More than two years after the first document was published by reporters, we’re now venturing into the portion of the documents disclosed by Snowden that are highly likely and previously suspected, but now finally confirmed. The report is long, and there are more than 70 pages to digest. Here some of the snippets from the ProPublica-New York Times report:
Stop the Flash madness – 5 bugs a week – On August 11, 2015 Adobe fixed 34 bugs in their Flash Player software. Many of the bugs enabled a computer to get infected with malicious software simply by viewing a web page. This most recent round of bug fixes comes 28 days after Adobe fixed two other Flash bugs, and 34 days after they fixed 36 bugs. Putting this in perspective, the Flash Player has been updated a dozen times so far this year (below). If you are reading this on August 18th, the odds are that Adobe has found, and not yet fixed, 5 new bugs in the Flash Player. Reading this on August 25th? Chances are you are vulnerable to 10 new Flash bugs. Five bugs a week.
Volkswagen Spent Years Hiding This Huge Security Flaw – First we had a report from a U.S. Senator on the security risks facing new car owners, and then the news that Fiat had recalled 1.4 million cars to address security flaws. And this week a paper is being presented at the USENIX security conference in Washington, D.C., on a security flaw affecting “thousands of cars from a host of manufacturers,” according to a Bloomberg News report. We could have known about these risks for some time, as the paper was actually written two years ago, but car makers like Volkswagen fought in court to keep the information private. According to Bloomberg:
10 Do’s and don’ts for every Android user – There are a lot of choices when it comes to making your Android phone all it can be, and a lot of nuance about which are the “best” choices to make. Everyone has an opinion about the best apps, home screen layouts, launchers, and so on. However, there are some enduring certainties that cannot be avoided. Here are ten “do’s” and “don’ts” for every Android user.
Three Windows 10 Start menu tweaks that subtly improve your experience – Wondering how to logout from the Start menu, improve the look and feel of the Start menu, taskbar, and action center, as well as get the Start screen back? Read on.
How to juggle multiple applications using Task View in Windows 10 – When it comes to managing multiple application windows, one of the most common tasks that you perform in the Windows operating system, Windows 10 really has it all! The new Task View virtual desktop feature makes it easy for you to spread out multiple applications. The enhanced Snap feature provides you with a great way to view and work with multiple applications on the same screen. The Shake and Peek feature, which was introduced in Windows 7 and still exist in Windows 10, allows you to zero in on a single application and quickly hide multiple applications respectively. Let’s take a closer look.
10 cross-platform messaging apps you shouldn’t overlook – When choosing a messaging app, cloud-synchronized chat logs, contact lists, and settings are important considerations. Read about 10 cross-platform messaging apps worth checking out.
16 Instagram Tips for the Photo Obsessed – Are you snap happy? Then you probably have Instagram on your phone. The supersocial photo-sharing app has 300 million monthly active users, but there’s a lot more to the service than just selecting a filter. Read on for 16 more tips and tricks for Instagram.
Microsoft Drops Another Windows 10 Update – And then there were three. Earlier this week, Microsoft released a new set of updates for Windows 10, the third time it has done so since the operating system formally debuted in late July. Windows 10 is Microsoft’s attempt to build a single operating system that can function on devices of any size, or input variety. As before, the update comes with minimal documentation and explanation.
Sick of Windows spying on you? Go Linux – You can try to turn Windows 10’s data-sharing ways off, but, bad news: Windows 10 will keep sharing some of your data with Microsoft anyway. There is an alternative: Desktop Linux. You can do a lot to keep Windows 10 from blabbing, but you can’t always stop it from talking. Cortana, Windows 10’s voice activated assistant, for example, will share some data with Microsoft, even when it’s disabled. That data includes a persistent computer ID to identify your PC to Microsoft.
Linux Mint looks like classic Windows, but without any of Windows 10’s privacy leaks.
Why you can’t find your product key after upgrading to Windows 10 – With Windows 10, Microsoft is doing away with the conventional product key for digital installs. You may never have to manage product keys again. When you use the free upgrade to Windows 10 or pay for a digital retail version, you don’t get a product key. Instead, your computer uses what Microsoft calls a digital entitlement.
Report: 50 million devices now run Windows 10 – How well is Windows 10 doing? Microsoft hasn’t said anything yet about how many people are running the new OS, but if figures reported by WinBeta are correct, it’s off to a strong start. According to WinBeta’s sources, Windows 10 is now running on at least 50 million devices (PCs and tablets).
How to get the most out of your rechargeable batteries – Seven tips for getting the best possible life out of the Li-Ion rechargeable batteries inside your smartphone, tablet or notebook.
The 10 Best Wireless Speakers of 2015 – Wireless speakers have exploded in popularity, and nearly every major consumer electronics vendor has a cord-cutting model of some sort. Speakers can vary wildly in size, shape, and even the type of wireless connection they use, but this list will probably have at least one speaker that’s right for you. Before anything else, though, you need to decide how you want to go wireless.
The 10 Best HDTVs of 2015 – The HDTV market has been changing a lot recently, both in terms of technology and price. New types of screens with organic light-emitting diode (OLED) panels and Ultra HD (UHD, or 4K) resolutions are popping up everywhere. Big, 50-plus-inch sets that once cost thousands of dollars can be had for around $500. If you want an HDTV, you have more options now than ever. But which one should you buy? Here are the main points to consider when shopping for a new set, as well as the 10 best HDTVs we’ve tested.
iCloud.com now lets users restore deleted files – With no announcement whatsoever, Apple has just added a new feature to iCloud.com, the browser version of its cloud storage service, that has it rivaling Dropbox just a tad: the ability to restore recently deleted files. Unfortunately, the feature isn’t exactly easy to find, buried in the Advanced Settings menu, so most iCloud users may not even notice it exists. Should they find it though, they’ll be able to restore documents and other files, in addition to recently deleted contacts and calendar entries.
Microsoft sinks in antivirus tests, as Avira, Bitdefender hit top scores – The latest antivirus scores from the Madgeburg, Germany-based testing lab AV-Test ranks Windows Defender as the worst-performing anti-malware app out of the 22 most common consumer products tested. Breaking down that figure, the scores show the app protected against 89 percent of existing widespread malware threats, and 95 percent of new zero-day flaws. The app also scored a paltry score on performance, suggesting it hogs system resources, but scored top marks in user experience, indicating it is easy to use.
Zero-day flaw in Google Admin app allows malicious apps to read its files – An unpatched vulnerability in the Google Admin application for Android can allow rogue applications to steal credentials that could be used to access Google for Work acccounts. The flaw lies in the way Google Admin processes and loads URLs received from other applications inside a WebView—a simplified browser window.
Mozilla Makes Private Browsing More Private In Firefox, Adds Tracking Protection – Mozilla is testing a new private browsing mode in Firefox that doesn’t just keep no trace of your porn browsing habits on your machine but that also blocks online services that could track you while you’re surfing the web. That’s not unlike what plug-ins like Ghostery and the EFF’s Privacy Badger can do for you, but Firefox now combines that with its own incognito mode. This new experimental feature is now available in the Firefox Developer Edition for Windows, Mac and Linux, as well as the Firefox Aurora channel on Android.
Report claims Kaspersky faked malware to trip up competitors’ products – Two former employees of Kaspersky Lab have accused the malware protection software company of seeding competitors’ products with fake malware signatures intended to make them erroneously label benign files on customers’ computers as malicious. The allegations, made in a report published by Reuters Friday morning, have been strongly denied by a Kaspersky Lab spokesperson. According to Reuters, the “junk” files were tailored to have the same signature as legitimate files, based on the fingerprinting mechanisms of competitors’ products. To do this, the two former employees alleged, Kaspersky assigned employees to reverse-engineer competitors’ products to see how they identified malware and then tailored samples that would match the signatures of common, harmless files.
My browser visited Weather.com and all I got was this lousy malware – Millions of people visiting weather.com, drudgereport.com, wunderground.com, and other popular websites were exposed to attacks that can surreptitiously hijack their computers, thanks to maliciously manipulated ads that exploit vulnerabilities in Adobe Flash and other browsing software, researchers said. The malvertising campaign worked by inserting malicious code into ads distributed by AdSpirit.de, a network that delivers ads to Drudge, Wunderground, and other third-party websites, according to a post published Thursday by researchers from security firm Malwarebytes. The ads, in turn, exploited security vulnerabilities in widely used browsers and browser plugins that install malware on end-user computers.
Parrot drones easily taken down or hijacked, researchers demonstrate – In two separate presentations at Def Con in Las Vegas last weekend, security experts demonstrated vulnerabilities in two consumer drones from Parrot. The simplest of the attacks could make Parrot drones, including the company’s Bebop model, fall from the sky with a keystroke. In a live demonstration at Def Con’s Internet of Things Village on August 8, Ryan Satterfield of the security consulting firm Planet Zuda demonstrated a takedown of a Parrot A.R.Drone by exploiting the drone’s built-in Wi-Fi and an open telnet port on the drone’s implementation of the BusyBox real-time operating system. Connecting to the drone gave him root access to the controller, and he was able to kill the processes controlling flight—causing the drone to drop to the ground.
Apple squashes serious security bug with update to Mac OS X – Released on Thursday, Mac OS X 10.10.5 resolves scores of holes and technical glitches. But one serious bug in particular was squashed along with the rest. The vulnerability in an environment variable known as DYLD_PRINT_TO_FILE in Apple’s OS X was considered serious because it enables hackers to remotely run a program on a Mac using administrator rights, which opens up wide access to the entire operating system. The vulnerability had already been exploited “in the wild,” or in the real world, according to the Guardian, with at least one adware installer taking advantage of it.
Scan your Android for Certifi-Gate vulnerability – This flaw, dubbed Certifi-Gate, was discovered by Check Point and revealed at Black Hat in Las Vegas. The flaw uses a remote support tool’s security certificate to take total control over an Android device. Unfortunately, the Android platform offers no means of revoking the certificates issued to the vulnerable apps. The only way Certifi-Gate can be fixed is for the makers of the remote support tools to issues patches. This means that you are at the mercy of a third-party, and not all third parties are created equal. But which apps are vulnerable? Here’s the official list from Check Point:
News Corp. CEO calls Google thieves (and other things) – News Corp. CEO Robert Thompson isn’t moved by Google’s new Alphabet. As Australia’s mUmbrella reports, in a speech at the Lowy Institute Media Awards, Thompson created his own lexicon of what Google’s Alphabet stands for. He said: “That Google’s newly conceived parent company is to be called Alphabet has itself created a range of delicious permutations: A is for Avarice, B is for Bowdlerize, through to K for Kleptocracy, P for Piracy and Z for Zealotry.” Thompson believes that Google represents a leech on the hard work of those who try to create original content, only to have it purloined by Google’s caring, sharing, Web-controlling ways.
IBM Teams With Canonical To Put Ubuntu Linux On Mainframes – You might not think that ‘Linux’ and ‘mainframe’ belong in the same sentence, but IBM has been putting various flavors of Linux on its mainframe computers for 15 years. Today IBM and Canonical announced that the two companies were teaming up to build one running Ubuntu Linux. The new unit is called the LinuxOne. The announcement comes as part of a broader strategy from IBM designed to drive mainframe usage to a wider audience. This new approach includes a monthly subscription pricing model, deeper involvement with other open source projects, contributing a huge cache of mainframe code to open source and participating in the newly launched Open Mainframe Project.
Court denies Samsung request for rehearing in Apple patent case – A U.S. appeals court has denied Samsung Electronics’ request for a rehearing in a smartphone patent infringement case that awarded rival Apple US$548 million. The case stems from a 2011 patent infringement lawsuit brought by Apple, alleging Samsung infringed on several iPhone patents related to the design and packaging of the smartphone. Fellow tech giants Google, Hewlett-Packard, Dell and Facebook backed Samsung’s appeal of the damages.
Apple’s self-driving car plans may have just been outed – Apple’s supposed self-driving electric car efforts may be real — and far enough along for testing, according to a new report from the Guardian. The publication, citing documents it obtained under a public records act request, said Apple has met with officials from the GoMentum Station, a large former Navy weapons station near San Francisco that is being changed into a high-security testing area for self-driving cars.
Court dismisses Dallas Buyers Club’s letters to infringers – The Federal Court has ruled that Dallas Buyers Club cannot send the draft letters presented to court to the almost 5,000 Australian IP addresses that have allegedly breached its copyright by downloading infringing copies of the film.
Games and Entertainment:
How to Unlock Higher-Quality Xbox Streaming in Windows 10 – I’ve been having fun with Windows 10; it’s a pretty easy operating system for Windows enthusiasts to comprehend. For gamers, there’s the added perk of being able to play Xbox One games on your PC, especially if your computer setup is better than your TV. These games aren’t played on your PC. Microsoft just streams whatever you’re doing on your Xbox One to your computer, and any controller inputs are sent back to your console.
The 15 most anticipated PC games of (the rest of) 2015 – It’s August, which means we’re technically two-thirds of the way through the year. But don’t tell that to video games. We’re about to enter the vaunted “fall release cycle,” which means in the next three or four months publishers will release more big-name games than they’ve released since January. Like last year, though, delays have pushed some of the year’s most-anticipated titles back to 2016. But all is not lost. We’ve rounded up fifteen of the most interesting PC games still scheduled to release this fall, from Fallout 4 to SOMA.
Fallout 4 – Nov. 10
Unreal wants you to mod dinosaur world with the ARK Dev Kit – This week the folks at Studio Wildcard and Epic Games have teamed up with Alienware to encourage creative folks to go wild in dinosaur-land. In the world of ARK, that is, a video game where the ancient world and the modern world mix in an absolutely wild open world environment. To begin, users need to sign up for a free Unreal account and download the ARK Dev Kit – which is no small task due to its size. The ARK Dev Kit is a cool 42GB in size. It’s massive. But it’s worth the wait. Inside you’ll be rolling around in code, aiming to create one of the following: New Maps, New Functionality, New Game Modes.
The Witcher 3 mod tools: What can we expect? – Ever since the release of The Witcher 3: Wild Hunt back in May, a steady flow of mods have been trickling out for the PC version of the game. However, pretty soon modders will be getting new tools to help make content creation even easier via the introduction of official mod tools by CD Projekt Red. But what can we expect from these tools? I recently got the chance to talk to CD Projekt Red about what The Witcher 3’s mod tools can do and what their plans are for mods in the future.
The 15 best Android puzzle games for teasing your brain – No mater if you’re into match-three games, word puzzlers, engrossing adventures, or tricky touch-centric affairs, we’ve picked 15 essential Android puzzle games worth tossing on your phone or tablet. Whether you’ve got two minutes or two hours to fill, you’ll find some excellent choices within.
Off Topic (Sort of):
Brilliant GPS navigation system changes to children’s voice near schools – We often drive unconsciously. Our minds drift as our hand-eye coordination pilots our cars automatically. Until, sometimes, it’s too late. So a Scandinavian insurance company — the confidently named If Insurance — came up with an idea that seems blissfully simple, yet potentially very effective. It’s a GPS navigation system with a tiny difference. Whenever you’re driving near schools, day care centers or anywhere where there might be children, the system’s voice switches to that of a child.
Why Google Became Alphabet, Explained In 120 Seconds – What are the pros and cons of Google reorganizing itself as Alphabet? Well, Larry gets to play with the future, Google can focus on more ambitious projects, and it could help the company retain top talent. But will the independent Alphabet company CEOs get frustrated relying on Larry for resources? Here’s everything you need to know in a quick two minute video.
How to Get Started With a Fitness Tracker – If you just got your first activity tracker, whether a Fitbit or some other device, you’re about to become aware of your body and fitness level in a whole new light! Fitness trackers bring an awareness to our daily habits and patterns that few other devices can. As a huge proponent of fitness trackers, I personally test and try out as many of them as I can. I remember how it felt to get my first one, and how annoyed I was when I realized after several hours that I hadn’t set it up right! I also know that there are some aspects of fitness trackers you should learn about as soon as possible, because you need to use them for several days before they tell you anything meaningful.
The smartphone battleground of India — and why Xiaomi wants in – India is the world’s fastest growing smartphone market, predicted to overtake the US in just two years. And it’s already becoming one of the most bitterly fought-over pieces of turf in the global smartphone war.
Nerf’s new ‘Rival’ tactical guns are for grown ups, fire at 70MPH – Nerf guns are fun for a moment or two, but the combination of endless dart hunting and lackluster shooting speed/accuracy wears thin quickly. As such, the play rifles have largely been relegated to the realm of children, but that’ll be ending with the maker’s new ‘Rival’ lineup of tactical guns for competitive play. Nerf has been silently working on these new tactical arms for more than four years, and this week graced us all with a behind-the-scenes look at what went into making them. Pre-orders are live, but you’re probably too late: most of them are sold out already.
Watch as astronauts soar over an Aurora Borealis in the space station – This isn’t your run-of-the-mill snapshot of the Northern Lights. The ten-second clip catches the spectacular moment right as the vibrant greens and violet swirls of light meet the blinding white of the sunrise. The scene, however brief, is otherworldly and reminiscent of fantastic sci-fi visages from the arts. It looks like something out of a Mass Effect cutscene or the psychedelic trip to “The Infinite and Beyond” in 2001: A Space Odyssey. Except this is no piece of fiction: this is real life, and it’s right here near Earth.
10 ways your phone has embarrassed you in public – Sometimes your smartphone is a life-saver – like when it helps you avoid super awkward situations. But other times it’s not so awesome—like when it rings in the middle of your grandfather’s funeral service, or when your obsession with it causes you to fall into a fountain while texting: Here are 10 times your phone is not on your side. And in public, no less!
Something to think about:
“You only live once, but if you do it right, once is enough.”
– Mae West
Kingsoft Writer Free 2013 – Kingsoft Writer Free 2013 is a totally free word processor program with the qualities matching Microsoft Word and includes a wide range of easy to use features. It is the best Microsoft Word replacement supporting all the Word file formats including .docx. The easy to use user interface makes Kingsoft Writer an attractive choice of software for complete beginners and even the most advanced users. In addition, it introduced lots of useful functions including a built-in Word to PDF converter, automatic spell check, web layout view, etc.
As a free word processor, Kingsoft Writer is more powerful compared with any other similar software, regardless of interface, operation, or storage format. With Kingsoft Writer, it is easy to create visually stunning documents and manage your files. Using the default format already defined, users can save the editor time from having format each document.
The latest version supports saving file as DOCX format.
I’ve used this free application for years. In fact, this is the application that I used to initially set up the web page you are now reading. The screen capture below is an example of my everyday usage of this super freebie.
WPS Office Free 2014 (which includes Kingsoft Writer Free), is also available.
In Pursuit of Freedom – The Pushback Continues:
Leaked NSA documents show AT&T had a ‘highly collaborative’ relationship with spy agency – New documents released by Edward Snowden reveal AT&T was far more than just a willing participant in the National Security Agency’s efforts to snoop on the world’s internet usage. NSA documents say that the agency had a “highly collaborative” relationship with AT&T, and the company is described as having an “extreme willingness to help.”
The new details come from a joint report from The New York Times and ProPublica. The key takeaway is that it appears AT&T was happy to help the NSA. It’s already been documented that the telecom giant, like other service providers, did not try to protect its customers’ privacy or make efforts to restrict the NSA’s reach. But it now seems clear that AT&T went out of its way to accommodate the NSA.
According to the joint report, AT&T installed surveillance equipment — at the NSA’s request — in no fewer than 17 internet hubs across the US. To put that in perspective, it’s said that Verizon, the other major telecom in the US, installed “far fewer” systems at its hubs. The NSA’s payments to AT&T for its cooperation — which were previously revealed to be $10 million in 2013 — are reportedly more than double what the agency paid for the second largest program. It’s likely Verizon was the recipient of the second-largest payments.
In addition, the documents reveal that AT&T provided the NSA with emails sent between foreigners years before Verizon started the practice.
The end of privacy as we know it: 60 Minutes uncovers huge mobile phone security vulnerabilities – IT’S the dirty little secret that’s facilitating what’s being called the biggest breach of privacy ever.
Government, security agencies and the telecommunications industry will be forced to explain a security hole that allows hackers to listen in to conversations and hijack Australians’ mobile phones after it’s exposed by a 60 Minutes investigation, the program claims.
In an investigation into mobile security spanning three continents, reporter Ross Coulthart believes he has uncovered a security vulnerability that could affect any of us, and there’s nothing being done to stop it.
“What it means is that your smartphone is an open book,” he told news.com.au
“Criminals now have access to these huge security holes to steal your data and listen in to your calls. We know telephone companies know about it, we know security agencies know about it, but nothing is being done.” (recommended by Mal C.)
Harper (and friends – Tony Abbott and David Cameron) are a bigger threat than IS – Conservatives PMs Stephen Harper, Tony Abbott and David Cameron parrot the same message — selling fear to win votes.
The comedian Peter Sellers acting in the role of Inspector Clouseau has always been one of my investigative heroes. So, using Clouseau-like sleuthing skills, I think I have finally figured out what Stephen Harper must have meant in the recent Canadian election debate when he warned of an “international movement” presenting “a very serious menace to this planet, including to this country.”
I respectfully submit the following as evidence:
With the next three statements, made in recent days by separate individuals in three different countries, I ask you this question: What is the common thread?
“It would be absolutely foolish for us not to go after this group before they come after us.”
“This is the threat of our generation, the battle of our generation and the fight that we’re going to have.”
“They’re coming after us. We may not feel we are at war with them, but they are certainly at war with us.”
(Drum roll, please …)
And the answer is … conservative prime ministers!
These were words uttered recently by 1) Stephen Harper, Canada; 2) David Cameron, United Kingdom; and 3) Tony Abbott, Australia.
Their similarities are revealing. What links these three leaders, apart from their common ideology, is a remarkably identical — and extreme — approach to the challenges of today’s Middle East. In fact, there are growing signs that these politicians, all comrades in arms, are quietly working from the same playbook.
After all, the formula is simple: Wildly exaggerate the actual threat. Inflame the rhetoric. Blame Muslims. Brush aside issues of human rights. And strap in — while the votes flow your way. It is a clever way to distract voters from more immediate and genuine threats, such as climate change and the economy.
In my view, if this doesn’t fit the criteria of an “international movement” posing “a very serious menace to this planet,” I don’t know what does.
New York Times: The Closing of the Canadian Mind – THE prime minister of Canada, Stephen Harper, has called an election for Oct. 19, but he doesn’t want anyone to talk about it.
He has chosen not to participate in the traditional series of debates on national television, confronting his opponents in quieter, less public venues, like the scholarly Munk Debates and CPAC, Canada’s equivalent of CSPAN. His own campaign events were subject to gag orders until a public outcry forced him to rescind the forced silence of his supporters.
Mr. Harper’s campaign for re-election has so far been utterly consistent with the personality trait that has defined his tenure as prime minister: his peculiar hatred for sharing information.
Americans have traditionally looked to Canada as a liberal haven, with gun control, universal health care and good public education.
But the nine and half years of Mr. Harper’s tenure have seen the slow-motion erosion of that reputation for open, responsible government. His stance has been a know-nothing conservatism, applied broadly and effectively. He has consistently limited the capacity of the public to understand what its government is doing, cloaking himself and his Conservative Party in an entitled secrecy, and the country in ignorance.
Sen. Dianne Feinstein is worried net neutrality might help the terrorists – In a remarkable feat, internet providers have apparently succeeded in making the net neutrality fight about terrorism. In a newly-published letter delivered to the Federal Communications Commission in May, Sen. Dianne Feinstein (D-Ca) raised concerns that the new net neutrality rules might be used to shield terrorists. In particular, Feinstein was concerned that Dzhokar Tsarnaev had studied bomb-making materials on the internet — specifically, online copies of AQAP’s Inspire magazine — and that many broadband providers had complained to her that net neutrality rules would prevent them from honoring any orders to block that content.
It’s quite a bind, and in the letter, Feinstein entreats FCC chair Tom Wheeler to assure providers that it isn’t true. The senator acknowledges that there are laws against material support for terrorism, and Title II only applies to legal web traffic, but “nonetheless, there is apparently confusion among at least some broadband providers on whether they may take such actions in order to promote national security and law enforcement purposes.”
This argument is nonsense for at least three different reasons.
Will Supreme Court force DHS to divulge secret plan to cut cell service? – The Supreme Court was asked in a petition to force the government to disclose the US clandestine plan to disable cell service during emergencies.
The case concerns Standard Operating Procedure 303. A federal appeals court in May said the government did not have to release its full contents because the Freedom of Information Act (FOIA) allows the authorities to withhold records if they would “endanger” public safety.
The Electronic Privacy Information Center told the high court’s justices Tuesday that the US Court of Appeals for the District of Columbia Circuit’s decision created a new “catchall provision that can be used in any case involving records related to domestic and national security programs.” (PDF)
The privacy group had demanded the documents from the Department of Homeland Security in 2011 following the shuttering of cell service in the San Francisco Bay Area subway system to quell a protest. The Department of Homeland Security refused to divulge the documents associated with SOP 303, which the appeals court described as a “unified voluntary process for the orderly shut-down and restoration of wireless services during critical emergencies such as the threat of radio-activated improvised explosive devices.”
Woman fined for Facebook pic of police car in disabled spot – In the US, citizens have begun to film the police with abandon.
In turn, the police have started to wear bodycams in order to capture what they see.
In Spain, however, a new gagging law has been enacted. It’s titled the Citizens Security Law.
When laws are named this way, you get the feeling that citizens’ security might not be their primary aim.
This law limits what people can post on social networks about, for example protests. It also prevents “the unauthorized use of images of police officers that might jeopardize their or their family’s safety or that of protected facilities or police operations.”
Oddly, this law has just been used to fine a woman who took a photograph of a police car. This particular car was parked (illegally) in a disabled spot.