Electronic Frontier Foundation

'Toward a Future We Want to Live In' - EFF Celebrates 32nd Birthday (eff.org) 25

"Today at the Electronic Frontier Foundation, we're celebrating 32 years of fighting for technology users around the world," reads a new announcement posted at EFF.org: If you were online back in the 90s, you might remember that it was pretty wild. We had bulletin boards, FTP, Gopher, and, a few years later, homespun websites. You could glimpse a future where anyone, anywhere in the world could access information, float new ideas, and reach each other across vast distances. It was exciting and the possibilities seemed endless.

But the founders of EFF also knew that a better future wasn't automatic. You don't organize a team of lawyers, technologists, and activists because you think technology will magically fix everything — you do it because you expect a fight.

Three decades later, thanks to those battles, the internet does much of what it promised: it connects and lifts up major grassroots movements for equity, civil liberties, and human rights and allows people to connect and organize to counteract the ugliness of the world.

But we haven't yet won that future we envisioned. Just as the web connects us, it also serves as a hunting ground for those who want to surveil and control our actions, those who wish to harass and spread hate, as well as others who seek to monetize our every move and thought. Information collected for one purpose is freely repurposed in ways that oppress us, rather than lift us up. The truth is that digital tools allow those with horrible ideas to connect with each other just as it does those with beautiful, healing ones.

EFF has always seen both the beauty and destructive potential of the internet, and we've always put our marker down on the side of justice, freedom, and innovation.

We work every day toward a future we want to live in, and we don't do it alone. Support from the public makes every one of EFF's activism campaigns, software projects, and court filings possible. Together, we anchor the movement for a better digital world, and ensure that technology supports freedom, justice, and innovation for all people of the world.

In fact, I invite every digital freedom supporter to join EFF during our summer membership drive. Right now, you can be a member for as little as $20, get some special new gear, and ensure that tech users always have a formidable defender in EFF.

So how does the EFF team celebrate this auspicious anniversary? EFF does what it does best: stand up for users and innovators in the courts, in the halls of power, in the public conversation. We build privacy-protecting tools, teach skills to community members, share knowledge with allies, and preserve the best aspects of the wild web.

In other words, we use every tool in our deep arsenal to fight for a better and brighter digital future for all. Thank you for standing with EFF when it counts.

Government

'Hit the Kill Switch': How Uber Used Covert Tech to Thwart Government Raids (msn.com) 85

The Washington Post shares details from "a trove of more than 124,000 previously undisclosed Uber records." For example, in 2015 Uber CEO Travis Kalanick often pulled an emergency kill switch on its data — that is, "ordered the computer systems in Amsterdam cut off from Uber's internal network, making data inaccessible to authorities as they raided its European headquarters, documents show." "Please hit the kill switch ASAP," Kalanick had emailed, ordering a subordinate to block the office laptops and other devices from Uber's internal systems. "Access must be shut down in AMS," referring to Amsterdam. Uber's use of what insiders called the "kill switch" was a brazen example of how the company employed technological tools to prevent authorities from successfully investigating the company's business practices as it disrupted the global taxi industry, according to the documents.

During this era, as Uber's valuation was surging past $50 billion, government raids occurred with such frequency that the company distributed a Dawn Raid Manual to employees on how to respond. It ran more than 2,600 words with 66 bullet points. They included "Move the Regulators into a meeting room that does not contain any files" and "Never leave the Regulators alone."

That document, like the text and email exchanges related to the Amsterdam raid, are part of the Uber Files, an 18.7-gigabyte trove of data obtained by the Guardian and shared with the International Consortium of Investigative Journalists, a nonprofit newsroom in Washington that helped lead the project, and dozens of other news organizations, including The Washington Post. The files, spanning 2013 to 2017, include 83,000 emails and other communications, presentations and direct messages. They show that Uber developed extensive systems to confound official inquiries, going well past what has been known about its efforts to trip up regulators, government inspectors and police. Far from simply developing software to connect drivers and customers seeking rides, Uber leveraged its technological capabilities in many cases to gain a covert edge over authorities....

According to the documents and interviews with former employees, the company used a program called Greyball to keep authorities from hailing cars — and potentially impounding them and arresting their drivers. It used a technology called "geofencing" that, based on location data, blocked ordinary use of the app near police stations and other places where authorities might be working. And it used corporate networking management software to remotely cut computers' access to network files after they had been seized by authorities.... Greyball was created as a fraud-fighting tool to limit scammers' access to the app, a former executive said, and was at times used to frustrate violent Uber opponents hunting drivers. But Uber operations executives took control of the program and redeployed it against the government, former employees said.

The International Consortium of Investigative Journalists describes their trove of documents as "the secret story of how the tech giant won access to world leaders, cozied up to oligarchs and dodged taxes amid chaotic global expansion."
Crime

What Happened to the Teen Who Stole $23.8M in Cryptocurrency? (rollingstone.com) 67

15-year-old Ellis Pinsky stole $23.8 million worth of cryptocurrency — and his life was never the same. For example, Rolling Stone reports, in his last year of high school, "Four men wearing ski masks and gloves, armed with knives, rope, brass knuckles, and a fake 9 mm," crept around the back of his home in the suburbs: Two weeks before the break-in, a lawsuit had been filed against him, and news stories had circulated connecting him to the hack. He knew that the thieves wanted this money, the millions and millions of dollars he had stolen. He also knew that he couldn't give it to them. He didn't have it. Not anymore.
The magazine paints the portrait of "an anxious young man in Invisalign braces" who describes the revelation he'd had at the age of 13. "The internet held such secrets. All he had to do was uncover them." As he soon found, there were plenty of people working to uncover them all the time, and willing to share their methods — for a price.... Realizing that a lot of the information social engineers used came from hacked databases, he began teaching himself to program, particularly to do the Structured Query Language injections and cross-site scripting that allowed him to attack companies' database architecture. The terabyte upon terabyte of databases he extracted, traded, and hoarded made him valuable to OGUsers as well as to others, like the Russian hackers he was able to converse with thanks to his fluency with his mother's native language... By the time he was 14, he tells me, "I think it's fair to say I had the capabilities to hack anyone."
The article describes him as "attending high school by day and extracting the source code of major corporations by night.... He was 14 years old and taken with the thrill of possessing a hidden superpower, of spending his nights secretly tapping into an underground world where he was esteemed and even feared. And then, in the morning, being called downstairs to breakfast." He wrote a Python script to comb through social media networks and seek out any mentions of working for a [cellphone] carrier. Then he'd reach out with an offer of compensation for helping him with a task. Every fifth or sixth person — underpaid and often working a short-term contract — would say they were game, as Pinsky tells it. For a couple hundred dollars' worth of bitcoin, they'd be willing to do a SIM swap, no questions asked. Eventually, Pinsky says, he had employees at every major carrier also working for him. Then the stakes got even higher. It was only a matter of time before OG hackers, known to each other as "the Community," realized that if they could use the SIM-swapping method to steal usernames, they could just as easily use it to steal cryptocurrency...
In one massive heist Pinksky stole 10% of all the Trigger altcoins on the market from crypto impresario Michael Terpin. ("As Pinsky's money launderers were converting it, the market was crashing in real time.") Pinsky recruited a crew to launder the money — at least one of which simply kept it — but even with all the conversion fees, he still made off with millions. And then... For a while, he half-expected the FBI to knock on his door at any moment, just like in the movies; but as time passed, he grew less anxious.... He says he moved on to learning different types of programming. He ran a sneaker business that used bots and scripts to snap up limited pairs then flip them... He went to soccer practice. He and his friends had started hanging out with girls on the weekend, driving down to the docks where you could see the glowing lights from the Tappan Zee Bridge.
Until Terpin figured out it was Pinsky who'd robbed him: Pinsky and his legal team preempted his arrest by contacting the U.S. attorney directly and offering his cooperation. In February 2020, he voluntarily returned every last thing he says he got from the Terpin heist: 562 bitcoins, the Patek watch, and the cash he'd stored in the safe under his bed.... When I ask if he has also worked with the FBI to help bring down other hackers, he blinks quickly and then changes the subject.
Pinsky has not been criminally charged — partly because he was a minor, but also because of his cooperation with law enforcement. But filing a civil suit, Terpin wants to be compensated with triple the amount stolen, arguing that the teenager who robbed him was running an organized crime racket and that he should be heavily punished to set an example.

Rolling Stone's article raisees the question: what should happen next?
Government

Mexico's President Plans to End Daylight Saving Time (apnews.com) 79

"Mexico's president submitted a bill Tuesday to end daylight saving time, putting an end to the practice of changing clocks twice a year," reports the Associated Press: Health Secretary Jorge Alcocer said Mexico should return to "God's clock," or standard time, arguing that setting clocks back or forward damages people's health...

The change would mean central Mexican time, which covers most of the country, potentially could be permanently two hours behind the east coast of the United States; it is now one hour behind for most of the year.

Here's how Reuters summarizes the Mexican government's position. Changing to daylight saving time in 1996 "was unpopular and did not generate many benefits for the country."
Sci-Fi

UFO Whistleblowers Would Get Immunity Under New Amendment (thedrive.com) 59

Howard Altman writes via The Drive: In an effort to protect those with information about unidentified aerial phenomena (UAP) and increase the influx of reports about them, Rep. Mike Gallagher (R-Wisc) has introduced (PDF) an amendment to the Fiscal Year 2023 National Defense Authorization Act. "The amendment would establish a process within the government for reporting UAPs and provide whistleblower-like protections," Gallagher's spokesman Jordan Dunn told The War Zone Thursday morning. For a multitude of reasons, U.S. troops and government contractors have traditionally been reluctant to come forward with information about these incidents, regardless of their validity. Beyond that, there have also been long-standing allegations that the government and defense contractors could be hiding previous UFO-related programs and evidence. This would allow those with information to come forward without retribution. Some have even posited that language like that in Gallagher's amendment could lead to "UFO disclosure."

In essence, it says that regardless of any previous written or oral non-disclosure agreements "that could be interpreted as a legal constraint on reporting by a witness of an unidentified aerial phenomena," those with information about UAPs, more commonly known as UFOs, would not be violating federal classified information laws if they come forward. The amendment also calls for the head of the new Airborne Object Identification and Management Synchronization Group (AOIMSG), tasked with investigating UAPs on behalf of the Defense Secretary and Director of National Intelligence, to establish "a secure system" for receiving reports of "any events relating to" UAPs and any government or government contractor activity or program related to UAPs. The reporting system shall be administered by "designated and widely known, easily accessible, and appropriately cleared Department of Defense and intelligence community employees or contractors" as part of AOIMSG, which is a much enhanced and more deeply mandated effort that replaced the Unidentified Aerial Phenomena Task Force.

Any information would first be screened "to prevent unauthorized public reporting or compromise of properly classified military and intelligence systems, programs, and related activity, including all categories and levels of special access and compartmented access programs, current, historical, and future." However, federal agencies and contractors working with the government would be precluded from taking actions, including suspending security clearances, for those who report UAP incidents and information. And those who are retaliated against "may bring a private civil action for all appropriate remedies, including injunctive relief and compensatory and punitive damages, against the Government or other employer who took the personnel action, in the United States Court of Federal Claims," the amendment states.

Security

Most Government Websites Serve Tracking Cookies Without Consent, Report Finds (hothardware.com) 27

A new study published by the IMDEA Networks Institute shows just how common it is for government websites to install third-party cookies in visitors' web browsers. HotHardware reports: The study makes a distinction between third-party (TP) cookies and third-party tracking (TPT) cookies, because not all third-party cookies are "set by domains that are known to be tracking users for data collection purposes." The chart [here] shows the percentage of government websites for each country that install at least one third-party cookie, as well as the percentage of said cookies that are associated with domains that are known to be tracking users. Russia tops out the list with over 90% of its government websites installing third-party cookies in visitors' web browsers. Meanwhile, nearly 60% of US government websites install at least one third-party cookie. Germany sits at the bottom of the list with a little under 30% of government websites serving up third-party cookies.

Most of the third-party cookies installed by government websites are known tracking cookies, except in the case of Germany, where under 10% of third-party cookies are associated with domains that are known to track users. The researchers also found that, depending on the country, 20% to 60% of the third party cookies installed by government websites remain in visitors' browsers without expiring for a year or more. That's a long time for a tracker installed without your knowledge or consent to remain active. Beyond specifically tracking cookies, the researchers measured the number of trackers of any kind present on government websites. The Russian gov.ru has the most trackers out of any government website analyzed by the researchers, numbering 31 trackers in total. However, Brazil and Canada aren't far behind, with 25 trackers present on both investexportbrasil.gov.br and nac-cna.ca. The US government website with the most trackers is hhs.gov, which has 13.

The researchers point out that both third-party tracking cookies are automatically installed in visitors' web browsers without their consent. However, the researchers guess that web developers and administrators likely include third-party content without intending to add trackers to their websites. A great many websites now rely on third-party resources and include social content that come with trackers built-in.

Crime

Arizona Makes It Illegal For Bystanders To Record Cops At Close Range (arstechnica.com) 154

An anonymous reader quotes a report from Ars Technica: Arizona passed a law making it harder to record police by limiting how close bystanders can be while recording specified law enforcement activity. [...] The new Arizona law requires any bystanders recording police activity in the state to stand at a minimum of 8 feet away from the action. If bystanders move closer after police have warned them to back off, they risk being charged with a misdemeanor and incurring fines of up to $500, jail time of up to 30 days, or probation of up to a year. Sponsored by Republican state representative John Kavanagh, the law known as H.B. 2319 makes it illegal to record police at close range. In a USA Today op-ed, Kavanagh said it is important to leave this buffer for police to protect law enforcement from being assaulted by unruly bystanders. He said "there's no reason" to come closer and predicted tragic outcomes for those who do, saying, "Such an approach is unreasonable, unnecessary, and unsafe, and should be made illegal."

This week, Kavanagh has succeeded in making close-range recording illegal in Arizona, with only a few exceptions. Perhaps most critically, the person involved in the police activity -- someone being questioned, arrested, or handled by police -- can record, as long as it doesn't interfere with police actions. The same exception extends to anyone recording while in a vehicle involved in a police stop. Additionally, anyone recording activity from an enclosed structure on private property still has a right to record police within 8 feet -- unless law enforcement "determines that the person is interfering" or "it is not safe" for them to be in the area. That caveat potentially gives police a lot of discretion over who can record and when.

Kavanagh said he decided to push for this change in Arizona law after some Tucson officers complained that bystanders sometimes stood a foot or two behind them while recording arrests. The state representative also told USA Today that his decision to set the minimum distance at 8 feet "is based upon 8 feet being established by the US Supreme Court as being a reasonable distance as they applied it to people entering and leaving abortion clinics when faced with protesters." Responding to critics who think citizens should be able to get closer to law enforcement activity, Kavanagh said, "The argument that filming from 8 feet away does not allow for a proper view of the scene is ridiculous." He cited impactful police brutality recordings that were recorded from further distances, including Rodney King (100 feet) and Freddie Gray ("clearly 8 to 10 feet away").
In 2017, a federal appeals court ruled that the First Amendment protects individuals' right to film police officers performing their official duties.

The ACLU says this law is a "chilling" use of the "public's most effective tool against police wrongdoing in violation of our First Amendment rights." ACLU staff attorney K.M. Bell added: "By limiting our ability to record police interactions, this law will undoubtedly make it even more difficult to hold police officers accountable for misconduct."
Businesses

CEO Arrested for Selling $1 Billion in Fake Cisco Hardware on Amazon, eBay (pcmag.com) 23

A Miami-based CEO has been arrested for allegedly importing $1 billion worth of counterfeit Cisco equipment from China and then selling it on Amazon and eBay. From a report: The Justice Department announced today that it had indicted 38-year-old Onur "Ron" Aksoy for selling the counterfeit Cisco gear via numerous online storefronts. Allegedly, Aksoy imported tens of thousands of fraudulent Cisco devices from China and Hong Kong. He then created at least 19 companies in New Jersey and Florida, dubbed the "Pro Network," to help him resell the hardware as genuine through the e-commerce sites.

"The operation allegedly generated over $100 million in revenue, and Aksoy received millions of dollars for his personal gain," the Justice Department said. The Cisco equipment Aksoy allegedly sold was usually older, lower-end models that were previously bought or discarded. Counterfeiters in China then modified the equipment, making the devices appear as if they were newer or more expensive Cisco product models. "As alleged, the Chinese counterfeiters often added pirated Cisco software and unauthorized, low-quality, or unreliable components -- including components to circumvent technological measures added by Cisco to the software to check for software license compliance and to authenticate the hardware," the Justice Department said. In addition, the counterfeit products were packaged with authentic-looking labels, boxes, and documentation.

Privacy

Calls for TikTok Probe Widen, Adding To Pressure on Biden To Weigh In (wsj.com) 25

Calls for an investigation into the security risks posed by the video app TikTok are widening, adding to pressure on President Biden to make good on his year-old promise to get tough on apps that could share Americans' personal data with foreign adversaries. From a report: The Democratic chairman of the Senate Intelligence Committee and the panel's top Republican sent a joint letter to the Federal Trade Commission this week urging an investigation of TikTok's data-handling and other practices. TikTok's parent, ByteDance, has its headquarters in Beijing. The letter from Sens. Mark Warner (D., Va.) and Marco Rubio (R., Fla.) followed reports by BuzzFeed that ByteDance's employees in China have repeatedly accessed U.S. users' personal data.

"We ask that your agency immediately initiate [an] investigation on the basis of apparent deception by TikTok" concerning its data-handling and corporate- governance practices, said the lawmakers' letter. It called for the FTC to coordinate its work with any investigation that might be initiated by the Justice Department. The FTC and DOJ declined to comment. TikTok said that it is making progress in sharply limiting access to its data on Americans.

The Courts

Lawsuit Accuses Troubled Crypto Lender Celsius Network of Fraud (reuters.com) 32

A former investment manager at Celsius Network sued the crypto lender on Thursday, saying it used customer deposits to rig the price of its own crypto token and failed to properly hedge risk, causing it to freeze customer assets. From a report: The complaint said Celsius ran a Ponzi scheme to benefit itself through "gross mismanagement of customer deposits," and defrauded the plaintiff KeyFi Inc, run by the former manager Jason Stone, into providing services worth millions of dollars and refusing to pay for them.
The Courts

Ex-Theranos President Sunny Balwani Found Guilty of Fraud (axios.com) 13

Sunny Balwani, the former president and chief operating officer of bankrupt blood-testing company Theranos, on Thursday was found guilty of 12 counts of conspiracy and fraud against certain investors and patients. Axios reports: It's a similar verdict to one handed down in January to Theranos founder and ex-CEO Elizabeth Holmes, who once dated Balwani. Balwani isn't a household name like Holmes, but he was instrumental in building a billion-dollar house of cards that duped both investors and patients. Balwani's attorneys tried to pin the blame for Theranos' failures on Holmes, much as her attorneys had tried to blame Balwani.

As we wrote when the trial began: Holmes tried to thread an incredibly narrow rhetorical needle, denying the existence of fraud while also redirecting blame. Balwani seems to be attempting something similar; claiming he was a savvy executive with lots of past success, but also a naif who was bamboozled by Holmes. But prosecutors, who originally wanted to try the pair together, often used Balwani's own words against him. For example, they presented a text message from Balwani to Holmes that read: "I am responsible for everything at Theranos." One big difference between the trials, however, was that Balwani didn't testify in his own defense.

Technology

The Code the FBI Used To Wiretap the World (vice.com) 39

The FBI operation in which the agency intercepted messages from thousands of encrypted phones around the world was powered by cobbled together code. From a report: Motherboard has obtained that code and is now publishing sections of it that show how the FBI was able to create its honeypot. The code shows that the messages were secretly duplicated and sent to a "ghost" contact that was hidden from the users' contact lists. This ghost user, in a way, was the FBI and its law enforcement partners, reading over the shoulder of organized criminals as they talked to each other.

Last year, the FBI and its international partners announced Operation Trojan Shield, in which the FBI secretly ran an encrypted phone company called Anom for years and used it to hoover up tens of millions of messages from Anom users. Anom was marketed to criminals, and ended up in the hands of over 300 criminal syndicates worldwide. The landmark operation has led to more than 1,000 arrests including alleged top tier drug traffickers and massive seizures of weapons, cash, narcotics, and luxury cars. Motherboard has obtained this underlying code of the Anom app and is now publishing sections of it due to the public interest in understanding how law enforcement agencies are tackling the so-called Going Dark problem, where criminals use encryption to keep their communications out of the hands of the authorities. The code provides greater insight into the hurried nature of its development, the freely available online tools that Anom's developers copied for their own purposes, and how the relevant section of code copied the messages as part of one of the largest law enforcement operations ever.

China

China Police Database Was Left Open Online for Over a Year, Enabling Leak (wsj.com) 22

What is likely one of history's largest heists of personal data -- and the largest known cybersecurity breach in China -- occurred because of a common vulnerability that left the data open for the taking on the internet, say cybersecurity experts who discovered the security flaw earlier this year. WSJ: The Shanghai police records -- containing the names, government ID numbers, phone numbers and incident reports of nearly 1 billion Chinese citizens -- were stored securely, according to the cybersecurity experts. But a dashboard for managing and accessing the data was set up on a public web address and left open without a password, which allowed anyone with relatively basic technical knowledge to waltz in and copy or steal the trove of information, they said. "That they would leave this much data exposed is insane," said Vinny Troia, founder of dark web intelligence firm Shadowbyte, which scans the web for unsecured databases and found the Shanghai police database in January.

The database stayed exposed for more than a year, from April 2021 through the middle of last month, when its data was suddenly wiped clean and replaced with a ransom note for the Shanghai police to discover, according to Bob Diachenko, owner of the cybersecurity research firm SecurityDiscovery, which similarly found the database -- and later the note -- through its periodic web scans earlier this year. "your_data_is_safe," the ransom note read, according to screenshots provided by Mr. Diachenko. "contact_for_your_data...recovery10btc," meaning the data would be returned for 10 bitcoin, roughly $200,000. The ransom amount matches the price that an anonymous user began asking for last Thursday on an online cybercrime forum in exchange for access to a database the user claimed contained billions of records of Chinese citizens' information stolen from a Shanghai national police database.

Japan

Japan Introduces Jail Time, Tougher Penalties For Online Insults (kyodonews.net) 84

A prison term of up to one year and other tougher penalties for online insults came into effect Thursday as part of Japan's efforts to tackle cyberbullying. From a report: The revised Penal Code also raised the fine for insults to up to 300,000 yen ($2,200), upping the ante from the current penalty of detention for less than 30 days or a fine of less than 10,000 yen. The statute of limitations for insults has also been extended from one year to three years.

Moves to amend the law gained traction after Hana Kimura, a 22-year-old professional wrestler and cast member on the popular Netflix reality show "Terrace House," was believed to have committed suicide in May 2020 after receiving a barrage of hateful messages on social media. Two men in Osaka and Fukui prefectures were fined 9,000 yen each for insults posted about TV personality Kimura before her death, but some expressed concern the penalties were too light, which led to the push for the legal changes.

Crime

More Dogs In the Neighborhood Often Means Less Crime (phys.org) 150

In a study conducted in Columbus, researchers found that neighborhoods with more dogs had lower rates of homicide, robbery and, to a lesser extent, aggravated assaults compared to areas with fewer dogs, at least when residents also had high levels of trust in each other. Phys.Org reports: The results suggest that people walking their dogs puts more "eyes on the street," which can discourage crime, said Nicolo Pinchak, lead author of the study and a doctoral student in sociology at The Ohio State University. "People walking their dogs are essentially patrolling their neighborhoods," Pinchak said. "They see when things are not right, and when there are suspect outsiders in the area. It can be a crime deterrent."

For the study, researchers looked at crime statistics from 2014 to 2016 for 595 census block groups -- the equivalent of neighborhoods -- in the Columbus area. They obtained survey data from a marketing firm that asked Columbus residents in 2013 if they had a dog in their household. Finally, they used data from the Adolescent Health and Development in Context study (which Browning runs) to measure trust in individual neighborhoods. As part of that study, residents were asked to rate how much they agreed that "people on the streets can be trusted" in their neighborhoods. Research has shown that trust among neighbors is an important part of deterring crime, because it suggests residents will help each other when facing a threat and have a sense of "collective efficacy" that they can have a positive impact on their area, Pinchak said.

Results of this study showed, as expected, that neighborhoods with high levels of trust had lower levels of homicide, robbery and aggravated assaults when compared to neighborhoods with low levels of trust. But among high-trust neighborhoods, those with high concentrations of dogs showed an additional drop in crime compared to those with low concentrations of dogs. Among the high-trust neighborhoods, neighborhoods high in dog concentration had about two-thirds the robbery rates of those low in dog concentration and about half the homicide rates, the study found. It really has to do with the dog walking, Pinchak said. [...] Results showed that the trust and dog-walking combination helped reduce street crimes: those crimes like homicides and robberies that tend to occur in public locations, including streets and sidewalks. The study found that more dogs in a neighborhood was also related to fewer property crimes, like burglaries, irrespective of how much residents trust each other, Pinchak said. [...] The protective effect of dogs and trust was found even when a wide range of other factors related to crime was taken into account, including the proportion of young males in the neighborhood, residential instability and socioeconomic status.
The study was published in the journal Social Forces.
Piracy

Broadest US Pirate Site Injunction Rewritten/Tamed By Cloudflare (torrentfreak.com) 10

An anonymous reader quotes a report from TorrentFreak: After causing outrage among online services including Cloudflare, the most aggressive pirate site injunction ever handed down in the US has undergone significant weight loss surgery. Now before the court is a heavily modified injunction that is most notable for everything that's been removed. It appears that Cloudflare drew a very clear line in the sand and refused to step over it. [...] The injunctions granted extreme powers, from residential ISP blocking to almost any other action the plaintiffs deemed fit to keep the sites offline. Almost immediately that led to friction with third-party service providers and the situation only worsened when a concerned Cloudflare found itself threatened with contempt of court for non-compliance. The CDN company fought back with support from Google and EFF and that led the parties back to the negotiating table. Filings in the case last week suggested an acceptance by the plaintiffs that the injunction cannot be enforced in its present form. The parties promised to work on a new injunction to address both sides' concerns and as a result, a new proposal now awaits the court's approval. [...]

With the contempt of court issue behind them, Cloudflare and the plaintiffs appear to have settled their differences. An entire section in the injunction dedicated to Cloudflare suggests that the CDN company is indeed prepared to help the video companies but they'll have to conform to certain standards. Before even contacting Cloudflare they'll first need to make "reasonable, good faith efforts to identify and obtain relief for the identified domains from hosting providers and domain name registries and registrars."

If the plaintiffs still need Cloudflare's assistance, Cloudflare will comply with requests against domain names listed in this injunction and future injunctions by preventing access to the following: "Pass-through security services, content delivery network (CDN) services, video streaming services, and authoritative DNS services, DNS, CDN, streaming services, and any related services." An additional note states that the plaintiffs acknowledge that Cloudflare's compliance "will not necessarily prevent the Defendants from providing users with access to Defendants' infringing services." Given the agreement on the terms, the amended injunction will likely be signed off by the court in the coming days. Service providers everywhere will breathe a sigh of relief while rightsholders will have a template for similar cases moving forward.
The proposed amended injunction documents can be found here (1, 2, 3, 4, 5 pdf).
Crime

Former Top Apple Lawyer Pleads Guilty To Insider Trading (cnbc.com) 26

The former top corporate lawyer at Apple pleaded guilty to insider trading charges, for what prosecutors called a five-year scheme to trade ahead of the iPhone maker's quarterly earnings announcements. Gene Levoff, 48, of San Carlos, California, pleaded guilty to six securities fraud charges at a hearing before U.S. District Judge William Martini in Newark, New Jersey. From a report: Levoff allegedly exploited his roles as corporate secretary, head of corporate law and co-chair of a committee that reviewed drafts of Apple's results to generate $604,000 of illegal gains on more than $14 million of trades from 2011 to 2016. Prosecutors said Levoff ignored the quarterly "blackout periods" that barred trading before Apple's results were released, as well as the company's broader insider trading policy -- which he was responsible for enforcing. "Gene Levoff betrayed the trust of one of the world's largest tech companies for his own financial gain," First Assistant U.S. Attorney Vikas Khanna in New Jersey said in a statement.
Earth

Government Policies Will Not Get UK To Net Zero, Warns Damning Report (theguardian.com) 96

The government is failing to enact the policies needed to reach the UK's net zero targets, its statutory advisers have said, in a damning progress report to parliament. From a report: The Climate Change Committee (CCC) voiced fears that ministers may renege on the legally binding commitment to achieve net zero greenhouse gas emissions by 2050, noting "major policy failures" and "scant evidence of delivery." Lord Deben, the chair of the committee and a former Conservative environment secretary, said the government had set strong targets on cutting emissions but policy to achieve them was lacking. "The government has willed the ends, but not the means," he said. "This report showed that present plans will not fulfil the commitments [to net zero]."

He said net zero policies were also the best way to reduce the soaring cost of living. Average household bills would be about $151.3 lower today if previous plans on green energy and energy efficiency had been followed through. "If you want to deal with the cost of living crisis, this is exactly what you need to do," he said. The greatest failure was the insulation policy. Britain's homes are the draughtiest in western Europe, heating costs are crippling household budgets, and heating is one of the biggest single sources of carbon emissions, but the government has no plans to help most people insulate their homes.

Your Rights Online

Mickey Mouse Could Soon Leave Disney As 95-Year Copyright Expiry Nears (theguardian.com) 237

schwit1 writes: Mickey will be for the public domain in 2024, following U.S. copyright laws that state intellectual property on artistic work expires at the 95-year mark. When Mickey Mouse first appeared, Disney's copyright was protected for 56 years. The company supported the Copyright Act of 1976 which extended protections for 75 years. In 1998, Disney lobbied for a further extension. It is unclear whether the entertainment giant plans to make another move before 2023 to prevent Mickey from being moved into the public domain. Once copyright expires, anyone wishing to use characters from everyone's favorite rodent will not have to request permission or pay copyright charge.
China

Hacker Claims To Have Stolen Data of 1 Billion Chinese From Police (nikkei.com) 39

A hacker has claimed to have procured a trove of personal information from the Shanghai police on one billion Chinese citizens, which tech experts say, if true, would be one of the biggest data breaches in history. From a report: The anonymous internet user, identified as "ChinaDan," posted on hacker forum Breach Forums last week offering to sell the more than 23 terabytes (TB) of data for 10 bitcoin BTC=, equivalent to about $200,000. "In 2022, the Shanghai National Police (SHGA) database was leaked. This database contains many TB of data and information on Billions of Chinese citizen," the post said. "Databases contain information on 1 Billion Chinese national residents and several billion case records, including: name, address, birthplace, national ID number, mobile number, all crime/case details." Reuters was unable to verify the authenticity of the post. The Shanghai government and police department did not respond to requests for comment on Monday.

Slashdot Top Deals