Rights, Technology

Photographer wins $1.3m payout from companies that took images from Twitter

A US federal jury has ordered two media companies to pay $US1.2 million ($1.3m) to a freelance photojournalist for their unauthorised use of photographs he posted to Twitter.

The jury found Agence France-Presse and Getty Images wilfully violated the Copyright Act when they used photos Daniel Morel took in his native Haiti after the 2010 earthquake that killed more than 250,000 people, Mr Morel’s lawyer, Joseph Baio, said.

The case is one of the first to address how images that individuals make available to the public through social media can be used by third parties for commercial purposes.

We believe that this is the first time these defendants, or any other major digital licensor of photography, have been found liable for wilful violations of the Copyright Act, Mr Baio said in an email.

Lawyers for AFP and Getty did not immediately respond to requests for comment — via redwolf.newsvine.com

Politics, Rights, Technology

Hosting what the Govt won’t: Delimiter establishes AGD FoI mirror

Technology media outlet Delimiter today revealed it would establish a free file-serving mirror of PDF documents published under Freedom of Information laws by the Attorney-General’s Department and relevant to the technology sector, in the wake of confirmation by the department that it has removed such documents from its website.

Under the Freedom of Information Act, all government departments and agencies covered by the legislation must provide a way for the public to access documents which any party has requested under the legislation. This means that if individuals make FoI requests of government organisations, that that information will eventually reach the public domain and be accessible to all.

Almost all Federal Government organisations — including some government business enterprises such as NBN Co — interpret the act to mean that they must publish documents released under the FoI act in a disclosure log on their website. The Attorney-General’s Department, which contains FoI oversight as part of its portfolio, has historically done this.

However, the department recently removed PDF documents relating to FoI requests from its website, forcing those seeking access to the documents to email or otherwise communicate with it directly. This has substantially reduced access to a number of sensitive documents — via redwolf.newsvine.com

Business, Technology

New Research Says Aussie Retailers Suck At Online Shopping

Australian consumers are embracing digital commerce, but Australian retailers are failing to build long-term relationships with their customers online, according to new research.

More than 50 per cent of Australians have been described as digital buyers who prefer to buy online where possible, a statistic that puts Australians among the top digital consumers in the world.

But the Australian retail sector is late to the party. A recent Deloitte survey found that Australian retailers are going digital at a snail’s pace.

More than 50 per cent of respondents expect to generate less than 2 per cent of their Christmas sales online.

And while David Jones’ 1000 per cent quarterly increase in online sales recently made headlines, this increase comes from a very low base, with digital commerce now accounting for a mere 1% of the retail giant’s total sales figure — via redwolf.newsvine.com

Technology

3D-printed guns can explode, injure users, tests show

The Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) last week released videos of tests of plastic guns made with 3D printers that show some exploding on the first shot. The explosions could injure users, the testing found.

The ATF has been testing guns made with 3D printers using two commonly used thermoplastic materials over the past year to determine how safe the weapons are.

Guns made using one of the two thermoplastics tested, a polymer from VisiJet, never lasted more than one shot before exploding. The other material, acrylonitrile butadiene styrene (ABS), could produce a gun that fired eight times without incident.

The agents stopped shooting after eight bullets, an ATF spokesperson said.

It depends on the material as well as the quality of the printer. Those variables both go into it, the spokesperson said.

The spokesperson wouldn’t identify 3D printers used or which computer-assisted drawing (CAD) files were downloaded to create the weapon — via redwolf.newsvine.com

Business, Rights, Technology

UK spies continue ‘quantum insert’ attack via LinkedIn, Slashdot pages

According to a new report by Der Spiegel, the British signals intelligence spy agency has again employed a quantum insert technique as a way to target employees (Google Translate) of two companies that are GRX (Global Roaming Exchange) providers.

The lead author of the story in the German magazine is Laura Poitras, one of the journalists known to have access to the entire trove of documents leaked by former National Security Agency (NSA) contractor Edward Snowden.

GRX is roughly analogous to an IX (Internet Exchange), and it acts as a major exchange for mobile Internet traffic while users roam around the globe. There are only around two dozen such GRX providers globally. This new attack specifically targeted administrators and engineers of Comfone and Mach (which was acquired over the summer by Syniverse), two GRX providers.

Der Spiegel suggests that the Government Communications Headquarters (GCHQ), the British sister agency to the NSA, used spoofed versions of LinkedIn and Slashdot pages to serve malware to targets. This type of attack was also used to target nine salaried employees of the Organisation of Petroleum Exporting Countries (OPEC), the global oil cartel.

This new revelation may be related to an attack earlier this year against Belgacom International Carrier Services (BICS), a subsidiary of the Belgian telecom giant Belgacom. BICS is another one of the few GRX providers worldwide — via redwolf.newsvine.com

Technology

How to roll your own VPN

If you need to encrypt traffic from your computer or mobile device, you have many options. You could buy a commercial VPN solution, or you could sign up for a VPN service and pay a monthly fee. Or for less money, you could create your own VPN and gain the use of a Linux VPS (Virtual Private Server) anywhere in the world. This roll-your-own option is made possible through the use of the open source OpenVPN project, Linux, and a few open source client-side applications. The VPS-based setup described here is designed to encrypt all the traffic from your laptop, desktop, or mobile phone to your VPN server, which then unencrypts that traffic and passes it on to its destination. This can be very useful if you’re using the Internet from a coffee shop, a hotel, or a conference and you do not trust the network — via ITworld

Technology

Meet badBIOS, the mysterious Mac and PC malware that jumps airgaps

Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused. He also found that the machine could delete data and undo configuration changes with no prompting. He didn’t know it then, but that odd firmware update would become a high-stakes malware mystery that would consume most of his waking hours.

In the following months, Ruiu observed more odd phenomena that seemed straight out of a science-fiction thriller. A computer running the Open BSD operating system also began to modify its settings and delete its data without explanation or prompting. His network transmitted data specific to the Internet’s next-generation IPv6 networking protocol, even from computers that were supposed to have IPv6 completely disabled. Strangest of all was the ability of infected machines to transmit small amounts of network data with other infected machines even when their power cords and Ethernet cables were unplugged and their Wi-Fi and Bluetooth cards were removed. Further investigation soon showed that the list of affected operating systems also included multiple variants of Windows and Linux.

We were like, ‘Okay, we’re totally owned,’ Ruiu told Ars. ‘We have to erase all our systems and start from scratch,’ which we did. It was a very painful exercise. I’ve been suspicious of stuff around here ever since.

In the intervening three years, Ruiu said, the infections have persisted, almost like a strain of bacteria that’s able to survive extreme antibiotic therapies. Within hours or weeks of wiping an infected computer clean, the odd behaviour would return. The most visible sign of contamination is a machine’s inability to boot off a CD, but other, more subtle behaviours can be observed when using tools such as Process Monitor, which is designed for troubleshooting and forensic investigations.

Another intriguing characteristic: in addition to jumping airgaps designed to isolate infected or sensitive machines from all other networked computers, the malware seems to have self-healing capabilities — via redwolf.newsvine.com

Technology

So many cyberspying hackers about… and most of you are garbage

Cyber-espionage groups are too numerous to count and are often far less skilled than their reputation suggests, according to threat-trackers.

Costin Raiu, director of global research at Kaspersky Lab, estimated that anything between 100 to 200 hacking crews operate in China alone.

Despite the hype abut zero-day attacks, many successful assaults relied on rudimentary attacks that successfully took advantage of poor patching practices and other rudimentary security mistakes, Raiu said during a panel session at the RSA Europe Conference — via redwolf.newsvine.com

Technology

Ditch Microsoft Office or take a pay cut: Which would you choose?

The strongest driver for free software adoption in a public administration? Fear of layoffs.

If you don’t believe it, ask the autonomous province of South Tyrol, in Northern Italy. The local government has just begun implementing a plan that will have most public sector organisations in the region using LibreOffice by 2016. Really.

And why did they do it? Because the austerity measures passed by the national government meant the region was left facing a €16m cut to its personnel budget. In order to avoid cutting employees (or, more likely, their pay), management and unions had to find a creative solution. Which they did: a mass migration from Microsoft Office to an open source equivalent.

The savings are mandatory, so it was either us or the proprietary software, said Erwin Pfeifer, not entirely joking. Pfeifer is a member of the autonomous province’s IT department and one of the people managing the project — via redwolf.newsvine.com

Politics, Technology

FTTP NBN ‘wacko’, claims Mad Monk PM

Prime Minister Tony Abbott has described the previous Labor Federal Government’s attempt to extend fibre broadband to most Australian homes and businesses as wacko, despite the fact that Labor’s Fibre to the Premises model is seen as the long-term future of most fixed telecommunications networks globally.

Under Labor’s NBN policy, some 93 percent of Australian premises were to have received fibre directly to the premise, delivering maximum download speeds of up to 1Gbps and maximum upload speeds of 400Mbps. The remainder of the population was to have been served by a combination of satellite and wireless broadband, delivering speeds of up to 25Mbps.

Originally, the Coalition’s policy was to have seen fibre to the premises deployed to a significantly lesser proportion of the population — 22 percent — with 71 percent covered by fibre to the node technology, where fibre is extended to neighbourhood nodes and the remainder of the distance to premises covered by Telstra’s existing copper network. The Coalition’s policy was also continue to use the HFC cable network operated by Telstra and will also target the remaining 7 percent of premises with satellite and wireless.

However, the possibility of a different style of rollout has been raised by Turnbull in the several weeks since the Liberal MP became Communications Minister. In late September, Turnbull appeared to have drastically modified the Coalition’s policy stance on the NBN just weeks after the Federal Election, declaring the Coalition was not wedded to its fibre to the node model and was thoroughly open-minded about the technology to be used in the network. NBN Co is currently conducting a strategic review into its operations and model that will inform Turnbull’s decisions regarding the project’s future.

However, in a new interview with the Washington Post published this week, Abbott directly stated that Labor’s FTTP model was irrational — via redwolf.newsvine.com

Politics, Rights, Technology

Surprise! Coalition re-kindles anti-piracy talks

The new Coalition Federal Government has reportedly signalled plans to restart long-running talks between the telecommunications and content industries to deal with the issue of Internet piracy, despite the fact that a previous round of talks between the two sides under the previous Labor administration proved pointless.

The Australian newspaper reported this morning that the Attorney-General’s Department has sent letters to the nation’s top telcos and content creators seeking their participation in a series of industry roundtables to resolve the online piracy issue as a matter of urgency.

It is not yet clear precisely what new Attorney-General George Brandis or the Attorney-General’s Department is seeking from the talks. as neither has issued a statement on the issue. Delimiter has filed a Freedom of Information request this morning with the department seeking the text of any letters sent by Brandis or the Department to telcos on the issue since Brandis took office. In addition, comment is being sought from Brandis on the issue — via redwolf.newsvine.com

Rights, Science, Technology

A Case Study in Closed Access

One of the core messages of Open Access Week is that the inability to readily access the important research we help fund is an issue that affects us all—and is one with outrageous practical consequences. Limits on researchers’ ability to read and share their works slow scientific progress and innovation. Escalating subscription prices for journals that publish cutting-edge research cripple university budgets, harming students, educators, and those of us who support and rely on their work.

But the problems don’t stop there. In the digital age, it is absurd that ordinary members of the public, such as healthcare professional and their patients, cannot access and compare the latest research quickly and cheaply in order to take better care of themselves and others.

Take the case of Cortney Grove, a speech-language pathologist based in Chicago, who posted this on Facebook:

In my field we are charged with using scientific evidence to make clinical decisions. Unfortunately, the most pertinent evidence is locked up in the world of academic publishing and I cannot access it without paying upwards of $40 an article. My current research project is not centred around one article, but rather a body of work on a given topic. Accessing all the articles I would like to read will cost me nearly a thousand dollars. So, the sad state of affairs is that I may have to wait 7-10 years for someone to read the information, integrate it with their clinical opinions (biases, agendas, and financial motivations) and publish it in a format I can buy on Amazon. By then, how will my clinical knowledge and skills have changed? How will my clients be served in the meantime? What would I do with the first-hand information that I will not be able to do with the processed, commercialised product that emerges from it in a decade? — via redwolf.newsvine.com

Business, Technology

Experian Sold Consumer Data to ID Theft Service

An identity theft service that sold Social Security and drivers license numbers — as well as bank account and credit card data on millions of Americans — purchased much of its data from Experian, one of the three major credit bureaus, according to a lengthy investigation by KrebsOnSecurity.

In November 2011, this publication ran a story about an underground service called Superget.info, a fraudster-friendly site that marketed the ability to look up full Social Security numbers, birthdays, drivers license records and financial information on millions of Americans. Registration was free, and accounts were funded via WebMoney and other virtual currencies that are popular in the cybercriminal underground — via redwolf.newsvine.com

Technology, Weird

3D-printed ‘gun part’ are actually spare parts for the printer

Police in Manchester have arrested a man for 3D printing the components to a gun — but some have suggested the objects actually appear to be spare printer parts.

Police raided the home in Baguley, Manchester yesterday, finding what they described as a 3D printer, a plastic magazine and trigger, which could be fitted together to make a viable 3D gun.

It they are found to be viable components for a 3D gun, it would be the first ever seizure of this kind in the UK, the police said in a statement. The parts are now being forensically examined by firearms specialists to establish if they could construct a genuine device.

However, some — including Gigaom — have pointed out that the parts may be more benign, noting the item the police say is a trigger looks similar to part of a component listed on Thingiverse, a database of 3D printable designs — via redwolf.newsvine.com

Technology

Internet Explorer 11 Breaks Google, Outlook Web Access

The Windows 8.1 rollout has hit more hurdles: the new version 11 of Internet Explorer that ships with the operating system does not render Google products well and is also making life difficult for users of Microsoft’s own Outlook Web Access webmail product.

The latter issue is well known: Microsoft popped out some advice about the fact that only the most basic interface to the webmail tool will work back in July. It seems not every sysadmin got the memo and implemented Redmond’s preferred workarounds, but there are only scattered complaints out there, likely because few organisations have bothered implementing Windows 8.1 yet — via redwolf.newsvine.com

Technology

3D printer creates light-weight titanium horse shoes

Australian scientists have created a customized set of purple titanium shoes for a Melbourne race horse using 3D printing.

The horse, nicknamed Titanium Prints, had its hooves scanned with a 3D scanner.

Using 3D modelling software, scientists from the Commonwealth Scientific and Industrial Research Organisation (CSIRO) then used the scan to design the racing shoe.

CSIRO’s Titanium expert John Barnes says it takes less than 24 hours to print four customised shoes for a horse and it costs approximately $600 for all of them — via redwolf.newsvine.com

Technology

Why Microsoft Word must Die

I hate Microsoft Word. I want Microsoft Word to die. I hate Microsoft Word with a burning, fiery passion. I hate Microsoft Word the way Winston Smith hated Big Brother. Our reasons are, alarmingly, not dissimilar …

Microsoft Word is a tyrant of the imagination, a petty, unimaginative, inconsistent dictator that is ill-suited to any creative writer’s use. Worse: it is a near-monopolist, dominating the word processing field. Its pervasive near-monopoly status has brainwashed software developers to such an extent that few can imagine a word processing tool that exists as anything other than as a shallow imitation of the Redmond Behemoth. But what exactly is wrong with it? — via redwolf.newsvine.com

Technology

Australian universities create ‘photons on demand’ optical chip

Research conducted at the University of Sydney has delivered photonic chips that slow down light, creating the ability to produce a single photon of light with increased reliability, which allows for more scalable and smaller optical hardware.

The research is published in the Nature Communications journal, with the team responsible made up of members from Macquarie University, the University of St Andrews, the University of York, and the Australian Research Council Centre of Excellence for Ultrahigh Bandwidth Devices for Optical Systems (CUDOS) based at the University of Sydney, as well as the Australian Defence Science and Technology Organisation (DSTO).

It is easy for us to generate photons at high rates, but it’s much harder to ensure they come out one by one, because photons are gregarious by nature and love to bunch together, said lead author of the research article Matthew Collins, a PhD student at CUDOS.

For that reason, the quantum science community has been waiting over a decade for a compact optical chip that delivers exactly one photon at a time at very high rates — via redwolf.newsvine.com

Business, Rights, Technology

Palantir Technologies defence contracts in Canberra

On the fourth floor of an office building on Northbourne Avenue, in what passes for Canberra’s CBD, is an outpost of a much talked-about company that has so far gone under the radar in Australia. It is, however, unlikely that many Australians have avoided the company’s forensic gaze.

Palantir Technologies was established in 2002 by a clutch of US information analysts to explore the potential of datamining tools developed for Paypal. The CIA was a foundation investor, providing $2 million, and for several years its only customer. However, unusually for a company that has become a key vendor to the US military-industrial complex, its senior ranks are almost entirely men (and they’re pretty much all men) with Silicon Valley-style IT or financial backgrounds; the revolving door to the US military and foreign policy establishments that typifies most defence and intelligence companies doesn’t appear to be in full operation (yet).

Palantir does datamining, and does it very, very well. So well, in fact, that the US government and major companies have hungrily devoured its data search tools (for an account of what exactly its products can do, try this). As we’ve since learnt courtesy of Edward Snowden, agencies like the NSA are compiling vast amounts of personal information on most of the planet’s internet users. Palantir’s products help agencies effectively search through huge amounts of different information and collate them with other agencies’ data. It has rapidly become a key player in the establishment of the US surveillance state and a poster boy for what smart people and lots of computing power can do to strip away privacy and garner intelligence down to the individual level. And it has rapidly become an attractive investment: two weeks ago the company, now estimated to be worth $8 billion, announced it had raised nearly $200 million in capital.

And behind a unicorns-and-rainbows façade (Palantir is a Lord of the Rings reference; its California headquarters is called the Shire) is a ruthless player in cybersecurity. In 2011, as Crikey reported at the time, the company joined with Berico Technologies and HBGary Federal to develop a multi-million dollar plant to disrupt WikiLeaks and discredit journalist Glenn Greenwald. The plan, only revealed when Anonymous hacked into the IT system of HBGary Federal’s Aaron Barr, involved proposals to feed false information to WikiLeaks, break into its servers and wage a media campaign against it and Greenwald — via redwolf.newsvine.com

Politics, Rights, Technology, World

The most embarrassing news interview ever

This must be the most cringe-inducing interview by a senior journalist I’ve ever seen.

It’s conducted by Kirsty Wark, one of the BBC’s top presenters, and takes places on Newsnight, the BBC’s flagship nightly current affairs programme.

It truly makes me more ashamed of the profession of journalism than I already was — and I didn’t think that was possible.

Throughout the interview, Wark abandons even the pretence of doing what journalism is supposed to be about: interrogating the centres of power and holding them to account.

Instead Wark mimics adversarial journalism by interrogating the US journalist Glenn Greenwald about his role in the NSA leaks, as though she’s a novice MI5 recruit. To do this she has to parrot British government misinformation and fire at him questions so childish even she seems to realise half way through them how embarrassing they are — via redwolf.newsvine.com