Delhi police lost password for complaints portal in 2006, haven’t checked it since

The Delhi police lost the password for a portal that hosted complaints that had been passed on by the Central Vigilance Commission after an initial vetting. 667 complaints had been judged serious enough to be passed onto the police since the password was lost in 2006, but none have been acted upon, because no one had the password. Now they have the password. Presumably, the 667 unserved complainants believed the police to be either too slow or incompetent to have gotten back to them. Each Delhi government department under the CVC, including the MCD, DDA and several investigating agencies, have a chief vigilance officer to look into complaints. If a complaint reaches the CVC, either it tackles it independently or it sends it to the concerned department. In 2006, a portal monitored by the CVC was created, putting the complaints it sent to departments online. Each department could access the portal with a password. Complaints regarding the Delhi Police were also sent to the portal. Every year, the CVC holds meetings with government departments to take stock of the complaints with them. Sources said that since 2006, the CVC had got no feedback on complaints pending with the police. Vigilance complaints pile up as Delhi Police doesn’t know password [Shalini Narayan/Indian Express] ( via BBC News )        

See the original article here:
Delhi police lost password for complaints portal in 2006, haven’t checked it since

Full NHS hospital records uploaded to Google servers, "infinitely worse" story to come

To clarify, the @HSCIC story that’s coming is, I believe, infinitely worse than patient hospital records being uploaded to Google BigQuery — ben goldacre (@bengoldacre) March 3, 2014 PA Consulting, a management consulting firm, obtained the entire English and Welsh hospital episode statistics database and uploaded it to Google’s Bigquery service . The stats filled 27 DVDs and took “a couple of weeks” to transfer to Google’s service, which is hosted in non-EU data centres. This is spectacularly illegal. The NHS dataset includes each patient’s NHS number, post code, address, date of birth and gender, as well as all their inpatient, outpatient and emergency hospital records. Google’s Bigquery service allows for full data-set sharing with one click. The news of the breach comes after the collapse of a scheme under which the NHS would sell patient records to pharma companies, insurers and others (there was no easy way to opt out of the scheme, until members of the public created the independent Fax Your GP service ). According to researcher and epidemiologist Ben Goldacre, this story is just the beginning: there’s an “infinitely worse” story that is coming shortly. Sarah Wollaston, who is also a family doctor and Conservative backbencher, tweeted: “So HES [hospital episode statistics] data uploaded to ‘google’s immense army of servers’, who consented to that?” The patient information had been obtained by PA Consulting, which claimed to have secured the “entire start-to-finish HES dataset across all three areas of collection – inpatient, outpatient and A&E”. The data set was so large it took up 27 DVDs and took a couple of weeks to upload. The management consultants said: “Within two weeks of starting to use the Google tools we were able to produce interactive maps directly from HES queries in seconds.” The revelations alarmed campaigners and privacy experts, who queried how Google maps could have been used unless some location data had been provided in the patient information files. NHS England patient data ‘uploaded to Google servers’, Tory MP says [Randeep Ramesh/The Guardian] ( via Charlie Stross )        

Read this article:
Full NHS hospital records uploaded to Google servers, "infinitely worse" story to come

Gorgeous Map of the Internet: XKCD meets National Geographic

Martin Vargic has produced a gorgeous mashup of XKCD’s Map of Online Communities and the classic National Geographic Maps, producing a work of art that is a wonder to behold. It’s for sale on Zazzle , as a $37, 34″x22″ poster. I was originally inspired by map of the internet created by xkcd, showing most popular social networks as countries and regions, back in 2010. It was not my original idea, but I extended it to such a scale for the first time. I used photoshop for the majority of drawing. The base style of the map was inspired by the National Geographic Maps, I also used Winkel Tripel Projection and similar border coloring fashion. I created the map in quite a short time, three weeks to be exact. I often worked early in the morning, and I can say I really enjoyed it. I got the data about website sizes mainly from Alexa and similar online services. Currently, I am working on the next versions of the map, which will be even more ridiculously detailed than the previous one, and will encompass all major websites without any significant exceptions, it will be coming in mid-february. The map is divided into 2 distinctive parts; the eastern continent, “the old world” showcases software companies, gaming companies and some of the more real-life oriented websites. Western part, “the new world” is composed from two major continent, northern one showcasing social networks, search websites, video websites, blogs, forums and art websites. All major adult-oriented websites, in addition to varioius warez and torrent sites, are located on the southwestern continent of the map. In the very south of the map, there is located “Great Southern Land” of obsolete websites and online services. Outside the main map, there are also 4 minimaps showing NSA monitoring by country, most used browser, most used social network, and internet penetration by country. Map of the Internet 1.0. ( via IO9 )        

View original post here:
Gorgeous Map of the Internet: XKCD meets National Geographic

All library audiobooks going to DRM-free MP3s

Ben writes, “Overdrive, which is one of the main suppliers of downloadable audiobooks to public libraries, announced that it is retiring its DRM-encrusted .WMA formats and pushing everything to DRM-free .mp3s .” This is a big deal. Audiobooks are the last holdouts for DRM in audio, and one company, Audible, controls the vast majority of the market and insists upon DRM in all of its catalog (even when authors and publishers object). Itunes, Audible’s major sales channel, also insists on DRM in audiobooks (even where Audible can be convinced to drop it). Audiobooks can cost a lot of money, and are very cumbersome to convert to free/open formats without using illegal circumvention tools. To stay on the right side of the law, you have to burn your audiobooks to many discs (sometimes dozens), then re-rip them, enduring breaks that come mid-word; or you have to play the audio out of your computer’s analog audio outputs and redigitize them, which can take days (literally) and results in sound-quality loss. Overdrive going DRM-free for libraries is a massive shift in this market, and marks a turning point in the relationship between the publishers/creators and the technology companies that act as conduits and retail channels for their work. It’s especially great that libraries are getting a break, as they have been royally screwed on electronic books and audiobooks up until now. This is in response to user preferences, widespread compatibility of MP3 across all listening devices and the fact that the vast majority of our extensive audiobook collection is already in MP3 format. This includes the audiobook collections from Hachette, Penguin Group, Random House (Books on Tape and Listening Library), HarperCollins, AudioGo, Blackstone, Tantor Media and dozens of others. Our publisher relations team is working closely with the very few remaining publishers who require WMA to seek permission to sell their titles in MP3 for library and school lending. We will soon be communicating the discontinuance of WMA sales, and then at a future date, we will announce when MP3 files will be the only supported format through OverDrive platforms. For libraries and schools that currently have WMA audiobook files in their collection, we will be working with the publishers of those titles to gain permissions to update your inventory to MP3. In the event that some titles are unavailable, an alternate solution will be offered to make up for the lost titles. Be on the lookout for announcements on our blog and from your Collection Development Specialist for a timeline of this process. OverDrive announces plan for audiobooks to be solely available in MP3 format [Heather Tunstall/Overdrive] ( Thanks, Ben! ) ( Image: DRM PNG 900 2 , a Creative Commons Attribution Share-Alike (2.0) image from listentomyvoice’s photostream )        

Read More:
All library audiobooks going to DRM-free MP3s

Pirate Bay uploads up by 50% in 2013

2013 was a banner year for the Pirate Bay, despite having been forced to change domain names half-a-dozen times. The site saw a 50% increase in uploads in 2013 , to 2.8 million links, presently being swarmed by nearly 19 million users. The Pirate Bay is reportedly developing a peer-to-peer browser that will be much harder to block using existing censorship techniques. Pirate Bay Uploads Surge 50% in a Year, Despite Anti-Piracy Efforts [Ernesto/TorrentFreak]        

Read more here:
Pirate Bay uploads up by 50% in 2013

NSA has a 50-page catalog of exploits for software, hardware, and firmware

A Snowden leak accompanying today’s story on the NSA’s Tailored Access Operations group (TAO) details the NSA’s toolbox of exploits , developed by an NSA group called ANT (Advanced or Access Network Technology). ANT’s catalog runs to 50 pages, and lists electronic break-in tools, wiretaps, and other spook toys. For example, the catalog offers FEEDTROUGH, an exploit kit for Juniper Networks’ firewalls; gimmicked monitor cables that leak video-signals; BIOS-based malware that compromises the computer even before the operating system is loaded; and compromised firmware for hard drives from Western Digital, Seagate, Maxtor and Samsung. Many of the exploited products are made by American companies, and hundreds of millions of everyday people are at risk from the unpatched vulnerabilities that the NSA has discovered in their products. The ANT division doesn’t just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer’s motherboard that is the first thing to load when a computer is turned on. This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this “Persistence” and believe this approach has provided them with the possibility of permanent access. Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies. Shopping for Spy Gear: Catalog Advertises NSA Toolbox [Jacob Appelbaum, Judith Horchert and Christian Stöcker/Spiegel]        

Read the original post:
NSA has a 50-page catalog of exploits for software, hardware, and firmware

Sherlock and co are finally in the public domain

Patrick writes, “After more than 125 years and countless crappy incarnations on film, A federal judge has issued a declarative judgment stating that Holmes, Watson, 221B Baker Street, the dastardly Professor Moriarty and other elements included in the 50 Holmes works Arthur Conan Doyle published before Jan. 1, 1923, are no longer covered by United States copyright law and can be freely used by creators without paying any licensing fee to the Conan Doyle estate.” The estate are notorious bullies, and have relied upon bizarre legal theories to extract funds from people who use the Sherlock canon characters in new works, even though those characters come from stories that are largely in the public domain. “They’ve heard about the way the estate is going around bullying people,” said Darlene Cypser, a lawyer in Denver and the author of a self-published trilogy about the young Holmes, for which the estate initially demanded a licensing fee. (She declined to pay, she said.) “This has been coming for some time. I’m glad Les decided to take it up.” Several other authors and publishers of Holmes-based work reported receiving somewhat friendlier versions of a threatening letter cited in Mr. Klinger’s complaint. In the letter Mr. Lellenberg suggested that the estate regularly worked with “Amazon, Barnes & Noble, and similar retailers” to “weed out unlicensed uses of Sherlock Holmes,” and would not hesitate to do so with Mr. Klinger’s volume as well. Mr. Klinger did pay a fee for a similar collection in 2011 at the insistence of his earlier publisher, but this time said he is calling the estate’s bluff. “It’s the ultimate case of the emperor having no clothes,” said Jonathan Kirsch, a publishing lawyer who represents him. “Everyone is making the decision to pay for permission they don’t need to avoid the costs and risks of litigation.” Suit Says Sherlock Belongs to the Ages [Jennifer Schuessler/NYT] ( Thanks, Patrick ! ) ( Image: A Study in Scarlet (Beeton’s Christmas Annual) , a Creative Commons Attribution Share-Alike (2.0) image from 43021516@N06’s photostream )        

Follow this link:
Sherlock and co are finally in the public domain

FBI agent tries to copyright super-secret torture manual, inadvertently makes it public

The ACLU has spent years in court trying to get a look at a top-secret FBI interrogation manual that referred to the CIA’s notorious KUBARK torture manual. The FBI released a heavily redacted version at one point — so redacted as to be useless for determining whether its recommendations were constitutional. However, it turns out that the FBI agent who wrote the manual sent a copy to the Library of Congress in order to register a copyright in it — in his name! (Government documents are not copyrightable, but even if they were, the copyright would vest with the agent’s employer, not the agent himself). A Mother Jones reporter discovered the unredacted manual at the Library of Congress last week, and tipped off the ACLU about it. Anyone can inspect the manual on request. Go see for yourself! The 70-plus-page manual ended up in the Library of Congress, thanks to its author, an FBI official who made an unexplainable mistake. This FBI supervisory special agent, who once worked as a unit chief in the FBI’s counterterrorism division, registered a copyright for the manual in 2010 and deposited a copy with the US Copyright Office, where members of the public can inspect it upon request. What’s particularly strange about this episode is that government documents cannot be copyrighted. “A document that has not been released does not even need a copyright,” says Steven Aftergood, a government secrecy expert at the Federation of American Scientists. “Who is going to plagiarize from it? Even if you wanted to, you couldn’t violate the copyright because you don’t have the document. It isn’t available.” “The whole thing is a comedy of errors,” he adds. “It sounds like gross incompetence and ignorance.” Julian Sanchez, a fellow with the libertarian Cato Institute who has studied copyright policy, was harsher: “Do they not cover this in orientation? [Sensitive] documents should not be placed in public repositories—and, by the way, aren’t copyrightable. How do you even get a clearance without knowing this stuff?” You’ll Never Guess Where This FBI Agent Left a Secret Interrogation Manual [Nick Baumann/Mother Jones] ( via Techdirt ) ( Image: FBI , a Creative Commons Attribution Share-Alike (2.0) image from 10542402@N06’s photostream )        

Read More:
FBI agent tries to copyright super-secret torture manual, inadvertently makes it public

Bunnie Huang explains the nuts-and-bolts of getting stuff made in Shenzhen

In this talk from Maker Faire New York, Bunnie Huang of Chibitronics gives an amazing run-down of the on-the-ground reality of having electronics manufactured in Shenzhen, China. It’s a wild 30 minutes, covering everything from choosing a supplier to coping with squat toilets and the special horrors awaiting vegetarians in the Pearl River Delta. There are some dropouts at the start of the video that you’ll need to scroll past, but it’s well worth the hassle. Getting it Made: Stories from Shenzhen ( via Make )        

Visit link:
Bunnie Huang explains the nuts-and-bolts of getting stuff made in Shenzhen

Android gives you the ability to deny your sensitive data to apps

Android privacy just got a lot better. The 4.3 version of Google’s mobile operating system now has hooks that allow you to override the permissions requested by the apps you install. So if you download a flashlight app that wants to harvest your location and phone ID , you can install it, and then use an app like AppOps Launcher to tell Android to withhold the information. Peter Ecklersley, a staff technologist at the Electronic Frontier Foundation, has written up a good explanation of how this works , and he attributes the decision to competitive pressure from Ios, which allows users to deny location data to apps, even if they “require” it during the installation process. I think that’s right, but not the whole story: Android has also always labored under competitive pressure from its free/open forks, like Cyanogenmod. In the days when Android didn’t allow tethering (as a sop to the mobile carriers, who are the gatekeepers to new phones for many people), Cyanogenmod signed up large numbers of users, simply by adding this functionality . Google added tethering to Android within a couple of versions. Some versions of Cyanogenmod have had the option tell your phone to lie to apps about its identity, location, and other sensitive information — a way to get around the “all or nothing” installation process whereby your the apps you install non-negotiably demand your “permission” to plunder this information. I’m not surprised to see the same feature moving into the main branch of Android. This dynamic is fascinating to me: Google has to balance all kinds of priorities in rolling out features and “anti-features” (no tethering, non-negotiable permissions) in Android, in order to please customers, carriers and developers. Free/open forks like Cyanogenmod really only need to please themselves and their users, and don’t have to worry so much about these other pressures (though now that Cyanogenmod is a commercial operation , they’ll probably need to start playing nice with carriers). But because Android competes with Cyanogenmod and the other open versions, Google can’t afford to ignore the featureset that makes them better than the official version. It’s a unique, and extremely beneficial outflow of the hybrid free/commercial Android ecosystem. In the early days, that model was at an improvement on its major competitor, Apple’s iOS, which didn’t even have a permissions model. But after various privacy scandals, Apple started forcing apps to ask for permission to collect data: first location and then other categories, like address books and photos. So for the past two years, the iPhone’s app privacy options have been miles ahead of Android’s. This changed with the release of Android 4.3, which added awesome new OS features to enhance privacy protection. You can unlock this functionality by installing a tool like App Ops Launcher. When you run it, you can easily control most of the privacy-threatening permissions your apps have tried to obtain. Want to install Shazam without having it track your location? Easy. Want to install SideCar without letting it read your address book? Done.2 Despite being overdue and not quite complete, App Ops Launcher is a huge advance in Android privacy. Its availability means Android 4.3+ a necessity for anyone who wants to use the OS while limiting how intrusive those apps can be. The Android team at Google deserves praise for giving users more control of the data that others can snatch from their pockets. Awesome Privacy Tools in Android 4.3+        

Continue reading here:
Android gives you the ability to deny your sensitive data to apps