Amazon AutoRip: How the labels held back progress for 14 years

Michael Robertson Gabe Lawrence When Michael Robertson heard news of AutoRip , the new Amazon service that automatically adds high-quality MP3s to Cloud Player when you buy a CD, he must have had a sense of deja vu. After all, the entrepreneur introduced a similar service way back in 1999. Unfortunately, it wasn’t licensed by the recording industry, and they sued it out of existence. He tried again with a licensed service in 2007, but only one label would cut a deal and the company failed to gain traction. In a Friday interview with Ars Technica, Robertson told us that the major labels’ decision to license AutoRip represents a sea change in their attitudes toward cloud music services. Until the last couple of years, the labels were relentlessly hostile to the idea that consumers should have the freedom to store DRM-free music online. But a series of business failures and legal defeats forced the labels to face reality. And so fourteen years after Robertson first floated the concept, consumers finally have the freedom to instantly get an MP3 when they buy a CD online. Robertson’s first company, MP3.com was one of the hottest startups in Silicon Valley when it launched what we would now call a cloud music service, My.MP3.com, in 1999. The service included a feature called “Beam-It” that allowed users to instantly stock their online lockers with music from their personal CD collections. Read 11 remaining paragraphs | Comments

See the original post:
Amazon AutoRip: How the labels held back progress for 14 years

Anonymous sets sights on an old enemy—the Westboro Baptist Church

That link? It leads to a survey entitled, “Interactive Butthurt Report v. 2.0.” Nothing is beneath the Westboro Baptist Church, as evidenced by the group’s announcement to picket outside Sandy Hook Elementary School in wake of the recent tragedy. The group’s most recent, perhaps most deplorable decision has apparently irked one of its oldest enemies : infamous hacker collective Anonymous. In response to the WBC’s plans early today, Anonymous tweeted , “It’s so nice of #WBC to provide the internet with a list of their twitter handles…” Roughly one hour later, they revealed their plans for the WBC : “#WBC GodHatesFags Site Admin gets #DOX’d via: Anonymous.” DOX, of course, refers to the work Anonymous did to find and publish a list of WBC members complete with e-mails, phone numbers, and even home addresses—all for the adoring public to access. In addition to the DOXing, Anonymous has repeatedly promoted a whitehouse.org petition to have the WBC recognized legally as a hate-group . The petition was created on Friday and it has already doubled the required 25,000 signatures. Read 1 remaining paragraphs | Comments

Read More:
Anonymous sets sights on an old enemy—the Westboro Baptist Church

California law enforcement moves to buy drones, draws controversy

UAV set up for Wylye intersection. QinetiQ group Since Congress passed legislation in February ordering the Federal Aviation Administration to fast-track the approval of unmanned aerial vehicles—more colloquially known as drones—for use by law enforcement agencies, police and sheriff departments across the country have been scrambling to purchase the smaller, unarmed cousins of the Predator and Reaper drones which carry out daily sorties over Afghanistan, Yemen, and other theaters of operation. Alameda County in California has become one of the central battlegrounds over the introduction of drones to domestic police work. Earlier this year , Alameda County Sheriff Gregory Ahern raised the hackles of local civil libertarians (and there are quite a few of those in the county, which encompasses Berkeley and Oakland) by declaring his intention to purchase a drone to assist with “emergency response.” According to Ahern, Alameda Sheriff’s personnel first tested a UAV in fall 2011 and gave a public demonstration of the machine’s usefulness for emergency responses during the Urban Shield SWAT competition in late October. Were Alameda County to purchase a drone, it would set a precedent in California, which has long been an innovator in law enforcement tactics: from SWAT teams (pioneered in Delano and Los Angeles) to anti-gang tactics such as civil injunctions. The first documented incident of a drone being used to make an arrest in the United States occurred in North Dakota in June 2011, when local police received assistance from an unarmed Predator B drone that belonged to US Customs and Border Protection . The Federal Bureau of Investigation and Drug Enforcement Administration have also reportedly used drones for domestic investigations. Read 7 remaining paragraphs | Comments

Read this article:
California law enforcement moves to buy drones, draws controversy

FCC and mobile carriers commit to nationwide text-to-911 by May 2014

It seems almost stupid that it’s nearly 2013 and we’re still unable to communicate with our emergency services in any way other than picking up the phone and calling them. We can certainly imagine situations where you’d want to be able to send a quick  text message  to local police. The US is a bit behind here—British mobile phone users have had access to  EmergencySMS since 2009. For years, we’ve been covering the slow ascent of text-to-911 . But now, the Federal Communications Commission says that the nation’s Big Four mobile carriers have agreed to “accelerate” text-to-911 capabilities for debut in 2013, with a nationwide deployment by May 15, 2014. “Building on text-to-911 deployments and trials that are already underway, this agreement will accelerate progress and ensure that over 90 percent of the nation’s wireless consumers, including millions of consumers with hearing or speech disabilities, will be able to access emergency services by sending a text message to 911, where local 911 call centers (known as a Public Safety Answering Points, or PSAPs) are also prepared to receive the texts,” the FCC said in a statement Thursday. Read 1 remaining paragraphs | Comments

Continue reading here:
FCC and mobile carriers commit to nationwide text-to-911 by May 2014

Notorious BitTorrent tracker Demonoid back online, website still down

As of Monday, well-known BitTorrent tracker Demonoid is back online . Three months ago, the tenacious tracker was chased out of its Ukrainian host, likely under pressure from American authorities. It may also have been driven offline due to a denial of service attack. According to the IP address linked to the tracker, the new host appears to be physically located in Hong Kong . The website, meanwhile, remains down. TorrentFreak points out that in previous closures, Demonoid’s tracker appeared before its website came back online, indicating that the site’s return may be coming soon. Read 2 remaining paragraphs | Comments

See the original article here:
Notorious BitTorrent tracker Demonoid back online, website still down

Kim Dotcom has new “Mega” domain, says this one won’t be shut down

After the government of Gabon shut down his Me.ga domain , Kim Dotcom needed a new country to let him host the domain that will be home to the successor of file-sharing site Megaupload. That country will be New Zealand, as Dotcom is now the owner of Mega.co.nz . The exact same site that was originally hosted at Me.ga can now be found at the New Zealand domain. On Twitter, Dotcom announced “New Zealand will be the home of our new website: http://Mega.co.nz – Powered by legality and protected by the law.” When Gabon shut down Me.ga, Dotcom blamed “the reach of the US and Vivendi,” as the Me.ga domain was provided by Gabon Telecom, a subsidiary of the Vivendi entertainment company. Although New Zealand police raided Dotcom’s house 10 months ago because of criminal copyright charges filed against him in the US, he seems confident that New Zealand won’t shut down the domain itself. Ultimately, getting a domain will probably be among the least challenging aspects of running Mega, which is expected to launch in January. But Dotcom has a plan for that too. To avoid copyright charges, Dotcom promises Mega “encrypts and decrypts your data transparently in your browser, on the fly,” and that the encryption keys are only controlled by the user, not Mega. And to avoid the reach of the Digital Millennium Copyright Act, Dotcom plans to run his servers with hosting services outside the US. Read on Ars Technica | Comments

View post:
Kim Dotcom has new “Mega” domain, says this one won’t be shut down

Google infringes old Lycos patents, must pay $30 million

Vringo is a little company that’s made a huge bet on suing Google over patents. Today that bet paid off, although to a much lesser degree than its investors hoped earlier. After a two-week trial in Virginia, a jury found that Google’s advertising system infringes two old Lycos patents purchased by Vringo in 2011, and that those patents are valid. Google and several of its advertising partners were ordered to pay a total of about $30 million. That’s a lot of money, but far less than the $493 million Vringo was seeking. According to a report  just published in the Virginian-Pilot , the jury found that Google will have to pay $15.9 million. Its advertising partners must pay smaller amounts: $7.9 million in damages for AOL, $6.6 million for IAC Search & Media, $98,800 for Target, and $4,000 for Gannett. The jury also said Google should pay an ongoing royalty; but whether that ultimately sticks is up to the judge. The Vringo case is remarkable for two reasons: first, it’s rare to see a high-profile patent attack played out directly in the stock market, with investors speculating on each move in court. Second, demonstratives submitted in Vringo’s case show a fascinating story in pictures of how a company that’s more or less a “patent troll” tries to convince a jury to shower it with money. Some of those visuals are posted below. Read 11 remaining paragraphs | Comments

View the original here:
Google infringes old Lycos patents, must pay $30 million

How Georgia doxed a Russian hacker (and why it matters)

Aurich Lawson On October 24, the country of Georgia took an unusual step: it posted to the Web a 27-page writeup  (PDF), in English, on how it has been under assault from a hacker allegedly based in Russia. The paper included details of the malware used, how it spread, and how it was controlled. Even more unusually, the Georgians released pictures of the alleged hacker—taken with his own webcam after the Georgians hacked the hacker with the help of the FBI and others. The story itself, which we covered briefly earlier this week , is fascinating, though it remains hard to authenticate and is relayed in a non-native English that makes for some tough reading. But what caught my eye about the whole cloak-and-dagger tale is the broader points it makes about hacking, jurisdiction, and the powerful surveillance devices that our computers have become. It’s also an example of how hacks and the alleged hackers behind them today play an increasing role in upping geopolitical suspicions between countries already wary of one another. Georgia and Russia have of course been at odds for years, and their conflict came to a head in a brief 2008 war; Russia still maintains a military presence in two tiny breakaway enclaves that Georgia claims as its own. Read 29 remaining paragraphs | Comments

See more here:
How Georgia doxed a Russian hacker (and why it matters)

Jailbreaking now legal under DMCA for smartphones, but not tablets

Yutaka Tsutano The Digital Millennium Copyright makes it illegal to “circumvent” digital rights management schemes. But when Congress passed the DMCA in 1998, it gave the Librarian of Congress the power to grant exemptions. The latest batch of exemptions, which will be in force for three years, were announced on Thursday. Between now and late 2015, there will be five categories of circumvention that will be allowed under the Librarian’s rules, one fewer than the current batch of exemptions , which was announced in July 2010. The new exemptions take effect October 28. The new batch of exemptions illustrate the fundamentally arbitrary nature of the DMCA’s exemption process. For the next three years, you’ll be allowed to jailbreak smartphones but not tablet computers. You’ll be able to unlock phones purchased before January 2013 but not phones purchased after that. It will be legal to rip DVDs to use an excerpt in a documentary, but not to play it on your iPad. None of these distinctions makes very much sense. But Congress probably deserves more blame for this than the Librarian of Congress. Read 17 remaining paragraphs | Comments

See the article here:
Jailbreaking now legal under DMCA for smartphones, but not tablets