White House Manipulates Data About Environment

No stranger to using doctored data, Bush painted a rosy picture of the efforts of the US to slow greenhouse gas emissions that was totally false.
.... [Click here to read the rest of this post]Tags: Accountability, George Bush, MisconductSummary of File Sharing and Why We Root for the Hackers
This article is a treasure trove of historical information about the battle between consumers and copyright holders in P2P and DRM.
A bit about the attitude of the market:
Rhetoric about internet democracy aside, the point of interest was that such a huge number of people had no problem with copying and sharing movies, that they .... [Click here to read the rest of this post]Bush and Cheney Continue to Break America

A newly disclosed effort to keep Vice President Dick Cheney's visitor records secret is the latest White House push to make sure the public does not learn who has been meeting with top officials in the Bush administration.
According to Crooks and Liars.com, they've changed the rules so that they're directly responsible for visitors .... [Click here to read the rest of this post]
Tags: Accountability, George Bush, MisconductHonorably Discharged Marine Makes Trouble By Speaking Out – Getting Charged

This is an interesting story: An Iraq War veteran is making trouble by being a very loud and media-covered opponent of the war.
They seem to have found an angle to attack him because he put on a uniform for a protest (though by stripping all the major labels from it, I don't see how that's any different .... [Click here to read the rest of this post]
Tags: Military, Scams - Ripoffs - Dirty TricksSecond Life Property Battle In Real Court

Someone has finally sued second life for "seizing" his assets. Linden shut down his account and removed the rights to his property.
Considering that Linden sells virtual property in online auctions for real money, this would seem like a fairly strong case on the part of the player… if it wasn't for the fact that the guy got the property .... [Click here to read the rest of this post]
Tags: Gaming, Second LifeUSDA Tries to Prevent Health Inspections of Meat

What is the point of a federal regulatory agency that won't do it's job?
The issue landed in court after Creekstone Farms offended the USDA by constructing a state of the art facility to test for mad cow. The USDA fears that testing will reveal too many 'false positives,' scaring the hell out of consumers .... [Click here to read the rest of this post]Hackers Continue to Circumvent DVD Encryption
The companies are trying so hard to make it impossible for people to copy DVDs, but hackers continue to prove that they're wasting their time. Just one day after releasing new keys for their copy protection system, a hacker posted the key on his website.
The AACS LA is not happy about these .... [Click here to read the rest of this post]Evading Digital Forensics
I don't support criminals, but evading forensics is also about privacy, not just breaking the law. For those with the interest and skill, check out the article for some tools used to evade detection of things you'd rather keep hidden. Here are some of them:
- Timestomp – Destroys the timestamp evidence of files .... [Click here to read the rest of this post]
Which ISP Can You Trust?
Wired.com recently did a survey among major Internet providers to see how well they support privacy. Of the few that responded at all, many of the answers were vague or evasive. Some of the questions included:
- How long the ISP stores the unique IP address that the customer used (which can be used to track actions to .... [Click here to read the rest of this post]
Apple DRM-Free, but Spies on You?
Apple music files can now be purchased without DRM, but it seems that they hide information in the file with your name and account information.
Now the question becomes, what do they do with the information? Ars Technica theorizes that this might be a new form of identifying file sharers since the file itself will blab who .... [Click here to read the rest of this post]
Tags: Apple, Data Abuse, P2P, Spying


