Secret source code pronounces you guilty as charged [Updated] | Ars Technica

When a computer “spits out something, you’d like to know how it did it.”

Source: Secret source code pronounces you guilty as charged [Updated] | Ars Technica

50 hospitals charge uninsured more than 10 times cost of care, study finds – The Washington Post

Researchers said the hospitals with the highest markups are not in pricey neighborhoods or big cities.

Source: 50 hospitals charge uninsured more than 10 times cost of care, study finds – The Washington Post

“Driving Drunk Woo!” – Don’t do that

Florida Man, I have a wife for you.

While she was driving drunk, on the way to an intersection where she would ultimately crash into a car and kill her passenger, a Florida Woman texted to her ex-boyfriend “Driving drunk woo!”

I don’t do criminal law, so take this advice for what it is worth — but, if you are going to drive drunk, don’t also text “driving drunk woo” from your phone while doing it. Or don’t drive drunk. Or just don’t be fucking stupid.

But that’s a lot to ask, I know.

Link (The Legal Satyricon)

Judge: IP-Address Doesn’t Identify a Movie Pirate

While relatively underreported, many U.S. district courts are still swamped with lawsuits against alleged film pirates.

One of the newcomers this year are the makers of the action movie Manny. Over the past few months “Manny Film” has filed 215 lawsuits across several districts.

Like all copyright holders, the makers of the film rely on IP-addresses as evidence. They then ask the courts to grant a subpoena, forcing Internet providers to hand over the personal details of the associated account holders.

In most cases the courts sign off on these requests, but in Florida this isn’t as straightforward.

When District Court Judge Ursula Ungaro was assigned a Manny Film case she asked the company to explain how an IP-address can pinpoint the actual person who downloaded a pirated film. In addition, she asked them to show that geolocation tools are good enough to prove that the alleged pirate resides in the Court’s district.

In a detailed reply the filmmakers argued that IP-addresses can identify the defendant and that a refusal to grant a subpoena would set a “dangerous precedent.” Manny Film further stated that “all other courts” disagreed with the notion that an IP-address is not a person.

This last remark didn’t go down well with Judge Ungaro. In an order handed down this week she cites various cases where courts ruled that IP-addresses don’t always identify the alleged offenders.

“Due to the risk of ‘false positives,’ an allegation that an IP address is registered to an individual is not sufficient in and of itself to support a claim that the individual is guilty of infringement,” wrote the Judge citing a 2012 case, one of many examples.

The referenced cases clearly refute Manny Film’s claim that all other courts disagreed with the Judge Ungaro’s concerns, and the Judge is not convinced by any of the other arguments either.

“As in those cases, Plaintiff here fails to show how geolocation software can establish the identity of the Defendant. Specifically, there is nothing linking the IP address location to the identity of the person actually downloading and viewing the copy righted material and nothing establishing that the person actually lives in this district,” Judge Ungaro writes.

“Even if this IP address is located within a residence, geolocation software cannot identify who have access to that residence’s computer and who would actually be using it to infringe Plaintiff’s copyright,” she adds.

As a result, the Court refused to issue a subpoena and dismissed the case against IP-address 66.229.140.101 for improper venue.

While not all judges may come to the same conclusion, the order makes it harder for rightholders to play their “copyright troll” scheme in the Southern District of Florida. At the same time, it provides future defendants with a good overview to fight similar claims elsewhere.

Link (TorrentFreak)

Record A Teacher Bullying A Student? That’s A Suspension

Is a public school classroom a private space? That seems to be the assertion of school administrators after an 11-year-old student recorded a teacher bullying a student.

A St. Lucie County teacher has been fired after a student used her cellphone to record a teacher bullying another student.

The Samuel Gaines Academy student, 11-year-old- Brianna Cooper, is being praised by her peers. But, she’s still facing punishment from school leaders for recording the audio illegally.

WPTV legal expert Michelle Suskauer says it is illegal in Florida to record anyone without them knowing.

Florida’s two-party consent/wiretapping law is outdated and likely unconstitutional, but for now it stands. It also provides an exception for recording oral communications where the person speaking would not have a reasonable expectation of privacy.

A classroom, in a public school, would seem to be a place where no one would have an expectation of privacy. Administrators certainly go to lengths to assure their students that nothing they do while at the school is afforded any sort of expectation of privacy, what with random locker/vehicle/cell phone searches and monitoring of computer use. So, why would a teacher be granted an expectation of privacy for something said in a classroom?

Well, it’s not so much Florida’s law implicated here as much as it is the district’s policy on personal devices, even though the school allegedly referred to the recording as “illegal.” According to the policy, “wireless communication devices” may not be used to record anything on school grounds.

Inappropriate use includes, but is not limited to: (1) activation, display, manipulation, or inappropriate storage during prohibited times; (2) texting, phoning, or web browsing during prohibited times; (3) taping conversations, music, or other audio at any time; (4) photography or videography of any kind; and (5) any activity that could in any manner infringe upon the rights of other individuals, including but not limited to students, teachers, and staff members.

Now, using this policy to suspend a student who exposed teacher misconduct is just pure tone-deafness, which explains the district’s decision to quickly reverse the suspension. Not only that, but this “violation” doesn’t even carry with it the penalty of suspension.

Any disruptive, harassing, or other inappropriate use of a wireless communications device while under the School Board’s jurisdiction, shall be cause for disciplinary action under this heading, including confiscation of the device as contraband and, in the event of repeated or serious misuse, loss of the privilege to possess such a device on school property or while attending a school function.

So, the suspension makes even less sense than it would otherwise, given the school’s actual policy on cell phone use — something it seems to have (briefly) ignored in favor of deterring a student from exposing staff misconduct.

But there’s still a link to Florida’s outdated wiretapping law contained in the school policies. This sentence wraps up the paragraph on inappropriate use of cell phones.

The use of a wireless communications device shall be cause for disciplinary action and/or criminal penalties if the device is used in a criminal act.

At which point, we’re back to the question of privacy expectations. Certainly, most schools are quick to cite privacy laws when dealing with the release of student information. Anything to do with minors is inherently more sensitive than that of adults. Not that privacy concerns prevent schools from being as invasive as possible when dealing with their students, requiring signatures on policies that allow administrators to search students’ devices, lockers and vehicles for nearly any reason, as well as the offering of waivers to use photos and student information in news stories and school-produced materials.

But this school also forbids the recording of anything while on campus, even with a personal cell phone, granting an expectation of privacy that doesn’t actually exist under Florida law. Public schools are public and words uttered by educators and administrators in classrooms and assemblies (any place where it’s not “one-on-one”) are very much “public” by definition. Florida’s wiretapping law shouldn’t apply. Unfortunately, school policies take precedent in situations like these, and this district has pretty much assured that the bullying that schools seem so concerned about will only be handled with hearsay, as any recording evidence to back up allegations is forbidden.

Kudos to the school for quickly realizing suspending the student was the wrong way to handle this, but the policies it forces students to follow are just going to make it harder for administrators to deal with misbehaving students and teachers.

Link (Techdirt)

How The Copyright Industry Wants To Undermine Anonymity & Free Speech: ‘True Origin’ Bills

As we’ve noted many times in the past, the entertainment industry likes to take a multi-pronged approach to its quixotic efforts to “stop piracy” (which could be much better dealt with by simply giving the public more of what they want). Working on federal copyright law to continually expand it is one main strategy, but there are a lot of others as well, including pressuring private companies to voluntarily censor content, getting international trade agreements to force laws to change and… getting random state laws to force through big changes quietly. This last strategy has come into focus lately, especially with the rise of so-called “true origin” bills, that are almost certainly unconstitutional, but are rapidly popping up in a variety of states. This is actually a replay of an old strategy. I remember similar “true origin” efforts being pushed about a decade ago, and I’d thought they’d completely died out… but they’re back.

The way they work is pretty simple: they outlaw anonymity on the internet if your website distributes any kind of audiovisual work. The point of this is twofold: one, for those who “register” and reveal their name and address, it makes it easier for the RIAAs and MPAAs of the world to sue a site for copyright infringement. And, for those who don’t reveal their names, the RIAA and can ask the states to prosecute the site owners for failing to reveal their names.

Link (Techdirt)

Emails Show Jeb Bush Coordinated With Florida Legislature for Favorable Primary Date

Emails obtained by The Intercept via a public records request reveal Jeb Bush closely coordinating with the Florida legislature to schedule Florida’s 2016 presidential primary in a way most favorable for Bush.

State Representative Matt Gaetz wrote to Bush on January 2nd that he is “concerned that Florida’s current primary date will lead to proportional allocation of delegates” and that a “winner take all” system would be preferable.

“Unless you ask me otherwise, I’ll file legislation to move our primary date back a week,” Gaetz told Bush, who responded to say that his political advisor Sally Bradshaw would give Gaetz a call. “10 4,” Gaetz shot back.

The email exchange had begun with Bush emailing Gaetz, the son of State Senator Don Gaetz, president of the Florida Senate in the previous session. Bush thanked the younger Gaetz for his “willingness to head to Iowa to go door to door,” adding, “Wow, what a generous offer! Happy New Year!”

The email exchange ended on January 3rd. But last week the primary arrangements proposed over email became a reality.

On Thursday, Gov. Rick Scott signed a bill that sets the date of Florida’s primary as March 15th, the first date on which states may award their full quantity of delegates on a winner-take-all basis under Republican National Committee rules. States scheduling primaries between March 1st and 14th must award delegates in proportion to the percentage of votes they receive or lose half their delegates, as Florida Republicans did in 2012.

As the Palm Beach Post noted, the bill appears to be a “a boon for U.S. Sen. Marco Rubio or former Gov. Jeb Bush, who both are considering a presidential run.” Such a front-loaded system often benefits establishment candidates with the most money to spend on television advertisements, as was the case with Mitt Romney in Florida in the 2012 race.

Florida, the state Bush governed for two terms, is perhaps the most important primary election for Bush in his expected quest to secure the GOP presidential nomination. Bush could lose the first few primary elections — which award delegates on a proportional basis — yet come out decisively in the lead in terms of delegates if he is able to win Florida’s winner-take-all primary, with its projected 99 delegates.

The New York Times recently reported that Bush’s political operatives have developed a confidential plan code-named “Homeland Security” to ensure victory in Florida for the primary and general election. The report notes that the Bush team intends to spend $50 million to secure support in Florida.

Link (The Intercept)

FBI Pins ‘Terrorist’ Nametag On ‘Retarded Fool’ Without A ‘Pot To Piss In’

The FBI’s preference for easily-investigated terrorism is well-documented. We’re routinely assured that all sorts of domestic surveillance tech and agency opacity is necessary to protect us from a whole host of threats, but for the most part, the terrorists “apprehended” by the FBI seem to be people who’ve had the misfortune of being “befriended” by undercover agents and/or confidential informants.

When over 90% of the funding, idea generation, transportation and motivation comes from those saving us from terrorism, we have reason to be worried. While the FBI performs its predatory handcrafting of “extremists,” the real terrorists — who don’t need someone else to provide weapons, money and motivation — are still going about the business of terrorism.

This isn’t to say that all, or even a majority, of the FBI’s anti-terrorist resources are devoted to digging a hole and filling it back up. But a portion of it is, and that portion is squandered completely. And these numbers, gathered by The Intercept, put the squandered portion at nearly 50% of the total.

Link (Techdirt)

How the FBI Created a Terrorist

Osmakac was 25 years old on January 7, 2012, when he filmed what the FBI and the U.S. Department of Justice would later call a “martyrdom video.” He was also broke and struggling with mental illness.

After recording this video in a rundown Days Inn in Tampa, Florida, Osmakac prepared to deliver what he thought was a car bomb to a popular Irish bar. According to the government, Osmakac was a dangerous, lone-wolf terrorist who would have bombed the Tampa bar, then headed to a local casino where he would have taken hostages, before finally detonating his suicide vest once police arrived.

But if Osmakac was a terrorist, he was only one in his troubled mind and in the minds of ambitious federal agents. The government could not provide any evidence that he had connections to international terrorists. He didn’t have his own weapons. He didn’t even have enough money to replace the dead battery in his beat-up, green 1994 Honda Accord.

Osmakac was the target of an elaborately orchestrated FBI sting that involved a paid informant, as well as FBI agents and support staff working on the setup for more than three months. The FBI provided all of the weapons seen in Osmakac’s martyrdom video. The bureau also gave Osmakac the car bomb he allegedly planned to detonate, and even money for a taxi so he could get to where the FBI needed him to go. Osmakac was a deeply disturbed young man, according to several of the psychiatrists and psychologists who examined him before trial. He became a “terrorist” only after the FBI provided the means, opportunity and final prodding necessary to make him one.

Since the 9/11 terrorist attacks, the FBI has arrested dozens of young men like Osmakac in controversial counterterrorism stings. One recent case involved a rudderless 20-year-old in Cincinnati, Ohio, named Christopher Cornell, who conspired with an FBI informant — seeking “favorable treatment” for his own “criminal exposure” — in a harebrained plot to build pipe bombs and attack Capitol Hill. And just last month, on February 25, the FBI arrested and charged two Brooklyn men for plotting, with the aid of a paid informant, to travel to Syria and join the Islamic State. The likelihood that the men would have stepped foot in Syria of their own accord seems low; only after they met the informant, who helped with travel applications and other hurdles, did their planning take shape.

Link (The Intercept)