Wednesday, March 13, 2013

Computer Forensics in Criminal Investigations

Figure 1: Computer system hacking. Computer forensics has been essential in convicting many well known criminals, including terrorists, sexual predators, and murderers. Courtesy of Wikimedia.

Computer forensics integrates the fields of computer science and law to investigate crime. For digital evidence to be legally admissible in court, investigators must follow proper legal procedures when recovering and analyzing data from computer systems. Unfortunately, laws written before the era of computer forensics are often outdated and cannot adequately assess the techniques used in a computer system search. The inability of the law to keep pace with technological advancements may ultimately limit the use of computer forensics evidence in court. Privacy advocates are growing especially concerned that computer searches may be a breach of a suspect?s human rights. Furthermore, as methods for encryption and anonymity grow more advanced, technology may be abused by helping criminals hide their actions. Ultimately, the role of technology in computer forensics may not reach its full potential due to legal boundaries and potential malicious intentions.

Computer forensics has been indispensable in the conviction of many well-known criminals, including terrorists, sexual predators, and murderers. Terrorist organizations may use the Internet to recruit members, and sexual predators may use social networking sites to stalk potential victims. However, most criminals fail to cover their tracks when using technology to implement their crimes. They fail to realize that computer files and data remain on their hard drive even when deleted, allowing investigators to track their criminal activity. Even if criminals delete their incriminating files, the data remains in a binary format due to ?data remanence? or the residual representation of data (1). File deletion merely renames the file and hides it from the user; the original file can still be recovered (2).

Eventually, data may be overwritten and lost due to the volatile nature of memory, a storage area for used data. A random access memory chip (RAM) retrieves data from memory to help programs to run more efficiently. However, each time a computer is switched on, the RAM loses some of its stored data. Therefore, RAM is referred to as volatile memory, while data preserved in a hard drive is known as persistent memory. The RAM is constantly swapping seldom used data to the hard drive to open up space in memory for newer data. Over time, though, the contents in the swap file may also be overwritten. Thus, investigators may lose more evidence the longer they wait since computer data does not persist indefinitely. Fortunately, computer scientists have engineered equipment that can copy the computer?s contents without turning on the machine. The contents can then be safely used by lawyers and detectives for analysis (2).

Global Position System (GPS) software embedded in smartphones and satellite navigation (satnav) systems can also aid prosecutors by tracking the whereabouts of a suspect. Since companies that develop software for computer forensics also develop products for satellite navigators, they are well-equipped with the tools and technology necessary for acquiring GPS evidence.

However, the evidence that can be recovered from GPS software is limited to only a list of addresses. Current GPS software does not record the time when the address was archived, whether the address was inputted by a person or automatically recorded, or whether the owner?s intent for entering the address was associated with the crime. Despite these limitations, GPS evidence has still been crucial to the success of many prosecutions. In one famous example, four armed suspects accused of robbing a bank in the United Kingdom were convicted because each suspect owned a vehicle whose satnav held incriminating evidence, including the bank?s address and the addresses of the other three suspects. The Scottish National High-Tech Crime Unit searched a suspect?s TomTom, a GPS device, to obtain thousands of addresses that the vehicle passed by. Many of the addresses turned out to be the scenes of criminal offenses (3). In 2011, U.S. forces successfully found the Pakistani compound where Osama bin Laden was killed by tracking satellite phone calls made by his bodyguard (4).

While GPS evidence on its own may not be enough to establish a motive, GPS evidence can still provide invaluable leads or confirm a hunch. For example, contact lists, language preferences, and settings all may be used to establish a suspect?s identity or identify accomplices. Evidence from GPS software and mobile devices can be a valuable supplement to other forms of evidence (3).

Some criminals have grown more cautious by hiding incriminating data through encryption techniques. However, according to Andy Spruill, senior director of risk management for Guidance Software, most criminals ?don?t have the knowledge or patience to implement [encryption software] on a continued-use basis.? The minority of criminals who do encrypt their files may only use partial encryption. If only a few files on a hard drive are encrypted, investigators can analyze unencrypted copies found elsewhere on the device to find the information they are seeking. Furthermore, since most computer users tend to reuse passwords, investigators can locate passwords in more easily decipherable formats to gain access to protected files. Computer data are also oftentimes redundant ? Microsoft Word makes copies each time a document is modified so that deleting the document may not permanently remove it from the hard drive. With so many forms of back-up, it is difficult for criminals to completely delete incriminating computer evidence (5).

While investigators can exploit computer system glitches to obtain evidence, technological limitations can often compromise a computer search. A common protocol for handling a mobile device found at a crime scene is to turn the power off. Investigators want to preserve the battery and prevent an outside source from using the remote wipe feature on the phone?s contents. When the phone is turned off, the phone cannot receive text messages and other data that may overwrite the evidence currently stored in the device. However, turning off the device has its own consequences, potentially causing data to be lost and downloaded files to be corrupted (1).

To solve such problems, computer engineers have developed technology for shielding a device from connecting to a cellular carrier?s network. Computer forensic scientists no longer need to turn off the device to isolate it. For example, radio frequency (RF) shielded test enclosure boxes help keep signals from entering or leaving the device. A Faraday bag, used in conjunction with conductive mesh, can also isolate a mobile device. Using these techniques, investigators can safely transport mobile devices to the lab while the device is turned on (1).

However, GPS software and Faraday bags are not foolproof. A cell phone isolated in a Faraday bag may adamantly search for a signal, depleting the phone?s battery power. When searching for a network, cell phones are also losing data (1).

Figure 2: Radio frequency bag with iPhone inside for reducing data loss. These bags keep radio signals from entering or leaving the device. Courtesy of Wikimedia.

According to Professor David Last of University of Bangor, Wales, errors in locating signals may range up to 300 meters when obstructions are present. While ?95 percent of [GPS] measurements fall within 5 metres of the true position? in clear and open areas, large geographical barriers and skyscrapers may severely block and reflect satellite signals. Interference from solar weather may also disrupt signals. Criminals even purposely use jammers to disrupt tracking systems. Investigators must carefully audit communications channels and monitoring systems used in tracking systems. In doing so, they can better avoid skepticism from the jury by being able to give a clearer and more precise estimate of the amount of error afflicting GPS measurements. Otherwise, the defense can suppress the GPS evidence if the measurements are significantly faulty and unreliable (3).

While the Fourth and Fifth Amendments were written long before the era of computers, both concepts still apply to the practice of computer forensics. The amendments serve to protect basic human rights by preventing unreasonable search and seizure and self-incrimination. In the case of United States v. Finley, the defendant claimed that ?a cell phone was analogous to a closed container,? suggesting that investigators should exercise the same restraint and caution in searching cell phones as they would in a bag or a private home. Generally, investigators must first obtain a search warrant, which is typically given by the court in order to obtain and preserve evidence that can be easily destroyed (1). However, exceptions to the rule have been observed in United States v. Ortiz; investigators legally retrieved telephone numbers of ?finite memory? from a suspect?s pager without a warrant because the contents of the pager can be easily altered when incoming messages overwrite currently stored data. Searches without a warrant ?incident to arrest? are permissible because they help to prevent fragile data of evidentiary value from being lost (6). They consist mostly of scanning the device?s contents using the keyboard and menu options. More advanced searches incident to arrest may include the use of a mobile lab, which allows for the immediate download of cellular phone data (7). However, according to United States v. Curry, searches ?incident to arrest? can only be conducted ?substantially contemporaneous with the arrest? (1). If investigators want to conduct further post-arrest forensic analysis, proper legal authorization must first be obtained (7).

Proper legal procedures are often vague and burdensome for investigators, especially since laws may vary from state to state. Some states may have a stricter policy regarding warrantless searches. In United States v. Park, the court ruled that since cell phones can hold a greater quantity of data than pagers, its contents are less likely to be lost; a warrantless cell phone search is thus unnecessary and unjustified. Similarly, in United States v. Wall, the court decided that ?searching through information stored on a cell phone is analogous to a search of a sealed letter? (6). Even if investigators manage to obtain a search warrant, the evidence they find may still be suppressed if their forensic procedures fail to follow legal procedures. For example, looking through unopened mail and unread texts or not carefully documenting the chain of custody may constitute an improper search (1). With so many boundaries and inconsistencies in the legal system, it is often difficult for investigators to successfully perform their jobs.

Different state and national legal systems plague computer forensics as well. When an Estonian was charged with computer crimes in 2007, Russia refused to provide legal cooperation because it had not criminalized computer crimes yet. Russia received severe Distributed Denial of Service attacks for its lack of cooperation (8).

In addition to a faulty legal system, the accessibility of advanced technology may be afflicting computer forensics. The North Atlantic Treaty Organization (NATO) defines cyber terrorism as ?a cyber attack using or exploiting computer or communication networks to cause sufficient destruction to generate fear or to intimidate a society into an ideological goal? (8) As computer systems grow more powerful, criminals may also abuse computer systems to commit crimes such as software theft, terrorism, and sexual harassment (9). For example, stalkers can abuse the Tor Project, an anonymizing tool for victims of cybercrimes to safely report abuses, to instead hide their identities when they commit crimes of harassment. The technology is too advanced for the digital trail of cybercrimes to be tracked. As encryption programs grow stronger and more popular, forensic investigators may no longer be able to decode the hidden digital evidence.

Conclusion

For computer forensics to progress, the law must keep pace with technological advancements. Clear and consistent legal procedures regarding computer system searches must be developed so that police and investigators can be properly trained. An International Code of Ethics for Cyber Crime and Cyber Terrorism should also be established to develop protocols for ?obtaining and preserving evidence, maintaining the chain of custody of that evidence across borders,? and ?clear[ing] up any difference in language issues.? Following these measures may be the first steps to resolving the technological and legal limitations afflicting computer forensics. Interpol, the International Criminal Police Organization, has developed a Computer Crime Manual with ?training courses? and ?a rapid information exchange system? that serves as a foundation for international cooperation (8). Lastly, the criminal abuse of technology can be limited by equipping the police department with state-of-the-art training and equipment for forensic analysis. Only then is the world safely prepared to face the future of technology. As one author predicts, ?the next world war will be fought with bits and bytes, not bullets and bombs? (8).

Contact Barry Chen at

Barry.Y.Chen.16@dartmouth.edu

?

References

1. D. Bennett, The Challenges Facing Computer Forensics Investigators in Obtaining Information from Mobile Devices for Use in Criminal Investigations (2011). Available at http://articles.forensicfocus.com/2011/08/22/the-challenges-facing-computer-forensics-investigators-in-obtaining-information-from-mobile-devices-for-use-in-criminal-investigations (29 December 2012).

2. Computer Crimes. Available at http://library.thinkquest.org/04oct/00206/cos_computer_crimes.htm (29 December 2012).

3. D. Last, Computer Analysts and Experts ? Making the Most of GPS Evidence (2012). Available at http://articles.forensicfocus.com/2012/08/27/computer-analysts-and-experts-making-the-most-of-gps-evidence (29 December 2012).

4. O. Tohid, Bin Laden bodyguard?s satellite phone calls helped lead US forces to hiding place (2011). Available at http://www.csmonitor.com/World/Asia-South-Central/2011/0502/Bin-Laden-bodyguard-s-satellite-phone-calls-helped-lead-US-forces-to-hiding-place (29 December 2012).

5. A. Spruill, Digital Forensics and Encryption. Available at http://www.evidencemagazine.com/index.php?option=com_content&task=view&id=656 (29 December 2012).

6. C. Milazzo, Searching Cell Phones Incident to Arrest: 2009 Update (2009). Available at http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display&issue_id=52009&category_ID=3 (29 December 2012).

7. D. Lewis, Examining Cellular Phones and Handheld Devices (2012). Available at www.dfinews.com/article/examining-cellular-phones-and-handheld-devices?page=0,1 (29 December 2012).

8. B. Hoyte, The need for Transnational and State-Sponsored Cyber Terrorism Laws and Code of Ethics (2012). Available at http://articles.forensicfocus.com/2012/09/28/the-need-for-transnational-and-state-sponsored-cyber-terrorism-laws-and-code-of-ethics (29 December 2012).

9. M. Chasta, Android Forensics (2012). Available at http://articles.forensicfocus.com/2012/09/12/android-forensics (29 December 2012).

Source: http://dujs.dartmouth.edu/uncategorized/computer-forensics-in-criminal-investigations

radar weather morosini death jacoby ellsbury jacoby ellsbury

Monday, March 11, 2013

Sony targets potential iPhone converts with its updated Xperia Transfer software

Sony targets potential iPhone converts with its updated Xperia Transfer softwareSony has released an update to its Xperia Transfer software suit that it offers free of charge to users of its Xperia branded handsets. The latest update looks to seamlessly ease iPhone users over to the Xperia?s Android platform by helping them transfer their content from their iPhone. The software claims to be able to transfer an iPhone?s contacts, messages, calendar entries, notes, bookmarks, and iTunes music.

Is your current phone an iPhone? Use Xperia Transfer in PC Companion or Sony Bridge for Mac to easily transfer your content and contacts to your new Sony device. Note: Xperia Transfer supports the following Sony devices: Xperia V (LT25), Xperia VC, Xperia TX (LT29), Xperia T (LT30), Xperia TL (LT30), Xperia T (LT30), Xperia Z, Xperia ZL, Xperia ZQ.

In order to use the software, you first have to sync your iPhone using iTunes. The Xperia Transfer suite can then presumably access the iPhone?s backup file to extract the relevant information before converting it and transferring it to a format that Sony?s Xperia range of handsets can understand.

HTC updated its Sync Manager software last month to offer the same services as this Sony software and that worked by accessing the iPhone?s backup file. It will be very interesting to see how long it takes Apple to close off this loophole and prevent HTC and Sony from releasing software to entice iPhone users away from the platform.

Source: Electronista



Source: http://feedproxy.google.com/~r/TheIphoneBlog/~3/MKw_xjZe1nM/story01.htm

weather nyc the walking dead the walking dead Walking Dead Season 3 smash Richard III Superbowl Commercials 2013

Caltech researchers create 'self-healing' computer chip | Digital Trends

Forget about taking your failed Macbook Air to Apple Geniuses to make it all better. In the not so distant future, our computers might be able to automatically diagnose and heal themselves in microseconds with the help of ?self-healing? computer chips developed by researchers at the California Institute of Technology (Caltech).

The Caltech team has built a power amplifier that can detect its own problems and look for workarounds if something fails, like if there is insufficient power to keep the computer running. As reported by Parity News, the team tested how resilient a group of 76 self-healing chips are by ?zapping them with high-power lasers.? Like a lizard that can regenerate a new tail on-the-fly as it makes it escape from an enemy, the chips were able to?repair them[selves] to keep the larger system going? within a second.

While this power amplifier is by no means an organic being that can actually grow damaged parts, it is smart enough to troubleshoot itself and come up with its own solutions without interference from researchers. That?s because they have equipped the chips with sensors that monitor everything from temperature to voltage, but leave its on-board ?brain? to ?make decision based on the data fed to it by the sensors? so the chip can make repairs immediately.

The hope is that the Caltech researchers will be able to apply what they learned from creating this smart power-management chip to other computer parts on a motherboard. The ultimate user-friendly computer would be one that could just fix itself when say your home-brewed hybrid hard drive/SSD setup suddenly decides to fail, so you wouldn?t miss a beat. For now, you can read all about the team?s findings in their research paper.

Source: http://www.digitaltrends.com/computing/caltech-researchers-create-self-healing-computer-chips-that-can-fix-themselves/

snl lindsay lohan valley fever project x the lorax lorax fisker karma super tuesday states

My upcoming book: Apothecary Cocktails, Restorative Drinks from ...

Author of upcoming book: Apothecary Cocktails-Restorative Drinks from Yesterday and Today on Rockport/Quayside Books, now in pre-sale on Amazon. Warren Bobrow is the cocktail writer for Foodista. Warren Bobrow is the Food and Drink Editor of the 501c3 non profit Wild Table on Wild River Review located in Princeton, New Jersey. Warren was one of only 12 journalists world-wide, and the only one from the USA to participate in the F?te de la Gastronomie- the weekend of September 22nd. 2012 in Burgundy and Paris. He attends Tales of the Cocktail and is presenting on Milk Punch for the 2013 show Warren demo'd freestyle mixology at the International Food Bloggers Conference in Portland, Oregon. (2012) Warren judged the Iron Mixology competition at the Charleston Wine and Food Festival (2012) Warren has published over three hundred articles on everything from cocktail mixology to restaurant reviews to travel articles. You may find him on the web at: http://www.cocktailwhisperer.com Warren is a published food writer and worked for Jim Ledue at Alberta's in Portland, Maine as a cook. Warren began his climb to becoming a chef as a pot scrubber at the York Harbor Inn in York Harbor, Maine in 1985. Warren is the former owner and co- founder of Olde Charleston Pasta in Charleston, SC while cooking at the Primerose House and Tavern. (Also in Charleston) He spent Hurricane Hugo (1989) in his former home in Charleston and lost his business soon thereafter. Warren was # 30 in Saveur Magazine's 100 in 2010, for his writing about the humble Tuna Melt. He's written food and cocktail articles and news for Edible Jersey, Chutzpah Magazine, Voda Magazine, Tasting Table, Serious Eats and Total Food Service Magazine. Warren attended the Kentucky Derby and the Oaks Day Races 2012, while on assignment for Voda Magazine. He writes for the "Fabulous Beekman 1802 Boys" as their cocktail writer. (Klaus, The Soused Gnome) He also writes for The Daily Basics, Leaf Magazine and Modenus. He writes for Williams-Sonoma on their Blender Blog. He is a Ministry of Rum judge.

Source: http://cocktailwhisperer.com/?p=326

Voter registration Election Election results 2012 exit polls Presidential Polls California Propositions Electoral College

Friday, March 8, 2013

More birdies for Tiger, and the lead at Doral

Tiger Woods waits to hit from the third tee during the second round of the Cadillac Championship golf tournament Friday, March 8, 2013, in Doral, Fla. (AP Photo/Wilfredo Lee)

Tiger Woods waits to hit from the third tee during the second round of the Cadillac Championship golf tournament Friday, March 8, 2013, in Doral, Fla. (AP Photo/Wilfredo Lee)

Tiger Woods hits from the third fairway during the second round of the Cadillac Championship golf tournament Friday, March 8, 2013, in Doral, Fla. (AP Photo/Wilfredo Lee)

Tiger Woods looks over his putt on the ninth green during the second round of the Cadillac Championship golf tournament Friday, March 8, 2013, in Doral, Fla. (AP Photo/Alan Diaz)

Graeme McDowell of Northern Ireland hits from an 11th fairway sand trap during the second round of the Cadillac Championship golf tournament Friday, March 8, 2013, in Doral, Fla. (AP Photo/Alan Diaz)

Phil Mickelson watches his putt stop short of the cup on the 11th green during the second round of the Cadillac Championship golf tournament Friday, March 8, 2013, in Doral, Fla. (AP Photo/Alan Diaz)

(AP) ? Tiger Woods struggled on the practice range, and he didn't feel much better two holes into his second round Friday at the Cadillac Championship. He would not have guessed this would be the day to set a personal record for birdies, much less wind up with a two-shot lead.

"All I need is one shot," he said. "And as soon as I feel it on one, I can pretty much carry through. And I did that today."

It was a 4-iron on the par-3 fourth hole, the toughest on the Blue Monster.

Woods hit a bullet with a slight fade at the left edge of the green and heard the crowd cheer as the slope and the grain took the ball to within 4 feet for birdie.

And just like that, he was on his way.

In a World Golf Championship with the biggest names in the hunt, Woods ran off six birdies in an eight-hole stretch around the turn in a clean, crisp exhibition. That sent him to a 7-under 65 and a two-shot lead over former U.S. Open champion Graeme McDowell.

Woods has made 17 birdies in two rounds, his most ever on the PGA Tour, though that wasn't the most important number.

"It left me a two-shot lead," Woods said.

He was at 13-under 131, his lowest 36-hole score on tour since the 2009 AT&T National.

Woods followed that 4-iron with a wedge he stuffed to inside 2 feet. He added a collection of 10- to 15-foot birdie putts, and ended his big run with another 4-iron with a totally different shape, this one high and soft to 15 feet on the 224-yard 13th hole. Those par 3s ranked as the two toughest at Doral on Friday, and he birdied them both.

A birdie-birdie finish by McDowell gave him a 67 and prevented a dream final group for the weekend at Doral ? Woods and longtime nemesis Phil Mickelson.

Mickelson, sparked by a visit to Augusta National earlier in the week, hit a 9-iron that stopped inches from dropping for a hole-in-one on the par-3 ninth. He had a 67 and was three shots behind, along with Steve Stricker (67).

Rory McIlroy showed signs of turning the corner with a 69, although he ended with a sloppy three-putt bogey. It was his first round under par this year, a small consolation for the world's No. 1 player. He was still 11 shots behind Woods.

Woods, who once owned these WGCs, has not won the last 10 he's played. But after a key putting tip from Stricker on Wednesday afternoon, Woods looks as comfortable as ever on a Blue Monster course where he has won three times.

"It's going to be tough to catch him," Stricker said. "We all know when he gets out in front, he's tough to catch and tough to beat. Looks like he's playing well. Looks like all parts of his game are working. Yeah, he's going to be tough to catch."

The toughest part of the weekend might be the Blue Monster.

The greens already are firm and crusty under a week of sunshine and dry air. Woods, McDowell and most everyone else expects it to only get worse.

"I guess they can let this place go since they're going to tear it up on Monday," McDowell said.

Donald Trump, who bought the resort a year ago, plans a big makeover on the Blue Monster with construction to start right after the tournament. If that's the case, it could be reminiscent of Bay Hill a year ago, where Woods outlasted McDowell on the final day.

"It basically was a U.S. Open that broke out in Orlando," Woods said. "We don't get too many opportunities where the weather cooperates, where they can push the golf course to a point where it's pretty tough like that."

Not that he would mind. Woods has thrived on the toughest courses over the years, one reason he has 14 majors.

"It would be fun," he said.

More fun is being atop the leaderboard, especially on a course where Woods has a history of winning. He has a 35-10 record when he has at least a share of the 36-hole lead, though he is only 2-2 in the last year. Those events he failed to win were the U.S. Open and PGA Championship.

The star from Northern Ireland this year has been McDowell, who won the World Challenge at the end of last year at Sherwood and hasn't missed much of a beat since returning from a 10-week break. He lost in the quarterfinals of the Match Play Championship, and tied for ninth in the Honda Classic.

Making up a two-shot deficit to Woods is never easy, though McDowell holds one distinction. He is the only player to make up more than two shots to Woods in the final round, rallying from four down at Sherwood in 2010.

"Tomorrow is not about winning the golf tournament. Tomorrow is about maintaining position, maintaining the way I'm playing and trying to give myself a chance come Sunday afternoon," McDowell said. "It doesn't really matter who I'm playing with tomorrow. Tiger always brings his own interesting little circus inside the ropes. But like I say, I've been there many times and I always look forward to playing with him.

"And he certainly looks like if you can finish one ahead of him this weekend, it looks like you'll do OK here."

McDowell didn't mind finishing ahead of Mickelson on this day, a small motivation. He looked at a leaderboard filled with so many big names, and he couldn't help but notice the four-time major champion making a move.

"I saw Phil sneaking up the leaderboard there behind me and I said, 'Let's spoil this part tomorrow.' I'm sure they would have liked Tiger and Phil in the last group tomorrow, but I certainly will enjoy the position of being in the last group. That's where I want to be."

Mickelson will play with Stricker.

Masters champion Bubba Watson recovered from a shaky back nine for a 69 and was at 9-under 135 with Freddie Jacobson (69). Former Masters champion Charl Schwartzel also had a 65 and was five shots behind, along with former PGA champion Keegan Bradley, who had a 68.

Mickelson also wanted in that last group with Woods, especially with his track record against him over the last five years. He was happy with his game, though, coming off a two-week break, with a detour to Augusta.

"There's something very spiritual about playing Augusta if you love the game as much as I do, and going there gets me fired up," Mickelson said.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/347875155d53465d95cec892aeb06419/Article_2013-03-08-Cadillac%20Championship/id-460324d9d87b4169a8b48ecf9d19eb57

Ryder Cup 2012 Johnny Lewis yom kippur yom kippur avengers soa andy williams

Facebook Updates Its Photo Experience To Be More ?Immersive? In News Feed, Timeline And Albums

photo 1Today, Facebook has announced new design changes to its News Feed, along with a total overhaul of its Photo experience. Photos are a huge part of what makes Facebook so engaging, and the company says that this new design is more “immersive.” Basically, the design highlights your photographs in the News Feed, your Timeline and Photo Albums. Photos from third-party apps like Pinterest and Instagram are also getting a better treatment, with larger and better-highlighted images. “In the new design, we’re making sure that this media is front and foremost” said Julie Zhou, Product Design Manager at Facebook. What we’re being shown is what Facebook calls a “richer, simpler” Facebook experience over all devices, including desktop. This consistency is key, as it’s something that Facebook has struggled with in the past. More soon.

Source: http://feedproxy.google.com/~r/Techcrunch/~3/dDCvAmjoqX0/

amelia earhart Sally Ride Ichiro minka kelly James Holmes court Rupert Sanders bachelorette

Wednesday, March 6, 2013

In death, Facebook photos could fade away forever

This Feb. 16, 2013 photo shows a printout of the Facebook page for Loren Williams, now deceased, at his mother's home in Beaverton, Ore. Karen Williams, who battled Facebook over the right to view Loren?s Facebook page, has been urging lawmakers for years to do something to prevent others from losing photos, messages and other memories that otherwise could be accessed at the click of a mouse. This year the Oregon Legislature took up the cause, only to be turned back by pressure from the tech industry, which says they must abide by a 1986 federal law that prevents them from sharing such information. (AP Photo/Lauren Gambino)

This Feb. 16, 2013 photo shows a printout of the Facebook page for Loren Williams, now deceased, at his mother's home in Beaverton, Ore. Karen Williams, who battled Facebook over the right to view Loren?s Facebook page, has been urging lawmakers for years to do something to prevent others from losing photos, messages and other memories that otherwise could be accessed at the click of a mouse. This year the Oregon Legislature took up the cause, only to be turned back by pressure from the tech industry, which says they must abide by a 1986 federal law that prevents them from sharing such information. (AP Photo/Lauren Gambino)

In this Feb. 16, 2013 photo, Karen Williams poses with a photo of her deceased son, Loren, in Beaverton, Ore.. Williams, who battled Facebook over the right to view Loren?s Facebook page, has been urging lawmakers for years to do something to prevent others from losing photos, messages and other memories that otherwise could be accessed at the click of a mouse. This year the Oregon Legislature took up the cause, only to be turned back by pressure from the tech industry, which says they must abide by a 1986 federal law that prevents them from sharing such information. (AP Photo/Lauren Gambino)

In this Feb. 16, 2013 photo, Karen Williams poses with a photo of her deceased son, Loren, in Beaverton, Ore. Williams, who battled Facebook over the right to view Loren?s Facebook page, has been urging lawmakers for years to do something to prevent others from losing photos, messages and other memories that otherwise could be accessed at the click of a mouse. This year the Oregon Legislature took up the cause, only to be turned back by pressure from the tech industry, which says they must abide by a 1986 federal law that prevents them from sharing such information. (AP Photo/Lauren Gambino)

(AP) ? A grieving Oregon mother who battled Facebook for full access to her deceased son's account has been pushing for years for something that would prevent others from losing photos, messages and other memories ? as she did.

"Everybody's going to face this kind of a situation at some point in their lives," says Karen Williams, whose 22-year-old son died in a 2005 motorcycle accident.

The Oregon Legislature responded and took up the cause recently with a proposal that would have made it easier for loved ones to access the "digital assets" of the deceased, only to be turned back by pressure from the tech industry, which argued that both a 1986 federal law and voluntary terms of service agreements prohibit companies from sharing a person's information ? even if such a request were included in a last will and testament.

Lobbyists agree the Stored Communications Act is woefully out of date but say that until it's changed, laws passed at the state level could be unconstitutional.

"Everybody wants to do the right thing, but the hard legal reality is the federal communications act," said Jim Hawley, a vice president at TechNet, an industry group that represents companies such as Google and Microsoft.

Oregon lawmakers moved ahead anyway with a proposal that would have given "digital assets" ? everything from photos and messages stored online to intellectual property and banking information ? the same treatment as material property for estate purposes.

"I think it's time for us to really look at what we can do now," said Democratic Sen. Floyd Prozanski after hearing Williams testify about her loss last month.

Two weeks later, however, language in the bill that would have covered social media accounts, from Facebook to Flikr, was stripped as tech lobbyists said the federal law and company privacy policies trumped anything that the bill would have included.

"I recognize the emotional toll these types of decisions can have on a family who's lost a loved one," Prozanski said Thursday. "But some of these issues may have to be addressed when we have more information than we currently have."

Still, the problem persists and discussions on the issue are gaining momentum. As unlikely as such a case might be, even if a person willingly gives over login and password information to someone whom they authorize to access a given digital account, it would violate most terms of service agreements and both people could be charged with cybercrimes and face civil action from Internet companies under current law.

Currently, five states have digital assets laws, which vary widely. This group includes Oklahoma, which passed a law two years ago allowing estate lawyers to access digital assets, even social media accounts. That measure did not face the opposition that has emerged in Oregon.

"There is some question if laws like the one we passed in Oklahoma, would stand up to a challenge by Facebook and Gmail saying their terms of service agreements supersede laws like this one and the one being discussed in Oregon," said Ryan Kiesel, a former Oklahoma legislator who wrote the law.

"That's a question that remains to be answered," he added.

Several other states, including Nebraska ? guided in part by the story of Williams' 22-year-old son, Loren ? are also considering proposals. And the Uniform Law Commission, a non-profit, non-partisan group that writes model legislation for states to help standardize laws around the nation, is examining the issue.

"This law is a real need as we have moved into a digital world," said Lane Shetterly, an Oregon attorney and a representative on the commission's drafting committee. The group is responsible for standardizing a range of legislation, including commercial transaction regulations and child custody laws.

Proponents say the need is clear. Without clarity or direction, the digital information left behind by a deceased person can spark emotional legal battles, pitting big business against devastated families. And as more and more memories are being stored online, new tools are necessary to make sure loved ones can easily access personal details that could be lost forever.

"If this were a box of letters under his bed, no one would have thought twice," Williams said.

Months after the death of her first-born son, who was away at college in Arizona, Williams found comfort in his Facebook page. There, she was able to click through photos and letters that helped ease the pain of her loss ? for two hours.

She learned of the page from his friends and wanted access to his memories to keep them from being deleted, which was Facebook's policy at the time. Unaware of Internet privacy regulations, she reached out to Facebook for help. As she waited for a response, one of his friends provided a tip that helped her discover his password. "It was like a gift," she said.

Shortly after, however, the site's administrators changed the password, citing company policy in denying her. Williams sued and won, but she never received the full access she sought. Eventually, the account was taken down. In the end, she gained little more than a symbolic victory and a role as champion of a cause that didn't exist before the digital age.

Kiesel, the former Oklahoma lawmaker, says the various attempts at legislation have sparked a long overdue conversation about estate planning for digital assets.

"I think that, because of the wide prevalence of online accounts and digital property, the federal government will ultimately need to pass some legislation that provides greater uniformity," he said.

Congress, however, has no current plans to take up the matter. U.S. Sen. Mark Pryor, an Arkansas Democrat who heads the Senate Commerce Subcommittee on Communications and Technology, is not planning to introduce any digital assets proposals and has not heard any come up, his press secretary said. Also, a bill aimed at modernizing the Stored Communications Act failed in the House Judiciary Committee last year.

"This is not going to happen overnight," said Greg Nojeim, of The Center for Democracy and Technology, a Washington-based non-profit, public policy group. He said changes to the Stored Communications Act were being discussed by industry groups, "but none that would help these families."

Under current law, Internet companies that provide storage for digital assets are prohibited from disclosing account information, even to families, without a court order, which can be costly and difficult to obtain.

Even then, there are no guarantees. Facebook, for example, citing its terms of service agreement won't provide access, even if a judge orders them to do so. Facebook will not comment on pending legislation or specific cases other than to defer to their service agreement, which states, in part, "We may access, preserve and share your information in response to a legal request (like a search warrant, court order or subpoena) if we have a good faith belief that the law requires us to do so."

Along these lines, TechNet, one of several groups in opposition to the Oregon measure, provided written testimony arguing that legislation requiring online companies to provide access could subject them to federal criminal penalties.

"We just want to make sure that whatever comes out doesn't put a company in a position where they have to choose between state and federal law," said Hawley.

The pending Oregon legislation now covers only digital assets of commercial or financial value such as online banking information.

"It's absolutely devastating," Williams said.

Since she began her quiet crusade after her 2007 court victory yielded limited, temporary access to her son's account, the social media landscape has changed considerably, but there is still no industry standard. Where Facebook once deleted the accounts of deceased users, for example, pages can now be memorialized for public view.

Many predict the problem will grow as long as there are no estate laws in place to determine what happens to virtual property left behind by the deceased.

Without a clear law, estate managers can be charged with cybercrimes for attempting to access clients' digital accounts, said Victoria Blachly, a Portland attorney who helped draft the initial Oregon proposal.

Estate planning attorney James Lamm writes about the issue on his blog "Digital Passing." He advises clients to include explicit instructions in their wills stating exactly how digital assets should be handled ? even if there is no guarantee those wishes will be carried out.

"It's good to come up with a thoughtful plan for what happens to all of your property," he said. "Your physical properties, and your digital properties."

___

Follow Gambino on Twitter at: https://twitter.com/LGamGam

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/495d344a0d10421e9baa8ee77029cfbd/Article_2013-03-01-Facebook%20Ghosts/id-fa00d8dcd9c84afe826dd93c2e983264

soul train nevada caucus ufc 143 what time does the super bowl start ben gazzara nfl hall of fame 2012 ufc diaz vs condit