By timothy from Slashdot's conspiracy-against-the-laity-part-XVXIIIX department
New submitter Elenor writes with this story (excerpted) from TorrentFreak, another nugget gleaned from the cables made public by WikiLeaks: "The Canberra Wikileaks cables have revealed that the U.S. Embassy sanctioned a conspiracy by Hollywood studios to target Australian communications company iiNet through the local court-system, with the aim of establishing a binding common-law precedent which would make ISPs responsible for the unauthorised file-sharing of their customers. Both the location, Australia, and the target, iiNet, were carefully selected. A precedent set in Australia would be influential in countries with comparable legal systems such as Canada, India, New Zealand and Great Britain. Australian telecommunications giant Telstra was judged too large for the purposes of the attack. Owing to its smaller size and more limited resources, iiNet was gauged the perfect candidate."
The cable describes no overt action on the part of the American embassy, but the wording is telling: "Mike Ellis, the Singapore-based President for Asia Pacific of the Motion
Picture Association ... said MPAA did not see any role for Embassy at this
time, but wanted to keep us informed."Read Replies (0)
By Unknown Lamer from Slashdot's framed-by-darpa-created-ai department
wiredmikey writes with an update on Microsoft's takedown of the Kelihos botnet
. From the article: "Microsoft is not just taking down botnets; it is taking them down and naming names. In an amended complaint [PDF] filed Monday in U.S. District Court for the Eastern District of Virginia, Microsoft named a man from St. Petersburg, Russia, as the alleged head of the notorious Kelihos botnet. Naming names can be a risky business. Previously, Microsoft alleged Dominique Alexander Piatti, dotFREE Group SRO and several unnamed 'John Does' owned a domain cz.cc and used cz.cc to register other subdomains used to operate and control the Kelihos botnet. However, the company later absolved Piatti of responsibility when investigators found neither he nor his business was controlling the subdomains used to host Kelihos. Whether naming Sabelnikov – who, according to Krebs on Security, once worked as a senior system developer and project manager for Russian antivirus vendor Agnitum, will have the same effect as naming the Koobface gang remains to be seen. Though Kelihos has remained defunct since the takedown last year, the malware is still on thousands of computers."Read Replies (0)