Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

  • Before Using StingRays, Police Must Sign NDA With FBI

    v3rgEz writes Advanced cell phone tracking devices known as StingRays allow police nationwide to home in on suspects and to log individuals present at a given location. But before acquiring a StingRay, state and local police must sign a nondisclosure agreement with the FBI, according to documents released via a MuckRock FOIA request. As Shawn Musgrave reports, it's an unusual setup arrangement for two public agencies to swear each other to secrecy, but such maneuvers are becoming more common.

    57 comments | 3 hours ago

  • Nobody's Neutral In Net Neutrality Debate

    ygslash writes Michael Wolff at USA Today has a long list of the many stakeholders in the net neutrality debate, and what each has to gain or lose. The net neutrality issue has made its way into the mainstream consciousness, thanks to grassroots activism and some help from John Oliver on HBO. But it's not as simple as just net neutrality idealists versus the cable companies or versus the FCC. One important factor that has raised the stakes in net neutrality is the emergence ("unanticipated" by Wolff, but not by all of us) of the Internet as the primary medium for distribution of video content. And conversely, the emergence of video content in general and Netflix in particular as by far the most significant consumers of Internet bandwidth. So anyone involved in the distribution of video content has a lot to gain or lose by the outcome of the net neutrality struggle.

    103 comments | 10 hours ago

  • Mark Zuckerberg Throws Pal Joe Green Under the Tech Immigration Bus

    theodp (442580) writes "A month after he argued that Executive Action by President Obama on tech immigration was needed lest his billionaire bosses at Mark Zuckerberg's FWD.us PAC have to hire 'just sort of OK' U.S. workers, Re/code reports that Joe Green — Zuckerberg's close friend and college roommate — has been pushed out of his role as President of FWD.us for failing to Git-R-Done on an issue critical to the tech community. "Today, we wanted to share an important change with you," begins 'Leadership Change', the announcement from the FWD.us Board that Todd Schulte is the new Green. So what sold FWD.us on Schulte? "His [Schulte's] prior experience as Chief-of-Staff at Priorities USA, the Super PAC supporting President Obama's re-election," assured Zuckerberg in a letter to FWD.us contributors, "will ensure FWD.us continues its momentum for reform." Facebook, reported the Washington Post in 2013, became legally "dependent" on H-1B visas and subject to stricter regulations shortly before Zuckerberg launched FWD.us with Green at the helm."

    236 comments | yesterday

  • Secret Service Critics Pounce After White House Breach

    HughPickens.com writes On Friday evening, a man jumped the White House fence, sprinted across the North Lawn toward the residence, and was eventually tackled by agents, but not before he managed to actually enter the building. Now CBS reports that the security breach at the White House is prompting a new round of criticism for the Secret Service, with lawmakers and outside voices saying the incident highlights glaring deficiencies in the agency's protection of the president and the first family. "Because of corner-cutting and an ingrained cultural attitude by management of 'we make do with less,' the Secret Service is not protecting the White House with adequate agents and uniformed officers and is not keeping up to date with the latest devices for detecting intruders and weapons of mass destruction," says Ronald Kessler. "The fact that the Secret Service does not even provide a lock for the front door of the White House demonstrates its arrogance." But the Secret Service must also consider the consequences of overreaction says White House correspondent Major Garrett. "If you have a jumper and he is unarmed and has no bags or backpacks or briefcase, do you unleash a dog and risk having cell phone video shot from Pennsylvania Avenue of an unarmed, mentally ill person being bitten or menaced by an attack dog?" But Kessler says Julia Pierson, the first woman to head the Secret Service, has some explaining to do. "If the intruder were carrying chemical, biological or radiological weapons and President Obama and his family had been in, we would have had a dead president as well as a dead first family."

    213 comments | yesterday

  • Washington DC To Return To Automatic Metro Trains

    Bruce66423 (1678196) writes with news of interest to anyone with reason to ride mass transit in the U.S., specifically on the D.C. Metro system: After a crash some five years ago, automatic operation was abandoned. Now however replacement of 'faulty' modules means that moving the whole system on to automatic operation can happen. One quote is depressing: "And because trains regularly lurch to a halt a few feet short of where they should be at platforms, Metrorail riders have grown accustomed to hearing an announcement while they're waiting to board: 'Stand clear. Train moving forward.'" That never happens on the London underground with human operators? What's wrong with American drivers?

    175 comments | 2 days ago

  • Proposed Law Would Limit US Search Warrants For Data Stored Abroad

    An anonymous reader writes On Thursday, a bipartisan law was introduced in the Senate that would limit US law enforcement's ability to obtain user data from US companies with servers physically located abroad. Law enforcement would still be able to gain access to those servers with a US warrant, but the warrant would be limited to data belonging to US citizens. This bill, called the LEADS Act (PDF), addresses concerns by the likes of Microsoft and other tech giants that worry about the impact law enforcement over-reach will have on their global businesses. Critics remain skeptical: "we are concerned about how the provision authorizing long-arm warrants for the accounts of US persons would be administered, and whether we could reasonably expect reciprocity from other nations on such an approach."

    121 comments | 2 days ago

  • Apple's "Warrant Canary" Has Died

    HughPickens.com writes When Apple published its first Transparency Report on government activity in late 2013, the document contained an important footnote that stated: "Apple has never received an order under Section 215 of the USA Patriot Act. We would expect to challenge such an order if served on us." Now Jeff John Roberts writes at Gigaom that Apple's warrant canary has disappeared. A review of the company's last two Transparency Reports, covering the second half of 2013 and the first six months of 2014, shows that the "canary" language is no longer there suggesting that Apple is now part of FISA or PRISM proceedings.

    Warrant canaries are a tool used by companies and publishers to signify to their users that, so far, they have not been subject to a given type of law enforcement request such as a secret subpoena. If the canary disappears, then it is likely the situation has changed — and the company has been subject to such request. This may also give some insight into Apple's recent decision to rework its latest encryption in a way that makes it almost impossible for the company to turn over data from most iPhones or iPads to police.

    231 comments | 4 days ago

  • Snowden's Leaks Didn't Help Terrorists

    HughPickens.com writes The Intercept reports that contrary to lurid claims made by U.S. officials, a new independent analysis of Edward Snowden's revelations on NSA surveillance that examined the frequency of releases and updates of encryption software by jihadi groups has found no correlation in either measure to Snowden's leaks about the NSA's surveillance techniques. According to the report "well prior to Edward Snowden, online jihadists were already aware that law enforcement and intelligence agencies were attempting to monitor them (PDF)." In fact, concerns about terrorists' use of sophisticated encryption technology predates even 9/11.

    Earlier this month former NSA head Michael Hayden stated, "The changed communications practices and patterns of terrorist groups following the Snowden revelations have impacted our ability to track and monitor these groups", while Matthew Olsen of the National Counterterrorism Center would add "Following the disclosure of the stolen NSA documents, terrorists are changing how they communicate to avoid surveillance." Snowden's critics have previously accused his actions of contributing from everything from the rise of ISIS to Russia's invasion of the Ukraine. "This most recent study is the most comprehensive repudiation of these charges to date," says Murtaza Hussain. "Contrary to lurid claims to the contrary, the facts demonstrate that terrorist organizations have not benefited from the NSA revelations, nor have they substantially altered their behavior in response to them."

    182 comments | 4 days ago

  • US Military Aware Only Belatedly of Chinese Attacks Against Transport Contractor

    itwbennett writes The Senate Armed Service Committee released on Wednesday an unclassified version of a report (PDF) commissioned last year to investigate cyberattacks against contractors for the U.S. Transportation Command (TRANSCOM). The report alleges that the Chinese military successfully stole emails, documents, login credentials and more from contractors, but few of those incidents were ever reported to TRANSCOM. During a one-year period starting in June 2012, TRANSCOM contractors endured more than 50 intrusions, 20 of which were successful in planting malware. TRANSCOM learned of only two of the incidents. The FBI, however, was aware of 10 of the attacks.

    13 comments | 4 days ago

  • Are Matt's Robot Hexapods Creepy or Cute? (Video)

    University of Arizona grad student Matt Bunting doesn't come across as a mad scientist. That's a very good thing, because his robot hexapod creations are easy to imagine crawling across the USA in large hordes, devouring everything in their path and using all the electricity they come across to feed their Queen Hexapod, a 3-D printer mounted on a hexapod chassis that turns everything fed to it into more robots. Luckily, the real life Matt is an affable (self-described) "Roboticist, Electrical Engineer, Musician, and Rock Crawler" who freely admits that at this time his robotic creations have no practical application whatsoever. This is probably true, except for the fact that they can liven up a music video like mad, as you can see on YouTube in Pedals Music Video (featuring REAL robots) . Our little video is a lot simpler, of course. In it, we interview Matt and he tells us what he's up to with his robots, and gives some 'how to get started with robotics' advice for budding young engineers. (Alternate Video Link)

    35 comments | 5 days ago

  • Obama Presses Leaders To Speed Ebola Response

    mdsolar writes with the latest plan from the U.S. government to fight the Ebola epidemic in West Africa, and a call for more help from other nations by the President. President Obama on Tuesday challenged world powers to accelerate the global response to the Ebola outbreak that is ravaging West Africa, warning that unless health care workers, medical equipment and treatment centers were swiftly deployed, the disease could take hundreds of thousands of lives. "This epidemic is going to get worse before it gets better," Mr. Obama said here at the Centers for Disease Control and Prevention, where he met with doctors who had just returned from West Africa. The world, he said, "has the responsibility to act, to step up and to do more. The United States intends to do more." Even as the president announced a major American deployment to Liberia and Senegal of medicine, equipment and 3,000 military personnel, global health officials said that time was running out and that they had weeks, not months, to act. They said that although the American contribution was on a scale large enough to make a difference, a coordinated assault in Africa from other Western powers was essential to bringing the virus under control.

    221 comments | 5 days ago

  • NASA's Manned Rocket Contract: $4.2 Billion To Boeing, $2.6 Billion To SpaceX

    schwit1 writes NASA has chosen two companies to ferry astronauts to and from the International Space Station, and those companies are Boeing and SpaceX. This decision confirms that SpaceX is ready to go and gives the company the opportunity to finish the job, while also giving Boeing the chance to show that it can still compete. After NASA has certified that each company has successfully built its spacecraft, SpaceX and Boeing will each fly two to six missions. The certification process will be step-by-step, similar to the methods used in the cargo contracts, and will involve five milestones. The contracts will be paid incrementally as they meet these milestones. One milestone will be a manned flight to the ISS, with one NASA astronaut on board. Boeing will receive $4.2 billion, while SpaceX will get $2.6 billion. These awards were based on what the companies proposed and requested.

    187 comments | about a week ago

  • Treasure Map: NSA, GCHQ Work On Real-Time "Google Earth" Internet Observation

    wabrandsma) writes with the latest accusations about NSA spying activity in Germany. According to top-secret documents from the NSA and the British agency GCHQ, the intelligence agencies are seeking to map the entire Internet.
    Furthermore, every single end device that is connected to the Internet somewhere in the world — every smartphone, tablet and computer — is to be made visible. Such a map doesn't just reveal one treasure. There are millions of them. The breathtaking mission is described in a Treasure Map presentation from the documents of the former intelligence service employee Edward Snowden which SPIEGEL has seen. It instructs analysts to "map the entire Internet — Any device, anywhere, all the time." Treasure Map allows for the creation of an "interactive map of the global Internet" in "near real-time," the document notes. Employees of the so-called "FiveEyes" intelligence agencies from Great Britain, Canada, Australia and New Zealand, which cooperate closely with the American agency NSA, can install and use the program on their own computers. One can imagine it as a kind of Google Earth for global data traffic, a bird's eye view of the planet's digital arteries.

    266 comments | about a week ago

  • U.S. Threatened Massive Fine To Force Yahoo To Release Data

    Advocatus Diaboli writes The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user data that the company believed was unconstitutional, according to court documents unsealed Thursday that illuminate how federal officials forced American tech companies to participate in the NSA's controversial PRISM program. The documents, roughly 1,500 pages worth, outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government's demands. The company's loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the National Security Agency extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms.

    223 comments | about two weeks ago

  • Net Neutrality Comments Surge Past 1.7M, an All-Time Record For the FCC

    An anonymous reader writes Following Wednesday's Internet Slowdown campaign, the Federal Communications Commission says it has now received a total of 1,750,435 comments on net neutrality, surpassing the approximately 1.4 million complaints it saw after the exposure of Janet Jackson's breast during Super Bowl XXXVIII in 2004. Wednesday saw citizens submit more than 700,000 new comments to the FCC, and place more than 300,000 calls to the agency.

    81 comments | about two weeks ago

  • CBC Warns Canadians of "US Law Enforcement Money Extortion Program"

    jfbilodeau writes The CBC is warning Canadians about a U.S. program where America law enforcement officers — from federal agents to state troopers right down to sheriffs in one-street backwaters — are operating a vast, co-ordinated scheme to grab as much of the public's cash as they can through seizure laws. "So, for any law-abiding Canadian thinking about an American road trip, here’s some non-official advice: Avoid long chats if you’re pulled over. Answer questions politely and concisely, then persistently ask if you are free to go. Don’t leave litter on the vehicle floor, especially energy drink cans. Don’t use air or breath fresheners; they could be interpreted as an attempt to mask the smell of drugs. Don’t be too talkative. Don’t be too quiet. Try not to wear expensive designer clothes. Don’t have tinted windows. And for heaven’s sake, don’t consent to a search if you are carrying a big roll of legitimate cash.

    462 comments | about two weeks ago

  • Cuba Calculates Cost of 54yr US Embargo At $1.1 Trillion

    First time accepted submitter ltorvalds11 writes Cuba says its economy is suffering a "systematic worsening" due to a US embargo, the consequences of which Havana places at $1.1 trillion since Washington imposed the sanctions in 1960, taking into account the depreciation of the dollar against gold. "There is not, and there has not been in the world, such a terrorizing and vile violation of human rights of an entire people than the blockade that the US government has been leading against Cuba for 55 years," Cuban Deputy Foreign Minister Abelardo Moreno told reporters. He also blamed the embargo for the difficulties in accessing internet on the island, saying that the United States creates an obstacle for companies providing broadband services in Cuba. Additionally, he said that the area is one of the "most sensitive" to the embargo, with economic losses estimated at $34.2 million. It is also the sector that has fallen "victim of all kinds of attacks" by the US, as violations of the Cuban radio or electronic space "promote destabilization" of Cuban society, the report notes. The damage to Cuban foreign trade between April 2013 and June 2014 amounted to $3.9 billion, the report said. Without the embargo, Cuba could have earned $205.8 million selling products such as rum and cigars to US consumers. Barack Obama last week signed the one-year extension of the embargo on Cuba, based on the Trading with the Enemy Act of 1917, created to restrict trade with countries hostile to the U.S..

    536 comments | about two weeks ago

  • SpaceX and Boeing Battle For US Manned Spaceflight Contracts

    An anonymous reader writes: $3 billion in funding is on the line as private space companies duke it out for contracts to end U.S. reliance on Russian rockets for manned spaceflight. The two biggest contenders are SpaceX and Boeing, described as "the exciting choice" and "the safe choice," respectively. "NASA is charting a new direction 45 years after sending humans to the Moon, looking to private industry for missions near Earth, such as commuting to and from the space station. Commercial operators would develop space tourism while the space agency focuses on distant trips to Mars or asteroids." It's possible the contracts would be split, giving some tasks to each company. It's also possible that the much smaller Sierra Nevada Corp. could grab a bit of government funding as well for launches using its unique winged-shuttle design.

    123 comments | about two weeks ago

  • Home Depot Confirms Breach of Its Payment Systems

    itwbennett writes: Home Depot confirmed Monday that its payment systems had been breached, potentially affecting any customers who shopped at its stores in the U.S. and Canada since April. There's no evidence yet that debit card PINs had been compromised, the company said, though it is still figuring out the scope and scale of the attacks. Home Depot is offering a free year of identity protection services for anyone who used a payment card in one of their stores since the beginning of April.

    111 comments | about two weeks ago

  • L.A. Times National Security Reporter Cleared Stories With CIA Before Publishing

    New submitter Prune (557140) writes with a link to a story at The Intercept which might influence the way you look at media coverage of the kind of government activity that deserves rigorous press scrutiny. According to the story, "Email exchanges between CIA public affairs officers and Ken Dilanian, now an Associated Press intelligence reporter who previously covered the CIA for the Times, show that Dilanian enjoyed a closely collaborative relationship with the agency, explicitly promising positive news coverage and sometimes sending the press office entire story drafts for review prior to publication. In at least one instance, the CIA’s reaction appears to have led to significant changes in the story that was eventually published in the Times." Another telling excerpt: On Friday April 27, 2012, he emailed the press office a draft story that he and a colleague, David Cloud, were preparing. The subject line was “this is where we are headed,” and he asked if “you guys want to push back on any of this.” It appears the agency did push back. On May 2, 2012, he emailed the CIA a new opening to the story with a subject line that asked, “does this look better?” The piece ran on May 16, and while it bore similarities to the earlier versions, it had been significantly softened.

    188 comments | about two weeks ago

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>