×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Criminals Using Drones To Find Cannabis Farms and Steal Crops

samzenpus posted 3 hours ago | from the red-eye-in-the-sky dept.

61

schwit1 (797399) writes "There has been a huge surge in the number of hidden cannabis farms across Halesowen, Cradley Heath and Oldbury, towns on the outskirts of rural Shropshire some seven miles from central Birmingham. They require hydroponic lights for the marijuana plants to grow – and the huge amounts of excess heat given off make them easily spottable for a would-be criminal with a drone carrying infrared cameras. One such man says that after finding a property with a cannabis farm he and his crew either burgle or 'tax' the victim."

Oracle Deflects Blame For Troubled Oregon Health Care Site

samzenpus posted 6 hours ago | from the who's-to-blame dept.

73

itwbennett (1594911) writes "Oracle is gearing up for a fight with officials in Oregon over its role developing an expensive health insurance exchange website that still isn't fully operational. In a letter obtained by the Oregonian newspaper this week, Oracle co-president Safra Catz said that Oregon officials have provided the public with a 'false narrative' concerning who is to blame for Cover Oregon's woes. In the letter, Catz pointed out that Oregon's decision to act as their own systems integrator on the project, using Oracle consultants on a time-and-materials basis, was 'criticized frequently by many'. And as far as Oracle is concerned, 'Cover Oregon lacked the skills, knowledge or ability to be successful as the systems integrator on an undertaking of this scope and complexity,' she added."

In Mississippi, Gov't Text Messages Are Officially Public Records

timothy posted 9 hours ago | from the scum-floats-for-a-reason dept.

30

New submitter Chris Elkins (3620071) writes "Text messages [by public officials about government business] are now officially considered public records. An investigative reporter fought for access to what he believed were public records. He took his fight to the state and won. Mississippi open government and transparency advocates view this unanimous commission opinion as precedent-setting for all government bodies and public officials in the state."

Click Like? You May Have Given Up the Right To Sue

timothy posted 10 hours ago | from the sue-you-sue-anybody dept.

166

sandbagger (654585) writes "The New York Times reports that General Mills, the maker of cereals like Cheerios and Chex as well as brands like Bisquick and Betty Crocker, has quietly added language to its website to alert consumers that they give up their right to sue the company if they download coupons, or 'join' it in social media communities. Who'd have imagined that clicking like requires a EULA?"

Tor Blacklisting Exit Nodes Vulnerable To Heartbleed

timothy posted yesterday | from the all-tor-up dept.

46

msm1267 (2804139) writes "The Tor Project has published a list of 380 exit relays vulnerable to the Heartbleed OpenSSL vulnerability that it will reject. This comes on the heels of news that researcher Collin Mulliner of Northeastern University in Boston found more than 1,000 nodes vulnerable to Heartbleed where he was able to retrieve plaintext user traffic. Mulliner said he used a random list of 5,000 Tor nodes from the Dan.me.uk website for his research; of the 1,045 vulnerable nodes he discovered, he recovered plaintext traffic that included Tor plaintext announcements, but a significant number of nodes leaked user traffic in the clear."

RCMP Arrest Canadian Teen For Heartbleed Exploit

timothy posted yesterday | from the they-got-their-man dept.

98

According to PC Mag, a "19-year-old Canadian was arrested on Tuesday for his alleged role in the breach of the Canada Revenue Agency (CRA) website, the first known arrest for exploiting the Heartbleed bug. Stephen Arthuro Solis-Reyes (pictured) of London, Ontario faces one count of Unauthorized Use of Computer and one count of Mischief in Relation to Data." That exploit led to a deadline extension for some Canadian taxpayers in getting in their returns this year. The Register has the story as well. The Montreal Gazette has some pointed questions about how much the Canadian tax authorities knew about the breach, and when.

5-Year Suspended Sentence For S. Africa's First Online Pirate

timothy posted yesterday | from the comparative-justice dept.

44

An anonymous reader writes "South Africa's first prosecution for online piracy was concluded this morning, with a five-year, wholly suspended sentence handed down to a filesharer who uploaded local movie Four Corners to The Pirate Bay. The man — who lost his job recently — said he's relieved by the verdict, which was the result of a plea bargain. Director Ian Gabriel, who made the film, recently said he was 'philosophical' about piracy."

Bidding At FCC TV Spectrum Auction May Be Restricted For Large Carriers

samzenpus posted yesterday | from the helping-the-little-guy dept.

86

An anonymous reader writes "Rumors have surfaced that the Federal Communications Commission (FCC) will restrict bidding at their TV spectrum auction in 2015 to effectively favor smaller carriers. Specifically, when 'auction bidding hits an as-of-yet unknown threshold in a given market, the FCC would set aside up to 30MHz of spectrum in that market. Companies that hold at least one-third of the low-band spectrum in that market then wouldn't be allowed to bid on the 30MHz of spectrum that has been set aside.' Therefore, 'in all band plans less than 70MHz, restricted bidders—specifically AT&T and Verizon (and in a small number of markets, potentially US Cellular or CSpire)—would be limited to bidding for only three blocks.' The rumors may be true since AT&T on Wednesday threatened to not participate in the auction at all as a protest against what it sees as unfair treatment."

Vintage 1960s Era Film Shows IRS Defending Its Use of Computers

samzenpus posted yesterday | from the how-I-learned-to-stop-worrying-and-love-the-cd-rom dept.

144

coondoggie (973519) writes "It's impossible to imagine the Internal Revenue Service or most other number-crunching agencies or companies working without computers. But when the IRS went to computers — the Automatic Data Processing system --there was an uproar. The agency went so far as to produce a short film on the topic called Right On The Button, to convince the public computers were a good thing."

FBI Drone Deployment Timeline

samzenpus posted yesterday | from the when-and-where dept.

33

An anonymous reader writes "The FBI insists that it uses drone technology to conduct surveillance in 'very limited circumstances.' What those particular circumstances are remain a mystery, particularly since the Bureau refuses to identify instances where agents deployed unmanned aerial vehicles, even as far back as 2006. In a letter to Senator Ron Paul last July, the FBI indicated that it had used drones a total of ten times since late 2006—eight criminal cases and two national security cases—and had authorized drone deployments in three additional cases, but did not actually fly them. The sole specific case where the FBI is willing to confirm using a drone was in February 2013, as surveillance support for a child kidnapping case in Alabama. New documents obtained by MuckRock as part of the Drone Census flesh out the timeline of FBI drone deployments in detail that was previously unavailable. While heavily redacted—censors deemed even basic facts that were already public about the Alabama case to be too sensitive for release, apparently—these flight orders, after action reviews and mission reports contain new details of FBI drone flights."

Lavabit Loses Contempt Appeal

Unknown Lamer posted 2 days ago | from the don't-leave-your-lawyer-at-home dept.

125

After being forced to turn over encryption keys (being held in contempt of court for several weeks after initially refusing to comply), secure mail provider Lavabit halted all operations last year. With the assistance of the EFF, an appeal was mounted. Today, the appeals court affirmed the district court decision and rejected the appeal. From Techdirt: "The ruling does a decent job explaining the history of the case, which also details some of the (many, many) procedural mistakes that Lavabit made along the way, which made it a lot less likely it would succeed here. ... The procedural oddities effectively preclude the court even bothering with the much bigger and important question of whether or not a basic pen register demand requires a company to give up its private keys. The hail mary attempt in the case was to argue that because the underlying issues are of 'immense public concern' (and they are) that the court should ignore the procedural mistakes. The court flatly rejects that notion: 'exhuming forfeited arguments when they involve matters of “public concern” would present practical difficulties. For one thing, identifying cases of a “public concern” and “non-public concern” –- divorced from any other consideration –- is a tricky task governed by no objective standards..... For another thing, if an issue is of public concern, that concern is likely more reason to avoid deciding it from a less-than-fully litigated record....'"

All Packages Needed For FreedomBox Now In Debian

Unknown Lamer posted 2 days ago | from the i-think-you-mean-gnu-slash-freedom dept.

52

Eben Moglen's FreedomBox concept (personal servers for everyone to enable private communication) is getting closer to being an easy-to-install reality: all packages needed for FreedomBox are now in Debian's unstable branch, and should be migrating to testing in a week or two. Quoting Petter Reinholdtsen: "Today, the last of the packages currently used by the project to created the system images were accepted into Debian Unstable. It was the freedombox-setup package, which is used to configure the images during build and on the first boot. Now all one need to get going is the build code from the freedom-maker git repository and packages from Debian. And once the freedombox-setup package enter testing, we can build everything directly from Debian. :) Some key packages used by Freedombox are freedombox-setup, plinth, pagekite, tor, privoxy, owncloud, and dnsmasq. There are plans to integrate more packages into the setup. User documentation is maintained on the Debian wiki." You can create your own image with only three commands, at least if you have a DreamPlug or Raspberry Pi (you could also help port it to other platforms).

Bill Gates Patents Detecting, Responding To "Glassholes"

Unknown Lamer posted 2 days ago | from the fighting-back-against-the-thousand-eyes dept.

140

theodp (442580) writes "As Google Glass goes on sale [ed: or rather, went on sale] to the general public, GeekWire reports that Bill Gates has already snagged one patent for 'detecting and responding to an intruding camera' and has another in the works. The invention proposes to equip computer and device displays with technology for detecting and responding to any cameras in the vicinity by editing or blurring the content on the screen, or alerting the user to the presence of the camera. Gates and Nathan Myhrvold are among the 16 co-inventors of the so-called Unauthorized Viewer Detection System and Method, which the patent application notes is useful 'while a user is taking public transportation, where intruding cameras are likely to be present.' So, is Bill's patent muse none other than NYC subway rider Sergey Brin?" A more cynical interpretation: closing the analog hole. Vaguely related, mpicpp pointed out that Google filed a patent for cameras embedded in contact lenses.

Student Records Kids Who Bully Him, Then Gets Threatened With Wiretapping Charge

Soulskill posted 2 days ago | from the it-takes-real-effort-to-be-this-wrong dept.

777

An anonymous reader tips news of an incident in a Pennsylvania high school in which a student, Christian Stanfield, was being bullied on a regular basis. He used a tablet to make an audio recording of the bullies for the purpose of showing his mother how bad it was. She was shocked, and she called school officials to tell them what was going on. The officials brought in a police lieutenant — but not to deal with the bullies. Instead, the officer interrogated Stanfield and made him delete the recording. The officer then threatened to charge him with felony wiretapping. The charges were later reduced to disorderly conduct, and Stanfield was forced to testify before a magistrate, who found him guilty. Stanfield's mother said, "Christian's willingness to advocate in a non-violent manner should be championed as a turning point. If Mr. Milburn and the South Fayette school district really want to do the right thing, they would recognized that their zero-tolerance policies and overemphasis on academics and athletics have practically eliminated social and emotional functioning from school culture."

Update: 04/17 04:36 GMT by T : The attention this case has gotten may have something to do with the later-announced decision by the Allegheny County District Attorney's office to withdraw the charges against Stanfield.

52 Million Photos In FBI's Face Recognition Database By Next Year

Soulskill posted 2 days ago | from the you-can-trust-us dept.

108

Advocatus Diaboli writes "The EFF has been investigating the FBI's Next-Generation Identification (NGI) scheme, an enormous database of biometric information. It's based on the agency's fingerprint database, which already has 100 million records. But according to the documents EFF dug up, the NGI database will include 52 million images of people's faces by 2015. At least 4.3 million images will have been taken outside any sort of criminal context. 'Currently, if you apply for any type of job that requires fingerprinting or a background check, your prints are sent to and stored by the FBI in its civil print database. However, the FBI has never before collected a photograph along with those prints. This is changing with NGI. Now an employer could require you to provide a 'mug shot' photo along with your fingerprints. If that's the case, then the FBI will store both your face print and your fingerprints along with your biographic data.'"

Snowden Used the Linux Distro Designed For Internet Anonymity

Soulskill posted 2 days ago | from the NSA-can't-make-heads-or-something-of-it dept.

167

Hugh Pickens DOT Com writes: "When Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. Now Klint Finley reports that Snowden also used The Amnesic Incognito Live System (Tails) to keep his communications out of the NSA's prying eyes. Tails is a kind of computer-in-a-box using a version of the Linux operating system optimized for anonymity that you install on a DVD or USB drive, boot your computer from and you're pretty close to anonymous on the internet. 'Snowden, Greenwald and their collaborator, documentary film maker Laura Poitras, used it because, by design, Tails doesn't store any data locally,' writes Finley. 'This makes it virtually immune to malicious software, and prevents someone from performing effective forensics on the computer after the fact. That protects both the journalists, and often more importantly, their sources.'

The developers of Tails are, appropriately, anonymous. They're protecting their identities, in part, to help protect the code from government interference. 'The NSA has been pressuring free software projects and developers in various ways,' the group says. But since we don't know who wrote Tails, how do we know it isn't some government plot designed to snare activists or criminals? A couple of ways, actually. One of the Snowden leaks show the NSA complaining about Tails in a Power Point Slide; if it's bad for the NSA, it's safe to say it's good for privacy. And all of the Tails code is open source, so it can be inspected by anyone worried about foul play. 'With Tails,' say the distro developers, 'we provide a tongue and a pen protected by state-of-the-art cryptography to guarantee basic human rights and allow journalists worldwide to work and communicate freely and without fear of reprisal.'"

Intuit, Maker of Turbotax, Lobbies Against Simplified Tax Filings

timothy posted 2 days ago | from the rent-seeking-right-on-the-surface dept.

415

McGruber (1417641) writes "Return-free filing might allow tens of millions of Americans to file their taxes for free and in minutes. Under proposals authored by several federal lawmakers, it would be voluntary, using information the government already receives from banks and employers and that taxpayers could adjust. The concept has been endorsed by Presidents Obama and Reagan and is already a reality in some parts of Europe. Sounds great, except to Intuit, maker of Turbotax: last year, Intuit spent more than $2.6 million on lobbying, some of it to lobby on four bills related to the issue, federal lobbying records show."

Netflix Gets What It Pays For: Comcast Streaming Speeds Skyrocket

timothy posted 2 days ago | from the everyone-should-get-the-same-amount-of-water-and-electricty dept.

319

jfruh (300774) writes "Back in February, after a lengthy dispute, Netflix agreed to pay Comcast for network access after being dogged by complaints of slow speeds from Comcast subscribers. Two months later, it appears that Comcast has delivered on its promises, jumping up six places in Netflix's ISP speed rankings. The question of whether this is good news for anyone but Comcast is still open."

Slashdot Asks: How Do You Pay Your Taxes?

timothy posted 2 days ago | from the what-you're-billed-and-what-you-owe-aren't-identical dept.

383

April 15, 2014 isn't just a full moon: it's Tax Day in the U.S. That means most American adults have already submitted a tax return, or an extension request, to the IRS and -- except for a few lucky states -- to their state governments as well. I filed my (very simple) tax return online. After scanning the free options, since I live in a state -- Texas -- that does not collect personal income tax, I chose Tax Act's free services. That meant enduring a series of annoying upgrade plugs throughout the process, but I could live with that; I have no reason to think it was better or worse than TurboTax or any of the other e-Filing companies, but I liked Tax Act’s interface, and it seemed less skeevy in all those upgrade plugs than the others I glanced at. The actual process took an hour and 19 minutes once I sat down with the papers I needed. My financial life is pretty simple, though: I didn't buy or sell a house, didn't buy or sell stocks outside of a retirement account mutual fund, and didn't move from one state to another. How do you do your taxes? Do you have an argument for one or another of the online services, or any cautionary tales? Do you prefer to send in forms on paper? Do you hire an accountant? (And for readers outside the U.S., it's always interesting to hear how taxes work in other countries, too. Are there elements of the U.S. system you'd prefer, or that you're glad you don't need to deal with?)

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account

Loading...