×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Peoria Mayor Sends Police To Track Down Twitter Parodist

timothy posted 13 hours ago | from the how-is-this-playing-in-peoria? dept.

104

New submitter rotorbudd (1242864) writes with an article at Reason about Jim Ardis, mayor of Peoria, Illinois, who ordered police to track down whoever was responsible for a parody Twitter account mocking him."Guess the good Mayor has never heard of the Streisand Effect. 'The original Twitter account had a total of 50 followers. The new account has over 200.'"

How Nest and FitBit Might Spy On You For Cash

Soulskill posted yesterday | from the don't-let-them-take-your-analog-shoelaces dept.

78

Nerval's Lobster writes: "Forbes offers up a comforting little story about how Nest and FitBit are planning on turning user data in a multi-billion-dollar business. 'Smart-thermostat maker Nest Labs (which is being acquired by Google for $3.2 billion) has quietly built a side business managing the energy consumption of a slice of its customers on behalf of electric companies,' reads the article. 'In wearables, health tracker Fitbit is selling companies the tracking bracelets and analytics services to better manage their health care budgets, and its rival Jawbone may be preparing to do the same.' As many a wit has said over the years: If you're not paying, you're the product. But if Forbes is right, wearable-electronics companies may have discovered a sweeter deal: paying customers on one side, and companies paying for those customers' data on the other. Will most consumers actually care, though?"

VA Supreme Court: Michael Mann Needn't Turn Over All His Email

Soulskill posted yesterday | from the what-did-you-have-for-lunch-when-you-wrote-those-papers dept.

247

RoccamOccam sends news that the Virginia Supreme Court has ruled that Michael Mann, a climate scientist notable for his work on the "hockey stick" graph, does not have to turn over the entirety of his papers and emails under Freedom of Information laws. Roughly 1,000 documents were turned over in response to the request, but another 12,000 remain, which lawyers for the University of Virginia say are "of a proprietary nature," and thus entitled to an exemption. The VA Supreme Court ruled (PDF), "the higher education research exemption's desired effect is to avoid competitive harm not limited to financial matters," and said the application of "proprietary" was correct in this case. Mann said he hopes the ruling "can serve as a precedent in other states confronting this same assault on public universities and their faculty."

New Facebook Phone App Lets You Stalk Your Friends

samzenpus posted yesterday | from the I-won't-be-ignored dept.

60

Hugh Pickens DOT Com (2995471) writes "Iain Thomson reports that Facebook is adding a new application called 'Nearby Friends' that alerts smartphone users when their friends are nearby. 'If you turn on Nearby Friends, you'll occasionally be notified when friends are nearby, so you can get in touch with them and meet up,' says Facebook in a statement. 'For example, when you're headed to the movies, Nearby Friends will let you know if friends are nearby so you can see the movie together or meet up afterward.' The feature, which is opt-in, allows users to select which friends get a warning that you are in the area, and prepare a subset of people who might like to know when you're near, if they have the Nearby Friends activated as well. According to Josh Constine what makes 'Nearby Friends' different than competitors and could give it an advantage is that it's centered around broadcasting proximity, not location. 'If someone's close, you'll know, and can ping them about their precise location and meeting up. Broadcasting location is creepy so we're less likely to share it, and can cause awkward drop-ins where someone tries to come see you when you didn't want them to.'"

Criminals Using Drones To Find Cannabis Farms and Steal Crops

samzenpus posted yesterday | from the red-eye-in-the-sky dept.

241

schwit1 (797399) writes "There has been a huge surge in the number of hidden cannabis farms across Halesowen, Cradley Heath and Oldbury, towns on the outskirts of rural Shropshire some seven miles from central Birmingham. They require hydroponic lights for the marijuana plants to grow – and the huge amounts of excess heat given off make them easily spottable for a would-be criminal with a drone carrying infrared cameras. One such man says that after finding a property with a cannabis farm he and his crew either burgle or 'tax' the victim."

Oracle Deflects Blame For Troubled Oregon Health Care Site

samzenpus posted yesterday | from the who's-to-blame dept.

154

itwbennett (1594911) writes "Oracle is gearing up for a fight with officials in Oregon over its role developing an expensive health insurance exchange website that still isn't fully operational. In a letter obtained by the Oregonian newspaper this week, Oracle co-president Safra Catz said that Oregon officials have provided the public with a 'false narrative' concerning who is to blame for Cover Oregon's woes. In the letter, Catz pointed out that Oregon's decision to act as their own systems integrator on the project, using Oracle consultants on a time-and-materials basis, was 'criticized frequently by many'. And as far as Oracle is concerned, 'Cover Oregon lacked the skills, knowledge or ability to be successful as the systems integrator on an undertaking of this scope and complexity,' she added."

In Mississippi, Gov't Text Messages Are Officially Public Records

timothy posted yesterday | from the scum-floats-for-a-reason dept.

33

New submitter Chris Elkins (3620071) writes "Text messages [by public officials about government business] are now officially considered public records. An investigative reporter fought for access to what he believed were public records. He took his fight to the state and won. Mississippi open government and transparency advocates view this unanimous commission opinion as precedent-setting for all government bodies and public officials in the state."

Click Like? You May Have Given Up the Right To Sue

timothy posted 2 days ago | from the sue-you-sue-anybody dept.

211

sandbagger (654585) writes "The New York Times reports that General Mills, the maker of cereals like Cheerios and Chex as well as brands like Bisquick and Betty Crocker, has quietly added language to its website to alert consumers that they give up their right to sue the company if they download coupons, or 'join' it in social media communities. Who'd have imagined that clicking like requires a EULA?"

Tor Blacklisting Exit Nodes Vulnerable To Heartbleed

timothy posted 2 days ago | from the all-tor-up dept.

56

msm1267 (2804139) writes "The Tor Project has published a list of 380 exit relays vulnerable to the Heartbleed OpenSSL vulnerability that it will reject. This comes on the heels of news that researcher Collin Mulliner of Northeastern University in Boston found more than 1,000 nodes vulnerable to Heartbleed where he was able to retrieve plaintext user traffic. Mulliner said he used a random list of 5,000 Tor nodes from the Dan.me.uk website for his research; of the 1,045 vulnerable nodes he discovered, he recovered plaintext traffic that included Tor plaintext announcements, but a significant number of nodes leaked user traffic in the clear."

RCMP Arrest Canadian Teen For Heartbleed Exploit

timothy posted 2 days ago | from the they-got-their-man dept.

103

According to PC Mag, a "19-year-old Canadian was arrested on Tuesday for his alleged role in the breach of the Canada Revenue Agency (CRA) website, the first known arrest for exploiting the Heartbleed bug. Stephen Arthuro Solis-Reyes (pictured) of London, Ontario faces one count of Unauthorized Use of Computer and one count of Mischief in Relation to Data." That exploit led to a deadline extension for some Canadian taxpayers in getting in their returns this year. The Register has the story as well. The Montreal Gazette has some pointed questions about how much the Canadian tax authorities knew about the breach, and when.

5-Year Suspended Sentence For S. Africa's First Online Pirate

timothy posted 2 days ago | from the comparative-justice dept.

44

An anonymous reader writes "South Africa's first prosecution for online piracy was concluded this morning, with a five-year, wholly suspended sentence handed down to a filesharer who uploaded local movie Four Corners to The Pirate Bay. The man — who lost his job recently — said he's relieved by the verdict, which was the result of a plea bargain. Director Ian Gabriel, who made the film, recently said he was 'philosophical' about piracy."

Bidding At FCC TV Spectrum Auction May Be Restricted For Large Carriers

samzenpus posted 2 days ago | from the helping-the-little-guy dept.

91

An anonymous reader writes "Rumors have surfaced that the Federal Communications Commission (FCC) will restrict bidding at their TV spectrum auction in 2015 to effectively favor smaller carriers. Specifically, when 'auction bidding hits an as-of-yet unknown threshold in a given market, the FCC would set aside up to 30MHz of spectrum in that market. Companies that hold at least one-third of the low-band spectrum in that market then wouldn't be allowed to bid on the 30MHz of spectrum that has been set aside.' Therefore, 'in all band plans less than 70MHz, restricted bidders—specifically AT&T and Verizon (and in a small number of markets, potentially US Cellular or CSpire)—would be limited to bidding for only three blocks.' The rumors may be true since AT&T on Wednesday threatened to not participate in the auction at all as a protest against what it sees as unfair treatment."

Vintage 1960s Era Film Shows IRS Defending Its Use of Computers

samzenpus posted 2 days ago | from the how-I-learned-to-stop-worrying-and-love-the-cd-rom dept.

146

coondoggie (973519) writes "It's impossible to imagine the Internal Revenue Service or most other number-crunching agencies or companies working without computers. But when the IRS went to computers — the Automatic Data Processing system --there was an uproar. The agency went so far as to produce a short film on the topic called Right On The Button, to convince the public computers were a good thing."

FBI Drone Deployment Timeline

samzenpus posted 2 days ago | from the when-and-where dept.

33

An anonymous reader writes "The FBI insists that it uses drone technology to conduct surveillance in 'very limited circumstances.' What those particular circumstances are remain a mystery, particularly since the Bureau refuses to identify instances where agents deployed unmanned aerial vehicles, even as far back as 2006. In a letter to Senator Ron Paul last July, the FBI indicated that it had used drones a total of ten times since late 2006—eight criminal cases and two national security cases—and had authorized drone deployments in three additional cases, but did not actually fly them. The sole specific case where the FBI is willing to confirm using a drone was in February 2013, as surveillance support for a child kidnapping case in Alabama. New documents obtained by MuckRock as part of the Drone Census flesh out the timeline of FBI drone deployments in detail that was previously unavailable. While heavily redacted—censors deemed even basic facts that were already public about the Alabama case to be too sensitive for release, apparently—these flight orders, after action reviews and mission reports contain new details of FBI drone flights."

Lavabit Loses Contempt Appeal

Unknown Lamer posted 2 days ago | from the don't-leave-your-lawyer-at-home dept.

128

After being forced to turn over encryption keys (being held in contempt of court for several weeks after initially refusing to comply), secure mail provider Lavabit halted all operations last year. With the assistance of the EFF, an appeal was mounted. Today, the appeals court affirmed the district court decision and rejected the appeal. From Techdirt: "The ruling does a decent job explaining the history of the case, which also details some of the (many, many) procedural mistakes that Lavabit made along the way, which made it a lot less likely it would succeed here. ... The procedural oddities effectively preclude the court even bothering with the much bigger and important question of whether or not a basic pen register demand requires a company to give up its private keys. The hail mary attempt in the case was to argue that because the underlying issues are of 'immense public concern' (and they are) that the court should ignore the procedural mistakes. The court flatly rejects that notion: 'exhuming forfeited arguments when they involve matters of “public concern” would present practical difficulties. For one thing, identifying cases of a “public concern” and “non-public concern” –- divorced from any other consideration –- is a tricky task governed by no objective standards..... For another thing, if an issue is of public concern, that concern is likely more reason to avoid deciding it from a less-than-fully litigated record....'"

All Packages Needed For FreedomBox Now In Debian

Unknown Lamer posted 2 days ago | from the i-think-you-mean-gnu-slash-freedom dept.

53

Eben Moglen's FreedomBox concept (personal servers for everyone to enable private communication) is getting closer to being an easy-to-install reality: all packages needed for FreedomBox are now in Debian's unstable branch, and should be migrating to testing in a week or two. Quoting Petter Reinholdtsen: "Today, the last of the packages currently used by the project to created the system images were accepted into Debian Unstable. It was the freedombox-setup package, which is used to configure the images during build and on the first boot. Now all one need to get going is the build code from the freedom-maker git repository and packages from Debian. And once the freedombox-setup package enter testing, we can build everything directly from Debian. :) Some key packages used by Freedombox are freedombox-setup, plinth, pagekite, tor, privoxy, owncloud, and dnsmasq. There are plans to integrate more packages into the setup. User documentation is maintained on the Debian wiki." You can create your own image with only three commands, at least if you have a DreamPlug or Raspberry Pi (you could also help port it to other platforms).

Bill Gates Patents Detecting, Responding To "Glassholes"

Unknown Lamer posted 2 days ago | from the fighting-back-against-the-thousand-eyes dept.

140

theodp (442580) writes "As Google Glass goes on sale [ed: or rather, went on sale] to the general public, GeekWire reports that Bill Gates has already snagged one patent for 'detecting and responding to an intruding camera' and has another in the works. The invention proposes to equip computer and device displays with technology for detecting and responding to any cameras in the vicinity by editing or blurring the content on the screen, or alerting the user to the presence of the camera. Gates and Nathan Myhrvold are among the 16 co-inventors of the so-called Unauthorized Viewer Detection System and Method, which the patent application notes is useful 'while a user is taking public transportation, where intruding cameras are likely to be present.' So, is Bill's patent muse none other than NYC subway rider Sergey Brin?" A more cynical interpretation: closing the analog hole. Vaguely related, mpicpp pointed out that Google filed a patent for cameras embedded in contact lenses.

Student Records Kids Who Bully Him, Then Gets Threatened With Wiretapping Charge

Soulskill posted 3 days ago | from the it-takes-real-effort-to-be-this-wrong dept.

789

An anonymous reader tips news of an incident in a Pennsylvania high school in which a student, Christian Stanfield, was being bullied on a regular basis. He used a tablet to make an audio recording of the bullies for the purpose of showing his mother how bad it was. She was shocked, and she called school officials to tell them what was going on. The officials brought in a police lieutenant — but not to deal with the bullies. Instead, the officer interrogated Stanfield and made him delete the recording. The officer then threatened to charge him with felony wiretapping. The charges were later reduced to disorderly conduct, and Stanfield was forced to testify before a magistrate, who found him guilty. Stanfield's mother said, "Christian's willingness to advocate in a non-violent manner should be championed as a turning point. If Mr. Milburn and the South Fayette school district really want to do the right thing, they would recognized that their zero-tolerance policies and overemphasis on academics and athletics have practically eliminated social and emotional functioning from school culture."

Update: 04/17 04:36 GMT by T : The attention this case has gotten may have something to do with the later-announced decision by the Allegheny County District Attorney's office to withdraw the charges against Stanfield.

52 Million Photos In FBI's Face Recognition Database By Next Year

Soulskill posted 3 days ago | from the you-can-trust-us dept.

108

Advocatus Diaboli writes "The EFF has been investigating the FBI's Next-Generation Identification (NGI) scheme, an enormous database of biometric information. It's based on the agency's fingerprint database, which already has 100 million records. But according to the documents EFF dug up, the NGI database will include 52 million images of people's faces by 2015. At least 4.3 million images will have been taken outside any sort of criminal context. 'Currently, if you apply for any type of job that requires fingerprinting or a background check, your prints are sent to and stored by the FBI in its civil print database. However, the FBI has never before collected a photograph along with those prints. This is changing with NGI. Now an employer could require you to provide a 'mug shot' photo along with your fingerprints. If that's the case, then the FBI will store both your face print and your fingerprints along with your biographic data.'"

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account

Loading...