Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 15 declined, 12 accepted (27 total, 44.44% accepted)

Privacy

Submission + - House Gives Telcos Immunity, Extends Wiretap Laws (iht.com) 1

mrogers writes: "Wired's Threat Level blog and the International Herald Tribune are reporting that a bill granting immunity to telcos accused of facilitating illegal warrantless wiretaps, and extending the government's powers to conduct surveillance without judicial oversight, has passed the House of Representatives by 293 votes to 129. Only one Republican voted against the bill; Democrats were evenly split. The warrantless wiretapping program was first revealed by AT&T whistleblower Mark Klein."
Privacy

Submission + - Administration Claims Immunity to 4th Amendment (eff.org)

mrogers writes: "The EFF has uncovered a troubling footnote in a newly declassified Bush Administration memo, which asserts that "our Office recently [in 2001] concluded that the Fourth Amendment had no application to domestic military operations." This could mean that the Administration believes the NSA's warrantless wiretapping and data mining programs are not governed by the Constitution, which would cast Administration claims that the programs did not violate the Fourth Amendment in a whole new light — after all, you can't violate a law that doesn't apply. The claimed immunity would also cover other DoD agencies, such as CIFA, which carry out offline surveillance of political groups within the United States."
Government

Submission + - UK Police Want DNA of 'Potential Offenders' (guardian.co.uk)

mrogers writes: "British police want to collect DNA 'samples from children as young as five who "exhibit behaviour indicating they may become criminals in later life'. This line of thinking will be familiar to fans of Philip K. Dick. A spokesman for the Association of Chief Police Officers argued that since some schools already take pupils' fingerprints, the collection and permanent storage of DNA samples was the logical next step. And of course, if anyone argues that branding naughty five-year-olds as lifelong criminals will stigmatize them, the proposed solution will be to take samples from all children..."
Censorship

Submission + - Internet Censorship's First Death Sentence?

mrogers writes: A journalism student in Afghanistan has been sentenced to death by a Sharia court for downloading and sharing a report criticizing the treatment of women in some Islamic countries. The student was accused of blasphemy and tried without representation. According to Reporters Without Borders, sixty people are currently in jail worldwide for criticizing governments online, fifty of them in China, but this may be the first time someone has been sentenced to death for using the internet. Internet censorship is on the rise worldwide, according to The OpenNet Initiative. The Independent newspaper has organized a petition calling for the student's sentence to be overturned.
Privacy

Submission + - Lip Reading Surveillance Cameras "To Stop Terr

mrogers writes: Infowars brings us the following news from the UK, which is fast becoming the front line of the war on privacy:

"Read my lips...." used to be a figurative saying. Now the British government is considering taking it literally by adding lip reading technology to some of the four million or so surveillance cameras in order identify terrorists and criminals by watching what everyone says.
Perhaps the lip-reading cameras and the shouting cameras will find something to talk about.
Privacy

Submission + - German TOR Servers Seized

mrogers writes: Servers participating in the TOR anonymizing network have been seized by public prosecutors during a child porn crackdown in Germany. TOR provides anonymity for clients and servers by redirecting traffic through a network of volunteer-operated relays; the German prosecutors may have been trying to locate an anonymous server by examining the logs of the captured relays.
Encryption

Submission + - SHA-1 Collisions for Meaningful Messages

mrogers writes: Following on the heels of last year's collision search attack against SHA-1, researchers at the Crypto 2006 conference have announced a new attack that allows the attacker to choose part of the colliding messages. "Using the new method, it is possible, for example, to produce two HTML documents with a long nonsense part after the closing </html> tag, which, despite slight differences in the HTML part, thanks to the adapted appendage have the same hash value." A similar attack against MD5 was announced last year.

Slashdot Top Deals

Speed of a tortoise breaking the sound barrier = 1 Machturtle

Working...