Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Electronic Frontier Foundation

DOJ Often Used Cell Tower Impersonating Devices Without Explicit Warrants 146

Via the EFF comes news that, during a case involving the use of a Stingray device, the DOJ revealed that it was standard practice to use the devices without explicitly requesting permission in warrants. "When Rigmaiden filed a motion to suppress the Stingray evidence as a warrantless search in violation of the Fourth Amendment, the government responded that this order was a search warrant that authorized the government to use the Stingray. Together with the ACLU of Northern California and the ACLU, we filed an amicus brief in support of Rigmaiden, noting that this 'order' wasn't a search warrant because it was directed towards Verizon, made no mention of an IMSI catcher or Stingray and didn't authorize the government — rather than Verizon — to do anything. Plus to the extent it captured loads of information from other people not suspected of criminal activity it was a 'general warrant,' the precise evil the Fourth Amendment was designed to prevent. ... The emails make clear that U.S. Attorneys in the Northern California were using Stingrays but not informing magistrates of what exactly they were doing. And once the judges got wind of what was actually going on, they were none too pleased:"
Programming

Submission + - Programming as Art: 13 of the best code demos ever (iheartchaos.com) 1

cranberryzero writes: "The demo scene has been around for 20-some years now and it's grown and leaps and bounds since then. From programmers pushing the limits of Ataris and Amigas to creating beautiful and haunting landscapes with full lighting, mapping and motion capture, demo groups have done it all and done it under 100k. And here's 13 of the best of recent years... Flash video links included, but most of the fun is downloading them and giving your processor something fun to chew on."
Sci-Fi

Journal Journal: Who was Asimov's Ghostwriter? 10

I started reading Isaac Asimov's science fiction stories as a kid. Later, I also started reading his fact books, which were mostly interesting.

Feed Science Daily: New Technique Quickly Detects Cancer (sciencedaily.com)

Researchers have developed a new way to detect protein movements inside cells, which signal a variety of cellular changes such as those in cancer cell development. The method could help diagnose cancer in the future. By combining two distinct techniques, the technology can examine large numbers of cells individually, a feat not previously possible.


Feed Science Daily: New Alzheimer's Treatment Completes First Phase Of Testing (sciencedaily.com)

A molecule designed by a Purdue University researcher to stop the debilitating symptoms of Alzheimer's disease has been shown in its first phase of clinical trials to be safe and to reduce biomarkers for the disease. CoMentis, the pharmaceutical company developing the drug, announced completion of its Phase 1 study of a treatment based on the molecule. Results from the study indicate that the treatment is safe and well tolerated.


Feed Science Daily: Move Over US -- China To Be New Driver Of World's Economy And Innovation (sciencedaily.com)

A new study of worldwide technological competitiveness suggests China may soon rival the United States as the principal driver of the world's economy -- a position the US has held since the end of World War II. If that happens, it will mark the first time in nearly a century that two nations have competed for leadership as equals.


Feed Science Daily: Cells Use Velcro-like Mechanism To Keep Viruses From Spreading (sciencedaily.com)

Like mobsters, cells keep their friends close and their enemies -- at least some of them -- closer. According to new results from HIV researchers, one way that human cells prevent certain viruses from raging out of control is by blocking new viral particles from ever leaving an infected cell's surface. And, they believe, HIV thrives in part because it has evolved the ability to get around this obstacle. Viruses can only reproduce using the mechanisms and material of their hosts. Some of them -- the so-called "enveloped" viruses, which are encapsulated inside a lipid membrane -- assemble at the host cell's outer membrane and then bud off during their release.


Businesses

CEO Questionably Used Pseudonym to Post Online 187

jpallas writes "The Wall Street Journal reports that court filings by the FTC about Whole Foods' plan to acquire Wild Oats reveal an unusual detail: The CEO of Whole Foods regularly posted to a Yahoo! stock bulletin board under a pseudonym. His alter ego was feisty, to say the least, and regularly disparaged the company that he later decided to acquire. A former SEC chairman called the behavior 'bizarre and ill-advised, even if it isn't illegal.' This certainly raises questions about online rights to free speech and anonymity, especially when the line between free speech and regulated speech depends on who is speaking as much as what they are saying."
Music

Net Radio Wins Partial Reprieve 96

Joren writes "Just a few hours after our last discussion on this topic, Wired News is reporting that Internet radio broadcasters have won a temporary reprieve from the new rates. Apparently the details are still being worked out. 'A coalition of webcasters have worked out a deal with the recording industry that could temporarily stave off a portion of crippling net radio royalties set to take effect Sunday, according to people familiar with the negotiations ... For now, the parties involved in what's described as ongoing negotiations have agreed to waive at least temporarily the minimum charge of $6,000 per channel required under a scheme created by the Copyright Royalty Board, or CRB. The deal, brokered late Thursday, is not final and could change. One person involved in the talks described the situation as a reprieve, and said that internet radio won't be saved until a workable royalty rate is set.'"
Security

UCLA Hacked, 800,000 Identities Exposed 148

An anonymous reader writes "The Washington Post reports that a central campus database at UCLA containing the personal information (including SSNs) of about 800,000 UCLA affiliates has been compromised for possibly over a year. The data may have been available to hackers since October 2005 until November 21, 2006, when the breach was finally detected and blocked. Several other UC campuses have also been involved in significant data security incidents over the past few years." From the article: "'To my knowledge, it's absolutely one of the largest,' Rodney Petersen, security task force coordinator for Educause, a nonprofit higher education association, told the Los Angeles Times. Petersen said that in a Educause survey release in October, about a quarter of 400 colleges said that over the previous 12 months, they had experienced a security incident in which confidential information was compromised, the newspaper reported."

Every Vista Computer Gets Its Own Domain Name 388

c_forq writes, "According to APC magazine, every new Windows Vista computer will be given its own domain name to access files remotely. There is a catch though: to use it one must be using IPv6. Is the push for Vista also going to be the push finally to switch everything from IPv4 to IPv6?" Microsoft, meanwhile, is trying to convince businesses to adopt both Vista and Office 2007 at once. An analyst is quoted: 'In all likelihood, enterprises will tie deployment of both Vista and Office 2007 with a hardware upgrade cycle.' His reasoning is that it will be easier for companies to handle one disruption to IT systems than two. Or three.

Slashdot Top Deals

The computer is to the information industry roughly what the central power station is to the electrical industry. -- Peter Drucker

Working...