×
Government

Maine Senator Wants Independent Study of TSA's Body Scanners 335

OverTheGeicoE writes "U.S. Senator Susan Collins, the top Republican on the homeland security committee, plans to introduce a bill that would require a new health study of the X-ray body scanners used to screen airline passengers nationwide. If the bill becomes law, TSA would be required to choose an 'independent laboratory' to measure the radiation emitted by a scanner currently in use at an airport checkpoint and use the data to produce a peer-reviewed study, to be submitted to Congress, based on its findings. The study would also evaluate the safety mechanisms on the machine and determine 'whether there are any biological signs of cellular damage caused by the scans.' Many Slashdotters are or have been involved in science. Is this a credible experimental protocol? Is it reasonable to expect an organization accused of jeopardizing the health and safety of hundreds of millions of air travelers to pick a truly unbiased lab? Would any lab chosen deliver a critical report and risk future funding? Should the public trust a study of radiology and human health designed by a US Senator whose highest degree is a bachelor's degree in government?"
Censorship

Thai Gov't Welcomes Twitter's Censorship Plans 113

patiwat writes "The Thai government has called Twitter's tweet censorship move a 'welcome development.' Tweets may now be blocked at the request of the Thai government; the system will be used to discourage and punish lese majeste (criticism of the Thai King). The government previously declared that Facebook users worldwide 'liking' a lese majeste Facebook link would also be prosecuted; over 10,000 Facebook pages have been removed and hundreds of individuals, including children and academics, have been jailed. Calls to reform the lese majeste laws have been fiercely criticized by no less than the Army Commander, whose backing is critical to the government's stability."
Businesses

Some Critics Suggest Apple Boycott Over Chinese Working Conditions 744

Hugh Pickens writes "The Guardian reports that Apple's image is taking a dive after revelations in the NY Times about working conditions in the factories of some of its network of Chinese suppliers and the dreaded word 'boycott' has started to appear in media coverage of Apple's activities. 'Should consumers boycott Apple?' asked a column in the Los Angeles Times as it recounted details of the bad PR fallout amid detailed allegations that workers at Foxconn suffered in conditions that resembled a modern version of bonded labor, working obscenely long shifts in unhealthy conditions with few of the labor rights that workers in the west would take for granted." Read on, below.
Transportation

Video Interactive Games and Concept Cars (Video) 17

So far, Timothy Lord has showed you the Tesla Model S, a CODA electric car, both gas and electric Smarts, and the Chevy Segway. Now, in his final wrap-up video from the North American International Auto Show, he looks at some concept car models he doesn't think will ever make it to production, along with some interactive games some of the car makers used to draw attention to their products.
Crime

SEC Takes Action Against Latvian Hacker 57

wiredmikey writes "The SEC has filed charges against a trader in Latvia for conducting a widespread online account intrusion scheme in which he manipulated the prices of more than 100 NYSE and Nasdaq securities by making unauthorized purchases or sales from hijacked brokerage accounts. The SEC also went after four online trading firms and eight executives who are said to have helped the hacker make more than $850,000 in ill-gotten funds. The SEC's actions occurred on the same day that the Financial Industry Regulatory Authority (FINRA) issued an investor alert and a regulatory notice about an increase in financially motivated attacks targeting email."
Handhelds

Rockbox Developers Talk Open Source Firmware 179

angry tapir writes "I recently caught up with some of the key developers of Rockbox: An open source firmware replacement for the stock firmware shipped on MP3 players. The project, which has been active for over a decade, currently supports products from more than half a dozen manufacturers, including Apple, Arhcos, iRiver and Toshiba. It involves extensive reverse engineering to figure out how the devices' stock firmwares operate, as well as the challenge of developing for greatly varied targets. You can read the interview here (or the full Q&As with the project's founder and some of the developers involved in it)."
Crime

Hijacked Web Traffic For Sale 68

mask.of.sanity writes "If you can't create valuable content to attract users to your site, Russian cyber criminals will sell them to you. A web store has been discovered that sells hacked traffic that has been redirected from legitimate sites. Sellers inject hidden iframes into popular web sites and redirect the traffic to a nominated domain. Buyers purchase the traffic from the store to direct to their sites and the sellers get paid."
Businesses

Anger With Game Content Lock Spurs Reaction From Studio Head Curt Shilling 908

MojoKid writes "Studios and publishers are fighting back hard against the used game market, with the upcoming title Kingdoms of Amular the latest to declare it will use a content lock. In this case, KoA ups the ante by locking out part of the game that's normally available in single-player mode. Gamers exploded, with many angry that game content that had shipped on the physical disc was locked away and missing, as well as being angry at the fact that content was withheld from used game players. One forum thread asking if the studio fought back against allowing EA to lock the content went on for 49 pages before Curt Shilling, the head of 38 Studios, took to the forums himself. His commentary on the situation is blunt and to the point. 'This is not 38 trying to take more of your money, or EA in this case, this is us rewarding people for helping us! If you disagree due to methodology, ok, but that is our intent... companies are still trying to figure out how to receive dollars spent on games they make, when they are bought. Is that wrong? if so please tell me how.'"
Wireless Networking

Ask Slashdot: Wireless Proximity Detection? 101

New submitter Cinnamon Whirl writes "As a chemist, I work in a both lab and office enviroments, and need access to data in both, without causing undue clutter in either. My company has recently purchased two Win7 tablets for trial usage with electronic lab notebooks, propietry software, SAP, email etc. These are also useful for sharing in meetings, etc. As part of this project, I have been wondering whether we can use these tablets to detect other devices by proximity. Examples could include finding the nearest printer or monitor or, perhaps trickier, could two roaming devices find each other? Although lab technology is rarely cutting edge, I can see a day when all our sensors and probes will broadcast data (wireless thermocouples are already available), and positioning information will become much more important. What technologies exist to do this? How accurate can the detection be?"
Education

UCLA Professor Says Conventional Wisdom on Study Habits Is All Washed Up 329

An anonymous reader writes "Taking notes during class? Topic-focused study? A consistent learning environment? According to Robert Bjork, director of the UCLA Learning and Forgetting Lab, distinguished professor of psychology, and massively renowned expert on packing things in your brain in a way that keeps them from leaking out, all are three are exactly opposite the best strategies for learning."
Cellphones

Defending Your Cellphone Against Malware 157

Hugh Pickens writes "Kate Murphy writes that as cellphones have gotten smarter, they have become less like phones and more like computers, and that with more than a million phones worldwide already hacked, technology experts expect breached, infiltrated or otherwise compromised cellphones to be the scourge of 2012. Cellphones are often loaded with even more personal information than PCs, so an undefended or carelessly operated phone can result in a breathtaking invasion of individual privacy as well as the potential for data corruption and outright theft. But there are a few common sense ways to protect yourself: Avoid free, unofficial versions of popular apps that often have malware hidden in the code, avoid using Wi-Fi in a Starbucks or airport which leaves you open to hackers, and be wary of apps that want permission to make phone calls, connect to the Internet or reveal your identity and location."
Advertising

Romney Invokes Fair Use In Dispute With NBC Over Campaign Ad 242

An anonymous reader writes "Mitt Romney's campaign is airing an ad that is basically 30 seconds lifted from an NBC News broadcast and NBC is trying to stop them from using the ad. I found it interesting that the Romney campaign is invoking fair use to defend the ad. Romney adviser Eric Fehrnstrom said 'we believe it falls within fair use. We didn't take the entire broadcast; we just took the first 30 seconds.'"
EU

Thousands Take To the Streets To Protest ACTA 217

An anonymous reader writes "The protests against the Anti-Counterfeiting Trade Agreement continue to spread in cities across Europe. The protests began in Poland, where thousands have taken to the streets and opposition politicians have worn Guy Fawkes masks in protest against the country signing the agreement last week. The scenes from Poland and France are remarkable, demonstrating the widespread anger over the decision to join ACTA. A full rundown of protest plans can be found here."
Power

DARPA Targets Computing's Achilles Heel: Power 100

coondoggie writes "The power required to increase computing performance, especially in embedded or sensor systems has become a serious constraint and is restricting the potential of future systems. Technologists from the Defense Advanced Research Projects Agency are looking for an ambitious answer to the problem and will next month detail a new program it expects will develop power technologies that could bolster system power output from today's 1 GFLOPS/watt to 75 GFLOPS/watt."

Slashdot Top Deals