Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Facebook

Submission + - Assange: Facebook Has A CIA Interface (youtube.com) 2

hydrofix writes: In an interview with Russia Today's Laura Emmett Jullian Assange hinted that the CIA has a backdoor interface to Facebook, calling the site 'the most appalling spying machine ever invented.'

"Here we have the world's most comprehensive database about people: their relationships, their names, their addresses, their locations, their communications, their relatives – all sitting within the United States, all accessible to US intelligence."

"Facebook, Google, Yahoo all these major US organizations have built-in interfaces for US intelligence. It's not a matter of serving a subpoena, they have an interface they have developed for US intelligence to use.

Programming

Submission + - Why The New Guy Can't Code 4

theodp writes: 'We've all lived the nightmare,' writes Jon Evans. 'A new developer shows up at work, and you try to be welcoming, but he can't seem to get up to speed; the questions he asks reveal basic ignorance; and his work, when it finally emerges, is so kludgey that it ultimately must be rewritten from scratch by more competent people.' Evans takes a stab at explaining why the new guy can't code when his interviewers and HR swear that they only hire above-average/A-level/top-1% people. Evans fingers the technical interview as the culprit, saying the skills required to pass today's industry-standard software interview are not those required to be a good software developer. Instead, Evans suggests: 'Don't interview anyone who hasn't accomplished anything. Ever. Certificates and degrees are not accomplishments; I mean real-world projects with real-world users. There is no excuse for software developers who don't have a site, app, or service they can point to and say, 'I did this, all by myself!' in a world where Google App Engine and Amazon Web Services have free service tiers, and it costs all of $25 to register as an Android developer and publish an app on the Android Market.'
Iphone

Submission + - Apple Lied: Filed Patent for Mobile Device Trackin (infosecisland.com)

Nyder writes: Apple filed for a patent in September of 2009 titled "Location Histories for Location Aware Devices" with the intent to develop services based around the company's ability to locate and track mobile devices running the iOS operating system.

The abstract of the patent reads as follows:

"A location aware mobile device can include a baseband processor for communicating with one or more communication networks, such as a cellular network or WiFi network. In some implementations, the baseband processor can collect network information (e.g., transmitter IDs) over time. Upon request by a user or application, the network information can be translated to estimated position coordinates (e.g., latitude, longitude, altitude) of the location aware device for display on a map view or for other purposes. A user or application can query the location history database with a timestamp or other query to retrieve all or part of the location history for display in a map view."

The patent text goes on to outline how the tracking data could be accessed by applications, indicating Apple intends to build salable services around the collected data and allow third parties the ability to access it:

"A user or application can query the location history database with a timestamp or other query to retrieve all or part of the location history for display in a map view. In some implementations, the size and "freshness" of the location history database can be managed by eliminating duplicate entries in the database and/or removing older entries. The location history can be used to construct a travel timeline for the location aware device. The travel timeline can be displayed in a map view or used by location aware applications running on the location aware device or on a network. In some implementations, an Application Programming Interface (API) can be used by an application to query the location history database."

The patent application then goes on to describe how the location tracking data can include transmitter identifiers that correlate the data to a specific phone — which means a specific user — and how the data can be transmitted to network servers for processing:

"In some implementations, the network information can include transmitter identifiers (IDs). For example, Cell IDs can be tracked and recorded. The Cell IDs can be mapped to corresponding cell tower locations which can be used to provide estimated position coordinates of the location aware device. When a location history is requested by a user or application (e.g., through an API), the transmitter IDs can be translated to position coordinates of the location aware device which can be reverse geocoded to map locations for display on a map view or for other purposes. In other implementations, the network information can include WiFi scan data (e.g., access point IDs) which can be used to determine position coordinates of the location aware device, which can be reverse geocoded for display on a map view. In some implementations, the network information can be sent to a network server, which can translate the network information into position coordinates, which can be returned to the location aware device for processing by a location aware application."

Revelations of the patent application now confirm suspicions that Apple was quite aware of the storage of geolocation tracking data, that it was not merely a database of Wi-Fi locations, and the building of location histories on their customers was not due to a software glitch.

Social Networks

Submission + - The HB Gary email that should concern us all (dailykos.com) 1

bstender writes: "According to an embedded MS Word document found in one of the HB Gary emails, it [speaks of] creating an army of sockpuppets, with sophisticated "persona management" software that allows a small team of only a few people to appear to be many, while keeping the personas from accidentally cross-contaminating each other. Then, to top it off, the team can actually automate some functions so one persona can appear to be an entire Brooks Brothers riot online.

Persona management entails not just the deconfliction of persona artifacts such as names, email addresses, landing pages, and associated content. It also requires providing the human actors technology that takes the decision process out of the loop when using a specific persona. For this purpose we custom developed either virtual machines or thumb drives for each persona. This allowed the human actor to open a virtual machine or thumb drive with an associated persona and have all the appropriate email accounts, associations, web pages, social media accounts, etc. pre-established and configured with visual cues to remind the actor which persona he/she is using so as not to accidentally cross-contaminate personas during use.
And all of this is for the purposes of infiltration, data mining, and (here's the one that really worries me) ganging up on bloggers, commenters and otherwise "real" people to smear enemies and distort the truth."

Lord of the Rings

Submission + - LOTR Rewritten from Perspective of Mordor

Hugh Pickens writes writes: "It's been said that history is written by the winners but Laura Miller writes in Salon about a counterexample as she reviews a new version of "Lord of the Rings" published to acclaim in Russia by Kirill Yeskov, a professional paleontologist whose job is reconstructing long-extinct organisms and their way of life from fossil remnants. Yeskov performs essentially the same feat in "The Last Ring-bearer," reconstructing the real world of Tolkien's Arda from "The Lord of the Rings" set during and after the end of the War of the Ring and told from the perspective of the losers. In Yeskov's retelling, available in translation as a free download, the wizard Gandalf is a war-monger intent on crushing the scientific and technological initiative of Mordor and its southern allies because science "destroys the harmony of the world and dries up the souls of men" and Aragorn is depicted by Yeskov as a ruthless Machiavellian schemer who is ultimately the puppet of his wife, the elf Arwen. Sauron's citadel Barad-dur is, by contrast, described as "that amazing city of alchemists and poets, mechanics and astronomers, philosophers and physicians, the heart of the only civilization in Middle-earth to bet on rational knowledge and bravely pitch its barely adolescent technology against ancient magic." According to Miller "in Yeskov's scenario, "The Lord of the Rings" is a highly romanticized and mythologized version of the fall of Mordor, perhaps even outright propaganda; "The Last Ringbearer" is supposed to be the more complicated and less sentimental true story.""
Hardware Hacking

Submission + - Arduino: A Quick-Start Guide 1

Muad writes: BOX DATA Title: Arduino: A Quick_Start Guide Author: Maik Schmidt Pages: 263 Rating: 8/10 Reviewer: Federico Lucifredi ISBN: 9781934356661 Amazon: http://www.amazon.com/Arduino-Quick-Start-Pragmatic-Programmers/dp/1934356662/ref=sr_1_1?ie=UTF8&s=books&qid=1297643169&sr=8-1 END BOX DATA

Maik Schmidt, Arduino: A Quick-Start Guide — The Pragmatic Bookshelf, $35

Maik Schmidt is our guide in the Pragmatic Bookshelf's venture into the world of electronics. This is a compact work, like all others in the series, it goes straight to applicable examples and makes you get your hands dirty with real work. The Arduino platform has been described in many ways, but the best I have heard so far insightfully labels it "The 555 of the future," referring to the ubiquitous timer chip so many simple electronic projects make use of. If you haven't been hiding under a rock for the past few years, you have doubtlessly seen the plethora of material on the subject that's out there: even O'Reilly, which usually does not ship multiple titles on a single subject, has a variety of them. Most of these works are rather similar, the ones I prefer are Massimo Banzi's Getting Started with Arduino (O'Reilly, 2008), by one of the original developers of the platform, and the strongly related Getting started with Processing by Casey Reas and Ben Fry. These are brief books in the 100-page range, not exhaustive works, but covering the core philosophy and basic operation of the tools is sometimes the best way to jump into a new subject.

There is a lot of material on the subject, even the current issue of Make magazine has a very good roundup (and not for the first time, if I may add). So, how does Maik's work stand out in the fray? Right after a brief introduction to ease you into the Arduino environment, the book turns to interesting projects, more sophisticated than the usual fare (read: not the usual LED-blinking using pulse-width modulation that every tutorial out there walks you through). Examples of this include connecting with a Wii Nunchuk, motion sensing, networking, infrared remote control interfaces, and more. These projects are the high-note of the book, and span almost two-thirds of its length — and are significantly better than most other project material currently in print.

This is a hands-on book, theory is kept to a minimum, as you don't really need previous experience to tackle an Arduino: the platform was specifically designed to cater to artists and designers, it is meant to be approachable by users who are not EE wizards. That said, if what you are after is learning the underpinnings of low-level electronics or hardcore embedded systems programming, this book is not for you: pick up a copy of Horowitz and Hill's The Art of Electronics (possibly including the student manual), and check back with us in a year or so for the digital followup recommendation. But if you have less time on your hands, and you just want to network-enable a coffeepot or build some interactive art display, the introduction to Arduino Maik delivers is quite sufficient for your aims, and it spans material other authors have been remiss to include, like developing libraries and (Appendix C) use of serial line protocols.

Zooming in on the details, perhaps the comment can be made that it would be good if there was a single kit available including all components used in the text: perhaps Makershed or Adafruit Industries will supplement their existing kits with one comprising the full range of the author's selection. On the plus side, I must highlight the extensive illustrations, which visually represent the breadboard linkage between the Arduino and the sensor or actuator being used with extreme clarity, and are much more effective in teaching neophytes than more traditional circuit designs. Where these are not actual pictures, they were generated using the alpha release of Fritzing, a very interesting piece of software (see fritzing.org) aiming at facilitating circuit design for those of us without a background in electronics.

The landscape of Arduino publications is shifting faster than many other subjects in print, and doubtlessly Maik's status as "king of the Hill" is but temporary — however, among those books on the subject I have personally surveyed, I am pleased to say that he currently holds the championship cup.

Federico Lucifredi is the maintainer of man (1) and a Product Manager for the SUSE Linux Enterprise and openSUSE distributions.
Idle

Submission + - Dead People Scientists Keep Messing With (discovermagazine.com)

An anonymous reader writes: Some historical figures are just too interesting to leave alone, even when they're supposed to be moldering in the grave. That's why medical researchers dug up Tycho Brahe, bombarded Napoleon's hair with neutrons in a nuclear reactor, and did everything they could think of to King Tut. Discover Magazine has 8 stories of delayed diagnoses and extreme postmortems.

Submission + - House Fails to Extend Patriot Act Spy Powers (wired.com)

schwit1 writes: The House failed to extend three key expiring provisions of the Patriot Act on Tuesday, elements granting the government broad and nearly unchecked surveillance power on its own public.

  The “roving wiretap” provision allows the FBI to obtain wiretaps from a secret intelligence court, known as the FISA court, without identifying the target or what method of communication is to be tapped.

  The “lone wolf” measure allows FISA court warrants for the electronic monitoring of a person for whatever reason — even without showing that the suspect is an agent of a foreign power or a terrorist. The government has said it has never invoked that provision, but the Obama administration said it wanted to retain the authority to do so.

  The “business records” provision allows FISA court warrants for any type of record, from banking to library to medical, without the government having to declare that the information sought is connected to a terrorism or espionage investigation.

The failure of the bill, sponsored by Rep. James F. Sensenbrenner Jr. (R-Wis), for the time being is likely to give airtime to competing measures in the Senate that would place limited checks on the act's broad surveillance powers. The White House, meanwhile, said it wanted the expiring measures extended through 2013.

Debian

Submission + - Debian 6.0 Released (debian.org)

Tubal-Cain writes: The Debian Project has announced the release of version 6.0 (codenamed "Squeeze") of their popular operating system. This version, the first first since they adopted a release schedule a year and a half ago, features KDE 4.4.5, Gnome 2.30, X.org 2.7, and the Linux 2.6.32 kernel. They are also introducing a port to a FreeBSD kernel on x86 and x86_64 platforms. Accompanying this new version is an updated layout for their websites, bringing a bit of consitency between their home page, wiki, package search, etc.

Comment Re:technically iran is not dictatorship (Score 1) 280

I would say it's closer to an oligarchy/theocracy, with a sham government to placate the people.
  • Only candidates approved by non elected officials can stand.
  • The same officials can veto any law.
  • The same officials can veto election results.

Yes, technically they have elections, but that isn't enough to make it a democracy.

Government

Submission + - Church of Scientology violates Federal Law (rapidshare.com) 5

FreedomToThink writes: "This is a very long story I'm sure the editors will have fun with, but I couldn't see how to cut it down at all.

On the eve of the Ides of March protest, from the source of the recent 'Anonymous' submitted CCHR leak on wikileaks, comes this message

"Dear $cientology,You attempt injunctions.I respond.Shall we continue the game? Much Love, DEEP CLAM"

Included was yet another PDF this time including yet more emails leaked from a Church of Scientology front group.

Vote Rigging?

From: "Mike Kaplan" <mkaplan@tampabay.rr.com>
To: <Undisclosed-Recipient:;>
Subject: Fw: RE-ELECT FRANK HIBBARD, MAYOR OF CLEARWATER
Date: Sun, 6 Jan 2008 11:53:07 -0400

See below. Everyone in Clearwater MUST vote. Every vote will be needed to be
sure Hibbard gets re-elected. The alternative is Rita Garvey who is an SP.

— Original Message —
From: Shelly <mailto:shelly.bauer@Earthlink.net> Bauer
To: Shelly Bauer <mailto:shelly.bauer@earthlink.net>
Sent: Sunday, January 06, 2008 8:09 AM
Subject: RE-ELECT FRANK HIBBARD, MAYOR OF CLEARWATER

DO YOUR PART
RE-ELECT FRANK HIBBARD
MAYOR OF CLEARWATER
VOTE!!!
JANUARY 29TH
TAKE NOTHING FOR GRANTED!

Lunch with your preferred Presidential candidates for a high price?

ONE SEAT LEFT

I have arranged a private one-hour luncheon with Ron Paul on 11/28 in St.
Pete when he will be in town for the CNN/YouTube Republican debate.

This luncheon is reserved for $1000+ donors to Ron Paul's presidential
campaign. 19 people so far have paid and confirmed and will have the honor
and pleasure of having lunch and communicating with Ron Paul directly.


From the head of the "Non Proffit" CCHR Bruce Wiseman

Go the the HELP committee website. The link is here.
http://help.senate.gov/About.html
Here you will see the names of the Committee members on the left hand
side
of the page. Please go to the individual websites of the Republican =
members
(this will take just a bit of leg work on your part by putting their =
name
into Google) and calling their office or sending a fax to them (email is =
the
least effective) stating your opposition to S. 1375 The Mother's Act.


Currently, the law prohibits political campaign activity by charities and churches by defining a 501(c)(3) organization as one "which does not participate in, or intervene in (including the publishing or distributing of statements), any political campaign on behalf of (or in opposition to) any candidate for public office."

An OCMB (Operation Clambake Message Board)regular adds :

I downloaded myself a copy and started looking through them. I found an interesting one on pages 47-48.
http://rapidshare.com/files/99292051/CCHRLeak3.pdf.html

Karin Pouw of OSA of CofS writes a message.
It's forwarded by Michael Genung. He's the guy who runs ACSR, Association for Citizens Sociel Reform. http://www.citizensforsocialreform.org/ ["CSR Background and Philosopy: CSR was founded in 2001 by a group of Scientologists and other like-minded individuals concerned with the escalating social ills in society. CSR's purpose is to work with in the field of public policy to bring about more effective and humane solutions to these social ills of illiteracy, criminality substance abuse and general decay of character."]

Then it's forwarded by Doyle Mills, of LEAF fame (Letters to the Editor Attack Force).
Then it's forwarded by Mary C. (possibly one of two Mary C's I'm thinking of, but unsure).
Then it's forwarded by Mike Kaplan, another person who runs an email list and forwards CCHR type stuff to CofS members.

If that ain't stringing a line from the CofS to CCHR and the CofS front group ("grassroots") movements, then I don't know what is!


Apologies in advance as the Enturbulation servers will not be up to a slashdotting so the Coral Cache link is here Enturbulation Discussion (already cached for you)

ANYONE CAN REPORT TAX FRAUD DIRECTLY TO THE IRS : http://www.irs.gov/compliance/enforcement/article/0,,id=106778,00.html It does require that you print out and mail in an actual hardcopy, but it does not require you to identify yourself.

Just a casual user passing on a message from the Enturbulation forum, this is already out there, there's no reason to attack the messenger."

Censorship

Submission + - Conservapedia

Petra_von_Kant writes: "According to the Sydney Morning Herald via The Guardian News & Media, conservatives have set up a "christian and US-centric" version of Wikipedia. One of the complaints from the founders of the Conservapedia, was that "...... many Wikipedia articles often use British spelling instead of American English ....".

Bizarre ......."
Music

Submission + - Copyright Royalty Board Terminates Internet Radio

An anonymous reader writes: News of the new Copyright Royalty Board (CRB) rates retroactive to January 1st 2006 have leaked out today. The new rates amount to well over the total revenues of all internet radio stations. If the new rates are allowed to stand, every United States based webcaster will immediately owe more in back licensing fees to SoundExchange than the combined total of all revenues they have ever received. More details are on Kurt Hanson's website here: http://www.kurthanson.com/archive/news/030207/inde x.shtml

Slashdot Top Deals

You must realize that the computer has it in for you. The irrefutable proof of this is that the computer always does what you tell it to do.

Working...