Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Facebook

Facebook To DEA: Stop Using Phony Profiles To Nab Criminals 239

HughPickens.com writes: CNNMoney reports that Facebook has sent a letter to the U.S. Drug Enforcement Administration demanding that agents stop impersonating users on the social network. "The DEA's deceptive actions... threaten the integrity of our community," Facebook chief security officer Joe Sullivan wrote to DEA head Michele Leonhart. "Using Facebook to impersonate others abuses that trust and makes people feel less safe and secure when using our service." Facebook's letter comes on the heels of reports that the DEA impersonated a young woman on Facebook to communicate with suspected criminals, and the Department of Justice argued that they had the right to do so. Facebook contends that their terms and Community Standards — which the DEA agent had to acknowledge and agree to when registering for a Facebook account — expressly prohibit the creation and use of fake accounts. "Isn't this the definition of identity theft?" says privacy researcher Runa Sandvik. The DEA has declined to comment and referred all questions to the Justice Department, which has not returned CNNMoney's calls.
The Internet

Why the Trolls Will Always Win 728

maynard writes: Kathy Sierra spent a tech career developing videogames and teaching Java programming in Sun Microsystems masterclasses. Up until 2007, she'd been a well regarded tech specialist who happened to be female. Until the day she opined on her private blog that given the crap-flood of bad comments, maybe forum moderation wasn't a bad idea. This opinion made her a target. A sustained trolling and harassment campaign followed, comprised of death and rape threats, threats against her family, fabricated claims of prostitution, and a false claim that she had issued a DMCA takedown to stifle criticism. All of this culminated in the public release of her private address and Social Security Number, a technique known as Doxxing. And so she fled from the public, her career, and even her home.

It turned out that a man named Andrew Auernheimer was responsible for having harassed Sierra. Known as 'Weev', he admitted it in a 2008 New York Times story on Internet Trolls. There, he spoke to the lengths which he and his cohorts went to discredit and destroy the woman. "Over a candlelit dinner of tuna sashimi, Weev asked if I would attribute his comments to Memphis Two, the handle he used to troll Kathy Sierra, a blogger. Inspired by her touchy response to online commenters, Weev said he "dropped docs" on Sierra, posting a fabricated narrative of her career alongside her real Social Security number and address. This was part of a larger trolling campaign against Sierra, one that culminated in death threats."

Now, seven years later, Kathy Sierra has returned to explain why she left and what recent spates of online harassment against women portend for the future if decent people don't organize. The situation has grown much more serious since she went into hiding all those years ago. It's more than just the threat of Doxxing to incite physical violence by random crazies with a screw loose.
Read on for the rest of maynard's thoughts.
United States

US Says It Can Hack Foreign Servers Without Warrants 335

Advocatus Diaboli tips news that the U.S. government is now arguing it doesn't need warrants to hack servers hosted on foreign soil. At issue is the current court case against Silk Road operator Ross Ulbricht. We recently discussed how the FBI's account of how they obtained evidence from Silk Road servers didn't seem to mesh with reality. Now, government lawyers have responded in a new court filing (PDF). They say that even if the FBI had to hack those servers without a warrant, it doesn't matter, because the Fourth Amendment does not confer protection to servers hosted outside the U.S. They said, "Given that the SR Server was hosting a blatantly criminal website, it would have been reasonable for the FBI to 'hack' into it in order to search it, as any such 'hack' would simply have constituted a search of foreign property known to contain criminal evidence, for which a warrant was not necessary."

Comment Re:waiving my consultancy fee today (Score 1) 124

First translate the algorithm into Perl, and then run it on a Perl interpreter written in BrainFuck, of which the BrainFuck interpreter is written in APL, which runs on a machine language written for a drum-based OS from the early 1960's.

You shouldn't knock Visual BASIC like that...

Electronic Frontier Foundation

Hundreds of Police Agencies Distributing Spyware and Keylogger 72

realized sends this news from the EFF: For years, local law enforcement agencies around the country have told parents that installing ComputerCOP software is the "first step" in protecting their children online. ... As official as it looks,ComputerCOP is actually just spyware, generally bought in bulk from a New York company that appears to do nothing but market this software to local government agencies. The way ComputerCOP works is neither safe nor secure. It isn't particularly effective either, except for generating positive PR for the law enforcement agencies distributing it.

As security software goes, we observed a product with a keystroke-capturing function, also called a "keylogger," that could place a family's personal information at extreme risk by transmitting what a user types over the Internet to third-party servers without encryption. EFF conducted a security review of ComputerCOP while also following the paper trail of public records to see how widely the software has spread. Based on ComputerCOP's own marketing information, we identified approximately 245 agencies in more than 35 states, plus the U.S. Marshals, that have used public funds (often the proceeds from property seized during criminal investigations) to purchase and distribute ComputerCOP. One sheriff's department even bought a copy for every family in its county.
Graphics

Euclideon Teases Photorealistic Voxel-Based Game Engine 134

MojoKid writes Not many would argue that current console and PC graphics technologies still haven't reached a level of "photo-realism." However, a company by the name of Euclideon is claiming to be preparing to deliver that holy grail based on laser scanning and voxel engine-based technologies. The company has put together a six-minute video clip of its new engine, and its genuinely impressive. There's a supposed-to-be-impressive unveil around the two minute mark where the announcer declares he's showing us computer-generated graphics rather than a digital photo — something you'll probably have figured out long before that point. Euclideon's proprietary design purportedly uses a laser scanner to create a point cloud model of a real-world area. That area can then be translated into a voxel renderer and drawn by a standard GPU. Supposedly this can be done so efficiently and with such speed that there's no need for conventional load screens or enormous amounts of texture memory but rather by simply streaming data off conventional hard drives. Previously, critiques have pointed to animation as one area where the company's technique might struggle. Given the ongoing lack of a demonstrated solution for animation, it's fair to assume this would-be game-changer has some challenges still to solve. That said, some of the renderings are impressive.

Comment Wrong Channel (Score 1) 200

Knowing what both the NSA and Snowden claim to have known during the discourse, why would Snowden use such an insecure channel of communication as email to voice objections? Other countries' government agents would likely have taken notice if he'd used something as insecure even as "internal" email.

Slashdot Top Deals

To thine own self be true. (If not that, at least make some money.)

Working...