Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Privacy

Superbowl Means Time For Spy Cams, Hazmat Squads and Bomb-Sniffing Dogs 75

Toe, The writes "The New York Police Department has quietly installed about 200 temporary surveillance cameras in midtown Manhattan to help spot trouble along 'Super Bowl Boulevard,' a 13-block street fair on Broadway that's expected to draw large crowds during the windup to the game. The temporary cameras for the Super Bowl festivities will supplement a system of thousands of permanent cameras covering midtown and Wall Street that the NYPD monitors from a command center in lower Manhattan. The department has pioneered analytical software that allows it to program the cameras to detect suspicious activity, such as a bag or other objects left in one place for a long time. Hazmat and bomb squads will be on standby. Others officers will patrol with bomb-sniffing dogs. Still more will watch from rooftops and from police helicopters. At a recent security briefing at the stadium, police chiefs and other officials said success will be measured in part by how well authorities conceal all the concern over potential threats." Now it's a proven tradition: Superbowl crowds are a good place to test people-watching gear.
AMD

Open Source AMD Driver Now Supports OpenGL 3.3 — and It's Getting Faster 100

An anonymous reader writes "With the latest open source Linux code published today the AMD RadeonSI Gallium3D driver supports OpenGL 3.3 and GLSL 1.50; this is the open source Linux graphics driver used for Radeon HD 7000 series and newer, including the new Hawaii GPUs. The OpenGL 3.3 support appeared in patches spread across Mesa and LLVM that should appear in their next releases. It was also found that the RadeonSI driver is becoming a lot faster and starting to compete with Catalyst, AMD's notorious Linux binary driver."
Privacy

Senator Dianne Feinstein: NSA Metadata Program Here To Stay 510

cold fjord writes "The Hill reports, 'Senate Intelligence Committee Chairwoman Dianne Feinstein (D-Calif.) predicted Sunday that lawmakers who favored shutting down the bulk collection of telephone metadata would not be successful in their efforts as Congress weighs potential reforms to the nation's controversial intelligence programs. "I don't believe so," Feinstein said during an appearance on NBC's Meet the Press (video). "The president has very clearly said that he wants to keep the capability So I think we would agree with him. I know a dominant majority of the — everybody, virtually, except two or three, on the Senate Intelligence Committee would agree with that." ... "A lot of the privacy people, perhaps, don't understand that we still occupy the role of the Great Satan. New bombs are being devised. New terrorists are emerging, new groups, actually, a new level of viciousness," Feinstein said. "We need to be prepared. I think we need to do it in a way that respects people's privacy rights."'"
Security

Hackers Gain "Full Control" of Critical SCADA Systems 195

mask.of.sanity writes "Researchers have found holes in industrial control systems that they say grant full control of systems running energy, chemical and transportation systems. They also identified more than 150 zero day vulnerabilities of varying degrees of severity affecting the control systems and some 60,000 industrial control system devices exposed to the public internet."
Power

Record Wind Power Levels Trigger Energy Price Fall Across Europe 226

New submitter Forty Two Tenfold writes "Electricity prices across Europe dropped last month as mild temperatures, strong winds and stormy weather produced wind power records in Germany, France and the UK, according to data released by Platts. The price decline was more marked in Germany, where the average day-ahead baseload price in December fell 10% month over month to €35.71/MWh. On a daily basis, December was a month of extremes for Germany, with day-ahead base prices closing on December 10 and 11 at less than €60/MWh – the highest over-the-counter levels seen all year – only to fall to its lowest level December 24 to €0.50/MWh."
News

Cartels Are Using Firetruck-Sized Drillers To Make Drug Pipelines 323

Daniel_Stuckey writes "In the beginning, they used catapults, dune buggies, 'jalapeños,' $1 million submarines, and sophisticated drug tunnels to move drugs northward. Now, Mexican drug cartels are taking to high-end industrial drills to carve out literal drug pipelines into the U.S. It's the next big leap in the evolution of the narcos' ingenious smuggle tech. The future of borderland drug running, it turns out, is boring. Jason Kersten reports on the phenomenon in a great GQ feature that focuses on the Sinaloa Cartel, the international crime syndicate believed to be behind the first known narco pipeline in 2008: '...Mexican authorities, responding to reports of a cave-in and flooding near the [All-American] canal, discovered a tunnel unlike anything they'd ever seen. Only ten inches wide, it was essentially a pipe. The Mexican cops traced it back to a house about 600 feet from the border, where they found a tractor-like vehicle with a long barrel on its side—a horizontal directional drill, or HDD.'"
Hardware

End of Moore's Law Forcing Radical Innovation 275

dcblogs writes "The technology industry has been coasting along on steady, predictable performance gains, as laid out by Moore's law. But stability and predictability are also the ingredients of complacency and inertia. At this stage, Moore's Law may be more analogous to golden handcuffs than to innovation. With its end in sight, systems makers and governments are being challenged to come up with new materials and architectures. The European Commission has written of a need for 'radical innovation in many computing technologies.' The U.S. National Science Foundation, in a recent budget request, said technologies such as carbon nanotube digital circuits will likely be needed, or perhaps molecular-based approaches, including biologically inspired systems. The slowdown in Moore's Law has already hit high-performance computing. Marc Snir, director of the Mathematics and Computer Science Division at the Argonne National Laboratory, outlined in a series of slides the problem of going below 7nm on chips, and the lack of alternative technologies."
Twitter

Dallas PD Uses Twitter To Announce Cop Firings 118

New submitter natarnsco writes "The Dallas, Texas police chief has used an unusual weapon in his arsenal to announce firings and other disciplinary measures in the Dallas police force: Twitter. 'Dallas Police Chief David O. Brown has fired or disciplined 27 officers and employees in the last year. And every time he brings down the hammer, he announces it on Facebook and Twitter, specifying exactly who the men and women are and what they did. On Dec. 30, it was five officers and a 911 call operator.' The article goes on to say, 'Chief Brown is, as far as we know, unique among police chiefs in his use of social media. "I'm unaware of anyone else doing this," says Lt. Max Geron, who handles media relations at the Dallas Police Department. "If we weren't the first, we were one of the first." We checked out the Twitter profiles of various departments around the country as well and couldn't find a similar situation. The social media posts aren't an official policy of the DPD, but rather a "push for transparency" initiative, in Lt. Geron's words. "[It comes from] a desire to be more transparent and to get our message out to the greater community," he says.'"
Red Hat Software

Red Hat To Help Develop CentOS 186

An anonymous reader writes with news that Red Hat and the CentOS project are "joining forces" to develop the next version of CentOS. For years, CentOS has been a popular choice for users who want to use Red Hat Enterprise Linux without having to pay for it. Some of the CentOS developers are moving to Red Hat, but they won't be working on RHEL — they say the "firewall" between the two distros will remain in place. CentOS Project Chair Karanbir Singh said, 'The changes we make are going to be community inclusive, and promoted, proposed, formalised, and actioned in an open community centric manner on the centos-devel mailing list. And I highly encourage everyone to come along and participate.'
The Military

Are New Technologies Undermining the Laws of War? 317

Lasrick writes "This is a great read — from the article: 'Today, emerging military technologies — including unmanned aerial vehicles, directed-energy weapons, lethal autonomous robots, and cyber weapons — raise the prospect of upheavals in military practice so fundamental that they challenge assumptions underlying long-established international laws of war, particularly those relating to the primacy of the state and the geographic bounds of warfare. But the laws of war have been developed over a long period, with commentary and input from many cultures. What would seem appropriate in this age of extraordinary technological change, the author concludes, is a reconsideration of the laws of war in a deliberate and focused international dialogue that includes a range of cultural and institutional perspectives.'"
EU

EU Copyright Reform: Your Input Is Needed! 154

An anonymous reader writes "The European Commission has finally (as of last month) opened its public consultation on copyright reform. This is the first time the general public can influence EU copyright policy since fifteen years back, and it is likely at least as much time will pass until next time. In order to help you fill out the (English-only, legalese-heavy) questionnaire, some friendly hackers spent some time during the 30c3 to put together a site to help you. Anyone, EU citizen or not, organization or company, is invited to respond (deadline fifth of February). Pirate MEP Amelia Andersdotter has a more in-depth look at the consultation."
United States

FBI Edits Mission Statement: Removes Law Enforcement As 'Primary' Purpose 539

schwit1 writes with news that the FBI has altered their declared primary function from "law enforcement" to "national security." From the article: "Following the 9/11 attacks, the FBI picked up scores of new responsibilities related to terrorism and counterintelligence while maintaining a finite amount of resources. What's not in question is that government agencies tend to benefit in numerous ways when considered critical to national security as opposed to law enforcement. 'If you tie yourself to national security, you get funding and you get exemptions on disclosure cases,' said McClanahan. 'You get all the wonderful arguments about how if you don't get your way, buildings will blow up and the country will be less safe.'"
The Almighty Buck

The SEC Is About To Make Crowdfunding More Expensive 366

PapayaSF writes "Proposed new rules require that funding portals register with the Securities and Exchange Commission and the Financial Intermediary Regulatory Authority. In addition, investors must have access to a business plan, use of proceeds, a valuation of the company, and financials, so Certified Public Accountants may be needed. The SEC estimates that for amounts under $100,000, the fees will be 12.9% to 39% of the money raised, though it may drop to under 8% for higher amounts. Is this needed regulation, or bureaucratic overreach?"
Security

Reverse Engineering a Bank's Security Token 55

An anonymous reader writes "An engineer from Brazil has posted a technical walkthrough of how he was able to reverse engineer his bank's code-generating security token. He found a way to accurately generate his unlock codes with some custom code and an Arduino clone. (Don't worry: his method doesn't give him access to anybody else's codes.) 'Every exception thrown by this piece of code is obfuscated, as well as many of the strings used throughout the code. That is a major roadblock, since exception messages and strings in general are a great way of figuring out what the code is doing when reverse engineering something. Luckily, their developers decided to actually show useful text when a problem occurs and an exception gets thrown, so they wrapped those obfuscated strings with a.a, presumably a decryption routine that returns the original text. That routine is not too straightforward, but it is possible to get a high level understanding of what it is doing.'"

Slashdot Top Deals

"Take that, you hostile sons-of-bitches!" -- James Coburn, in the finale of _The_President's_Analyst_

Working...