Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Microsoft

Data-Fed Monitoring System Will Put New Yorkers Under Police Surveillance 259

Nerval's Lobster writes that New York City isn't just gathering data on citizens with cameras and other data sources for sifting through later to seek evidence in the event of violent acts; it's using some of that data in real-time in an attempt to reveal potential criminal activity. They've even picked a name for their system that echoes DARPA's Total Information Awareness, which I guess is more diplomatic than just calling it Precrime: "The Domain Awareness System will draw data from 911 calls, previous crime reports, license-plate readers, law-enforcement databases, environmental sensors, and roughly 3,000 closed-circuit cameras. It will rely on the New York City Wireless Network (NYCWiN), a high-speed wireless broadband infrastructure that allows city agencies to rapidly transmit data, and used for everything from emergency response to reading meters. Mayor Bloomberg argued that the system isn't an example of Big Brother overstepping the line. 'What you're seeing is what the private sector has used for a long time,' he told Gothamist. 'If you walk around with a cell phone, the cell phone company knows where you are. We're not your mom and pop's police department anymore.'"
Science

Virtual Nanoscopy Allows Scientists To Capture High Res Cell Map 16

hypnosec writes "Researchers have managed to generate ultra-large high resolution electron microscopic maps of cells by developing new tools that can combine thousands of images taken from an electron microscope thus enabling them to view a cell in its entirety. Use of electron microscopes reveals intricate structures of cells, but with a limitation that only a tiny portion of the cell is captured, which misses the bigger picture. If low-res images are captured to view a greater part of the biological structure, intricate details are missed. A team of scientists over at Leiden University Medical Center in the Netherlands has come up with a technique called 'virtual nanoscopy' that enabled them to ultrastructurally map regions of cells and tissue as large as 1 mm^2 at nanometer resolution."
Privacy

Witness In Secret WikiLeaks Grand Jury Hearing Posts Transcript of Questioning 184

Sparrowvsrevolution writes "A year ago, free information advocate and Bradley Manning supporter David House was subpoenaed to testify in the grand jury investigation of WikiLeaks that's taking place in Alexandria, Virginia. Now he's released a transcript of his interrogation that he produced by taking handwritten notes on a legal pad and handing pages to his lawyer during their consultations. Though House pled the fifth and didn't tell the prosecutors much, the notes show the prosecution attorneys focusing their questions on Boston-area hackers as well as Tor developer and WikiLeaks supporter Jacob Appelbaum."
Government

Feds Plan 'Fog of Disinformation' To Track Information Leaks 263

skipkent tips a story at Wired's Danger Room, according to which "Pentagon-funded researchers have come up with a new plan for busting leakers: Spot them by how they search, and then entice the secret-spillers with decoy documents that will give them away. Computer scientists call it it 'Fog Computing' — a play on today's cloud computing craze. And in a recent paper for Darpa, the Pentagon's premiere research arm, researchers say they've built 'a prototype for automatically generating and distributing believable misinformation and then tracking access and attempted misuse of it. We call this "disinformation technology."'"
NASA

NuStar Observatory To Launch On Wednesday 23

First time accepted submitter TWToxicity writes "NuSTAR is to be launched from a Pegasus XL rocket carried by an Orbital Science Corp. L-1011 "Stargazer" plane. It will orbit at 550 km above Earth's surface. A week after launch, NuSTAR will deploy its 10 meter boom, which allows the telescope to focus X-rays and capture images that will help scientists survey black holes in other galaxies, study the black hole at the heart of the Milky Way, and study supernovae to discover how atomic elements are formed."
The Military

Trained Rats Map Minefields With GPS 103

An anonymous reader writes "Believe it or not, but the Department of Defense is paying psychologists to train rats to find mines and circle around them. By attaching little GPS backpacks and supplying a laptop with software that looks for the 'circling around' signature, the DOD hopes its project will allow the release of platoons of rats near suspected minefields so that the laptop software creates a detailed map of where all the mines are located automatically. Not sure if they plan on picking up the rats afterward, but they do assure us that the rats are too lightweight to set off the mines!"
Communications

FBI Seizes Server Providing Anonymous Remailer Service 355

sunbird writes "At 16:00 ET on April 18, federal agents seized a server located in a New York colocation facility shared by May First / People Link and Riseup.net. The server was operated by the European Counter Network ("ECN"), the oldest independent internet service provider in Europe. The server was seized as a part of the investigation into bomb threats sent via the Mixmaster anonymous remailer received by the University of Pittsburgh that were previously discussed on Slashdot. As a result of the seizure, hundreds of unrelated people and organizations have been disrupted."
Space

Emperor Penguins Counted From Space 102

HairyNevus writes "An international team of scientists used satellite technology to conduct a census of emperor penguin populations from outer space. Honing in on their colonies by looking for the brown patches of penguin guano that stand out in the snowy antarctic, high resolution images were taken and used to count the total number of emperor penguin species on the continent. The result was a census of 595,000 penguins, almost double the previous estimates of 270,000-350,000 emperors. This includes seven new colonies which had not been previously identified. Although this is uplifting data, computer modeling still shows that loss of ice flows in the northern reaches could result in problems for the penguins."
Education

Tennessee "Teaching the Controversy" Bill Becomes Law 672

MrKevvy writes "The Tennessee 'Teaching the Controversy' bill was passed into law today. 'A law to allow public school teachers to challenge the scientific consensus on issues like climate change and evolution will soon take effect in Tennessee. State governor Bill Haslam allowed the bill — passed by the state House and Senate — to become law without signing it, saying he did not believe the legislation "changes the scientific standards that are taught in our schools."'" The governor adds: "However, I also don’t believe that it accomplishes anything that isn’t already acceptable in our schools."
Censorship

Smearing Toddler Reputations Via Internet: Free Speech Or Extortion? 213

retroworks writes "Crystal Cox, a Montana woman who calls herself an 'investigative journalist,' was slapped with a $2.5-million judgment last year for defaming an investment firm and one of its lead partners. Cox had taken control of the Google footprint of Obsidian Finance and its principal Kevin Padrick by writing hundreds of posts about them on dozens of websites she owned, inter-linking them in ways that made them rise up in Google search results; it ruined Obsidian's business due to prospective clients being put off by the firm's seemingly terrible online reputation. After Obsidian sued Cox, she contacted them offering her 'reputation services;' for $2,500 a month, she could 'fix' the firm's reputation and help promote its business. The Forbes Article goes on to describe how she tried to similarly leverage attorneys and journalists reputations. Finding some of her targets were too well established in google rank to pester or intimidate, Cox moved to family members, reserving domain names for one of her target's 3-year-old daughter. Forbes columnist Kashmir Hill makes the case that this clearly isn't journalism, and establishes a boundary for free speech online."
Technology

The Vortex Gun Coming Soon To a Protest Near You 295

An anonymous reader writes "Vortex technology has been used in everything from rocket-powered fire extinguishers to Nerf guns, but neither of those things are capable of giving the beat-down to hapless protesters. By giving spinning vortices an electric charge, though, pepper spray can be sent over 150 feet at between 60 and 90 mph. A vortex gun uses a pressure wave and a carefully designed barrel to fire donut-shaped rings of air that can hold themselves together over long distances. The military (starting with the German military during World War II) has been running experiments with using vortex canons to knock things over, but it's not a particularly efficient or effective way to go. What the gas rings can be used for is transporting other gasses (like pepper spray or tear gas or pesticide) long distances with a decent amount of accuracy, holding their cargo inside the calm center spinning vortex."
Businesses

Proposed Law Would Give DHS Power Over Privately Owned IT Infrastructure 300

CelticWhisper writes "H.R. 3674, the Promoting and Enhancing Cybersecurity and Information Sharing Effectiveness Act (PRECISE Act), would allow the U.S. Department of Homeland Security to require improved security practices from those businesses managing systems whose disruption could prove detrimental to critical life-sustaining or national-security initiatives." As the article points out, this is just "one of 30 or so such bills currently percolating on the Hill."
Privacy

Do You Like Online Privacy? You May Be a Terrorist 720

schwit1 passes on this snippet from Public Intelligence: "A flyer designed by the FBI and the Department of Justice to promote suspicious activity reporting in internet cafes lists basic tools used for online privacy as potential signs of terrorist activity. The document, part of a program called 'Communities Against Terrorism,' lists the use of 'anonymizers, portals, or other means to shield IP address' as a sign that a person could be engaged in or supporting terrorist activity. The use of encryption is also listed as a suspicious activity along with steganography, the practice of using 'software to hide encrypted data in digital photos' or other media. In fact, the flyer recommends that anyone 'overly concerned about privacy' or attempting to 'shield the screen from view of others' should be considered suspicious and potentially engaged in terrorist activities. ... The use of PGP, VPNs, Tor or any of the many other technologies for anonymity and privacy online are directly targeted by the flyer, which is distributed to businesses in an effort to promote the reporting of these activities."
The Courts

US Supreme Court Upholds Removal of Works From Public Domain 380

langelgjm writes "While much of the web is focused on the SOPA and PIPA blackout, supporters of the public domain today quietly lost a protracted struggle that began back in 2001. The Supreme Court, in a 6-2 decision, rejected the argument that Congress did not have the power to convey copyright upon works that were already in the public domain. The suit was originally filed to challenge provisions that the U.S. adopted when signing the TRIPs agreement. Justices Breyer and Alito dissented, arguing that conveyed copyright on already existing works defied the logic of copyright law. Justice Kagan recused herself. The text of the opinions is available here (PDF)."
Piracy

White House Responds To SOPA, PIPA, and OPEN 517

eefsee writes "The White House today responded to two petitions with a statement titled 'Combating Online Piracy while Protecting an Open and Innovative Internet.' They note that 'We must avoid creating new cybersecurity risks or disrupting the underlying architecture of the Internet.' In particular, they cite manipulation of DNS as problematic. But overall the statement is clearly supportive of anti-piracy efforts and lays down this challenge: 'So, rather than just look at how legislation can be stopped, ask yourself: Where do we go from here? Don't limit your opinion to what's the wrong thing to do, ask yourself what's right.' So, what's right?"

Slashdot Top Deals

"Sometimes insanity is the only alternative" -- button at a Science Fiction convention.

Working...