Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
The Military

Trained Rats Map Minefields With GPS 103

An anonymous reader writes "Believe it or not, but the Department of Defense is paying psychologists to train rats to find mines and circle around them. By attaching little GPS backpacks and supplying a laptop with software that looks for the 'circling around' signature, the DOD hopes its project will allow the release of platoons of rats near suspected minefields so that the laptop software creates a detailed map of where all the mines are located automatically. Not sure if they plan on picking up the rats afterward, but they do assure us that the rats are too lightweight to set off the mines!"
Communications

FBI Seizes Server Providing Anonymous Remailer Service 355

sunbird writes "At 16:00 ET on April 18, federal agents seized a server located in a New York colocation facility shared by May First / People Link and Riseup.net. The server was operated by the European Counter Network ("ECN"), the oldest independent internet service provider in Europe. The server was seized as a part of the investigation into bomb threats sent via the Mixmaster anonymous remailer received by the University of Pittsburgh that were previously discussed on Slashdot. As a result of the seizure, hundreds of unrelated people and organizations have been disrupted."
Space

Emperor Penguins Counted From Space 102

HairyNevus writes "An international team of scientists used satellite technology to conduct a census of emperor penguin populations from outer space. Honing in on their colonies by looking for the brown patches of penguin guano that stand out in the snowy antarctic, high resolution images were taken and used to count the total number of emperor penguin species on the continent. The result was a census of 595,000 penguins, almost double the previous estimates of 270,000-350,000 emperors. This includes seven new colonies which had not been previously identified. Although this is uplifting data, computer modeling still shows that loss of ice flows in the northern reaches could result in problems for the penguins."
Education

Tennessee "Teaching the Controversy" Bill Becomes Law 672

MrKevvy writes "The Tennessee 'Teaching the Controversy' bill was passed into law today. 'A law to allow public school teachers to challenge the scientific consensus on issues like climate change and evolution will soon take effect in Tennessee. State governor Bill Haslam allowed the bill — passed by the state House and Senate — to become law without signing it, saying he did not believe the legislation "changes the scientific standards that are taught in our schools."'" The governor adds: "However, I also don’t believe that it accomplishes anything that isn’t already acceptable in our schools."
Censorship

Smearing Toddler Reputations Via Internet: Free Speech Or Extortion? 213

retroworks writes "Crystal Cox, a Montana woman who calls herself an 'investigative journalist,' was slapped with a $2.5-million judgment last year for defaming an investment firm and one of its lead partners. Cox had taken control of the Google footprint of Obsidian Finance and its principal Kevin Padrick by writing hundreds of posts about them on dozens of websites she owned, inter-linking them in ways that made them rise up in Google search results; it ruined Obsidian's business due to prospective clients being put off by the firm's seemingly terrible online reputation. After Obsidian sued Cox, she contacted them offering her 'reputation services;' for $2,500 a month, she could 'fix' the firm's reputation and help promote its business. The Forbes Article goes on to describe how she tried to similarly leverage attorneys and journalists reputations. Finding some of her targets were too well established in google rank to pester or intimidate, Cox moved to family members, reserving domain names for one of her target's 3-year-old daughter. Forbes columnist Kashmir Hill makes the case that this clearly isn't journalism, and establishes a boundary for free speech online."
Technology

The Vortex Gun Coming Soon To a Protest Near You 295

An anonymous reader writes "Vortex technology has been used in everything from rocket-powered fire extinguishers to Nerf guns, but neither of those things are capable of giving the beat-down to hapless protesters. By giving spinning vortices an electric charge, though, pepper spray can be sent over 150 feet at between 60 and 90 mph. A vortex gun uses a pressure wave and a carefully designed barrel to fire donut-shaped rings of air that can hold themselves together over long distances. The military (starting with the German military during World War II) has been running experiments with using vortex canons to knock things over, but it's not a particularly efficient or effective way to go. What the gas rings can be used for is transporting other gasses (like pepper spray or tear gas or pesticide) long distances with a decent amount of accuracy, holding their cargo inside the calm center spinning vortex."
Businesses

Proposed Law Would Give DHS Power Over Privately Owned IT Infrastructure 300

CelticWhisper writes "H.R. 3674, the Promoting and Enhancing Cybersecurity and Information Sharing Effectiveness Act (PRECISE Act), would allow the U.S. Department of Homeland Security to require improved security practices from those businesses managing systems whose disruption could prove detrimental to critical life-sustaining or national-security initiatives." As the article points out, this is just "one of 30 or so such bills currently percolating on the Hill."
Privacy

Do You Like Online Privacy? You May Be a Terrorist 720

schwit1 passes on this snippet from Public Intelligence: "A flyer designed by the FBI and the Department of Justice to promote suspicious activity reporting in internet cafes lists basic tools used for online privacy as potential signs of terrorist activity. The document, part of a program called 'Communities Against Terrorism,' lists the use of 'anonymizers, portals, or other means to shield IP address' as a sign that a person could be engaged in or supporting terrorist activity. The use of encryption is also listed as a suspicious activity along with steganography, the practice of using 'software to hide encrypted data in digital photos' or other media. In fact, the flyer recommends that anyone 'overly concerned about privacy' or attempting to 'shield the screen from view of others' should be considered suspicious and potentially engaged in terrorist activities. ... The use of PGP, VPNs, Tor or any of the many other technologies for anonymity and privacy online are directly targeted by the flyer, which is distributed to businesses in an effort to promote the reporting of these activities."
The Courts

US Supreme Court Upholds Removal of Works From Public Domain 380

langelgjm writes "While much of the web is focused on the SOPA and PIPA blackout, supporters of the public domain today quietly lost a protracted struggle that began back in 2001. The Supreme Court, in a 6-2 decision, rejected the argument that Congress did not have the power to convey copyright upon works that were already in the public domain. The suit was originally filed to challenge provisions that the U.S. adopted when signing the TRIPs agreement. Justices Breyer and Alito dissented, arguing that conveyed copyright on already existing works defied the logic of copyright law. Justice Kagan recused herself. The text of the opinions is available here (PDF)."
Piracy

White House Responds To SOPA, PIPA, and OPEN 517

eefsee writes "The White House today responded to two petitions with a statement titled 'Combating Online Piracy while Protecting an Open and Innovative Internet.' They note that 'We must avoid creating new cybersecurity risks or disrupting the underlying architecture of the Internet.' In particular, they cite manipulation of DNS as problematic. But overall the statement is clearly supportive of anti-piracy efforts and lays down this challenge: 'So, rather than just look at how legislation can be stopped, ask yourself: Where do we go from here? Don't limit your opinion to what's the wrong thing to do, ask yourself what's right.' So, what's right?"
Microsoft

Microsoft 'Trustworthy Computing' Turns 10 185

gManZboy writes "Bill Gates fired off his famous Trustworthy Computing memo to Microsoft employees on Jan. 15, 2002, amid a series of high-profile attacks on Windows computers and browsers in the form of worms and viruses like Code Red and 'Anna Kournikova.' The onslaught forced Gates to declare a security emergency within Microsoft, and halt production while the company's 8,500 software engineers sifted through millions of lines of source code to identify and fix vulnerabilities. The hiatus cost Microsoft $100 million. Today, the stakes are much higher. 'TWC Next' will include a focus on cloud services such as Azure, the company says."
Japan

Fujitsu To Develop Vigilante Computer Virus For Japan 129

wiedzmin writes "Japanese Defense Ministry has awarded Fujitsu a contract to develop a vigilante computer virus, which will track down and eliminate other viruses, or rather — their sources of origin. Are 'good' viruses a bad idea? Sophos seems to think so, saying, 'When you're trying to gather digital forensic evidence as to what has broken into your network, and what data it may have stolen, it's probably not wise to let loose a program that starts to trample over your hard drives, making changes.'"
Security

Romanian Accused of Breaking Into NASA 169

alphadogg writes "Romanian authorities have arrested a 26-year old hacker who is accused of breaking into multiple NASA servers and causing $500,000 in damages to the U.S. space agency's systems. Robert Butyka, 26, was arrested on Tuesday in Western Romania following an investigation by the Romanian Directorate for Investigating Organized Crime and Terrorism. According to local reports, the hacker used the online moniker of 'Iceman.' He does not have a higher education or an occupation, a DIICOT spokeswoman said."
Games

Pirate Party Invited To, Then Banned From Gaming Exhibition 115

esocid writes with this excerpt from TorrentFreak: "Despite having booked and paid for their booth at Gamex, Sweden's largest gaming exhibition, the Pirate Party have been excluded from the action this week. The party, who say they were nagged for 2 to 3 months to book for the event, were this week informed they were too controversial and no longer welcome. ... [Pirate Party leader Anna Troberg] says that after the sales people from the exhibition pursued the party for months to participate, they decided to book and pay for a booth. ... 'I thought it was a bit strange, but in the afternoon, the pieces fell into place when the fair manager, Bear Wengse, phoned me and kindly, but firmly, announced that the Pirate Party was no longer welcome at the fair.' Wengse informed Troberg that the exhibition is a meeting place and not a venue for political conflict and the party's presence could cause problems, particularly since some of their work "could be perceived as criminal."'"

Slashdot Top Deals

Those who do not understand Unix are condemned to reinvent it, poorly. -- Henry Spencer

Working...