Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment tribune (Score 1) 667

Here's my solution. Create a position new directly elected (like the president) official whose only job is to fight corruption and oversecrecy in government, and whose only powers are:

* Access to information. Like the president, the tribune automatically has the highest possible security clearance, and is empowered to demand any information from any government agency or offical.
* Declassify information. Like the president, the tribune has the power to unilaterally declassify information.
* Prosecute. The tribune has the standing to take the government to court over any issue relating to infringement of rights, corruption, or a violation of procedure.

More details at:

http://bayleshanks.com/wiki.pl?ideas-groupDecisionMaking-tribune

Censorship

Submission + - AT&T Censors 4chan server 13

An anonymous reader writes: http://www.reddit.com/r/reddit.com/comments/94pf2/att_is_now_blocking_all_access_to_img4chanorg/ Details how img.4chan.org (home of the notorious /b/ — "Random" image board) is being actively blocked by AT&T. According to the scant details available on 4chan and Reddit there are reports that img.4chan.org has become inaccessible from California to Texas and some reports claim as far east as Connecticut. Supposedly this is to stop a ring of pedophiles, but as one Reddit poster said it best "First the came for the pedophiles and I was not a pedophile..."
Disturbing news indeed.
The Internet

Harvard Study Says Weak Copyright Benefits Society 326

An anonymous reader writes "Michael Geist summarizes an important new study on file sharing from economists Felix Oberholzer-Gee and Koleman Strumpf. The Harvard Business School working paper finds that given the increase in artistic production along with the greater public access conclude that 'weaker copyright protection, it seems, has benefited society.' The authors point out that file sharing may not result in reduced incentives to create if the willingness to pay for 'complements' such as concerts or author speaking tours increases."
Science

6000-Year-Old Tomb Complex Discovered 83

duh P3rf3ss3r writes "National Geographic reports that a 6000-year-old tomb complex on 200 hectares (500 acres) has been discovered on the Salisbury Plain just 24 km (15 miles) from Stonehenge. The site has come as a surprise to the archaeologists who had thought that the area had been studied in such depth that few discoveries of such magnitude remained. The site, fully 1000 years older than Stonehenge, has been called 'Britain's oldest architecture.'"
Power

EU Fusion Experiment's Financial Woes Get More Concrete 173

fiannaFailMan writes "An international plan to build a nuclear fusion reactor is being threatened by rising costs, delays and technical challenges. 'Emails leaked to the BBC indicate that construction costs for the experimental fusion project called Iter have more than doubled. Some scientists also believe that the technical hurdles to fusion have become more difficult to overcome and that the development of fusion as a commercial power source is still at least 100 years away. At a meeting in Japan on Wednesday, members of the governing Iter council will review the plans and may agree to scale back the project.' Iter will be a Tokamak device, a successor to the Joint European Torus (JET) in England. Meanwhile, an experiment in fusion by laser doesn't seem to be running into the same high profile funding problems just yet."
The Internet

Weather Balloons To Provide Broadband In Africa 179

An anonymous reader writes "Two African entrepreneurs have secured exclusive access to market near-space technology — developed by Space Data, an American telecommunications company — throughout Africa. The technology raises hydrogen-filled weather balloons to 80,000 — 100,000 feet, which individuals contact via modems. The balloons, in turn, serve as satellite substitutes which can connect Africans to broadband Internet. 'Network operation centers are located close to a fiber optic cable — say, in Lagos or Accra — and a signal is sent back and forth to the [balloon] in near space,' says one of the entrepreneurs, Timothy Anyasi. The technology will also allow mobile phone operators to offer wireless modems to customers."
Privacy

British Court Rules Against Blogger Anonymity 238

An anonymous reader writes "In a dangerous judgment for British bloggers and whistleblowers, a British court has ruled (absurdly) that because blogging itself is a public activity, bloggers have 'no reasonable expectation of privacy' regarding their identities, and newspapers are allowed to publish their identities if they can find them by fair or foul means. A British police detective who recently won the Orwell Prize for his excellent political writing used his blog to write highly critical accounts of police activities and unethical behavior, making very powerful enemies in the process. A well-funded newspaper with powerful connections quickly heard of his blog and decided it was absolutely vital to expose his identity using an investigative journalist. Like any good newspaper, the blogger anonymized the people and the locations in all the cases he discussed on his blog, but the newspaper alleges these were not sufficiently anonymized and complains that they could work out the identities, though British newspapers don't complain that they are allowed to publish the identities of men who are falsely accused of rape and cleared in court. The newspaper also helpfully contacted the blogger's employer, and his job is now threatened."
Government

NSA Email Surveillance Pervasive and Ongoing 243

dkleinsc writes "The NY Times has a piece about work being done by Congressman Rush Holt (D-NJ) and others to curb NSA efforts to read email and Internet traffic. Here's an excerpt: 'Since April, when it was disclosed that the intercepts of some private communications of Americans went beyond legal limits in late 2008 and early 2009, several Congressional committees have been investigating. Those inquiries have led to concerns in Congress about the agency's ability to collect and read domestic e-mail messages of Americans on a widespread basis, officials said. Supporting that conclusion is the account of a former NSA analyst who, in a series of interviews, described being trained in 2005 for a program in which the agency routinely examined large volumes of Americans' e-mail messages without court warrants. Two intelligence officials confirmed that the program was still in operation.'"
Space

Can Commercial Space Tech Get Off the Ground? 133

coondoggie writes "While NASA's commercial partners such as SpaceX and Orbital have made steady progress in developing space cargo transportation technology, they have recently fallen behind their development schedules. Combine that with the fact that the most critical steps lie ahead, including successfully launching new vehicles and completing integration with the space station, and you have a hole that will be tough to climb out of. Those were the two main conclusions of a Government Accountability Office report (PDF) on the status of the commercial space world this week. The GAO went on to say that after the planned retirement of the space shuttle in 2010, NASA will face a cargo resupply shortfall for the International Space Station of approximately 40 metric tons between 2010 and 2015." Speaking of SpaceX, reader Matt_dk sends along an update on the company's Falcon 9 flight efforts. "Six of the nine first stage flight engines have completed acceptance testing and all nine flight engines are on schedule to complete acceptance testing by mid-July."
Government

Senators To Examine Exclusive Handset Deals 234

narramissic writes "Based on a request that a group of rural operators sent asking the FCC to examine the practice of handset exclusivity, four members of the Commerce Subcommittee on Communications, Technology and the Internet sent a letter to the FCC expressing their concern. Small operators, like U.S. Cellular argue (PDF) that 'exclusive handset contracts divide wireless customers into haves and have nots.' But nationwide operators, including Verizon, maintain (PDF) that 'in the absence of exclusivity agreements, wireless carriers would have less incentive to develop and promote innovative handsets.' The Commerce Committee expects to hold a hearing on the issue tomorrow."
Math

Statistical Suspicions In Iran's Election 512

hoytak writes "An expert in electoral fraud, professor Walter Melbane, has released a detailed analysis (PDF) of available data in Iran's controversial election (summary here). While he did not find significant indications of fraud, he does note that all the deviations from the predicted model are in Ahmadinejad's favor: 'In general, combining the 2005 and 2009 data conveys the impression that a substantial core of the 2009 results reflected natural political process... [These] stand in contrast to the unusual pattern in which all of the notable discrepancies between the support Ahmadinejad actually received and the support the model predicts are always negative. This pattern needs to be explained before one can have confidence that natural election processes were not supplemented with artificial manipulations.'" In related news, EsonLinji notes reports in the Seattle PI and other sources that the US State Department has asked Twitter to delay system maintenance to prevent cutting off Iranians who have been relying on the service during the post-election crisis. And if you would like to help ease the communication crunch, reader RCulpepper tips a blog post detailing how to set up a proxy server for users with Iranian IP addresses.
Censorship

A Black Day For Internet Freedom In Germany 420

Several readers including erlehmann and tmk wrote to inform us about the dawning of Internet censorship in Germany under the usual guise of protecting the children. "This week, the two big political parties ruling Germany in a coalition held the final talks on their proposed Internet censorship scheme. DNS queries for sites on a list will be given fake answers that lead to a page with a stop sign. The list itself is maintained by the German federal police (Bundeskriminalamt). A protest movement has formed over the course of the last several months, and over 130K citizens have signed a petition protesting the law. Despite this, and despite criticism from all sides, the two parties sped up the process for the law to be signed on Thursday, June 18, 2009."
Moon

NASA To Trigger Massive Explosion On the Moon In Search of Ice 376

Hugh Pickens writes "NASA is preparing to launch the Lunar Crater Observation and Sensing Satellite, which will fly a Centaur rocket booster into the moon, triggering a six-mile-high explosion that scientists hope will confirm whether water is frozen in the perpetual darkness of craters near the moon's south pole. If the spacecraft launches on schedule at 12:51 p.m. Wednesday, it will hit the moon in the early morning hours of October 8 after an 86-day Lunar Gravity-Assist, Lunar Return Orbit that will allow the spacecraft time to complete its two-month commissioning phase and conduct nearly a month of science data collection of polar crater measurements before colliding with the moon just 10 minutes behind the Centaur." (Continues, below.)
Censorship

China's Green Dam, No Longer Compulsory, May Have Lifted Code 116

LionMage writes "Much has been made previously of how China's Green Dam software must be installed on all new PCs in China, and of more recent revelations that the software may create exploitable security vulnerabilities or even provide the Chinese government with a ready-made botnet to use for potentially nefarious purposes. (One of those prior articles even discusses how Green Dam incorporates blacklists from CyberSitter.) Now the BBC is reporting that Solid Oak's CyberSitter software may have had more than just a compiled blacklist lifted from it. Solid Oak is claiming that actual pieces of their code somehow ended up in Green Dam. From PC Magazine's article: 'Solid Oak Software, the developer of CyberSitter, claims that the look and feel of the GUI used by Green Dam mimics the style of CyberSitter. But more damning, chief executive Brian Milburn said, was the fact that the Green Dam code uses DLLs identified with the CyberSitter name, and even makes calls back to Solid Oak's servers for updates.'" Relatedly, reader Spurious Logic writes that Green Dam won't be mandatory after all, according to an unnamed official with China's Ministry of Industry and Information Technology.
Security

Hackers Find Remote iPhone Crack 114

Al writes "Two researchers have found a way to run unauthorized code on an iPhone remotely. This is different than 'jailbreaking,' which requires physical access to the device. Normally applications have to be signed cryptographically by Apple in order to run. But Charles Miller of Independent Security Evaluators and Vincenzo Iozzo from the University of Milan found more than one instance in which Apple failed to prevent unauthorized data from executing. This means that a program can be loaded into memory as a non-executable block of data, after which the attacker can essentially flip a programmatic switch and make the data executable. The trick is significant, say Miller and Iozzo, because it provides a way to do something on a device after making use of a remote exploit. Details will be presented next month at the Black Hat Conference in Las Vegas." The attack was developed on version 2.0 of the iPhone software, and the researchers don't know if it will work when 3.0 is released.

Slashdot Top Deals

If you want to put yourself on the map, publish your own map.

Working...