Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:So basically... (Score 1) 391

That's the case I just settled. My client's didn't trust banks (go figure) and kept their cash in a safe. They got most of their cash from a legal action but they couldn't account for all of it because their job was tip based and they couldn't prove their expenses. Long story short, they went to make a large purchase, people got suspicious, and 90% of American currency has cocaine residue (either from being used to snort or simply going through money counters at a bank). Under a few states' laws and the former federal law, known as civil forfeiture, you are guilty until proven innocent. See e.g. USA v. $124,700. Only property connected with drugs is forfeited, but the raw deal is that innocent people must prove their innocence and guilty people must prove the proportion of their guilt to get the property back. Double Jeopardy does not apply and so the guilty person that proved his guilt to get his property back has proved the states' later criminal case.

My clients settled for less than their entire amount (like everyone does) because of the uncertainties of trial - they couldn't prove how much money they spent from their legal award and they couldn't completely prove how much they made in their jobs. Further, my clients were minorities and the case was venued in a minority unfriendly county.
Security

Submission + - Wi-Fi hacking, with a handheld PDA

JimMcc writes: "The Zero Day Blog over at ZD Net has an article describing a PDA sized hand-held device made by Immunity, Inc. which provides automated penetration testing of Wi-Fi networks. It will also, it instructed to do so, automatically launch known exploits. It is designed for use by a novice.

The idea is to give pen testers a tool to launch exploits wirelessly in the most covert fashion. At startup, Silica offers the user the option to scan for available open Wi-Fi networks. Once a network is found, the device connects (much like a laptop at Starbucks) and asks the user if it should simply scan for vulnerable/open ports or launch actual exploits from CANVAS.
They say that they try to thoroughly vet purchasers to determine if they are legitimate, but admit that the device will certainly fall into the wrongs hands."

Slashdot Top Deals

BLISS is ignorance.

Working...