Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Why Elon Musk's Batteries Scare the Hell Out of Electric Companies (bloomberg.com)

JoeyRox writes: Tesla's 'gigafactory' publicized goal is to make electric cars more affordable. However that benefit may soon be eclipsed by the gigafactory's impact on roof-top solar power storage costs, putting the entire business model of utilities in peril. “The mortal threat that ever cheaper on-site renewables pose” comes from systems that include storage, said Amory Lovins, co-founder of the Rocky Mountain Institute, a Snowmass, Colorado-based energy consultant. “That is an unregulated product you can buy at Home Depot that leaves the old business model with no place to hide.”

Submission + - 'Moneyball' Approach Reduces Crime in New York City

HughPickens.com writes: The NYT reports that NY County District Attorney Cyrus Vance Jr.’s most significant initiative has been to transform, through the use of data, the way district attorneys fight crime. “The question I had when I came in was, Do we sit on our hands waiting for crime to tick up, or can we do something to drive crime lower?” says Vance. “I wanted to develop what I call intelligence-driven prosecution.” When Vance became DA in 2009, it was glaringly evident that assistant D.A.s fielding the 105,000-plus cases a year in Manhattan seldom had enough information to make nuanced decisions about bail, charges, pleas or sentences. They were narrowly focused on the facts of cases in front of them, not on the people committing the crimes. They couldn’t quickly sort minor delinquents from irredeemably bad apples. They didn’t know what havoc defendants might be wreaking in other boroughs.

Vance divided Manhattan’s 22 police precincts into five areas and assigned a senior assistant D.A. and an analyst to map the crime in each area. CSU staff members met with patrol officers, detectives and Police Department field intelligence officers and asked police commanders to submit a list of each precinct’s 25 worst offenders — so-called crime drivers, whose “incapacitation by the criminal-justice system would have a positive impact on the community’s safety.” Seeded with these initial cases, the CSU built a searchable database that now includes more than 9,000 chronic offenders (PDF), virtually all of whom have criminal records. A large percentage are recidivists who have been repeatedly convicted of grand larceny, one of the top index crimes in Manhattan, but the list also includes active gang members, people whom the D.A. considers “uncooperative witnesses,” and a fluctuating number of violent “priority targets,” which currently stands at 81. “These are people we want to know about if they are arrested,” says Kerry Chicon. “We are constantly adding, deleting, editing and updating the intelligence in the Arrest Alert System. If someone gets out of a gang, or goes to prison for a long time, or moves out of the city or the state, or ages out of being a focus for us, or dies, we edit the system accordingly — we do that all the time.”

“It’s the ‘Moneyball’ approach to crime,” says Chauncey Parker. “The tool is data; the benefit, public safety and justice — whom are we going to put in jail? If you have 10 guys dealing drugs, which one do you focus on? The assistant district attorneys know the rap sheets, they have the police statements like before, but now they know if you lift the left sleeve you’ll find a gang tattoo and if you look you’ll see a scar where the defendant was once shot in the ankle. Some of the defendants are often surprised we know so much about them.”

Submission + - 18th Century Law dredged up to force decryption of devices (theregister.co.uk) 1

Cognitive Dissident writes: The Register has a story about federal prosecutors using a law signed by George Washington to force manufacturers to help law enforcement access encrypted data on devices they manufacture. The All Writs Act is a broad statute simply authorizing courts to issue any order necessary to obtain information within their jurisdiction.

Quoting the Register Article:
Last month, New York prosecutors successfully persuaded a judge that the ancient law could be used to force an unnamed smartphone manufacturer to help unlock a phone allegedly used in a credit card fraud case. The judge ordered the manufacturer to offer "reasonable technical assistance" to make the phone's contents available.

End quote. What will happen when this collides with Apple and Google deliberately creating encryption that they themselves cannot break?

Submission + - FAA moves to regulate and thus destroy drone use 2

schwit1 writes: The proposed rules would require that a drone owner would have to get certified as a pilot, “certification that can cost $10,000 and demand many hours flying aircraft that control nothing like a little drone.”

“Knowing the proper flap setting on a short runway approach for a Cessna 172 doesn’t do any good for a DJI Phantom [an inexpensive and popular commercial drone],” said Matt Waite, a University of Nebraska professor and founder of the Drone Journalism Lab. “A lot of people out there already running businesses in conflict with FAA policy, who don’t have pilot licenses, are probably looking at this like, ‘You’ve got to be kidding me.'”

Gee, here we have a new industry that is growing and prosperous, with many people coming up with creative ideas for using drones that none of its inventors ever dreamed of, and the government wants to step in and control it, regulating it to a point where it can’t even exist legally. Isn’t that nice of them?

Submission + - DHS Set to Destroy Einstein Surveillance Records (nextgov.com)

schwit1 writes: The Department of Homeland Security is poised to ditch all records from a controversial network monitoring system called Einstein that are at least three years old, but not for security reasons. DHS reasons the files — which include data about traffic to government websites, agency network intrusions and general vulnerabilities — have no research significance.

But some security experts say, to the contrary, DHS would be deleting a treasure chest of historical threat data. And privacy experts, who wish the metadata wasn’t collected at all, say destroying it could eliminate evidence that the government wide surveillance system does not perform as intended.

The National Archives and Records Administration has tentatively approved the disposal plan, pending a public comment period.

Comment What did China promise? (Score 2) 145

The agreement allows China to continue building coal-powered plants, expand its economy and cement its place as the world's leading polluter -- perhaps even doubling its output until 2030 or some year around that time, when China's carbon emissions are expected to peak.

At that point, the Chinese promise that they will implement some vague action plan at some vague point in the future. All we need to do is trust them. The agreement contains no binding language requiring any goals to be met.

Submission + - A Charlotte judge unseals 500+ Stingray records (arstechnica.com)

An anonymous reader writes: A judge in Charlotte, North Carolina, has unsealed a set of 529 court documents in hundreds of criminal cases detailing the use of a stingray, or cell-site simulator, by local police. This move, which took place earlier this week, marks a rare example of a court opening up a vast trove of applications made by police to a judge, who authorized each use of the powerful and potentially invasive device

According to the Charlotte Observer, the records seem to suggest that judges likely did not fully understand what they were authorizing. Law enforcement agencies nationwide have taken extraordinary steps to preserve stingray secrecy. As recently as this week, prosecutors in a Baltimore robbery case dropped key evidence that stemmed from stingray use rather than fully disclose how the device was used.

Submission + - Air Gap no longer a barrier for hackers (bloomberg.com)

schwit1 writes: Air-gap networks were once considered the "magic bullet" for securing data, but researchers from Ben-Gurion University in Israel have found a way to compromise those machines. Once a computer is infected with a particular kind of virus, hackers can trick the PC into relaying information that can be wirelessly retrieved from a mobile phone located outside of the room.

Submission + - Kickstarter campaign to fund lunar probe

schwit1 writes: A private consortium of scientists and entrepreneurs is planning to fund its unmanned lunar lander with a Kickstarter campaign followed by private sales..

The mission is raising initial development funding through Kickstarter, the crowdfunding platform. Following the initial public phase the remaining funding requirements will be met through sales of ‘digital memory boxes’ in which donors can have their biographies recorded and taken to the Moon. These will also include a strand of hair so that their DNA can exist in space. The team has claimed that around one per cent of the global population who can afford a memory box will buy one. Also included in the time capsule will be record of life on Earth. The archive will include a record of human history and civilisation to date alongside a species database showing the biodiversity of animals and plants.

This is essentially a UK project, backed by the government but with little funding. They hope to launch in 2024, with two missions planned, the first to drill into the lunar soil and the second to bring back samples.

Submission + - Senate Blocks Vote on Curbing NSA's Bulk Data Collection Program (bloomberg.com)

schwit1 writes: Senate leaders failed to get the 60 votes needed to advance The USA Freedom Act — which would have limited the National Security Agency’s bulk collection of phone records — and as Bloomberg reports, it's unlikely a new version can be drafted for another vote before the congressional term expires this year. The 58-42 vote to move the measure forward came mostly along party lines as Senator Saxby Chambliss — the top Republican on the intelligence committee — rambling that the bill "eliminates tools critical to the intelligence community’s ability to prevent terrorist attacks, and its adoption would greatly degrade our ability to fight domestic terrorism in particular." In other words — it's for own good, now shut up!

Submission + - MARS, inc - We are running out of chocolate (washingtonpost.com)

schwit1 writes: There's no easy way to say this: You're eating too much chocolate, all of you. And it's getting so out of hand that the world could be headed towards a potentially disastrous (if you love chocolate) scenario if it doesn't stop.

Chocolate deficits, whereby farmers produce less cocoa than the world eats, are becoming the norm. Already, we are in the midst of what could be the longest streak of consecutive chocolate deficits in more than 50 years. It also looks like deficits aren't just carrying over from year-to-year—the industry expects them to grow. Last year, the world ate roughly 70,000 metric tons more cocoa than it produced. By 2020, the two chocolate-makers warn that that number could swell to 1 million metric tons, a more than 14-fold increase; by 2030, they think the deficit could reach 2 million metric tons.

Slashdot Top Deals

Old programmers never die, they just hit account block limit.

Working...