Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
The Courts

Submission + - Belgium's SWIFT does a runner to America

An anonymous reader writes: A new twist to an old story. SWIFT, the Belgium bank transfer company that admitted it handed all transaction data to the NSA & CIA without warrants or limits, faces prosecution in Belgium. Their response is to do a runner to the USA. Shifting their data to USA data stores and seeking protection under the US-EU safe harbor treaty.

If you were the CIA and had access SWIFT's data, whose details would you look up. I'd look up every world leaders bank transfers, every politician's payments, every civil servants interbank transactions. Maybe look up what money Democrats send abroad too, might be some political leverage in that.
The Internet

Submission + - BitTorrent going legit - why would users pay?

Tookis writes: As of Monday you'll be able to pay for movie downloads from BitTorrent.com, but why should people use file sharing for good instead of evil? While there are plenty of legit uses for the BitTorrent technology, obviously the number one use is to illegally download files such as movies, television and music. So what makes BitTorrent.com think these people will suddenly be prepared to pay for what they already get for free? Will files from the BitTorrent Entertainment Network come down faster than illegal BitTorrent files from the wider internet? Not likely, as the factors that affect peer-to-peer download speeds are still at play regardless. And why should people use a legit BitTorrent with DRM instead of say iTunes? http://www.itwire.com.au/content/view/9922/1085/
Robotics

Submission + - Singapore holds "Terminator" robotics comp

duc0n writes: "Singapore's Defence Science and Technology Agency has just recently started a robotics competition named "TechX". The goal? Design a robot capable of entering an urban proving ground, navigating obstacles such as stairs, elevators and doors, and able to recognize and engage a specific target (using "a means that [they] will provide for the robot to mark the target"). All this is, of course, hauntingly similar to the Samsung sentry robot story from awhile back. Applications have been open since January, but the final event is not set to take place until August 2008."
Space

Submission + - vast water reservoir revealed

Agent Provocateur writes: "WUSTL has a news bulletin about research which has shown a hidden ocean the size of the Artic. A seismologist at Washington University in St. Louis has made the first 3-D model of seismic wave damping — diminishing — deep in the Earth's mantle and has revealed the existence of an underground water reservoir at least the volume of the Arctic Ocean. It is the first evidence for water existing in the Earth's deep mantle. Full report here."
Movies

MPAA and FBI Help To Train Swedish Police 165

Several readers let us know about a program in which a US FBI agent and employees of the MPAA led a seminar for Swedish police officers in methods of finding and stopping illegal downloading from the Internet. The writer at zeropaid.com says, "I bet the Swedish people are going to love to find out that the US government and a US lobbying group now have a hand in training their police personnel. So much for the notion of national sovereignty." Reader Oxygen provided a bit of translation from an article in Swedish on IDG.se: "According to Bertil Ramsell, responsible for the course, the purpose of the visit was to give the invited speakers a chance to explain to the students what their organization's purpose was. But in a report from the IIPA, the purpose was to educate students in anti-piracy."
Media

Submission + - UK's Prime Minister's Office Dismisses Ban DRM e-P

rvincoletto writes: "UK's Prime Minister's Office Dismisses Ban DRM e-Petition:

Digital rights issues have been gaining increasing prominence as innovation accelerates, more and more digital media products and services come onto the market and the consumer wants to get access to digital content over different platforms. Many content providers have been embedding access and management tools to protect their rights and, for example, prevent illegal copying. We believe that they should be able to continue to protect their content in this way. However, DRM does not only act as a policeman through technical protection measures, it also enables content companies to offer the consumer unprecedented choice in terms of how they consume content, and the corresponding price they wish to pay. It is clear though that the needs and rights of consumers must also be carefully safeguarded. It is reasonable for consumers to be informed what is actually being offered for sale, for example, and how and where the purchaser will be able to use the product, and any restrictions applied. While there is good reason to expect the market to reach a balance as these new markets develop, it is important that consumers' interests are maintained in the meantime. Apart from the APIG (All Party Internet Group) report on DRM referred to in your petition, Digital Rights issues are an important component in other major HMG review strands on Intellectual Property, New Media and the Creative Economy. In particular, the independent Gowers Review of Intellectual Property commissioned by the Chancellor of the Exchequer, published its report on 6th December 2006 as part of the Chancellor's Pre-Budget Report. Recommendations include introducing a limited private copying exception by 2008 for format shifting for works published after the date that the law comes into effect. There should be no accompanying levies for consumers. Also making it easier for users to file notice of complaints procedures relating to Digital Rights Management tools by providing an accessible web interface on the Patent Office website by 2008 and that DTI should investigate the possibility of providing consumer guidance on DRM systems through a labelling convention without imposing unnecessary regulatory burdens. You can see the full report on the HM Treasury website. The Government has welcomed the Gowers Report and will now be looking to implement the recommendations for which it is responsible.
"
Editorial

Submission + - Attacking feminism: why should a geek care?

An anonymous reader writes: In a recent article, Author Michael Reed challenges some of the accepted arguments on the subject of Women In IT.

The article begins with an outline of the some of the basic issues and then moves onto a criticism of two recent tech articles on this subject. In the article, he provides some arguments against the use of affirmative action.

The two articles under discussion are:
SCALE 5x: Women in Open Source

The hidden engineering gender gap
Announcements

Submission + - Australia Outlaws Incandescent Lightbulb

passthecrackpipe writes: "The Australian Government is planning on making the incandescent ligtbulb a thing of the past. In three years time, standard lightbulbs will no longer be available for sale in the shops in Australia (expect a roaring grey market) and everybody will be forced to switch to more energy efficient Fluorescent bulbs. In this move to try and curb emissions, the incandescent bulb — which converts the majority of used energy to heat rather then light — will be phased out. Environmental groups have given this plan a lukewarm reception. They feel Australia should sign on to the Kyoto protocol first. (Article in Dutch). A similar plan was created together with Phillips, one of the worlds largest lighting manufacturers. What do other slashdotters think? Is this a move in the right direction? Will this boost the development of better fluorescent bulbs? Improve the design and lower the costs of LED lightbulbs? Will this plan make a big difference to the environment at all?"
Privacy

UK's Blair Dismisses Online Anti ID-Card Petition 377

An anonymous reader writes "Prime Minister Tony Blair has responded personally via email to 28,000 online petitioners opposing the UK's planned identity card scheme, and has closed the online petition. The email reads: 'We live in a world in which people, money and information are more mobile than ever before. Terrorists and international criminal gangs increasingly exploit this to move undetected across borders and to disappear within countries. Terrorists routinely use multiple identities — up to 50 at a time... ID cards which contain biometric recognition details and which are linked to a National Identity Register will make this much more difficult.'"
Security

Submission + - "Drive-By Pharming" and 'borrowed' researc

apesaga writes: On the 8th February 2007, an independent security consultant published an article describing how a type of attack known as "Drive-By Pharming" can be used to make significant changes to a user's broadband router, simply by running some javascript when they visit a webpage. http://getahead.ltd.uk/blog/joe/2007/02/08/csrf_ph arming.html.

However, on February 15th 2007, exactly one week later, Symantec published an article on their website http://www.symantec.com/enterprise/security_respon se/weblog/2007/02/driveby_pharming_how_clicking_1. html describing exactly the same thing.

Are Symantec now resorting to stealing ideas from other researchers, or is this just a harmless coincidence? Obviously the more people that publicise this, the better chance of users finding out and making the necessary changes to their router. But wouldn't it be nice if the original author http://getahead.ltd.uk/joe was credited?
Privacy

Submission + - Europe's Plan to Track Phone and Net Use

An anonymous reader writes: http://www.nytimes.com/2007/02/20/business/worldbu siness/20privacy.html February 20, 2007 Europe's Plan to Track Phone and Net Use PARIS, Feb. 19 — European governments are preparing legislation to require companies to keep detailed data about people's Internet and phone use that goes beyond what the countries will be required to do under a European Union directive. In Germany, a proposal from the Ministry of Justice would essentially prohibit using false information to create an e-mail account, making the standard Internet practice of creating accounts with pseudonyms illegal.
Security

Submission + - E-Bay's Sign-in system can assist phishers

Pedahzur writes: "A phishing e-mail I got the other day highlighted scary new phishing technique: using E-Bay's own sign-in server to assist in the phishing. It seems the login screen will redirect to any URL after the sign in procedure. I contacted E-Bay, but received only the boiler plate reply. More details at this blog post."

Slashdot Top Deals

The optimum committee has no members. -- Norman Augustine

Working...