Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Slashdot Deals: Deal of the Day - 6 month subscription of Pandora One at 46% off. ×

Submission + - Death Wish Meets GPS: iPhone Theft Victims Confronting Perps

theodp writes: Thankfully, no one's gone full-Charles-Bronson yet, but the NY Times reports that victims of smartphone theft are using GPS to take the law into their own hands, paying visits to thieves' homes and demanding the return of their stolen phones. "The emergence of this kind of do-it-yourself justice," writes Ian Lovett, "has stirred worries among law enforcement officials that people are putting themselves in danger, taking disproportionate risks for the sake of an easily replaced item." And while hitting "Find My iPhone" can take you to a thief's doorstep, LAPD Cmdr. Andrew Smith urges resisting the impulse to do so. "It's just a phone," he said. "it's not worth losing your life over. Let police officers take care of it. We have backup, guns, radio, jackets — all that stuff civilians don’t have."

Submission + - The McAfee Guide to Uninstalling McAfee Software (youtube.com)

Shivantrill writes: John McAfee has released a video guide to uninstalling the software that bears his name. In every comment section for every article about John McAfee at least one person asks "how do I uninstall this crappy software". John McAfee has heard your cries and has produced a very NSFW video guide. Whatever you may personally think of Mr. McAfee, we all can agree that he has a sense of humor and is not above making fun of himself. This isn't a home made video either, it is production quality

Submission + - Trolling LinkedIn for spooks! (techdirt.com)

pegr writes: Over at TechDirt, we learn that, apparently, the rules of OpSec do not apply to LinkedIn. Using your favorite NSA spying project codename, search LinkedIn for analysts with specific experience with that project! The bonus is that you may very well learn the codenames of more projects. Lather, rinse, repeat.

Oh, and if the person you find didn't share their contact list, LinkedIn will help you find more by showing you "those that viewed this profile also viewed these:" Say what you will regarding the recent NSA revelations, but shouldn't there be a policy with regard to exposing intelligence projects and personnel on public forums? Do we really need to make it this easy for counter-intel of opposing nations?

Submission + - Enemy of HRM, Paul Revere, Identified Using Metadata (kieranhealy.org)

cervesaebraciator writes: In the wake of recent revelations from Edward Snowden, apologists for the state security apparatus are predictably hitting the airwaves. Some are even 'glad' the NSA has been doing this. A major point they emphasize is that the content of calls have remained private and it is only the metadata that they're interested in. But given how much one can tell from interpersonal connections, does the surveillance only represent "modest encroachments on privacy"? It is easy enough to imagine how metadata on phone calls made to and from a medical specialist could be more revealing than we'd like. But social network analysis can reveal far more. Duke sociologist Kieran Healy, in a light-hearted but telling article, shows how one father of the American Revolution could have been identified using the simplest tools of social network analysis and only a limited dataset.

In practice, failures in system development, like unemployment in Russia, happens a lot despite official propaganda to the contrary. -- Paul Licker