Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×

Comment Re:Murder is a petty crime? (Score 1) 211

The one example the summary gives is murder because that was the most egregious attempt at covering up the Stingray's use. The examples of smaller crimes begin in the first sentence of the article.

BALTIMORE - The crime itself was ordinary: Someone smashed the back window of a parked car one evening and ran off with a cellphone. What was unusual was how the police hunted the thief.

There are a few more.

Police in Tallahassee used their stingray to track a woman wanted for check forging [...] Tacoma, Wash., police used theirs to try to find a stolen city laptop [...] Other departments have acknowledged that they planned to use their stingrays for solving street crimes.

And they're not just going after suspects; if you might have witnessed a robbery, your phone is apparently fair game, too!

Usually they were searching for suspects, but occasionally, the records show they used the devices to track down witnesses. The most common use by far was solving robberies.

Comment Re:Federal law (chap 206) says a court order is re (Score 1) 211

Except YOUR device explicitly connects to their tower and tells them everything.

If I pick up a tapped or pen-registered landline phone and start dialing, my device is explicitly sending a series of tones that tells them everything, but they need a warrant to use that equipment. Why should it be any different just because we're discussing cellphones instead of landlines? "But, it's [new technology]!" does not obviate the need for a warrant.

Comment Re:Can't trust LOCKS anymore (Score 1) 89

It's like governments have abrogated their duty to protect people from this kind of shit and companies like Uber and Lenovo are having a field day.

Governments love this shit. The more data Uber and Lenovo and Samsung and Spotify collect about you, the more data the government can subpoena (or just take without a subpoena). These companies have become, in effect, agents of the government.

Comment Re:Is "Snowden document" a new English word now? (Score 1) 54

I remember read it somewhere that many later leaking documents only named after Snowden to cover the real sources.

We can reasonably assume that any documents containing dates or references beyond June 2013 didn't come from Snowden. He himself denies providing the documentation of NSA's spying on Angela Merkel. Bruce Schneier has a blog entry making the case for multiple individuals. It seems likely to me that there are at least three, counting Snowden (and not counting Manning).

In any event, the NYT article about the latest set of documents says "AT&T's cooperation has involved a broad range of classified activities, according to the documents, which date from 2003 to 2013" and goes on to explicitly source them to Snowden.

Comment Re:Forced Updates-- What could POSSIBLY go wrong? (Score 3, Insightful) 203

I'm sick and tired of seeing that a new version of an app is available, and the sole contents of what the update changes is "bug fixes."

Well if they were honest and said "Fixed more edge cases where ads weren't displaying" or "Increased the frequency of GPS coordinate tracking," nobody would install the update...

Comment Re:Challenge accepted (Score 1) 134

No kidding, reminds me of the LifeLock CEO putting his social security number on billboards claiming nobody can steal his identity. It's been stolen, what, 13 times now? I'd never heard of this Hirshon fellow but now he's painted a giant bullseye on himself, Streisand-style. Everyone who encounters him is going to be sneaking a photo.

Comment Re:Deny access (Score 1) 74

The precedent was set long ago. ISPs regularly disconnect customers whose systems are spewing out spam email, participating in DDoS attacks, etc. The approach varies a bit depending upon the provider and the client's service level; consumers will usually be cut off without warning and enterprise connections might get a phone call or email first, but responsible providers act quickly on abuse complaints. Irresponsible providers often find themselves losing various bits of connectivity to the rest of the world.

Imagine malware which downloads porn, and you deny internet access to everyone who downloads porn because they must be "infected"

Maybe in the UK or Iran, but that isn't a net abuse issue, it's an issue of oppressive government.

Do you suffer painful elimination? -- Don Knuth, "Structured Programming with Gotos"