Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment: While I'm not agreeing with discrimination... (Score 1) 338

by Virtucon (#49542143) Attached to: Median Age At Google Is 29, Says Age Discrimination Lawsuit

I just have to wonder why we're all amazed as jobs get moved overseas with all the posturing, extortion and lawsuits that go on against companies. I mean if Google did it, then shame on them but if I had Jesse Jackson and Al Sharpton doing their shakedown dance along with age, sex and X discrimination suits, it's no wonder that more jobs are being pushed overseas. On one side I praise businesses that are keeping jobs here and also saying "more power to you" in the face of all this litigation and extortion. Businesses, you shouldn't discriminate, ever. As soon as you learn this then you won't be getting taken to the cleaners either by plaintiffs or your own legal defense team or both.

Comment: Enabling technologies and law (Score 1) 65

by Virtucon (#49538941) Attached to: New Privacy Concerns About US Program That Can Track Snail Mail

The metadata collection of mail, or specifically knowing senders, receivers and dates of communication etc. has long been known as a law enforcement tool. The contents of private correspondence has been protected not only by the fourth amendment but also affirmed in 1878 ex parte Jackson:

a distinction is to be made between different kinds of mail matter -- between what is intended to be kept free from inspection, such as letters, and sealed packages subject to letter postage, and what is open to inspection, such as newspapers, magazines, pamphlets, and other printed matter purposely left in a condition to be examined. Letters and sealed packages of this kind in the mail are as fully guarded from examination and inspection, except as to their outward form and weight, as if they were retained by the parties forwarding them in their own domiciles. The constitutional guaranty of the right of the people to be secure in their papers against unreasonable searches and seizures extends to their papers, thus closed against inspection, wherever they may be. Whilst in the mail, they can only be opened and examined under like warrant, issued upon similar oath or affirmation, particularly describing the thing to be seized, as is required when papers are subjected to search in one's own household. No law of Congress can place in the hands of officials connected with the postal service any authority to invade the secrecy of letters and such sealed packages in the mail; and all regulations adopted as to mail matter of this kind must be in subordination to the great principle embodied in the Fourth Amendment of the Constitution.

Of course based on reasonable suspicion law enforcement could always obtain warrants or with the help of postal inspectors focus in on one group or hierarchy of mail delivery to focus in on collecting this metadata. The protection for criminals conducting illegal activities was that there was so much mail that it would be hard to filter through it unless suspicious activity was observed. The FBI under Hoover however took it a bit further and intercepted mail and examined it without warrants under the guise of "counter intelligence." The Church Committee found:

Too many people have been spied upon by too many Government agencies and too much information has been illegally collected. The Government has often undertaken the secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power. The Government, operating primarily through secret and biased informants, but also using other intrusive techniques such as wiretaps, microphone "bugs", surreptitious mail opening, and break-ins, has swept in vast amounts of information about the personal lives, views, and associations of American citizens. Investigations of groups deemed potentially dangerous—and even of groups suspected of associating with potentially dangerous organizations—have continued for decades, despite the fact that those groups did not engage in unlawful activity.

So, the NSA and it's surreptitious activities are nothing new to the Feds.

With the advent of OCR technology now you could sort the mail faster, 1000s of times faster than before but the side benefit was that huge amounts of metadata could be easily collected and it didn't require warrants or suspicions. Since sending letters requires another party, the Third Party Doctrine and in 1967 the Supreme Court in Katz v. US established a test to determine if when a person could assume that their communications were private:

1) "The Government's activities in electronically listening to and recording the petitioner's words violated the privacy upon which he justifiably relied while using the telephone booth and thus constituted a 'search and seizure' within the meaning of the Fourth Amendment." – Justice Stewart[1]
        2) Regardless of the location, a conversation is protected from unreasonable search and seizure under the Fourth Amendment if it is made with a "reasonable expectation of privacy".
        3) Wiretapping counts as a search (physical intrusion is not necessary).

Then in 1979, Smith v. Maryland, the Supreme Court ruled a pen search wasn't something that fell under the 4th ammendement. It further ruled:

Electronic equipment is used not only to keep billing records of toll calls, but also "to keep a record of all calls dialed from a telephone which is subject to a special rate structure."

Or as I read it "We live in the modern world, there's going to be records kept for billing that require tracking information or metadata"

So there you have the logical justification for mass collection of metadata, especially that as held by third parties including the US Postal Service which can now track all mail and provide huge metadata dumps to any government agency who wants them.

What has to happen is that third party doctrine needs to be constitutionally amended to include data we give to third parties. Third party doctrine also needs to include information shared to other Third Parties without your knowledge, which is what Facebook, Google, Intelius and other companies are all about.

Comment: Well then.. (Score 1, Funny) 196

by Virtucon (#49524259) Attached to: Concerns of an Artificial Intelligence Pioneer

"Our AI systems must do what we want them to do."

Then you probably shouldn't have chosen LISP then to indoctrinated AI students then, should you? Note: Stuart's and Norvig's AI book are one of the defacto references, I have read it cover to cover and anybody in CS should read it even if they aren't planning on working in AI.

Comment: Re:Those skeletons don't like daylight (Score 2) 163

The problem is American Revolution 2.0 will be viewed as a terrorist attack in today's political and cultural environment. It would be better if state governments took the lead to reign in the political issues at the Federal level. I'm not saying that States don't have their own corruption problems but their leverage would be more substantial than that of the general population rather than a bunch of crackpots flying gyrocopters onto the capital mall.

Comment: Re:So Musk renegged (Score 2) 118

No it won't business deals fail all of the time. Remember the Sprint/T-Mobile merger? It failed. Previously AT&T's attempt at buying T-Mobile also failed and Deutsche Telekom received a hefty premium for AT&T dropping the deal.

As per the original acquisition agreement, Deutsche Telekom will receive $3 billion in cash as well as access to $1 billion worth of AT&T-held wireless spectrum.

So there may or may not have been a penalty associated with this deal not going through, the article doesn't discuss this.

Comment: shit is it that bad already? (Score 1) 84

by Virtucon (#49507469) Attached to: Google To Propose QUIC As IETF Standard

From the summary:

UDP is significantly more lightweight than TCP, but in return, it features far fewer error correction services than TCP. ... That's why UDP is great for gaming services.

Stateful vs. Stateless, Connection Oriented vs Connectionless. These are all at the core of TCP/IP and specifically TCP vs. UDP and the reliability contract that each protocol provides. It's not that "one's better than the other at error correction."

Comment: Re:New York (Score 1) 238

“Legislators say, `Look, New York is a center of world commerce. Businesses have to be here. It doesn’t matter how high we tax them.’ I hear that a lot. But when you apply that same logic to upstate, the impact is devastating.”

and that's why the Startup-NY is a failure. despite tax incentives employees have to live somewhere and they would be taxed disproportionately vs. the company then when the incentives expire the company gets slapped. That's not a startup friendly environment, not by a long shot.

Real Programmers don't write in FORTRAN. FORTRAN is for pipe stress freaks and crystallography weenies. FORTRAN is for wimp engineers who wear white socks.