Become a fan of Slashdot on Facebook


Forgot your password?

+ - Google Tips Off Police To Child Porn Transmitted Using Gmail->

Submitted by SonicSpike
SonicSpike (242293) writes "A Houston man has been arrested after Google sent a tip to the National Center for Missing and Exploited Children saying the man had explicit images of a child in his email, according to Houston police.

The man was a registered sex offender, convicted of sexually assaulting a child in 1994, reports Tim Wetzel at KHOU Channel 11 News in Houston.

"He was keeping it inside of his email. I can't see that information, I can't see that photo, but Google can," Detective David Nettles of the Houston Metro Internet Crimes Against Children Taskforce told Channel 11.

After Google reportedly tipped off the National Center for Missing and Exploited Children, the center alerted police, who used the information to get a warrant.

A search of the man's other devices revealed more suspicious images and text messages. Police arrested him and he's being held on a $200,000 bond.

On one hand, most people would certainly applaud the use of technology to scan email in a case like this.

On the other, debate rages about how much privacy users can expect when using Google's services like email. In a word: none.

A year ago, in a court brief, Google said as much. Then, in April, after a class-action case against Google for email scanning fell apart, Google updated its terms of service to warn people that it was automatically analyzing emails .

Considering Google has been working to fight online child sexual abuse since 2006, it stands to reason the company would scan emails looking for those sorts of images. Google has never come right out and said so, but hinted strongly at it about a year ago when Jacquelline Fuller, director of Google Giving, specifically mentioned the National Center's "CyberTipline" in a blog post . The CyberTipline receives leads and tips regarding suspected crimes."

Link to Original Source

+ - The high-tech warfare behind the Israel - Hamas conflict->

Submitted by Taco Cowboy
Taco Cowboy (5327) writes "The Israel — Hamas conflict in Gaza is not only about bombs, missiles, bullets, but also about cyberwarfare, battles of the mind over social media, smart underground tunnels and cloud-based missile launching systems

The tunnels that Hamas has dug deep beneath Gaza are embedded with high tech gadgets, courtesy of Qatar, which has funded Hamas with billions to equipped their tunnels with intelligent sensors which are networked to control centers enabling the command and control staff to quickly notify operatives nearby that IDF units are advancing inside a certain tunnel, allowing for rapid deployment of attack units and the setting up of bobby traps inside the tunnel

In addition, Hamas has automated its rocket firing system using networked, cloud-based launching software provided by Qatar which can set off a rocket from any distance, and set them to go off at a specific time, using timers. “Anyone who thinks they have dozens of people sitting next to launchers firing rockets each time there is a barrage is mistaken,” said Aviad Dadon, a senior cyber-security adviser at several Israeli government ministries

While Doha is allowing Hamas to use its technology to fight Israel, it’s their own cyber-security the leaders of Qatar are worried about. For the Qataris, the war between Israel and Hamas is a proving ground to see how their investments in cyber systems have paid of — Qatar is very worried that one of its Gulf rivals — specifically Saudi Arabia — will use technology to attack it, and Qatar spends a great deal of money each year on shoring up its cyber-technology"

Link to Original Source

Comment: A degree gives you a systematic, broad education (Score 1) 504

I've seen too much poorly-written code to accept the statements that you don't need a degree to code well. It is true that you can write code that works without getting a broader CS education, much like you can do your own wiring or plumbing in your house. Much of the time, things will work. But then, one time your incorrect wire gauge will start a fire that can burn down your house, or (more likely in the business world) the house of the poor shmuck who bought the house from you (or inherited your code). I wouldn't hire someone who does not have a broad and systematic introduction to computer science.

+ - 439 Fewer Ways to Hate Bank of America

Submitted by theodp
theodp (442580) writes "Haters of Bank of America and CEO Brian Moynihan now have 439 fewer ways to express their disdain for the bank. In recent days, at least 439 domain names that are critical of BofA’s top officials were taken off the market. The registrations of the domain names, which include imaginative swipes at the bank's CEO, such as and, will stop BofA-haters from slamming the bank's top execs and directors with a couple of very specific pejoratives. Companies have made it a practice to scoop up negative web addresses that might be used by disgruntled customers, but this domain name buy is unusual in that it focuses on BofA's directors and corporate officers rather than the corporate brand. In other BofA news, a cloud of suspense surrounds Bank of America and WikiLeaks amidst speculation that BofA may be the next target of Julian Assange."

+ - Licensing books

Submitted by arit
arit (1338477) writes "I recently got a review copy of a book from a publisher with the following note "Evaluation copies are provided to qualified academics ... for review purposes only ... These copies are licensed and may not be sold or transferred to a third party." Has anyone heard of licensing books (as opposed to software)? If it is valid, why hasn't anyone tried this before to limit first-sale privileges?"

+ - Computing Pioneer Thacker to Win Turing Award->

Submitted by btcoal
btcoal (1693074) writes "The Wall Street Journal has a profileof Charles Thacker, of Alto fame. It reads, "The Association for Computing Machinery on Tuesday is naming Thacker the latest recipient of the A.M. Turing award, which comes with $250,000 and carries prestige akin to a Nobel Prize in the industry. Thacker is being recognized largely for the Alto, a machine developed in 1974 at Xerox’s famed Palo Alto Research Center that is often called the world’s first personal computer. The ACM is also citing Thacker’s contributions at Xerox PARC to the invention of Ethernet–the most widely used technology for local networks–as well as work on tablet-style computers since becoming a researcher at Microsoft in the 1990s.

'This guy is a real genius,' says Alan Kay, a researcher who worked with Thacker at PARC and a fellow Turing award winner. 'We don’t like to sling that word around in our field, but he is one. He is magic.'""

Link to Original Source

+ - Which smartphone keyboard is the best?-> 1

Submitted by Barence
Barence (1228440) writes "A debate that crops up time and again is whether it’s better to have a dedicated keyboard on your smartphone or whether an on-screen keyboard with text correction is adequate. Some phones with screen-based keyboards have started to provide tactile feedback, either using an ultra-quick spin of their vibration alert or, like the BlackBerry Storm2, using clever piezo-electric technology to simulate the feel of a button press. But which system works best? PC Pro's Paul Ockendon gathered six of the most popular handsets around and put them through a timed typing test to see which proved quickest and most typo-free."
Link to Original Source

+ - FBI: Suspect wanted to cyber-bomb insruance co. ->

Submitted by coondoggie
coondoggie (973519) writes "Threatening e-mails, false public statements and spam were all part of a California man's cyber-extortion plan against the New York Life insurance company, according to the FBI. The FBI said it arrested Anthony Digati of Chino, California on March 6, 2010, on charges of attempting to extort approximately $200,000 — which would go to $3 million if the firm didn't comply in time — from a New York-based insurance company which was later identified as New York Life. Digati allegedly threatened to make false public statements and blast computer spam in an effort to damage the reputation of the company and cost it millions of dollars in revenue."
Link to Original Source

+ - SPAM: IBM to research mobile access for aged, illiterate

Submitted by alphadogg
alphadogg (971356) writes "IBM is teaming with researchers in academic institutions in Japan and India to explore an open, common user interface for mobile devices that will make them easier for aged or illiterate people around the world to use. The company is doing the research with the National Institute of Design in India and the Research Center for Advanced Science and Technology at the University of Tokyo.

The findings of the research and any applications or technology developed will be released to the open-source community, said Nitendra Rajput, Open Collaborative Research lead at IBM Research India."

Link to Original Source

+ - HTC Google Phones Preinstalled with Malware->

Submitted by Trailrunner7
Trailrunner7 (1100399) writes "Security researchers have found that Vodafone, one of the world's larger wireless providers, is distributing some HTC phones with malware pre-installed on them. The phone, the HTC Magic, runs the Google Android mobile operating system, and is one of the more popular handsets right now. A researcher at Panda Software received one of the handsets recently, and upon attaching it to her PC, found that the phone was pre-loaded with the Mariposa bot client. Mariposa has been in the news of late thanks to some arrests connected to the operation of the botnet."
Link to Original Source

To restore a sense of reality, I think Walt Disney should have a Hardluckland. -- Jack Paar