Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Submission Uber raided by Dutch authorities, seen as "criminal organization"->

An anonymous reader writes: Uber offices in Amsterdam, the Netherlands have been raided by Dutch authorities, as reported by several local media sources (here in dutch or google-translated). This follows intimidatory deterrence practices in that country, with Uber drivers being fined in the past months, and fresh allegations that the company would act as a "criminal organization" by offering a platform for taxi rides without license (read: without the authorities earning money from the practice). Time to leave the Netherlands and move your tech-company European offices elsewhere?
Link to Original Source

Submission Carly Fiorina: I Supplied HP Servers for NSA Snooping

Motherfucking Shit writes: According to an article at Motherboard, shortly after 9/11, NSA director Michael Hayden requested extra computing power and Carly Fiorina, then CEO of HP, responded by re-routing truckloads of servers to the agency. Fiorina acknowledged providing the servers to the NSA during an interview with Michael Isikoff in which she defended warrantless surveillance (as well as waterboarding) and framed her collaboration with the NSA in patriotic terms. Fiorina’s compliance with Hayden’s request for HP servers is but one episode in a long-running and close relationship between the GOP presidential hopeful and US intelligence agencies.

Submission SPAM: True Stories by Methamphetamine: Eugene Oregon (25SEP15)

sckirklan writes: Original Source

Eugene police were called to a convenience store at 1:24 a.m. about the incident. Officers found Ryan Nicholas Garner, who has no known address, sitting on a nearby park bench, still holding the large stick. Police said as they approached, they could see Garner repeatedly taking off his shirt and putting it back on. Once Garner spotted the officers, he allegedly charged at them, screaming and taking a fighting stance. Then, while officers called for backup, he allegedly began removing all of his clothing.

Submission True Stories by Methamphetamine: Carthage Missouri (28SEP14)->

sckirklan writes: Original Source

According to a sworn statement from CPD investigators, the victim told police that earlier on Tuesday he was given $80 to buy drugs, but the seller gave him fake drugs and he didn't figure that out until after the sale. He couldn't find the person who sold him the fakes and couldn't find drugs to replace the fakes, then he started receiving threatening text messages from a phone number he was not familiar with saying he owed that person $80 and needed to pay or they would have their sons find him.

Link to Original Source

Submission Google and NASA are getting a new quantum computer->

sckirklan writes:

The famous Quantum Artificial Intelligence Lab is getting some powerful new hardware. A joint project between Google, NASA, and the Universities Space Research Association, the Quantum AI Lab today announced a multi-year agreement to install a D-Wave 2X, a state-of-the-art quantum processor released earlier this year. With over 1,000 qubits, the machine is the most powerful computer of its kind, and will be put to work tackling difficult optimization problems for both Google and NASA.

Link to Original Source

Submission Quantum Computing Kills Encryption->

szczys writes: Quantum computers are going to happen and in the near future too: 10-30 years away. When the quantum computing revolution does take hold, almost all of our currently known encryption techniques will be void. The doom and gloom of this isn't that encryption will be non-existant, one would assume that better computers will bring with them better encryption algorithms. What is chilling about this revelation is that our data is already being harvested and archived in various ways. What you think is encrypted safely today may become an open book tomorrow. Elliot Williams makes a great point:

Anyone storing your (or your government’s) data now will likely be able to read it when today’s toddler is enrolling in college.

Link to Original Source

Submission How the FBI Hacks around Encryption->

Advocatus Diaboli writes: To hear FBI Director James Comey tell it, strong encryption stops law enforcement dead in its tracks by letting terrorists, kidnappers and rapists communicate in complete secrecy. But that’s just not true. In the rare cases in which an investigation may initially appear to be blocked by encryption — and so far, the FBI has yet to identify a single one — the government has a Plan B: it’s called hacking.

Hacking — just like kicking down a door and looking through someone’s stuff — is a perfectly legal tactic for law enforcement officers, provided they have a warrant. And law enforcement officials have, over the years, learned many ways to install viruses, Trojan horses, and other forms of malicious code onto suspects’ devices. Doing so gives them the same access the suspects have to communications — before they’ve been encrypted, or after they’ve been unencrypted.

Link to Original Source

Submission IoT In The Warehouse - How Amazon's Robots Move Everything Around

dkatana writes: Amazon's drones have a long way to become reality, but the real magic of the Internet of Things (IoT) is already happening at Amazon's vast fulfillment warehouses in the US.

Amazon runs a fleet of thousands of small robots moving storage pods around so orders can be fulfilled in record time. They are so efficient that they can move an entire warehouse and have ready to operate again during the weekend.

All together the small robots have traveled over 93 million miles — almost the distance from Earth to the Sun.

Submission Creative Wired editor's take on John Deere's DMCA madness->

sckirklan writes: This guy isn't creative and hopes whomever looks through these is and makes adjustments... Basically, Microsoft is to John Deere as Windows/Office/etc is to the tractor. Thanks for your dollars, it's ours but you can use it. Next we put soil moisture/ph sensors in your field and say you don't own it but if you pay taxes you can use it, btw that was in your eula when you bought your, err our tractor (or we updated it just because we can and you agree to it because you already agreed to it.)
Link to Original Source

Submission Crooks install keyloggers while working temp jobs, then steal from the IRS->

McGruber writes: The Atlanta Journal Constitution newspaper has the story ( of accused identify thief Erkes Antwon Green, whom the Atlanta Police Department believes is part of an identity theft ring. Police arrested Green on Feb. 28 on bank fraud charges, saying Green allegedly opened a SunTrust bank account online using a stolen ID, deposited a stolen check for $46,000 and was able to get about $14,000 from the ATM before the bank realized that the check was no good.

Green profited by filing false tax returns, a type of scam that slashdot reported on back in August ( According to Detective Ken Stapler with the Atlanta Police Department’s major fraud unit, Green either filed or attempted to file bogus income tax returns in the name of some 150 or more victims, mostly from Georgia and Florida. When he was arrested, Green was driving a $60,000 Mercedes E-550 that he had purchased with a stolen identity. Police believe Green used keystroke grabbers to obtain personal identity information. According to Detective Stapler, “You plug this thing into the back of a computer where the USB cable would go. He can leave it there for as long as he wants, and nobody’s going know unless they look on the back of their computer.”

Detective Stapler also says “A lot of times, what these people do is get hired on with a temp agency. A temp agency may work in an office building cleaning up after hours. Once (one of the would-be ID thieves) gets in the door, he’s got access to those computers. Anytime nobody is looking, he could put the keystroke grabber on.”

Link to Original Source

Submission Another arrested in Japan for using anonymous P2P->

renrutal writes: "A 43-year-old man is the second known person arrested in Japan for using Perfect Dark to share copyrighted material in its encrypted P2P network.

According to the [Kyoto-based] High-Tech Crime Task Force, the Okayama police, and the Saga police, the Osaka-based suspect uploaded about a thousand files, including anime. The suspect admitted that he thought he would not get caught because he was using Perfect Dark.

Perfect Dark is the third generation of japanese anonymous P2P network clients, developed with the intent to fix the security flaws found in its predecessors Winny and Share, in spite of also adopting a "Secure through Obscurity" closed-source model. In 2004, Winny's developer, Isamu Kaneo, was charged 1.5 million yen for assisting in copyright infringement, but he was acquited last October. Since 2008, at least 15 people were arrested in Japan suspect of uploading copyrighted material to those "secure" networks."
Link to Original Source

"Open the pod bay doors, HAL." -- Dave Bowman, 2001