DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×
Government

Terrifying Anti-Riot Vehicle Created To Quash Any Urban Disturbance (boingboing.net) 101

"Are you an urban police force thinking about how to control your fellow humans?" jokes Cory Doctorow. "Look no farther! Your pals at Bozena have an all-new RIOT system, a crowd-control killdozer for all your protest-suppressing needs!" He's one of several web commentators marveling at the marketing copy for a Slovenian company's new anti-riot machinery, also spotted by Slashdot reader drunkdrone. Some quotes from the BOZENA RIOT SYSTEM site about the device's features:
  • Easy attachable bulldozer blade.
  • The [6,600 pound] shield comes equipped with launching ports designed for use of guns or other rubber projectiles launchers.
  • The trailer is capable of displacing the water/foam or its mixtures (available additives: pepper or painting substances) under the high pressure into the distance of several dozen meters.
  • Communication with rioters through the loudspeakers.
  • Designed to control riots in streets and urbanized areas...intended predominantly for the special military and police units responsible for the CROWD CONTROL during the violent political/social demonstrations, against football hooligans, etc.

Businesses

Comcast Launches New 24/7 Workplace Surveillance Service (philly.com) 117

America's largest ISP just rolled out a new service that allows small and medium-sized business owners "to oversee their organization" with continuous video surveillance footage that's stored in the cloud -- allowing them to "improve efficiency." An anonymous reader quotes the Philadelphia Inquirer: Inventory is disappearing. Workplace productivity is off. He said/she said office politics are driving people crazy. Who you gonna call...? Comcast Business hopes it will be the one, with the "SmartOffice" surveillance offering formally launched this week in Philadelphia and across "70 percent of our national [internet] service footprint," said Christian Nascimento, executive director of premise services for the Comcast division. Putting a "Smart Cities" (rather than "Big Brother is watching you") spin on "the growing trend for...connected devices across the private and public sectors," the SmartOffice solution "can provide video surveillance to organizations that want to monitor their locations more closely," Nascimento said...
The surveillance cameras are equipped with zoom lenses, night-vision, motion detection, and wide-angle lenses, while an app allows remote access to the footage from smartphones and tablets (though the footage can also be downloaded, or stored online for up to a month). Last year Comcast was heavily involved in an effort to provide Detroit's police department with real-time video feeds from over 120 local businesses, which the mayor said wouldn't have been successful "Without the complete video technology system Comcast provides."
Privacy

'Why The US Senate's Vote To Throw Out ISP Privacy Laws Isn't All Bad' (technologyreview.com) 93

"Nobody wants their data spread far and wide," write two associate editors at MIT Technology Review, "but the FCC's rules were an inconsistent solution to a much larger problem." An anonymous reader writes: They point out the rules passed in October "weren't even yet in effect," but more importantly -- they only would've applied to ISPs. "[T]he reality is that the U.S. doesn't have a baseline law that governs online privacy," and the truth is, it never did. "The FCC's new privacy rules would have been dramatic, to be sure -- but they would only have addressed one piece of the problem, leaving companies like Facebook and Google free to continue doing much the same thing.
While the repeal still needs approval in the U.S. House of Representatives and the president's signature, their article argues that what's really needed is "a more consistent approach to privacy."
Transportation

Uber Halts Self-Driving Car Tests in Arizona After Friday Night Collision (businessinsider.com) 197

"Given that the Uber vehicle has flipped onto its side it looks to be a high speed crash," writes TechCrunch, though Business Insider reports that no one was seriously injured. An anonymous reader quotes their report: A self-driving Uber car was involved in an accident on Friday night in Tempe, Arizona, in one of the most serious incidents to date involving the growing fleet of autonomous vehicles being tested on U.S. roads... Uber has halted its self-driving-car pilot in Arizona and is investigating what caused the incident... A Tempe police spokesperson told Bloomberg that the Uber was not at fault in the accident and was hit by another car which failed to yield. Still, the collision will likely to turn up the temperature on the heated debate about the safety of self-driving cars.
Government

After Healthcare Defeat, Can The Trump Administration Fix America's H-1B Visa Program? (bloomberg.com) 399

Friday the Trump administration suffered a political setback when divisions in the president's party halted a move to repeal healthcare policies passed in 2010. But if Trump hopes to turn his attention to how America's H-1B visa program is affecting technology workers, "time is running out," writes Slashdot reader pteddy. Bloomberg reports: [T]he application deadline for the most controversial visa program is the first week of April, which means new rules have to be in place for that batch of applicants or another year's worth of visas will be handed out under the existing guidelines... There probably isn't enough time to pass legislation on such a contentious issue. But Trump could sign an executive order with some changes. The article points out that under the current system, one outsourcing firm was granted 6.5 times as many U.S. visas as Amazon. There's also an interesting map showing which countries' workers received the most H-1B visas in 2015 -- 69.4% went to workers in India, with another 10.5% going to China -- and a chart showing which positions are most in demand, indicating that two-thirds of the visa applications are for tech workers.
Crime

Indiana's Inmates Could Soon Have Access To Tablets (abc57.com) 120

An anonymous reader quotes a report from ABC57 News in South Bend, Indiana: Indiana is looking to help offenders who are behind bars. Soon, each inmate in the Hoosier state could have their own tablet. The Indiana Department of Correction says the tablet will help inmates stay connected with their families and improve their education. Offenders will be able to use the tablets to access any classwork, self-help materials or entertainment. Officials expect to use entertainment, like music or movies, to reward good behavior. The proposal was first filed in January. Apple iPad's or kindles won't be used. Instead, a company that makes tablets specifically for prisons or jails will be hired. One San Francisco based-company they may consider, Telmate, has a device that is used in more than 20 states, including some jails in Marshall County. INDOC is hoping a vendor will front the costs of the entertainment apps so taxpayers won't have to. INDOC also says it wants to avoid charging inmate fees because charging fees that they can't afford would defeat the purpose of the system. If the company selected pays, the vendor would be reimbursed and still earn a profit.
Printer

Why You Should Care About the Supreme Court Case On Toner Cartridges (consumerist.com) 209

rmdingler quotes a report from Consumerist: A corporate squabble over printer toner cartridges doesn't sound particularly glamorous, and the phrase "patent exhaustion" is probably already causing your eyes to glaze over. However, these otherwise boring topics are the crux of a Supreme Court case that will answer a question with far-reaching impact for all consumers: Can a company that sold you something use its patent on that product to control how you choose to use after you buy it? The case in question is Impression Products, Inc v Lexmark International, Inc, came before the nation's highest court on Tuesday. Here's the background: Lexmark makes printers. Printers need toner in order to print, and Lexmark also happens to sell toner. Then there's Impression Products, a third-party company makes and refills toner cartridges for use in printers, including Lexmark's. Lexmark, however, doesn't want that; if you use third-party toner cartridges, that's money that Lexmark doesn't make. So it sued, which brings us to the legal chain that ended up at the Supreme Court. In an effort to keep others from getting a piece of that sweet toner revenue, Lexmark turned to its patents: The company began selling printer cartridges with a notice on the package forbidding reuse or transfer to third parties. Then, when a third-party -- like Impression -- came around reselling or recycling the cartridges, Lexmark could accuse them of patent infringement. So far the courts have sided with Lexmark, ruling that Impression was using Lexmark's patented technology in an unauthorized way. The Supreme Court is Impression's last avenue of appeal. The question before the Supreme Court isn't one of "can Lexmark patent this?" Because Lexmark can, and has. The question is, rather: Can patent exhaustion still be a thing, or does the original manufacturer get to keep having the final say in what you and others can do with the product? Kate Cox notes via Consumerist that the Supreme Court ruling is still likely months away. However, she has provided a link to the transcript of this week's oral arguments (PDF) in her report and has dissected it to see which way the justices are leaning on the issue.
China

Microsoft Delivers Secure China-Only Cut of Windows 10 (theregister.co.uk) 95

Earlier this week, CEO of Microsoft Greater China, Alain Crozier, told China Daily that the company is ready to roll out a version of Windows 10 with extra security features demanded by China's government. "We have already developed the first version of the Windows 10 government secure system. It has been tested by three large enterprise customers," Crozier said. The Register reports: China used Edward Snowden's revelations to question whether western technology products could compromise its security. Policy responses included source code reviews for foreign vendors and requiring Chinese buyers to shop from an approved list of products. Microsoft, IBM and Intel all refused to submit source code for inspection, but Redmond and Big Blue have found other ways to get their code into China. IBM's route is a partnership with Dalian Wanda to bring its cloud behind the Great Firewall. Microsoft last year revealed its intention to build a version of Windows 10 for Chinese government users in partnership with state-owned company China Electronics Technology Group Corp. There's no reason to believe Crozier's remarks are incorrect, because Microsoft has a massive incentive to deliver a version of Windows 10 that China's government will accept. To understand why, consider that China's military has over two million active service personnel, the nation's railways employ similar numbers and Microsoft's partner China Electronics Technology Group Corp has more than 140,000 people on its books. Not all of those are going to need Windows, but plenty will.
Businesses

South Korea Finds Qualcomm Prevented Samsung From Selling Its Exynos Processors (digitaltrends.com) 12

According to the South Korea Trade Commission (SKTC), Qualcomm prevented Samsung from selling its Exynos processors to various third-party phone manufacturers. "The Commission's report claims that Qualcomm abused its standard-essential patents -- which define technical standards like Wi-Fi and 4G -- to prevent Samsung from selling its modems, integrated processors, and other chips to smartphone makers like LG, Huawei, Xiaomi, and others," reports Digital Trends. "The Commission reportedly threatened to file suit against Samsung, which had agreed to license the patents for an undisclosed sum, if the South Korean electronics maker began competing against it in the mobile market." From the report: That bullying ran afoul of the South Korea Trade Commission's rules, which require that standard-essential patents be licensed on fair, reasonable, and non-discriminatory (FRAND) terms. "Samsung Electronics has been blocked from selling its modem chips to other smartphone manufacturers due to a license deal it signed with Qualcomm," the commissioners wrote. The report provides legal justification for the $853 million fine the SKTC placed on Qualcomm in December for "anti-competitive practices." Qualcomm intends to appeal. "[We] strongly disagree with the KFTC's announced decision, which Qualcomm believes is inconsistent with the facts and the law, reflects a flawed process, and represents a violation of due process rights owed American companies" under an applicable agreement between the U.S. and South Korea.
Patents

Judge: eBay Can't Be Sued Over Seller Accused of Patent Infringement (arstechnica.com) 35

An anonymous reader quotes a report from Ars Technica: It's game over for an Alabama man who claims his patent on "Carpenter Bee Traps" is being infringed by competing products on eBay. Robert Blazer filed his lawsuit in 2015, saying that his U.S. Patent No. 8,375,624 was being infringed by a variety of products being sold on eBay. Blazer believed the online sales platform should have to pay him damages for infringing his patent. A patent can be infringed when someone sells or "offers to sell" a patented invention. At first, Blazer went through eBay's official channels for reporting infringement, filing a "Notice of Claimed Infringement," or NOCI. At that point, his patent hadn't even been issued yet and was still a pending application, so eBay told him to get back in touch if his patent was granted. On February 19, 2013, Blazer got his patent and ultimately sent multiple NOCI forms to eBay. However, eBay wouldn't take down any items, in keeping with its policy of responding to court orders of infringement and not mere allegations of infringement. In 2015, Blazer sued, saying that eBay had directly infringed his patent and also "induced" others to infringe. That lawsuit can't move forward, following an opinion (PDF) published this week by U.S. District Judge Karon Bowdre. The judge found that eBay lacked any knowledge of actual infringement and rejected Blazer's argument that eBay was "willfully blind" to infringement of Blazer's patent. The opinion was first reported yesterday by The Recorder (registration required).
Communications

T-Mobile Kicks Off Industry Robocall War With Network-Level Blocking and ID Tools (venturebeat.com) 76

T-Mobile is among the first U.S. telecom companies to announce plans to thwart pesky robocallers. From a report on VentureBeat: The move represents part of an industry-wide Robocall Strike Force set up by the Federal Communications Commission (FCC) last year to combat the 2 billion-plus automated calls U.S. consumers deal with each month. Other key members of the group include Apple, Google, Microsoft, and Verizon. T-Mobile's announcement comes 24 hours after the FCC voted to approve a new rule that would allow telecom companies to block robocallers who use fake caller ID numbers to conceal their true location and identity. From a report on WashingtonPost: The Federal Communications Commission on Thursday proposed new rules (PDF) that would allow phone companies to target and block robo-calls coming from what appear to be illegitimate or unassigned phone numbers. The rules could help cut down on the roughly 2.4 billion automated calls that go out each month -- many of them fraudulent, according to FCC Chairman Ajit Pai. "Robo-calls are the No. 1 consumer complaint to the FCC from members of the American public," he said, vowing to halt people who, in some cases, pretend to be tax officials demanding payments from consumers, or, in other cases, ask leading questions that prompt consumers to give up personal information as part of an identity theft scam.
Privacy

Some Of Hacker Group's Claims Of Having Access To 250M iCloud Accounts Aren't False (zdnet.com) 44

Earlier this week, a hacker group claimed that it had access to 250 million iCloud accounts. The hackers, who called themselves part of Turkish Crime Family group, threatened to reset passwords of all the iCloud accounts and remotely wipe those iPhones. Apple could stop them, they said, if it paid them a ransom by April 7. In a statement, Apple said, "the alleged list of email addresses and passwords appears to have been obtained from previously compromised third-party services," and that it is working with law enforcement officials to identify the hackers. Now, ZDNet reports that it obtained a set of credentials from the hacker group and was able to verify some of the claims. From the article: ZDNet obtained a set of 54 credentials from the hacker group for verification. All the 54 accounts were valid, based on a check using the site's password reset function. These accounts include "icloud.com," dating back to 2011, and legacy "me.com" and "mac.com" domains from as early as 2000. The list of credentials contained just email addresses and plain-text passwords, separated by a colon, which according to Troy Hunt, data breach expert and owner of notification site Have I Been Pwned, makes it likely that the data "could be aggregated from various sources." We started working to contact each person, one by one, to confirm their password. Most of the accounts are no longer registered with iMessage and could not be immediately reached. However, 10 people in total confirmed that their passwords were accurate, and as a result have now been changed.
Businesses

Amazon Wins $1.5 Billion Tax Dispute Over IRS (reuters.com) 76

Amazon.com on Thursday won a more than $1.5 billion tax dispute with the Internal Revenue Service over transactions involving a Luxembourg unit more than a decade ago. From a report: Judge Albert Lauber of the U.S. Tax Court rejected a variety of IRS arguments, and found that on several occasions the agency abused its discretion, or acted arbitrarily or capriciously. Amazon's ultimate tax liability from the decision was not immediately clear. The world's largest online retailer has said the case involved transactions in 2005 and 2006, and could boost its federal tax bill by $1.5 billion plus interest. It also said a loss could add "significant" tax liabilities in later years. Amazon made just $2.37 billion of profit in 2016, four times what it made in the four prior years combined, on revenue of $136 billion.
Government

US Ordered 'Mandatory Social Media Check' For Visa Applicants Who Visited ISIS Territory (theverge.com) 191

An anonymous reader quotes a report from The Verge: U.S. Secretary of State Rex Tillerson has ordered a "mandatory social media check" on all visa applicants who have ever visited ISIS-controlled territory, according to diplomatic cables obtained by Reuters. The four memos were sent to American diplomatic missions over the past two weeks, with the most recent issued on March 17th. According to Reuters, they provide details into a revised screening process that President Donald Trump has described as "extreme vetting." A memo sent on March 16th rescinds some of the instructions that Tillerson outlined in the previous cables, including an order that would have required visa applicants to hand over all phone numbers, email addresses, and social media accounts that they have used in the past. The secretary of state issued the memo after a Hawaii judge blocked the Trump administration's revised travel ban on citizens from six predominantly Muslim countries. In addition to the social media check, the most recent memo calls for consular officials to identify "populations warranting increased scrutiny." Two former government officials tell Reuters that the social media order could lead to delays in processing visa applications, with one saying that such checks were previously carried out on rare occasions.
Patents

Apple Explores Using An iPhone, iPad To Power a Laptop (appleinsider.com) 67

According to the U.S. Patent and Trademark Office, Apple has filed a patent for an "Electronic accessory device." It describes a "thin" accessory that contains traditional laptop hardware like a large display, physical keyboard, GPU, ports and more -- all of which is powered by an iPhone or iPad. The device powering the hardware would fit into a slot built into the accessory. AppleInsider reports: While the accessory can take many forms, the document for the most part remains limited in scope to housings that mimic laptop form factors. In some embodiments, for example, the accessory includes a port shaped to accommodate a host iPhone or iPad. Located in the base portion, this slot might also incorporate a communications interface and a means of power transfer, perhaps Lightning or a Smart Connector. Alternatively, a host device might transfer data and commands to the accessory via Wi-Fi, Bluetooth or other wireless protocol. Onboard memory modules would further extend an iOS device's capabilities. Though the document fails to delve into details, accessory memory would presumably allow an iPhone or iPad to write and read app data. In other cases, a secondary operating system or firmware might be installed to imitate a laptop environment or store laptop-ready versions of iOS apps. In addition to crunching numbers, a host device might also double as a touch input. For example, an iPhone positioned below the accessory's keyboard can serve as the unit's multitouch touchpad, complete with Force Touch input and haptic feedback. Coincidentally, the surface area of a 5.5-inch iPhone 7 Plus is very similar to that of the enlarged trackpad on Apple's new MacBook Pro models. Some embodiments also allow for the accessory to carry an internal GPU, helping a host device power the larger display or facilitate graphics rendering not possible on iPhone or iPad alone. Since the accessory is technically powered by iOS, its built-in display is touch-capable, an oft-requested feature for Mac. Alternatively, certain embodiments have an iPad serving as the accessory's screen, with keyboard, memory, GPU and other operating guts located in the attached base portion. This latter design resembles a beefed up version of Apple's Smart Case for iPad.
Businesses

The Compulsive Patent Hoarding Disorder (thehindu.com) 38

An anonymous reader shares an article: It takes money to make money. CSIR-Tech, the commercialisation arm of the Council of Scientific and Industrial Research (CSIR), realised this the hard way when it had to shut down its operations for lack of funds. CSIR has filed more than 13,000 patents -- 4,500 in India and 8,800 abroad -- at a cost of $7.6 million over the last three years. Across years, that's a lot of taxpayers' money, which in turn means that the closing of CSIR-Tech is a tacit admission that its work has been an expensive mistake -- a mistake that we tax-paying citizens have paid for. Recently, CSIR's Director-General Girish Sahni claimed that most of CSIR's patents were "bio-data patents", filed solely to enhance the value of a scientist's resume and that the extensive expenditure of public funds spent in filing and maintaining patents was unviable. CSIR claims to have licensed a percentage of its patents, but has so far failed to show any revenue earned from the licences. This compulsive hoarding of patents has come at a huge cost. If CSIR-Tech was privately run, it would have been shut down long ago. Acquiring Intellectual Property Rights (IPR) comes out of our blind adherence to the idea of patenting as an index of innovation. The private sector commercializes patents through the licensing of technology and the sale of patented products to recover the money spent in R&D. But when the funds for R&D come from public sources, mimicking the private sector may not be the best option.
Cellphones

Feds: We're Pulling Data From 100 Phones Seized During Trump Inauguration (arstechnica.com) 226

An anonymous reader quotes a report from Ars Technica: In new filings, prosecutors told a court in Washington, DC that within the coming weeks, they expect to extract all data from the seized cellphones of more than 100 allegedly violent protesters arrested during the inauguration of President Donald Trump. Prosecutors also said that this search is validated by recently issued warrants. The court filing, which was first reported Wednesday by BuzzFeed News, states that approximately half of the protestors prosecuted with rioting or inciting a riot had their phones taken by authorities. Prosecutors hope to uncover any evidence relevant to the case. Under normal judicial procedures, the feds have vowed to share such data with defense attorneys and to delete all irrelevant data. "All of the Rioter Cell Phones were locked, which requires more time-sensitive efforts to try to obtain the data," Jennifer Kerkhoff, an assistant United States attorney, wrote. Such phone extraction is common by law enforcement nationwide using hardware and software created by Cellebrite and other similar firms. Pulling data off phones is likely more difficult under fully updated iPhones and Android devices.
Communications

Senate Votes To Kill FCC's Broadband Privacy Rules (pcworld.com) 396

The Senate voted 50-48 along party lines Thursday to repeal an Obama-era law that requires internet service providers to obtain permission before tracking what customers look at online and selling that information to other companies. PCWorld adds: The Senate's 50-48 vote Thursday on a resolution of disapproval would roll back Federal Communications Commission rules requiring broadband providers to receive opt-in customer permission to share sensitive personal information, including web-browsing history, geolocation, and financial details with third parties. The FCC approved the regulations just five months ago. Thursday's vote was largely along party lines, with Republicans voting to kill the FCC's privacy rules and Democrats voting to keep them. The Senate's resolution, which now heads to the House of Representatives for consideration, would allow broadband providers to collect and sell a "gold mine of data" about customers, said Senator Bill Nelson, a Florida Democrat. Kate Tummarello, writing for EFF: [This] would be a crushing loss for online privacy. ISPs act as gatekeepers to the Internet, giving them incredible access to records of what you do online. They shouldn't be able to profit off of the information about what you search for, read about, purchase, and more without your consent. We can still kill this in the House: call your lawmakers today and tell them to protect your privacy from your ISP.
Australia

Australia Shelves Copyright Safe Harbor For Google, Facebook (torrentfreak.com) 25

In a surprise setback for companies such as Google and Facebook that leverage user-generated content, Australia has dropped plans to extend its copyright safe harbor provisions. From a report: In a blow to Google, Facebook and others, the government dropped the amendments before they were due to be introduced to parliament yesterday. That came as a big surprise, particularly as Prime Minister Malcolm Turnbull had given the proposals his seal of approval just last week. "Provisions relating to safe harbor were removed from the bill before its introduction to enable the government to further consider feedback received on this proposal whilst not delaying the passage of other important reforms," Communications Minister Mitch Fifield said in a statement. There can be little doubt that intense lobbying from entertainment industry groups played their part, with a series of articles published in News Corp-owned The Australian piling on the pressure in favor of rightsholders.
Security

WikiLeaks' New Dump Shows How The CIA Allegedly Hacked Macs and iPhones Almost a Decade Ago (vice.com) 110

WikiLeaks said on Thursday morning it will release new documents it claims are from the Central Intelligence Agency which show the CIA had the capability to bug iPhones and Macs even if their operating systems have been deleted and replaced. From a report on Motherboard: "These documents explain the techniques used by CIA to gain 'persistenc'' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware," WikiLeaks stated in a press release. EFI and UEFI is the core firmware for Macs, the Mac equivalent to the Bios for PCs. By targeting the UEFI, hackers can compromise Macs and the infection persists even after the operating system is re-installed. The documents are mostly from last decade, except a couple that are dated 2012 and 2013. While the documents are somewhat dated at this point, they show how the CIA was perhaps ahead of the curve in finding new ways to hacking and compromising Macs, according to Pedro Vilaca, a security researcher who's been studying Apple computers for years. Judging from the documents, Vilaca told Motherboard in an online chat, it "looks like CIA were very early adopters of attacks on EFI."

Slashdot Top Deals