Forgot your password?
typodupeerror

Submission + - TSA screeners win immunity from flier abuse claims: U.S. appeals court (reuters.com)

Mr.Intel writes: Fliers may have a tough time recovering damages for invasive screenings at U.S. airport security checkpoints, after a federal appeals court on Wednesday said screeners are immune from claims under a federal law governing assaults, false arrests and other abuses. In a 2-1 vote, the 3rd U.S. Circuit Court of Appeals in Philadelphia said Transportation Security Administration (TSA) screeners are shielded by government sovereign immunity from liability under the Federal Tort Claims Act because they do not function as “investigative or law enforcement officers.”

The decision, the first on the issue by a federal appeals court, was a defeat for Nadine Pellegrino, a business consultant from Boca Raton, Florida. She and her husband had sued for false arrest, false imprisonment and malicious prosecution over a July 2006 altercation at Philadelphia International Airport. According to court papers, Pellegrino had been randomly selected for additional screening at the Philadelphia airport before boarding a US Airways flight to Fort Lauderdale, Florida. Pellegrino, then 57, objected to the invasiveness of the search, but conditions deteriorated and she was later jailed for about 18 hours, the papers show. Criminal charges were filed, and Pellegrino was acquitted at a March 2008 trial.

Submission + - DOJ settles with Defense Distributed: CAD files for guns are not weapons

He Who Has No Name writes: Those who remember Cody Wilson and Defense Distributed — the self-described cryptoanarchist and his organization that published plans for 3D printable firearm parts, respectively — also remember that not long after the plans for the printable Liberator single-shot pistol hit the web, the Department of State seized the Defense Distributed website and prohibited Wilson from publishing 3D printable firearm plans, claiming violations of ITAR — the International Traffic in Arms Regulation, a US law taxing and restricting the distribution of a wide variety of physical goods listed as having military value. Slashdot covered the website seizure here (the Dept of Defense was initially misreported in sources to have been the agency responsible).

In both a 1st and 2nd Amendment win, the Second Amendment Foundation has settled with the Department of State after suing on behalf of Defense Distributed. From the article: "Under terms of the settlement, the government has agreed to waive its prior restraint against the plaintiffs, allowing them to freely publish the 3-D files and other information at issue. The government has also agreed to pay a significant portion of the plaintiffs’ attorney’s fees, and to return $10,000 in State Department registration dues paid by Defense Distributed as a result of the prior restraint.

Significantly, the government expressly acknowledges that non-automatic firearms up to .50-caliber – including modern semi-auto sporting rifles such as the popular AR-15 and similar firearms – are not inherently military.
"

Submission + - Schlumberger oil services wins in U.S. Supreme Court on patent damages (reuters.com)

schwit1 writes: The U.S. Supreme Court ruled on Friday that companies can recover profits lost because of the unauthorized use of their patented technology abroad in a victory for Schlumberger NV, the world’s largest oilfield services provider.

The decision expands the ability of patent owners to recover foreign-based damages, increasing the threat posed by certain infringement lawsuits in the United States.

Internet-based companies and others had expressed concern that extending patent damages beyond national borders would expose U.S. high-technology firms to greater patent-related risks abroad.

Robotics

Robot Snake Can Climb Trees 90

kkleiner writes "The latest in a line of 'modsnakes' from Carnegie Mellon's Biorobotics Lab, Uncle Sam can move in a variety of different ways, including rolling, wiggling, and side-winding. It can also wrap itself around a pole and climb vertically, and even scale a tree. You have to watch this thing in action. There is something incredibly life-like and eerie about the way it scales the tree outdoors and then looks around with its camera 'eye.' Projects like Uncle Sam show how life-mimicking machines could revolutionize robotics in the near future."
Games

Portal 2 Gets Release Date 110

AndrewGOO9 writes "After what has seemed like an eternity since Valve initially announced a sequel to their lauded puzzle title Portal, a release date has finally been attached to the game. Originally slated to be released before the end of the year in time for the holidays, Valve instead opted to delay the game, citing reasons such as, 'making games is hard' as well as continuing their tradition of releasing games when they're finished as opposed to rushing them out the door. Either way, mark your calendars for February 9th, 2011, and in the meantime, brush up on thinking with portals." There's some new gameplay footage available, and Valve announced that Stephen Merchant will be lending his voice to the game.
Music

'u' — the First Authentic Klingon Opera On Earth Screenshot-sm 165

j0ris writes "The Klingon are passionate opera-lovers, but little is known about their highly evolved form of musical expression. Floris Schonfeld is the initiator and director of 'u', the first authentic Klingon opera on earth. He studied Klingon music theory for over a year, and together with several experts developed various indigenous Klingon instruments. The Terran Klingon Research Ensemble has been set up to further develop a coherent Klingon musical practice amongst human musicians. 'u' premieres on September 9 in The Hague, Netherlands. An invitation by Klingon language expert Marc Okrand has been sent to Kronos, home planet of the Klingons, via radio telescope."
Windows

The Secret Origin of Windows 402

harrymcc writes "Windows has been so dominant for so long that it's easy to forget Windows 1.0 was vaporware, mocked both outside and inside of Microsoft — and that its immediate successors were considered stopgaps until OS/2 was everywhere. Tandy Trower, the product manager who finally got Windows 1.0 out the door a quarter century ago, has written a memoir of the experience. (He thought being assigned the much-maligned project was Microsoft's fiendish way of trying to get rid of him.) The story involves such still-significant figures as Bill Gates, Steve Ballmer, Ray Ozzie, and Nathan Myhrvold; Trower left Microsoft only in November of 2009 after 28 years with the company."
Security

Can You Trust Chinese Computer Equipment? 460

Ian Lamont writes "Suspicions about China slipping eavesdropping technology into computer exports have been around for years. But the recent spying attacks, attributed to China, on Google and other Internet companies have revived the hardware spying concerns. An IT World blogger suggests the gear can't be trusted, noting that it wouldn't be hard to add security holes to the firmware of Chinese-made USB memory sticks, computers, hard drives, and cameras. He also implies that running automatic checks for data of interest in the compromised gear would not be difficult." The blog post mentions Ken Thompson's admission in 1983 that he had put a backdoor into the Unix C compiler; he laid out the details in the 1983 Turing Award lecture, Reflections On Trusting Trust: "The moral is obvious. You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode. As the level of program gets lower, these bugs will be harder and harder to detect. A well installed microcode bug will be almost impossible to detect."
PlayStation (Games)

PS3 Hacked? 296

Several readers have sent word that George Hotz (a.k.a. geohot), the hacker best known for unlocking Apple's iPhone, says he has now hacked the PlayStation 3. From his blog post: "I have read/write access to the entire system memory, and HV level access to the processor. In other words, I have hacked the PS3. The rest is just software. And reversing. I have a lot of reversing ahead of me, as I now have dumps of LV0 and LV1. I've also dumped the NAND without removing it or a modchip. 3 years, 2 months, 11 days...that's a pretty secure system. ... As far as the exploit goes, I'm not revealing it yet. The theory isn't really patchable, but they can make implementations much harder. Also, for obvious reasons I can't post dumps. I'm hoping to find the decryption keys and post them, but they may be embedded in hardware. Hopefully keys are setup like the iPhone's KBAG."
Role Playing (Games)

Final Fantasy I and II Are Coming To the iPhone and iPod Touch 142

jonasvdc tips an announcement by Square Enix that Final Fantasy I and Final Fantasy II are being developed for the iPhone and the iPod touch. The graphics and UI have been modified to look and run better on the touchscreen devices, but everything from Cecil to the classic Black Mage is clearly recognizable. The announcement did not include any information on a price or release date.

Slashdot Top Deals

The only function of economic forecasting is to make astrology look respectable. -- John Kenneth Galbraith

Working...