Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Encryption

US Government Using PS3s To Break Encryption 570

Entropy98 writes "It seems that the US Immigration and Customs Enforcement Cyber Crimes Center, known as C3, has replaced its '$8,000 Tableau/Dell server combination' with more efficient and much cheaper $300 PS3s. Each PS3 is capable of 4 million passwords per second, and C3 currently has 20 PS3s with plans to buy 40 more. Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography."
Music

Carl Sagan Sings 183

gijoel writes "Someone with too much time on their hands and access to Auto-Tune has taken clips from Carl Sagan's Cosmos series to make this fantastic song. Watch for the Stephen Hawking cameo."
Privacy

EU Funding "Orwellian" Artificial Intelligence Snooping System 181

leonbenjamin writes "Britain's Telegraph reports on a five-year research programme, called Project Indect, which aims to develop computer programmes which act as 'agents' to monitor and process information from web sites, discussion forums, file servers, peer-to-peer networks and even individual computers. Its main objectives include the 'automatic detection of threats and abnormal behaviour or violence.' Shami Chakrabarti, head of the UK's Liberty human-rights NGO, said: 'Profiling whole populations instead of monitoring individual suspects is a sinister step in any society. ... It's dangerous enough at national level, but on a Europe-wide scale the idea becomes positively chilling.'"
Privacy

Secret GPS Tracking Now Legal In Massachusetts 277

dr. fuzz writes "The Supreme Judicial Court of Massachusetts has ruled in favor of John Law tracking you with secret GPS devices in Massachusetts provided a warrant is obtained. You've been warned. To the dissenters' credit, Justice Ralph Gants is quoted with 'Our constitutional analysis should focus on the privacy interest at risk from contemporaneous GPS monitoring, not simply the property interest.'"
Technology

Why Motivation Is Key For Artificial Intelligence 482

Al writes "MIT neuroscientist Ed Boyden has a column discussing the potential dangers of building super-intelligent machines without building in some sort of motivation or drive. Boyden warns that a very clever AI without a sense of purpose might very well 'realize the impermanence of everything, calculate that the sun will burn out in a few billion years, and decide to play video games for the remainder of its existence.' He also notes that the complexity and uncertainty of the universe could easily overwhelm the decision-making process of this intelligence — a problem that many humans also struggle with. Boyden will give a talk on the subject at the forthcoming Singularity Summit."
Security

Real-Time Keyloggers 205

The NY Times has a story and a blog backgrounder focusing on a weapon now being wielded by bad guys (most likely in Eastern Europe, according to the Times): Trojan horse keyloggers that report back in real-time. The capability came to light in a court filing (PDF) by Project Honey Pot against "John Doe" thieves. The case was filed in order to compel the banks — which are almost as secretive as the cyber-crooks — to reveal information such as IP addresses that could lead back to the miscreants. Or at least allow victims to be notified. Real-time keyloggers were first discovered in the wild last year, but the court filing and the Times article should bring new attention to the threat. The technique menaces the 2-factor authentication that some banks have instituted: "By going real time, hackers now can get around some of the roadblocks that companies have put in their way. Most significantly, they are now undeterred by systems that create temporary passwords, such as RSA's SecurID system, which involves a small gadget that displays a six-digit number that changes every minute based on a complex formula. If [your] computer is infected, the Trojan zaps your temporary password back to the waiting hacker who immediately uses it to log onto your account. Sometimes, the hacker logs on from his own computer, probably using tricks to hide its location. Other times, the Trojan allows the hacker to control your computer, opening a browser session that you can't see."
Image

Team Aims To Create Pure Evil AI 527

puroresu writes "Scientific American reports on the efforts of Selmer Bringsjord and his team at the Rensselaer Polytechnic Institute, who have been attempting to develop an AI possessed of an interesting character trait: pure evil. From the article, 'He and his research team began developing their computer representation of evil by posing a series of questions beginning with the basics: name, age, sex, etc., and progressing to inquiries about this fictional person's beliefs and motivations. This exercise resulted in "E," a computer character first created in 2005 to meet the criteria of Bringsjord's working definition of evil. Whereas the original E was simply a program designed to respond to questions in a manner consistent with Bringsjord's definition, the researchers have since given E a physical identity: It's a relatively young, white man with short black hair and dark stubble on his face.'"
Patents

IBM Uses Call-Detail Records To Identify "Friends" 116

theodp writes "Big Blue may know what you did last summer. Or at least who you called. In a move out of the NSA's playbook, IBM Research has been scrutinizing the call-detail records of 'one of the largest mobile operators in the world' (PDF). By analyzing who calls whom, and for how long, IBM claims its patent-pending snooping software can now identify circles of 'friends' who tend to exhibit the same profit-threatening behavior. 'We believe that our analysis is a first of its kind that exploits the underlying social network in a telecom call graph,' boasted a team of IBM researchers and a UMD prof. For now, IBM seems to have focused on using the info to see if your friends are churners, so you can be dealt with pro-actively lest you follow their lead and bolt. However, IBM suggests its SNAzzy data mining technology (Social Network Analysis for Telecom Business Intelligence) has a bright future, noting it 'is also capable of analyzing any kind of social network or graph, not just telecom networks.'"
Robotics

Scientists Worry Machines May Outsmart Man 652

Strudelkugel writes "The NY Times has an article about a conference during which the potential dangers of machine intelligence were discussed. 'Impressed and alarmed by advances in artificial intelligence, a group of computer scientists is debating whether there should be limits on research that might lead to loss of human control over computer-based systems that carry a growing share of society's workload, from waging war to chatting with customers on the phone. Their concern is that further advances could create profound social disruptions and even have dangerous consequences.' The money quote: 'Something new has taken place in the past five to eight years,' Dr. Horvitz said. 'Technologists are replacing religion, and their ideas are resonating in some ways with the same idea of the Rapture.'"
The Courts

Music Industry Wants a Cut of Pirate Bay Sale 214

suraj.sun writes "The music industry will attempt to seize money paid to acquire the Pirate Bay. A couple of weeks back the Global Gaming Factory, a Swedish software company, announced that it would acquire the Pirate Bay for $7.8 million. Since then the company has been touting a new business model and even hiring executives, such as Wayne Rosso, the former Grokster president, to legally obtain content from film and music industries. What remains to be seen is how that sale might be affected by attempts by the music industry to collect the $3.6 million damages that a Swedish court awarded it in April. Alex Jacob, a spokesman for the IFPI, said that the group has always intended to collect the damages award, but now, should the sale go through, music execs know that the original Pirate Bay operators have access to the money." According to CNet, the four original Pirates claim they no longer own the company and that no money from the sale will go to them.
Technology

TiVo Announces DVR-SuperAdvance 75

mark0 writes "TiVo has announced the TiVo DVR-SuperAdvance. The PC World review says, 'Familiar TiVo interface; DVR can record not-yet-broadcast programming; potentially useful as a wagering aid,' though, '[it is] expensive; access to programming is limited; footage is displayed in standard definition only.'" Hopefully, TiVo will supply a review unit.
Displays

First Touch-Screen, Bendable E-Paper Developed 174

Al writes "The first touch-screen flexible e-paper has been developed by a team from Arizona State University and E-Ink (the company that makes the technology for Amazon's Kindle and Sony's Reader). Jann Kaminski and colleagues at ASU's Flexible Display Center say the main challenge is that most touch-screen technologies do not respond well to being flexed. So they used an inductive screen, which relies on a magnetized styluses to induce a field in a sensing layer at the back of the display. The first adopters for the technology are likely to be the US Army. Watch a video of the device being tested."
Books

Amazon Caves On Kindle 2 Text-To-Speech 370

On Wednesday we discussed news that the Authors Guild had objected to the text-to-speech function on Amazon's Kindle 2, claiming that it infringed on audio book copyright. Today, Amazon said that while the feature is legally sound, they would be willing to disable text-to-speech on a title-by-title basis at the rightsholder's request. "We have already begun to work on the technical changes required to give authors and publishers that choice. With this new level of control, publishers and authors will be able to decide for themselves whether it is in their commercial interests to leave text-to-speech enabled. We believe many will decide that it is."
Biotech

Human-Animal Hybrids Fail 554

SailorSpork writes "Fans of furries and anime-style cat girls will be disappointed by the news that attempts to create human animal hybrids have failed. Experiments by British scientists to create embryonic stem cells by putting human DNA into cow or rabbit eggs had raised ethical concerns, but the question of how we would treat sub-humans will have to wait until we actually figure out how to make them."
The Internet

UK Government Abandons Piracy Legislation 155

arcticstoat writes "Following last year's reports of a scheme to 'ban' pirates from the Internet via ISPs in the UK, it looks as though the UK government has now decided to back down on the plan, saying that it hopes it won't have to apply 'the heavy hand of legislation'. The UK's Intellectual Property Minister, David Lammy, said that 'I'm not sure it's actually going to be possible,' as a result of the complexities of enforcing such legislation. Lammy also revealed that he had a different opinion on file sharers than many people in the music industry. He pointed out that there's a big difference between organized counterfeiting gangs and 'younger people not quite buying into the system'. He added that 'we can't have a system where we're talking about arresting teenagers in their bedrooms. People can rent a room in an hotel and leave with a bar of soap — there's a big difference between leaving with a bar of soap and leaving with the television.'"

Slashdot Top Deals

Nobody's gonna believe that computers are intelligent until they start coming in late and lying about it.

Working...