Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Earth

Submission + - Geothermal Power Advances (sfgate.com)

An anonymous reader writes: A group of geothermal power engineers have created three reservoirs from a single well in a place where none existed previously. This is a breakthrough for Enhanced Geothermal System technology — people who need power often can't choose a spot where there happens to be a geothermal reservoir, and EGS could allow us to create them where needed. 'Last fall, engineers pumped cold water into the ground, cracking open fissures in the deep rock, a process known as hydroshearing. They then sealed one reservoir from the other using a new technology. They injected ground-up recycled plastic bottles, which plugged up the cracks in one reservoir while millions of gallons of cold water were being pumped in to create another. Then the plastic diffused, leaving behind three reservoirs. ... The U.S. Department of Energy, which is covering half the $43.8 million cost of the Newberry project, says if the initial indications hold up, the Newberry project would mark the first time in the world that multiple geothermal reservoirs have been created on purpose from a single well in a new area.'
Security

Submission + - What we know about the FBI's CIPAV spyware

StonyandCher writes: What is CIPAV? CIPAV, which stands for "Computer and Internet Protocol Address Verifier," is secret surveillance software that the FBI used last month to help identify whoever was e-mailing bomb threats almost daily to a Washington high school. The software collects a wide range of information from the target PC and sends it back to control — in this case, the FBI — and automatically records every outbound communication, though not the contents of said communication. If that sounds like a bot, well. ...

An affidavit by an FBI agent last month revealed some of the workings of CIPAV. In this article, Computerworld attempts to dissect CIPAV's purpose and raises a number of questions such as: What happens to the data the CIPAV collects? Does the CIPAV capture keystrokes? Can the CIPAV spread on its own to other computers, either purposefully or by accident? Does it erase itself after its job is done?
Slashback

FBI, IRS Raid Home of Sen. Ted Stevens 539

A while back we discussed the corruption investigation aimed at Alaska Sen. Ted "series of tubes" Stevens. A number of readers sent us word that the home of Sen. Stevens was raided earlier today by agents of the FBI and the IRS. The focus of the raid was a remodeling project at Stevens's home and the involvement of VECO, an oil company.

Slashdot Top Deals

No user-servicable parts inside. Refer to qualified service personnel.

Working...