Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×
Censorship

James Powderly of Graffiti Research Labs Detained In China 337

An anonymous reader writes "News from Free Tibet 2008 that internationally known artist, technologist and co-founder of the Graffiti Research Lab, James Powderly, was detained in Beijing early on August 19th while preparing to debut a new work and technology of protest, the L.A.S.E.R. Stencil. According to a Twitter message received yesterday by Students for a Free Tibet at approximately 5 pm Beijing Standard Time, Powderly had been detained by Chinese authorities at 3 am. His current whereabouts remain unknown. Powderly was the inventor of throwies." (Powderly's detention was also mentioned at Make Magazine's blog.)
Censorship

YouTube Yanks Free Tibet Video After IOC Pressure 482

RevWaldo writes "The International Olympic Committee filed a copyright infringement claim yesterday against YouTube for hosting video of a Free Tibet protest at the Chinese Consulate in Manhattan Thursday night. The video depicts demonstrators conducting a candlelight vigil and projecting a protest video onto the consulate building; the projection features recent footage of Tibetan monks being arrested and riffs on the Olympic logo of the five interlocking rings, turning them into handcuffs. YouTube dutifully yanked the video, but it can still be seen on Vimeo. (Be advised; there is some brief footage of bloody, injured monks.)"
Security

Chinese Hack Attacks on DoD Networks Coordinated 295

An anonymous reader writes " The Naval Network Warfare Command says that Chinese hackers are relentlessly targeting Defense Department networks with cyber attacks. The 'volume, proficiency and sophistication' of the attacks supports the theory that the attacks are government supported. The motives of the attacks emanating from China include technology theft, intelligence gathering, exfiltration, research on DOD operations and the creation of dormant presences in DOD network for future action. Onlookers warn that current US defenses against these attacks are 'dysfunctional', and that more aggressive measures should be taken to ensure government network safety."

Slashdot Top Deals

Can't open /usr/fortunes. Lid stuck on cookie jar.

Working...