Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

  • FBI Completes New Face Recognition System

    Advocatus Diaboli writes: According to a report from Gizmodo, "After six years and over one billion dollars in development, the FBI has just announced that its new biometric facial recognition software system is finally complete. Meaning that, starting soon, photos of tens of millions of U.S. citizen's faces will be captured by the national system on a daily basis. The Next Generation Identification (NGI) program will logs all of those faces, and will reference them against its growing database in the event of a crime. It's not just faces, though. Thanks to the shared database dubbed the Interstate Photo System (IPS), everything from tattoos to scars to a person's irises could be enough to secure an ID. What's more, the FBI is estimating that NGI will include as many as 52 million individual faces by next year, collecting identified faces from mug shots and some job applications." Techdirt points out that an assessment of how this system affects privacy was supposed to have preceded the actual rollout. Unfortunately, that assessment is nowhere to be found.

    Two recent news items are related. First, at a music festival in Boston last year, face recognition software was tested on festival-goers. Boston police denied involvement, but were seen using the software, and much of the data was carelessly made available online. Second, both Ford and GM are working on bringing face recognition software to cars. It's intended for safety and security — it can act as authentication and to make sure the driver is paying attention to the road.

    31 comments | 42 minutes ago

  • New Global Plan Would Crack Down On Corporate Tax Avoidance

    HughPickens.com writes: Reuters reports that plans for a major rewriting of international tax rules have been unveiled by the Organisation for Economic Co-operation and Development (OECD) that could eliminate structures that have allowed companies like Google and Amazon to shave billions of dollars off their tax bills. For more than 50 years, the OECD's work on international taxation has been focused on ensuring companies are not taxed twice on the same profits (and thereby hampering trade and limit global growth). But companies have been using such treaties to ensure profits are not taxed anywhere. A Reuters investigation last year found that three quarters of the 50 biggest U.S. technology companies channeled revenues from European sales into low tax jurisdictions like Ireland and Switzerland, rather than reporting them nationally.

    For example, search giant Google takes advantage of tax treaties to channel more than $8 billion in untaxed profits out of Europe and Asia each year and into a subsidiary that is tax resident in Bermuda, which has no income tax. "We are putting an end to double non-taxation," says OECD head of tax Pascal Saint-Amans.For the recommendations to actually become binding, countries will have to encode them in their domestic laws or amend their bilateral tax treaties. Even if they do pass, these changes are likely 5-10 years away from going into effect.
    Speaking of international corporate business: U.K. mainframe company Micro Focus announced it will buy Attachmate, which includes Novell and SUSE.

    152 comments | 3 hours ago

  • Tim Cook Says Apple Can't Read Users' Emails, That iCloud Wasn't Hacked

    Apple CEO Tim Cook insists that Apple doesn't read -- in fact, says Cook, cannot read -- user's emails, and that the company's iCloud service wasn't hacked. ZDNet presents highlights from Cook's lengthy, two-part interview with Charlie Rose. One selection of particular interest: Apple previously said that even it can't access iMessage and FaceTime communications, stating that such messages and calls are not held in an "identifiable form." [Cook] claimed if the government "laid a subpoena," then Apple "can't provide it." He said, bluntly: "We don't have a key... the door is closed." He reiterated previous comments, whereby Apple has said it is not in the business of collecting people's data. He said: "When we design a new service, we try not to collect data. We're not reading your email." Cook went on to talk about PRISM in more detail, following the lead from every other technology company implicated by those now-infamous PowerPoint slides.

    138 comments | 5 hours ago

  • Quickflix Wants Netflix To Drop Australian VPN Users

    ashshy writes 200,000 Australian residents reportedly use Netflix today, tunneling their video traffic to the US, UK, and other Netflix markets via VPN connections. A proper Netflix Down Under service isn't expected to launch until 2015. Last week, Aussie video streaming company Quickflix told Netflix to stop this practice, so Australian viewers can return to Quickflix and other local alternatives. But Quickflix CEO Stephen Langsford didn't explain how Netflix could restrict Australian VPN users, beyond the IP geolocating and credit card billing address checks it already runs. Today, ZDNet's Josh Taylor ripped into the absurdity of Quickflix's demands. From the article: "If Netflix cuts those people off, they're going to know that it was at the behest of Foxtel and Quickflix, and would likely boycott those services instead of flocking to them. If nothing else, it would encourage those who have tried to do the right thing by subscribing and paying for content on Netflix to return to copyright infringement."

    115 comments | 6 hours ago

  • WSJ Reports Boeing To Beat SpaceX For Manned Taxi To ISS

    PvtVoid writes The Wall Street Journal reports (paywalled) that NASA is poised to award a key contract for manned transport to the International Space Station to Boeing over rival SpaceX: "Recent signals from the Obama administration, according to the officials, indicate that the National Aeronautics and Space Administration's leadership has concluded on a preliminary basis that Boeing's proposed capsule offers the least risky option, as well as the one most likely to be ready to transport U.S. crews to the international space station within three years. The officials cautioned that a last-minute shift by NASA chief Charles Bolden, who must vet the decision, could change the result of the closely watched competition." Here is a non-paywalled link to an article at CNET.

    174 comments | 8 hours ago

  • AT&T Proposes Net Neutrality Compromise

    An anonymous reader writes: The net neutrality debate has been pretty binary: ISPs want the ability to create so-called "fast lanes," and consumers want all traffic to be treated equally. Now, AT&T is proposing an alternative: fast lanes under consumer control. Their idea would "allow individual consumers to ask that some applications, such as Netflix, receive priority treatment over other services, such as e-mail or online video games. That's different from the FCC's current proposal, which tacitly allows Internet providers to charge content companies for priority access to consumers but doesn't give the consumers a choice in the matter."

    AT&T said, "Such an approach would preserve the ability of Internet service providers to engage in individualized negotiations with [content companies] for a host of services, while prohibiting the precise practice that has raised 'fast lane' concerns." It's not perfect, but it's probably the first earnest attempt at a compromise we've seen from either side, and it suggests the discussion can move forward without completely rejecting one group's wishes.

    219 comments | 9 hours ago

  • NSW Police Named as FinFisher Spyware Users

    Bismillah writes Wikileaks' latest release of documents shows that the Australian New South Wales police force has spent millions on licenses for the FinFisher set of law enforcement spy- and malware tools — and still has active licenses. What it uses FinFisher, which has been deployed against dissidents by oppressive regimes, for is yet to be revealed. NSW Police spokesperson John Thompson said it would not be appropriate to comment "given this technology relates to operational capability".

    60 comments | 12 hours ago

  • Funding Tech For Government, Instead of Tech For Industry

    An anonymous reader writes: If you're a creative engineer looking to build a product, you're probably going to end up starting your own business or joining an established one. That's where ideas get funding, and that's where products make a difference (not to mention money). Unfortunately, it also siphons a lot of the tech-related talent away from government (and by extension, everybody else), who could really benefit from this creative brilliance. That's why investor Ron Bouganim just started a $23 million fund for investment in tech companies that develop ideas for the U.S. government. Not only is he hoping to transfer some of the $74 billion spent annually by the government on technology to more efficient targets, but also to change the perception that the best tech comes from giant, entrenched government contractors.

    55 comments | yesterday

  • Court: Car Dealers Can't Stop Tesla From Selling In Massachusetts

    curtwoodward writes: Many states have laws that prevent car manufacturers from operating their own dealerships, a throwback to the days when Detroit tried to undercut its franchise dealers by opening company-owned shops. But dealers have taken those laws to the extreme as they battle new competition from Tesla, which is selling its cars direct to the public. In some states, dealers have succeeded in limiting Tesla's direct-sales model. But not in Massachusetts (PDF): the state's Supreme Court says the dealers don't have any right to sue Tesla for unfair competition, since they're not Tesla dealers. No harm, no foul.

    142 comments | yesterday

  • Court Rules the "Google" Trademark Isn't Generic

    ericgoldman writes Even though "googling" and "Google it" are now common phrases, a federal court ruled that the "Google" trademark is still a valid trademark instead of a generic term (unlike former trademarks such as escalator, aspirin or yo-yo). The court distinguished between consumers using Google as a verb (such as "google it"), which didn't automatically make the term generic, and consumers using Google to describe one player in the market, which 90%+ of consumers still do.

    126 comments | yesterday

  • The FCC Net Neutrality Comment Deadline Has Arrived: What Now?

    blottsie writes After months of heated debate, viral campaigns, deliberate "slowdowns" and record-breaking public responses, the Federal Communications Commission is finally set to decide how "net neutrality"—the principle that all data must be treated equally by Internet service providers (ISPs)—should look in the U.S., or if it should exist at all. Today, Sept. 15, the FCC officially closes its public comment period on its latest net neutrality proposal. The plan enables ISPs to discriminate against certain types of data, in certain circumstances, by charging extra for broadband “fast lanes” between content providers—like Netflix or YouTube—and users.

    130 comments | yesterday

  • How Governments Are Getting Around the UN's Ban On Blinding Laser Weapons

    Lasrick writes Despite the UN's 1995 Protocol on Blinding Laser Weapons, the world is moving closer to laser weapons in both military and law enforcement situations that can cause temporary and even permanent blindness. Military-funded research in this area continues to be conducted by the Optical Radiation Bioeffects and Safety program, and already "dazzlers" have been in use in Afghanistan. Domestic versions of these weapons are intended for use by law enforcement agencies and in theory cause motion-sickness type illness but not blindness. "But something bright enough to dazzle at 300 meters can cause permanent eye damage at 50 meters, and these devices can be set to deliver a narrow (and more intense) beam."

    174 comments | yesterday

  • Comcast Allegedly Asking Customers to Stop Using Tor

    An anonymous reader writes Comcast agents have reportedly contacted customers who use Tor and said their service can get terminated if they don't stop using Tor. According to Deep.Dot.Web, one of those calls included a Comcast customer service agent who allegedly called Tor an “illegal service.” The Comcast agent told the customer that such activity is against usage policies. The Comcast agent then allegedly told the customer: "Users who try to use anonymity, or cover themselves up on the internet, are usually doing things that aren’t so-to-speak legal. We have the right to terminate, fine, or suspend your account at anytime due to you violating the rules. Do you have any other questions? Thank you for contacting Comcast, have a great day." Update: 09/15 18:38 GMT by S : Comcast has responded, saying they have no policy against Tor and don't care if people use it.

    401 comments | yesterday

  • New Details About NSA's Exhaustive Search of Edward Snowden's Emails

    An anonymous reader points out this Vice story with new information about the NSA's search of Edward Snowden's emails. Last year, the National Security Agency (NSA) reviewed all of Edward Snowden's available emails in addition to interviewing NSA employees and contractors in order to determine if he had ever raised concerns internally about the agency's vast surveillance programs. According to court documents the government filed in federal court September 12, NSA officials were unable to find any evidence Snowden ever had.

    In a sworn declaration, David Sherman, the NSA's associate director for policy and records, said the agency launched a "comprehensive" investigation after journalists began to write about top-secret NSA spy programs upon obtaining documents Snowden leaked to them. The investigation included searches of any records where emails Snowden sent raising concerns about NSA programs "would be expected to be found within the agency." Sherman, who has worked for the NSA since 1985, is a "original classification authority," which means he can classify documents as "top-secret" and process, review, and redact records the agency releases in response to Freedom of Information Act (FOIA) requests.

    In his declaration, Sherman detailed steps he said agency officials took to track down any emails Snowden wrote that contained evidence he'd raised concerns inside the agency. Sherman said the NSA searched sent, received, deleted emails from Snowden's account and emails "obtained by restoring back-up tapes." He noted that NSA officials reviewed written reports and notes from interviews with "NSA affiliates" with whom the agency spoke during its investigation.

    191 comments | yesterday

  • Treasure Map: NSA, GCHQ Work On Real-Time "Google Earth" Internet Observation

    wabrandsma) writes with the latest accusations about NSA spying activity in Germany. According to top-secret documents from the NSA and the British agency GCHQ, the intelligence agencies are seeking to map the entire Internet.
    Furthermore, every single end device that is connected to the Internet somewhere in the world — every smartphone, tablet and computer — is to be made visible. Such a map doesn't just reveal one treasure. There are millions of them. The breathtaking mission is described in a Treasure Map presentation from the documents of the former intelligence service employee Edward Snowden which SPIEGEL has seen. It instructs analysts to "map the entire Internet — Any device, anywhere, all the time." Treasure Map allows for the creation of an "interactive map of the global Internet" in "near real-time," the document notes. Employees of the so-called "FiveEyes" intelligence agencies from Great Britain, Canada, Australia and New Zealand, which cooperate closely with the American agency NSA, can install and use the program on their own computers. One can imagine it as a kind of Google Earth for global data traffic, a bird's eye view of the planet's digital arteries.

    248 comments | 2 days ago

  • Navy Guilty of Illegally Broad Online Searches: Child Porn Conviction Overturned

    An anonymous reader writes In a 2-1 decision, the 9th Circuit Court ruled that Navy investigators regularly run illegally broad online surveillance operations that cross the line of military enforcement and civilian law. The findings overturned the conviction of Michael Dreyer for distributing child pornography. The illegal material was found by NCIS agent Steve Logan searching for "any computers located in Washington state sharing known child pornography on the Gnutella file-sharing network." The ruling reads in part: "Agent Logan's search did not meet the required limitation. He surveyed the entire state of Washington for computers sharing child pornography. His initial search was not limited to United States military or government computers, and, as the government acknowledged, Agent Logan had no idea whether the computers searched belonged to someone with any "affiliation with the military at all." Instead, it was his "standard practice to monitor all computers in a geographic area," here, every computer in the state of Washington. The record here demonstrates that Agent Logan and other NCIS agents routinely carry out broad surveillance activities that violate the restrictions on military enforcement of civilian law. Agent Logan testified that it was his standard practice to "monitor any computer IP address within a specific geographic location," not just those "specific to US military only, or US government computers." He did not try to isolate military service members within a geographic area. He appeared to believe that these overly broad investigations were permissible, because he was a "U.S. federal agent" and so could investigate violations of either the Uniform Code of Military Justice or federal law."

    283 comments | 2 days ago

  • NSA Metadata Collection Gets 90-Day Extension

    schwit1 sends word that the Foreign Intelligence Surveillance Court has authorized a 90-day extension to the NSA's ability to collect bulk metadata about U.S. citizens' phone calls. In April, the House of Representatives passed a bill to limit the NSA's collection of metadata, but the Senate has been working on their version of the bill since then without yet voting on it. Because of this, and the alleged importance of continuing intelligence operations, the government sought a 90-day reauthorization of the current program. The court agreed. Senator Patrick Leahy said this clearly demonstrates the need to get this legislation passed. "We cannot wait any longer, and we cannot defer action on this important issue until the next Congress. This announcement underscores, once again, that it is time for Congress to enact meaningful reforms to protect individual privacy.

    73 comments | 2 days ago

  • US Patent Office Seeking Consultant That Can Stamp Out Fraud By Patent Examiners

    McGruber writes: A month after Slashdot discussed "Every Day Is Goof-Off-At-Work Day At the US Patent and Trademark Office," the USPTO issued a statement that it is "committed to taking any measures necessary" to stop employees who review patents from lying about their hours and getting overtime pay and bonuses for work they didn't do.

    USPTO officials also told congressional investigators that they are seeking an outside consulting firm to advise them on how managers can improve their monitoring of more than 8,000 patent examiners. The Patent Examiners union responded to the original Washington Post report with a statement that includes this line: "If 'thousands' of USPTO employees were not doing their work, it would be impossible for this agency to be producing the best performance in recent memory and, perhaps, in its entire 224 year history."

    In related news, USPTO Commissioner Deborah Cohn has announced plans to resign just months after a watchdog agency revealed that she had pressured staffers to hire the live-in boyfriend of an immediate family member over other, better-qualified applicants. When he finished 75th out of 76 applicants in the final round of screening, Cohn "intervened and created an additional position specifically for the applicant," wrote Inspector General Todd Zinser in a statement on the matter.

    124 comments | 2 days ago

  • Justice Sotomayor Warns Against Tech-Enabled "Orwellian" World

    An anonymous reader writes: U.S. Supreme Court Justice Sonia Sotomayor spoke on Thursday to faculty and students at the University of Oklahoma City about the privacy perils brought on by modern technology. She warned that the march of technological progress comes with a need to enact privacy protections if we want to avoid living in an "Orwellian world" of constant surveillance. She said, "There are drones flying over the air randomly that are recording everything that's happening on what we consider our private property. That type of technology has to stimulate us to think about what is it that we cherish in privacy and how far we want to protect it and from whom. Because people think that it should be protected just against government intrusion, but I don't like the fact that someone I don't know can pick up, if they're a private citizen, one of these drones and fly it over my property."

    163 comments | 3 days ago

  • The Challenges and Threats of Automated Lip Reading

    An anonymous reader writes: Speech recognition has gotten pretty good over the past several years. it's reliable enough to be ubiquitous in our mobile devices. But now we have an interesting, related dilemma: should we develop algorithms that can lip read? It's a more challenging problem, to be sure. Sounds can be translated directly into words, but deriving meaning out of the movement of a person's face is much more complex. "During speech, the mouth forms between 10 and 14 different shapes, known as visemes. By contrast, speech contains around 50 individual sounds known as phonemes. So a single viseme can represent several different phonemes. And therein lies the problem. A sequence of visemes cannot usually be associated with a unique word or sequence of words. Instead, a sequence of visemes can have several different solutions." Beyond the computational aspect, we also need to decide, as a society, if this is a technology that should exist. The privacy implications extend beyond that of simple voice recognition.

    119 comments | 3 days ago

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>