We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
Trachman (3499895) writes "Austrian scientists discovered a way to couple photon pairs. During the coupling for two identical photons, under analysis, a phase is changed in one and, using the magic of the world of quantum mechanics, the phase of other photon also changes. Scientists predict that this can advance quantum optics, quantum computations and, in the nearest future, secure fiber networks from NSA and other self appointed nosy rulers of the world.
The question to the community is following: Is there anyone who can explain in simple terms the essence of the discovery and associated potential practical applications." Link to Original Source top
For those who have nothing to hide, there is something you can lose
Trachman (3499895) writes "Everytime there is a discussion about pervasive surveillance there is an undertone injected to the discussion: if you have nothing to hide then one has nothing to fear. We have learned about DEA using NSA capabilities for the parallel construction of the case. Washington Post has article about those who had nothing to fear and paid dearly — http://www.washingtonpost.com/..." Link to Original Source top
Trachman (3499895) writes "Popular Science magazine has published an article about a network of cell towers that are owned not by telecommunication companies but by internal US agencies that are, well... gathering, data of US citizens. Many of them are built in US military bases. The revelation states that individual users are being tracked without court order or any warrant nor the knowledge of cell service providers and are built with the sole purpose of.... data gathering (spying, monitoring)." Link to Original Source top
Trachman (3499895) writes "Communication companies saw valuable data and have finally figured out how to monetize. For a token compensation (not even a cash money) of "10,000" points people will be giving away another source of information about themselves.
Should we expect that ISP's will soon start offering one or two percent discount in exchange for giving away your internet searches." Link to Original Source top
Magnetic Field of Earth Weakening a Sign Poles Are Flipping
Trachman (3499895) writes "The magnetic field of Earth is weakening more rapidly than many scientists thought it would, a sign that Earth’s magnetic poles might flip within a few hundred years as opposed to thousands of years. Data collected from Swarm, the collective name for three European Space Agency (ESA) satellites, confirms that Earth’s magnetic field is weakening, something which has led to many past switches in Earth’s magnetic poles.Deep ocean core studies have confirmed, according to NASA, that the Earth’s magnetic poles reverse on a relatively frequent basis. They usually switch anywhere from 200,000 to 300,000 years. As it has been 700,000 years or so since a flip has taken place, Earth is overdue for one. The weakening magnetic field might be a sign that the switch will occur sooner, rather than later. Scientists, according to a report by LiveScience, had thought that Earth’s magnetic field was weakening by about five percent every hundred years. At that rate, they calculated that a flip in the Earth’s magnetic fields would not happen for around another 2,000 years. However, the new data from Swarm indicates that Earth’s magnetic field is actually currently weakening at a rate of five percent every decade instead of century. That rate is 10 times faster than the scientists had allowed for in their calculations about when the next flip would happen. That being said, we know that the Earth's magnetic field is primary protecting shield from cosmic particles and, consequently, is a primary factor to the Earth's temperature.
My Scoop is following: At the risk of being not popular here at Slashdot I dare to ask: can magnetic field changes and climate changes be connected and analyzed in concert?" Link to Original Source top
Airport Security will not allow to have discharged electronic device. What's nex
Trachman (3499895) writes "Latest news to the travelers flying into the US: you will discover that getting through security will become even more time-consuming and stressful. The US Transport Security Administration revealed on Sunday that enhanced security procedures on flights coming to the US now include not allowing uncharged cell phones and other devices onto planes.
Let's think about it. In the next decade some perverted heads will announce anal and vaginal devices as the next transportation threat. How far Americans are willing to go, how many liberties to lose for the sense of security." Link to Original Source top
Raging hockey fans destroed an LAPD drone last night. How?
Trachman (3499895) writes "Multiple videos have been posted online showing what uploaders described as hockey fans destroying a Los Angeles Police Department drone outside the Staples Center Friday night after the LA Kings won the NHLâ(TM)s Stanley Cup. Riot police were called in to break up what the LA Times described as a âoemeleeâ outside the arena following the Kingâ(TM)s victory over the New York Rangers. In one clip posted online, a drone can be seen hovering over the crowd of hockey fans before it was knocked out of the sky by people throwing shoes and clothing. The question: what was the antidrone weapon?" Link to Original Source top
So what and how exactly "big brother" is monitoring at work
Trachman (3499895) writes "Many of us working in corporations of medium and larger size are accustomed to periodic reminders that there is zero privacy on what employees do on their computers. There is a usual clause that incidental (infrequent) use is OK.
So what exactly is being monitored: I know that emails stay for ever, that we all know. Same with company provided chats and phone calls. I know that files on the servers monitor various "meta-data", such as when accessed, modified and deleted and keeps versions of data (every company can have different holding period).
To further narrow and scope the question, let's excluding those clear cut cases where someone is working after official warning, or complained (for whatever reason) to HR, or was specifically reported after complain.
Let's also scope out the work specific applications where the user activity is logged for audit and accountability purposes.
That leaves browser, P2P software (such as Skype), music listened over the work computer.
So the question is what are the common practices of reviewing the internet browsing and internet activities?
P.S. Once I worked within the audit team in top notch institution in, let's put it that way, not a very friendly environment and 100% of the calls were listened. My girlfriend called to tell me to share some very intimate news. I still blush when remember and realize that there were additional ears listening my telephone conversation." top
Karma is a bitch - Garbage disposed years ago is interfering with the search
Trachman (3499895) writes ""Karma is a bitch" . That is a old and well worn cliche. But Malaysia airlines flight MH370 is a reincarnation and living proof of the principle. Garbage has been thrown away years ago, had it not been disposed into the ocean it, the Indian ocean, would have been much more pristine without distracting objects in the water and the plane would have been recovered and, who knows, maybe even rescued earlier." Link to Original Source top
Obama to call for end to NSA's bulk phone data collection, version 2.0
Trachman (3499895) writes "While we see the reports that current administration will have other than NSA organization collecting the phone, discussion completely leaves multiple other methods of data gathering in place (text messages, internet email, as well as phone data gathered by non-NSA agencies as well as "friendly" governments who are looking for "terrorists". In fact, NSA phone data gathering process has multiple redundant alternatives.
Trachman (3499895) writes "We are going to the next level. The people who are entrusted with the state secrets will now have be officially under automated surveillance. Sounds fair? Except that all those with the clearances have been monitored in the past albeit in less organized way. For decades employees have been taught to snitch on each other by reporting "suspicious" behavior in any self respecting organization, private or state funded. So it does not appear to illogical, in fact, quite a reasonable justifications for 5 million or so of people with clearance to completely and officially lose their privacy, right? So who knows, perhaps in ten years when federal employee tracking will be "accepted social norm", there will be a new push (under whatever the issue of the day) called "entrusted citizen and taxpayer". In order to be deemed to be trusted citizen and taxpayer one will be subjected to the scrutiny currently extended to the federal security apparatus employees. The icing of the cake is the comment made by the program leaders : “The system only works well, if it has thoughtful, educated, careful human beings behind it” . I am happy to remind that this a less romantic quote of Soviet Cheka (http://en.wikipedia.org/wiki/%D0%A7%D0%9A), who have described themselves as patriots with flaming heart and cold mind." Link to Original Source top
How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy
Trachman (3499895) writes "One of the many pressing and interesting stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.
Among the core self-identified purposes of (Joint Threat Research Intelligence Group) — JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable.
Original 25 BTC coins are indeed worth approx $15,000 each now, and obviously TSA heard something about BTC, but they are clearly ill-informed about it.
If you carry a passport of the wrong nation, such as Cuba, Syria, Sudan, Algeria etc, you are then, automatically subjected for enhanced body search/pat down. It looks like there is a new "risk factor" — Bitcoin, even if it is a Bitcoin logo on your t-shirt or a Bitcoin pin.
We can only speculate on what will happen to the innocent passenger who will be the first one to bring a spent/used bitcoin: will TSA want check it?
What will happen if one prints out the bitcoin on paper and encrypts it? Will there be a requirement to report it?" Link to Original Source top
Trachman (3499895) writes "National Geographic in March 2014 edition has excellent article about black holes, authored by Michael Finkel. http://ngm.nationalgeographic.... . This is by far one of the best and clearest articles about the black holes, without confusing mathematical formulas or complicated concepts. One hypothesis is very logical "... At the center of a black hole is a conundrum called a singularity". Article hypothesizes that singularity is a dimension-less point in space. "... Singularities are imagined to be extremely tiny. Beyond tiny: Enlarge a singularity a trillion trillion times, and the world’s most powerful microscope wouldn’t come close to seeing it. But something is there, at least in a mathematical sense. Something not just small but also unimaginably heavy. "
Nevertheless, black hole theories are full of contradictions (not that I am implying a lack of efforts to clarify them). For example, if photons do not have mass then how exactly mass-less photons are impacted by gravity and how come heavy objects bend light and why light cannot escape black holes?
Has anyone noticed any other logical dichotomies that beg for a clearer answer and that would, hopefully, will lead to new and ingenious experiments helping to understand the universe around us?" Link to Original Source top
Nations Largest Cocaine Smuggler Revealed: The DEA
Trachman (3499895) writes "An investigation conducted in Mexico found the American government allowed that country’s largest drug cartel, Sinaloa, to operate without fear of persecution, effectively making DEA the largest cocaine supplier in the USA, controlling 80% of the market. DEA/ATF working together have also supplied weapons to Sinaloa to reduce competition, as we remember from ATF gunwalking scandal http://en.wikipedia.org/wiki/ATF_gunwalking_scandal.