By timothy from Slashdot's banning-opaque-envelopes-too department
writes The Sydney Morning Herald is reporting that Australian federal and state police are using a no warrant cell phone tower metadata access technique called a "tower dump".
A "tower dump" provides the identity, activity and location of all cell phones that connect a cellphone tower(s) over time (an hour or two). The metadata from thousands of phones and numbers connected are then sorted. Australian law-enforcement agencies made 330,000 requests for metadata in 2012-13.
AHuxley links to some U.S. views on the same kind of massive data grab: The Wall Street Journal says they caputure innocent user's data
; the Chicago Police Department is being sued for information on its purchases
of equipment associated with this kind of slurping; and the EFF asks whether warrant protection for users' data will be extended
by voice-comm companies as it has been for ISPs. I wonder what people would think of an occasional "postal zone dump" employing the same kind of dragnet but for communications on paper.Read Replies (0)
By Unknown Lamer from Slashdot's keeping-costs-down department
An anonymous reader writes "Today, CentOS project unveiled CentOS Linux 7 for 64 bit x86 compatible machines. CentOS conforms fully with Red Hat's redistribution policy and aims to have full functional compatibility with the upstream product released in last month. The new version includes systemd, firewalld, GRUB2, LXC, docker, xfs instead of ext4 filesystem by default. The Linux kernel updated to 3.10.0, support for Linux Containers, 3d graphics drivers out of the box, OpenJDK 7, support for 40G Ethernet cards, installations in UEFI secure Boot mode on compatible hardware and more. See the complete list of features here and here. You can grab this release by visiting the official mirror site or via torrents. On a related note there is also a CentOS Linux 7 installation screencast here."Read Replies (0)
By Unknown Lamer from Slashdot's ring-of-wizardy department
New submitter anguyen8 (3736553)
writes with news of an interesting experiment spatial input device. From the article: "The mouse is a hugely useful device but it is also a two-dimensional one. But what of the three-dimensional world and the long-standing, but growing, promise of virtual reality. What kind of device will take the place of the mouse when we begin to interact in three-dimensions? Anh Nguyen and Amy Banic ... have created an intelligent thimble that can sense its position accurately in three-dimensions and respond to a set of pre-programmed gestures that allow the user to interact with objects in a virtual three-dimensional world. ... The result is the 3DTouch, a thimble-like device that sits on the end of a finger, equipped with a 3D accelerometer, a 3D magnetometer, and 3D gyroscope. That allows the data from each sensor to be compared and combined to produce a far more precise estimate of orientation than a single measurement alone. In addition, the 3DTouch has an optical flow sensor that measures the movement of the device against a two-dimensional surface, exactly like that inside an ordinary mouse."
The prototype is wired up to an Arduino Uno, with a program on the host machine polling the device and converting the data into input events. A video of it in action is below the fold, a pre-print of the research paper
is on arxiv, and a series of weblog entries explain some of the development
.Read Replies (0)
KDE Releases Frameworks 5
Posted by News Fetcher on July 07 '14 at 03:15 PM
By Unknown Lamer from Slashdot's new-and-shiny department
:KDE Community (3396057)
writes The KDE Community is proud to announce the release of KDE Frameworks 5.0. Frameworks 5 is the next generation of KDE libraries, modularized and optimized for easy integration in Qt applications. The Frameworks offer a wide variety of commonly needed functionality in mature, peer reviewed and well tested libraries with friendly licensing terms. There are over 50 different Frameworks as part of this release providing solutions including hardware integration, file format support, additional widgets, plotting functions, spell checking and more. Many of the Frameworks are cross platform and have minimal or no extra dependencies making them easy to build and add to any Qt application.
Version five of the desktop shell, Plasma, will be released soon
, and packages of Plasma-next and KDE Frameworks 5 will trickle into Ubuntu Utopic over the next few days
. There's a Live CD of Frameworks 5 / Plasma-next
, last updated July 4th.Read Replies (0)
By samzenpus from Slashdot's that's-some-good-PR-work-there-lou department
An anonymous reader writes Jeffrey Baldwin was essentially starved to death by his grandparents. Funds had been raised to build a monument for Jeffrey in Toronto. The monument was designed to feature Jeffrey in a Superman costume, and even though Superman should be public domain, DC Comics has denied the request. "The request to DC had been made by Todd Boyce, an Ottawa father who did not know the Baldwin family. Boyce was so moved by the testimony at the coroner’s inquest into Jeffrey’s death last year that he started an online fundraising campaign for the monument. DC’s senior vice-president of business and legal affairs, Amy Genkins, told Boyce in an email that 'for a variety of legal reasons, we are not able to accede to the request, nor many other incredibly worthy projects that come to our attention.'... For Boyce, it was a huge blow, as he felt the Superman aspect was a crucial part of the bronze monument, which will include a bench. The coroner’s inquest heard from Jeffrey’s father that his son loved to dress up as Superman."Read Replies (1)
By samzenpus from Slashdot's read-all-about-it department
writes There is a not so fine line between data dashboards and other information displays that provide pretty but otherwise useless and unactionable information; and those that provide effective answers to key questions. Data-Driven Security: Analysis, Visualization and Dashboards is all about the later. In this extremely valuable book, authors Jay Jacobs and Bob Rudis show you how to find security patterns in your data logs and extract enough information from it to create effective information security countermeasures. By using data correctly and truly understanding what that data means, the authors show how you can achieve much greater levels of security.
Keep reading for the rest of Ben's review. Data-Driven Security: Analysis, Visualization and Dashboards
author Jay Jacobs and Bob Rudis
reviewer Ben Rothke
summary Superb book for effective use of data for information securityRead Replies (0)