×
Patents

A Brief History of Patenting the Wheel: What Goes Around Comes Around 36

v3rgEz writes Marc Abrahams, founder of the Ig Nobel Prize, has put together a fascinating history of people patenting the wheel, including one inventor that did it to prove how ridiculous Australia's patent system was and another that put wheels on a wheel so it could wheel while it wheels. From the article: "I discovered today that the Australian patent office has — quietly — revoked the patent it granted, in the year 2001, for the wheel. The patent office had awarded Innovation Patent #2001100012 to John Keogh of Hawthorn, Victoria, Australia. Keogh’s application called his invention a “circular transportation facilitation device.” I became acquainted with Mr. Keogh when we awarded him — and the Australian Patent Office — an Ig Nobel Prize, in 2001."
The Military

The Pentagon's $399 Billion Plane To Nowhere 364

schwit1 writes with an update on the U.S. government's troubled F-35 program, the cost of which keeps rising while the planes themselves are grounded. A fire in late June caused officials to halt flights for the entire fleet of $112 million vehicles last week. Despite this, Congress is still anxious to push the program forward, and Foreign Policy explains why: Part of that protection comes from the jaw-dropping amounts of money at stake. The Pentagon intends to spend roughly $399 billion to develop and buy 2,443 of the planes. However, over the course of the aircrafts' lifetimes, operating costs are expected to exceed $1 trillion. Lockheed has carefully hired suppliers and subcontractors in almost every state to ensure that virtually all senators and members of Congress have a stake in keeping the program — and the jobs it has created — in place. "An upfront question with any program now is: How many congressional districts is it in?" said Thomas Christie, a former senior Pentagon acquisitions official. Counting all of its suppliers and subcontractors, parts of the program are spread out across at least 45 states. That's why there's no doubt lawmakers will continue to fund the program even though this is the third time in 17 months that the entire fleet has been grounded due to engine problems."
The Courts

Tor Project Sued Over a Revenge Porn Business That Used Its Service 311

redletterdave writes: The Tor Project has been sued in the state of Texas over a revenge porn website that used its free encrypted communications service. The plaintiff in the case — Shelby Conklin, a criminal justice major at the University of North Texas — alleges a revenge porn site called Pinkmeth "gained unauthorized access to nude photographs" she owned and posted them to the internet. She also said Tor, which The Economist once called "a dark corner of the web," was involved in an active "civil conspiracy" with Pinkmeth because the revenge porn website used the anonymous communications service to prevent others from tracking its location.
Privacy

Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On 223

Advocatus Diaboli (1627651) writes The National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans — including a political candidate and several civil rights activists, academics, and lawyers — under secretive procedures intended to target terrorists and foreign spies. From the article: "The individuals appear on an NSA spreadsheet in the Snowden archives called 'FISA recap.' Under that law, the Justice Department must convince a judge with the top-secret Foreign Intelligence Surveillance Court that there is probable cause to believe that American targets are not only agents of an international terrorist organization or other foreign power, but also 'are or may be' engaged in or abetting espionage, sabotage, or terrorism. The authorizations must be renewed by the court, usually every 90 days for U.S. citizens. ... The five Americans whose email accounts were monitored by the NSA and FBI have all led highly public, outwardly exemplary lives. All five vehemently deny any involvement in terrorism or espionage, and none advocates violent jihad or is known to have been implicated in any crime, despite years of intense scrutiny by the government and the press. Some have even climbed the ranks of the U.S. national security and foreign policy establishments."
United States

DHS Mistakenly Releases 840 Pages of Critical Infrastructure Documents 50

wiredmikey (1824622) writes The Operation Aurora attack was publicized in 2010 and impacted Google and a number of other high-profile companies. However, DHS responded to the request by releasing more than 800 pages of documents related to the 'Aurora' experiment conducted several years ago at the Idaho National Laboratory, where researchers demonstrated a way to damage a generator via a cyber-attack. Of the documents released by the DHS, none were related to the Operation Aurora cyber attack as requested. Many of the 840 pages are comprised of old weekly reports from the DHS' Control System Security Program (CSSP) from 2007. Other pages that were released included information about possible examples of facilities that could be vulnerable to attack, such as water plants and gas pipelines.
The Courts

Climate Change Skeptic Group Must Pay Damages To UVA, Michael Mann 497

ideonexus (1257332) writes In January of 2014, the American Traditions Institute (ATI) sought climate scientist Micheal Mann's emails from his time at the University of Virginia, a request that was denied in the courts. Now the Virginia Supreme Court has upheld a lower court ruling that ATI must pay damages for filing a frivolous lawsuit. Thus ends "Climategate." Hopefully.
Cellphones

Avast Buys 20 Used Phones, Recovers 40,000 Deleted Photos 231

An anonymous reader writes: The used smartphone market is thriving, with many people selling their old devices on eBay or craigslist when it's time to upgrade. Unfortunately, it seems most people are really bad at wiping their phone of personal data before passing it on to a stranger. Antivirus company Avast bought 20 used Android phones off eBay, and used some basic data recovery software to reconstruct deleted files. From just those 20 phones, they pulled over 40,000 photographs, including 1,500 family pictures of children and over a thousand more.. personal pictures. They also recovered hundreds of emails and text messages, over a thousand Google searches, a completed loan application, and identity information for four of the previous owners. Only one of the phones had security software installed on it, but that phone turned out to provide the most information of all: "Hackers at Avast were able to identify the previous owner, access his Facebook page, plot his previous whereabouts through GPS coordinates, and find the names and numbers of more than a dozen of his closest contacts. What's more, the company discovered a lot about this guy's penchant for kink and a completed copy of a Sexual Harassment course — hopefully a preventative measure."

Slashdot Top Deals