×
Japan

NRC Releases Audio of Fukushima Disaster 56

mdsolar writes "The Nuclear Regulatory Commission today released transcripts and audio recordings made at the NRC Operations Center during last year's meltdown at the Fukushima Daiichi Nuclear Power Plant in Japan. The release of these audio recordings comes at the request of the public radio program 'BURN: An Energy Journal,' and its host Alex Chadwick. The recordings show the inside workings of the U.S. government's highest level efforts to understand and deal with the unfolding nuclear crisis as the reactors meltdown. In the course of a week, the NRC is repeatedly alarmed that the situation may turn even more catastrophic. The NRC emergency staff discusses what to do — and what the consequences may be — as it learns that reactor containment safeguards are failing, and that spent fuel pools are boiling away their cooling water, and in one case perhaps catching fire."
Facebook

Man Ordered To Apologize To Wife On Facebook 400

New submitter Marillion writes "Photographer Mark Byron was so bothered by his pending divorce and child visitation issues that he blasted his soon-to-be ex-wife on his personal Facebook page. That touched off a battle that resulted in a Hamilton County judge ordering Byron jailed for his Facebook rant — and to post on his page an apology to his wife and all of his Facebook friends, something free speech experts found troubling."
EU

ACTA Referred To Europe's Top Court For Analysis 61

superglaze writes "The Anti-Counterfeiting Trade Agreement is to get an extra level of scrutiny in the EU after the European Commission said it would refer ACTA to the European Court of Justice, to check that it really does comply with fundamental freedoms in the union. This obviously follows mass protests over ACTA, and it seems justice commissioner Viviane Reding was the one who pushed for ECJ scrutiny. It's not currently clear if this will delay the European Parliament ratification process, but it is hard to imagine the parliament voting on ACTA (scheduled for June at the moment) before the ECJ has had its say — and no-one can say right now how long that will take to happen."
Privacy

Privacy-Centric Search Engine Scroogle Shuts Down 128

An anonymous reader writes "Daniel Brandt started his 'Scroogle' search engine because he wanted to provide increased privacy to people who searched online through Google. Unfortunately, while Google tolerated this for a while, they began throttling Scroogle queries. This, in combination with extensive DDoS attacks on Brandt's servers, has caused him to take Scroogle offline, along with his other domains. He said, 'I no longer have any domains online. I also took all my domains out of DNS because I want to signal to the criminal element that I have no more servers to trash. This hopefully will ward off further attacks on my previous providers. Scroogle.org is gone forever. Even if all my DDoS problems had never started in December, Scroogle was already getting squeezed from Google's throttling, and was already dying. It might have lasted another six months if I hadn't lost seven servers from DDoS, but that's about all.' Internet users who made use of the services will now need to investigate other options."
The Almighty Buck

Unconstitutional Video Game Law Costs California $2 Million 180

An anonymous reader writes "In hopes of protecting the children of California from the ravages of violent video games, then governor Arnold Schwarzenegger attempted to push through a law that would fine retailers $1000 for each infraction of selling a violent game to an underage child. However, in the wake of appeals to the U.S. Supreme Court, which struck down the law, California is now forced to pay the legal fees of all parties to the tune of two million dollars."
Privacy

Transparency Grenade Collects and Leaks Sensitive Data 103

Zothecula writes "If you thought WikiLeaks was a disruptive idea, the transparency grenade is going to blow you away. This tiny bit of hardware hidden under the shell shaped like a classic Soviet F1 hand grenade allows you to leak information from anywhere just by pulling a pin. The device is essentially a small computer with a powerful wireless antenna and a microphone. Following 'detonation,' the grenade intercepts local network traffic and captures audio data, then makes the information immediately available online."
Government

Damaged US Passport Chip Strands Travelers 624

caseih writes "Damaging the embedded chip in your passport is now grounds for denying you the ability to travel in at least one airport in the U.S. Though the airport can slide the passport through the little number reader as easily as they can wave it in front of an RFID reader, they chose to deny a young child access to the flight, in essence denying the whole family. The child had accidentally sat on his passport, creasing the cover, and the passport appeared worn. The claim has been made that breaking the chip in the passport shows that you disrespect the privilege of owning a passport, and that the airport was justified in denying this child from using the passport."
Android

Oracle's Java Claims Now Down To $230 Million 84

jfruh writes "Hey, remember when Oracle decided to sue Google over claims that Android violated Oracle's Java patents and copyrights? How's that working out? Not so well, it seems! Oracle has been forced to take many of its patents out of the lawsuit due to lack of evidence, and the damages in play now are down to a little less than 4 percent of Oracle's original $6.1 billion claims."
Education

Tech Billionaire-Backed Charter School Under Fire In Chicago 326

theodp writes "'As a nonprofit venture philanthropy firm,' boasts the billionaire-backed NewSchools Venture Fund, 'we raise philanthropic capital from both individual and institutional investors, and then use those funds to support education entrepreneurs who are transforming public education.' One recipient of the NewSchools' largesse is The Noble Network of Charter Schools, which received a $5,300,000 NewSchools 'investment', as well as a $1,425,000 grant from NewSchools donor Bill Gates. One way that Noble Street College Prep has been transforming education, reports the Chicago Tribune, is by making students pay the price — literally — for breaking the smallest of rules (sample infractions). Chicago Mayor Rahm Emanuel defended Noble after a FOIA filing revealed the charter collected almost $190,000 in discipline 'fees' — not 'fines' — last year from its mostly low-income students, saying the ironically exempt-from-most-district-rules charter school gets 'incredible' results and parents don't have to send their children there. Beyond the Noble case, some are asking a bigger question: Should billionaires rule our schools?"
Privacy

Anonymous Cowards, Deanonymized 159

mbstone writes "Arvind Narayana writes: What if authors can be identified based on nothing but a comparison of the content they publish to other web content they have previously authored? Naryanan has a new paper to be presented at the 33rd IEEE Symposium on Security & Privacy. Just as individual telegraphers could be identified by other telegraphers from their 'fists,' Naryanan posits that an author's habitual choices of words, such as, for example, the frequency with which the author uses 'since' as opposed to 'because,' can be processed through an algorithm to identify the author's writing. Fortunately, and for now, manually altering one's writing style is effective as a countermeasure." In this exploration the algorithm's first choice was correct 20% of the time, with the poster being in the top 20 guesses 35% of the time. Not amazing, but: "We find that we can improve precision from 20% to over 80% with only a halving of recall. In plain English, what these numbers mean is: the algorithm does not always attempt to identify an author, but when it does, it finds the right author 80% of the time. Overall, it identifies 10% (half of 20%) of authors correctly, i.e., 10,000 out of the 100,000 authors in our dataset. Strong as these numbers are, it is important to keep in mind that in a real-life deanonymization attack on a specific target, it is likely that confidence can be greatly improved through methods discussed above — topic, manual inspection, etc."
Crime

The Pirate Bay On Track To Be Banned In the UK? 309

redletterdave writes with this excerpt from the International Business Times about the fate of the Pirate Bay in the UK: "Swedish filesharing website The Pirate Bay may soon be blocked in the UK after a London judge ruled that the site breaches copyright laws on a large scale, and that both the platform and its users illegally share copyrighted material like movies and music. In addition to finding legal fault with The Pirate Bay and its users, the British Phonographic Industry also wants all British ISPs to block access to The Pirate Bay in the UK."
Patents

European Parliament To Exclude Free Software With FRAND 219

First time submitter jan.van.gent writes "The European Parliament is on the verge of adopting a directive reforming standards, reform which would introduce FRAND patent licensing terms, an undefined term which has been seen as a direct attack on the fundamental principles of Free and Open Source software. The Business Software Alliance has been very active trying to get FRAND terms into the directive."
Google

Microsoft Accuses Google of Violating Internet Explorer's Privacy Settings 197

New submitter Dupple writes with a followup to Friday's news that Google was bypassing Safari's privacy settings. Now, Microsoft's Internet Explorer blog has a post accusing Google of doing the same thing (in a different way) to Internet Explorer. Quoting: "By default, IE blocks third-party cookies unless the site presents a P3P Compact Policy Statement indicating how the site will use the cookie and that the site’s use does not include tracking the user. Google’s P3P policy causes Internet Explorer to accept Google’s cookies even though the policy does not state Google’s intent. P3P, an official recommendation of the W3C Web standards body, is a Web technology that all browsers and sites can support. Sites use P3P to describe how they intend to use cookies and user information. By supporting P3P, browsers can block or allow cookies to honor user privacy preferences with respect to the site’s stated intentions. ... Technically, Google utilizes a nuance in the P3P specification that has the effect of bypassing user preferences about cookies. The P3P specification (in an attempt to leave room for future advances in privacy policies) states that browsers should ignore any undefined policies they encounter. Google sends a P3P policy that fails to inform the browser about Google’s use of cookies and user information. Google’s P3P policy is actually a statement that it is not a P3P policy."
China

Chinese Court Orders Ban On Apple's iPad 190

zacharye writes "A lawyer representing Proview International on Monday announced that the Intermediate People's Court in Huizhou, a city in southern China, ruled that distributors should stop selling iPads in China. From the article: 'The ruling, which was also reported widely in China's state media, may not have a far-reaching effect. In its battle with Apple, Proview is utilizing lawsuits in several places and also requesting commercial authorities in 40 cities to block iPad sales. Apple Inc. said in a statement Monday that its case is still pending in mainland China. The company has appealed to Guangdong's High Court against an earlier ruling in Proview's favor.'"
Government

UK Government To Demand Data On Every Call, Email, and Tweet 199

judgecorp writes "The UK government is proposing a law that would require phone and Internet companies to store information on all communications, and hand it to the security services when required. The Communications Capabilities Development Programme (CCDP) abandoned by the last government is back on the table, proposed as a means to increase security, and likely to be pushed through before the Olympics in London, according to reports."
The Military

Nuclear Truckers Haul Warheads Across US 461

Hugh Pickens writes "As you weave through interstate traffic, you're unlikely to notice a plain-looking Peterbilt tractor-trailer or have any idea that inside the cab an armed federal agent operates a host of electronic countermeasures to keep outsiders from accessing his heavily armored cargo: a nuclear warhead. Adam Weinstein writes that the Office of Secure Transportation (OST) employs nearly 600 couriers to move bombs, weapon components, radioactive metals for research, and fuel for Navy ships and submarines between a variety of labs, reactors and military bases. Hiding nukes in plain sight and rolling them through major metropolitan centers raises a slew of security and environmental concerns, from theft to terrorist attack to radioactive spills. 'Any time you put nuclear weapons and materials on the highway, you create security risks,' says Tom Clements, a nuclear security watchdog for Friends of the Earth. For security, cabs are fitted with custom composite armor and lightweight armored glass, a redundant communications system that links the convoys to a monitoring center in Albuquerque, and the driver has the ability to disable the truck so it can't be moved or opened. The OST hires military veterans, particularly ex-special-operations forces (PDF), who are trained in close-quarters battle, tactical shooting, physical fitness, and shifting smoothly through the gears of a tractor-trailer. But accidents happen. In 1996, a driver flipped his trailer on a two-lane Nebraska hill road after a freak ice storm, sending authorities scrambling to secure its payload of two nuclear bombs; and in 2003, two trucks operated by private contractors had rollover accidents in Montana and Tennessee while hauling uranium hexafluoride, a compound used to enrich reactor and bomb fuel."
Privacy

Leaky Cellphone Nets Can Give Attackers Your Location 67

alphadogg writes "GSM cellular networks leak enough location data to give third-parties secret access to cellphone users' whereabouts, according to new University of Minnesota research. 'We have shown that there is enough information leaking from the lower layers of the GSM communication stack to enable an attacker to perform location tests on a victim's device. We have shown that those tests can be performed silently without a user being aware by aborting PSTN calls before they complete,' write the authors, from the College of Science and Engineering, in a paper titled 'Location Leaks on the GSM Air Interface' (Pdf). The researchers are working with carriers and equipment makers, including AT&T and Nokia, to address the security issues."

Slashdot Top Deals