First time accepted submitter kandelar writes "PBS recently ran a story about how some scientists are using human hair to trace where a person has been. The combinations of different isotopes in water make for somewhat unique signatures from place to place. These isotopes get placed in growing hair strands which can then be traced back to identify where a person has been."
Attend or create a Slashdot 20th anniversary party! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Check out the new SourceForge HTML5 Internet speed test. ×
another random user sends word that a set of newly-granted Apple patents published by the USPTO includes an alternative to the near field communication (NFC) technology that has begun to pop up in mobile devices. From the article: "Apple has received a Granted Patent relating to techniques for triggering a process within a portable electronic device that identifies itself for purposes of establishing communications with another device that is in proximity. At the moment, NFC is the technology that's getting all of the attention lately in respect to making it easier for two mobile devices to share information. While Apple is likewise doing research with NFC, they're also working with an alternate methodology for which they've now gained a patent for. In accordance with Apple's newly granted patent, a method for network device discovery monitors a compass output in a portable electronic device. As the portable device and an external device come closer to each other, a magnetic field signature is computed based on the monitored compass output. A determination is then made as to whether the computed signature could be associated with or implies that a previously defined type of electronic device (with which a network device discovery process can be conducted) is in close proximity. In other words, as the two devices come closer to each other, their respective magnetic characteristics cause the compass output to change in a way that implies that a network device discovery process should be initiated between the two devices."
beaverdownunder writes "A former police officer in the Australian state of Victoria has called on law enforcement to prosecute creators of hate pages on social media following Facebook's decision to close down a page mocking Jill Meagher, the 29-year-old Melbourne woman abducted and killed last month. Susan McLean, who spent 27 years with Victoria Police before launching her cyber safety consultancy three years ago, said police have the ability to prosecute the creators of pages that are in breach of Australian laws but appear to be unwilling to use it. 'There have been many cases in the UK where these people have been hunted down and charged and jailed. We need to do that in Australia.' Under section 474.17 of the Commonwealth Crimes Act, it is an offense to use 'a carriage service to menace, harass or cause offense,' punishable by three years in jail."
Frequent contributor Bennett Haselton writes: After I sent 10 new proxy sites to my (confirmed-opt-in) mailing list, two of them ended up on one of Spamhaus's blacklists, and as a result, all 10 domains were disabled by the domain registrar, so the sites disappeared from the Web. Did you even know this could happen?"
concealment writes with news that Amazon's Jeff Bezos has called for new legislation from governments to end abuse of the patent system. He said, 'Patents are supposed to encourage innovation and we're starting to be in a world where they might start to stifle innovation. Governments may need to look at the patent system and see if those laws need to be modified because I don't think some of these battles are healthy for society.' His comments are from an interview with the UK's Metro. Bezos was also optimistic about the future of the private space industry: "If private companies can start to generate profits from this kind of activity then you’ll start to see the flywheel spin more rapidly and we’ll make more progress, because I really do think we want to live in a civilization where millions of people are living and working in space."
concealment writes with news of those Swedish pirates improving their infrastructure. From the article: "The Pirate Bay has made an important change to its infrastructure. The world's most famous BitTorrent site has switched its entire operation to the cloud. From now on The Pirate Bay will serve its users from several cloud hosting providers scattered around the world. The move will cut costs, ensure better uptime, and make the site virtually invulnerable to police raids — all while keeping user data secure." They are still running their own dedicated load balancers that forward encrypted traffic to one of their "cloud" providers, rather than dealing with physical colocation. Seems like a sensible decision any IT manager would make.
An anonymous reader writes "The Information Commissioner's Office has filed a suit for £120,000 against the Greater Manchester Police because officers regularly used memory sticks without passwords to copy data from police computers and work on it away from the department. In July 2011, thousands of peoples' information was stolen from a officer's home on an unencrypted memory stick. A similar event happened at the same department in September 2010. 'This was truly sensitive personal data, left in the hands of a burglar by poor data security. The consequences of this type of breach really do send a shiver down the spine,' said ICO deputy commissioner David Smith."
An anonymous reader writes "Uber, the startup behind a mobile app for connecting transportation services with people who need rides, has halted its efforts to partner with New York cab drivers. They've been fighting an uphill battle against regulators, who have warned drivers that they could face fines or loss of license if they worked with Uber. The company's CEO wrote, 'Demand far out-stripped supply, making you feel pretty lucky when you got a yellow from your iPhone. We did the best we could to get more yellows on the road but New York's TLC (Taxi and Limousine Commission) put up obstacles and roadblocks in order to squash the effort around e-hail, which they privately have said is legal under the rules. We'll bite our tongues and keep our frustration here to ourselves.'" Update: 10/17 00:48 GMT by S : Here's TLC's perspective, in the words of Commissioner David Yassky: "In recent months, as e-hail apps have emerged, TLC has undertaken serious diligence and is moving toward rule changes that will open the market to app developers and other innovators. Those changes cannot legally take place until our existing exclusive contracts expire in February. We are committed to making it as easy as possible to get a safe, legal ride in a New York City taxi, and are excited to see how emerging technology can improve that process. Our taxis have always been on the cutting edge of technological innovation, from GPS systems to credit card readers."
MightyMartian writes "From the CBC: 'The tragic story of B.C. teen suicide victim Amanda Todd has taken another bizarre twist as the internet hacking and activist group Anonymous has named a man the group says was the girl's primary tormentor. Todd, 15, of Port Coquitlam, British Columbia, died last Wednesday, a month after posting a haunting video on YouTube that cited the sexualized attack that set her down a path of anxiety, depression and drug and alcohol abuse.' This raises a whole nest of issues surrounding the presumption of innocence and vigilantism. Should the police and the courts be given the appropriate amount of time to determine if there is sufficient evidence, or if a crime has in fact been committed, or is Anonymous right in short-circuiting what might in fact be a lengthy process with no guarantee that anyone will face charges?"
An anonymous reader writes "Two Schools in San Antonio are using electronic chips to help administrators count and track students' whereabouts. Students at Anson Jones Middle School and John Jay High School are now required to wear ID cards using radio frequency identification (RFID) technology embedded with electronic chips in an effort to daily attendance records. The article said the Northside Independent School District receives about $30 per day in state funding for each student reporting."
another random user writes with this excerpt from the BBC: "A row over a web article posted five years ago has led to 1.5 million educational blogs going offline. The Edublogs site went dark for about an hour after its hosting company, ServerBeach, pulled the plug. The hosting firm was responding to a copyright claim from publisher Pearson, which said one blog had been illegally sharing information it owned. ... The offending article was first published in November 2007 and made available a copy of a questionnaire, known as the Beck Hopelessness Scale, to a group of students. The copyright for the questionnaire is owned by Pearson, which asked ServerBeach to remove the content in late September."
concealment writes with this selection from Ars Technica: "A Democratic congressman who played a leading role in the fight against the Stop Online Piracy Act earlier this year has taken up a new cause: shielding Google from antitrust scrutiny. In a strongly worded letter to Federal Trade Commission chairman Jon Leibowitz, Rep. Jared Polis (D-CO) praised Google's contribution to the nation's economy. He warned Leibowitz that if the FTC does choose to initiate an antitrust case against Google, Congress might react by curtailing its regulatory authority."
RockDoctor writes "BBC radio news (2012-10-16 GMT 13:00) is reporting that the Home Secretary has blocked the extradition of Gary MacKinnon to the U.S. for (alleged) computer hacking crimes. Paraphrasing: the Director of Public Prosecutions is going to have to decide if there is sufficient evidence for him to be tried in the UK for crimes committed in (or from) the UK. " (Also at The Independent.)
judgecorp writes "Google's privacy mechanism, which combines personal data from around 60 products, and gives users only one opportunity to opt out, was rolled out in March against requests from privacy regulators in Europe. Now they want the policy reversed, and user data from the different Google products, including Gmail, Search and YouTube, to be separated. The EU attack is lead by French regulator CNIL, which has historically taken a tough line on privacy matters."
rrohbeck writes "From eff.org: 'The shadow of the Anti-Counterfeiting Trade Agreement (ACTA) is back in Europe. It is disguised as CETA, the Canada-European Union and Trade Agreement. A comparison of the leaked draft Canada-EU agreement shows the treaty includes a number of the same controversial provisions, specifically concerning criminal enforcement, private enforcement by Internet Service Providers (ISPs), and harsh damages.'"