Dupple writes "When a cellphone is reported stolen in New York, the Police Department routinely subpoenas the phone's call records, from the day of the theft onward. The logic is simple: If a thief uses the phone, a list of incoming and outgoing calls could lead to the suspect. But in the process, the Police Department has quietly amassed a trove of telephone logs, all obtained without a court order, that could conceivably be used for any investigative purpose. The call records from the stolen cellphones are integrated into a database known as the Enterprise Case Management System, according to Police Department documents from the detective bureau. Each phone number is hyperlinked, enabling detectives to cross-reference it against phone numbers in other files."
Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. ×
coondoggie writes "Sandia National Laboratories physicist Willis Whitfield, 92, passed away earlier this month and left a technological legacy that continues to reverberate today: The legendary clean room. The original laminar-flow 10 x 6 clean room developed 50 years ago by Whitfield was more than 1,000 times cleaner than any cleanrooms used at the time and ultimately revolutionized microelectronics, healthcare and manufacturing development. According to Sandia, with slight modifications, it is still the clean room standard today."
coondoggie writes "A team of world-wide law enforcement agencies took out 132 domain names today that were illegally selling counterfeit merchandise online. The group, made up of U.S. Immigration and Customs Enforcement's Homeland Security Investigations and law enforcement agencies from Belgium, Denmark, France, Romania, United Kingdom and the European Police Office, targeted alleged counterfeiters selling everything from professional sports jerseys, DVD sets, and a variety of clothing to jewelry and luxury goods."
An anonymous reader writes "The Illinois anti-eavesdropping law was cut down slightly. While protecting the average citizen from eavesdropping, it also put in place prohibitions against recording the police as they were doing their jobs. An appeals court sided with the ACLU, saying that it was too great a restriction on First Amendment rights. Today, the U.S. Supreme Court refused to hear the appeal, cementing in place the lower court's ruling. In Illinois, you can now secretly record the police."
An anonymous reader writes "Ordered to tell Samsung all of the company's HTC secrets, Apple throws a tantrum and adds a bunch of new products to the never-ending list of products Samsung has infringed on. Apple's tantrum stems from a ruling on Thursday that could have a large effect on the Apple lawsuit. The Apple lawsuit, which was filed in February, alleges that Samsung violated Apple patents related to user interface, technology and style. The first decision was found in favor of Apple to the tune of $1 billion, but Samsung is trying to get that ruling thrown out. But as the Apple lawsuit has gone on, the Apple lawsuit has gotten fiercer, and because of a ruling on Thursday, Apple throws a tantrum and is trying to add even more products into the lawsuit."
The tough economic times have had a huge effect on scientific research and development funding. The looming "fiscal cliff" may be the last straw for many programs. "The American science programs that landed the first man on the moon, found cures for deadly diseases and bred crops that feed the world now face the possibility of becoming relics in the story of human progress. American scientific research and development stands to lose thousands of jobs and face a starvation diet of reduced funding if politicians fail to compromise and halt the United States' march towards the fiscal cliff's sequestration of federal funds."
cstacy writes "The Nassau County (New York) Police Department is 'very concerned' about reports that shreds of police documents (with social security numbers, phone numbers, addresses, license plate numbers, incident reports, and more) rained down as confetti in the Macy's Thanksgiving Day Parade. The documents also unveiled the identities of undercover officers, including their SSNs and bank information, according to WPIX-TV. Macy's has no idea how this happened, as they use commercial, colored confetti, not shredded paper."
An anonymous reader writes "We've heard this one before, over and over again: pirates are the biggest spenders. It therefore shouldn't surprise too many people to learn that shutting down Megaupload earlier this year had a negative effect on box office revenues. The latest finding comes from a paper titled: 'Piracy and Movie Revenues: Evidence from Megaupload.'"
Hugh Pickens writes "The Orlando Sentinel reports that a google search was made for the term 'foolproof suffocation' on the Anthony family's computer the day Casey Anthony's 2-year-old daughter Caylee was last seen alive by her family — a search that did not surface at Casey Anthony's trial for first degree murder. In the notorious 31 days which followed, Casey Anthony repeatedly lied about her and her daughter's whereabouts and at Anthony's trial, her defense attorney argued that her daughter drowned accidentally in the family's pool. Anthony was acquitted on all major charges in her daughter's death, including murder. Though computer searches were a key issue at Anthony's murder trial, the term 'foolproof suffocation' never came up. 'Our investigation reveals the person most likely at the computer was Casey Anthony,' says investigative reporter Tony Pipitone. Lead sheriff's Investigator Yuri Melich sent prosecutors a spreadsheet that contained less than 2 percent of the computer's Internet activity that day and included only Internet data from the computer's Internet Explorer browser – one Casey Anthony apparently stopped using months earlier — and failed to list 1,247 entries recorded on the Mozilla Firefox browser that day — including the search for 'foolproof suffocation.' Prosecutor Jeff Ashton said in a statement to WKMG that it's 'a shame we didn't have it. (It would have) put the accidental death claim in serious question.'"
An anonymous reader sends this excerpt from The Hill: "The past week's violence in Gaza has rekindled calls for Twitter to shutter the accounts of U.S.-labeled terror groups such as Hamas. Seven House Republicans asked the FBI in September to demand that Twitter take down the accounts of U.S.-designated terrorist groups, such as Hamas, Hezbollah and Somalia's al Shabaab. The letter to FBI Director Robert Mueller was spearheaded by Rep. Ted Poe (R-Texas), who said Wednesday that the recent events vindicated the request. 'Allowing foreign terrorist organizations like Hamas to operate on Twitter is enabling the enemy,' [Poe said] 'Failure to block access arms them with the ability to freely spread their violent propaganda and mobilize in their War on Israel.'"
avxo writes "According to an article on the New Zealand Herald, Kim Dotcom says his team has evidence showing that the Department of Homeland Security served a search warrant on Megaupload in 2010, forcing it to preserve pirated movies. According to Mr. Dotcom, those preserved movies are the center of the latest legal battle. 'When the FBI applied to seize the Megaupload site in 2012, it said the company had failed to delete pirated content and cited the earlier search warrant against the continued existence of 36 of the same 39 files.' He added: '[t]he FBI used the fact the files were still in the account of the ... user to get the warrant to seize our own domains. This is outrageous.'"
David Hume writes "The Los Angeles Times has a story about the two-year University of Tulsa Cyber Corps Program. About '85% of the 260 graduates since 2003 have gone to the NSA, which students call "the fraternity," or the CIA, which they call "the sorority."' 'Other graduates have taken positions with the FBI, NASA and the Department of Homeland Security.' According to the University of Tulsa website, two programs — the National Science Foundation's Federal Cyber Service: Scholarship for Service and the Department of Defense's (DOD's) Information Assurance Scholarship Program — provide scholarships to Cyber Corps students."
An anonymous reader writes "A court in Hamburg, Germany, has granted an injunction against a user of the anonymous and encrypted file-sharing network RetroShare. RetroShare users exchange data through encrypted transfers and the network setup ensures that the true sender of the file is always obfuscated. The court, however, has now ruled that RetroShare users who act as an exit node are liable for the encrypted traffic that's sent by others."
dgharmon writes with this excerpt from rt.com: "A pretrial hearing in the case against accused LulzSec hacker Jeremy Hammond this week ended with the 27-year-old Chicago man being told he could be sentenced to life in prison for compromising the computers of Stratfor. Judge Loretta Preska told Hammond in a Manhattan courtroom on Tuesday that he could be sentenced to serve anywhere from 360 months-to-life if convicted on all charges relating to last year's hack of Strategic Forecasting, or Stratfor, a global intelligence company whose servers were infiltrated by an offshoot of the hacktivist collective Anonymous. Hammond is not likely to take the stand until next year, but so far has been imprisoned for eight months without trial. Legal proceedings in the case might soon be called into question, however, after it's been revealed that Judge Preska's husband was a victim of the Stratfor hack."
An anonymous reader writes "Computerworld asks: What will happen if big advertisers declare AdBlock Plus a clear and present danger to online business models? Hint: it will probably involve lawyers. From the article: 'Could browser ad blocking one day become so prevalent that it jeopardises potentially billions of dollars of online ad revenue, and the primary business models of many online and new media businesses? If so, it will inevitably face legal attack.'"