Why DOJ Didn’t Need a “Super Search Warrant” To Snoop On Fox News’ E-mail

awaissoft writes “If attorney general Eric Holder wanted to perform even a momentary Internet wiretap on Fox News’ e-mail accounts, he would have had to persuade a judge to approve what lawyers call a ‘super search warrant.’ A super search warrant’s requirements are exacting: Intercepted communications must be secured and placed under seal. Real-time interception must be done only as a last resort. Only certain crimes qualify for this technique, the target must be notified, and additional restrictions apply to state and local police conducting real-time intercepts. But because of the way federal law was written nearly half a century ago, Holder was able to obtain a normal search warrant — lacking those extensive privacy protections — that allowed federal agents to secretly obtain up to six years of email correspondence between Fox News correspondent James Rosen and his alleged sources.” Read more of this story at Slashdot.

View article:
Why DOJ Didn’t Need a “Super Search Warrant” To Snoop On Fox News’ E-mail

IRS Admits Targeting Conservative Groups During 2012 Election

An anonymous reader writes “A recurring theme in comments on Slashdot since the 9/11 attacks has been concern about the use of government power to monitor or suppress political activity unassociated with terrorism but rather based on ideology. It has just been revealed that the IRS has in fact done that. From the story: “The Internal Revenue Service inappropriately flagged conservative political groups for additional reviews during the 2012 election . . . Organizations were singled out because they included the words ‘tea party’ or ‘patriot’ in their applications for tax-exempt status, said Lois Lerner, who heads the IRS division that oversees tax-exempt groups. In some cases, groups were asked for their list of donors, which violates IRS policy in most cases, she said. ‘That was wrong. That was absolutely incorrect, it was insensitive and it was inappropriate. That’s not how we go about selecting cases for further review,’ Lerner said . . . ‘The IRS would like to apologize for that,’ she added. . . . Lerner said the practice was initiated by low-level workers in Cincinnati and was not motivated by political bias. . . . she told The AP that no high level IRS officials knew about the practice. Tea Party groups were livid on Friday. … In all, about 300 groups were singled out for additional review. . . Tea Party groups weren’t buying the idea that the decision to target them was solely the responsibility of low-level IRS workers. … During the conference call it was stated that no disciplinary action had been taken by those who engaged in this activity. President Obama has previously joked about using the IRS to target people.” So it’s not how they choose cases for review (except when it is), and was not motivated by political bias (except that it was). Also at National Review, with more bite. Read more of this story at Slashdot.

Read this article:
IRS Admits Targeting Conservative Groups During 2012 Election

Federal Magistrate Rules That Fifth Amendment Applies To Encryption Keys

Virtucon writes “U.S. Magistrate William Callahan Jr. of Wisconsin has ruled in favor of the accused in that he should not have to decrypt his storage device. The U.S. Government had sought to compel Feldman to provide his password to obtain access to the data. Presumably the FBI has had no success in getting the data and had sought to have the judge compel Feldman to provide the decrypted contents of what they had seized. The Judge ruled (PDF): ‘This is a close call, but I conclude that Feldman’s act of production, which would necessarily require his using a password of some type to decrypt the storage device, would be tantamount to telling the government something it does not already know with “reasonably particularity” — namely, that Feldman has personal access to and control over the encrypted storage devices. Accordingly, in my opinion, Fifth Amendment protection is available to Feldman. Stated another way, ordering Feldman to decrypt the storage devices would be in violation of his Fifth Amendment right against compelled self-incrimination.'” If the government has reasonable suspicion that you have illicit data, they can still compel you to decrypt it. Read more of this story at Slashdot.

Read this article:
Federal Magistrate Rules That Fifth Amendment Applies To Encryption Keys

This Is the Camera That Found Dzhokhar Tsarnaev

Law enforcement didn’t pull any punches during its manhunt for the Boston Marathon bombers, going so far as to lock down an entire metropolis while they searched. Even when officers thought they had the second suspect cornered in Watertown boat, they confirmed their suspicions with a camera that can spot people from up to 10 miles away. Just to be sure. More »        

More:
This Is the Camera That Found Dzhokhar Tsarnaev

Average DDoS Attack Bandwidth Jumps Eight-Fold In One Quarter

judgecorp writes “Distributed denial of service attacks have increased their bandwidth by 700 percent in the last quarter, according to DDoS specialist Prolexic. the average bandwidth has gone up from 5/9Gbps to 48.25Gbps — and the number of packets-per-second is also up. However, claims of a 300Gbps attack on Spamhaus are almost certainly false.” Read more of this story at Slashdot.

View post:
Average DDoS Attack Bandwidth Jumps Eight-Fold In One Quarter

Obama has announced a $100-million brain-mapping project

President Obama announced plans this morning for a long-term research project to improve our understanding of the brain. Comparing it to the Human Genome Project, Obama said the brain-mapping initiative could lead to cures for diseases like Alzheimer’s and autism, while fueling economic growth and job creation. Here’s what you need to know. Read more…

Read More:
Obama has announced a $100-million brain-mapping project

Hacker Challenge Winner: Automate Your Phone With Old Hotel Key Cards

In last week’s Hacker Challenge , we asked you to share your best hotel room hack . We received some great entries, but the winning hack shows us some clever ways to automate a hotel room. More »

Read More:
Hacker Challenge Winner: Automate Your Phone With Old Hotel Key Cards

Ultrasound Waves Used To Increase Data Storage Capacity of Magnetic Media

Lucas123 writes “Electrical engineers at Oregon State University (OSU) said yesterday that they have found a technique to use high-frequency sound waves to improve magnetic data storage.The data write-technology breakthrough could allow greater amounts of data to be stored on both hard disk drives and NAND flash-based solid-state drives (SSDs), they said. Typically, when magnetic recording material is temporarily heated, even for an instant, it can become momentarily less stiff and more data can be stored at a particular spot. But, the technique has proven difficult to effectively increase capacity because heating tends to spread beyond where it is wanted and the technology involves complex integration of optics, electronics and magnetics, the researchers said. With the new technique, known as acoustic-assisted magnetic recording, ultrasound is directed at a highly specific location on the material while data is being stored, creating elasticity that allows “a tiny portion of the material to bend or stretch.” After the ultrasound is turned off, the material immediately returns to its original shape, but the data stored during the process remains in a dense form.” Read more of this story at Slashdot.

View post:
Ultrasound Waves Used To Increase Data Storage Capacity of Magnetic Media

Printable AR-15 Mag Gets More Reliable; YouTube Pulls Video of Demo

Wired reports that the 3-D printed AR-15 magazine from Defense Distributed we mentioned a few weeks back has been improved through design, and is now robust enough to last through firing (at least) several hundred rounds, rather than fewer than a hundred as in the previous iteration. CNET says the video demonstration on YouTube was first yanked, then restored, but as of now seems to have been yanked again. Read more of this story at Slashdot.

See the original post:
Printable AR-15 Mag Gets More Reliable; YouTube Pulls Video of Demo