Logo Background

» Feds

  • Feds Want Nuclear Waste Train, But Don’t Know Where It Would Go
    By on September 1, 2014 | Comments Off  Comments

    mdsolar writes with news of a plan to move radioactive waste from nuclear plants. The U.S. government is looking for trains to haul radioactive waste from nuclear power plants to disposal sites. Too bad those trains have nowhere to go. Putting the cart before the horse, the U.S. Department of Energy recently asked companies for ideas on how the government should get the rail cars needed to haul 150-ton casks filled with used, radioactive nuclear fuel. (more…)

  • Did Feds’ Use of Fake Cell Tower Constitute a Search?
    By on November 6, 2011 | Comments Off  Comments

    hessian writes with this story in Wired: “Federal authorities used a fake Verizon cellphone tower to zero in on a suspect’s wireless card, and say they were perfectly within their rights to do so, even without a warrant. But the feds don’t seem to want that legal logic challenged in court by the alleged identity thief they nabbed using the spoofing device, known generically as a stingray. So the government is telling a court for the first (more…)

  • Feds To Remotely Uninstall Bot From Some PCs
    By on April 27, 2011 | Comments Off  Comments

    CWmike writes “Federal authorities will remotely uninstall the Coreflood botnet Trojan from some infected Windows PCs over the next four weeks. Coreflood will be removed from infected computers only when the owners have been identified by the DOJ and they have submitted an authorization form to the FBI. The DOJ’s plan to uninstall Coreflood is the latest step in a coordinated campaign to cripple the botnet, which controls more than 2 million compromised (more…)

  • Feds Discover 1,000 More Government Data Centers
    By on October 13, 2010 | Comments Off  Comments

    1sockchuck writes “The US government has 2,094 data centers, nearly 1,000 more than previous estimates, according to an updated inventory by federal agencies. The finding underscores the scope of the challenge facing the Obama administration as it seeks to streamline the government’s IT infrastructure in a massive data center consolidation.”

    Read more of this story at Slashdot.


  • Feds Bust Chinese Firm’s Hybrid Car Data Heist
    By on July 22, 2010 | Comments Off  Comments

    coondoggie writes “An FBI investigation has led a Michigan couple to be charged with stealing hybrid car information from GM to use in a Chinese auto outfit. A federal indictment charged Yu Qin, aka Yu Chin, 49, and his wife, Shanshan Du, aka Shannon Du, 51, of Troy, Michigan with conspiracy to possess trade secrets without authorization, unauthorized possession of trade secrets, and wire fraud. One of the individuals was also charged with obstruction (more…)

  • Yahoo, Feds Battle Over E-mail Privacy
    By on April 14, 2010 | Comments Off  Comments

    Yahoo and federal prosecutors are embroiled in a privacy battle testing whether the Constitution’s warrant requirements apply to Americans’ e-mail. The legal dust up concerns a 1986 law that allows the government to obtain a suspect’s e-mail from an ISP or webmail provider without a probable-cause warrant…


  • Feds Question Big Media’s Piracy Claims
    By on April 13, 2010 | Comments Off  Comments

    WrongSizeGlass writes “CNET is reporting that the GAO’s study of big media’s piracy claims has raised some questions. (Here are the study’s summary, highlights [PDF], and full report [PDF].) ‘After spending a year studying how piracy and illegal counterfeiting affects the United States, the Government Accountability Office says it still doesn’t know for sure…. The GAO said that most of the published information, anecdotal evidence, and records show (more…)

  • EFF Wants To Know If the Feds Are Cyberstalking
    By on December 3, 2009 | Comments Off  Comments

    rossendryv writes “The Electronic Frontier Foundation and UC Berkeley’s Samuelson Center filed suit in California’s Northern District, asking the court to force a number of government agencies to hand over any documents they have concerning the use of social networking sites as part of investigative procedures.”

    Read more of this story at Slashdot.