Government

Donald Trump Obliquely Backs a Federal Database To Track Muslims 608

HughPickens.com writes: Philip Bump reports at the Washington Post that Donald Trump confirmed to NBC on Thursday evening that he supports a database to track Muslims in the United States. The database of Muslims arose after an interview Yahoo News's Hunter Walker conducted with Trump earlier this week, during which he asked the Republican front-runner to weigh in on the current debate over refugees from Syria. "We're going to have to do things that we never did before," Trump told Walker. "Some people are going to be upset about it, but I think that now everybody is feeling that security is going to rule." When pressed on whether these measures might include tracking Muslim Americans in a database or noting their religious affiliations on identification cards, Trump would not go into detail — but did not reject the options. Trump's reply? "We're going to have to — we're going to have to look at a lot of things very closely," he said. "We're going to have to look at the mosques. We're going to have to look very, very carefully." After an event on in Newton, Iowa, on Thursday night, NBC's Vaughn Hillyard pressed the point. "Should there be a database system that tracks Muslims here in this country?," Hillyard asked. "There should be a lot of systems, beyond databases" Trump said. "We should have a lot of systems." Hillyard asked about implementation, including the process of adding people to the system. "Good management procedures," Trump said. Sign people up at mosques, Hillyard asked? "Different places," Trump replied. "You sign them up at different places. But it's all about management."
Windows

Happy 30th Birthday, Windows! 249

v3rgEz writes: And what a ride it's been. Today marks the 30th anniversary since the debut of Windows 1.01, the first commercial release of Windows. At the time, it was derided as being slow, buggy, and clunky, but since then ... Well, it looks a lot better. .The Verge has a pictorial history of Windows through the years. What's your fondest memory of Bill Gates Blue Screen-of-death that could?
NASA

NASA Orders SpaceX Crew Mission To International Space Station (nasa.gov) 69

An anonymous reader writes: NASA has placed its first mission order for SpaceX to launch astronauts to the International Space Station from U.S. soil. SpaceX is now in a race with Boeing, who received a similar order in May, to see which private space company can deliver astronauts to the ISS first. NASA said, "Commercial crew missions to the space station, on the Boeing CST-100 Starliner and SpaceX Crew Dragon spacecraft, will restore America's human spaceflight capabilities and increase the amount of time dedicated to scientific research aboard the orbiting laboratory." They anticipate dramatic reductions in cost for launching astronauts to orbit compared to similar missions aboard Russian rockets. "Each company also must successfully complete a certification process before NASA will give the final approval for flight. Each contract includes a minimum of two and a maximum potential of six missions. A standard commercial crew mission to the station will carry up to four NASA or NASA-sponsored crew members and about 220 pounds of pressurized cargo. The spacecraft will remain at the station for up to 210 days, available as an emergency lifeboat during that time."
Security

Video Meet Mårten Mickos, Serial Open Source CEO (Video) 23

Marten was the MySQL CEO who built the company from a small-time free software database developer into a worldwide software juggernaut he sold to Sun Microsystems. Next, he became CEO of Eucalyptus Systems, another open source operation, which Hewlett Packard bought in 2014. Now Mårten is CEO of hackerone, a company that hooks security-worried companies up with any one of thousands of ethical hackers worldwide.

Some of those hackers might be companies that grew out of university CS departments, and some of them may be individual high school students working from their kitchen tables. Would a large company Board of Directors trust a kid hacker who came to them with a bug he found in their software? Probably not. But if Mårten or one of his hackerone people contacts that company, it's likely to listen -- and set up a bug bounty program if they don't have one already.

Essentially, once again Mårten is working as an intermediary between technically proficient people -- who may or may not conform to sociey's idea of a successful person -- and corporate executives who need hackers' skills and services but may not know how to find non-mainstream individuals or even know the difference between "hackers" and "crackers." Editor's note: I have known and respected Mårten for many years. If this interview seems like a conversation between two old friends, it is.
Hardware Hacking

Hands-On With the Voltera V-One PCB Printer (hackaday.com) 37

szczys writes: Eric Evenchick was one of the first backers of the Voltera V-One PCB Printer and just received the 6th device shipped so far. He ran it through its paces and published a review that gives it a positive rating. The hardware uses conductive ink to print traces on FR4 substrate. The board is then flipped upside down and the traces baked on the machine to make them robust. Next the printer dispenses solder paste and the same heating method is used to reflow after components are placed by hand.
Transportation

Tesla To Voluntarily Recall Every Model S Because One Seat Belt Came Apart (jalopnik.com) 207

An anonymous reader writes: Earlier this month, a passenger in a Tesla Model S turned to talk to people in the back seat, and her seat belt somehow disconnected itself from the front seat. According to a Tesla spokesperson, "The seat belt is anchored to the outboard lap pretensioner through two anchor plates that are bolted together. The bolt that was supposed to tie the two anchors together wasn't properly assembled." Though the company hasn't been able to replicate the issue on any other cars, Tesla is issuing a recall for roughly 90,000 Model S vehicles so they can test that bolt.
Bitcoin

Coinbase Issues Bitcoin-Based Debit Card (coinbase.com) 52

An anonymous reader writes: Coinbase, one of the largest bitcoin exchanges, introduced a "Shift Card" today, which is a Visa debit card that allows users to spend bitcoin wherever Visa is accepted within 24 U.S. states (other states are blocked by regulations for now). The card acts as a currency exchanger, debiting your Coinbase-controlled bitcoin wallet for an appropriate amount of bitcoins, based on market rates, while sending U.S. dollars to the merchant at the other end of the transaction. It represents a very simple way for bitcoin holders to spend it on real-world goods. That said, it'll be interesting to see how much adoption there is. If you prefer to keep full control of your bitcoin wallet, or prefer to keep your name from being attached to it, then the card probably won't work for you. It seems likely that most people who actually own bitcoins would fall into one or both of those categories.
The Courts

Judge: Stingrays Are 'Simply Too Powerful' Without Adequate Oversight (arstechnica.com) 111

New submitter managerialslime sends news that an Illinois judge has issued new requirements the government must meet before it can use cell-site simulators, a.k.a. "stingrays," to monitor the communications of suspected criminals. While it's likely to set precedent for pushing back against government surveillance powers, the ruling is specific to the Northern District of Illinois for now. What is surprising is Judge Johnston’s order to compel government investigators to not only obtain a warrant (which he acknowledges they do in this case), but also to not use them when "an inordinate number of innocent third parties’ information will be collected," such as at a public sporting event. This first requirement runs counter to the FBI’s previous claim that it can warrantlessly use stingrays in public places, where no reasonable expectation of privacy is granted. Second, the judge requires that the government "immediately destroy" collateral data collection within 48 hours (and prove it to the court). Finally, Judge Johnston also notes: "Third, law enforcement officers are prohibited from using any data acquired beyond that necessary to determine the cell phone information of the target. A cell-site simulator is simply too powerful of a device to be used and the information captured by it too vast to allow its use without specific authorization from a fully informed court."
Security

Investigation Reveals How Easy It Is To Hijack a Science Journal Website (sciencemag.org) 18

sciencehabit writes: With 20,000 journal websites producing millions of articles — and billions of dollars — it was probably inevitable that online criminals would take notice. An investigation by Science magazine finds that an old exploit is being used on academic publishers: domain snatching and website spoofing. The trick is to find the tiny number of journals whose domain registration has lapsed at any given time. But how do they track their prey? Science correspondent and grey-hat hacker John Bohannon (the same reporter who submitted hundreds of computer-generated fake scientific papers in a journal sting) proposes a method: Scrape the journal data from Web of Science (curated by Thomson Reuters) and run WHOIS queries on their URLs to generate an automatic hijack schedule.

He found 24 journals indexed by Thomson Reuters whose domains were snatched over the past year. Most are under construction or for sale, but 2 of them now host fake journals and ask for real money. And to prove his point, Bohannon snatched a journal domain himself and Rickrolled it. (It now hosts an xkcd cartoon and a link to the real journal.) Science is providing the article describing the investigation free of charge, as well as all the data and code. You can hijack a journal yourself, if you're so inclined: An IPython Notebook shows how to scrape Web of Science and automate WHOIS queries to find a victim. Science hopes that you return the domains to the real publishers after you snatch them.

Operating Systems

Jolla Goes For Debt Restructuring (phoronix.com) 46

jones_supa writes: Months after the smartphone company Jolla announced its split and intent to focus on Sailfish OS licensing, its financial situation has not improved. Jolla's latest financing round has been delayed and so they have had to file for debt restructuring in Finland. As part of that, the company is temporarily laying off a big part of its personnel (Google translation of Finnish original). Jolla co-founder Antti Saarnio said, "Our operating system Sailfish OS is in great shape currently and it is commercially ready. Unfortunately the development until this point has required quite a lot of time and money (PDF). To get out of this death valley we need to move from a development phase into a growth phase. At the same time we need to adapt our cost levels to the new situation. One of the main actions is to tailor the operating system to fit the needs of different clients. We have several major and smaller potential clients who are interested in using Sailfish OS in their projects."
Communications

You Can Look Forward To 8 More Years of Leap Second Problems (cio.com) 143

itwbennett writes: As previously discussed here, the World Radiocommunication Conference (WRC) met "for nearly the entire month of November, and one of the hot-button issues [was] what to do about the leap second." But, as they did at the 2012 conference, the WRC voted to postpone the decision — not just until the next WRC in 2019, but until the one after, in 2023, while the International Telecommunication Union conducts further studies into the impact of tinkering with the definition of Coordinated Universal Time.
Privacy

File Says NSA Found Way To Replace Email Program (nytimes.com) 93

schwit1 writes: Newly disclosed documents show that the NSA had found a way to create the functional equivalent of programs that had been shut down. The shift has permitted the agency to continue analyzing social links revealed by Americans' email patterns, but without collecting the data in bulk from American telecommunications companies — and with less oversight by the Foreign Intelligence Surveillance Court.

The disclosure comes as a sister program that collects Americans' phone records in bulk is set to end this month. Under a law enacted in June, known as the USA Freedom Act, the program will be replaced with a system in which the NSA can still gain access to the data to hunt for associates of terrorism suspects, but the bulk logs will stay in the hands of phone companies.

The newly disclosed information about the email records program is contained in a report by the NSA's inspector general that was obtained through a lawsuit under the Freedom of Information Act. One passage lists four reasons the NSA decided to end the email program and purge previously collected data. Three were redacted, but the fourth was uncensored. It said that "other authorities can satisfy certain foreign intelligence requirements" that the bulk email records program "had been designed to meet."

Space

First Images Ever Taken of a Planet Being Formed, 450 Light-Years From Earth (sydney.edu.au) 36

Zothecula writes: Of the many new exoplanets discovered over the past two decades, all have been identified as established, older planets – none have been acknowledged as newly-forming protoplanets. Now scientists working at the Keck observatory have spied just such a planet in the constellation of Taurus, some 450 light-years from Earth (abstract), that is only just beginning its life, collecting matter and spinning into a brand new world.
Emulation (Games)

Sony Quietly Adds PS2 Emulation To the PS4 (eurogamer.net) 151

An anonymous reader writes: The Digital Foundry blog reports that Sony has added functionality to the PlayStation 4 that allows it to act as an emulator for some PlayStation 2 games. Surprisingly, the company did not mention that this functionality is live; a new Star Wars game bundle just happened to include three titles that were released on the PS2. From the article: "How can we tell? First of all, a system prompt appears telling you that select and start buttons are mapped to the left and right sides of the Dual Shock 4's trackpad. Third party game developers cannot access the system OS in this manner. Secondly, just like the PS2 emulator on PlayStation 3, there's an emulation system in place for handling PS2 memory cards. Thirdly, the classic PlayStation 2 logo appears in all of its poorly upscaled glory when you boot each title." Sony has confirmed the games are being emulated, but declined to provide any further details.
Transportation

TGV Accident Caused By Excessive Speed (railwaygazette.com) 96

Cochonou writes: Analysis of the black boxes of the TGV (Train à Grande Vitesse) which derailed on Saturday revealed that the accident resulted from excessive speed and late braking. The test train entered a 945m-radius curve at a speed of 265 km/h, far over the maximum speed of 176 km/h. The French national railway company ruled out any other cause, such as mechanical failure or track mishap.

During test runs, a number of security features are disabled, in particular parts of the TVM system, which would have prevented any overspeed during normal service. This leaves the train speed under the sole responsibility of the driver.

The accident, which killed 11 people, occurred on the last run of the scheduled trials on the new high-speed line between Paris and Strasbourg. As more details on the accident surface, it becomes evident that this last run was performed in a festive spirit, with relatives (including children) of the employees on board, and seven people present in the train cab instead of train. This casts a shadow on the security procedures of the French national railway company: it appears that the high-speed train technology is considered so safe that the risks inherent to trials runs were somehow neglected. The two drivers and the traction inspector have been suspended pending possible criminal charges. Other changes in the management structure will probably follow.

Security

Nation-backed Hackers Using Evercookie and Web Analytics To Profile Targets (securityledger.com) 47

chicksdaddy writes: There's such a fine line between clever and criminal. That's the unmistakable subtext of the latest FireEye report on a new "APT" style campaign that's using methods and tools that are pretty much indistinguishable from those used by media websites and online advertisers. The difference? This time the information gathered from individuals is being used to soften up specific individuals with links to international diplomacy, the Russian government, and the energy sector.

The company released a report this week that presented evidence of a widespread campaign (PDF) that combines so-called "watering hole" web sites with a tracking script dubbed "WITCHCOVEN" and Samy Kamkar's Evercookie, the super persistent web tracking cookie. The tools are used to assemble detailed profiles on specific users including the kind of computer they use, the applications and web browsers they have installed, and what web sites they visit.

While the aims of those behind the campaign aren't known, FireEye said the use of compromised web sites and surreptitious tracking scripts doesn't bode well. "While many sites engage in profiling and tracking for legitimate purposes, those activities are typically conducted using normal third-party browser-based cookies and commercial ad services and analytics tools," FireEye wrote in its report. "In this case, while the individuals behind the activity used publicly available tools, those tools had very specific purposes....This goes beyond 'normal' web analytics," the company said.

Idle

Controversy Over High-Tech Brooms Sweeps Through Sport of Curling 181

HughPickens.com writes: Billy Witz reports at the NYT that the friendly sport of curling suddenly has become roiled in controversy over — what else? — the brooms. The crux of the debate is fabric — specifically, something called directional fabric. The use of this material in broom pads is the latest escalation in an arms race among manufacturers, whereby the world's best curlers can guide the 44-pound stone around a sheet of ice as if it were controlled by a joystick. Many of the sport's top athletes, but not all of them, signed an agreement last month not to use the newest brooms. But with few regulations on the books and Olympic qualifying tournaments underway this month, the World Curling Federation has stepped in and issued new rules that set severe restrictions on the types of brooms that can be used. "There's definitely some anger over it," says Dean Gemmell. "In curling, we're generally known for being pretty friendly with most of your opponents. Even at the big events, you see the top players hanging out. But it's sort of taken that away this year, that's for sure."

It was prototype brooms made by BalancePlus that were the focus of complaints at the Toronto tournament, but Scott Taylor, president of BalancePlus, says they were never intended for sale, and were meant to demonstrate the problems that the reversed fabrics could cause. Players say the brooms allowed sweepers to "steer" the rock much more than they were comfortable with, and even slow them down. The brooms have been compared to high-tech drivers that allow amateur golfers to hit the ball as far as a pro, or the advanced full-body swimsuits that were banned from competition in 2010 for providing an unfair advantage. Of his company's high-tech broom, Taylor says: "This isn't good. It's like hitting a golf ball 500 yards."
The Almighty Buck

Exploit Vendor Publishes Prices For Zero-Day Vulnerabilities 21

An anonymous reader writes: An exploit vendor published a price list for the zero-day bugs it's willing to buy. The highest paid bugs are for remote jailbreaks for iOS. Second is Android and Windows Phone. Third there are remote code execution bugs for Chrome, Flash, and Adobe's PDF Reader. This is the same company that just paid $1 million to a hacker for the first iOS9 jailbreak.
Power

French ITER Fusion Project To Take At Least 6 Years Longer Than Planned (sciencemag.org) 193

sciencehabit writes: The multibillion dollar ITER fusion project under construction in France will take at least an additional 6 years to complete, compared with the current schedule, a meeting of the governing council was told this week. ITER management has also asked the seven international partners which are backing the project for additional funding to finish the job. Under recent estimates, ITER was expected to cost some $13 billion and not begin operations until 2019. The new start date would be 2025.
EU

EU Set To Crack Down On Bitcoin and Anonymous Payments After Paris Attack (thestack.com) 275

An anonymous reader writes: Home affairs ministers from the European Union are set to gather in Brussels for crisis talks in the wake of the Paris attacks, and a crackdown on Bitcoin, pre-paid credit card and other forms of 'anonymous' online payments are on the agenda. From the article: "According to draft conclusions of the meeting, European interior and justice ministers will urge the European Commission (the EU executive arm) to propose measures to strengthen the controls of non-banking payment methods. These include electronic/anonymous payments, virtual currencies and the transfers of gold and precious metals by pre-paid cards."
Math

The Information Theory of Life (quantamagazine.org) 90

An anonymous reader writes with this story about Michigan State University Professor Cristop Adami and his quest to answer how life arose with mathematics. From the Quanta story: "Christoph Adami does not know how life got started, but he knows a lot of other things. His main expertise is in information theory, a branch of applied mathematics developed in the 1940s for understanding information transmissions over a wire. Since then, the field has found wide application, and few researchers have done more in that regard than Adami, who is a professor of physics and astronomy and also microbiology and molecular genetics at Michigan State University. He takes the analytical perspective provided by information theory and transplants it into a great range of disciplines, including microbiology, genetics, physics, astronomy and neuroscience. Lately, he's been using it to pry open a statistical window onto the circumstances that might have existed at the moment life first clicked into place.

To do this, he begins with a mental leap: Life, he argues, should not be thought of as a chemical event. Instead, it should be thought of as information. The shift in perspective provides a tidy way in which to begin tackling a messy question. In the following interview, Adami defines information as 'the ability to make predictions with a likelihood better than chance,' and he says we should think of the human genome — or the genome of any organism — as a repository of information about the world gathered in small bits over time through the process of evolution. The repository includes information on everything we could possibly need to know, such as how to convert sugar into energy, how to evade a predator on the savannah, and, most critically for evolution, how to reproduce or self-replicate."

Slashdot Top Deals