Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Intelligence Official Says He Was Fired For Not Lying To Congress (techdirt.com)

An anonymous reader writes: We knew this already, but we are only being told what the NSA wants us to know and no defections from the Official Spin are allowed.

As more and more details come out about the NSA surveillance programs, the federal government is looking more and more ridiculous. The latest comes from a column by John Fund at the National Review Online — a publication which has been a pretty strong supporter of the surveillance state. The column highlights that even the NSA's staunchest defenders are beginning to get fed up with the NSA as more leaks come out (especially last week's revelation of thousands of abuses). But the really interesting tidbit is buried a bit:

A veteran intelligence official with decades of experience at various agencies identified to me what he sees as the real problem with the current NSA: “It’s increasingly become a culture of arrogance. They tell Congress what they want to tell them. Mike Rogers and Dianne Feinstein at the Intelligence Committees don’t know what they don’t know about the programs.” He himself was asked to skew the data an intelligence agency submitted to Congress, in an effort to get a bigger piece of the intelligence budget. He refused and was promptly replaced in his job, presumably by someone who would do as told.


Comment Re:Derivative work (Score 2) 344

This, this right here reveals a valid point. Region locks, limited releases, and so forth are supposed to be about geographical areas, not the language. If "Rocky 30" gets released in the US only, there is nothing restricting a Chinese speaking American from watching the film. Claiming that one is "making content available" to an audience who hasn't been permitted yet is a load of horse shit. However, since by some countries' laws content might be restricted, I assume the derivative works could potentially inherit those restrictions. I think it's obvious that distinction isn't clear. Seems a better practice to work with the site in helping them understand where the content is supposed to be available. There is nothing stopping the content provider from getting paid for a film. However, I do completely understand how this mindset doesn't hold up for books, and rightfully so. With books, making the translation of the book availble would make the core value of the product worthless. The core value of a DVD is not in the text.

Comment Re:Reference to Island of Stablility (Score 3, Informative) 64

For those interested: Nuclei with shapes like this or barbells are significant in solving the problem of filling that range of elements on the Periodic table that were skipped. Ideas were proposed that nuclei would need to have these shapes in order to be stable if the nucleus followed a shell model similar to electron shells. You can read more by researching "Island of Stability"

http://en.wikipedia.org/wiki/Island_of_stability

Eh, fark. This is mine. Stupid login.

Comment Re:Next phase of career? (Score 1) 149

"Very few acquire sufficient mastership of the physics to make a dent. And even if you do, you'll be in a rat race against other geniuses. New discoveries spur new ideas, but discoveries are published worldwide and ideas are also a dime a dozen as well. Even if you have the gift to derive a really good and worthwhile idea from a given recent discovery, you can be sure that at least two of your competitors around the world will have thought of it, and then it comes down to who is fastest and who can deliver the most generally useful implementation or variant of the idea." Sounds exactly like programming actually :-). Seriously, though, thank you for your insight.

Comment Truly a worthy ruling (Score 1) 105

For those of us who have had the unfortunate pleasure of being arrested, think about it. You had to call a relative, or look in a phone book for some advertisement of a lawyer. While I doubt they'll be getting many of these machines, one usually has at least 24 hours of free time in jail. Why not give that time to do at least /some/ due diligence in picking one's council. Bravo Canada.

Comment Re: How are they validating ID? (Score 2) 71

Whether key or ip are used here is missing the kind of whitelisting this malware is using. When the package exploits a server, it alters pages/links to redirect each unique visitor to a dynamically generated temp folder on itself which contains the phishing code, and afterwards is deleted. The phishing code could obviously get more selective, and will contain a destination either via redirect or transmission, but returning to the same url gets you nowhere. Have the link/page exploited float around as well and you have a "dynamic" whitelist which filters favoring the browsing public, not link-minded researchers.
Security

Submission + - New Phishing Toolkit Uses Whitelisting To 'Bounce' Non-Victims (securityledger.com)

chicksdaddy writes: "Researchers at RSA say that a new phishing toolkit allows attackers to put a velvet rope around scam web pages – bouncing all but the intended victims.

The new toolkit, dubbed “Bouncer,” was discovered in an analysis of attacks on financial institutions in South Africa, Australia and Malaysia in recent weeks. It allows attackers to generate a unique ID for each intended victim, then embed that in a URL that is sent to the victim. Outsiders attempting to access the phishing page are redirected to a “404 page not found” error message.

Other phishing kits have used IP address blacklists to block anti malware companies from viewing their malicious pages, but this is the first known use of whitelisting, RSA said.

The phishing attacks that RSA technicians discovered that used the Bouncer kit were designed to harvest login credentials from financial services firms. The whitelisting feature may well work, especially given the volume of potential phishing pages that security companies review each day. Getting a 404 message may be enough to get a forensic investigator or security researcher to move on to the next phishing site, rather than investigating."

Comment Consider human advancement just as likely (Score 1) 328

This guy could have studied his opponents, he could suddenly understand the game in a new way, or the competitors in the tournament could share some fundamental link to a decision tree he's found. I'll admit this is unlikely, but one can attribute such vast differences to not only cheating or genius, but also competitive stagnation.

Comment Correlation does not infer causation (Score 1) 293

I read nothing of problems presented which require both types of thinking. Common problems involving both like seating arrangements for a wedding or which family member to ask to borrow money could be used for this. In the test discussed in the article the participant is going to catch on to the pattern after a few questions and instinctively switch their thinking to an optimal mode. In my opinion the resulting brain activity they're reading isn't empathy/analytics, it's bound and unbound thought. Empathy isn't imagination. It's the experiences, memories, and emotions of oneself and everyone they've known recalled abstractly. Asking someone to answer "social question" without personal context not only unbounds the process, but simultaneously removes analysis. This is caused by a) the need for one to imagine the contextual characters necessary to fill in the gaps and b) the inherent throw-away nature of those virtual characters. It all sits in short-term memory.

Real empathy requires actual people to empathize with because it involves more than words. It includes body language and so many other factors. All that's been invoked here is structured imagination, and these questions would inherently exclude analytic thought in that test characters must be taken as-is. On the other side, analytic thought requires mental sandboxes. Analyzing a hypothetical question presents it's own sandbox which excludes imagination, and relies solely on ones training & short term memory. The fact that the subjects know they are being tested at all seems to be the originating flaw.

Comment Re:Quantum cryptography? (Score 1) 210

No information is gathered, rather the lifetime / distance of the qubit is extended. Since this caused the frequency of detection to change, I'm going to make an educated guess that the correction signal causes interference and/or destruction of a third channel which could be monitored for manipulation.

Slashdot Top Deals

"Ninety percent of baseball is half mental." -- Yogi Berra

Working...