Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:One Criterion Missing (Score 1) 416

The scientists involved are well aware of the need for controls, and are eliminating the factors as you indicate. When they are done, they will publish.
New science is not always required if something odd is noticed. Sometimes it comes down to a loophole no one thought of before. Even a loophole that never existed in the universe until bags of carbon, water and minerals twiddled things around a bit. Interferometric telescopy, for instance; when I was a wee sprite, they were talking about the impossibility of super large mirrors to observe planets around other stars. Then someone said, why not put two scopes far from each other and combine the images? No new physics, just a tweak. Gravitational lensing is another; took advantage of a loophole.

Comment Surveillance is not safety. Why? I'll tell you (Score 2, Interesting) 195

Reactionary was the word we used to describe this sort of behavior.

A man doesn't need anything but his hands, feet, eyes, and a gun to kill blasphemers. Surveillance is irrelevant. They're making the same damned mistake we did, confusing power and the all-seeing eye with safety. They'll use this to round up Muslims, same as the US does. Innocence or guilt is irrelevant. They'll go into holes for life or get blown up real good.

The questions remains: who will protect us from the people spying on us? The people behind the spy eyes will change over time. The may even become the people who want to shoot you for blasphemy. Ever think of that? In Saudi Arabia, the all-seeing eye will be on the lookout for women driving cars. In North Korea, they'll be looking out for anyone they damned well want to kill. In South America, for anyone challenging the wealthy's control. In America, straight up they're looking for anyone who dares challenge corporate power - no more draconian surveillance was used here than when Occupy managed to gain some attention. The US managed an unprecedented surveillance and pre-crime arrest sweep during Occupy, showing what secret surveillance was really good for: control of the status quo,.

Oh well, freedom was nice while it lasted.

Comment Re:Teamsters (Score 0) 228

What this does, more to the point, is put millions of people out of work, and ruin the Teamsters union as a side effect.

This was never about self-driving cars. This was always about wiping out an entire employment sector and piping even more profit up to the top. And yes, that is a bad thing.

Government

Extreme Secrecy Eroding Support For Trans-Pacific Partnership 169

schwit1 writes with news that political support for the Trans-Pacific Partnership is drying up because of the secrecy involved in developing it. Members of Congress can read the bill if they want, but they need to be located in a single room within the basement of the Capitol Visitor Center, and they can't have their staff with them. They can't have a copy, they can't take notes, and they can only view one section at a time. And they're monitored while they read it. Unsurprisingly, this is souring many members of Congress on the controversial trade agreement.

"Administration aides say they can’t make the details public because the negotiations are still going on with multiple countries at once; if for example, Vietnam knew what the American bottom line was with Japan, that might drive them to change their own terms. Trade might not seem like a national security issue, they say, but it is (and foreign governments regularly try to hack their way in to American trade deliberations)."
Privacy

French Version of 'Patriot Act' Becomes Law 195

Taco Cowboy writes: Thanks to the Charlie Hebdo massacre and other instances of terrorism, the French legislature has voted 438 to 86 in favor of the "Intelligence Service Bill," essentially a French version of the Patriot Act. It awards the French intelligence services sweeping powers to tap and intercept any kind of digital correspondence, including phone conversations, emails, and social media.

The bill decrees that hosting providers and Internet service providers in France must be equipped with a "black box" that can retain all digital communications from customers. "The new law would create a 13-member National Commission to Control Intelligence Techniques, which would be made up of six magistrates from the Council of State and the Court of Appeals, three representatives of the National Assembly, three senators from the upper house of Parliament and a technical expert. ... The only judicial oversight is a provision that allows the commission to lodge a complaint with the Council of State, but lawyers are doubtful that it could be convened on a routine basis." We previously discussed news that ISPs may leave France in protest if the bill was passed. Now we'll know shortly if those ISPs will live up to their word.

Comment No, they are categorically NOT doing that... (Score -1) 164

...and your comment represents the absolutely fundamental misunderstanding that pervades this discussion.

The truth no one wants to hear:

The distinction is no longer the technology or the place, but the person(s) using a capability: the target. In a free society based on the rule of law, it is not the technological capability to do a thing, but the law, that is paramount.

Gone are the days where the US targeted foreign communications on distant shores, or cracked codes used only by our enemies. No one would have questioned the legitimacy of the US and its allies breaking the German or Japanese codes or exploiting enemy communications equipment during WWII. The difference today is that US adversaries -- from terrorists to nation-states -- use many of the same systems, services, networks, operating systems, devices, software, hardware, cloud services, encryption standards, and so on, as Americans and much of the rest of the world. They use iPhones, Windows, Dell servers, Android tablets, Cisco routers, Netgear wireless access points, Twitter, Facebook, WhatsApp, Gmail, and so on.

US adversaries now often use the very same technologies we use. The fact that Americans or others also use them does not suddenly or magically mean that no element of the US Intelligence Community should ever target them. When a terrorist in Somalia is using Hotmail or an iPhone instead of a walkie-talkie, that cannot mean we pack our bags and go home. That means that, within clear and specific legal authorities and duly authorized statutory missions of the Intelligence Community, we aggressively pursue any and all possible avenues, within the law, that allow us to intercept and exploit the communications of foreign intelligence targets.

If they are using hand couriers, we target them. If they are using walkie-talkies, we target them. If they are using their own custom methods for protecting their communications, we target them. If they are using HF radios, VSATs, satellite phones, or smoke signals, we target them. If they are using Gmail, Windows, OS X, Facebook, iPhone, Android, SSL, web forums running on Amazon Web Services, etc., we target them -- within clear and specific legal frameworks that govern the way our intelligence agencies operate, including with regard to US Persons.

That doesn't mean it's always perfect; that doesn't mean things are not up for debate; that doesn't mean everyone will agree with every possible legal interpretation; that doesn't mean that some may not fundamentally disagree with the US approach to, e.g., counterterrorism. But the intelligence agencies do not make the rules, and while they may inform issues, they do not define national policy or priorities.

Without the authorities granted by the FISA Amendments Act of 2008 (FAA), the United States cannot target non-US Persons who are foreign intelligence targets if their communications enters, traverses, or otherwise touches the United States, a system within the United States, or, arguably, a system or network operated by a US corporation (i.e., a US Person) anywhere in the world. FAA in particular is almost exclusively focused on non-US Persons outside the US, who now exist in the same global web of digital communications as innocent Americans.

Without FAA, the very same Constitutional protections and warrant requirements reserved for US Persons would extend to foreign nations and foreign terrorists simply by using US networks and services â" whether intentionally or not. Without FAA, an individualized warrant would be required to collect on a foreign intelligence target using, say, Facebook, Gmail, or Yahoo!, or even exclusively foreign providers if their communications happens to enter the United States, as 70% of international internet traffic does. If you do not think there is a problem with this, there might be an even greater and more basic misunderstanding about how foreign SIGINT and cyber activities fundamentally must work.

If you believe NSA should not have these capabilities, what you are saying is that you do not believe the United States should be able to target foreign intelligence targets outside the United States who, by coincidence or by design, ever utilize or enter US systems and services. If you believe the solution is an individualized warrant every time the US wishes to target a foreign adversary using Gmail, then you are advocating the protection of foreign adversaries with the very same legal protections reserved for US citizens -- while turning foreign SIGINT, which is not and never has been subject to those restrictions, on its head.

These are the facts and realities of the situation. Any government capability is imperfect, and any government capability can be abused. But the United States is the only nation on earth which has jammed intelligence capabilities into as sophisticated and extensive a legal framework as we have. When the intelligence committees of both houses of Congress, multiple executive agencies under two diametrically opposite Presidential administrations, armies of lawyers within offices of general counsel and and inspectors general, and federal judges on the very court whose only purpose is to protect the rights of Americans under the law and the Constitution in the context of foreign intelligence collection are all in agreement, then you have the judgment of every mechanism of our free civil society.

Or we could just keep laying our intelligence sources, methods, techniques, and capabilities bare to our enemies.

âMany forms of Government have been tried and will be tried in this world of sin and woe. No one pretends that democracy is perfect or all-wise. Indeed, it has been said that democracy is the worst form of government except all those other forms that have been tried from time to time." - Winston Churchill (1874-1965), Speech in the House of Commons, November 11, 1947

"The necessity of procuring good Intelligence is apparent and need not be further urged â" all that remains for me to add, is, that you keep the whole matter as secret as possible. For upon Secrecy, Success depends in most Enterprises of the kind, and for want of it, they are generally defeated, however well planned and promising a favourable issue.â â" George Washington, our nation's first spymaster, in a letter to Colonel Elias Dayton, 26 July 1777

Comment Re:One Criterion Missing (Score 1) 416

The inventor had the hypothesis before he had the device, so it isn't a True Scottman drift. He hypothesized, he wrote about it, he formed a company to own it (that being how science works now). A few brave people tested it, and it seems to work. Each successive test excludes the factors that could have invalidated the previous tests, and now NASA has a group on it. And, it seems to produce a thrust. Okay, interesting.

We'll all be sad, should it come to nothing, but at this point the inventor has a hypothesis to cover the effect, described a machine to produce the effect, and now we have machines that seem to produce the effect. I've read his hypothesis, and damn, I don't have that kind of math or science and never will. But, you know, if he described an angel-making machine, and someone built the machine and made an angel, at some point you have to look at the damned angel flapping away in front of you.

Comment Re:Warp drive? (Score 1) 416

Cold fusion - fusing hydrogen by using chemical bonding compression - is not a fraud. It is a legitamite hypothesis, peer-reviewed and all. Probably not impossible, merely difficult to do.
The test in the eighties wasn't a "fraud". They thought they had it licked, and it turned out they didn't. What they really did wrong, however, in those early Reagan era years of science privatization, was to try to keep their idea a patented secret so they could make some $$$$$. Standard procedure today, and a major, if not the only, cancer on science today. Science came of age in an era where everyone shared their results. Now it is about the precious, precious money. Universities especially have contracted that cancer. Science is crawling when it should be leaping.
Fun fact: Tony Stark's arc reactor is a cold fusion power generator. Note the main ring he installed into the unit was pure palladium - the famous matrix used in the eighties experiment.

Comment Re:strictly speaking (Score 1) 416

"Impulse" drive is just a sciencey-sounding name Roddenberry gave his spaceships' sub-light drive. He had no idea of what he was talking about. According to the "tech" books, it is a photon drive (convert mass to energy, point it thataway, get thrust).

This is a virtual-particle drive, a theoretical exploitation of quantum weirdness. No free energy, just free thrust without expending mass. The Dean Drive in the fifties was claiming a free-thrust vacation, and a lot of people fell for it. So we take it with a lot of skepticism. But never say never, esp. if something seems to be happening.

Slashdot Top Deals

We can predict everything, except the future.

Working...