Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Snowden leak exposes US plan to spy on foreign businesses for profit (firstlook.org)

An anonymous reader writes: The document, published first by The Intercept on Friday this week, outlines tactics the American intelligence community may implement in the future in the event of certain scenarios, including one in which “the United States’ technological and innovative edge slips” in the year 2025.

In the event that the US may lose that advantage, the Quadrennial Intelligence Community Review’s final report reads in part, then “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means) and counterintelligence” could be undertaken by American agencies.

The document, classified as “secret” and supplied along with a trove of other files provided by Snowden,“is a fascinating window into the mindset of America’s spies as they identify future threats to the US and lay out the actions the US intelligence community should take in response,” wrote Glenn Greenwald, The Intercept editor who wrote about the 32-page report this week.

Indeed, David Shredd, then the deputy director of national intelligence, opens the report by describing it as the results of a 10-month study conducted among experts from agencies, academia, think tanks and industry tasked with assessing the implications of the year 2025 for the American intelligence community, or IC.

“If one does not consider the long-range future, one will never cease to be surprised,” Shredd wrote. “QICR 2009 developed alternative future scenarios based on Global Trends 2025 to explore concepts and capabilities the IC may need to fulfill critical missions in support of US national security.”

The contents of the report, Shredd added, “does not purport that any one future will materialize, but rather outlines a range of plausible futures so that the IC can best posture itself to meet the range of challenges it may face.” Speaking to The Intercept, a spokesperson for the Office of the Director of National Intelligence said the report “is not intended to be, and is not, a reflection of current policy or operations.”

Jeffrey Anchukaitis, the DNI spokesperson, told Greenwald that “the United States — unlike our adversaries—does not steal proprietary corporate information to further private American companies’ bottom lines,” and that “the Intelligence Community regularly engages in analytic exercises to identify potential future global environments, and how the IC could help the United States Government respond.”

Nevertheless, the report contains potential plans of action that run counter to previous public admissions made by IC leaders.

“What we do not do, as we have said many times, is use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to—US companies to enhance their international competitiveness or increase their bottom line,” Greenwald quoted Director of National Intelligence James Clapper as saying previously.

“But asecret 2009 report issued by Clapper’s own officeexplicitly contemplates doing exactly that,” the journalist wrote this week.

“The IC would need the ability to access proprietary sources of information in permissive environments such as foreign universities, industry trade shows and government conferences,” part of the report reads. “This could include cooperating US students, professors and researchers reporting bits of non-public information that by themselves are not sensitive, but in aggregate could help the IC make inferences about breakthrough technological innovations. The key challenge would be working closely with the academic and scientific communities (which would include non-US persons), gaining trust and monitoring potential 'threats' while continuing to advance US scientific progress.”

According to the document, human spies and cyber operations alike have been considered as possible tools to implement if spying on foreign targets — and not just students and innovators, but entire research and development operations, as well—is needed to be done in 11 years’ time.

“In denied or more restrictive environments such as state-supported R&D centers, the IC would continue to apply human intelligence (HUMINT) tradecraft and employ HUMINT-enabled close access collection. This would include recruitment of sources and assets, and provision of appropriate technical means to acquire and exfiltrate sensitive information,” reads one part of the document.

Elsewhere, the document’s authors detail one end goal: “Technology acquisition by all means.”

“Exfiltrating intelligence from non-permissive environments will be crucial. A critical enabler would be covert communications with a negligible forward footprint. US intelligence officers and sensitive sources will need to move data in an unattributable and undetected way, sometimes from within commercial entities possessing great technical prowess and robust cyber and electronic security protective procedures. Although the likely advent of transnational, high-bandwidth wireless communications services will offer an environment with ‘lots to hide behind,’ it will also contain many highly competent, and potentially antagonistic, actors.”

An illustrate example included in part of the report provides exactly how such a hypothetical situation may play out: “The IC makes separate clandestine approaches to India and Russia to break up the partnership. It conducts cyber operations against research facilities in the two countries, as well as the intellectual ‘supply chain’ supporting these facilities. Finally, it assesses whether and how its findings would be useful to US industry.”

“Using covert cyber operations to pilfer ‘proprietary information’ and then determining how it ‘would be useful to US industry’ is precisely what the US government has been vehemently insisting it does not do,” Greenwald wrote, “even though for years it has officially prepared to do precisely that.”

Submission + - Mozilla 1024-Bit Cert Deprecation Leaves 107,000 Sites Untrusted (threatpost.com)

msm1267 writes: Mozilla has deprecated 1024-bit RSA certificate authority certificates in Firefox 32 and Thunderbird. While there are pluses to the move such as a requirement for longer, stronger keys, at least 107,000 websites will no longer be trusted by Mozilla.

Data from HD Moore's Project Sonar, which indexes more than 20 million websites, found 107,535 sites using a cert signed by what will soon be an untrusted CA certificate. Grouping those 107,000-plus sites by certificate expiration date, the results show that 76,185 certificates had expired as of Aug. 25; of the 65 million certificates in the total scan, 845,599 had expired but were still in use as of Aug. 25, Moore said.

Submission + - Recommend a service to digitize VHS home movies? (wikipedia.org)

An anonymous reader writes: Could someone recommend a service to convert old VHS home movies to a lossless archival format such as FFV1? The file format needs to be lossless so I can edit and convert the files with less generation loss, it needs 4:1:1 or better chroma subsampling in order to get the full color resolution from the source tapes, and preferably it should have more than 8 bits per channel of color in order to avoid banding while correcting things like color, brightness, and contrast.

So far, the best VHS archival services I've found use either the DV codec or QuickTime Pro-Res, both of which are lossy.

Submission + - Former NSA Chief says "Isis are using Snowden leaks to evade intellegence" (dailymail.co.uk) 2

bobbied writes: Former NSA Deputy Chief Chris Ingles claims that the information that Snowden leaked is being used by ISIS to evade intelligence gathering by the NSA. He also said "militants in Iraq and Syria are 'clearly' harder to track down since the rogue agent made freely available a wealth of top-secret information about how the U.S. government hunts its enemies online."

The Ex NSA Deputy Chief is claiming that what was leaked by Snowden goes way beyond what was necessary to expose Snowden's privacy concerns and has severely damaged the NSA's ability to collect intelligence by exposing their methods so they can be evaded.

Submission + - GOG Making Inroads to DRM-Free Movie Distribution

jones_supa writes: Good Old Games is prepping to bring another medium into its trademark DRM-free digital distribution platform: movies! To get things rolling, the shop is already serving a couple of dozen indie films as we speak. Currently the bigger studios are waiting for someone else gnaw on the rock and prove that selling DRM-free movies works. "Their reaction was kind of funny because ... they know that DRM doesn't work because every single movie is on torrent sites or illegal places at launch or even before," Marcin Iwinski, CD Projekt RED and GOG joint-CEO reminds us. GOG plans to bring more movie titles on a weekly basis.

Submission + - Researchers Say Virtual Reality Time Travel Is Possible

An anonymous reader writes: Much has been said about virtual reality taking viewers to different places, but a recent study takes on another dimension: time. Researchers from the University of Barcelonaput together a virtual reality experience that lets volunteers experience time travel.
According to a paper published in the journal Frontiers in Psychology, it worked. Participants felt as if they had travelled back in time and—here's the kicker—that they could change the past.

Submission + - Human altruism has early roots (sciencemag.org)

i kan reed writes: According to Hillary Clinton, "it takes a village to raise a child".
And new research suggests that it's exactly this attitude that created an evolutionary push towards higher cooperative functions within our species, such as language and altruism. One of the earliest evolutionary distinctions between the apes that became humans and our nearest relatives, chimpanzees, is the apparent evolution of cooperative breeding. The term cooperative breeding is defined as

the caring for infants not just by the mother, but also by other members of the family and sometimes even unrelated adults

The team's research found

a close linear correlation between the degree to which a species engages in cooperative breeding and the likelihood that members of the group would help fellow animals get the food treat.


Submission + - Climate damage 'Irreversible' according leaked climate report 1

SomeoneFromBelgium writes: According to Bloomberg a leaked climate report of the IPPC speaks of 'Irreversible Damage'.
The warnings in the report are, as such, not new but the tone of voice is more urgent and more direct than ever.

It states among other things that global warming already is affecting “all continents and across the oceans,” and that “Risks from mitigation can be substantial, but they do not involve the same possibility of severe, widespread, and irreversible impacts as risks from climate change, increasing the benefits from near-term mitigation action,”

Comment NOT Netgear or HP (Score 1) 251

It is very doubtful these were Netgear or HP, the scammar lie when they call and claim to be from all sorts of Companies, I've had them claim to be Microsoft, BT and Google.

If you type practically any brand name plus the word support or help into search engines you get the adverts for these scammers at the top of the results.

Try it, it works for "HP Printer Support" and "Netgear Router Support" in Google. Moving the adverts from the right to the top of the organic search result list has just played into these scammers hands.

Submission + - Enforcing the GPL

lrosen writes: I am responding to the article in Opensource.com by Aaron Williamson, "Lawsuit threatens to break new ground on the GPL and software licensing issues."

I want to acknowledge Aaron's main points: This lawsuit challenges certain assumptions about GPLv2 licensing, and it also emphasizes the effects of patents on the FOSS (and commercial) software ecosystem. I also want to acknowledge that I have been consulted as an expert by the plaintiff in this litigation (Ximpleware vs. Versata, et al.) and so some of what I say below they may also say in court.

Let's be open about the facts here. Ximpleware worked diligently over many years to create certain valuable software. The author posted his source code on SourceForge. He offered the software under GPLv2. He also offered that software under commercial licenses. And he sought and received and provided notice of United States patent claims related to that software.

Unbeknownst to Ximpleware, Versata took that GPLv2 software and incorporated it into Versata products – without disclosing that GPLv2 software or in any other way honoring the terms of the GPLv2 license. The reason Ximpleware became aware of that GPLv2 breach is because some months ago Versata and one of its customers, Ameriprise, became embroiled in their own litigation. The breach of GPLv2 came out during discovery.

Ximpleware has terminated that license as to Versata. This is exactly what the Software Freedom Conservancy and others do when confronted by GPL breaches.

That earlier litigation is between two (or more) commercial companies; it is not a FOSS problem. These are mature, sophisticated, profitable companies that have the wherewithal to protect themselves. I know that in my own law practice, whether I represent software vendors or their commercial customers, we typically provide for some level of indemnification. Perhaps Ameriprise and the other customer-defendants can count on Versata defending them against Ximpleware. Such a commercial dispute between big companies – even if it involves the GPLv2 software of a small company and separate indemnification for copyright or patent infringement – is between them alone.

But as to Ximpleware and its GPLv2 copyrighted and patented software, there are a few misunderstandings reflected in Aaron Williamson's article:

1. The notion of "implied patent licensing" has no clear legal precedent in any software licensing. While it is true that goods that one purchases include a patent license under what is known as the "exhaustion doctrine," there is no exhaustion of patented software when copies are made (even though copying of the software itself is authorized by GPLv2). For example, a typical commercial patent license nowadays might include a royalty for each Android phone manufactured and sold. Companies that distribute Android phones and its FOSS software acquire patent licenses so that recipients of their phones are indeed free to use those phones. But that isn't because of some implied patent licenses that come with Android software, but because commercial companies that distribute phones pay for those patent rights, directly or indirectly. I think it is entirely reasonable to require that commercial companies get their patent licenses in writing.

2. Versata's customers who received the (in breach!) GPLv2 software all moved to dismiss Ximpleware's infringement claims against them, pointing to Section 0 of GPLv2, which says that "[t]he act of running the Program is not restricted." What that sentence actually means is just what it says: The GPLv2 copyright grant itself (which is all there is in GPLv2) does not restrict the act of running the program. Nor could it; that is a true statement because running a program is not one of the enumerated copyright rights subject to a copyright license (17 USC 106). The authors of the GPL licenses have themselves made that argument repeatedly: The use of software is simply not a copyright issue.

3. Because there are U.S. patent claims on this Ximpleware software, Section 7 of GPLv2 prohibits its distribution under that license in the United States (or any jurisdictions where patent claims restrict its use). If Ameriprise and the other defendants were outside the U.S. where the Ximpleware patents don't apply, then GPLv2 would indeed be sufficient for that use. But inside the U.S. those customers are not authorized and they cannot rely on an assumed patent grant in GPLv2. Otherwise GPLv2 Section 7 would be an irrelevant provision. Reread it carefully if you doubt this.

The Versata customers certainly cannot depend on an implied patent license received indirectly through a vendor who was in breach of GPLv2 since the beginning – and still is! Versata ignored and failed to disclose to its own customers Ximpleware's patent notices concerning that GPLv2 software, but those patents are nevertheless infringed.

Should we forgive commercial companies who fail to undertake honest compliance with the GPL? Should we forgive their customers who aren't diligent in acquiring their software from diligent vendors?

As Aaron Williamson suggests, we shouldn't ignore the implications of this case. After all, the creator of Ximpleware software made his source code freely available under GPLv2 and posted clear notices to potential commercial customers of his U.S. patents and of his commercial licensing options. Lots of small (and large!) open source commercial companies do that. Although it is ultimately up to the courts to decide this case, from a FOSS point of view Ximpleware is the good guy here!

There is rich detail about this matter that will come out during litigation. Please don't criticize until you understand all the facts.

Lawrence Rosen
Rosenlaw & Einschlag (lrosen@rosenlaw.com)

Comment Bitcoin (Score 1) 50

For "BitCoin to account for more of world GDP than the £/$ by 2015" would be a growth rate of many orders of magnitude.

So if any body believed this to be true (I don't), they would invest in Bitcoin not bet on it.

I want the odds that the Bitcoin ponzi will have completely collapsed by 2015.

Submission + - Sickest email scam yet (bbc.co.uk)

Martin S. writes: The BBC is reports how emails purporting to come from NICE (UK's National Institute for Health and Care Excellence) are informing people they have cancer and must open an attachment to find out how to proceed.

However the attachment contains malware.

Sir Andrew Dillon, NICE Chief Executive: “A spam email purporting to come from NICE is being sent to members of the public regarding cancer test results. This email is likely to cause distress to recipients since it advises that ‘test results' indicate they may have cancer. This malicious email is not from NICE and we are currently investigating its origin. We take this matter very seriously and have reported it to the police.” NICE is advising people who have received the email — the subject line of which is important blood analysis result — to delete it without opening it and not to click on any links.

Slashdot Top Deals

"God is a comedian playing to an audience too afraid to laugh." - Voltaire

Working...