Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Fuck off (Score 1) 337

That's definitely fair response.

First: While he may have some assaults on his record, he wasn't arrested for doing some kind of violent hacking. In fact, with the exception of the insulin and pacemaker hacks, it's hard to see what a violent hack would actually be.

Second: He actually did uncover some government wrongdoing.

Third: I agree that a second offense should be punished more harshly. That being said, 10 years is way too harsh even for a second offense. His first sentence was also too harsh. You don't see these kinds of punishments for other white collar crimes, do you?

Comment Re:Fuck off (Score 3, Insightful) 337

You might want to read my post a little more carefully. I realize that it's easy to skip over the first sentence, where I stated that "I don't see anyone saying that hackers aren't criminals or that Jeremy Hammond doesn't deserve to go to prison."

The claim that I was making was that the prison sentence was excessive (probably because the Judge's husband was a victim of the crime). Somewhere in the 2-4 year range would probably make more sense.

Comment Re:Fuck off (Score 5, Insightful) 337

I don't see anyone saying that hackers aren't criminals or that Jeremy Hammond didn't deserve to go to prison. What they're saying is that criminals and dangerous people are sets that overlap, but that don't totally overlap. Or, another way to put it: Criminals aren't dangerous. Dangerous criminals are dangerous. Some hackers might be dangerous. Some hackers might not be dangerous. For hackers that are dangerous, 10 years in prison might be appropriate. For hackers that aren't dangerous, like those engaged in political protest, 10 years in prison is overkill.

Submission + - Court: Homeland Security Must Disclose 'Internet Kill Switch' (freebeacon.com)

An anonymous reader writes: The Department of Homeland Security (DHS) must disclose its plans for a so-called Internet “kill switch,” a federal court ruled on Tuesday.

The United States District Court for the District of Columbia rejected the agency’s arguments that its protocols surrounding an Internet kill switch were exempt from public disclosure and ordered the agency to release the records in 30 days. However, the court left the door open for the agency to appeal the ruling.

Submission + - Google Executive To Congress: Government Surveillance Undermines Freedom (reuters.com)

aeranvar writes: Richard Saldago, a Google executive, testified yesterday in a hearing before the Privacy, Technology and the Law Subcommittee of the Senate Judiciary Committee. His testimony, in short, stated that that widespread government surveillance "undermines the freedom and the trust most citizens cherish". This is the first testimony provided to Congress by a major technology company since Snowden's leaks in June. The testimony was specifically mentioned the possibility that government surveillance could cause the development of a splinter 'net, which likely referred to Brazil's plan to reduce the United States' influence on the internet. Additionally, Saldago later told Reuters that there is concern over the growing lack of trust in US cloud service providers. "This is a very real business issue, but it is also a very real issue for the people who are considering using the cloud and for those who currently use the cloud and may have their trust in it rocked by the disclosures."

Submission + - Senate Debates Surveillance Transparency Act, NSA Spying (threatpost.com)

Gunkerty Jeb writes: In a Senate hearing debating the NSA's contentious surveillance programs and a proposed bill that would impose more transparency onto those practices, Sen. Patrick Leahy of (D-Vt.) asked Google's director for law enforcement and information security matters, Richard Salgado, if government imposed gag orders on requests for user data were making the country safer. Salgado answered that he did not believe that his inability answer questions about data requests had any impact on national security.

In addition, the general counsel for the Director of National Intelligence claimed enumerating the exact number of U.S. citizens monitored under NSA surveillance programs would be too difficult and resource-intensive.

The general consensus of those not advocating for the NSA was that the bill introduced by Sen. Al Franken (D-Mich.) would be a great step forward, but that transparency alone would not undo the damages done to U.S. companies and its government by PRISM and other similar surveillance programs. Nor, they seemed to agree, would the addition of transparency make the NSA’s programs lawful or constitutional.

Submission + - Could Slashdot (Or Any Other Company) Sue a Spy Agency Like GCHQ or NSA? (slashdot.org)

Nerval's Lobster writes: When the GCHQ agency (Britain’s equivalent of the National Security Agency) reportedly decided to infiltrate the IT network of Belgian telecommunications firm Belgacom, it relied on a sophisticated version of a man-in-the-middle attack, in which it directed its targets' computers to fake, malware-riddled versions of Slashdot and LinkedIn. If the attack could be proven without a doubt, would the GCHQ—or any similar spy agency engaging in the same sort of behavior—be liable for violating trademarks or copyrights, since a key part of its attack would necessitate the appropriation of intellectual property such as logos and content? We asked someone from the Electronic Frontier Foundation about that, and received a somewhat dispiriting answer. “From a trademark perspective, if a company uses another company’s marks/logos to deceive, there may be a trademark claim,” said Corynne McSherry, the EFF’s Intellectual Property Director. “But it’s complicated a bit by two problems: (1) the fact that while there may be confusion, it’s not necessarily related to the actual purchase of any goods and services; and (2) multiple TM laws are in play here—for example UK trademark law may have different exceptions and limitations.” McSherry also addressed other issues, including governments' doctrine of sovereign immunity.

Comment Re:Transitioning from academic to real world ... (Score 3, Interesting) 178

In the academic world it is perfectly acceptable to use carefully selected or crafted inputs (facial images in this case) to develop and evaluate your algorithms. You may have separate date sets for development and evaluation, however careful selection or crafting is OK to simplify the project and avoid issues/variables outside of the project's scope.

As a CompSci academic, I am consistently shocked by the fact that we don't really consider the ethics our research. Some of the research, like the folks that are still interested in Chess playing algorithms, is pretty benign. Other research, like facial recognition, data mining, etc.... not so much. Case and point, there's a great Ted Talk by a researcher from Carnegie Mellon in which he demos an iPhone app (paired with some server-side software) his team wrote for using facial recognition to predict social security numbers in seconds. For those with experience on the academic side, how often have you or your colleagues stopped to consider that your research may be used unethically? Unless you're working in security, I suspect that it's probably infrequently despite the fact that advances in just about every major CS research area could be misused.

To be fair, I don't really know what to do about this problem. Someone is going to do the research. If it isn't me, or you, it'll be someone working in a government research facility... perhaps working for a government that isn't so friendly. All I suppose I'm really saying is that we really need to start thinking about the fact that there's a digital arms race going on... and we're the ones making the weapons.

It'd be nice if we could have advice from some of the researchers from the dawn of the last arms race, like Oppenheimer. This time, the race isn't about becoming omnipotent, it's about becoming omniscient.

Comment Re:*scratches head* (Score 1) 663

I'm *GUESSING* here, but they might be trying to focus on the relationship between mathematics and language. Since you can't exactly teach context-free grammars to young children, this might be the first step (comparing mathematical expressions to sentences) of a half-assed attempt at going down that route.

On the other hand, the authors of the curriculum may also just be idiots.

Comment Wait a minute... (Score 1) 116

This sounds like a pretty cool video game. I've always an RTS where you can drop drones with lasers into the battlefield... and they're probably stealthed, too! Thankfully, no military in the world would ever make something this crazy, though.

Why are you telling me that I need to reread the original post?

Slashdot Top Deals

Our business in life is not to succeed but to continue to fail in high spirits. -- Robert Louis Stevenson

Working...