Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment A sneak peak at the results (Score 4, Funny) 55

Don't tell anyone, but I'm from the future and wanted to give you a heads up how it goes:

Test 1: Make sure all thrusters installed pointing out.

Test 2: Humans can only withstand how much thrust?

Test 3: Make sure to thrust away from, not underneath, falling debris.

Test 4: Emergency homing signal for safe landing should be changed to not match Arbys drive through wireless mics. "Smoked with real smoke from real wood that's on real fire" ended up being a grimly accurate tagline.

Test 5: Turns out Ed was right and we really do need to add a laser canon for those damn pelicans.

Test 6: Success!

Comment More than you know (Score 2) 136

wyoming has radiation?

Hell yes! Have you measured background radiation in the rockies?

communication delays?

Ever tried to maintain cell signal on the way to Yellowstone?

nothing to see, or to do?

Once you've seen Frontier Days once...

No medical equipment?

I go up there all the time with no medical equipment.

I don't know what that gravity would do to your digestive systems.

That's why every astronaut has died immediately after return from space with even less gravity...

I have to break character here and say - you are SUCH a retard. That's enough fun for me. You may carry on if you wish.

Comment Re:Which is why we disguise cell towers (Score 2) 216

Exactly.

The ruling is based on a false premise.

I know what they look like, I've coded GIS software for cell providers, I even know what most of the hidden ones look like, and how the log files work (since I used them), but most people think it's a magic device powered by fairy dust that doesn't track them until they "turn it on" (it's actually on unless you specifically power it off).

Comment Re:Measurements (Score 1) 425

So which one is a "software development engineer"? It's all the same job, modulo seniority. Banging out code is the core of it, to be sure, but it's not what most of us spend our time doing, unless you throw in "design" and "testing" into "programming" - which is fine, but then we're back into people skills being part of it.

Comment The cold hard reality is good agents not caught (Score 1) 164

Anyone with a minimal level of training knows this, and uses methods that our intercepts won't catch.

We only catch the n00bZ.

And, in point of fact, the times we get people to give away things, they're not in the US, but in the Middle East (Saudi Arabia, Yemen, Pakistan mostly).

Intercepts in the US rarely catch anything useful, and have such a high level of red herrings we waste a lot of resources that would be otherwise used profitably overseas, not in the US itself.

Comment No, they are categorically NOT doing that... (Score -1) 164

...and your comment represents the absolutely fundamental misunderstanding that pervades this discussion.

The truth no one wants to hear:

The distinction is no longer the technology or the place, but the person(s) using a capability: the target. In a free society based on the rule of law, it is not the technological capability to do a thing, but the law, that is paramount.

Gone are the days where the US targeted foreign communications on distant shores, or cracked codes used only by our enemies. No one would have questioned the legitimacy of the US and its allies breaking the German or Japanese codes or exploiting enemy communications equipment during WWII. The difference today is that US adversaries -- from terrorists to nation-states -- use many of the same systems, services, networks, operating systems, devices, software, hardware, cloud services, encryption standards, and so on, as Americans and much of the rest of the world. They use iPhones, Windows, Dell servers, Android tablets, Cisco routers, Netgear wireless access points, Twitter, Facebook, WhatsApp, Gmail, and so on.

US adversaries now often use the very same technologies we use. The fact that Americans or others also use them does not suddenly or magically mean that no element of the US Intelligence Community should ever target them. When a terrorist in Somalia is using Hotmail or an iPhone instead of a walkie-talkie, that cannot mean we pack our bags and go home. That means that, within clear and specific legal authorities and duly authorized statutory missions of the Intelligence Community, we aggressively pursue any and all possible avenues, within the law, that allow us to intercept and exploit the communications of foreign intelligence targets.

If they are using hand couriers, we target them. If they are using walkie-talkies, we target them. If they are using their own custom methods for protecting their communications, we target them. If they are using HF radios, VSATs, satellite phones, or smoke signals, we target them. If they are using Gmail, Windows, OS X, Facebook, iPhone, Android, SSL, web forums running on Amazon Web Services, etc., we target them -- within clear and specific legal frameworks that govern the way our intelligence agencies operate, including with regard to US Persons.

That doesn't mean it's always perfect; that doesn't mean things are not up for debate; that doesn't mean everyone will agree with every possible legal interpretation; that doesn't mean that some may not fundamentally disagree with the US approach to, e.g., counterterrorism. But the intelligence agencies do not make the rules, and while they may inform issues, they do not define national policy or priorities.

Without the authorities granted by the FISA Amendments Act of 2008 (FAA), the United States cannot target non-US Persons who are foreign intelligence targets if their communications enters, traverses, or otherwise touches the United States, a system within the United States, or, arguably, a system or network operated by a US corporation (i.e., a US Person) anywhere in the world. FAA in particular is almost exclusively focused on non-US Persons outside the US, who now exist in the same global web of digital communications as innocent Americans.

Without FAA, the very same Constitutional protections and warrant requirements reserved for US Persons would extend to foreign nations and foreign terrorists simply by using US networks and services â" whether intentionally or not. Without FAA, an individualized warrant would be required to collect on a foreign intelligence target using, say, Facebook, Gmail, or Yahoo!, or even exclusively foreign providers if their communications happens to enter the United States, as 70% of international internet traffic does. If you do not think there is a problem with this, there might be an even greater and more basic misunderstanding about how foreign SIGINT and cyber activities fundamentally must work.

If you believe NSA should not have these capabilities, what you are saying is that you do not believe the United States should be able to target foreign intelligence targets outside the United States who, by coincidence or by design, ever utilize or enter US systems and services. If you believe the solution is an individualized warrant every time the US wishes to target a foreign adversary using Gmail, then you are advocating the protection of foreign adversaries with the very same legal protections reserved for US citizens -- while turning foreign SIGINT, which is not and never has been subject to those restrictions, on its head.

These are the facts and realities of the situation. Any government capability is imperfect, and any government capability can be abused. But the United States is the only nation on earth which has jammed intelligence capabilities into as sophisticated and extensive a legal framework as we have. When the intelligence committees of both houses of Congress, multiple executive agencies under two diametrically opposite Presidential administrations, armies of lawyers within offices of general counsel and and inspectors general, and federal judges on the very court whose only purpose is to protect the rights of Americans under the law and the Constitution in the context of foreign intelligence collection are all in agreement, then you have the judgment of every mechanism of our free civil society.

Or we could just keep laying our intelligence sources, methods, techniques, and capabilities bare to our enemies.

âMany forms of Government have been tried and will be tried in this world of sin and woe. No one pretends that democracy is perfect or all-wise. Indeed, it has been said that democracy is the worst form of government except all those other forms that have been tried from time to time." - Winston Churchill (1874-1965), Speech in the House of Commons, November 11, 1947

"The necessity of procuring good Intelligence is apparent and need not be further urged â" all that remains for me to add, is, that you keep the whole matter as secret as possible. For upon Secrecy, Success depends in most Enterprises of the kind, and for want of it, they are generally defeated, however well planned and promising a favourable issue.â â" George Washington, our nation's first spymaster, in a letter to Colonel Elias Dayton, 26 July 1777

Comment Re:Measurements (Score 3, Insightful) 425

Further, he's perpetrating the myth that the most talented programmers "drive away others, but you have to put up with them", which falls outside the definition of "talented" that most people would accept. Sure, you do very rarely hear about that cliche - the guy who you only give solo projects, but he's hyper-productive - but that's maybe 1 in 1000?

The truth is, for most companies with full-career technical tracks and VP-equivalent top technical pay grades, the more senior you are, the less you code (though hopefully it never goes to zero), and the larger the organization you must have technical influence over. Since you have to build that influence yourself through a combination of leadership skills and writing code everyone uses, you'll never make it if you "drive people away".

OTOH, you don't belong in this industry if you take code reviews personally. Every day the compiler will call you illegal, invalid, and wrong, and you co-workers might say the same about your code in CR. If you start taking that as personal criticism, you're not going to last. We're not writing opinion pieces here.

Comment Re:Huh? (Score 2) 323

Not so mention that hackers cracked the key generating code for Windows 7. Same with MS office. They generate codes and try them until one works, and bingo you've got a legit code.

They've never cracked the key generating code for Windows 7. They just found ways to work around it.

In late 2001/early 2002 somebody figured out the algorithm to generated Volume License keys for Windows XP, and those don't need activation (so that companies with lots of computers don't have to activate 30,000 units). Starting With Windows XP Service Pack 2 Microsoft changed some things so that those generated Volume License keys wouldn't work any more. So you have to find a legit Volume License key somewhere (not all that hard to do).

Starting with Windows Vista, and continuing on to Windows 7, Microsoft changed things again. Microsoft changed the system for Volume License keys, making them not a viable option for pirates. Windows installed on OEM PCs was now using a system that referenced information in the computer's BIOS. Google "System Locked Pre-activation". So people just started flashing their BIOS with the necessary stuff. Windows thinks my homemade PC is a Dell.

Slashdot Top Deals

"Everything should be made as simple as possible, but not simpler." -- Albert Einstein

Working...