Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Government

Comcast Ghost-Writes Politician's Letters To Support Time Warner Mega-Merger 181

WheezyJoe writes: As the FCC considers the merger between Comcast/Universal and Time-Warner Cable, which would create the largest cable company in the U.S. and is entering the final stages of federal review, politicians are pressuring the FCC with pro-merger letters actually written by Comcast. According to documents obtained through public records requests, politicians are passing letters nearly word-for-word written by Comcast as their own. "Not only do records show that a Comcast official sent the councilman the exact wording of the letter he would submit to the FCC, but also that finishing touches were put on the letter by a former FCC official named Rosemary Harold, who is now a partner at one of the nation's foremost telecom law firms in Washington, DC. Comcast has enlisted Harold to help persuade her former agency to approve the proposed merger."

Ars Technica had already reported that politicians have closely mimicked Comcast talking points and re-used Comcast's own statements without attribution. The documents revealed today show just how deeply Comcast is involved with certain politicians, and how they were able to get them on board.
Crime

Dish Network Violated Do-Not-Call 57 Million Times 247

lightbox32 writes Dish Network has been found guilty of violating the Do Not Call list on 57 million separate occasions. They were also found liable for abandoning or causing telemarketers to abandon nearly 50 million outbound telephone calls, in violation of the abandoned-call provision of the Federal Trade Commission's Telemarketing Sales Rule. Penalties for infringing on the Do Not Call list can be up to a whopping $16,000 for each outbound call.
Encryption

Researchers Moot "Teleportation" Via Destructive 3D Printing 163

ErnieKey writes Researchers from German-based Hasso Plattner Institute have come up with a process that may make teleportation a reality — at least in some respects. Their 'Scotty' device utilizes destructive scanning, encryption, and 3D printing to destroy the original object so that only the received, new object exists in that form, pretty much 'teleporting' the object from point A to point B. Scotty is based on an off-the-shelf 3D printer modified with a 3-axis milling machine, camera, and microcontroller for encryption, using Raspberry Pi and Arduino technologies." This sounds like an interesting idea, but mostly as an art project illustrating the dangers of DRM. Can you think of an instance where you would actually want the capabilities this machine claims to offer?
United States

Senator Who Calls STEM Shortage a Hoax Appointed To Head Immigration 514

dcblogs (1096431) writes The Senate's two top Republican critics of temporary worker immigration, specifically the H-1B and L-1 visas, now hold the two most important immigration posts in the Senate. They are Sen. Chuck Grassley (R-Iowa), who heads the Senate's Judiciary Committee, and his committee underling, Jeff Sessions (R-Ala.), who was appointed by Grassley on Thursday to head the immigration subcommittee. Sessions was appointed one week after accusing the tech industry of perpetuating a "hoax" by claiming there is a shortage of qualified U.S. tech workers. "The tech industry's promotion of expanded temporary visas — such as the H-1B — and green cards is driven by its desire for cheap, young and immobile labor," wrote Sessions, in a memo he sent last week to fellow lawmakers. Sessions, late Thursday, issued a statement about his new role as immigration subcommittee chairman, and said the committee "will give voice to those whose voice has been shut out," and that includes "the voice of the American IT workers who are being replaced with guest workers."
Businesses

The Tech Industry's Legacy: Creating Disposable Employees 271

An anonymous reader writes: VentureBeat is running an indictment of the tech industry's penchant for laying off huge numbers of people, which they say is responsible for creating a culture of "disposable employees." According to recent reports, layoffs in the tech sector reached over 100,000 last year, the highest total since 2009. Of course, there are always reasons for layoffs: "Companies buy other companies and need to rationalize headcount. And there's all that disruption. Big companies, in particular, are seeing their business models challenged by startups, so they need to shed employees with skills they no longer need, and hire people with the right skills."

But the article argues that this is often just a smokescreen. "The notion here is that somehow these companies are backed into a corner, with no other option than to fire people. And that's just not true. These companies are making a choice. They're deciding that it's faster and cheaper to chuck people overboard and find new ones than it is to retrain them. The economics of cutting rather than training may seem simple, but it's a more complex calculation than most people believe. ... Many of these companies are churning through employees, laying off hundreds on one hand, while trying to hire hundreds more."
Spam

To Avoid Detection, Terrorists Made Messages Seem Like Spam 110

HughPickens.com writes: It's common knowledge the NSA collects plenty of data on suspected terrorists as well as ordinary citizens, but the agency also has algorithms in place to filter out information that doesn't need to be collected or stored for further analysis, such as spam emails. Now Alice Truong reports that during operations in Afghanistan after 9/11, the U.S. was able to analyze laptops formerly owned by Taliban members. According to NSA officer Michael Wertheimer, they discovered an email written in English found on the computers contained a purposely spammy subject line: "CONSOLIDATE YOUR DEBT."

According to Wertheimer, the email was sent to and from nondescript addresses that were later confirmed to belong to combatants. "It is surely the case that the sender and receiver attempted to avoid allied collection of this operational message by triggering presumed "spam" filters (PDF)." From a surveillance perspective, Wertheimer writes that this highlights the importance of filtering algorithms. Implementing them makes parsing huge amounts of data easier, but it also presents opportunities for someone with a secret to figure out what type of information is being tossed out and exploit the loophole.
Businesses

IEEE: New H-1B Bill Will "Help Destroy" US Tech Workforce 484

dcblogs writes New legislation being pushed by Sen. Orrin Hatch (R-Utah) to hike the H-1B visa cap is drawing criticism and warnings that it will lead to an increase in offshoring of tech jobs. IEEE-USA said the legislation, introduced by a bipartisan group of lawmakers on Tuesday, will "help destroy" the U.S. tech workforce with guest workers. Other critics, including Ron Hira, a professor of public policy at Howard University and a leading researcher on the issue, said the bill gives the tech industry "a huge increase in the supply of lower-cost foreign guest workers so they can undercut and replace American workers." Hira said this bill "will result in an exponential rise of American jobs being shipped overseas." Technically, the bill is a reintroduction of the earlier "I-Square" bill, but it includes enough revisions to be considered new. It increases the H-1B visa cap to 195,000 (instead of an earlier 300,000 cap), and eliminates the cap on people who earn an advanced degree in a STEM (science, technology, education and math) field. Hatch, who is the No. 2 ranking senator in the GOP-controlled chamber, was joined by co-sponsors Amy Klobuchar (D-Minn.), Marco Rubio (R-Fla.), Chris Coons (D-Del.), Jeff Flake (R-Ariz.) and Richard Blumenthal (D-Conn.) in backing the legislation."
Security

NSA Official: Supporting Backdoored Random Number Generator Was "Regrettable" 106

Trailrunner7 writes In a new article in an academic math journal, the NSA's director of research says that the agency's decision not to withdraw its support of the Dual EC_DRBG random number generator after security researchers found weaknesses in it and questioned its provenance was a "regrettable" choice. Michael Wertheimer, the director of researcher at the National Security Agency, wrote in a short piece in Notices, a publication of the American Mathematical Society, that even during the standards development process for Dual EC many years ago, members of the working group focused on the algorithm raised concerns that it could have a backdoor in it. The algorithm was developed in part by the NSA and cryptographers were suspect of it from the beginning. "With hindsight, NSA should have ceased supporting the dual EC_DRBG algorithm immediately after security researchers discovered the potential for a trapdoor. In truth, I can think of no better way to describe our failure to drop support for the Dual_EC_DRBG algorithm as anything other than regrettable," Wertheimer wrote in a piece in Notices' February issue.
Debian

SystemD Gains New Networking Features 553

jones_supa writes A lot of development work is happening on systemd with just the recent couple of weeks seeing over 200 commits. With the most recent work that has landed, the networkd component has been improved with new features. Among the additions are IP forwarding and masquerading support (patch). This is the minimal support needed and these settings get turned on by default for container network interfaces. Also added was minimal firewall manipulation helpers for systemd's networkd. The firewall manipulation helpers (patch) are used for establishing NAT rules. This support in systemd is provided by libiptc, the library used for communicating with the Linux kernel's Netfilter and changing iptables firewall rulesets. Those wishing to follow systemd development on a daily basis and see what is actually happening under the hood, can keep tabs via the systemd Git viewer.
Crime

LAPD Orders Body Cams That Will Start Recording When Police Use Tasers 219

HughPickens.com writes: Lily Hay Newman reports that the LAPD has ordered 3,000 Tasers which, when discharged, will automatically activate cameras on officers' uniforms, creating visual records of incidents at a time of mounting concern about excessive force by U.S. law enforcement officers. The new digital Taser X26P weapons record the date, time, and duration of firing, and whether Taser wires actually strike suspects and how long the thousands of volts of electricity pulse through them. "This technology gives a much better picture of what happens in the field," says Steve Tuttle.

The idea of using a Taser discharge as a criterion for activating body cams is promising, especially as more and more police departments adopt body cams and struggle to establish guidelines for when they should be on or off. Police leadership — i.e., chiefs and upper management — is far more supportive of the technology and tends to view body-worn cameras as a tool for increasing accountability and reducing civil liability. On the other hand, the patrol officer culture is concerned that the technology will be an unfair intrusion into their routine activities — for instance, it might invite over-managing minor policy violations. "In addition to these new Taser deployments, we plan to issue a body-worn camera and a Taser device to every officer," says Police Chief Charlie Beck. "It is our goal to make these important tools available to every front line officer over the next few years."
NASA

NASA's Robonaut 2 Can't Use Its Space Legs Upgrade 58

BarbaraHudson writes: Robonaut 2, now in orbit on board the International Space Station, has run into problems with the software controlling its new legs. From the article: "The machine ran into a few technical errors. According to NASA, the ground teams deployed Robonaut's software and received telemetry from the robot, but were unable to obtain the correct commands for the leg movement, which are vital to performing every day tasks aboard the International Space Station. Ground teams have begun assessing how to move forward with this issue, though it is unclear if they currently have a fix in mind."

Slashdot Top Deals

Thus spake the master programmer: "After three days without programming, life becomes meaningless." -- Geoffrey James, "The Tao of Programming"

Working...