Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Crime

Why ATM Bombs May Be Coming Soon To the United States 378

HughPickens.com writes Nick Summers has an interesting article at Bloomberg about the epidemic of 90 ATM bombings that has hit Britain since 2013. ATM machines are vulnerable because the strongbox inside an ATM has two essential holes: a small slot in front that spits out bills to customers and a big door in back through which employees load reams of cash in large cassettes. "Criminals have learned to see this simple enclosure as a physics problem," writes Summers. "Gas is pumped in, and when it's detonated, the weakest part—the large hinged door—is forced open. After an ATM blast, thieves force their way into the bank itself, where the now gaping rear of the cash machine is either exposed in the lobby or inside a trivially secured room. Set off with skill, the shock wave leaves the money neatly stacked, sometimes with a whiff of the distinctive acetylene odor of garlic." The rise in gas attacks has created a market opportunity for the companies that construct ATM components. Several manufacturers now make various anti-gas-attack modules: Some absorb shock waves, some detect gas and render it harmless, and some emit sound, fog, or dye to discourage thieves in the act.

As far as anyone knows, there has never been a gas attack on an American ATM. The leading theory points to the country's primitive ATM cards. Along with Mongolia, Papua New Guinea, and not many other countries, the U.S. doesn't require its plastic to contain an encryption chip, so stealing cards remains an effective, nonviolent way to get at the cash in an ATM. Encryption chip requirements are coming to the U.S. later this year, though. And given the gas raid's many advantages, it may be only a matter of time until the back of an American ATM comes rocketing off.

Submission + - Polar Challenge: 2000km under the polar ice-caps. (wcrp-climate.org)

An anonymous reader writes:

The World Climate Research Program (WCRP) is organizing a Polar Challenge competition, which would reward the first team able to send an autonomous underwater vehicle for a 2000km continuous mission under-ice in the Arctic or Antarctic. This challenge will be at least three-fold, in terms of under-ice navigation, endurance and environmental monitoring. A Prize money award would cover at least partially the recipientís investment and operating cost related to the challenge.


Submission + - Georgia Institute of Technology Researchers Bridge the Airgap (hacked.com) 1

An anonymous reader writes: Hacked has a piece about Georgia Institute of Technology Researchers keylogging from a distance using the electromagnetic radiation of CPUs. They can reportedly do this from up to 6 meters away. In this video, using two Ubuntu laptops, they demonstrate that keystrokes are easily interpreted with the software they have developed. In their whitepaper they talk about the need for more research in this area so that hardware and software manufacturers will be able to develop more secure devices. For now, Farraday cages don't seem as crazy as they used to, or do they?

Submission + - Comcast Customer Service renames customer "Asshole" (arstechnica.com) 1

An anonymous reader writes: Ars reports that a Comcast customer in Spokane, Washington, who called to cancel the television portion of his service was initially hassled by "retention" specialist before receiving his next bill, with his first name changed to "Asshole".

Comment Let's compare prices (Score 1) 307

A Windows laptop starts at $200 (source: hp.com) and should last at least four years if not physically mistreated. You may have to replace the rechargeable battery at the two-year mark, but I don't expect that to cost more than $60. How much does four years of cellular Internet access cost, let alone the EC2 or Azure subscription on top of that?

Businesses

One In Five Developers Now Works On IoT Projects 252

dcblogs writes Evans Data Corp., which provides research and intelligence for the software development industry, said that of the estimated 19 million developers worldwide, 19% are now doing IoT-related work. A year ago, the first year IoT-specific data was collected, that figure was 17%. But when developers were asked whether they plan to work in IoT development over the next year, 44% of the respondents said they are planning to do so, said Michael Rasalan, director of research at Evans.

Comment Re:Rent a truck, rent a PC (Score 1) 307

Amazon EC2? Window Azure?

You need more horsepower, you just give them your credit card #.

Both to them and to the cellular carrier. Connecting to them requires a valid subscription to Internet access. Doing so while riding transit requires a separate subscription to cellular Internet access in addition to what you already pay for Internet at home.

Comment Multi-window and compilers (Score 1) 307

What is it you imagine you can do on a 10" netbook laptop that you can't do on a tablet paired with an external bluetooth keyboard?

Anything that requires multiple windows on screen at once. One example is using a calculator that doesn't fill the screen. Another example is putting a source code window on one half of the screen and the output window on the other half.

Or applications that Apple has not approved. One of them is programming for a class or a hobby. Last time I checked, programming on iOS was limited to a small selection of interpreters for dynamically typed scripting languages such as Codea (a Lua interpreter) and Pythonista (a Python interpreter). On a netbook, on the other hand, if I want to use C++, Java, Fortran, 6502 assembly language, or any other language, usable tools are a sudo apt-get install away.

(For the purposes of this post, I'm treating the ASUS Transformer Book, Surface Pro 3, and other Windows x86 tablets as laptops. My objection is not to the tablet form factor but to the restrictions inherent in iOS.)

Privacy

Snowden Documents: CSE Tracks Millions of Downloads Daily 103

Advocatus Diaboli writes Canada's electronic spy agency sifts through millions of videos and documents downloaded online every day by people around the world, as part of a sweeping bid to find extremist plots and suspects, CBC News has learned. Details of the Communications Security Establishment project dubbed 'Levitation' are revealed in a document obtained by U.S. whistleblower Edward Snowden and recently released to CBC News. Under Levitation, analysts with the electronic eavesdropping service can access information on about 10 to 15 million uploads and downloads of files from free websites each day, the document says.

Slashdot Top Deals

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...