Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Submission + - The CIA Does Las Vegas (belowgotham.com)

Nicola Hahn writes: Despite the long line of covert operations that Ed Snowden’s documents have exposed public outcry hasn’t come anywhere near the level of social unrest that characterized the 1960s. Journalists like Conor Friedersdorf have suggested that one explanation for this is that the public is “informed by a press that treats officials who get caught lying and misleading (e.g., James Clapper and Keith Alexander) as if they're credible.”

Certainly there are a number of well-known popular venues which offer a stage for spies to broadcast their messages from while simultaneously claiming to “cultivate conversations among all members of the security community, both public and private.” This year, for instance, Black Hat USA will host Dan Greer (the CISO of In-Q-Tel) as a keynote speaker.

But after all of the lies and subterfuge is it even constructive to give voice to the talking points of intelligence officials? Or are they just muddying the water? As one observer put it, “high-profile members of the intelligence community like Cofer Black, Shawn Henry, Keith Alexander, and Dan Greer are positioned front and center in keynote slots, as if they were glamorous Hollywood celebrities. While those who value their civil liberties might opine that they should more aptly be treated like pariahs”

Submission + - Was America's #1 Rocketeer a Communist Spy? The FBI thought so.

IMissAlexChilton writes: Frank Malina masterfully led the World War II effort to build U.S. rockets for jet-assisted takeoff and guided missiles. As described in IEEE Spectrum, Malina’s motley crew of engineers and enthusiasts (including occultist Jack Parsons) founded the Jet Propulsion Lab and made critical breakthroughs in solid fuels, hypergolics, and high-altitude sounding rockets, laying the groundwork for NASA’s future successes. And yet, under suspicion by the Feds at the war’s end, Malina gave up his research career, and his team’s efforts sank into obscurity. Taking his place: the former Nazi Wernher von Braun. Read “Frank Malina: America’s Forgotten Rocketeer”. Includes cool vintage footage of early JPL rocket tests. Disclosure: I am a staff editor with IEEE Spectrum.

Submission + - Programmers: Why Haven't You Joined The ACM? (itworld.com) 1

jfruh writes: The Association for Computing Machinery is a storied professional group for computer programmers, but its membership hasn't grown in recent years to keep pace with the industry. Vint Cerf, who recently concluded his term as ACM president, asked developers what was keeping them from signing up. Their answers: paywalled content, lack of information relevant to non-academics, and code that wasn't freely available.

Submission + - a NEW Road Warrior movie

turkeydance writes: Following more than a decade of gestation and interruptions and coming nearly 40 years after the original film, the latest installment of George Miller’s apocalyptic action series Mad Max will finally see the light of day.
http://www.slate.com/blogs/bro...

Submission + - Ask Slashdot: After TrueCrypt (slashdot.org)

TechForensics writes: (Resubmitted because was not identified as "Ask Slashdot"

We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA – hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been compromised.

This is the situation we have: all of the main are important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered false. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother.

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA–hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been vitiated.

This is the situation we have: all of the main or important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered tainted. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother. (Would it not be possible for the NSA to create a second TrueCrypt that has the same hash value as the original?)

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?

Submission + - Open-Source Blu-Ray Library Now Supports BD-J Java (phoronix.com)

An anonymous reader writes: Updates to the open-source libbluray, libaacs, and libbdplus libraries have improved the open-source Blu-ray disc support to now enable the Blu-ray Java interactivity layer (BD-J). The Blu-ray Java code is in turn executed by OpenJDK or the Oracle JDK and is working well enough to play a Blu-ray disc on the Raspberry Pi when paired with the VLC media player.

Comment Re:What? (Score 3, Funny) 753

It would actually be easy enough for Walmart to anonymize them, by simply recording the transaction as "$50 Prepaid Debit Card" and not record which particular debit card number went to which customer. Also, if you anonymously acquire a prepaid debit card used for a transaction involved with some nefarious purpose, you still don't get picked up, because it may trace to that transaction, but it doesn't trace to you.

It would actually be easy enough for Walmart to switch to paper debit cards that had the amount of the card printed on the front. When you used that card, the cashier simply gave you lower-denomination of cards (say, a $5 debit card when you paid for a 5 dollar item with a $10 debit card).

Once this practice became pervasive enough, unfortunately the government would have to step in to create rules and regulations as to how all the printing would appear, and to prevent fraud. I suggest they mandate the use of engraved printing plates; green magnetic ink; and heavy cotton rag for the card. Oh, and to certain security features like holograms, watermarks, embedded plastic strips, etc.

My god, the level of convenience we'd enjoy would blow away any other form of paying for goods and services literally overnight.

Comment Re:Silly season much (Score 1) 131

Who says you can't have a second child after you sold the first one?

Peasant Han: "Honest officer! Our child was sold into slavery over a year ago!"

Officer Zau kicks over the wood stove, lifts open a patch of the tile floor and shines his light into the darkness below. A dozen eyes shine back.

Officer Zau (screaming): Zui cha. Chaqu. Yongyuan!

Officer Zau unholsters her Type 15 pistol, takes aim at Han and puts her finger on the trigger.

(fade to black)

Comment A scary idea, if true (Score 1) 7

I recall an old Science Fiction story along the same lines, back in the early 80s.

The protagonist was a young man in a third-world middle-eastern shitehole. He was tired of war, of losing friends and families, when he had a revelation: the "Blue Hats" (UN) were neutral, so if he joined their "army" he'd be relatively safe and wouldn't have to fight any more.

So, he obtains a discarded steel pot and paints it blue. Reveling in his newfound "immunity," he convinces his friends and neighbors to do the same. Even the other side starts doing it until everyone is a Blue Hat -- and peace breaks out for the first time in living memory.

I forget how it ended, but the gist was that the First-World was using the Third-World as a "live culture" of warfare, to keep the former's own troops trained and budgets justified. The old sides were eventually convinced to go back to fighting one another.

Submission + - NSA Admits Retaining Snowden Emails, no FOIA for US press (matthewkeys.net)

AHuxley writes: The http://thedesk.matthewkeys.net... reports on a FOIA request covering "... all e-mails sent by Edward Snowden"
Remember how Snowden should have raised his concerns with his superiors within the NSA?
Remember how no such communication could be found?
Remember how one such communication was released but did not seem to be raising direct concerns?
Well some record of e-mail communications seems to exist but they are exempt from public disclosure under the federal Freedom of Information Act.

Submission + - In New Zealand The Right To Silence And Presumption Of Innocence Are In Danger (nzherald.co.nz)

cold fjord writes: The New Zealand Herald reports, "Fundamental pillars of the criminal justice system may be eroded whichever party wins the election this year, as both National's and Labour's proposals would look into changing the right to silence or the presumption of innocence in rape cases. Both major parties claim the current system is not upholding justice for victims, and are looking at changes that would effectively make it easier for prosecutors to obtain convictions. National wants to explore allowing a judge or jury to see an accused's refusal to give evidence in a negative light, while Labour wants to shift the burden of proof of consent from the alleged victim to the accused."

Comment Re:Good luck with that (Score 1) 272

Some of the stupid interviewing criteria that my colleagues and me [sic] had to deal with boggles my mind.

Ahh, reminds me of the Angry Aussie and his response to pointless interview questions:

For instance, there was the putz I had to see this week who thought he was being really clever. It seems as though someone gave him the book of Microsoft interview questions and he was eager to show off his new "knowledge". This style of interviewing gives you abstract questions that have no relationship whatsoever to the work you'll be doing. Or to the real world.

Proponents say they're trying to see how creatively you can think. Normal humans say it's a waste of time.

Comment Re:Come on Google (Score 1) 71

For the random people that use Orkut like others use Facebook, it really is not a lot of time to figure out what to do with potentially gigabytes of information. That holds particularly true for anyone that is not technically savvy.

How long does it take to slide over to Google Takeout and download all of your data?

A few minutes? An hour?

When Goog crushed Wave, I downloaded all my stuff in a matter of minutes. Couldn't really do much with it, but it lowered my White Hot Rage down to Red.

Slashdot Top Deals

"Gravitation cannot be held responsible for people falling in love." -- Albert Einstein

Working...