Follow Slashdot stories on Twitter


Forgot your password?

Comment Re:Which amendment now? (Score 1) 2

Of course the exception to this that in some cases, when you are in jail you're not allowed to write books and make money off your crimes. Free speech would be you talking to someone about it, but you would not be allowed to detail the crime and make money from it.

The original question isn't about freedoms really, but more about ethics. The data is stolen. You shouldn't be looking at stolen data, or even pseudo-copies. We see with Snowden that even large media companies makes mistakes with release and redacted information (e.g. revealed ISIS current intel because they didn't properly block out a PowerPoint slide). Perhaps you'll feel differently when you see someone who's stolen your name, address, DOB, SSN, work history, history of living, interviews of friends, financial information and a trove of other information put out on the internet, and then have someone do "analysis" of your stolen information. No, this hasn't happened YET. But if the Guardian can do it with stolen documents from a business, there's no barrier to doing it with a person.

Submission How is analyzing stolen data ethical? 2

JohnnyComeLately writes: If you steal someone's car, the cops don't let you keep the car and tear apart the engine looking for "data". Al Gore didn't create an Internet Cop, but journalistic companies claim to abide by ethical standards. Hence, how can an ethical journal, like the Guardian, do "analysis" of stolen data? Would they do analysis of my stolen information from OPM? Maybe they can have Anderson and Cooper to analysis of my finances with the stolen financial information OPM possessed.

Comment Mac Mini (Score 1) 558

Late-2012 Mac Mini
2.5GHz dual-core Intel Core i5
OWC 500Mb SSD drive
16 Gb memory (upgrade from OWC)
Intel HD Graphics 4000
Toshiba 32" TV as the monitor
El Gato HD game capture for streaming XBOX360 on Twitch.TV ( Johnny4848 )

No problems to date. Of course, use Magic Trackpad and Apple wireless keyboard with it.

Comment Stun and gun holsters should trigger (Score 1) 219

Anytime the stun or sidearm is unholstered, the camera begins recording. This does more, as you start seeing how often force is threatened. Maybe it starts showing trends (e.g. group 1 pulls in 80% of traffic stops versus group 2 pulls in 10%). There's no objective way to make your TTPs (Tactical Task Procedures, standard op procedures, whatever you want to call em) better without measuring. If an officer is pulling out force so often the batteries fail, then this should trigger an internal audit. Such as, IT department seeing one user in particular seems to be going often to and Do we say all users are bad, or do we monitor for the 1 or 2 who do bad things? The latter. Good for IT, should be good for LEO.

Besides, cops seem all geared up in tactical battle rattle (stun grenades on occasion, multiple sets of cuffs, body armor, etc), what's another 12 oz external Lithium Ion battery pack?

Comment Stupidity is abundant these days (Score 4, Informative) 89

If I break into your house, and then walk into your main hallway, and then say, "There is a security flaw in your home! From this point in your hallway I can listen to any room, or walk down freely into any room." As you're looking at your front door splintered from the battering ram I hit it with to get in, would you call it a "hack," a flaw or something to be concerned about how your hallway(s) go through your house? No, you'd say, "The hallway is fine, I need a stronger front door. BTW, the Glock I'm holding is loaded."

When I start to read, "SS7 was designed in the 80s," I already know I'm dealing wtih a mental midget. Actually, SS7 begain due to the first ever hackers. Remember 2600? As in, 2600 Hz was the signaling frequency for a landline switch. Throw that tone, and you could make calls (for free if it was a payphone). Hence, telecoms came up with an idea to do out of band signaling, which eventually became SS7. So, saying you can "hack" SS7 is very misleading because all SS7 does is coordinate call set up. That "ringing" you hear as you wait for the far, distant switch to reply that the called line is available, is a "comfort tone," as SS7 does it's work. Besides cutting down on fraud, SS7 keeps circuits available, because if the called number is busy, or unavailable, there's no point in setting up a line between your local switch and the switch at the far end.

In the deepest bowels of a switching office, usually near the back, you'll see SS7 racks. These connect from and between local, long-distance and other switches. It's what you'd call, "Back Office," network, similar to the network used by the telecoms to manage their servers your traffic go across but you'll never touch. Such as 3G data going through PCF after it's left the mobile switch, and before it hits an internet backbone ATM. So in simple terms, you'd have to break in, figure out the network, and then figure out a 2nd break in to get to the SS7, and then you'd be in a very small part of the network.

Honestly, if you're going to be doing that much effort, you're NOT going after SS7. Just hack the 3-letter agencies or other LEO server for court-approved wiretapping that is hanging off the switching network and you're in anything, everything, anywhere.

Submission Policeman cracks woman's iPad to (potentially) save her life-> 1

JohnnyComeLately writes: Since the NSA was busy, an officer took matters into his own hands and breaks the privacy setting on a lady's iPad to locate her after a reported crash. The story begins, "After a driver's OnStar alert system reportedly gives inaccurate locations for a crash, the local police department's tech geek thinks fast, breaks into the driver's iPad at her home and finds her via an Apple app." OnStar had erroneously given information which led police to the lady's house. So the officer guessed her passcode, correctly on 3rd try, and unlocked her iPad. Armed with FindMyiPhone app location, police were dispatched more accurately to her location, as the previous information (from cell phone provider) only gave them a 7 mile radius to search. A U.S. Coast Guard helicopter airlifted Vasquez to Regional Medical Center of San Jose.
Link to Original Source

Comment Re:Net Neutrality = Communism (Score 1) 52

Besides, we also have recent precedence on this. There are laws which prohibited certain anti-competitive behavior for newspapers. If you stifle the channels of communication, say the printing press in the 1800s, then you control the narrative(s). Today, the Internet is uniquely in that very same position. If you allow a privately owned organization to take self-serving priorities, with no competitive alternatives available, then you are again in a position where the narrative is dictated. Let's say Comcast buys Fox, and now only Fox content streams quickly. A Comcast subscriber decides to hear the alternative side of the narrative, say from MSNBC or CNN, but they get constant "spinning wheels," as they wait. Occasionally they get resets (as ISPs have been caught doing to P2P), or accidental DNS redirects to blackholes.

Also, the Internet was originally developed by the government and universities, and did not prioritize traffic. Imagine, for example, if GPS were to be "bought" by GE. You can only get fine positioning if you pay $x a month, but if you don't, you get 200m accuracy. Maybe this is your street to turn on, maybe it was a block back.

Comment Re:If you have the opportunity (Score 1) 433

"You may not care about justice, but your organizations lack of concern for those princibles are exactly why I just see them as a gang of murderers."

How do you know what I care about? You don't even have a basic understanding of how a strike or target package gets put together, and yet, come to a stated conclusion. I'll assume this will fall on deaf ears, but take some time to understand a topic before condemning. First, every member in the US military goes through LOAC training every year. If you're a cook or a sniper, you know The Law of Armed Conflict (LOAC). Then, Rules of Engagement (RoE), which any US military member involved with the application of kinetic force (e.g. snipers, infantry, fighter pilots, etc) is trained and held accountable. Then, understand how how the military gets information from people, and then you might BEGIN to understand the premise of what's happening. I can't find open source (read: unclassified) reports on how the target packages are put together, so I'll avoid specifics, but I did allude to it in my original message. This also is still incomplete because there are also Military Lawyers involved. Yes, a lawyer can say, "NO GO," when everything else says, "GO!".

No one hates war more than a war fighter. 100,000+ Americans did not decide they really wanted to go visit Afghanistan for sun and fun, but political and other factors that manifested after Sept 11, 2001 changed things.

Comment Re:If you have the opportunity (Score 1) 433

An airstrike does not happen in your scenario for two main reasons (among many others): Source grade and single source rules.

First, your Guy C is an unknown. His source report will grade him very low. It will be low because he's never reported before, nothing he said is corroborated through 3rd, unrelated sources and for some other reasons. All source reports are given a grade and only reports above a certain grade are acted upon. The rest are treated as, "stuff you might read on the internet."

Second, no strike package is getting approved with a single source HUMINT...even if it's graded at the very top (reliable from previous experience, etc). I don't want to get more specific but let's say very smart people are 3 steps ahead in thinking this scenario through and how to avoid the mistakes.

Your scenario does play out with the DEA in the US, but that has absolutely nothing to do with this article or my previous comments.

Comment Role of DMCA and free markets (Score 4, Interesting) 58

Do you see free market innovation thriving with DMCA despite the apparent lack of innovation?

Articulation of my question: When I buy a car, I can modify it. If people like my modification they can view it at my leisure and tinker themselves. GM doesn't sue me, and if I open a business to work on other GM cars to do similar GM vehicle modifications, then I have little legal exposure. However, with DMCA, GM can shut down a video if it's "suspected" I've infringed on a digital asset, and I can't legally sell modifications of their digital asset. This is why we see every new technology for digital streaming of data run a gauntlet of legal hurdles, which in turn stifles new innovation in the area of digital property.

Comment Re:Correlation vs correlation (Score 4, Interesting) 433

Very good articulated and supported point which is valid, however, the targeting is no longer the guys with an idea. Meaning, 5 years ago you'd have targeted the emplacers (the guy with a shovel, or in your analogy, an idea). With time, the lesson was learned the effect was small and it is relatively ineffective. Now, you go up the chain and after those who enable others to become more effective. Let me give an example, let's say AQ has three targets in the US: A general officer, a private and an NCO (Non-Commissioned Officer).

Taking out the General is symbolic but has very little impact on the effectivness of the US Army. If you take out a private, there are 10-20 others identically trained and with similar levels of proficiency. However, the NCO leads several squads. The NCO is a trainer, mentor, coach, knowledge manager and adult babysitter.

Taking the NCO out has a real effect on the battlefield as General Officer orders may not get correctly implemented, new troops may not come up to speed (read: battle effective) as fast, etc.

So, the best target for having an effect on battle is the NCO. The US and NATO are not after the General or the Privates... yes if there's a target of opportunity, a real threat, and the RoE/LoAC allows, a shot is taken, but the active targeting is at the NCO level. I wish I could be more specific but I won't. Just as most of what you read in mainstream or see in the movies about computers, technology, etc is wrong, so is the supposed, "wanton carnage from UAVs bombing everyone." I spent 3 years watching hundreds of strikes and you couldn't even apply most of what I read here to the exceptions, much less the "norm." People read a few articles and suddenly are experts on tactical military operations 1/2 way around the world (ignoring the few who incorrectly refer to it as "strategic bombing").

"Confound these ancestors.... They've stolen our best ideas!" - Ben Jonson