Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Take advantage of Black Friday with 15% off sitewide with coupon code "BLACKFRIDAY" on Slashdot Deals (some exclusions apply)". ×

Comment Re:SMS (Score 2) 202

Now that we xenophobically blocked Syrian refugees, now the Governors have announced they will keep Amierica safe by banning cell phones. "The terrorists used cell phones and this new technology they learned from Snowden (aka Moldemort) called SMS. We must not be threatened by this illegal usage of dangerous technology." Rumor has it they're going after books next and plan big book burnings and witch drownings. "I know at least one of those ISIS phuckers read a Harry Potter book," Texas governor was overheard saying.

Comment Re:what good will this do ? (Score 1) 318

There's a father in the UK who would disagree with you. His daughter, who was very quiet, introspective and not very religious was introduced to ISIS via Twitter. They carefully groom, have "handlers," who spot the girls and then hand them off. They're then fed a steady stream, similar to what you see on your Twitter and Facebook. With the aim to gradually move you from center and an "entertaining extreme ideas," without any aim to do them yourself. Then one day, "Come check it out for yourself. Here's Twitter accounts of others who are here and having a great time!!" The UK girl hid her trip from her parents who had 0 idea until the police showed up. The sick irony is the police had previously contacted the school, who sent home a letter with the girl for her parents to read. Guess whether parents saw it? Long story still long... It is good that Anon is shutting these down.

For the people asking why intel communities aren't shutting them down: They're intel sources. Why would you shut down accounts when they tell you TTPs, SOPs, areas of influence, capabilities, locations (eg. idiot Twitters a pic of the ISIS HQ, which is then bombed within 24 hours), etc. Besides, no manning for this as there's no DoD or IC requirements to "shut down propaganda accounts."

Comment Re:Mixed (Score 1) 350

Because in Europe, they'll pull you over for not passing, while cruising in the left lane. I drove a rental around Belgium and Germany, and was warned by quite a few people to stay out of the left two lanes (assuming 3+ lane) I've watched CHP (California Highway Patrol) roll up on a left lane squatter, cruise for about 1-2 miles behind, and then pass on the right. Which, technically, I think passing on the right is also illegal to go along with the impeding. The only place I've seen here enforce is CHP up north, around Monterey, where retirees in motorhome back up 4+ cars going up hills.

Comment Re:Which amendment now? (Score 1) 2

Of course the exception to this that in some cases, when you are in jail you're not allowed to write books and make money off your crimes. Free speech would be you talking to someone about it, but you would not be allowed to detail the crime and make money from it.

The original question isn't about freedoms really, but more about ethics. The data is stolen. You shouldn't be looking at stolen data, or even pseudo-copies. We see with Snowden that even large media companies makes mistakes with release and redacted information (e.g. revealed ISIS current intel because they didn't properly block out a PowerPoint slide). Perhaps you'll feel differently when you see someone who's stolen your name, address, DOB, SSN, work history, history of living, interviews of friends, financial information and a trove of other information put out on the internet, and then have someone do "analysis" of your stolen information. No, this hasn't happened YET. But if the Guardian can do it with stolen documents from a business, there's no barrier to doing it with a person.

Submission + - How is analyzing stolen data ethical? 2

JohnnyComeLately writes: If you steal someone's car, the cops don't let you keep the car and tear apart the engine looking for "data". Al Gore didn't create an Internet Cop, but journalistic companies claim to abide by ethical standards. Hence, how can an ethical journal, like the Guardian, do "analysis" of stolen data? Would they do analysis of my stolen information from OPM? Maybe they can have Anderson and Cooper to analysis of my finances with the stolen financial information OPM possessed.

Comment Mac Mini (Score 1) 558

Late-2012 Mac Mini
2.5GHz dual-core Intel Core i5
OWC 500Mb SSD drive
16 Gb memory (upgrade from OWC)
Intel HD Graphics 4000
Toshiba 32" TV as the monitor
El Gato HD game capture for streaming XBOX360 on Twitch.TV ( Johnny4848 )

No problems to date. Of course, use Magic Trackpad and Apple wireless keyboard with it.

Comment Stun and gun holsters should trigger (Score 1) 219

Anytime the stun or sidearm is unholstered, the camera begins recording. This does more, as you start seeing how often force is threatened. Maybe it starts showing trends (e.g. group 1 pulls in 80% of traffic stops versus group 2 pulls in 10%). There's no objective way to make your TTPs (Tactical Task Procedures, standard op procedures, whatever you want to call em) better without measuring. If an officer is pulling out force so often the batteries fail, then this should trigger an internal audit. Such as, IT department seeing one user in particular seems to be going often to and Do we say all users are bad, or do we monitor for the 1 or 2 who do bad things? The latter. Good for IT, should be good for LEO.

Besides, cops seem all geared up in tactical battle rattle (stun grenades on occasion, multiple sets of cuffs, body armor, etc), what's another 12 oz external Lithium Ion battery pack?

Comment Stupidity is abundant these days (Score 4, Informative) 89

If I break into your house, and then walk into your main hallway, and then say, "There is a security flaw in your home! From this point in your hallway I can listen to any room, or walk down freely into any room." As you're looking at your front door splintered from the battering ram I hit it with to get in, would you call it a "hack," a flaw or something to be concerned about how your hallway(s) go through your house? No, you'd say, "The hallway is fine, I need a stronger front door. BTW, the Glock I'm holding is loaded."

When I start to read, "SS7 was designed in the 80s," I already know I'm dealing wtih a mental midget. Actually, SS7 begain due to the first ever hackers. Remember 2600? As in, 2600 Hz was the signaling frequency for a landline switch. Throw that tone, and you could make calls (for free if it was a payphone). Hence, telecoms came up with an idea to do out of band signaling, which eventually became SS7. So, saying you can "hack" SS7 is very misleading because all SS7 does is coordinate call set up. That "ringing" you hear as you wait for the far, distant switch to reply that the called line is available, is a "comfort tone," as SS7 does it's work. Besides cutting down on fraud, SS7 keeps circuits available, because if the called number is busy, or unavailable, there's no point in setting up a line between your local switch and the switch at the far end.

In the deepest bowels of a switching office, usually near the back, you'll see SS7 racks. These connect from and between local, long-distance and other switches. It's what you'd call, "Back Office," network, similar to the network used by the telecoms to manage their servers your traffic go across but you'll never touch. Such as 3G data going through PCF after it's left the mobile switch, and before it hits an internet backbone ATM. So in simple terms, you'd have to break in, figure out the network, and then figure out a 2nd break in to get to the SS7, and then you'd be in a very small part of the network.

Honestly, if you're going to be doing that much effort, you're NOT going after SS7. Just hack the 3-letter agencies or other LEO server for court-approved wiretapping that is hanging off the switching network and you're in anything, everything, anywhere.

Submission + - Policeman cracks woman's iPad to (potentially) save her life ( 1

JohnnyComeLately writes: Since the NSA was busy, an officer took matters into his own hands and breaks the privacy setting on a lady's iPad to locate her after a reported crash. The story begins, "After a driver's OnStar alert system reportedly gives inaccurate locations for a crash, the local police department's tech geek thinks fast, breaks into the driver's iPad at her home and finds her via an Apple app." OnStar had erroneously given information which led police to the lady's house. So the officer guessed her passcode, correctly on 3rd try, and unlocked her iPad. Armed with FindMyiPhone app location, police were dispatched more accurately to her location, as the previous information (from cell phone provider) only gave them a 7 mile radius to search. A U.S. Coast Guard helicopter airlifted Vasquez to Regional Medical Center of San Jose.

Comment Re:Net Neutrality = Communism (Score 1) 52

Besides, we also have recent precedence on this. There are laws which prohibited certain anti-competitive behavior for newspapers. If you stifle the channels of communication, say the printing press in the 1800s, then you control the narrative(s). Today, the Internet is uniquely in that very same position. If you allow a privately owned organization to take self-serving priorities, with no competitive alternatives available, then you are again in a position where the narrative is dictated. Let's say Comcast buys Fox, and now only Fox content streams quickly. A Comcast subscriber decides to hear the alternative side of the narrative, say from MSNBC or CNN, but they get constant "spinning wheels," as they wait. Occasionally they get resets (as ISPs have been caught doing to P2P), or accidental DNS redirects to blackholes.

Also, the Internet was originally developed by the government and universities, and did not prioritize traffic. Imagine, for example, if GPS were to be "bought" by GE. You can only get fine positioning if you pay $x a month, but if you don't, you get 200m accuracy. Maybe this is your street to turn on, maybe it was a block back.

Money is the root of all evil, and man needs roots.