Government

FBI Quietly Changes Its Privacy Rules For Accessing NSA Data On Americans (theguardian.com) 49

An anonymous reader writes: The FBI has quietly revised its privacy rules for searching data involving Americans' international communications that was collected by the NSA, U.S. officials have confirmed to the Guardian. The classified revisions were accepted by the secret U.S. court that governs surveillance, during its annual recertification of the agencies' broad surveillance powers. The new rules affect a set of powers colloquially known as Section 702, the portion of the law that authorizes the NSA's sweeping "Prism" program to collect internet data. Section 702 falls under the Foreign Intelligence Surveillance Act, and is a provision set to expire later this year. A government civil liberties watchdog, the Privacy and Civil Liberties Oversight Board, alluded to the change in its recent overview of ongoing surveillance practices. The PCLOB's new compliance report, released last month, found that the administration has submitted "revised FBI minimization procedures" that address at least some of the group's concerns about "many" FBI agents who use NSA-gathered data. Sharon Bradford Franklin, a spokesperson for the PCLOB, said the rule changes move to enhance privacy. She could not say when the rules actually changed -- that, too, is classified. Last February, a compliance audit alluded to imminent changes to the FBI's freedom to search the data for Americans' identifying information. "FBI's minimization procedures will be updated to more clearly reflect the FBI's standard for conducting U.S. person queries and to require additional supervisory approval to access query results in certain circumstances," the review stated. The reference to "supervisory approval" suggests the FBI may not require court approval for their searches -- unlike the new system Congress enacted last year for NSA or FBI acquisition of U.S. phone metadata in terrorism or espionage cases.
The Courts

European Human Rights Court Rules Mass Surveillance Illegal (theregister.co.uk) 74

Kekke sends this report from El Reg: The European Court of Human Rights (ECHR) has ruled that mass surveillance is illegal, in a little-noticed case in Hungary. In a judgment last week, the court ruled that the Hungarian government had violated article 8 of the European Convention on Human Rights (the right to privacy) due to its failure to include "sufficiently precise, effective and comprehensive" measures that would limit surveillance to only people it suspected of crimes. Under a section of the 2011 National Security Act, a minister of the government is able to approve a police request to search people's houses, mail, phones and laptops if they are seeking to protect national security. ... The court said the Hungarian government should be required to interpret the law in a narrow fashion and "verify whether sufficient reasons for intercepting a specific individual's communications exist in each case." Or in other words, every individual case must be looked at carefully and a decision made on each. Which is clearly impossible if the law is taken to carry out mass surveillance, i.e., hoovering up information over the internet and then searching in it."
Data Storage

How a Frozen Neutrino Observatory Grapples With Staggering Amounts of Data (vice.com) 49

citadrianne writes: Deep beneath the Antarctic ice sheet, sensors buried in a billion tons of ice—a cubic kilometer of frozen H2O—are searching for neutrinos. "We collect...one neutrino from the atmosphere every ~10 minutes that we sort of care about, and one neutrino per month that comes from an astrophysical sources that we care about a very great deal," researcher Nathan Whitehorn said. "Each particle interaction takes about 4 microseconds, so we have to sift through data to find the 50 microseconds a year of data we actually care about." Computing facilities manager Gonzalo Merino added, "If the filtered data from the Pole amounts to ~36TB/year, the processed data amounts to near 100TB/year." Because IceCube can't see satellites in geosynchronous orbit from the pole, internet coverage only lasts for six hours a day, Whitehorn explained. The raw data is stored on tape at the pole, and a 400-core cluster makes a first pass at the data to cut it down to around 100GB/day. A 4000-CPU dedicated local cluster crunches the numbers. Their storage system has to handle typical loads of "1-5GB/sec of sustained transfer levels, with thousands of connections in parallel," Merino explained.
Privacy

Ask Slashdot: Where Can I Find "Nuts and Bolts" Info On Cookies & Tracking Mechanisms? 84

New submitter tanstaaf1 writes: I was thinking about the whole tracking and privacy train-wreck and I'm wondering why specific information on how it is done, and how it can be micromanaged or undone by a decent programmer (at least), isn't vastly more accessible? By searching, I can only find information on how to erase cookies using the browser. Browser level (black box) solutions aren't anywhere near good enough; if it were, the exploits would be few and far between instead everywhere everyday. Read below for the rest of tanstaaf1's question.
Security

Researchers: Thousands of Medical Devices Are Vulnerable To Hacking 29

itwbennett writes: At the DerbyCon security conference, researchers Scott Erven and Mark Collao explained how they located Internet-connected medical devices by searching for terms like 'radiology' and 'podiatry' in the Shodan search engine. Some systems were connected to the Internet by design, others due to configuration errors. And much of the medical gear was still using the default logins and passwords provided by manufacturers. 'As these devices start to become connected, not only can your data gets stolen but there are potential adverse safety issues,' Erven said.
Google

Hackers' Latest Targets: Google's Webmaster Tools 19

jfruh writes: The latest attack vector hackers are taking advantage of: Google's Webmaster tools, which allow domain owners to index new pages for searching and react quickly to Google-detected malware. It's that last capability that hackers are after, tweaking things to keep infected sites under their control longer. From the ITWorld story: "According to the Sucuri researchers, by becoming verified owners for compromised websites, attackers can track how well their BHSEO campaigns perform in Google Search. They can also submit new spam pages to be indexed faster instead of waiting for them to be discovered naturally by Google's search robots, they can receive alerts if Google flags the websites as compromised, and, most importantly, they can remove legitimate owners of the site from the Search Console."
Google

Google 'Makes People Think They Are Smarter Than They Are' 227

HughPickens.com writes Karen Knapton reports at The Telegraph that according to a study at Yale University, because they have the world's knowledge at their fingertips, search engines like Google or Yahoo make people think they are smarter than they actually are giving people a 'widely inaccurate' view of their own intelligence that can lead to over-confidence when making decisions. In a series of experiments, participants who had searched for information on the internet believed they were far more knowledgeable about a subject that those who had learned by normal routes, such as reading a book or talking to a tutor. Internet users also believed their brains were sharper. "The Internet is such a powerful environment, where you can enter any question, and you basically have access to the world's knowledge at your fingertips," says lead researcher Matthew Fisher. "It becomes easier to confuse your own knowledge with this external source. When people are truly on their own, they may be wildly inaccurate about how much they know and how dependent they are on the Internet." In the tests searching for answers online leads to an illusion such that externally accessible information is conflated with knowledge "in the head" (PDF). This holds true even when controlling for time, content, and search autonomy during the task. "The Internet is an enormous benefit in countless ways, but there may be some trade-offs that aren't immediately obvious and this may be one of them," concludes Fisher. "Accurate personal knowledge is difficult to achieve, and the Internet may be making that task even harder."
China

China Bans "Human Flesh Searching" 109

hackingbear writes The Supreme People's Court, China's top court, has outlined the liabilities of network service providers in a document on the handling of online personal rights violation cases. "Rights violators usually hide in the dark online. They post harmful information out of the blue, and victims just can't be certain whom they should accuse when they want to bring the case to court," said Yao Hui, a senior SPC judge specializing in civil cases. Those re-posting content that violates others' rights and interests will also answer for their actions, and their liability will be determined based on the consequences of their posts, the online influence of re-posters, and whether they make untruthful changes to content that mislead. This essentially tries to ban the so-called human flesh searching. Though this does not stop others from using the chance to highlight the country's censorship problems even though the rulings seem to focus on personal privacy protection.
Android

Google I/O 2014 Begins [updated] 49

Google I/O, the company's annual developer tracking^wdevelopers conference, has opened today in San Francisco. This year the company has reduced the number of conference sessions to 80, but also promised a broader approach than in previous years -- in other words, there may be a shift in focus a bit from Google's best known platforms (Chrome/Chrome OS and Android). Given its wide-ranging acquisitions and projects (like the recent purchase of Nest, which itself promptly bought Dropcam, the ever smarter fleet of self-driving cars, the growing number of Glass devices in the wild, and the announcement of a 3D scanning high end tablet quite unlike the Nexus line of tablets and phones), there's no shortage of edges to focus on. Judging from the booths set up in advance of the opening (like one with a sign announcing "The Physical Web," expect some of the stuff that gets lumped into "the Internet of Things." Watch this space -- updates will appear below -- for notes from the opening keynote, or follow along yourself with the live stream, and add your own commentary in the comments. In the days to come, watch for some video highlights of projects on display at I/O, too. Update: 06/25 17:41 GMT by T : Updates rolling in below on Android, wearables, Android in cars, Chromecast, smart watches, etc.Keep checking back! (Every few minutes, I get another chunk in there.)
Books

Online Skim Reading Is Taking Over the Human Brain 224

Hugh Pickens DOT Com (2995471) writes "Michael S. Rosenwald reports in the Washington Post that, according to cognitive neuroscientists, humans seem to be developing digital brains with new circuits for skimming through the torrent of information online at the expense of traditional deep reading circuitry... Maryanne Wolf, one of the world's foremost experts on the study of reading, was startled last year to discover her brain was apparently adapting, too. After a day of scrolling through the Web and hundreds of e-mails, she sat down one evening to read Hermann Hesse's challenging novel The Glass Bead Game. 'I'm not kidding: I couldn't do it,' says Wolf. 'It was torture getting through the first page. I couldn't force myself to slow down so that I wasn't skimming, picking out key words, organizing my eye movements to generate the most information at the highest speed. I was so disgusted with myself.'

The brain was not designed for reading and there are no genes for reading like there are for language or vision. ... Before the Internet, the brain read mostly in linear ways — one page led to the next page, and so on. The Internet is different. With so much information, hyperlinked text, videos alongside words and interactivity everywhere, our brains form shortcuts to deal with it all — scanning, searching for key words, scrolling up and down quickly. This is nonlinear reading, and it has been documented in academic studies. ... Some researchers believe that for many people, this style of reading is beginning to invade our ability to deal with other mediums. 'We're spending so much time touching, pushing, linking, scrolling and jumping through text that when we sit down with a novel, your daily habits of jumping, clicking, linking is just ingrained in you,' says Andrew Dillon."
The Military

DARPA Seeks the Holy Grail of Search Engines 78

coondoggie writes "The scientists at DARPA say the current methods of searching the Internet for all manner of information just won't cut it in the future. Today the agency announced a program that would aim to totally revamp Internet search and 'revolutionize the discovery, organization and presentation of search results.' Specifically, the goal of DARPA's Memex program is to develop software that will enable domain-specific indexing of public web content and domain-specific search capabilities. According to the agency the technologies developed in the program will also provide the mechanisms for content discovery, information extraction, information retrieval, user collaboration, and other areas needed to address distributed aggregation, analysis, and presentation of web content."
Image

Searching the Internet For Evidence of Time Travelers Screenshot-sm 465

Hugh Pickens DOT Com writes "Here's an interesting paper by two physicists at Michigan Technological University who have come up with a practical methodology for finding time travelers through the internet. 'Time travel has captured the public imagination for much of the past century, but little has been done to actually search for time travelers. Here, three implementations of Internet searches for time travelers are described, all seeking a prescient mention of information not previously available. The first search covered prescient content placed on the Internet, highlighted by a comprehensive search for specific terms in tweets on Twitter. The second search examined prescient inquiries submitted to a search engine, highlighted by a comprehensive search for specific search terms submitted to a popular astronomy web site. The third search involved a request for a direct Internet communication, either by email or tweet, pre-dating to the time of the inquiry. Given practical verifiability concerns, only time travelers from the future were investigated. No time travelers were discovered. Although these negative results do not disprove time travel, given the great reach of the Internet, this search is perhaps the most comprehensive to date.' Stephen Hawking's similar search (video) also provided negative results."
The Internet

Ask Slashdot: What Review Sites Do You Consult For IT Equipment? 129

JackAcme writes "Searching for product reviews via Google mostly turns up sales sites masquerading as review sites. Consumer reviews on Amazon and other big retailers are suspect since so many manufacturers are paying for positive reviews. Where do Slashdotters turn for reliable, informed reviews of new hardware and software?"
AI

CMU AI Learning Common Sense By Watching the Internet 152

An anonymous reader writes with this excerpt from the Washington Post "Researchers are trying to plant a digital seed for artificial intelligence by letting a massive computer system browse millions of pictures and decide for itself what they all mean. The system at Carnegie Mellon University is called NEIL, short for Never Ending Image Learning. In mid-July, it began searching the Internet for images 24/7 and, in tiny steps, is deciding for itself how those images relate to each other. The goal is to recreate what we call common sense — the ability to learn things without being specifically taught."
IT

NSA Can't Search Its Own Email 165

cycoj writes "The NSA says that there is no central method to search its own email. When asked in a Freedom of Information Act request for emails with the National Geographic Channel over a specific time period, the agency, which has been collecting and analyzing the data of hundreds of millions of Internet users, says it can only perform person-per-person searches on its own email."
United States

QANTAS Wants To Monitor Frequent Flyers' Home Internet 163

An anonymous reader writes "Australian Airline QANTAS wants to monitor recording frequent flyers' home internet searching and surfing. QANTAS will pass the data to US marketing partner FreeCause who are not subject to Australian privacy laws. Meanwhile the Australian Attorney-General's Department has been secretly drafting new data retention laws to log Australians' web surfing. The government claims it needs these to fight crime, yet is ignoring corruption by its own public service."
Music

Slashdot Asks: SATA DVD Drives That Don't Suck for CD Ripping? 330

I recently retired my ancient AthlonMP rig for something a bit more modern, and in the upgrade got a new DVD±RW drive. Since I have the new rig and a lot more disk space, the time has come to re-rip my ~450 disc CD collection into FLAC (I trust active storage more than optical discs that may or may not last another twenty years). The optical drive I had in my old rig was one recommended by Hydrogen Audio or somewhere similar for ripping CDs, and can grab an hour long album in about five minutes. My new drive, unfortunately, takes about fifteen to do the same. With the number of discs I have to churn through and the near-instaneous encoding, it's somewhat annoying. After searching the Internet high and low for advice I came up empty handed, and so I ask Slashdot: are there any SATA DVD burners that don't suck at ripping CDs? Read on for more details if you wish.
The Internet

.xxx Registrar To Launch Pr0n Search Engine 149

angry tapir writes "The company behind the .xxx top-level domain plans to launch a search engine in an effort to drive more traffic to .xxx websites and give pornography fans a more satisfying search experience. ICM Registry, which operates the 9-month-old .xxx TLD, is scheduled to launch Search.xxx this week, said Stuart Lawley, ICM's CEO. The new search engine will give users a more streamlined searching process, help protect them from viruses and malware and help guard their privacy, he said. The search engine has cataloged 21 million webpages from .xxx sites, he said. 'It's porn, only porn, all porn,' he said. 'There's as much porn there as anyone would need, I'd imagine.'"

Slashdot Top Deals