"He had to decrypt and decode, and do all of these things I don't even understand," Assistant US Attorney Glenn Moramarco argued. Here, on a Wednesday morning in Philadelphia, before a packed courtroom, the federal prosecution argued that a hacker should spend three and a half years in prison for committing a crime it couldn't fully comprehend.
Previously, Orin Kerr, a law professor at George Washington University and weev's defense attorney, had argued first and foremost that there was no criminal hacking to speak of. According to Kerr, what weev and Daniel Spitler (who pleaded guilty to avoid jail time) had done while working as an outfit called Goatse Security was entirely legal, even though it embarrassed public officials and some of the country's biggest corporations.
"We figure out what we want and we get that specifically, that's why it's targeted collection rather than bulk collection," Robert Litt, general counsel at the Office of the Director of National Intelligence, told the hearing.
Under authority of the Foreign Intelligence Surveillance Act, the NSA asks Internet service providers to hand over messages sent from or received by certain accounts such as "email@example.com, the Justice Department's Brad Wiegmann said, using a hypothetical example.
"Are you a truck driver or shift worker planning to catch up on some sleep this weekend? Cramming in extra hours of shut-eye may not make up for those lost pulling all-nighters, new research indicates. The damage may already be done — brain damage, that is, said neuroscientist Sigrid Veasey from the University of Pennsylvania.
The widely held idea that you can pay back a sizeable "sleep debt" with long naps later on seems to be a myth, she said in a study published this week in the Journal of Neuroscience.
Long-term sleep deprivation saps the brain of power even after days of recovery sleep, Veasey said. And that could be a sign of lasting brain injury.
Cloak uses public location data from other social networks, Foursquare and Instagram, to determine the locations of others you know. Users can choose to receive an alert when certain people are believed to be nearby. It is the latest in the recent trend of "anti-social", or secretive, apps.
The album, named Sleepify, has 10 tracks just over 30 seconds long — the required amount of listening time in which a song has to be streamed in order for it to have been registered as listened to by Spotify.
This means if someone was to leave it playing for around seven hours while they slept, they would earn Vulfpeck around $5.39. The band said the money earned from the album will go towards a tour in which each show has free admission.
This Spring, coding will be brought to the global spotlight in a context we might not be used to. The creative technology company Reaktor, together with the mobile game developer Supercell, will host the first ever Coding World Championships: Hello World Open 2014. About 10 000 teams of top coders are expected to compete.
The challenge of each team is to create an artificial intelligence — also known as a bot — to take part in a digital car racing game.
"Without the Domain Name System (DNS), we're all lost on the Internet. DNS provides the service that translates our human readable Web addresses such as google.com to their real, but mysterious Internet Protocol version 4 (IPv4) addresses, such as 126.96.36.199 or IPv6's 2001:4860:4860::8888. The problem with this master yellow pages directory to the Internet is that DNS records themselves can be corrupted or your communications with the DNS servers interrupted by a man-in-the-middle (MiM) attack. "
While it's only 22 minutes, and apparently only affected internet users in Brazil and Venezuela, the repercussions of DNS hijacking could be huge for online commerce. Since many of these attacks in the past have originated in Eastern Europe, should we all be on guard now that Russia has been sabre-rattling? How likely is this to occur in California-based Google servers? For reaction on Twitter, visit here https://twitter.com/bgpmon/sta...
Problem is, ISPs don't seem to care about that, or securing DNS which is another attack vector that doesn't require compromising endusers' systems.
Why isn't more done to secure routing and DNS then?
"He could go from being totally fine to turning blue sometimes — not even kidding — in 30 seconds," says Garrett's mother, Natalie Peterson, 25, of Layton, Utah. "It was so fast. It was really scary."
Garrett was born with a defective windpipe. His condition, known as left his trachea so weak the littlest thing makes it collapse, cutting off his ability to breathe.
When he got upset, or even sometimes just with a diaper change, he would turn completely blue," his mother says, "and that was terrifying."
So the Petersons contacted at the University of Michigan, who specializes in conditions like Garrett's. He teamed up with , a biomedical engineer who runs the university's , to create a remarkable solution to Garrett's problem — a device that will hold open Garrett's windpipe until it's strong enough to work on its own.
Instead of shooting ink onto a flat page to print words or pictures, 3-D printers use other material, such as plastic or metal, to create three-dimensional objects.
"You build up layers until you have the complete 3-D structure," Hollister says.
Read More At Source