Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Use (some) of Israel's methods (Score 1) 349

I recall that Israeli airport security is highly effective in one of the most dangerous of locations. Implementing this would be difficult, but the only time I'm ever interviewed is when I'm getting OFF the plane by customs agents. Seems like it would be easier to spot someone sweating instead of relying on a beeper or buzzer to tell you something's amiss..

From an article here: http://www.cleveland.com/world...

the Israeli model worked because Israeli agents “try to detect behavior or people’s patterns” by asking them questions.

Israeli officials say that any passenger trying to board El Al is subject to questions from security agents.

“Everybody gets asked, who you are, where are you traveling to,” one Israeli official said, speaking on grounds of anonymity because he did not want to speak publicly about the security measures. The agents asking the questions, he said, “are very well trained. Depending on what you say, they will put you through an additional screening.” Baker said: “Israeli agents focus on the traveler’s country of origin, their profession, visas that are stamped in their passports, places they have visited, people they know and the color of their skin. If you say you’re a Renaissance art scholar, they’ll ask you if you know who Titian is.” Mica maintained that the Israeli system was not profiling. “Someone is trained to do it with people who warrant further scrutiny,” he said. Some travelers say they would rather go through a full body scan than the system at Ben-Gurion airport. “My experience leaving Tel Aviv was by far and away the most unpleasant encounter I’ve ever had with airport security officials in the decade,” said Matthew Yglesias, a blogger with the Center for American Progress who said it took three hours last month for him to get from the initial security check at Ben-Gurion to the food court. “As best I could tell, things went pretty smoothly as long as you were Israeli, traveling with an Israeli or traveling with some kind of well-established tour group.” Yglesias was traveling with a group of journalists. “The African-American woman in our group was taken off to be questioned. A bunch of us were told we couldn’t bring iPads on the plane,” he said. He said that the Jewish member of his group “had the easiest time; the black woman had the hardest time.”

Submission + - Multiverse theory gains ground with predictable data (www.evz.ro)

planckscale writes: Information about the beginning can never be lost and some researchers calculate how the information contains a tiny amount of data about other universes and entanglement with those universes. The cold spot of the CMBR indicates there is a source that messes up the homogeneous nature of the universe and the prediction that the suppression of the CMBR in the southern hemisphere is indeed not homogeneous. The possibility that ours is one of many universes has gotten more backing based on predictable data and that is in my opinion fascinating. Link attached is translated by chrome pretty well. A long video about the findings can be found here: http://iai.tv/video/how-to-find-a-multiverse

Comment What would be the test? (Score 1) 404

So ok yeah protecting the U.S. from terrorist attacks by foreigners. I get it. Protecting U.S. citizens from internal threats such as bombings etc, I get it. But what does it take to be "disappeared" by the U.S. government (which was typical of the old Fascist governments) these days? Yeah everyday we're breaking some law some how, but we're being not thrown into jail or a camp because of minor infractions or voicing our opinions. Again, what does it take to be disappeared? Reveal top secret information such as identities of CIA agents -check - (didn't someone like Rove almost do time for this?) Reveal top secret communications between foreign states and diplomats? - check - that Manning guy's life is in ruins. Threaten and plot against the safety of government officials and the innocent public? Check - they took down some domestic cells recently. So pretty typically these types of actions protect the country (which I love don't get me wrong) and the public from real harm.

As defined, Fascist ideology consistently invoked leaders such as Benito Mussolini in Italy and Adolf Hitler in Germany as embodiments of the state and claimed indisputable power. So I suppose that in a sense what the NSA and CIA have become are Fascist governmental agencies in that they are the ones with indisputable power provided by the U.S. government. Not fascist in the sense of ethnic cleansing (some groups would dispute this notion as to the amount of their kind being imprisoned in massive jails) or monetary control, but in sheer power to do what it wants as long as it wants. And by the government absolving large corporations of wrongdoing by allowing surveillance of their systems, so that they can maintain their control shows something is twisted there.

So it wouldn't it seem the real test to determine if the government, NSA, CIA, or branches or wings or whatever are fascist (indisputable power) would be to organize the people and shut down these agencies through peaceful means (voting)? I mean it would seem that the only true test to see if these entities are the ultimate authority would be to shut them down via the people's will - of, by, and for... - right? I mean a complete cut-off of funding and turning-off-the-power type closure.

I'm not sure people are motivated or concerned enough. But if that test did take place, what would a failure look like? Mass jailing of citizens that support shutting down these entities? Massive economic punishment for supporters? Removal of the bills from the ballot? Bills not making it through congress? The Senate? At what point do we draw the distinction between what the government has become what we believe is good for us and what is right? Would we only know if we have a true democracy and true freedom from an oppressive government if the people actually did cut off, shutter, and board up one of these behemoths? I'm mean I'd like to take the Legislative, Executive, and Judicial branch's word for it that they're keeping the military and intelligence industrial complex in check. But reports like those from Tim Clemente and other intelligence leakers (who obviously have concern for what's taking place) are driving a lot more people towards action. Maybe this is a natural progression for which the human psyche does not enjoy the looming paranoia of a big brother or the secret indisputable powers that watch us all. We should all be grateful for those who are looking out for us and our children. But I thought I'd at least ask the question. What would be the test?

Comment Aren't the free tools already available? (Score 1) 56

As far as identifying and responding to intrusions, it seems everything is already there, just needs to be implemented with agents that can monitor controllers, which I'm sure has already been coded anyway. Mashups of current security tools like SecurityOnion http://securityonion.blogspot.com/ would be a good starting point methinks.

Comment they own the switch why are they asking (Score 1) 80

They probably own one of the hops along the way, so just divert the traffic. Re-route all traffic through the mitm site and log everything, sue everyone. Give RIAA the 2 million+ hits every day and let them go to town. Sue everyone, make it all public and give them everything they're asking for. Then give all that money from the suits back to the artists, they will be so grateful. Throw a million of people in jail and bankrupt all the pirates. IP address = person/family. Sue the fuck out of each and every one that uses that IP and if they can't afford the fines throw them in jail. The end goals of RIAA + MPAA will make everything better again and the world will be just and fair. Order will be restored.

Comment Re:And after that day (Score 3, Informative) 118

The Soviet scientist community offered him a home near Russian research facilities too. Bohr was the kind of guy that would walk up to the white house, knock on the door and ask to come in to talk to president about sharing atomic bomb information with the Soviets. Also, he would visit New Mexico and do the same to convince Oppenheimer the sharing of scientific advances in nuclear fission with the Soviets. Bohr was one of the only forward-thinking scientists at that time on the ramifications of developing the bomb and felt that by sharing the information there would be less suspicions by Soviet scientists thus quashing an arms race. He probably lit a fire under Oppenheimer to begin thinking seriously about ways to prevent Nuclear annihilation and proliferation. If anyone's interested more in this stuff I recommend reading American Prometheus which is an Oppenheimer BIO.

Comment What's the point.. (Score 1) 508

...if a driver needs to be behind the wheel? I mean yeah it's great and all you don't need to put your hands and feet anywhere but if you're supposed to be alert watching that the car doesn't make a mistake then what's the difference? You still can't text, read the paper, play cards, eat dinner, whatever - or can you?

Comment exploit yes, virus no (Score 5, Informative) 134

This exploit has been targeting chem and defense companies. The thing about these exploits is that they typically are just a method to drop the actual payload which is usually a virus or trojan. In this case it looks like the payload is Poison Ivy, which was added to NOD32 AV defs back in 2008. Yes, the attacker could compromise the machine and get admin shell, but the majority of the time they’re installing a keylogger or other virus which NOD32 will catch.

From TFA:

First, a file named “exploit.html” appears to be the entry point of the attack, which loads “Moh2010.swf”, an encrypted Flash file that it decompress in memory.

According to AlienVault's Jaime Blasco, the payload dropped is Poison Ivy, as was the case with the previous Java zero-day. Poison Ivy is a remote administration tool (RAT) that was used the Nitro attacks that targeted chemical and defense companies. Interestingly, after exploitation, the attack loads “Protect.html”, a file that checks to see if the Web site is listed in the Flash Storage settings, and if it is, the Web browser will no longer be exploited despite additional visits to the malicious site.

Slashdot Top Deals

You can tell the ideals of a nation by its advertisements. -- Norman Douglas