Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Government

Submission + - Platinum Coin Seigniorage (correntewire.com)

Presto Vivace writes: "Beyond the MSM: the New Wave of Brief Blog Posts on Platinum Coin Seigniorage

About that, I can only say that PCS gives to the presidency the power to prevent an abuse of power by the Congress, namely the debt ceiling legislation itself, and also gives the President the power to avoid interest bearing debt instrument-based financing of Congressional deficit spending appropriations if he/she desires. I think both of these are very good things, especially since the key power of controlling the purse strings still remains with the Congress, and not with the President. It seems to me that any greater leverage that falls to the President as a result of using PCS is leverage that can always seized back by Congress anytime it wants to do its collective job and represent the majority of the American people. On the other hand, if it wants to continue to represent narrow and plutocratic interests seeking to block any Federal spending that doesn't directly benefit them, then PCS profits may be viewed as a check on such an abuse of power by the Congress, and a reminder to Congress that the "how are we gonna pay for it" excuse for not legislating Federal programs people desperately need won't work anymore!

"

Piracy

Submission + - Murdoch's Pirates (yahoo.com)

Presto Vivace writes: "A Murdoch page-turner

Murdoch's Pirates is an almost unbelievable and meticulously detailed account of how one of the world's biggest media groups created its own security force and what happened when an arm of that force went rogue. This is the definitive story about hacking, about the top hackers, how they differ, how they do what they do and what motivates them and how corporations either employ or attempt to thwart the brightest and the best of these technical geniuses — or pirates, depending on their chosen career path.

"

United Kingdom

Submission + - NewsCorp/NDS spy network at Cambridge University (neilchenoweth.com)

Presto Vivace writes: "One of the lesser known features of the ring of agents that former Scotland Yard Commander Ray Adams ran for NewsCorp/NDS was that he had an informant placed at Cambridge University to spy on its cryptology work.

The payroll for all these informants and the rest of NDS Operational Security in Britain came to more than £1 million for a six-month period. And that was only one part of the worldwide NDS OpSec operation. Agents or informants appeared on the NDS budget under “Consultancy”. Contacts was a highly elastic term. The largest expense was ADSR, Oliver Koemmerling’s company.

"

Security

Submission + - The many, many uses of a hacked PC (krebsonsecurity.com)

Presto Vivace writes: "Exploring the Market for Stolen Passwords

Some of the most valuable data extracted from hacked PCs is bank login information. But non-financial logins also have value, particularly for shady online shops that collect and resell this information. Logins for everything from Amazon.com to Walmart.com often are resold — either in bulk, or separately by retailer name — on underground crime forums. A miscreant who operates a Citadel botnet of respectable size (a few thousand bots, e.g.) can expect to quickly accumulate huge volumes of “logs,” records of user credentials and browsing history from victim PCs. Without even looking that hard, I found several individuals on Underweb forums selling bulk access to their botnet logs; for example, one Andromeda bot user was selling access to 6 gigabytes of bot logs for a flat rate of $150.

"

Piracy

Submission + - Mudoch's Pirates (smh.com.au)

Presto Vivace writes: "Richard Thwiates review's Neil Chenoweth's Murdoch's Pirates:

But as Chenoweth writes, NDS also ran intelligence operations against pirate card makers and against New Corporation's competitors. They infiltrated the internet chatrooms where hackers would boast about their achievements, developed contacts and recruited agents. They employed former police detectives and intelligence operatives for many nationalities, including a former head of Scotland Yard's criminal intelligence bureau. These agents used their contacts with state agencies, bugged phones, burgled homes, set traps and employed every device familiar to readers of crime fiction — with apparent disdain for the law. As in the high times of maritime piracy, one man's pirate would be another man's privateer.

As Thwaites points out., "the story raises serious questions over the ability of national governments to provide a business environment in which rule of law can be taken seriously.""

Earth

Submission + - Drone photos polluters punished (suasnews.com)

garymortimer writes: "In January 2012 we were sent the images that exposed the level of pollution occurring. They were taken by an sUAS News reader that still wishes to remain anonymous. The story went viral and continues to receive hits nearly a year later. I believe this is the first environmental crime to be prosecuted on the basis of UA evidence. Authorities had to act because of the attention the story was receiving."
Government

Submission + - NSA targeting domestic computer systems (cnet.com)

Presto Vivace writes: "The National Security Agency's Perfect Citizen program hunts for vulnerabilities in "large-scale" utilities, including power grid and gas pipeline controllers, new documents from EPIC show.

The NSA's so-called Perfect Citizen program conducts "vulnerability exploration and research" against the computerized controllers that control "large-scale" utilities including power grids and natural gas pipelines, the documents show. The program is scheduled to continue through at least September 2014.

Perfect Citizen? Who thinks up these names?"

Education

Submission + - How Much Are You Worth To An Online Lead-Gen Site? (itworld.com)

jfruh writes: "You may remember the tale of the blogger who found that an infographic he'd put on his site was the front end of an SEO spam job. Well, he's since followed the money to figure out just who's behind this maneuver: the for-profit college industry. He discovered that the contact info of someone who expresses interest in online degree programs can be worth up to $250 to an industry with a particularly sleazy reputation."
Open Source

Submission + - Open-source hardware hacker Ladyada awarded Entrepreneur of the Year (entrepreneur.com)

ptorrone writes: "Limor "Ladyada" Fried of open-source hardware company Adafruit Industries was awarded Entrepreneur of the Year by Entrepreneur Magazine. From the article — "Recognizable by her signature vivid-pink locks, Fried (or Ladyada, as she is known on the internet) is one of the dominant forces behind the maker movement--a legion of do-it-yourself-minded folks who create cool things by tweaking everyday technology. Last year New York City-based Adafruit did a booming $10 million trade in sales of DIY open-source electronic hardware kits"."

Slashdot Top Deals

This file will self-destruct in five minutes.

Working...