Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - From NIST: Public Draft - Cybersecurity Framework Manufacturing Profile

Presto Vivace writes: From the NIST email:

A draft manufacturing implementation of the Cybersecurity Framework, or Profile, has been developed by the National Institute of Standards and Technology (NIST) to establish a roadmap for reducing cybersecurity risk for manufacturers. The Profile focuses on how cybersecurity can support typical manufacturing business objectives and is aligned with industry best practices, including NIST Special Publication 800-82 Guide to Industrial Control System Security . The Manufacturing Profile can be used by organizations to express desired state, as well as assess current state. It provides a voluntary, risk-based approach for managing cybersecurity activities and reducing cyber risk to manufacturing systems. The Manufacturing Profile is meant to enhance but not replace current cybersecurity standards and industry guidelines used by manufacturers.

Cybersecurity Framework Manufacturing Profile (PDF)

Please send you questions and comments, including reviews of the Manufacturing Profile, to NIST at .

Public comment period: September 7 through November 4, 2016

Submission + - Weapons of Math destruction

Presto Vivace writes: Welcome to the Black Box

So much of the discussion about the potential harms of surveillance and data collection are unfocused, and often when you’re in one of those conversations you end up with nothing more than a vague notion that that someday, maybe, bad things will happen. But destructive algorithms — “weapons of math destruction” — already exist and are already harming us. ... I designate “weapon of math destruction” as algorithms with three primary characteristics — they’re widespread, mysterious, and destructive. Widespread because I only care about algorithms that affect a lot of people and have important consequences for those people. So if the algorithm decides whether someone gets a job, or goes to jail for longer, or gets a loan, or votes, then it’s a big deal. ... I call WMDs mysterious because the algorithms I worry about are secret. They come from hidden formulas owned by private companies and organizations and are guarded as valuable “secret sauce.” That means the people targeted by their scoring systems are unaware of how their scores are computed, and they’re often even unaware that they are being scored in the first place.

Submission + - Canadians: you have until Oct 7 to weigh in on using voting machines

Presto Vivace writes: Canadians: you have until Oct 7 to weigh in on using voting machines in national elections

"Canadians have until October 7, 2016 to provide their feedback to the Parliamentary Special Committee on Electoral Reform, which is studying the possibility of national online voting, along with having consultations about using electronic voting machines in national elections."

Please Canada, don't be stupid like the US.

Submission + - Navy commits to OASIS for services

Presto Vivace writes: Federal Computer Week

According to the memorandum of understanding, the Navy is expected to obligate more than $500 million to the OASIS and OASIS Small Business contracts from February 2016 to December 2017. Navy officials said they will use the contracts for services related to program management, management consulting, logistics, engineering, and scientific and financial activities.

Submission + - Google's War on Trolls Could Help Save the Internet (

Lauren Weinstein writes: It has long seemed clear to me that appropriately dealing with the rising tide of trolls and other social media posting abuses would inevitably require an intensifying partnership between automated detection systems and human insights, each bringing different strengths and limitations to the table.

This is why I wholeheartedly support the ongoing efforts of Google (or more precisely, the "Jigsaw" division of Google's parent Alphabet, Inc.) to leverage Google's sophisticated and powerful artificial intelligence assets to help deal with the growing trolling and hate speech scourge.

Submission + - Surveillance Capabilities of Future Employee ID Badges

Presto Vivace writes: Bosses can take biometrics of employees with an ID badge that monitors motion and listens.

In the Washington Post, Jeff Heath tells the story of Humanyze, an employee analytics company that took technology developed at MIT and spun it into identification badges meant to hang off employees' necks via a lanyard. The badge has two microphones that do real-time voice analysis, with sensors that follow where you are and motion detectors that record how much you move while working.

A report in Bloomberg reveals the origins of the company. In 2014, 57 stock and bond traders "lent their bodies to science" by allowing MIT finance professor Andrew Lo to monitor their actions in a conference room. The study subjects were given a $3 million risk limit and told to make money in various markets. Lo discovered that the successful subjects were "emotional athletes. Their bodies swiftly respond to stressful situations and relax when calm returns, leaving them primed for the next challenge." Traders who encountered problems "were hounded by their mistakes and remained emotionally charged, as measured by their heart rate and other markers such as cortisol levels, even after the volatility subsided."

Submission + - How to Take Down the Internet

Presto Vivace writes: Someone Is Learning How to Take Down the Internet

Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down. We don't know who is doing this, but it feels like a large a large nation state.

Submission + - WikiLeaks drops latest Guccifer 2.0 data on Hillary Clinton, DNC, Democrats (

SonicSpike writes: WikiLeaks has published what purports to contain "new" Democratic Party documents hacked by the Guccifer 2.0 hacker.

The organisation posted a tweet at around 9am on Wednesday Sydney time, with links that promised access to 678.4 megabytes of new "DNC documents".

Initial images of what appeared to be presentation slides show information about databases used for voter identification and turnout efforts.

Other slides discuss the outcome of past get-out-the-vote campaigns.

Democratic presidential candidate Hillary Clinton was US secretary of state when WikiLeaks released hundreds of thousands of State Department emails in 2010.

The latest document dump comes after an earlier tranche of emails, reportedly hacked by Guccifer 2.0, prompted the resignation of politicians within the Democratic Party on the eve of the party's convention.

Submission + - Police forces are stockpiling massive databases with personal information

Presto Vivace writes: The Post and Courier

A person can end up in one of these databases by doing nothing more than sitting on a public park bench or chatting with an officer on the street. Once there, these records can linger forever and be used by police agencies to track movements, habits, acquaintances and associations – even a person’s marital and job status, The Post and Courier found in an investigation of police practices around the nation. ... What began as a method for linking suspicious behavior to crime has morphed into a practice that threatens to turn local police departments into miniature versions of the National Security Agency. In the process, critics contend, police risk trampling constitutional rights, tarnishing innocent people and further eroding public trust.

Submission + - State-by-State ISDS Liability

Presto Vivace writes: ISDS: Expanding Corporate Power to Attack Laws in Every State

The United States has largely avoided ISDS attacks because past treaties were with nations that did not have many investors here. But the TPP and a similar deal with European nations, called the Transatlantic Trade and Investment Partnership (TTIP), would change that. Under existing U.S. treaties, other countries have paid nearly $3 billion to corporations for toxics bans, water and timber policies, land-use rules regulatory permits, and more. Another $70 billion in claims are now pending against climate and energy laws, medicine pricing policies, pollution cleanup orders and other public interest policies. ... Nationwide, the TPP would roughly double U.S. exposure to ISDS attacks and a TTIP would quadruple the exposure, spelling an unprecedented increase in U.S. ISDS liability.

Submission + - When your boss is an algorithm

Presto Vivace writes: In the gig economy, companies such as Uber and Deliveroo manage workers via their phones. But is this liberating or exploitative?

UberEats launched in London in June, promising “the food you want, from the London restaurants you love, delivered at Uber speed”. In a bid to recruit self-employed couriers to ferry food from restaurants to customers, UberEats initially offered to pay £20 an hour. But as customer demand increased, the company began to reduce pay. By August, the couriers were on a piece rate with a fiddly formula: £3.30 a delivery plus £1 a mile, minus a 25 per cent “Uber service fee”, plus a £5 “trip reward”. Then, one day, the couriers woke up to find the app had been updated again. The “trip reward” had been cut to £4 for weekday lunch and weekend dinner times, and to £3 for weekday dinner and weekend lunch times. Outside those periods, it had been cut altogether.

Slashdot Top Deals

After the last of 16 mounting screws has been removed from an access cover, it will be discovered that the wrong access cover has been removed.