Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Tactical Communication: A Research Project Survey

ghostcorps writes: "Hi Guys,

I am currently researching tactical communications for use in information security and require some data to determine the current general-knowledge of this art.

I know this may seem like I am asking the community to do my homework, but I am just as sure anyone who has had to do a research project knows how important surveys are. It would be impossible to do without asking the opinions of others.

Besides which is it a great topic to discuss in a forum like this.

For the purposes of this project I have defined Tactical Communication as the applications of specialized language techniques to provide secure communication over an open channel. For example word substitutions: eg. 'The eagle has landed'.

The basic hypothesis is this :
Corporate environments often involve verbal communication over open channels; this is fraught with information leakage vectors. This danger may be significantly reduced by identifying and obfuscating the key data with tactical communication methods.

I have created a very short survey and would be very grateful if some of you could please take 5 minutes to respond. Click HERE to complete it or else if you do not trust links (I don't blame you) please post the answers below:

1) Please select the field below which best describes you.
  • IT Support or Systems Operation
  • Corporate-Project Member
  • Technology enthusiast
  • IT Guru
  • Other/non-IT

2) What is Tactical Communication?
Given the definition above, please briefly describe your understanding.

3) Experience
Please outline any experiences you have had, in a professional context, where someone has tried to obtain secure information from you: such as a con man or social engineer. If you have not been exposed to such an attack, please leave this field blank.

3) Opinion of Tactical Communication
Given the understanding you have of tactical communication, please outline your opinion or perception as to its potential effectiveness. If you would like to help further

4) If you are interested in a more in depth interview please advise me of your email address below. I am especially looking to speak with accomplished social engineers.

Regards and thankyou again"

Comment Re:I did a CTRL+F (Score 5, Insightful) 401

Yes! That is exactly what it means. Australians have very few 'rights'. The free speech thing.. forget it.

There is a big issue with blogs, because, by Australian Law any presentation that may encourage dissent is illegal (remember: we were originally a penal colony). So the very nature of blogs.. ie opinionated ranting, ensures that they can be shut off without notice if anyone says they were offended. Indeed we have already seen this with wikipedia, wikileaks, yahoo and google group pages. Essentially, any ideas that have not been vetted by the govt is open to any misinterperetation and repurcusions..

Behold ... the future


Submission + - Australian Govt wants mandatory net censorship (

ghostcorps writes: Say hello to our shiny new Government. The more things change the more they stay the same."

"To be censored by the Australian Government is "pornography and inappropriate material." X rated pornography is illegal online in Australia, as are casino style internet gambling, certain forms of "hate" speech and R rated computer games.

As recently as the week prior to the election, Labor Party candidates were telling those concerned about the proposed law that the censorship wouldn't be compulsory, and that the "clean feed" would be opt-in, not opt-out. Today's announcement by Telecommunications Minister Stephen Conroy states that the censorship regime will be mandatory, although people will be able to opt-out of it. The problem of course then becomes if you opt-out questions will be asked as to why you want out, which in itself may lead to Government monitoring.


Submission + - Are Cow farts sweeter with a Kangaroos stomach? (

ghostcorps writes: The Australian has an article discussing plans to modify cows stomachs to produce less/no methane."

From the article: "Thanks to special bacteria in their stomachs, kangaroo flatulence contains no methane and scientists want to transfer that bacteria to cattle and sheep who emit large quantities of the harmful gas.

''Not only would they not produce the methane, they would actually get something like 10 to 15 per cent more energy out of the feed they are eating,'' said Mr Klieve.


Submission + - YouTube filtering is on-line (

ghostcorps writes: The Age Reports:
"Online video leader YouTube rolled out long-awaited technology to automatically remove copyrighted clips, hoping to placate movie and television studios fed up with the website's persistent piracy problems. It's still too early to tell how YouTube's new filtering system will affect the seven-month-old Viacom suit, said Mike Fricklas, Viacom's general counsel. "We are delighted that Google appears to be stepping up to its responsibility and end the practice of infringement," he said. YouTube said it has been encouraged by early tests of its filtering system with nine content providers. Only two of the test participants, Walt Disney Co and Time Warner Inc, were willing to be identified."


Submission + - Does IT-Sec 'need' to employ Hackers?

ghostcorps writes: .

I am writting an assignment for Uni, and have chosen the topic:

"To win the fight against e-crime, partnerships are not only needed between law enforcement and the private sector, but also with Hackers."

Obviously (IMO) the answer is the question. But, can anyone detail some specific 'employ a hacker' policies that worked or that did not work? Preferably in spectacular fashion.

If there are any employers of 'White-hats' reading this, could you please give a quick explanation of why the decision was made to employ a 'Hacker' and what, if any, precautions were taken to sooth the concerns of the 'powers that be'.

How well do the IT-sec professionals and the Hackers work together? Do their skills compliment or clash?

Opinions and anecdotes are appreciated and expected.

Slashdot Top Deals

Nothing makes a person more productive than the last minute.