Forgot your password?
typodupeerror
Censorship

Submission + - House Judiciary Committee SOPA Hearings Stacked 5 (techdirt.com)

Adrian Lopez writes: "Techdirt reports that 'apparently, the folks behind SOPA are really scared to hear from the opposition. We all expected that the Judiciary Committee hearings wouldn't be a fair fight. In Congress, they rarely are fair fights. But most people expected the typical "three in favor, one against" weighted hearings. That's already childish, but it seems that the Judiciary Committee has decided to take the ridiculousness to new heights. We'd already mentioned last week that the Committee had rejected the request of NetCoalition to take part in the hearings. At the time, we'd heard that the hearings were going to be stacked four-to-one in favor of SOPA. However, the latest report coming out of the Committee is that they're so afraid to actually hear about the real opposition that they've lined up five pro-SOPA speakers and only one "against."'

Demand Progress is running an online petition against such lopsided representation."

Google

Submission + - Schmidt: G+ "identity service", not social network (google.com)

David Gerard writes: "Eric Schmidt has revealed that Google+ is an identity service, and the "social network" bit is just bait. Schmidt says "G+ is completely optional," not mentioning that Google has admitted that deleting a G+ account will seriously downgrade your other Google services. As others have noted, Somewhere, there are two kids in a garage building a company whose motto will be "Don't be Google"."
Cloud

Submission + - Get Cybermercenaries Suggests Ex NSA, CIA Director (itproportal.com)

siliconbits writes: One of the architects of US foreign policy under George W. Bush, General Michael Hayden, suggested that the US Government should consider creating a "Digital Blackwater" during an open conversation with Bloomberg's Allan Holmes and several other cybersecurity specialists on stage, during an event called the Aspen Security Forum. Blackwater refers to the US private military group founded in 1997 and which has been renamed as Xe Services LLC, a move possibly linked with a number of high controversies that arose after the company expanded its security-related operations into Iraq and Afghanistan.
Recruiting mercenaries, Hayden suggested “might be one of those big new ideas in terms of how we have to conduct ourselves in this new cyber domain,” referring to cyber warfare.

Security

Submission + - Hackers' Flying Drone Now Eavesdrops On GSM Phones (forbes.com)

Sparrowvsrevolution writes: At the Black Hat and Defcon security conferences in Las Vegas next week, Mike Tassey and Richard Perkins plan to show the crowd of hackers a year’s worth of progress on their Wireless Aerial Surveillace Platform, or WASP, the second year Tassey and Perkins have displayed the 14-pound, six-foot long, six-foot wingspan unmanned aerial vehicle. The WASP, built from a retired Army target drone converted from a gasoline engine to electric batteries, is equipped with an HD camera, a cigarette-pack sized on-board Linux computer packed with network-hacking tools including the BackTrack testing toolset and a custom-built 340 million word dictionary for brute-force guessing of passwords, and eleven antennae.

On top of cracking wifi networks, the upgraded WASP now also performs a new trick: impersonating the GSM cell phone towers used by AT&T and T-Mobile to trick phones into connecting to the plane’s antenna rather than their carrier, allowing the drone to record conversations and text messages on a 32 gigs of storage.

The Internet

Submission + - Syria Drops Off The Internet As Turmoil Spikes (computerworld.com)

CWmike writes: In what appears to be the latest bid by a government to throttle access to news and information amid growing civil unrest, the Syrian government Friday shut down all Internet services. Internet monitoring firm Renesys reported that starting around 7 a.m. EDT today, close to two-thirds of all Syrian networks were suddenly unreachable from the global Internet. In just 30 minutes, routes to 40 of 59 Syrian networks were withdrawn from the global routing table, Reneys' chief technology officer James Cowie said in a blog post. The shutdown has affected all of SyriaTel's 3G mobile data networks as well as several of the country's ISPs' such as Sawa, INET and Runnet. Also down are the Damascus city government page and the customs web site. The only networks that appear to be somewhat reachable are a handful of government-owned networks such as one belonging to Syria's Oil Ministry, Cowie noted. 'We don't know yet how the outage was coordinated, or what specific regions or cities may be affected more than others,' Cowie wrote. 'If Egypt and Libya are any guide, one might conclude that events on the street in Syria are reaching a tipping point.'

Comment Re:I swear.... (Score 1) 756

You are the ultimate communist (socialist, fascist...it's all the same).

Just read history, and you'll see why what you just said is problematic.

Watch them take away the liberties of those you disagree with. When the time comes that they take away your liberties, there'll be no one left to defend you.

Go to a country that does what you just said. There's plenty of them. Let me know how that works out for you.

Comment Re:Can someone explain to me .. (Score 0, Troll) 473

In practice, the Tea Partiers will oppose it on tax grounds, and hope nobody notices that it's precisely what the Christian Right wants.

Oh dear.. well, we couldnt have THAT, could we? we couldnt vote for ANYTHING that "the Christian Right" wants, now could we?

I hear that those right wing nutjobs are against rape. The NERVE of those people! We clearly have to fight against Christian Morality Bigots, and legalize that sort of thing.

What? they're against theft too???

DONT DENY ME MY RIGHT TO "pursue happiness" by by personal choice of acquisition style, you bible bashing nutjobs!

Comment Re:Damn them! (Score 1) 332

No, the problem is that you're asked (by a live human being) to participate in research to learn Thing A, in this case, why your tribe has a high incidence of a debilitating disease, and given a form which says they're allowed to use whatever you give them to research thing A, things B-Z, other things AA-zqf, and any other research purpose.

Been there, done that, with cord blood donation. Am I willing to donate cord blood which will otherwise just be thrown away but might help someone? Of course. Give me the consent form. No lie, the last line of the long form explaining what they were going to do with it was "or any other research purpose." In other words, the whole form should have read "Can we have your umbilical cord blood to do anything we want with?" Well, no, you can't. I didn't sign.

Sadly, this kind of crap will NEVER stop unless people start objecting to it, and objection takes the form of no. This isn't hard. Draft a narrowly focused consent form that lets you do your research, not any random research you or anyone else thinks up later, AND respects the rights of your subjects. Don't ask them to sign a blank biological check.

Comment Re:From the article (Score 2, Interesting) 204

And I suppose that's really the distinction. If you asked people, "does the copier right now have a copy of that page you just copied?" that might not be surprised by that, but "does the copier right now have a copy of that page you copied last year?" they would be, and the difference comes down to how much storage and whether or not you have persistent storage.

Comment Re:No one will bother (Score 1) 204

Your statement is an example of "security through obscurity" or "hiding in plain sight". That model of security was already disproved long ago. And, by "long ago", I'm referring to thousands of years, not weeks. It not only predates the invention of the photocopier, it predates the invention of paper. It probably even predates the concept of walking upright.

Hiding important things in an ocean of unimportant things means that someone can still get at the important things if they try hard enough, or are aware enough to look. The chances of discovery are directly proportional to the amount of knowledge the attacker has about how the data is hidden and roughly inversely proportional to the amount of "chaff" data you put out there to hide the "wheat".

And with the "try hard enough" being "extract the contents of the drive and show me thumbnails of everything on it", or even "extract the contents and OCR the whole lot and search for words like CONFIDENTIAL, SSN, and PAY TO THE ORDER OF" (all of which would be a couple of minutes' work for a 12-year-old child these days), you're not going to be able to obscure things all that well.

What is data worth these days? If you could buy, say, 10 of these $300 printers, you're out $3,000. If each one yields 100 pages for a total yield of 1000 pages, you're paying $3 a page. 99% of the images are likely going to be company picnic memos. Until you get the 10 pages that contain the company payroll data, or something someone will pay good money for. And if it doesn't work out, you rebuild the photocopier and resell it, or even rent it to a company you know has lots of juicy data going through and make sure the sale includes a routine maintenance agreement so you can swap drives out every few weeks.

Of course, if you know where your used photocopiers are coming from, they could yield a much higher return. Did your local hospital just make a big deal of donating photocopiers to a local charity? Go in to the charity with a nicer model of photocopier and offer to swap them out. With a little creative thinking, you could get photocopiers that are more likely to have good salable information in them.

This isn't the biggest security hole ever, it's not even the biggest security hole this month, but it is pretty scary.

Comment Re:Problem when being sued? (Score 1) 205

Same thing applies to meetings actually. If you're doing things properly the meeting will have an agenda and will be minuted; these things should be filled away somewhere and can certainly be subpoenaed.

It all comes down to the process you're following and your record-keeping practices, but in general anything important that's decided should be recorded somewhere to guard against people forgetting or disagreeing.

Slashdot Top Deals

Machines have less problems. I'd like to be a machine. -- Andy Warhol

Working...