×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Google Handed To FBI 3 Wikileaks Staffers' Emails, Digital Data

timothy posted 5 hours ago | from the why-there-oughtta-be-a-constitution dept.

Google 80

Ariastis writes Google took almost three years to disclose to the open information group WikiLeaks that it had handed over emails and other digital data belonging to three of its staffers to the FBI under a secret search warrant issued by a federal judge. WikiLeaks were told last month of warrants which were served in March 2012. The subjects of the warrants were the investigations editor of WikiLeaks, the British citizen Sarah Harrison; the spokesperson for the organisation, Kristinn Hrafnsson; and Joseph Farrell, one of its senior editors. When it notified the WikiLeaks employees last month, Google said it had been unable to say anything about the warrants earlier as a gag order had been imposed.

Anonymous Asks Activists To Fight Pedophiles In 'Operation Deatheaters'

timothy posted 8 hours ago | from the or-have-you-stopped-beating-her? dept.

Crime 207

HughPickens.com writes The Independent reports that hacktivist group Anonymous, in a project named Operation DeathEaters, is calling for help in its fight against international pedophile networks, or what it calls the "paedosadist industry" and has issued a video instructing activists on how they can aid in the operation. The Anonymous project is intended to break what it says is a conspiracy of silence among sympathetic politicians, police and mainstream media to downplay the full extent of the online child sex industry. "The premise behind OpDeathEaters is to expose high level complicity, obstruction of justice and cover-up in the paedo-sadist industry in order to show the need for independent inquiries," says Heather Marsh, an online activist who is helping to co-ordinate the operation and describes herself as an "old friend" of Anonymous. The Anonymous database, which will be hosted on the GitHub online repository, promises to collate cases from all around the world, cross-referencing connections within sub-groups including the police, armed forces, schoolteachers, politicians, media, academics and religious organisations. The database's ultimate purpose has yet to be fully determined, but in the first instance the group says it wants to shut down the child-sex industry by "dismantling the power structure which held it there" and by "educating to create a cultural change".

The group is calling on volunteers to help with the ongoing work, which has been divided into three steps. The first is about collecting "all the factual information," second is to "share that information as widely as possible," and the third step is "to set up an independent, internationally linked, inquiry into all the areas which do not appear to have been investigated properly." Activists point to the muted media coverage given to a recent case in Washington DC in which Michael Centanni, a senior Republican fundraiser, was charged with child sex offences after investigators traced transmissions of child pornography to his computers in his basement. The case was not covered by The Washington Post or the New York Times, and was only picked up by a local NBC affiliate state and The Washington Examiner, a small conservative paper in the city. According to the court filings, Centanni was found in possession of 3,000 images, many apparently filmed in his own bedroom, including one showing a man raping a five-year-old girl who cries "no" and "mommy" while the man says "good baby" and "stop crying," according to one filing.

Ed Felten: California Must Lead On Cybersecurity

timothy posted 10 hours ago | from the so-goes-the-nation dept.

Security 56

An anonymous reader writes In a Sacramento Bee op-ed, (in)famous computer security researcher Ed Felten responds to the State of the Union cybersecurity proposal. He doesn't mince words: "The odds of clearing Congress: low. The odds of materially improving security: even lower. "What he suggests as an alternative, though, is a surprise. "California," he writes, "could blaze a trail for effective cybersecurity policy." He calls for the state government to protect critical infrastructure and sensitive data, relying on outside auditors and experts. It's an interesting idea. Even if it doesn't go anywhere, at least it's some fresh thinking in this area of backward policy. From Felten's essay: Critical infrastructure increasingly relies on industrial automation systems. And those systems are often vulnerable – they keep a default password, for instance, or are accessible from the public Internet. These are not subtle or sophisticated errors. Fixing them requires basic due diligence, not rocket science. Requiring the state’s critical infrastructure providers to undergo regular security audits would be straightforward and inexpensive – especially relative to the enormous risks. Areas of sensitive data are also low-hanging cyber fruit. In health care, education and finance, California already imposes security and privacy requirements that go beyond federal law. Those legal mandates, though, are mostly enforced through after-the-fact penalties. Much like critical infrastructure, sectors that rely upon sensitive data would benefit from periodic outside auditing. Of any state government's, California's policies also have the chance to help (or harm) the most people: nearly 39 million people, according to a 2014 U.S. Census estimate.

SpaceX, US Air Force Settle Spy Sat Dispute

timothy posted 11 hours ago | from the show-elon-what-you're-wearing dept.

Government 54

hypnosec writes The US Air Force and private space flight company SpaceX have settled their dispute involving the military's expendable rocket program, thereby paving the way for SpaceX to join the spy satellite launch program known as Evolved Expendable Launch Vehicle (EELV). The settlement opens doors for SpaceX to compete with United Launch Alliance (ULA) for launch of spy satellites. ULA is a joint Boeing-Lockheed venture – the only private player to have received clearance for launching black ops satellites.

Fark's Drew Curtis Running For Governor of Kentucky

timothy posted yesterday | from the dark-horse dept.

Government 97

New submitter AlCapwn writes [Fark founder] Drew Curtis announced on Friday that he will be running for governor of Kentucky. "We have a theory that we're about to see a huge change in how elections and politics work. Across the country, we have seen regular citizens stepping up and challenging the status quo built by political parties and career politicians. They have been getting closer and closer to victory and, here in Kentucky, we believe we have a chance to win and break the political party stronghold for good."

Why We Still Can't Really Put Anything In the Public Domain

timothy posted yesterday | from the here-are-nice-things-no-wait dept.

Books 78

Press2ToContinue writes While you can make a public domain dedication or (more recently) use the Creative Commons CC0 tool to do so, there's no clear way within the law to actually declare something in the public domain. Instead, the public domain declarations are really more of a promise not to make use of the exclusionary rights provided under copyright. On the "public domain day" of Copyright Week, Public Knowledge has pointed out that it's time that it became much easier to put things into the public domain. Specifically, the PK post highlights that thanks to the way copyright termination works, even someone who puts their works into the public domain could pull them back out of the public domain after 35 years.

OpenSSL 1.0.2 Released

timothy posted yesterday | from the early-days dept.

Encryption 92

kthreadd writes The OpenSSL project has released its second feature release of the OpenSSL 1.0 series, version 1.0.2 which is ABI compatible with the 1.0.0 and 1.0.1 series. Major new features in this release include Suite B support for TLS 1.2 and DTLS 1.2 and support for DTLS 1.2. selection. Other major changes include TLS automatic EC curve selection, an API to set TLS supported signature algorithms and curves, the SSL_CONF configuration API, support for TLS Brainpool, support for ALPN and support for CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH.

Winklevoss Twins Plan Regulated Bitcoin Exchange

timothy posted 2 days ago | from the trust-us-there-are-two-of-us dept.

Bitcoin 77

itwbennett writes They of the square jaws and famous dispute with Mark Zuckerberg over the origins of Facebook, are also believed to be among the largest holders of Bitcoin in the world. Now they want to launch a regulated Bitcoin exchange—named Gemini, of course. To bolster confidence, they said they have formed a relationship with a chartered bank in the state of New York. "This means that your money will never leave the country," the twins wrote in a blog post. "It also means that U.S. dollars on Gemini will be eligible for FDIC insurance and held by a U.S.-regulated bank.

China Cuts Off Some VPNs

timothy posted 2 days ago | from the we-see-what-you-did-there dept.

Privacy 199

jaa101 writes The Register (UK) and the Global Times (China) report that foreign VPN services are unavailable in China. A quote sourced to "one of the founders of an overseas website which monitors the Internet in China" claimed 'The Great Firewall is blocking the VPN on the protocol level. It means that the firewall does not need to identify each VPN provider and block its IP addresses. Rather, it can spot VPN traffic during transit and block it.' An upgrade of the Great Firewall of China is blamed and China appears to be backing the need for the move to maintain cyberspace sovereignty.

Behind the MOOC Harassment Charges That Stunned MIT

Soulskill posted 2 days ago | from the professors-behaving-badly dept.

Education 359

An anonymous reader writes: The complainant in a sexual harassment case has come forward and told her story about what happened when she was a student in a MOOC led by a rockstar professor. "It would take almost a year before Harbi, with the help of MIT’s investigators, said she came to understand that Lewin’s interest in her was not motivated by empathy, and that their first conversations included inappropriate language. Shortly after contacting her, Harbi said, Lewin quickly moved their friendship into uncomfortable territory, and she was pushed to participate in online sexual role-playing and send naked pictures and videos of herself."

Data Encryption On the Rise In the Cloud and Mobile

Soulskill posted 2 days ago | from the setting-a-standard dept.

Encryption 83

dkatana writes: Overall, demand for encryption is growing. Cloud encryption services provider CipherCloud recently received a $50 million investment by Deutsche Telekom, which the company said positions it for "explosive growth" this year. The services are designed to allow corporations to benefit from the cost savings and elasticity of cloud-based data storage, while ensuring that sensitive information is protected.

Now, both Apple and Google are providing full encryption as a default option on their mobile operating systems with an encryption scheme they are not able to break themselves, since they don't hold the necessary keys.

Some corporations have gone as far as turning to "zero-knowledge" services, usually located in countries such as Switzerland. These services pledge that they have no means to unlock the information once the customer has entered the unique encryption keys. This zero-knowledge approach is welcomed by users, who are reassured that their information is impossible to retrieve — at least theoretically — without their knowledge and the keys.

Apple Agrees To Chinese Security Audits of Its Products

samzenpus posted 3 days ago | from the looking-behind-the-curtain dept.

China 114

itwbennett writes According to a story in the Beijing News, Apple CEO Tim Cook has agreed to let China's State Internet Information Office to run security audits on products the company sells in China in an effort to counter concerns that other governments are using its devices for surveillance. "Apple CEO Tim Cook agreed to the security inspections during a December meeting in the U.S. with information office director Lu Wei, according to a story in the Beijing News. China has become one of Apple’s biggest markets, but the country needs assurances that Apple devices like the iPhone and iPad protect the security and privacy of their users as well as maintain Chinese national security, Lu told Cook, according to an anonymous source cited by the Beijing News."

Dish Network Violated Do-Not-Call 57 Million Times

samzenpus posted 3 days ago | from the please-stop-calling dept.

Crime 230

lightbox32 writes Dish Network has been found guilty of violating the Do Not Call list on 57 million separate occasions. They were also found liable for abandoning or causing telemarketers to abandon nearly 50 million outbound telephone calls, in violation of the abandoned-call provision of the Federal Trade Commission's Telemarketing Sales Rule. Penalties for infringing on the Do Not Call list can be up to a whopping $16,000 for each outbound call.

Barrett Brown, Formerly of Anonymous, Sentenced To 63 Months

samzenpus posted 3 days ago | from the going-away-for-a-while dept.

Crime 109

An anonymous reader writes with news that a journalist linked to Anonymous, Barret Brown, has been sentenced. "Barrett Brown, a journalist formerly linked to the hacking group Anonymous, was sentenced Thursday to over five years in prison, or a total of 63 months. Ahmed Ghappour, Brown's attorney, confirmed to Ars that Brown's 28 months already served will count toward the sentence. That leaves 34 months, or nearly three years, left for him to serve. In April 2014, Brown took a plea deal admitting guilt on three charges: "transmitting a threat in interstate commerce," for interfering with the execution of a search warrant, and to being "accessory after the fact in the unauthorized access to a protected computer." Brown originally was indicted in Texas federal court in December 2012 on several counts, including accusations that he posted a link from one Internet relay chat channel, called #Anonops, to another channel under his control, called #ProjectPM. The link led to private data that had been hijacked from intelligence firm Strategic Forecasting, or Statfor."

Fujitsu Psychology Tool Profiles Users At Risk of Cyberattacks

timothy posted 3 days ago | from the did-you-click-on-the-taboola-link? dept.

Crime 30

itwbennett writes Fujitsu Laboratories is developing an enterprise tool that can identify and advise people who are more vulnerable to cyberattacks, based on certain traits. For example, the researchers found that users who are more comfortable taking risks are also more susceptible to virus infections, while those who are confident of their computer knowledge were at greater risk for data leaks. Rather than being like an antivirus program, the software is more like "an action log analysis than looks into the potential risks of a user," said a spokesman for the lab. "It judges risk based on human behavior and then assigns a security countermeasure for a given user."

Silk Road Journal Found On Ulbricht's Laptop: "Everyone Knows Too Much"

timothy posted 3 days ago | from the that's-not-my-bag-baby-honestly dept.

Crime 179

sarahnaomi writes On Wednesday, prosecutors in the Silk Road trial began to lay out the wealth of evidence found on the laptop taken from accused kingpin Ross Ulbricht in a San Francisco library in October 2013. The evidence presented by prosecutor Timothy Howard was the most comprehensive and damning thus far, including more than a thousand pages of chats between the site's pseudonymous operator Dread Pirate Roberts and Silk Road administrators. Also entered into evidence was a journal that dates back to at least 2010 describing the creation and operation of the site. FBI computer scientist Thomas Kiernan, the second witness in the trial, testified about the day Ulbricht was arrested and the evidence gathered from his laptop.

Blogger Who Revealed GOP Leader's KKK Ties Had Home Internet Lines Cut

timothy posted 3 days ago | from the coud-be-coincidence dept.

Censorship 415

blottsie writes Last month, Lamar White, Jr. set off a firestorm in Washington when a post on his personal blog revealed that House Majority Whip Steve Scalise, the third most powerful Republican in the House of Representatives, was a featured speaker at a white nationalist conference put on by former Klu Klux Klan Grand Wizard David Duke. Then someone climbed in his back yard and severed his Internet cables.

Blackberry CEO: Net Neutrality Means Mandating Cross-Platform Apps

timothy posted 3 days ago | from the fantasy-world-of-atlas-shrugged dept.

Blackberry 307

DW100 writes In a bizarre public blog post the CEO of BlackBerry, John Chen, has claimed that net neutrality laws should include forcing app developers to make their services available on all operating systems. Chen even goes as far as citing Apple's iMessage tool as a service that should be made available for BlackBerry, because at present the lack of an iMessage BlackBerry app is holding the firm back. Some excerpts from Chen's plea: Netflix, which has forcefully advocated carrier neutrality, has discriminated against BlackBerry customers by refusing to make its streaming movie service available to them. Many other applications providers similarly offer service only to iPhone and Android users. ... Neutrality must be mandated at the application and content layer if we truly want a free, open and non-discriminatory internet. All wireless broadband customers must have the ability to access any lawful applications and content they choose, and applications/content providers must be prohibited from discriminating based on the customer’s mobile operating system. Since "content providers" are writing code they think makes sense for one reason or another (expected returns financial or psychic), a mandate to write more code seems like a good way to re-learn why contract law frowns on specific performance.

Science By Democracy Doesn't Work

timothy posted 3 days ago | from the just-ask-ex-planet-pluto dept.

Earth 433

StartsWithABang writes The US Senate just voted on whether climate change is a hoax, knowing full well that debates or votes don't change what is or isn't scientifically true or valid. Nevertheless, debates have always been a thing in science, and they do have their place: in raising what points would be needed to validate, robustly confirm or refute competing explanations, theories or ideas. The greatest scientific debate in all of history — along with its conclusions — illustrates exactly this.

Slashdot Login

Need an Account?

Forgot your password?