Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

850 Billion NSA Surveillance Records Searchable By Domestic Law Enforcement

Unknown Lamer posted about 2 months ago | from the you're-a-criminal dept.

Privacy 207

onproton (3434437) writes The Intercept reported today on classified documents revealing that the NSA has built its own "Google-like" search engine to provide over 850 billion collected records directly to law enforcement agencies, including the FBI and the DEA. Reporter Ryan Gallagher explains, "The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies." The search engine, called ICREACH, allows analysts to search an array of databases, some of which contain metadata collected on innocent American citizens, for the purposes of "foreign intelligence." However, questions have been raised over its potential for abuse in what is known as "parallel construction," a process in which agencies use surveillance resources in domestic investigations, and then later cover it up by creating a different evidence trail to use in court.

NRC Analyst Calls To Close Diablo Canyon, CA's Last Remaining Nuclear Plant

samzenpus posted about 2 months ago | from the shut-it-down dept.

Government 216

An anonymous reader writes Michael Peck, who for five years was Diablo Canyon's lead on-site inspector, says in a 42-page, confidential report that the Nuclear Regulatory Commission is not applying the safety rules it set out for the plant's operation. The document, which was obtained and verified by The Associated Press, does not say the plant itself is unsafe. Instead, according to Peck's analysis, no one knows whether the facility's key equipment can withstand strong shaking from those faults — the potential for which was realized decades after the facility was built. Continuing to run the reactors, Peck writes, "challenges the presumption of nuclear safety."

Systems That Can Secretly Track Where Cellphone Users Go Around the Globe

samzenpus posted about 2 months ago | from the oh-watching-the-places-you'll-go dept.

Businesses 76

cold fjord writes with this story about the proliferation of companies willing to sell tracking information and systems. Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people's travels over days, weeks or longer ... It is unclear which governments have acquired these tracking systems, but one industry official ... said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide. "Any tin-pot dictator with enough money to buy the system could spy on people anywhere in the world," said Eric King, deputy director of Privacy International.

Put A Red Cross PSA In Front Of the ISIS Beheading Video

samzenpus posted about 2 months ago | from the for-the-greater-good dept.

Censorship 300

Bennett Haselton writes After footage of James Foley's beheading by ISIS terrorists was posted online on Tuesday, Twitter and Youtube elected to remove any footage or links to the footage posted by users. Obviously this reduces the incentive for terrorist groups to post such content, by shrinking their audience, but it also reduces the public's access to information. Would it be ethical to make the content available, if it was preceded by an advertisement for a cause that runs counter to everything ISIS stands for? Read below to see what Bennett has to say.

Lizard Squad Bomb Threat Diverts Sony Exec's Plane To Phoenix

timothy posted about 2 months ago | from the derring-doo-doo dept.

Crime 131

As if cutting off from their games millions of users wasn't enough for the day, Forbes reports that [the] hacker collective (or individual) known as the “Lizard Squad” succeeded in taking offline many gaming services including Blizzard’s Battle.net and Sony PSN. But things took a turn from irritating DDoS attacks to another level of harassment earlier this afternoon when the group took to Twitter to announce publicly that it a believed the flight carrying Sony Online Entertainment President John Smedley had explosives on board. The flight had been bound from Dallas to San Diego, but in response to the bomb threat, the plane was diverted to Phoenix.

Munich Council Say Talk of LiMux Demise Is Greatly Exaggerated

timothy posted about 2 months ago | from the that-was-the-beer-talking dept.

Government 190

ndogg (158021) writes "The rumors of Munich's city government going back to Microsoft seem to have been greatly exaggerated. There was a review of the city's IT systems that was called for by the mayor, but it wasn't solely just to decide on whether to move back to Microsoft. And while there have been complaints about LiMux, they mostly seem to concern compatibility with OpenOffice.org, which may well be resolved by switching to LibreOffice."

Airbnb To Hand Over Data On 124 Hosts To New York Attorney General

Soulskill posted about 2 months ago | from the quasi-legal-operations-sometimes-have-consequences dept.

Businesses 149

Peer-to-peer lodging service Airbnb has agreed to hand over data on 124 of its hosts in New York as part of an investigation by the state's Attorney General into the operation of illegal hotels. The AG first requested data for almost all of Airbnb's hosts in the state, but after "legal wrangling," that number was whittled down to the current 124. The data in question will be unredacted personal information, meaning names and addresses. In a blog post, Airbnb's David Hantman said, "nothing about these hosting profiles suggests [the Attorney General] is after anyone but individuals who may be flagrantly misusing our platform." Airbnb is confident that the targets of this request are hosts considered to be "bad actors," but they don't explain what classifies somebody as a "bad actor."

Ross Ulbricht Faces New Drug Charges

timothy posted about 2 months ago | from the there's-laws-and-there's-laws dept.

Crime 102

Alleged Silk Road mastermind Ross Ulbricht now faces additional drug-related charges. Ars Technica gives a run-down on the run-down, and shows an array of driver's licenses that can't look good to a jury: According to a 17-page amended indictment filed late Thursday night, the government introduced one count of “narcotics trafficking,” of “distribution of narcotics by means of the Internet,” and of "conspiracy to traffic in fraudulent identification documents." Previously, Ulbricht was indicted in February 2014 on four formal criminal offenses: narcotics trafficking conspiracy, continuing criminal enterprise, computer hacking conspiracy, and money laundering conspiracy. Ulbricht pleaded not guilty to the previous charges, and he seems likely to plead not guilty to the new ones as well.

Sources Say Amazon Will Soon Be Targeting Ads, a la Google AdWords

timothy posted about 2 months ago | from the cookies-are-delicious dept.

Google 83

According to The Register (citing a paywalled WSJ article), a new face in targeted ads is emerging (according to "people familiar with the matter") to compete with Google, and it's Amazon. They already have a vast, mineable collection of data about customers' buying, listening and viewing habits, so exploiting personalized ads seems a natural follow-on. According to the report, the ad system would replace Google as ad vendor on Amazon itself, and "It is also apparently hoping to beef up its ad placement business on other sites as part of Amazon's strategy to carve its way into Google's multi-billion-dollar AdWords' empire." Pretty soon Amazon will able to just save me time by ordering the things I would have ordered based on ads that they themselves have placed.

For Microsoft, $93B Abroad Means Avoiding $30B Tax Hit

timothy posted about a month ago | from the what's-billed-vs-what's-owed dept.

Microsoft 316

walterbyrd (182728) writes "Microsoft Corp. is currently sitting on almost $29.6 billion it would owe in U.S. taxes if it repatriated the $92.9 billion of earnings it is keeping offshore, according to disclosures in the company's most recent annual filings with the Securities and Exchange Commission. The amount of money that Microsoft is keeping offshore represents a significant spike from prior years, and the levies the company would owe amount to almost the entire two-year operating budget of the company's home state of Washington."

South Carolina Student Arrested For "Killing Pet Dinosaur"

timothy posted about a month ago | from the tell-me-again-about-our-troubled-youth dept.

Education 421

Rambo Tribble (1273454) writes In South Carolina a 16-year old boy, Alex Stone, was arrested and charged with creating a disturbance at his school, as well as suspended, for choosing to write: "I killed my neighbor's pet dinosaur. I bought the gun to take care of the business," in response to a class writing assignment. The story has attracted international attention.

Oregon Sues Oracle For "Abysmal" Healthcare Website

timothy posted about a month ago | from the finest-consultants-in-the-land dept.

Oracle 212

SpzToid (869795) writes The state of Oregon sued Oracle America Inc. and six of its top executives Friday, accusing the software giant of fraud for failing to deliver a working website for the Affordable Care Act program. The 126-page lawsuit claims Oracle has committed fraud, lies, and "a pattern of activity that has cost the State and Cover Oregon hundreds of millions of dollars". "Not only were Oracle's claims lies, Oracle's work was abysmal", the lawsuit said. Oregon paid Oracle about $240.3 million for a system that never worked, the suit said. "Today's lawsuit clearly explains how egregiously Oracle has disserved Oregonians and our state agencies", said Oregon Atty. Gen. Ellen Rosenblum in a written statement. "Over the course of our investigation, it became abundantly clear that Oracle repeatedly lied and defrauded the state. Through this legal action, we intend to make our state whole and make sure taxpayers aren't left holding the bag."

Oregon's suit alleges that Oracle, the largest tech contractor working on the website, falsely convinced officials to buy "hundreds of millions of dollars of Oracle products and services that failed to perform as promised." It is seeking $200 million in damages. Oracle issued a statement saying the suit "is a desperate attempt to deflect blame from Cover Oregon and the governor for their failures to manage a complex IT project. The complaint is a fictional account of the Oregon Healthcare Project."

BBC and FACT Shut Down Doctor Who Fansite

timothy posted about a month ago | from the you're-gonna-need-a-bigger-tardis dept.

Sci-Fi 186

An anonymous reader writes with this report from Torrentfreak, excerpting: In just a few hours time the brand new season of Doctor Who will premiere, kicking off with the first episode 'Deep Breath'. There's been a huge build up in the media, but for fans who prefer to socialize and obtain news via a dedicated community, today brings bad news. Doctor Who Media (DWM) was a site created in 2010 and during the ensuing four and a half years it amassed around 25,000 dedicated members. A source close to the site told TF that since nothing like it existed officially, DWM's core focus was to provide a central location and community for everything in the 'Whoniverse,' from reconstructions of missing episodes to the latest episodes, and whatever lay between. But yesterday, following a visit by representatives from the BBC and Federation Against Copyright Theft, the site's operator took the decision to shut down the site for good.

New EU Rules Will Limit Vacuum Cleaners To 1600W

timothy posted about 2 months ago | from the sucking-power-defined dept.

EU 338

AmiMoJo writes "New EU rules are limiting vacuum cleaner motors to 1600W from 2014/09/01. The EU summary of the new rules explains that consumers currently equate watts with cleaning power, which is not the case. Manufacturers will be required to put ratings on packaging, including energy efficiency, cleaning efficiency on hard and carpeted floors, and dust emissions from the exhaust. In the EU vacuum cleaners use more energy than the whole of Denmark, and produce more emissions than dishwashers and washing machines."

Illinois University Restricts Access To Social Media, Online Political Content

timothy posted about 2 months ago | from the teach-the-controversy dept.

Censorship 130

onproton writes Northern Illinois University recently began restricting student access to web pages that contain "illegal or unethical" content which, according to University policy, includes resources used for "political activities...and the organization or participation in meetings, rallies and demonstrations." A student raised concerns after attempting to access the Wikipedia page for Westboro Baptist Church, and receiving a filter message informing him that his access of this page would likely violate the University's Acceptable Use Policy, along with a warning that "all violations would be reviewed." This has lead to questions about whether some policies that restrict student access to information are in the best interest of the primary goal of education.

Researchers Made a Fake Social Network To Infiltrate China's Internet Censors

Soulskill posted about 2 months ago | from the inside-job dept.

Censorship 49

Jason Koebler writes: In order to get inside China's notorious internet filter, Harvard researcher Gary King created his own fake social network to gain access to the programs used to censor content, so he could reverse-engineer the system. "From inside China, we created our own social media website, purchased a URL, rented server space, contracted with one of the most popular software platforms in China used to create these sites, submitted, automatically reviewed, posted, and censored our own submissions," King wrote in a study published in Science. "We had complete access to the software; we were even able to get their recommendations on how to conduct censorship on our own site in compliance with government standards."

33 Months In Prison For Recording a Movie In a Theater

Soulskill posted about 2 months ago | from the know-when-to-fold-'em dept.

Piracy 465

An anonymous reader writes: Philip Danks used a camcorder to record Fast & Furious 6 in a U.K. cinema. Later, he shared it via bittorrent and allegedly sold physical copies. Now, he's been sentenced to 33 months in prison for his actions. "In Court it was claimed that Danks' uploading of Fast 6 resulted in more than 700,000 downloads, costing Universal Pictures and the wider industry millions of pounds in losses." Danks was originally told police weren't going to take any action against him, but he unwisely continued to share the movie files after his initial detainment with authorities.

NSA Agents Leak Tor Bugs To Developers

Soulskill posted about 2 months ago | from the right-hand-thinks-the-left-hand-is-a-jerk dept.

Encryption 116

An anonymous reader writes: We've known for a while that NSA specifically targets Tor, because they want to disrupt one of the last remaining communication methods they aren't able to tap or demand access to. However, not everybody at the NSA is on board with this strategy. Tor developer Andrew Lewman says even as flaws in Tor are rooted out by the NSA and British counterpart GCHQ, other agents from the two organizations leak those flaws directly to the developers, so they can be fixed quickly. He said, "You have to think about the type of people who would be able to do this and have the expertise and time to read Tor source code from scratch for hours, for weeks, for months, and find and elucidate these super-subtle bugs or other things that they probably don't get to see in most commercial software." Lewman estimates the Tor Project receives these reports on a monthly basis. He also spoke about how a growing amount of users will affect Tor. He suggests a massive company like Google or Facebook will eventually have to take up the task of making Tor scale up to millions of users.

UK Police Warn Sharing James Foley Killing Video Is a Crime

samzenpus posted about 2 months ago | from the do-not-pass-go dept.

United Kingdom 391

An anonymous reader points out that UK authorities have warned that sharing the video of the James Foley murder could lead to prosecution under anti-terror laws. Scotland Yard has warned internet users they could be arrested under terrorism legislation if they viewed or shared the video of James Foley's murder, as Twitter and YouTube attempted to remove all trace of the footage from the web. Twitter suspended dozens of accounts that published the graphic footage while YouTube tried to remove several copies of the video, which was first uploaded on Tuesday night. Twitter CEO Dick Costolo tweeted: "We have been and are actively suspending accounts as we discover them related to this graphic imagery. Thank you." The unprecedented social media clampdown came as the Metropolitan police warned that even viewing the video could constitute a criminal offence in the UK. The force said in a statement: "The MPS counter-terrorism command (SO15) is investigating the contents of the video that was posted online in relation to the alleged murder of James Foley. We would like to remind the public that viewing, downloading or disseminating extremist material within the UK may constitute an offence under terrorism legislation."

FCC Warned Not To Take Actions a Republican-Led FCC Would Dislike

samzenpus posted about 2 months ago | from the you-wouldn't-like-me-whn-I'm-angry dept.

The Internet 338

tlhIngan writes Municipal broadband is in the news again — this time Chief of Staff Matthew Berry, speaking at the National Conference of State Legislatures, has endorsed states' right to ban municipal broadband networks and warned the (Democrat-led) FCC to not do anything that a future Republican led FCC would dislike. The argument is that municipal broadband discourages private investment in broadband communications, that taxpayer-funded projects are barriers to future infrastructure investment.

Microsoft Lobby Denies the State of Chile Access To Free Software

Soulskill posted about 2 months ago | from the lockin-leverage-legislate dept.

Microsoft 159

walterbyrd writes: Fresh on the heels of the entire Munich and Linux debacle, another story involving Microsoft and free software has popped up across the world, in Chile. A prolific magazine from the South American country says that the powerful Microsoft lobby managed to turn around a law that would allow the authorities to use free software. "An independent member of the Chilean Parliament, Vlado Mirosevic, pushed a bill that would allow the state to consider free software when the authorities needed to purchase or renew licenses. ... A while later, the same member of the Parliament, Daniel Farcas, proposed another bill that actually nullified the effects of the previous one that had just been adopted. To make things even more interesting, some of the people who voted in favor of the first law also voted in favor of the second one. ... The new bill is even more egregious, because it aggressively pushes for the adoption of proprietary software. Companies that choose to use proprietary software will receive certain tax breaks, which makes it very hard for free software to get adopted."

Calif. Court Rules Businesses Must Reimburse Cell Phone Bills

timothy posted about 2 months ago | from the ok-but-stop-calling-her-from-work dept.

Communications 161

New submitter dszd0g writes The Court of Appeal of the State of California has ruled in Cochran v. Schwan's Home Service that California businesses must reimburse employees who BYOD for work. "We hold that when employees must use their personal cell phones for work-related calls, Labor Code section 2802 requires the employer to reimburse them. Whether the employees have cell phone plans with unlimited minutes or limited minutes, the reimbursement owed is a reasonable percentage of their cell phone bills." Forbes recommends businesses that require cell phone use for employees either provide cell phones to employees or establish forms for reimbursement, and that businesses that do not require cell phones establish a formal policy.

National Science Foundation Awards $20 Million For Cloud Computing Experiments

samzenpus posted about 2 months ago | from the paying-the-way-to-the-future dept.

The Almighty Buck 25

aarondubrow writes The National Science Foundation today announced two $10 million projects to create cloud computing testbeds — to be called "Chameleon" and "CloudLab" — that will enable the academic research community to experiment with novel cloud architectures and pursue new, architecturally-enabled applications of cloud computing. While most of the original concepts for cloud computing came from the academic research community, as clouds grew in popularity, industry drove much of the design of their architecture. Today's awards complement industry's efforts and enable academic researchers to advance cloud computing architectures that can support a new generation of innovative applications, including real-time and safety-critical applications like those used in medical devices, power grids, and transportation systems.

Smartphone Kill Switch, Consumer Boon Or Way For Government To Brick Your Phone?

samzenpus posted about 2 months ago | from the best-of-both-worlds dept.

Government 299

MojoKid writes We're often told that having a kill switch in our mobile devices — mostly our smartphones — is a good thing. At a basic level, that's hard to disagree with. If every mobile device had a built-in kill switch, theft would go down — who would waste their time over a device that probably won't work for very long? Here's where the problem lays: It's law enforcement that's pushing so hard for these kill switches. We first learned about this last summer, and this past May, California passed a law that requires smartphone vendors to implement the feature. In practice, if a smartphone has been stolen, or has been somehow compromised, its user or manufacturer would be able to remotely kill off its usability, something that would be reversed once the phone gets back into its rightful owner's hands. However, such functionality should be limited to the device's owner, and no one else. If the owner can disable a phone with nothing but access to a computer or another mobile device, so can Google, Samsung, Microsoft, Nokia or Apple. If the designers of a phone's operating system can brick a phone, guess who else can do the same? Everybody from the NSA to your friendly neighborhood police force, that's who. At most, all they'll need is a convincing argument that they're acting in the interest of "public safety."

Tor Browser Security Under Scrutiny

Soulskill posted about 2 months ago | from the shouldn't-we-be-funding-this-better dept.

Encryption 80

msm1267 writes: The keepers of Tor commissioned a study testing the defenses and viability of their Firefox-based browser as a privacy tool. The results (PDF) were a bit eye-opening since the report's recommendations don't favor Firefox as a baseline for Tor, rather Google Chrome. But Tor's handlers concede that budget constraints and Chrome's limitations on proxy support make a switch or a fork impossible.

Google Receives Takedown Request Every 8 Milliseconds

Unknown Lamer posted about 2 months ago | from the can-we-just-fix-copyright-already dept.

Censorship 155

Via TorrentFreak comes news that Google is now being asked to remove one million links per day (or an average of one takedown notice every 8ms). In 2008, they received one takedown request approximately every six days. From the article: The massive surge in removal requests is not without controversy. It’s been reported that some notices reference pages that contain no copyrighted material, due to mistakes or abuse, but are deleted nonetheless. Google has a pretty good track record of catching these errors, but since manual review of all links is unachievable, some URLs are removed in error. ... The issue has also piqued the interest of U.S. lawmakers. Earlier this year the House Judiciary Subcommittee had a hearing on the DMCA takedown issue, and both copyright holders, Internet service providers, and other parties are examining what they can do to optimize the process. In the meantime, the number of removal requests is expected to rise and rise, with 10 million links per week being the next milestone.

Your Phone Can Be Snooped On Using Its Gyroscope

Unknown Lamer posted about 2 months ago | from the phone-can-be-snooped-on-by-everything dept.

Cellphones 96

stephendavion (2872091) writes Researchers will demonstrate the process used to spy on smartphones using gyroscopes at Usenix Security event on August 22, 2014. Researchers from Stanford and a defense research group at Rafael will demonstrate a way to spy on smartphones using gyroscopes at Usenix Security event on August 22, 2014. According to the "Gyrophone: Recognizing Speech From Gyroscope Signals" study, the gyroscopes integrated into smartphones were sensitive enough to enable some sound waves to be picked up, transforming them into crude microphones.

How Patent Trolls Destroy Innovation

Soulskill posted about 2 months ago | from the i-had-an-idea-therefore-your-effort-is-mine dept.

Patents 97

walterbyrd sends this story from Vox: Everyone agrees that there's been an explosion of patent litigation in recent years, and that lawsuits from non-practicing entities (NPEs) — known to critics as patent trolls — are a major factor. But there's a big debate about whether trolls are creating a drag on innovation — and if so, how big the problem is. A new study (PDF) by researchers at Harvard and the University of Texas provides some insight on this question. Drawing from data on litigation, R&D spending, and patent citations, the researchers find that firms that are forced to pay NPEs (either because they lost a lawsuit or settled out of court) dramatically reduce R&D spending: losing firms spent $211 million less on R&D, on average, than firms that won a lawsuit against a troll. "After losing to NPEs, firms significantly reduce R&D spending — both projects inside the firm and acquiring innovative R&D outside the firm," the authors write. "Our evidence suggests that it really is the NPE litigation event that causes this decrease in innovation."

$125,000 Settlement Given To Man Arrested for Photographing NYPD

Soulskill posted about 2 months ago | from the cheaper-than-a-trial dept.

The Almighty Buck 231

mpicpp sends word of a $125,000 settlement for a man who was arrested for photographing members of the New York Police Department. On June 14th, 2012, the man was sitting in his car when he saw three African-American youths being stopped and frisked by police officers. He began taking pictures of the encounter, and after the police were done, he advised the youths to get the officers' badge numbers next time. When the officers heard him, they pulled him violently from his car and arrested him under a charge of disorderly conduct. The police allegedly deleted the pictures from his phone (PDF). Rather than go to trial, the city's lawyers decided a settlement was the best course of action.

German Intelligence Spying On Allies, Recorded Kerry, Clinton, and Kofi Annan

Soulskill posted about 2 months ago | from the turnabout-is-fairly-played-out dept.

Government 170

cold fjord writes: According to Foreign Policy, "The revelation that Germany spies on Turkey, a NATO member, should dispel any notion that spying on allies violates the unwritten rules of international espionage. ... For nearly a year, the extent of NSA surveillance on German leaders ... has drawn stern rebuke from the German political and media establishment. ... Merkel went so far as to publicly oust the CIA station chief in Berlin. 'Spying among friends is not at all acceptable,' Merkel said. ... [C]alls made by Secretary of State John Kerry and former Secretary of State Hillary Clinton were accidentally recorded. ... 'It's a kind of delightful revelation given the fact that the Germans have been on their high horse.' Christian Whiton, a former ... State Department senior advisor, added that the report on German spying is a perfect example of why rifts over intelligence among allies should be handled quietly and privately." The Wall Street Journal adds, "Cem Özdemir, the head of the Green party and a leading German politician of Turkish descent, told Spiegel Online it would be 'irresponsible' for German spies not to target Turkey given its location as a transit country for Islamic State militants from Europe." Further details at Spiegel Online and The Wall Street Journal."

Phoenix Introduces Draft Ordinance To Criminalize Certain Drone Uses

Soulskill posted about 2 months ago | from the no-using-drones-to-attack-mexico dept.

Crime 200

Fubar writes: Two city council members from Phoenix, AZ are introducing "draft language" for public discussion that would make it illegal to use a drone to film people without their knowledge. The council members are worred about privacy of people in their own yards, even including the requirement that law enforcement obtain a warrant for drone surveillance. A violation of the ordinance would be a Class 1 misdemeanor, which carries up to a $2,500 fine and six months in jail.

Why Chinese Hackers Would Want US Hospital Patient Data

timothy posted about 2 months ago | from the makes-great-gift-wrapping-too dept.

China 171

itwbennett (1594911) writes In a follow-up to yesterday's story about the Chinese hackers who stole hospital data of 4.5 million patients, IDG News Service's Martyn Williams set out to learn why the data, which didn't include credit card information, was so valuable. The answer is depressingly simple: people without health insurance can potentially get treatment by using medical data of one of the hacking victims. John Halamka, chief information officer of the Beth Israel Deaconess Medical Center and chairman of the New England Healthcare Exchange Network, said a medical record can be worth between $50 and $250 to the right customer — many times more than the amount typically paid for a credit card number, or the cents paid for a user name and password. "If I am one of the 50 million Americans who are uninsured ... and I need a million-dollar heart transplant, for $250 I can get a complete medical record including insurance company details," he said.

Nuclear Regulator Hacked 3 Times In 3 Years

timothy posted about 2 months ago | from the once-a-year-to-keep-in-practice dept.

Government 66

mdsolar (1045926) writes with this disconcerting story from CNet about security breaches at the U.S. Nuclear Regulatory Commission, revealed in a new report to have been compromised three times in the last three years: The body that governs America's nuclear power providers said in an internal investigation that two of the hacks are suspected to have come from unnamed foreign countries, the news site Nextgov reported based on a Freedom of Information Act request. The source of the third hack could not be identified because the logs of the incident had been destroyed, the report said. Hackers, often sponsored by foreign governments, have targeted the US more frequently in recent years. A report (PDF) on attacks against government computers noted that there was a 35 percent increase between 2010 and 2013.

Intruders used common hacking techniques to get at the NRC's computers. One attack linked to a foreign country or individual involved phishing emails that coerced NRC employees into submitting their login credentials. The second one linked to a foreign government or individual used spearphishing, or emails targeted at specific NRC employees, to convince them to click a link that led to a malware site hosted on Microsoft's cloud storage site SkyDrive, now called OneDrive. The third attack involved breaking into the personal account of a NRC employee. After sending a malicious PDF attachment to 16 other NRC employees, one person was infected with malware.

News Aggregator Fark Adds Misogyny Ban

Unknown Lamer posted about 2 months ago | from the here-we-go-again dept.

The Media 748

An anonymous reader writes The news aggregator Fark is ancient in dot com terms. Users submit news links to the privately run site and tear it — and each other — to pieces in the discussion threads. (Sound familiar?) While the site isn't as popular as during the early 2000s, the privately run discussion forum has continued and has its champions. site operator Drew Curtis announced today that Gifs, references, jokes and comments involving sexism will be deleted. "Adam Savage once described to me the problem this way: if the Internet was a dude, we'd all agree that dude has a serious problem with women. We've actually been tightening up moderation style along these lines for awhile now, but as of today, the FArQ will be updated with new rules reminding you all that we don't want to be the He Man Woman Hater's Club. This represents enough of a departure from pretty much how every other large internet community operates that I figure an announcement is necessary."

Given how bare-knuckled Fark can be, is it time? Overdue?

Adam Carolla Settles With Podcasting Patent Troll

Unknown Lamer posted about 2 months ago | from the could-have-been-worse dept.

Patents 63

Personal Audio has been trying to assert patents they claim cover podcasting for some time now; in March Adam Carolla was sued and decided to fight back. Via the EFF comes news that he has settled with Personal Audio, and the outcome is likely beneficial to those still fighting the trolls. From the article: Although the settlement is confidential, we can guess the terms. This is because Personal Audio sent out a press release last month saying it was willing to walk away from its suit with Carolla. So we can assume that Carolla did not pay Personal Audio a penny. We can also assume that, in exchange, Carolla has given up the opportunity to challenge the patent and the chance to get his attorney’s fees. ... EFF’s own challenge to Personal Audio’s patent is on a separate track and will continue ... with a ruling likely by April 2015. ... We hope that Personal Audio’s public statements on this issue mean that it has truly abandoned threatening and suing podcasters. Though a press release might not be legally binding, the company will have a hard time justifying any further litigation (or threats of litigation) against podcasters. Any future targets can point to this statement. Carolla deserves recognition for getting this result.

Hackers Steal Data Of 4.5 Million US Hospital Patients

Unknown Lamer posted about 2 months ago | from the security-through-whoops dept.

Security 111

itwbennett (1594911) writes Community Health Systems said the attack occurred in April and June of this year, but it wasn't until July that it determined the theft had taken place. Working with a computer security company, it determined the attack was carried out by a group based in China that used 'highly sophisticated malware' to attack its systems. The hackers got away with patient names, addresses, birthdates, telephone numbers and Social Security numbers of the 4.5 million people who were referred to or received services from doctors affiliated with the company in the last five years. The stolen data did not include patient credit card, medical, or clinical information.

Rightscorp's New Plan: Hijack Browsers Until Infingers Pay Up

Unknown Lamer posted about 2 months ago | from the guilty-until-proven-guilty dept.

Piracy 376

A few weeks ago, Rightscorp announced plans to have ISPs disconnect repeat copyright infringers. mpicpp (3454017) wrote in with news that Rightscorp announced during their latest earnings call further plans to require ISPs to block all web access (using a proxy system similar to hotel / college campus wifi logins) until users admit guilt and pay a settlement fine (replacing the current system of ISPs merely forwarding notices to users). Quoting TorrentFreak: [Rightscorp] says 75,000 cases have been settled so far with copyright holders picking up $10 from each. ... What is clear is that Rightscorp is determined to go after "Comcast, Verizon, AT&T, Cable Vision and one more" in order to "get all of them compliant" (i.e forwarding settlement demands). The company predicts that more details on the strategy will develop in the fall, but comments from COO & CTO Robert Steele hint on how that might be achieved. ... "[What] we really want to do is move away from termination and move to what's called a hard redirect, like, when you go into a hotel and you have to put your room number in order to get past the browser and get on to browsing the web." The idea that mere allegations from an anti-piracy company could bring a complete halt to an entire household or business Internet connection until a fine is paid is less like a "piracy speeding ticket" and more like a "piracy wheel clamp", one that costs $20 to have removed.

Munich Reverses Course, May Ditch Linux For Microsoft

Unknown Lamer posted about 2 months ago | from the campaign-funding-brought-to-you-by-windows dept.

Government 579

alphadogg (971356) writes with news that the transition from Windows to GNU/Linux in Munich may be in danger The German city of Munich, long one of the open-source community's poster children for the institutional adoption of Linux, is close to performing a major about-face and returning to Microsoft products. Munich's deputy mayor, Josef Schmid, told the Süddeutsche Zeitung that user complaints had prompted a reconsideration (Google translation to English) of the city's end-user software, which has been progressively converted from Microsoft to a custom Linux distribution — "LiMux" — in a process that dates back to 2003.

Plan Would Give Government Virtual Veto Over Internet Governance

samzenpus posted about 2 months ago | from the changing-things-up dept.

The Internet 65

An anonymous reader writes The debate over Internet governance for much of the past decade has often come down to a battle between ICANN and the United Nations. The reality has always been far more complicated. The U.S. still maintains contractual control over ICANN, while all governments exert considerable power within the ICANN model through the Governmental Advisory Committee (GAC). Now governments are looking for even more power, seeking a near-complete veto power of ICANN decisions.

WikiLeaks' Assange Hopes To Exit London Embassy "Soon"

samzenpus posted about 2 months ago | from the leaving-the-building dept.

Crime 299

An anonymous reader writes Julian Assange has hosted a press conference in which he indicated he is soon about to leave the embassy of Ecuador in London. From the article: "WikiLeaks founder Julian Assange, who has spent over two years in Ecuador's London embassy to avoid a sex crimes inquiry in Sweden, said on Monday he planned to leave the building 'soon', but Britain signaled it would still arrest him if he tried. Assange made the surprise assertion during a news conference alongside Ecuador's Foreign Minister Ricardo Patino. But his spokesman played down the chances of an imminent departure, saying the British government would first need to revise its position and let him leave without arrest, something it has repeatedly refused to do.

Selectable Ethics For Robotic Cars and the Possibility of a Robot Car Bomb

samzenpus posted about 2 months ago | from the no-hands dept.

Transportation 239

Rick Zeman writes Wired has an interesting article on the possibility of selectable ethical choices in robotic autonomous cars. From the article: "The way this would work is one customer may set the car (which he paid for) to jealously value his life over all others; another user may prefer that the car values all lives the same and minimizes harm overall; yet another may want to minimize legal liability and costs for herself; and other settings are possible. Philosophically, this opens up an interesting debate about the oft-clashing ideas of morality vs. liability." Meanwhile, others are thinking about the potential large scale damage a robot car could do.

Lasrick writes Patrick Lin writes about a recent FBI report that warns of the use of robot cars as terrorist and criminal threats, calling the use of weaponized robot cars "game changing." Lin explores the many ways in which robot cars could be exploited for nefarious purposes, including the fear that they could help terrorist organizations based in the Middle East carry out attacks on US soil. "And earlier this year, jihadists were calling for more car bombs in America. Thus, popular concerns about car bombs seem all too real." But Lin isn't too worried about these threats, and points out that there are far easier ways for terrorists to wreak havoc in the US.

Feds: Red Light Camera Firm Paid For Chicago Official's Car, Condo

samzenpus posted about 2 months ago | from the red-light-red-light dept.

Crime 115

An anonymous reader writes "The former CEO of Redflex, a major red light camera vendor, and John Bills, former Managing Deputy Commissioner at the Department of Transportation, have been indicted on federal corruption charges stemming from a contract with the City of Chicago. According to the indictment, a friend of Bills was hired as a contractor and paid $2 million. Much of that money was then kicked back to Bills, who also got a Mercedes and a condominium via Redflex employees. The defendants are facing 23 counts including: mail fraud, wire fraud, and bribery. Each fraud count carries a maximum sentence of 20 years."

Are Altcoins Undermining Bitcoin's Credibility?

samzenpus posted about 2 months ago | from the least-of-your-worries dept.

Bitcoin 267

An anonymous reader writes The editor of a Bitcoin advocacy site believes the proliferation of altcoins (cryptocurrencies other than Bitcoin) is harming Bitcoin's long-term potential as an alternative to traditional currencies. Posting at BadBitcoin.org, a site that seeks to expose online scams that target Bitcoin users, the pseudonymous ViK compares altcoins, including the Internet meme inspired Dogecoin, to a pump-and-dump scheme where developers create their own version of the Bitcoin wallet and blockchain and then "pre-mine" or generate a significant number of cryptocurrency units before the altcoin's official release. Later, when their value has risen, the pre-mined altcoins are exchanged for Bitcoin or in some cases converted directly to cash. While critics of cryptocurrencies in general might find ViK's comments about the altcoin "tulip" mania ironic, the self-confessed Bitcoin fan is nevertheless calling for an altcoin boycott: "The easiest way to stop them is to not participate. We all know that they only have one purpose, and that is to make Bitcoin for the so called developers."

Financial Services Group WCS Sues Online Forum Over Negative Post

samzenpus posted about 2 months ago | from the I-wish-you-wouldn't-say-that dept.

Censorship 112

First time accepted submitter kavzee writes The popular Australian online discussion forum, Whirlpool, is being sued by a financial services group for refusing to remove a negative review about its services. A similar story occurred a number of years ago when another company by the name of 2Clix attempted to sue Whirlpool for the same reasons but later withdrew their case. "A financial services business licenced through National Australia Bank is suing an online forum for refusing to remove an allegedly fake and negative post about its services, claiming it has damaged its reputation with would-be clients. It is the latest legal action launched against an online forum or review website for publishing negative comments, following several high profile cases in Australia and overseas. Financial advice group WCS Group has initiated action against Whirlpool in the Supreme Court of Victoria, seeking unspecified damages and costs, despite the fact the forum generates no revenue."

EFF's Cell Phone Guide For US Protesters

Soulskill posted about 2 months ago | from the do-not-use-your-cell-phone-as-a-projectile-weapon dept.

Electronic Frontier Foundation 82

An anonymous reader writes: The Electronic Frontier Foundation has updated its guide for protecting yourself and your cell phone at a protest. In addition to being extremely powerful tools (real-time communication to many watchers via social media, and video recording functionality), cell phones can also give authorities a lot of information about you if they confiscate it. The EFF is trying to encourage cell phone use and prepare people to use them. (The guide is based on U.S. laws, but much of the advice makes sense for other places as well.) Here are a few small snippets: "Start using encrypted communications channels. Text messages, as a rule, can be read and stored by your phone company or by surveillance equipment in the area. ... If the police ask to see your phone, tell them you do not consent to the search of your device. Again, since the Supreme Court's decision in Riley, there is little question that officers need a warrant to access the contents of your phone incident to arrest, though they may be able to seize the phone and get a warrant later. ... If your phone or electronic device was seized, and is not promptly returned when you are released, you can file a motion with the court to have your property returned."

Two Years of Data On What Military Equipment the Pentagon Gave To Local Police

Soulskill posted about 2 months ago | from the bazookas-for-all dept.

The Military 264

v3rgEz writes: Wondering how the St. Louis County Police ended up armed with surplus military gear, and what equipment other departments have? A FOIA request at MuckRock has turned up every item given to local law enforcement under the Pentagon's 1022 program, the mechanism by which local law enforcement can apply for surplus or used military gear.

Knocking Down the Great Firewall of China

Soulskill posted about 2 months ago | from the crumbling-from-a-million-tiny-cracks dept.

Censorship 167

New submitter Nocturrne writes: The FOSS project Lantern is having great success in unblocking the internet for many users in oppressive regimes, like China and Iran. Much like Tor and BitTorrent, Lantern is using peer-to-peer networking to overcome firewalls, but with the additional security of a trusted network of friends. "If you download Lantern in an uncensored region, you can connect with someone in a censored region, who can then access whatever content they want through you. What makes the system so unique is that it operates on the basis of trust. ... Through a process called consistent routing, the amount of information any single Lantern user can learn about other users is limited to a small subset, making infiltration significantly more difficult." The network of peers is growing, but we need more friends in uncensored countries to join us.

Leaked Documents: GCHQ Made Port-Scanning Entire Countries a Standard Spy Tool

timothy posted about 2 months ago | from the small-island-nation-with-a-lot-of-curiosity dept.

Government 58

Advocatus Diaboli writes with this excerpt from Heise: Since the early days of TCP, port scanning has been used by computer saboteurs to locate vulnerable systems. In a new set of top secret documents seen by Heise, it is revealed that in 2009, the British spy agency GCHQ made port scans a "standard tool" to be applied against entire nations. Twenty-seven countries are listed as targets of the HACIENDA program in the presentation, which comes with a promotional offer: readers desiring to do reconnaissance against another country need simply send an e-mail. Also from the article: The list of targeted services includes ubiquitous public services such as HTTP and FTP, as well as common administrative protocols such as SSH (Secure SHell protocol – used for remote access to systems) and SNMP (Simple Network Management Protocol – used for network administration) (Figure 4). Given that in the meantime, port scanning tools like Zmap have been developed which allow anyone to do comprehensive scans, it is not the technology used that is shocking, but rather the gargantuan scale and pervasiveness of the operation.

Apple Begins Storing Chinese User Data On Servers In China

timothy posted about 2 months ago | from the eat-local-and-store-data-there-too dept.

China 92

An anonymous reader writes Reuters reported on Friday that Apple "has begun keeping the personal data of some Chinese users on servers in mainland China." Apple has claimed that the move is meant "to improve the speed and reliability of its iCloud service", but given China's track record with censorship and privacy, the explanation rings hollow for some skeptics. Nevertheless, Apple assures its Chinese users that their personal data on China Telecom is encrypted and that the encryption keys will be stored offshore. Only time will tell if Apple will be able to resist Chinese government requests to access its China-based servers.

The Billion-Dollar Website

Soulskill posted about 2 months ago | from the get-what-you-paid-for-minus-a-billion-dollars dept.

Government 194

stoborrobots writes: The Government Accountability Office has investigated the cost blowouts associated with how the Centers for Medicare & Medicaid Services (CMS) handled the Healthcare.gov project. It has released a 60-page report entitled Healthcare.gov: Ineffective Planning and Oversight Practices Underscore the Need for Improved Contract Management, with a 5 page summary. The key takeaway messages are:

  • CMS undertook the development of Healthcare.gov and its related systems without effective planning or oversight practices...
  • [The task] was a complex effort with compressed time frames. To be expedient, CMS issued task orders ... when key technical requirements were unknown...
  • CMS identified major performance issues ... but took only limited steps to hold the contractor accountable.
  • CMS awarded a new contract to another firm [and the new contract's cost has doubled] due to changes such as new requirements and other enhancements...

Slashdot Login

Need an Account?

Forgot your password?