Skip to main content

Home/ Indie Nation/ Group items tagged gov

Rss Feed Group items tagged

John Lemke

Petition Launched To Get The White House To Open Source Healthcare.gov Code | Techdirt - 0 views

  • Of course, there are a few issues with this. First of all, while things created by government employees is automatically public domain, works created by contractors is not. So while conceptually we can argue that the code should be open sourced, it's not required by law. Second, and more importantly, it's a lot harder to take proprietary code and then release it as open source, than it is to build code from the ground up to be open source (and it's even more difficult to make sure that code is actually useful for anything). Indeed, if the code had been open sourced from the beginning, perhaps they wouldn't make embarrassing mistakes like violating other open source licenses.
  • By this point, open sourcing the code isn't going to fix things, but if more attention is put on the issue of closed vs. open code in government projects, hopefully it means that government officials will recognize that it should be open source from the beginning for the next big government web project.
  • After the disastrous technological launch of the healthcare.gov website, built by political cronies rather than companies who understand the internet, there has been plenty of discussion as to why the code wasn't open sourced. At that link, there's a good discussion from On the Media, with Paul Ford, discussing what a big mistake it was that the government decided not to open source the code and be much more transparent about the process. It discusses the usual attacks on open source and why they almost certainly don't apply to this situation.
John Lemke

Court: Fining Jammie Thomas $9,250 Per Song Infringed Motivates Creative Activity | Tec... - 0 views

  • This is hardly a surprise, but similar to the Joel Tenenbaum case, Jammie Thomas-Rasset (the other person sued for copyright infringement for using a file sharing system), has lost again. The appeals court (8th Circuit) has ruled that $9,250 per song infringed is perfectly reasonable and that the judge in the case, Michael Davis, erred in calling for a new trial after the initial jury verdict (the first of three). There were a number of procedural issues here, and it's worth pointing out that Thomas-Rasset herself more or less asked the court to bring back this first verdict and focus on the Constitutionality of the damages amount. So, the whole mess with the three separate district court trials sort of gets swept under the rug. However, the court simply isn't buying Thomas-Rasset's claim that the statutory damages are unconstitutionally punitive and a violation of due process. Basically, it says that the fact that statutory damages are completely out of whack with actual damages doesn't matter, because the point of statutory damages is that they're disconnected from actual damages on purpose (because, in theory, they're put in place because actual damages are difficult to assess).
John Lemke

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices | Ars Technica - 0 views

  • takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June. The security bug is present on Java 7 u21 and earlier. Once the bot has infected a computer, it copies itself to the autostart directory of its respective platform to ensure it runs whenever the machine is turned on. Compromised computers then report to an Internet relay chat channel that acts as a command and control server.
  • The botnet is designed to conduct distributed denial-of-service attacks on targets of the attackers' choice. Commands issued in the IRC channel allow the attackers to specify the IP address, port number, intensity, and duration of attacks.
John Lemke

Corn-waste biofuels might be worse than gasoline in the short term | Plugged In, Scient... - 0 views

  • Biofuels made using corn waste could release 7 percent more greenhouse gases in the early years compared to conventional gasoline. As a result, this type of cellulosic ethanol could be inelligible to meet quotas under the 2007 Energy Independence and Security Act (EISA).
  • In the longer-term, the study says that these types of biofuels will result in a net emissions decrease. However, the short term increase is enough to keep this type of biofuel from complying with regulations in the 2007 Energy Independence and Security Act (EISA).
John Lemke

Hackers charged with stealing Xbox, 'Call of Duty,' and US Army secrets worth over $100... - 0 views

  • Four hackers have been jointly charged with conspiracies to commit computer fraud, copyright infringement, wire fraud, mail fraud, identity theft, and theft of trade secrets. Individually, they have been charged with counts of aggravated identity theft, unauthorized computer access, copyright infringement, and wire fraud.
  • The defendants, aged between 18 and 28, are believed to have stolen more than $100 million in intellectual property and other proprietary data from the likes of Microsoft Corporation, Epic Games, Valve, and even the US Army. This includes pre-release versions of Gears of War 3 and Call of Duty: Modern Warfare 3, Apache helicopter simulation software developed for the US army, and information about the Xbox One console. Two of the suspects have pleaded guilty, one of which is 22-year old David Pokora. His plea represents what may be the first conviction of a foreign-based individual for hacking into US businesses to steal trade secret information.
  • 18-count superseding indictment
John Lemke

Colliding Atmospheres: Mars vs Comet Siding Spring - NASA Science - 0 views

  • "We hope to witness two atmospheres colliding," explains David Brain of the University of Colorado's Laboratory for Atmospheric and Space Physics (LASP).  "This is a once in a lifetime event!"
  • Everyone knows that planets have atmospheres.  Lesser known is that comets do, too.  The atmosphere of a comet, called its "coma," is made of gas and dust that spew out of the sun-warmed nucleus.  The atmosphere of a typical comet is wider than Jupiter.
  • The timing could scarcely be better.  Just last year, NASA launched a spacecraft named MAVEN to study the upper atmosphere of Mars, and it will be arriving in Sept. 2014 barely a month before the comet. MAVEN is on a mission to solve a longstanding mystery: What happened to the atmosphere of Mars?  Billions of years ago, Mars had a substantial atmosphere that blanketed the planet, keeping Mars warm and sustaining liquid water on its surface. Today, only a wispy shroud of CO2 remains, and the planet below is colder and dryer than any desert on Earth. Theories for this planetary catastrophe center on erosion of the atmosphere by solar wind.
  • ...1 more annotation...
  • the comet could spark Martian auroras.
John Lemke

The White House Big Data Report: The Good, The Bad, and The Missing | Electronic Fronti... - 0 views

  • the report recognized that email privacy is critical
  • one issue was left conspicuously unaddressed in the report. The Securities and Exchange Commission, the civil agency in charge of protecting investors and ensuring orderly markets, has been advocating for a special exception to the warrant requirement. No agency can or should have a get-out-of-jail-free card for bypassing the Fourth Amendment.
  • the algorithm is only as fair as the data fed into it.
  • ...22 more annotations...
  • the danger of discrimination remains due to the very digital nature of big data
  • especially the elderly, minorities, and the poor
  • an example of this in Boston, which had a pilot program to allow residents to report potholes through a mobile app but soon recognized that the program was inherently flawed because “wealthy people were far more likely to own smart phones and to use the Street Bump app. Where they drove, potholes were found; where they didn’t travel, potholes went unnoted.”
  • The authors of the report agree, recommending that the Privacy Act be extended to all people, not just US persons.
  • metadata (the details associated with your communications, content, or actions, like who you called, or what a file you uploaded file is named, or where you were when you visited a particular website) can expose just as much information about you as the “regular” data it is associated with, so it deserves the same sort of privacy protections as “regular” data.
    • John Lemke
       
      What is Metadate... then discuss
  • The report merely recommended that the government look into the issue.
    • John Lemke
       
      Did the report give a strong enough recommendation? "looking into" and doing are much different
  • several other government reports have taken a much stronger stance and explicitly stated that metadata deserves the same level of privacy protections as “regular” data.
  • We think the report should have followed the lead of the PCAST report and acknowledged that the distinction between data and metadata is an artificial one, and recommended the appropriate reforms.
    • John Lemke
       
      I very strongly agree.  The report failed in this area.
  • the White House suggested advancing the Consumer Privacy Bill of Rights, which includes the idea that “consumers have a right to exercise control over what personal data companies collect from them and how they use it,” as well as “a right to access and correct personal data.”
  • Consumers have a right to know when their data is exposed, whether through corporate misconduct, malicious hackers, or under other circumstances. Recognizing this important consumer safeguard, the report recommends that Congress “should pass legislation that provides a single national data breach standard along the lines of the Administration's May 2011 Cybersecurity legislative proposal.”
  • While at first blush this may seem like a powerful consumer protection, we don’t think that proposal is as strong as existing California law. The proposed federal data breach notification scheme would preempt state notification laws, removing the strong California standard and replacing it with a weaker standard.
    • John Lemke
       
      In other words, it failed at what can be done and it would actually lower standards when compared to what California has in place currently.
  • We were particularly disconcerted
  • the Fort Hood shooting by Major Nidal Hasan
    • John Lemke
       
      WTF? how did he get in this group?
  • two big concerns
  • First, whistleblowers are simply not comparable to an Army officer who massacres his fellow soldiers
  • Secondly, the real big-data issue at play here is overclassification of enormous quantities of data.
  • Over 1.4 million people hold top-secret security clearances. In 2012, the government classified 95 million documents. And by some estimates, the government controls more classified information than there is in the entire Library of Congress.
    • John Lemke
       
      Don't leave this stat out.  More classified documents than LOC documents.  WTF? A "democracy" with more secret documents than public?
  • The report argues that in today’s connected world it’s impossible for consumers to keep up with all the data streams they generate (intentionally or not), so the existing “notice and consent” framework (in which companies must notify and get a user’s consent before collecting data) is obsolete. Instead, they suggest that more attention should be paid to how data is used, rather than how it is collected.
    • John Lemke
       
      This is the most troubling part perhaps,  isn't the collection without consent where the breech of privacy begins?
    • John Lemke
       
      "notice and consent"
  • An unfortunate premise of this argument is that automatic collection of data is a given
  • While we agree that putting more emphasis on responsible use of big data is important, doing so should not completely replace the notice and consent framework.
  • Despite being a fairly thorough analysis of the privacy implications of big data, there is one topic that it glaringly omits: the NSA’s use of big data to spy on innocent Americans.
    • John Lemke
       
      If we ignore it, it will go away?  Did they not just mostly ignore it and accept it as a given for corporations and completely ignore it regarding the government? Pretty gangster move isn't it?
  • Even though the review that led to this report was announced during President Obama’s speech on NSA reform, and even though respondents to the White House’s Big Data Survey “were most wary of how intelligence and law enforcement agencies are collecting and using data about them,” the report itself is surprisingly silent on the issue.2 This is especially confusing given how much the report talks about the need for more transparency in the private sector when it comes to big data. Given that this same logic could well be applied to intelligence big data programs, we don’t understand why the report did not address this vital issue.
John Lemke

Curiosity rover reaches long-term goal: a massive Martian mountain | The Verge - 0 views

  • NASA recently announced that the rover has arrived at the base of Mount Sharp, a 3.4-mile-high mountain that Curiosity has been heading towards since July of 2013.
  • Curiosity was designed to travel a maximum of 660 feet per day and navigate difficult terrain on its six wheels. The Spirit rover traveled only 4.8 miles over its lifespan, although the still-active Opportunity rover has logged about 25 miles since 2003. Curiosity's path was rerouted earlier this year after scientists found that sharp rocks were poking holes in its wheels.
John Lemke

Payback time: First patent troll ordered to pay "extraordinary case" fees | Ars Technica - 0 views

  • In the recent Octane Fitness case (PDF), the Supreme Court changed the test for fee-shifting precisely to deter behavior such as Lumen's, Cote found. Lumen didn't do "any reasonable pre-suit investigation," and filed a number of near-identical "boilerplate" complaints in a short time frame. That all suggests "Lumen’s instigation of baseless litigation is not isolated to this instance, but is instead part of a predatory strategy aimed at reaping financial advantage from the inability or unwillingness of defendants to engage in litigation against even frivolous patent lawsuits."
1 - 10 of 10
Showing 20 items per page