Skip to main content

Home/ Indie Nation/ Group items tagged moved

Rss Feed Group items tagged

John Lemke

NSA moves from bugging German Chancellor to bugging German ministers | Ars Technica - 0 views

  • Still, that moratorium on spying didn't extend beyond those world leaders, and Reuters, translating from the BamS source, writes that the source said, “We have had the order not to miss out on any information now that we are no longer able to monitor the chancellor's communication directly.” Specifically, Interior Minister Thomas de Maiziere, one of Merkel's confidants, was called out as being a target of the NSA's increased spying efforts.
John Lemke

Surprise: Obama's New US Trade Rep Overturns ITC, Stops Ban On Apple Products | Techdirt - 0 views

  •  
    "Still, in a somewhat surprising move, Obama's recently appointed US Trade Rep., Michael Froman, has stepped in to directly overturn an ITC injunction issued against Apple products -- including iPhones and iPads, after the ITC sided with Samsung, saying that those devices violated Samsung's patents. The decision by Froman is final -- Samsung can't appeal, and it means that those iPhones and iPads won't get blocked at customs, as would likely have happened otherwise. You can read Froman's letter about this, in which he delves into some detail about the administrations worries about "patent hold up" -- mainly on standards-essential patents (SEPs) that have so-called FRAND (fair, reasonable and non-discriminatory) licensing commitments. As the letter notes:"
John Lemke

Former NSA Boss Says NSA Should Just Reveal Everything Itself And Move On | Techdirt - 0 views

  • Bobby R. Inman, who weathered his own turbulent period as N.S.A. director from 1977 to 1981, offers his hyper-secret former agency a radical suggestion for right now. "My advice would be to take everything you think Snowden has and get it out yourself," he said. "It would certainly be a shock to the agency. But bad news doesn't get better with age. The sooner they get it out and put it behind them, the faster they can begin to rebuild."
John Lemke

Roxxxy the US$7,000 companion/sex robot (NSFW) - 0 views

  •  
    When it comes to technology, the sex industry is no laggard, and as robots become more human-like in their appearance and abilities, US-based company TrueCompany is poised to launch Roxxxy - the world's first sex robot - that has many more capabilities than your average sex doll. Apart from having better defined physical features than previous dolls, Roxxxy has been programmed with her own personality and her manufacturers say she can listen, talk, carry on a conversation, feel your touch and respond to it, as well as move her private areas inside when she is being "utilized" to deliver an unforgettable erotic experience. There are even plans for a male version - Rocky the Robot.
John Lemke

Ohio TV Anchor Discovers Thongs Are Not Tax Deductible | Scene and Heard: Scene's News ... - 0 views

  •  
    Anietra Hamper has been a TV anchor at two Columbus-area stations. In addition to being well-versed in local news and national trends, Hamper also made it a point to keep up her appearance, a key tenet of the talking head gig. From 2005-2008, she worked at NBC4 and then moved on to WBNS until 2010. It was the period from 2005-2008, however, that caught the eye of the IRS. You see, Hamper, in pursuit of beauty, spent gobs of money on clothes, gyms, trainers, manicures, and more. Why does the IRS care? She tried to write off every dime she spent on aesthetic accessories and clothing - a staggering total of $167,356.
John Lemke

Cops to Congress: We need logs of Americans' text messages | Politics and Law - CNET News - 0 views

  • CNET has learned a constellation of law enforcement groups has asked the U.S. Senate to require that wireless companies retain that information, warning that the lack of a current federal requirement "can hinder law enforcement investigations." They want an SMS retention requirement to be "considered" during congressional discussions over updating a 1986 privacy law for the cloud computing era -- a move that could complicate debate over the measure and erode support for it among civil libertarians. As the popularity of text messages has exploded in recent years, so has their use in criminal investigations and civil lawsuits. They have been introduced as evidence in armed robbery, cocaine distribution, and wire fraud prosecutions. In one 2009 case in Michigan, wireless provider SkyTel turned over the contents of 626,638 SMS messages, a figure described by a federal judge as "staggering."
John Lemke

BBC News - Blizzard cuts off Iranian access to World of Warcraft - 0 views

  • "This week, Blizzard tightened up its procedures to ensure compliance with these laws, and players connecting from the affected nations are restricted from access to Blizzard games and services," read the statement. Unfortunately, said Blizzard, the same sanctions meant it could not give refunds to players in Iran or help them move their account elsewhere. "We apologise for any inconvenience this causes and will happily lift these restrictions as soon as US law allows," it added. Although the block on Wow has been imposed by Blizzard, other reports suggest a wider government ban might have been imposed.
John Lemke

Inside NZ Police Megaupload files: US investigation began in 2010 | Ars Technica - 0 views

  • Further evidence of overeager and illegal police work emerged Thursday in New Zealand as Inspector General of Security and Intelligence Paul Neazor released a report on the illegal bugging of Kim Dotcom and Megaupload programmer Bram van der Kolk. Two GCSB officers were present at a police station nearby Dotcom’s mansion as the raid took place.
  • Police weighed several options for the raid named “Operation Debut,” undertaken at the behest of US authorities, and sought to take Dotcom and associates with the “greatest element of surprise” and to minimise any delays the in executing the search and seizure operation should the German file sharing tycoon’s staff be uncooperative or even resist officers on arrival.
  • The police planners also noted that “Dotcom will use violence against person’s [sic] and that he has several staff members who are willing to use violence at Dotcom’s bidding” after a U.S. cameraman, Jess Bushyhead, reported the Megaupload founder for assaulting him with his stomach after a dispute. Based on Dotcom’s license plates such as MAFIA, POLICE, STONED, GUILTY, and HACKER, police said this indicates the German “likes to think of himself as a gangster” and is “described as arrogant, flamboyant and having disregard for law enforcement.” However, the documents show that Dotcom had only been caught violating the speed limit in New Zealand. The request for assistance from the STG notes that the US investigation against Mega Media Group and Dotcom was started in March 2010 by prosecutors and the FBI. According to the documents, US prosecutors and FBI “discovered that the Mega Media Group had engaged in and facilitated criminal copyright infringement and money laundering on a massive scale around the world.” FBI in turn contacted NZ Police in “early 2011," requesting assistance with the Mega Media Group investigation as Dotcom had moved to New Zealand at the time.
John Lemke

Exclusive: Secret contract tied NSA and security industry pioneer | Reuters - 0 views

  • Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.
  • RSA, meanwhile, was changing. Bidzos stepped down as CEO in 1999 to concentrate on VeriSign, a security certificate company that had been spun out of RSA. The elite lab Bidzos had founded in Silicon Valley moved east to Massachusetts, and many top engineers left the company, several former employees said.And the BSafe toolkit was becoming a much smaller part of the company. By 2005, BSafe and other tools for developers brought in just $27.5 million of RSA's revenue, less than 9% of the $310 million total."When I joined there were 10 people in the labs, and we were fighting the NSA," said Victor Chan, who rose to lead engineering and the Australian operation before he left in 2005. "It became a very different company later on."By the first half of 2006, RSA was among the many technology companies seeing the U.S. government as a partner against overseas hackers.New RSA Chief Executive Art Coviello and his team still wanted to be seen as part of the technological vanguard, former employees say, and the NSA had just the right pitch. Coviello declined an interview request.An algorithm called Dual Elliptic Curve, developed inside the agency, was on the road to approval by the National Institutes of Standards and Technology as one of four acceptable methods for generating random numbers. NIST's blessing is required for many products sold to the government and often sets a broader de facto standard.RSA adopted the algorithm even before NIST approved it. The NSA then cited the early use of Dual Elliptic Curve inside the government to argue successfully for NIST approval, according to an official familiar with the proceedings.RSA's contract made Dual Elliptic Curve the default option for producing random numbers in the RSA toolkit. No alarms were raised, former employees said, because the deal was handled by business leaders rather than pure technologists.
  • Within a year, major questions were raised about Dual Elliptic Curve. Cryptography authority Bruce Schneier wrote that the weaknesses in the formula "can only be described as a back door."
John Lemke

Video: Sun has 'flipped upside down' as new magnetic cycle begins - Science - News - Th... - 0 views

  • The sun has "flipped upside down", with its north and south poles reversed to reach the midpoint of Solar Cycle 24, Nasa has said. Now, the magnetic fields will once again started moving in opposite directions to begin the completion of the 22 year long process which will culminate in the poles switching once again."A reversal of the sun's magnetic field is, literally, a big event," said Nasa’s Dr. Tony Phillips."The domain of the sun's magnetic influence (also known as the 'heliosphere') extends billions of kilometers beyond Pluto. Changes to the field's polarity ripple all the way out to the Voyager probes, on the doorstep of interstellar space."
  •  
    It is topics like these that Lumpy and Brian often discuss on Tech Net News and Opinion which airs Monday's from 8-10 PM EST. Feel free to join us in geekshed.net IRC in #indienation. We encourage listener participation and having listeners on the air.
John Lemke

US Court Secretly Lets Government Share Megaupload Evidence With Copyright Industry | T... - 0 views

  • Apparently part of the issue for the original filing to reveal this information was that some copyright holders are getting antsy that as the case drags on, they won't also be able to file civil cases against Megaupload before the three-year statute of limitations expires. However, as Megaupload's lawyers point out, there is no urgency here since the government itself made no move to share this information over the past two years. If it really wanted to share the information it had ample time to make the request and allow Megaupload's lawyers to review and take part in the process, rather than trying to route around them entirely. I'm guessing the recent successes against IsoHunt and Hotfile may have contributed to the timing as well. The MPAA pretty clearly thinks it can use those two cases to go after Megaupload as well, outside of the criminal case which will continue.
John Lemke

The White House Big Data Report: The Good, The Bad, and The Missing | Electronic Fronti... - 0 views

  • the report recognized that email privacy is critical
  • one issue was left conspicuously unaddressed in the report. The Securities and Exchange Commission, the civil agency in charge of protecting investors and ensuring orderly markets, has been advocating for a special exception to the warrant requirement. No agency can or should have a get-out-of-jail-free card for bypassing the Fourth Amendment.
  • the algorithm is only as fair as the data fed into it.
  • ...22 more annotations...
  • the danger of discrimination remains due to the very digital nature of big data
  • especially the elderly, minorities, and the poor
  • an example of this in Boston, which had a pilot program to allow residents to report potholes through a mobile app but soon recognized that the program was inherently flawed because “wealthy people were far more likely to own smart phones and to use the Street Bump app. Where they drove, potholes were found; where they didn’t travel, potholes went unnoted.”
  • The authors of the report agree, recommending that the Privacy Act be extended to all people, not just US persons.
  • metadata (the details associated with your communications, content, or actions, like who you called, or what a file you uploaded file is named, or where you were when you visited a particular website) can expose just as much information about you as the “regular” data it is associated with, so it deserves the same sort of privacy protections as “regular” data.
    • John Lemke
       
      What is Metadate... then discuss
  • The report merely recommended that the government look into the issue.
    • John Lemke
       
      Did the report give a strong enough recommendation? "looking into" and doing are much different
  • several other government reports have taken a much stronger stance and explicitly stated that metadata deserves the same level of privacy protections as “regular” data.
  • We think the report should have followed the lead of the PCAST report and acknowledged that the distinction between data and metadata is an artificial one, and recommended the appropriate reforms.
    • John Lemke
       
      I very strongly agree.  The report failed in this area.
  • the White House suggested advancing the Consumer Privacy Bill of Rights, which includes the idea that “consumers have a right to exercise control over what personal data companies collect from them and how they use it,” as well as “a right to access and correct personal data.”
  • Consumers have a right to know when their data is exposed, whether through corporate misconduct, malicious hackers, or under other circumstances. Recognizing this important consumer safeguard, the report recommends that Congress “should pass legislation that provides a single national data breach standard along the lines of the Administration's May 2011 Cybersecurity legislative proposal.”
  • While at first blush this may seem like a powerful consumer protection, we don’t think that proposal is as strong as existing California law. The proposed federal data breach notification scheme would preempt state notification laws, removing the strong California standard and replacing it with a weaker standard.
    • John Lemke
       
      In other words, it failed at what can be done and it would actually lower standards when compared to what California has in place currently.
  • We were particularly disconcerted
  • the Fort Hood shooting by Major Nidal Hasan
    • John Lemke
       
      WTF? how did he get in this group?
  • two big concerns
  • First, whistleblowers are simply not comparable to an Army officer who massacres his fellow soldiers
  • Secondly, the real big-data issue at play here is overclassification of enormous quantities of data.
  • Over 1.4 million people hold top-secret security clearances. In 2012, the government classified 95 million documents. And by some estimates, the government controls more classified information than there is in the entire Library of Congress.
    • John Lemke
       
      Don't leave this stat out.  More classified documents than LOC documents.  WTF? A "democracy" with more secret documents than public?
  • The report argues that in today’s connected world it’s impossible for consumers to keep up with all the data streams they generate (intentionally or not), so the existing “notice and consent” framework (in which companies must notify and get a user’s consent before collecting data) is obsolete. Instead, they suggest that more attention should be paid to how data is used, rather than how it is collected.
    • John Lemke
       
      This is the most troubling part perhaps,  isn't the collection without consent where the breech of privacy begins?
    • John Lemke
       
      "notice and consent"
  • An unfortunate premise of this argument is that automatic collection of data is a given
  • While we agree that putting more emphasis on responsible use of big data is important, doing so should not completely replace the notice and consent framework.
  • Despite being a fairly thorough analysis of the privacy implications of big data, there is one topic that it glaringly omits: the NSA’s use of big data to spy on innocent Americans.
    • John Lemke
       
      If we ignore it, it will go away?  Did they not just mostly ignore it and accept it as a given for corporations and completely ignore it regarding the government? Pretty gangster move isn't it?
  • Even though the review that led to this report was announced during President Obama’s speech on NSA reform, and even though respondents to the White House’s Big Data Survey “were most wary of how intelligence and law enforcement agencies are collecting and using data about them,” the report itself is surprisingly silent on the issue.2 This is especially confusing given how much the report talks about the need for more transparency in the private sector when it comes to big data. Given that this same logic could well be applied to intelligence big data programs, we don’t understand why the report did not address this vital issue.
John Lemke

Earth's Impending Magnetic Flip - Scientific American - 0 views

  • The European Space Agency's satellite array dubbed “Swarm” revealed that Earth's magnetic field is weakening 10 times faster than previously thought, decreasing in strength about 5 percent a decade rather than 5 percent a century. A weakening magnetic field may indicate an impending reversal, which scientists predict could begin in less than 2,000 years. Magnetic north itself appears to be moving toward Siberia.
  • There is a good chance the weakening magnetic field that the Swarm satellites observed will not lead to a full flip. Indeed, Glatzmaier notes that there have been several false starts over geologic history. The intensity of Earth's magnetic field, though waning, now equals its average strength over millions of years. The field would need to weaken at its current rate for around 2,000 years before the reversal process actually begins.
  • It is hard to know how a geomagnetic reversal would impact our modern-day civilization, but it is unlikely to spell disaster. Although the field provides essential protection from the sun's powerful radiation, fossil records reveal no mass extinctions or increased radiation damage during past reversals. A flip could possibly interfere with power grids and communications systems—external magnetic field disturbances have burned out transformers and caused blackouts in the past. But Glatzmaier is not worried. “A thousand years from now we probably won't have power lines,” he says. “We'll have advanced so much that we'll almost certainly have the technology to cope with a magnetic-field reversal.”
    • John Lemke
       
      Likely not the end of the world for past reversals have not show evidence of mass extinctions.
John Lemke

Federal Prosecutors, in a Policy Shift, Cite Warrantless Wiretaps as Evidence - NYTimes... - 0 views

  • The practice contradicted what Mr. Verrilli had told the Supreme Court last year in a case challenging the law, the FISA Amendments Act of 2008. Legalizing a form of the Bush administration’s program of warrantless surveillance, the law authorized the government to wiretap Americans’ e-mails and phone calls without an individual court order and on domestic soil so long as the surveillance is “targeted” at a foreigner abroad. A group of plaintiffs led by Amnesty International had challenged the law as unconstitutional. But Mr. Verrilli last year urged the Supreme Court to dismiss the case because those plaintiffs could not prove that they had been wiretapped. In making that argument, he said a defendant who faced evidence derived from the law would have proper legal standing and would be notified, so dismissing the lawsuit by Amnesty International would not close the door to judicial review of the 2008 law. The court accepted that logic, voting 5-to-4 to dismiss the case. In a statement, Patrick Toomey, staff attorney with the American Civil Liberties Union, which had represented Amnesty International and the other plaintiffs, hailed the move but criticized the Justice Department’s prior practice.
  • Still, it remains unclear how many other cases — including closed matters in which convicts are already service prison sentences — involved evidence derived from warrantless wiretapping in which the National Security Division did not provide full notice to defendants, nor whether the department will belatedly notify them. Such a notice could lead to efforts to reopen those cases.
John Lemke

Teaching robots to move like humans (w/ Video) - 0 views

  •  
    "It's important to build robots that meet people's social expectations because we think that will make it easier for people to understand how to approach them and how to interact with them," said Andrea Thomaz, assistant professor in the School of Interactive Computing at Georgia Tech's College of Computing. Thomaz, along with Ph.D. student Michael Gielniak, conducted a study in which they asked how easily people can recognize what a robot is doing by watching its movements.
1 - 18 of 18
Showing 20 items per page