Skip to main content

Home/ Indie Nation/ Group items matching "ares" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
3More

Forest Service says media needs photography permit in wilderness areas, alarming First ... - 0 views

  • "It's pretty clearly unconstitutional," said Gregg Leslie, legal defense director at the Reporters Committee for Freedom of the Press in Alexandria, Va. "They would have to show an important need to justify these limits, and they just can't."
  • Close didn't cite any real-life examples of why the policy is needed or what problems it's addressing. She didn't know whether any media outlets had applied for permits in the last four years.
  • "The Forest Service needs to rethink any policy that subjects noncommercial photographs and recordings to a burdensome permitting process for something as simple as taking a picture with a cell phone," Wyden said. "Especially where reporters and bloggers are concerned, this policy raises troubling questions about inappropriate government limits on activity clearly protected by the First Amendment."
7More

Hackers Using 'Shellshock' Bash Vulnerability to Launch Botnet Attacks - 0 views

  • Researchers on Thursday discovered a critical remotely exploitable vulnerability in the widely used command-line shell GNU Bourne Again Shell (Bash), dubbed "Shellshock" which affects most of the Linux distributions and servers worldwide, and may already have been exploited in the wild to take over Web servers as part of a botnet that is currently trying to infect other servers as well.
  • the vulnerability is already being used maliciously by the hackers.
  • There is as of yet no official patch that completely addresses both vulnerabilities, including the second, which allows an attacker to overwrite files on the targeted system.
  • ...3 more annotations...
  • It's things like CGI scripts that are vulnerable, deep within a website (like CPanel's /cgi-sys/defaultwebpage.cgi)," Graham wrote in a blog post. "Getting just the root page is the thing least likely to be vulnerable. Spidering the site and testing well-known CGI scripts (like the CPanel one) would give a lot more results—at least 10x." In addition, Graham said, "this thing is clearly wormable and can easily worm past firewalls and infect lots of systems. One key question is whether Mac OS X and iPhone DHCP service is vulnerable—once the worm gets behind a firewall and runs a hostile DHCP server, that would be 'game over' for large networks."
  • 32 ORACLE PRODUCTS VULNERABLE
  • PATCH ISSUED, BUT INCOMPLETE
  •  
    "Researchers on Thursday discovered a critical remotely exploitable vulnerability in the widely used command-line shell GNU Bourne Again Shell (Bash), dubbed "Shellshock" which affects most of the Linux distributions and servers worldwide, and may already have been exploited in the wild to take over Web servers as part of a botnet that is currently trying to infect other servers as well."
2More

Mars Orbiter Mission looks to sniff methane on comet - The Times of India - 0 views

  • BANGALORE: India's Mars Orbiter Mission (MOM) will look to have a date with the Siding Spring comet, which will pass very close to the Red Planet on October 19, Isro chairman K Radhakrishnan said on Thursday.
  • Asked how Nasa could do reprogramming on its MAVEN spacecraft to study the comet, Radhakrishnan said: "MAVEN reached there before us and has completed the orbit around the Red Planet. I have received mails about what they are going to do, and we know what we should. But MOM has to ascertain its position. It will be known in 2-3 days."
4More

World's Largest Solar Array Set to Crank Out 290 Megawatts of Sunshine Power - Scientif... - 0 views

  • Agua Caliente, the largest photovoltaic solar power facility in the world, was completed last week in Arizona.
  • ive million solar panels that span the equivalent of two Central Parks in the desert between Yuma and Phoenix. It generates 290 megawatts of power—enough electricity to fuel 230,000 homes in neighboring California at peak capacity.
  • The project, which cost a total of $1.8 billion to construct, received a million-dollar loan from the Loan Programs Office. Under its “SunShot” initiative (so-named in the spirit of president John F. Kennedy’s “moon shot” program), the DoE provides guaranteed loans to unproved ventures in solar power in the hopes of promoting innovation and making the technology more cost-effective.* Although Agua Caliente (owned by U.S. energy giant NRG Energy and partner MidAmerican Solar) is now the largest photovoltaic solar facility in the world, it probably will not hold that distinction for long. Other massive solar panel facilities, such as Antelope Valley Solar Ranch One in California’s Mojave Desert, are rapidly springing up across the Southwest.
  • ...1 more annotation...
  • The energy contained in just one hour of sunlight could power the world for a year, if only it could be harnessed.
8More

New Zealand Launched Mass Surveillance Project While Publicly Denying It - The Intercept - 0 views

  • Documents provided by NSA whistleblower Edward Snowden show that the government worked in secret to exploit a new internet surveillance law enacted in the wake of revelations of illegal domestic spying to initiate a new metadata collection program that appeared designed to collect information about the communications of New Zealanders.
  • Those actions are in direct conflict with the assurances given to the public by Prime Minister John Key (pictured above), who said the law was merely designed to fix “an ambiguous legal framework” by expressly allowing the agency to do what it had done for years, that it “isn’t and will never be wholesale spying on New Zealanders,” and the law “isn’t a revolution in the way New Zealand conducts its intelligence operations.”
  • Snowden explained that “at the NSA, I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called ‘X KEYSCORE.”" He further detailed that “the GCSB provides mass surveillance data into XKEYSCORE. They also provide access to the communications of millions of New Zealanders to the NSA at facilities such as the GCSB facility in Waihopai, and the Prime Minister is personally aware of this fact.”
  • ...4 more annotations...
  • Top secret documents provided by the whistleblower demonstrate that the GCSB, with ongoing NSA cooperation, implemented Phase I of the mass surveillance program code-named “Speargun” at some point in 2012
  • Over the weekend, in anticipation of this report, Key admitted for the first time that the GCSB did plan a program of mass surveillance aimed at his own citizens, but claimed that he ultimately rejected the program before implementation. Yesterday, after The Intercept sought comment from the NSA, the Prime Minister told reporters in Auckland that this reporting was referring merely to “a proposed widespread cyber protection programme that never got off the ground.” He vowed to declassify documents confirming his decision.
  • That legislation arose after it was revealed in 2012 that the GCSB illegally surveilled the communications of Megaupload founder Kim Dotcom, a legal resident of New Zealand. New Zealand law at the time forbade the GCSB from using its surveillance apparatus against citizens or legal residents. That illegal GCSB surveillance of Dotcom was followed by a massive military-style police raid by New Zealand authorities on his home in connection with Dotcom’s criminal prosecution in the United States for copyright violations. A subsequent government investigation found that the GCSB not only illegally spied on Dotcom but also dozens of other citizens and legal residents. The deputy director of GCSB resigned. The government’s response to these revelations was to refuse to prosecute those who ordered the illegal spying and, instead, to propose a new law that would allow domestic electronic surveillance.
    • John Lemke
       
      The Dotcom raid was ruled illegal.  Yet the Dotcom spying was exactly the type of activity of this plan.
  • n high-level discussions between the Key government and the NSA, the new law was clearly viewed as the crucial means to empower the GCSB to engage in metadata surveillance. On more than one occasion, the NSA noted internally that Project Speargun, in the process of being implemented, could not and would not be completed until the new law was enacted.
3More

Report: NSA among worst offenders of mass surveillance, Snowden says - CNN.com - 0 views

  • "The world has learned a lot in a short amount of time about irresponsibly operated security agencies and, at times, criminal surveillance programs. Sometimes the agencies try to avoid controls," Snowden wrote, according to the news magazine. "While the NSA and GCHQ (the British national security agency) appear to be the worst offenders -- at least according to the documents that are currently public -- we cannot forget that mass surveillance is a global problem and needs a global solution."
  • A recent report by Der Spiegel, citing documents provided by Snowden, alleged the NSA monitored German Chancellor Angela Merkel's cell phone. Some reports also suggest the United States carried out surveillance on French and Spanish citizens.
  • "If he wants to come back and open up to the responsibility of the fact that he took and stole information, he violated his oath, he disclosed classified information -- that by the way has allowed three different terrorist organizations, affiliates of al Qaeda to change the way they communicate -- I'd be happy to have that discussion with him," Rogers said on "Face the Nation."
2More

Federal Prosecutors, in a Policy Shift, Cite Warrantless Wiretaps as Evidence - NYTimes... - 0 views

  • The practice contradicted what Mr. Verrilli had told the Supreme Court last year in a case challenging the law, the FISA Amendments Act of 2008. Legalizing a form of the Bush administration’s program of warrantless surveillance, the law authorized the government to wiretap Americans’ e-mails and phone calls without an individual court order and on domestic soil so long as the surveillance is “targeted” at a foreigner abroad. A group of plaintiffs led by Amnesty International had challenged the law as unconstitutional. But Mr. Verrilli last year urged the Supreme Court to dismiss the case because those plaintiffs could not prove that they had been wiretapped. In making that argument, he said a defendant who faced evidence derived from the law would have proper legal standing and would be notified, so dismissing the lawsuit by Amnesty International would not close the door to judicial review of the 2008 law. The court accepted that logic, voting 5-to-4 to dismiss the case. In a statement, Patrick Toomey, staff attorney with the American Civil Liberties Union, which had represented Amnesty International and the other plaintiffs, hailed the move but criticized the Justice Department’s prior practice.
  • Still, it remains unclear how many other cases — including closed matters in which convicts are already service prison sentences — involved evidence derived from warrantless wiretapping in which the National Security Division did not provide full notice to defendants, nor whether the department will belatedly notify them. Such a notice could lead to efforts to reopen those cases.
1More

FBI pushes for surveillance backdoors in Web 2.0 tools - 0 views

  •  
    The FBI pushed Thursday for more built-in backdoors for online communication, but beat a hasty retreat from its earlier proposal to require providers of encrypted communications services to include a backdoor for law enforcement wiretaps. LUMPY HAS NOTES BELOW ties in with securirty and cyber attack.. use it as excuse
1More

Swedes may soon exchange postage stamps for SMS codes - 0 views

  •  
    that ritual is about to be replaced with a more high-tech one: people may soon be able to pay for their postage via text message, thereby eliminating the need for a stamp. The system works like this: Swedes will be able to send a text message to the postal service saying that they want postage for a letter. The postal service will then presumably charge an account on file, then respond with another text that contains a code. The letter-sender will then write the code on the envelope to show that postage had been paid.
2More

Copyright and the DMCA | WFUV Radio - 0 views

  • Some of these DMCA rules outline restrictions on the frequency some songs can be played. In any 3-hour period, we can webcast: No more than 3 songs from one album;no more than 2 played consecutively No more than 4 songs from a set/compilation;no more than 3 played consecutively No more than 4 recorded songs by the same artist(live studio appearances are okay)
  •  
    List streaming radio restrictions.
1More

Payback time: First patent troll ordered to pay "extraordinary case" fees | Ars Technica - 0 views

  • In the recent Octane Fitness case (PDF), the Supreme Court changed the test for fee-shifting precisely to deter behavior such as Lumen's, Cote found. Lumen didn't do "any reasonable pre-suit investigation," and filed a number of near-identical "boilerplate" complaints in a short time frame. That all suggests "Lumen’s instigation of baseless litigation is not isolated to this instance, but is instead part of a predatory strategy aimed at reaping financial advantage from the inability or unwillingness of defendants to engage in litigation against even frivolous patent lawsuits."
1More

NSA reportedly targeted as many as 122 world leaders for surveillance | The Verge - 0 views

  • The documents, leaked to the publications by Edward Snowden, contain a list of 11 world leaders that have been targeted by a system known as Nymrod — however the document implies the actual number targeted was 122. Nymrod is reportedly a system designed to automatically extract citations ("cites") out of a multiplicity of sources, including voice and computer communications. German Chancellor Angela Merkel is listed by name, as are more obvious targets like Syrian president Bashar Asad and former Ukranian prime minister Yulia Tymoshenko. Various leaders apparently have "cites" automatically added to to a "Target Knowledge Database."
4More

BBC News - Deep sea 'mushroom' may be new branch of life - 0 views

  • The authors of the article note several similarities with the bizarre and enigmatic soft-bodied life forms that lived between 635 and 540 million years ago - the span of Earth history known as the Ediacaran Period.
  • The authors of the paper recognise two new species of mushroom-shaped animal: Dendrogramma enigmatica and Dendrogramma discoides.
  • The new organisms are multicellular but mostly non-symmetrical, with a dense layer of gelatinous material between the outer skin cell and inner stomach cell layers. The researchers did find some similarities to other animal groupings, such as the Cnidaria - the phylum that comprises corals and jellyfish - and the Ctenophora, which includes the marine organisms known as comb jellies. But the new organisms did not fulfil all the criteria required for inclusion in either of those categories.
  • ...1 more annotation...
  • One way to resolve the question surrounding Dendrogramma's affinities would be to examine its DNA, but new specimens will need to be found. The original samples were first preserved in formaldehyde and later transferred to 80% alcohol, a mode of treatment that prevents analysis of genetic material.
2More

Tear Gas Is A Banned Chemical Weapon, But US Lobbying Made It Okay For Domestic Use... ... - 0 views

  • Years later, there was a push to officially renounce the use of chemical weapons in war, which became the chemical weapons treaty... but it included exceptions for domestic use.
  • I frankly think that we don't know much about the long-term effects, especially in civilian exposure with kids or elderly or people in the street who might have some kind of lung disease already. There's very few follow-up studies. These are very active chemicals that can cause quite significant injury, so I'm concerned about the increased use of these agents. [....] I'm very concerned that, as use has increased, tear gas has been normalized. The attitude now is like, this is safe and we can use it as much as we want.
« First ‹ Previous 101 - 120 of 120
Showing 20 items per page