Skip to main content

Home/ Groups/ Indie Nation
John Lemke

TSA agent confiscates sock monkey's toy pistol | KING5.com Seattle - 0 views

  • Rooster Monkburn" the cowboy sock monkey is without his pistol, thanks to a diligent TSA agent in St. Louis.
  • May said the TSA agent went through the bag, through the sewing supplies and found the two-inch long pistol. “She said ‘this is a gun,’” said May. “I said no, it’s not a gun it’s a prop for my monkey.” “She said ‘If I held it up to your neck, you wouldn’t know if it was real or not,’ and I said ‘really?’” said May.
John Lemke

Snowden leak examines gaming as a terrorist propaganda and training tool | Ars Technica - 0 views

  • But those leaked documents also include an in-depth report on the potential for games to be used as recruitment, training, and propaganda tools by extremist organizations.
  • Even if, as the report says, "the line between the ‘virtual’ world and the ‘real’ world is blurring, and to some users may be non-existent," most of the game-related terrorist training and planning scenarios laid out here seem a lot less likely than plain old non-game-related options. In any case, the leak of this report and the scenarios it outlines show that the security apparatus is interested in online games as more than just a place to spy on potential enemy communications.
John Lemke

Is China About to Scoop the Google Lunar XPRIZE? : Discovery News - 0 views

  • A $30 million Google-backed competition to land a spacecraft on the moon may be about to be scooped. China’s Chang’e 3 probe successfully put itself into lunar orbit on Friday in preparation for an attempted touchdown around Dec. 14.
  •  
    "A $30 million Google-backed competition to land a spacecraft on the moon may be about to be scooped. China's Chang'e 3 probe successfully put itself into lunar orbit on Friday in preparation for an attempted touchdown around Dec. 14."
John Lemke

FBI surveillance malware in bomb threat case tests constitutional limits | Ars Technica - 0 views

  • The FBI has an elite hacker team that creates customized malware to identify or monitor high-value suspects who are adept at covering their tracks online, according to a published report.
  • as the capability to remotely activate video cameras and report users' geographic locations—is pushing the boundaries of constitutional limits on searches and seizures
  • Critics compare it to a physical search that indiscriminately seizes the entire contents of a home, rather than just those items linked to a suspected crime. Former US officials said the FBI uses the technique sparingly, in part to prevent it from being widely known.
  • ...1 more annotation...
  • "We have transitioned into a world where law enforcement is hacking into people’s computers, and we have never had public debate,” Christopher Soghoian, principal technologist for the American Civil Liberties Union, told The Washington Post, speaking of the case against Mo. "Judges are having to make up these powers as they go along."
John Lemke

US Court Secretly Lets Government Share Megaupload Evidence With Copyright Industry | T... - 0 views

  • Apparently part of the issue for the original filing to reveal this information was that some copyright holders are getting antsy that as the case drags on, they won't also be able to file civil cases against Megaupload before the three-year statute of limitations expires. However, as Megaupload's lawyers point out, there is no urgency here since the government itself made no move to share this information over the past two years. If it really wanted to share the information it had ample time to make the request and allow Megaupload's lawyers to review and take part in the process, rather than trying to route around them entirely. I'm guessing the recent successes against IsoHunt and Hotfile may have contributed to the timing as well. The MPAA pretty clearly thinks it can use those two cases to go after Megaupload as well, outside of the criminal case which will continue.
John Lemke

NSA Is Tracking Mobile Phone Location On So Many People It Can't Handle The Data Storag... - 0 views

  • The NSA cannot know in advance which tiny fraction of 1 percent of the records it may need, so it collects and keeps as many as it can — 27 terabytes, by one account, or more than double the text content of the Library of Congress’s print collection.
  • NSA defends the program by saying that it uses the location data to find "unknown associates of known intelligence targets." Basically, it's tracking where everyone goes, just in case people end up spending time with people the NSA deems as being terrorists.
  • Elsewhere in the article, they quote NSA officials repeatedly saying that the program is "tuned to be looking outside the United States," but not saying it only collects info outside the US. Also, they make clear, once a person leaves the US, the NSA no longer believes the 4th Amendment applies to them, so their location is fair game in this giant database.. Asked for specific numbers, an NSA person said:
  • ...1 more annotation...
  • It’s awkward for us to try to provide any specific numbers..."
    • John Lemke
       
      Sad day when accountability becomes awkward.
    • John Lemke
       
      Sad day when accountability becomes awkward.
John Lemke

NSA collects nearly 5 billion cellphone location records per day | Ars Technica - 0 views

  • The Washington Post added another noteworthy finding to the growing pile of information leaked by former NSA contractor Edward Snowden: the NSA is collecting nearly five billion cellphone location records per day from across the world.
  • This gigantic data collection feeds a database that stores information on "hundreds of millions of devices," according to the documents obtained by
  • 27 terabytes
  • ...1 more annotation...
  • The paper spoke with an intelligence lawyer who continued to emphasize that this program focuses beyond the US, which seems to prevent the data from falling under the Fourth Amendment (unreasonable search and seizures).
John Lemke

2 million Facebook, Gmail and Twitter passwords stolen in massive hack - Dec. 4, 2013 - 0 views

  • The massive data breach was a result of keylogging software maliciously installed on an untold number of computers around the world,
  • The virus was capturing log-in credentials for key websites over the past month and sending those usernames and passwords to a server controlled by the hackers.
  • Of all the compromised services, Miller said he is most concerned with ADP. Those log-ins are typically used by payroll personnel who manage workers' paychecks. Any information they see could be viewed by hackers until passwords are reset.
  • ...1 more annotation...
  • But in a statement, ADP said that, "To [its] knowledge, none of ADP's clients has been adversely affected by the compromised credentials."
John Lemke

Report: NSA among worst offenders of mass surveillance, Snowden says - CNN.com - 0 views

  • "The world has learned a lot in a short amount of time about irresponsibly operated security agencies and, at times, criminal surveillance programs. Sometimes the agencies try to avoid controls," Snowden wrote, according to the news magazine. "While the NSA and GCHQ (the British national security agency) appear to be the worst offenders -- at least according to the documents that are currently public -- we cannot forget that mass surveillance is a global problem and needs a global solution."
  • A recent report by Der Spiegel, citing documents provided by Snowden, alleged the NSA monitored German Chancellor Angela Merkel's cell phone. Some reports also suggest the United States carried out surveillance on French and Spanish citizens.
  • "If he wants to come back and open up to the responsibility of the fact that he took and stole information, he violated his oath, he disclosed classified information -- that by the way has allowed three different terrorist organizations, affiliates of al Qaeda to change the way they communicate -- I'd be happy to have that discussion with him," Rogers said on "Face the Nation."
John Lemke

Former NSA Boss Says NSA Should Just Reveal Everything Itself And Move On | Techdirt - 0 views

  • Bobby R. Inman, who weathered his own turbulent period as N.S.A. director from 1977 to 1981, offers his hyper-secret former agency a radical suggestion for right now. "My advice would be to take everything you think Snowden has and get it out yourself," he said. "It would certainly be a shock to the agency. But bad news doesn't get better with age. The sooner they get it out and put it behind them, the faster they can begin to rebuild."
John Lemke

Kurt Eichenwald Claims Snowden Is A Chinese Spy And Leaks Are Just To Protect Their Cyb... - 0 views

  • And the attempts to tar and feather Ed Snowden continue. The latest is that famed reporter Kurt Eichenwald, who started attacking Ed Snowden months ago, has written up a long speculative article for Newsweek arguing that Ed Snowden has "escalated the cyber war" by giving China the necessary cover it needs to avoid reining in its own cyber attacks
  • That is, if you follow the bizarre logic here, without Snowden, Eichenwald believes that the US would have somehow convinced the Chinese to stop their cyber attack program. And, now because of Snowden, the Chinese can ignore that effort, by pointing out that the US is doing a ton of online hacking too.
  • Again, nearly everything about that statement is ridiculous. He didn't "leave all of the documents in Hong Kong." He provided heavily encrypted versions to a very small number of journalists, and then got rid of the files himself. Eichenwald takes that to mean he "left" them in Hong Kong, based on nothing, and all of this apparently means that Snowden is working for the Chinese (even though he left China pretty quickly).
John Lemke

Federal Prosecutors, in a Policy Shift, Cite Warrantless Wiretaps as Evidence - NYTimes... - 0 views

  • The practice contradicted what Mr. Verrilli had told the Supreme Court last year in a case challenging the law, the FISA Amendments Act of 2008. Legalizing a form of the Bush administration’s program of warrantless surveillance, the law authorized the government to wiretap Americans’ e-mails and phone calls without an individual court order and on domestic soil so long as the surveillance is “targeted” at a foreigner abroad. A group of plaintiffs led by Amnesty International had challenged the law as unconstitutional. But Mr. Verrilli last year urged the Supreme Court to dismiss the case because those plaintiffs could not prove that they had been wiretapped. In making that argument, he said a defendant who faced evidence derived from the law would have proper legal standing and would be notified, so dismissing the lawsuit by Amnesty International would not close the door to judicial review of the 2008 law. The court accepted that logic, voting 5-to-4 to dismiss the case. In a statement, Patrick Toomey, staff attorney with the American Civil Liberties Union, which had represented Amnesty International and the other plaintiffs, hailed the move but criticized the Justice Department’s prior practice.
  • Still, it remains unclear how many other cases — including closed matters in which convicts are already service prison sentences — involved evidence derived from warrantless wiretapping in which the National Security Division did not provide full notice to defendants, nor whether the department will belatedly notify them. Such a notice could lead to efforts to reopen those cases.
John Lemke

Feds confiscate investigative reporter's confidential files during raid | The Daily Caller - 0 views

  • A search warrant obtained by TheDC indicates that the August raid allowed law enforcement to search for firearms inside her home.
  • The document notes that her husband, Paul Flanagan, was found guilty in 1986 to resisting arrest in Prince George’s County. The warrant called for police to search the residence they share and seize all weapons and ammunition because he is prohibited under the law from possessing firearms. But without Hudson’s knowledge, the agents also confiscated a batch of documents that contained information about sources inside the Department of Homeland Security and the Transportation Security Administration, she said.
John Lemke

Petition Launched To Get The White House To Open Source Healthcare.gov Code | Techdirt - 0 views

  • Of course, there are a few issues with this. First of all, while things created by government employees is automatically public domain, works created by contractors is not. So while conceptually we can argue that the code should be open sourced, it's not required by law. Second, and more importantly, it's a lot harder to take proprietary code and then release it as open source, than it is to build code from the ground up to be open source (and it's even more difficult to make sure that code is actually useful for anything). Indeed, if the code had been open sourced from the beginning, perhaps they wouldn't make embarrassing mistakes like violating other open source licenses.
  • By this point, open sourcing the code isn't going to fix things, but if more attention is put on the issue of closed vs. open code in government projects, hopefully it means that government officials will recognize that it should be open source from the beginning for the next big government web project.
  • After the disastrous technological launch of the healthcare.gov website, built by political cronies rather than companies who understand the internet, there has been plenty of discussion as to why the code wasn't open sourced. At that link, there's a good discussion from On the Media, with Paul Ford, discussing what a big mistake it was that the government decided not to open source the code and be much more transparent about the process. It discusses the usual attacks on open source and why they almost certainly don't apply to this situation.
John Lemke

Climate change is 'absolutely' linked to wildfires, says UN chief | The Verge - 0 views

  •  
    "The head of a United Nations committee on climate change said this week that global warming is "absolutely" linked to a recent spate of wildfires and heat waves, while calling upon international leaders to address the matter with more urgency. Christiana Figueres, the Executive Secretary of the United Nations Framework Convention on Climate Change (UNFCCC), made the comments in a recent interview with CNN, as massive brushfires continue to rage across Australia"
John Lemke

Audacity Forum * View topic - Is there a way to set markers for a select? - 0 views

  •  
    This forum post explains how to set a marker with Audacity.
John Lemke

Former Microsoft Privacy Chief Says He No Longer Trusts The Company - HotHardware - 0 views

  • This is a fundamental problem for nations that aren't interested in exposing their traffic to American observation, whether they're engaged in nefarious activities or not. Long term, the problem could lead to the construction of digital firewalls, in which the United States is effectively isolated behind protective nodes built by local governments to scrub and redirect traffic away from potential capture points. This is directly in opposition to the central concept of the Internet, which is a dynamic structure capable of responding to outages or damage by routing around the problem.
« First ‹ Previous 141 - 160 of 382 Next › Last »
Showing 20 items per page