×
Medicine

Why Can't Big Government Launch a Website? 786

MarkWhittington writes "Glenn Reynolds, the purveyor of Instapundit, asked the pertinent question, 'If big government can put a man on the moon, why can't it put up a simple website without messing it up?' The answer, as it turns out, is a rather simple one. The Apollo program, that President John F. Kennedy mandated to put a man on the moon and return him to the Earth, was a simple idea well carried out for a number of reasons. The primary one was that Congress did not pass a 1,800 or so page bill backed up by a mind-numbing amount of regulations mandating how NASA would do it. The question of how to conduct the lunar voyages was left up to the engineers at NASA and the aerospace industry at the time. The government simply provided the resources necessary to do the job and a certain degree of oversight. Imagine if President Obama had stated, 'I believe the nation should commit itself to the goal of enabling all Americans to access affordable health insurance' but then left the how to do it to some of the best experts in health care and economics without partisan interference."
United States

Israel Helped the NSA Spy on Former French President According To Documents 215

rtoz writes "It wasn't the US government breaking into the private communications of former French President Nicolas Sarkozy, according to top secret documents unearthed by Edward Snowden and published in Le Monde – it was the Israelis. A four-page internal précis regarding a visit to Washington by two top French intelligence officials denies the NSA or any US intelligence agency was behind the May 2012 attempted break-in – which sought to implant a monitoring device inside the Elysee Palace's communications system – but instead fingers the Israelis, albeit indirectly. A few days back, Le Monde reported that the NSA Intercepted French Telephone Calls 'On a Massive Scale' ."
Privacy

NSA Chief Keith Alexander Takes His PRISM Pitch To YouTube 165

Daniel_Stuckey writes "There's definitely something strange about the video's attempt at looking/sounding like a NOVA episode. Alexander, who defended the agency at Black Hat this summer and recently announced his retirement next year, takes care to emphasize the agency's privacy compliance precautions and oversight. 'We have not had any willful or knowing violations in those programs,' he says referring to sections 215 and 702 of the Patriot Act, which relate to the telephone metadata and PRISM programs respectively. 'There have been [violations] in other programs, but not in those two.'"
Japan

Japan Refused To Help NSA Tap Asia's Internet 375

An anonymous reader writes "The NSA sought the Japanese government's cooperation to wiretap fiber-optic cables carrying phone and data across the Asia-Pacific region but the request was rejected. The NSA wanted to intercept personal information including Internet activity and phone calls passing through Japan from Asia including China. The Japanese government refused because it was illegal and would need to involve a massive number of private sector workers. Article 35 of the Japanese Constitution protects against illegal search and seizure."
United States

German Report: Obama Aware of Merkel Spying Since 2010 280

First time accepted submitter pupsocket writes "Yesterday the German newspaper of record, Frankfurter Allgemeine, reported that the President told German Chancellor Merkel that he would have stopped the tap on her phone had he known about it. Today, another German paper, Bild am Sonntag, quoted U.S. Intelligence sources that the President had been briefed in 2010. 'Obama did not halt the operation but rather let it continue,' the newspaper quoted a high-ranking NSA official as saying."
Privacy

Federal Prosecutors, In a Policy Shift, Cite Warrantless Wiretaps As Evidence 321

schwit1 sends this quote from the NY Times "The Justice Department for the first time has notified a criminal defendant that evidence being used against him came from a warrantless wiretap, a move that is expected to set up a Supreme Court test of whether such eavesdropping is constitutional. The government's notice allows the defendant's lawyer to ask a court to suppress the evidence by arguing that it derived from unconstitutional surveillance, setting in motion judicial review of the eavesdropping. ... The practice contradicted what [Solicitor General Donald B. Verrilli Jr.] had told the Supreme Court last year in a case challenging the law, the FISA Amendments Act of 2008. Legalizing a form of the Bush administration’s program of warrantless surveillance, the law authorized the government to wiretap Americans’ e-mails and phone calls without an individual court order and on domestic soil so long as the surveillance is “targeted” at a foreigner abroad. A group of plaintiffs led by Amnesty International had challenged the law as unconstitutional. But Mr. Verrilli last year urged the Supreme Court to dismiss the case because those plaintiffs could not prove that they had been wiretapped. In making that argument, he said a defendant who faced evidence derived from the law would have proper legal standing and would be notified, so dismissing the lawsuit by Amnesty International would not close the door to judicial review of the 2008 law. The court accepted that logic, voting 5-to-4 to dismiss the case."
Encryption

ACLU: Lavabit Was 'Fatally Undermined' By Demands For Encryption Keys 230

An anonymous reader writes "When encrypted email provider Lavabit shut down in August, it was because U.S. authorities demanded the company release encryption keys to get access to certain accounts. Lavabit's founder, Ladar Levison, is facing contempt of court charges for his refusal to acquiesce to their demands. But now the ACLU has filed a 'friend of the court' brief (PDF) in support of Levison, saying that the government's demand 'fatally undermined' the secure email service. 'Lavabit's business was predicated on offering a secure email service, and no company could possible tell its clients that it offers a secure service if its keys have been handed over to the government.' The ACLU added, 'The district court's contempt holding should be reversed, because the underlying orders requiring Lavabit to disclose its private keys imposed an unreasonable burden on the company. Although innocent third parties have a duty to assist law enforcement agents in their investigations, they also have a right not to be compelled "to render assistance without limitation regardless of the burden involved."' Lavabit is also defending itself by claiming a violation of the 4th amendment has occurred."
Electronic Frontier Foundation

Ten Steps You Can Take Against Internet Surveillance 234

Hugh Pickens DOT Com writes "Danny O'Brien writes for the EFF that as the NSA's spying has spread, more and more ordinary people want to know how they can defend themselves from surveillance online. 'The bad news is: if you're being personally targeted by a powerful intelligence agency like the NSA, it's very, very difficult to defend yourself,' writes O'Brien. 'The good news, if you can call it that, is that much of what the NSA is doing is mass surveillance on everybody. With a few small steps, you can make that kind of surveillance a lot more difficult and expensive, both against you individually, and more generally against everyone.' Here's ten steps you can take to make your own devices secure: Use end-to-end encryption; Encrypt as much communications as you can; Encrypt your hard drive; Use Strong passwords; Use Tor; Turn on two-factor (or two-step) authentication; Don't click on attachments; Keep software updated and use anti-virus software; Keep extra secret information extra secure with Truecrypt; and Teach others what you've learned. 'Ask [your friends] to sign up to Stop Watching Us and other campaigns against bulk spying. Run a Tor node; or hold a cryptoparty. They need to stop watching us; and we need to start making it much harder for them to get away with it.'"
Piracy

File-Sharing Site Was Actually an Anti-Piracy Honeypot 225

An anonymous reader writes "The administrator of file-sharing site UploaderTalk shocked and enraged his userbase a few days ago when he revealed that the site was nothing more than a honeypot set up by a company called Nuke Piracy. The main purpose of the site had been to gather data on its users. The administrator said, 'I collected info on file hosts, web hosts, websites. I suckered $#!&loads of you. I built a history, got the trust of some very important people in the warez scene collecting information and data all the time.' Nobody knows what Nuke Piracy is going to do with the data, but it seems reasonable to expect lawsuits and the further investigation of any services the users discussed. His very public betrayal is likely meant to sow discord and distrust among the groups responsible for distributing pirated files."
Bitcoin

FBI Seized 144,000 Bitcoins ($28.5 Million) From Silk Road Bust 162

SonicSpike writes "An FBI official notes that the bureau has located and seized a collection of 144,000 bitcoins, the largest seizure of that cryptocurrency ever, worth close to $28.5 million at current exchange rates. It believes that the stash belonged to Ross Ulbricht, the 29-year-old who allegedly created and managed the Silk Road, the popular anonymous drug-selling site that was taken offline by the Department of Justice after Ulbricht was arrested earlier this month and charged with engaging in a drug trafficking and money laundering conspiracy as well as computer hacking and attempted murder-for-hire. The FBI official wouldn't say how the agency had determined that the Bitcoin 'wallet' — a collection of Bitcoins at a single address in the Bitcoin network — belonged to Ulbricht, but it was sure they were his. 'This is his wallet,' said the FBI official. 'We seized this from DPR,' the official added, referring to the pseudonym 'the Dread Pirate Roberts,' which prosecutors say Ulbricht allegedly used while running the Silk Road."
United Kingdom

UK Telcos Went Above and Beyond To Cooperate With GCHQ 88

An anonymous reader writes with this news from the Guardian: "GCHQ lobbied furiously to keep secret the fact that telecoms firms had gone 'well beyond' what they were legally required to do to help intelligence agencies' mass interception of communications, both in the UK and overseas. GCHQ feared a legal challenge under the right to privacy in the Human Rights Act if evidence of its surveillance methods became admissable in court. GCHQ assisted the Home Office in lining up sympathetic people to help with "press handling", including the Liberal Democrat peer and former intelligence services commissioner Lord Carlile, who this week criticised the Guardian for its coverage of mass surveillance by GCHQ and the US National Security Agency."
EU

EU Parliament: Other Countries Spy, But Less Than the UK, US 170

itwbennett writes "An E.U. Parliament survey of 5 member states found that 4 of the 5 (U.K., France, Germany and Sweden) engage in bulk collection of data. Only the Netherlands doesn't, but that's not because it doesn't want to. In fact, The Netherlands is currently setting up an agency for that purpose. France, which summoned the U.S. ambassador to explain allegations that the NSA spied on Alcatel-Lucent, ranks fifth in the world in metadata collection. And Sweden? Its National Defence Radio Establishment (FRA) is alleged to have been running 'upstreaming' operations (tapping directly into the communications infrastructure as a means to intercept data) for the collection of private data — collecting both the content of messages as well as metadata of communications crossing Swedish borders through fibre-optic cables from the Baltic Sea."
Piracy

Antigua Looks Closer To Legal "Piracy" of US-Copyrighted Works 327

Mark Gibbs writes "Shiver me timbers: Antigua and Barbuda's 'WTO Remedies Implementation Committee', is said to be recommending the establishment by the Government of Antigua & Barbuda of a statutory body to own, manage and operate the ultimate platform to be created for the monetisation or other exploitation of the suspension of American intellectual property rights authorised earlier this year by the WTO ... Additionally, an announcement regarding the opening of tenders for private sector participation in the operating of the platform should be announced shortly. Arghhh ... matey!" See also this Slashdot post (from 2007) for some background.
Security

LinkedIn's New Mobile App Called 'a Dream For Attackers' 122

An anonymous reader writes with a link to the New York Times' summary of a security and privacy disaster that's been inspiring angry posts on various social networks, including LinkedIn itself: "Security researchers are calling LinkedIn's new mobile app, Intro, a dream come true for hackers or intelligence agencies... Intro redirects e-mail traffic to and from users' iPhones and iPads through LinkedIn's servers, then analyzes and scrapes those e-mails for relevant data and adds pertinent LinkedIn details... Researchers liken that redirection to a so-called man-in-the-middle attack in which hackers, or more recently, intelligence agencies, intercept Internet traffic en route to its destination and do what they will with it."
Government

Jeffrey Zients Appointed To Fix Healthcare.gov 250

An anonymous reader writes with news that the Obama administration has appointed Jeffrey Zients to lead the effort to revamp Healthcare.gov after its trouble rollout earlier this month. Zients said, "By the end of November, healthcare.gov will work smoothly for the vast majority of users." Obama created a position for Zients within the government in 2009, when he was made the OMB's Chief Performance Officer. The purpose of his position was to analyze and streamline the government's budget concerns. "Healthcare.gov covers people in the 36 states that declined to run their own health-insurance exchanges. About 700,000 applications have been begun nationwide, and half of them have come in through the website. The White House aims to have 7M uninsured Americans covered by the scheme by the end of March." Zients's appointment came after a contentious House Committee hearing about the healthcare website, in which many were blamed and few took responsibility. The government also said that contractor Quality Software Services Inc., a subsidiary of UnitedHealth group, would "oversee the entire operation" of Healthcare.gov. QSSI has already done work on the website, building the pipeline that transfers data between the insurance exchanges and the federal agencies.
Government

Feds Confiscate Investigative Reporter's Confidential Files During Raid 622

schwit1 writes "Using a warrant to search for guns, Homeland security officers and Maryland police confiscated a journalist's confidential files. The reporter had written a series of articles critical of the TSA. It appears that the raid was specifically designed to get her files, which contain identifying information about her sources in the TSA. 'In particular, the files included notes that were used to expose how the Federal Air Marshal Service had lied to Congress about the number of airline flights there were actually protecting against another terrorist attack,' Hudson [the reporter] wrote in a summary about the raid provided to The Daily Caller. Recalling the experience during an interview this week, Hudson said: 'When they called and told me about it, I just about had a heart attack.' She said she asked Bosch [the investigator heading the raid] why they took the files. He responded that they needed to run them by TSA to make sure it was 'legitimate' for her to have them. '"Legitimate" for me to have my own notes?' she said incredulously on Wednesday. Asked how many sources she thinks may have been exposed, Hudson said: 'A lot. More than one. There were a lot of names in those files. This guy basically came in here and took my anonymous sources and turned them over — took my whistleblowers — and turned it over to the agency they were blowing the whistle on,' Hudson said. 'And these guys still work there.'"
Piracy

Apple Converting Trial and Pirated iWork, iLife and Aperture To Full Versions 134

tlhIngan writes "One aspect about the new OS X Mavericks release was that all Apple produced software was to be downloadable and updatable through the Mac App Store. However, this raises the obvious question: what happens to users who bought the software beforehand? Initial reports showed that the Mac App Store scanned your hard drive for software and offered to associate it with your Apple ID. The scans even found trial and pirated versions and upgraded those to fully-licensed versions. Even more interestingly, this is not a bug, and it appears Apple is turning a blind eye to the practice, giving away copies of iLife, iWork and Aperture to users who own trial or even pirated versions of the apps. Apple has also recently stopped providing downloadable trial versions of iLife, iWork and Aperture from their web site."
Privacy

Citizen Eavesdrops On Former NSA Director Michael Hayden's Phone Call 390

McGruber writes "The Washington Post has the news that former head of the NSA Michael Hayden took a call while on the Acela train between D.C. and Boston. Hayden was talking to a journalist 'on background', which means the reporter is not allowed to cite Hayden by name. Unfortunately for Hayden, another train passenger overhead the call and live-tweeted it. 'Mattzie continued to livetweet Hayden’s conversations slamming the Obama administration, all the while insisting that he be referred to only on background. The conversation also seemed to touch on Hayden’s time as the Director of the Central Intelligence Agency under President George W. Bush as well. "Hayden was bragging about rendition and black sites a minute ago," Mattzie wrote. Hayden has in the past defended the use of waterboarding against detainees held in various sites around the world, and dismissed torture as a "legal term."'"
United States

NSA Monitored Calls of 35 World Leaders 310

Hugh Pickens DOT Com writes "The Guardian reports that the NSA monitored the phone conversations of 35 world leaders after being given the numbers by an official in another U.S. government department. According to a classified document provided by whistleblower Edward Snowden, the NSA encourages senior officials in its 'customer' departments, such the White House, State and the Pentagon, to share their 'Rolodexes' so the agency can add the phone numbers of leading foreign politicians to their surveillance systems. The NSA memo dated October 2006 that was obtained by the Guardian suggests that such surveillance was not isolated, as the agency routinely monitors the phone numbers of world leaders – and even asks for the assistance of other U.S. officials to do so. However, the memo acknowledges that eavesdropping on the numbers had produced 'little reportable intelligence.' At the daily briefing on Thursday, White House press secretary Jay Carney again refused to answer repeated questions about whether the U.S. had spied on German Chancellor Angela Merkel's calls in the past."
Crime

UK Police Seize 3D-Printed 'Gun Parts,' Which Are Actually Spare Printer Parts 279

nk497 writes "Police in Manchester have arrested a man and seized what they claim are 3D printed components to a gun. They made the arrest after a 'significant' discovery of a 3D printed 'trigger' and 'magazine,' saying they were now testing the parts to see if they were viable. 3D printing experts, however, said the objects were actually spare parts for the printer. 'As soon as I saw the picture... I instantly thought, "I know that part,"' said Scott Crawford, head of 3D printing firm Revolv3D. 'They designed an upgrade for the printer soon after it was launched, and most people will have downloaded and upgraded this part within their printer. It basically pulls the plastic filament, and it used to jam an awful lot. The new system that they've put out, which includes that little lever that they're claiming is the trigger, is most definitely the same part.'"

Slashdot Top Deals