Forgot your password?
typodupeerror

Follow Slashdot stories on Twitter

Crime

Phoenix Introduces Draft Ordinance To Criminalize Certain Drone Uses 199

Posted by Soulskill
from the no-using-drones-to-attack-mexico dept.
Fubar writes: Two city council members from Phoenix, AZ are introducing "draft language" for public discussion that would make it illegal to use a drone to film people without their knowledge. The council members are worred about privacy of people in their own yards, even including the requirement that law enforcement obtain a warrant for drone surveillance. A violation of the ordinance would be a Class 1 misdemeanor, which carries up to a $2,500 fine and six months in jail.
China

Why Chinese Hackers Would Want US Hospital Patient Data 171

Posted by timothy
from the makes-great-gift-wrapping-too dept.
itwbennett (1594911) writes In a follow-up to yesterday's story about the Chinese hackers who stole hospital data of 4.5 million patients, IDG News Service's Martyn Williams set out to learn why the data, which didn't include credit card information, was so valuable. The answer is depressingly simple: people without health insurance can potentially get treatment by using medical data of one of the hacking victims. John Halamka, chief information officer of the Beth Israel Deaconess Medical Center and chairman of the New England Healthcare Exchange Network, said a medical record can be worth between $50 and $250 to the right customer — many times more than the amount typically paid for a credit card number, or the cents paid for a user name and password. "If I am one of the 50 million Americans who are uninsured ... and I need a million-dollar heart transplant, for $250 I can get a complete medical record including insurance company details," he said.
Government

Nuclear Regulator Hacked 3 Times In 3 Years 66

Posted by timothy
from the once-a-year-to-keep-in-practice dept.
mdsolar (1045926) writes with this disconcerting story from CNet about security breaches at the U.S. Nuclear Regulatory Commission, revealed in a new report to have been compromised three times in the last three years: The body that governs America's nuclear power providers said in an internal investigation that two of the hacks are suspected to have come from unnamed foreign countries, the news site Nextgov reported based on a Freedom of Information Act request. The source of the third hack could not be identified because the logs of the incident had been destroyed, the report said. Hackers, often sponsored by foreign governments, have targeted the US more frequently in recent years. A report (PDF) on attacks against government computers noted that there was a 35 percent increase between 2010 and 2013.

Intruders used common hacking techniques to get at the NRC's computers. One attack linked to a foreign country or individual involved phishing emails that coerced NRC employees into submitting their login credentials. The second one linked to a foreign government or individual used spearphishing, or emails targeted at specific NRC employees, to convince them to click a link that led to a malware site hosted on Microsoft's cloud storage site SkyDrive, now called OneDrive. The third attack involved breaking into the personal account of a NRC employee. After sending a malicious PDF attachment to 16 other NRC employees, one person was infected with malware.
The Media

News Aggregator Fark Adds Misogyny Ban 738

Posted by Unknown Lamer
from the here-we-go-again dept.
An anonymous reader writes The news aggregator Fark is ancient in dot com terms. Users submit news links to the privately run site and tear it — and each other — to pieces in the discussion threads. (Sound familiar?) While the site isn't as popular as during the early 2000s, the privately run discussion forum has continued and has its champions. site operator Drew Curtis announced today that Gifs, references, jokes and comments involving sexism will be deleted. "Adam Savage once described to me the problem this way: if the Internet was a dude, we'd all agree that dude has a serious problem with women. We've actually been tightening up moderation style along these lines for awhile now, but as of today, the FArQ will be updated with new rules reminding you all that we don't want to be the He Man Woman Hater's Club. This represents enough of a departure from pretty much how every other large internet community operates that I figure an announcement is necessary."

Given how bare-knuckled Fark can be, is it time? Overdue?
Patents

Adam Carolla Settles With Podcasting Patent Troll 63

Posted by Unknown Lamer
from the could-have-been-worse dept.
Personal Audio has been trying to assert patents they claim cover podcasting for some time now; in March Adam Carolla was sued and decided to fight back. Via the EFF comes news that he has settled with Personal Audio, and the outcome is likely beneficial to those still fighting the trolls. From the article: Although the settlement is confidential, we can guess the terms. This is because Personal Audio sent out a press release last month saying it was willing to walk away from its suit with Carolla. So we can assume that Carolla did not pay Personal Audio a penny. We can also assume that, in exchange, Carolla has given up the opportunity to challenge the patent and the chance to get his attorney’s fees. ... EFF’s own challenge to Personal Audio’s patent is on a separate track and will continue ... with a ruling likely by April 2015. ... We hope that Personal Audio’s public statements on this issue mean that it has truly abandoned threatening and suing podcasters. Though a press release might not be legally binding, the company will have a hard time justifying any further litigation (or threats of litigation) against podcasters. Any future targets can point to this statement. Carolla deserves recognition for getting this result.
Security

Hackers Steal Data Of 4.5 Million US Hospital Patients 111

Posted by Unknown Lamer
from the security-through-whoops dept.
itwbennett (1594911) writes Community Health Systems said the attack occurred in April and June of this year, but it wasn't until July that it determined the theft had taken place. Working with a computer security company, it determined the attack was carried out by a group based in China that used 'highly sophisticated malware' to attack its systems. The hackers got away with patient names, addresses, birthdates, telephone numbers and Social Security numbers of the 4.5 million people who were referred to or received services from doctors affiliated with the company in the last five years. The stolen data did not include patient credit card, medical, or clinical information.
Piracy

Rightscorp's New Plan: Hijack Browsers Until Infingers Pay Up 376

Posted by Unknown Lamer
from the guilty-until-proven-guilty dept.
A few weeks ago, Rightscorp announced plans to have ISPs disconnect repeat copyright infringers. mpicpp (3454017) wrote in with news that Rightscorp announced during their latest earnings call further plans to require ISPs to block all web access (using a proxy system similar to hotel / college campus wifi logins) until users admit guilt and pay a settlement fine (replacing the current system of ISPs merely forwarding notices to users). Quoting TorrentFreak: [Rightscorp] says 75,000 cases have been settled so far with copyright holders picking up $10 from each. ... What is clear is that Rightscorp is determined to go after "Comcast, Verizon, AT&T, Cable Vision and one more" in order to "get all of them compliant" (i.e forwarding settlement demands). The company predicts that more details on the strategy will develop in the fall, but comments from COO & CTO Robert Steele hint on how that might be achieved. ... "[What] we really want to do is move away from termination and move to what's called a hard redirect, like, when you go into a hotel and you have to put your room number in order to get past the browser and get on to browsing the web." The idea that mere allegations from an anti-piracy company could bring a complete halt to an entire household or business Internet connection until a fine is paid is less like a "piracy speeding ticket" and more like a "piracy wheel clamp", one that costs $20 to have removed.
Government

Munich Reverses Course, May Ditch Linux For Microsoft 579

Posted by Unknown Lamer
from the campaign-funding-brought-to-you-by-windows dept.
alphadogg (971356) writes with news that the transition from Windows to GNU/Linux in Munich may be in danger The German city of Munich, long one of the open-source community's poster children for the institutional adoption of Linux, is close to performing a major about-face and returning to Microsoft products. Munich's deputy mayor, Josef Schmid, told the Süddeutsche Zeitung that user complaints had prompted a reconsideration (Google translation to English) of the city's end-user software, which has been progressively converted from Microsoft to a custom Linux distribution — "LiMux" — in a process that dates back to 2003.
The Internet

Plan Would Give Government Virtual Veto Over Internet Governance 65

Posted by samzenpus
from the changing-things-up dept.
An anonymous reader writes The debate over Internet governance for much of the past decade has often come down to a battle between ICANN and the United Nations. The reality has always been far more complicated. The U.S. still maintains contractual control over ICANN, while all governments exert considerable power within the ICANN model through the Governmental Advisory Committee (GAC). Now governments are looking for even more power, seeking a near-complete veto power of ICANN decisions.
Crime

WikiLeaks' Assange Hopes To Exit London Embassy "Soon" 299

Posted by samzenpus
from the leaving-the-building dept.
An anonymous reader writes Julian Assange has hosted a press conference in which he indicated he is soon about to leave the embassy of Ecuador in London. From the article: "WikiLeaks founder Julian Assange, who has spent over two years in Ecuador's London embassy to avoid a sex crimes inquiry in Sweden, said on Monday he planned to leave the building 'soon', but Britain signaled it would still arrest him if he tried. Assange made the surprise assertion during a news conference alongside Ecuador's Foreign Minister Ricardo Patino. But his spokesman played down the chances of an imminent departure, saying the British government would first need to revise its position and let him leave without arrest, something it has repeatedly refused to do.
Transportation

Selectable Ethics For Robotic Cars and the Possibility of a Robot Car Bomb 239

Posted by samzenpus
from the no-hands dept.
Rick Zeman writes Wired has an interesting article on the possibility of selectable ethical choices in robotic autonomous cars. From the article: "The way this would work is one customer may set the car (which he paid for) to jealously value his life over all others; another user may prefer that the car values all lives the same and minimizes harm overall; yet another may want to minimize legal liability and costs for herself; and other settings are possible. Philosophically, this opens up an interesting debate about the oft-clashing ideas of morality vs. liability." Meanwhile, others are thinking about the potential large scale damage a robot car could do.

Lasrick writes Patrick Lin writes about a recent FBI report that warns of the use of robot cars as terrorist and criminal threats, calling the use of weaponized robot cars "game changing." Lin explores the many ways in which robot cars could be exploited for nefarious purposes, including the fear that they could help terrorist organizations based in the Middle East carry out attacks on US soil. "And earlier this year, jihadists were calling for more car bombs in America. Thus, popular concerns about car bombs seem all too real." But Lin isn't too worried about these threats, and points out that there are far easier ways for terrorists to wreak havoc in the US.
Crime

Feds: Red Light Camera Firm Paid For Chicago Official's Car, Condo 115

Posted by samzenpus
from the red-light-red-light dept.
An anonymous reader writes "The former CEO of Redflex, a major red light camera vendor, and John Bills, former Managing Deputy Commissioner at the Department of Transportation, have been indicted on federal corruption charges stemming from a contract with the City of Chicago. According to the indictment, a friend of Bills was hired as a contractor and paid $2 million. Much of that money was then kicked back to Bills, who also got a Mercedes and a condominium via Redflex employees. The defendants are facing 23 counts including: mail fraud, wire fraud, and bribery. Each fraud count carries a maximum sentence of 20 years."
Bitcoin

Are Altcoins Undermining Bitcoin's Credibility? 267

Posted by samzenpus
from the least-of-your-worries dept.
An anonymous reader writes The editor of a Bitcoin advocacy site believes the proliferation of altcoins (cryptocurrencies other than Bitcoin) is harming Bitcoin's long-term potential as an alternative to traditional currencies. Posting at BadBitcoin.org, a site that seeks to expose online scams that target Bitcoin users, the pseudonymous ViK compares altcoins, including the Internet meme inspired Dogecoin, to a pump-and-dump scheme where developers create their own version of the Bitcoin wallet and blockchain and then "pre-mine" or generate a significant number of cryptocurrency units before the altcoin's official release. Later, when their value has risen, the pre-mined altcoins are exchanged for Bitcoin or in some cases converted directly to cash. While critics of cryptocurrencies in general might find ViK's comments about the altcoin "tulip" mania ironic, the self-confessed Bitcoin fan is nevertheless calling for an altcoin boycott: "The easiest way to stop them is to not participate. We all know that they only have one purpose, and that is to make Bitcoin for the so called developers."
Censorship

Financial Services Group WCS Sues Online Forum Over Negative Post 112

Posted by samzenpus
from the I-wish-you-wouldn't-say-that dept.
First time accepted submitter kavzee writes The popular Australian online discussion forum, Whirlpool, is being sued by a financial services group for refusing to remove a negative review about its services. A similar story occurred a number of years ago when another company by the name of 2Clix attempted to sue Whirlpool for the same reasons but later withdrew their case. "A financial services business licenced through National Australia Bank is suing an online forum for refusing to remove an allegedly fake and negative post about its services, claiming it has damaged its reputation with would-be clients. It is the latest legal action launched against an online forum or review website for publishing negative comments, following several high profile cases in Australia and overseas. Financial advice group WCS Group has initiated action against Whirlpool in the Supreme Court of Victoria, seeking unspecified damages and costs, despite the fact the forum generates no revenue."
Electronic Frontier Foundation

EFF's Cell Phone Guide For US Protesters 82

Posted by Soulskill
from the do-not-use-your-cell-phone-as-a-projectile-weapon dept.
An anonymous reader writes: The Electronic Frontier Foundation has updated its guide for protecting yourself and your cell phone at a protest. In addition to being extremely powerful tools (real-time communication to many watchers via social media, and video recording functionality), cell phones can also give authorities a lot of information about you if they confiscate it. The EFF is trying to encourage cell phone use and prepare people to use them. (The guide is based on U.S. laws, but much of the advice makes sense for other places as well.) Here are a few small snippets: "Start using encrypted communications channels. Text messages, as a rule, can be read and stored by your phone company or by surveillance equipment in the area. ... If the police ask to see your phone, tell them you do not consent to the search of your device. Again, since the Supreme Court's decision in Riley, there is little question that officers need a warrant to access the contents of your phone incident to arrest, though they may be able to seize the phone and get a warrant later. ... If your phone or electronic device was seized, and is not promptly returned when you are released, you can file a motion with the court to have your property returned."
The Military

Two Years of Data On What Military Equipment the Pentagon Gave To Local Police 264

Posted by Soulskill
from the bazookas-for-all dept.
v3rgEz writes: Wondering how the St. Louis County Police ended up armed with surplus military gear, and what equipment other departments have? A FOIA request at MuckRock has turned up every item given to local law enforcement under the Pentagon's 1022 program, the mechanism by which local law enforcement can apply for surplus or used military gear.
Censorship

Knocking Down the Great Firewall of China 167

Posted by Soulskill
from the crumbling-from-a-million-tiny-cracks dept.
New submitter Nocturrne writes: The FOSS project Lantern is having great success in unblocking the internet for many users in oppressive regimes, like China and Iran. Much like Tor and BitTorrent, Lantern is using peer-to-peer networking to overcome firewalls, but with the additional security of a trusted network of friends. "If you download Lantern in an uncensored region, you can connect with someone in a censored region, who can then access whatever content they want through you. What makes the system so unique is that it operates on the basis of trust. ... Through a process called consistent routing, the amount of information any single Lantern user can learn about other users is limited to a small subset, making infiltration significantly more difficult." The network of peers is growing, but we need more friends in uncensored countries to join us.
Government

Leaked Documents: GCHQ Made Port-Scanning Entire Countries a Standard Spy Tool 58

Posted by timothy
from the small-island-nation-with-a-lot-of-curiosity dept.
Advocatus Diaboli writes with this excerpt from Heise: Since the early days of TCP, port scanning has been used by computer saboteurs to locate vulnerable systems. In a new set of top secret documents seen by Heise, it is revealed that in 2009, the British spy agency GCHQ made port scans a "standard tool" to be applied against entire nations. Twenty-seven countries are listed as targets of the HACIENDA program in the presentation, which comes with a promotional offer: readers desiring to do reconnaissance against another country need simply send an e-mail. Also from the article: The list of targeted services includes ubiquitous public services such as HTTP and FTP, as well as common administrative protocols such as SSH (Secure SHell protocol – used for remote access to systems) and SNMP (Simple Network Management Protocol – used for network administration) (Figure 4). Given that in the meantime, port scanning tools like Zmap have been developed which allow anyone to do comprehensive scans, it is not the technology used that is shocking, but rather the gargantuan scale and pervasiveness of the operation.
China

Apple Begins Storing Chinese User Data On Servers In China 92

Posted by timothy
from the eat-local-and-store-data-there-too dept.
An anonymous reader writes Reuters reported on Friday that Apple "has begun keeping the personal data of some Chinese users on servers in mainland China." Apple has claimed that the move is meant "to improve the speed and reliability of its iCloud service", but given China's track record with censorship and privacy, the explanation rings hollow for some skeptics. Nevertheless, Apple assures its Chinese users that their personal data on China Telecom is encrypted and that the encryption keys will be stored offshore. Only time will tell if Apple will be able to resist Chinese government requests to access its China-based servers.
Government

The Billion-Dollar Website 194

Posted by Soulskill
from the get-what-you-paid-for-minus-a-billion-dollars dept.
stoborrobots writes: The Government Accountability Office has investigated the cost blowouts associated with how the Centers for Medicare & Medicaid Services (CMS) handled the Healthcare.gov project. It has released a 60-page report entitled Healthcare.gov: Ineffective Planning and Oversight Practices Underscore the Need for Improved Contract Management, with a 5 page summary. The key takeaway messages are:
  • CMS undertook the development of Healthcare.gov and its related systems without effective planning or oversight practices...
  • [The task] was a complex effort with compressed time frames. To be expedient, CMS issued task orders ... when key technical requirements were unknown...
  • CMS identified major performance issues ... but took only limited steps to hold the contractor accountable.
  • CMS awarded a new contract to another firm [and the new contract's cost has doubled] due to changes such as new requirements and other enhancements...

The economy depends about as much on economists as the weather does on weather forecasters. -- Jean-Paul Kauffmann

Working...