×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Russian GLONASS Down For 12 Hours

Advocatus Diaboli Re:Warning Shot (148 comments)

Actually, most of their high value missiles use inertial navigation- just like those of every other country. Nobody trusts navigation satellites for anything more important than short and medium range cruise missiles.

about two weeks ago
top

Russian GLONASS Down For 12 Hours

Advocatus Diaboli Re:Warning Shot (148 comments)

Wishful thinking. Playing around with Russia in 2014 is very different from doing so with Iraq in 1991. You would have to be insane to do that and believe that they would not respond in kind or worse. More likely to the result of an internal update.

about two weeks ago
top

Engine Data Reveals That Flight 370 Flew On For Hours After It "Disappeared"

Advocatus Diaboli The real puzzle (382 comments)

Evidently the aircraft had enough power to run the pinging transmitter for over 4 hours after the transponder went dead (or was turned off). This implies that the aircraft also had enough power and structural integrity for at least some of its communication systems to work. But the experienced pilots did not make even one distress call or issue a single distress code. Why not? What prevented them from doing it?

about a month ago
top

Engine Data Reveals That Flight 370 Flew On For Hours After It "Disappeared"

Advocatus Diaboli The plane was pinging hours after it disappeared (382 comments)

A satellite transmitter on the plane was active for about five hours, indicating the plane was operational after its transponder shut down less than an hour after takeoff, said three U.S. government officials. The 777 can cruise at 500 miles (805 kilometers) an hour or more, meaning it may have flown for as far as 2,500 miles beyond its last point of contact if it was intact and had enough fuel. Link (http://www.bloomberg.com/news/2014-03-13/missing-malaysian-jet-said-to-have-flown-with-beacon-off.html)

about a month ago
top

Free (Gratis) Version of Windows Could Be a Reality Soon

Advocatus Diaboli Is Win 8.1 that bad? (392 comments)

Given the history of MS trying to squeeze every last cent out of their captive audience, a free version of Win 8.1 (even one bundled with bing') sounds like desperation.

about a month and a half ago
top

Wikileaks Aiding Snowden - Chinese Social Media Divided - Relations Strained

Advocatus Diaboli Re:hope it was worth it (629 comments)

Women prefer dangerous guys over milquetoast ones.

about 10 months ago
top

Wikileaks Aiding Snowden - Chinese Social Media Divided - Relations Strained

Advocatus Diaboli Anti-Citizen One (629 comments)

I would like to point out that Edward Snowden not only has a physical resemblance to the' Gordon Freeman' character in the Half-Life Game Series, but has effectively become 'Anti-Citizen One'- in real life.

about 10 months ago
top

Scientists Themselves Play Large Role In Bad Reporting

Advocatus Diaboli The system selects for CONmen and Shysters (114 comments)

I remember writing a post about this phenomena about a year ago. The short version of the story is that over the last 30-40 years, universities and research institutes have increasingly recruited "scientist" with strong tendencies towards showmanship, fraud, lying and bullshitting. This change is largely due to changing nature of incentives as well as methods of evaluation and promotion in these institutions. Peer reviewed research and grants are probably the biggest culprit. Here is the link: http://dissention.wordpress.com/2011/02/06/why-all-publicised-breakthroughs-are-lies/

about a year and a half ago
top

Microsoft's Lost Decade

Advocatus Diaboli Corporations ARE the Modern Version of Fiefdoms (407 comments)

That is because Corporations are the Modern Version of Fiefdoms (http://bit.ly/MSfvml) with a fatal obsession for "Metrics and Productivity" (http://bit.ly/tB6o8I) both which can be easily gamed. Furthermore their supposed focus on shareholder value makes them susceptible to short-termism (http://bit.ly/McEkgs) as the reward system is rather dystopic (http://bit.ly/LYEke4).

about a year and a half ago
top

World's Most Powerful x86 Supercomputer Boots Up in Germany

Advocatus Diaboli The Super Computer Race is a Sad Scam (151 comments)

What are these machines being used for anyway? What have we achieved so far? How far has simulation of complex natural systems been helpful in understanding them? Can we make better predictions using faster computers or more refined algorithms? So far, computer simulations have not helped us understand or find dark matter- if something like that even exists. Our ability to predict the weather is still shit, and our climate models require “correction” factors to even approach observed values. Our ability to model protein folding and bio-molecular interactions is still pretty pathetic. This state of affairs has persisted in the face of colossal increases in available computational power. So what is going on? Why haven’t the computer gods delivered? Why would throwing more computational power at a problem solve it if previous attempts to do so have proved futile? http://dissention.wordpress.com/2012/06/20/the-super-computer-race-is-a-sad-scam/

about a year and a half ago
top

Spooky: How NSA's Surveillance Algorithms See Into Your Life

Advocatus Diaboli Delusions of capability (211 comments)

Their biggest problem is not fixable and is linked to what type of communication ultimately destroys a fraudulent society. Hint: It is the mundane stuff. http://dissention.wordpress.com/2012/02/19/spying-and-surveillance-is-rapidly-becoming-worthless/ and it also does not help that intelligence agencies are run by status hungry human beings. http://dissention.wordpress.com/2010/12/05/universal-organizational-flaws-in-intelligence-agencies-1/

about a year and a half ago
top

Have We Reached Maximum Sustainable Population Size?

Advocatus Diaboli How does he know that? (1070 comments)

This scumbags is only one of the many who routinely put out such predictions based on "models". Ask yourself- When have people like him been right? If not why not? and why do they continue to make these predictions?

more than 2 years ago
top

Tolkien Estate Censors the Word "Tolkien"

Advocatus Diaboli Tolkien = Sauron (433 comments)

Whose name won't be uttered.

more than 3 years ago
top

Fed Goes Hunting For Malcontents

Advocatus Diaboli Bad Idea (193 comments)

Governing systems without implicit trust of the vast majority of its employees are disasters waiting to happen.

more than 3 years ago

Submissions

top

FBI to have 52 million photos in its NGI face recognition database by next year

Advocatus Diaboli Advocatus Diaboli writes  |  3 days ago

Advocatus Diaboli (1627651) writes "One of our biggest concerns about NGI has been the fact that it will include non-criminal as well as criminal face images. We now know that FBI projects that by 2015, the database will include 4.3 million images taken for non-criminal purposes. Currently, if you apply for any type of job that requires fingerprinting or a background check, your prints are sent to and stored by the FBI in its civil print database. However, the FBI has never before collected a photograph along with those prints. This is changing with NGI. Now an employer could require you to provide a “mug shot” photo along with your fingerprints. If that’s the case, then the FBI will store both your face print and your fingerprints along with your biographic data."
Link to Original Source
top

Utah cops warrantlessly search prescription drug records

Advocatus Diaboli Advocatus Diaboli writes  |  3 days ago

Advocatus Diaboli (1627651) writes "The warrantless search of Utah's database chronicling every controlled substance dispensed by a pharmacist resulted in charges against one paramedic that have nothing to do with the original investigation. Instead, the authorities discovered an employee whose records exhibited "the appearance of Opioid dependence" and lodged prescription fraud charges against paramedic Ryan Pyle. Now Pyle faces a maximum five-year prison sentence if convicted of the felony. "To me, it's outrageous government conduct," Pyle's attorney, Rebecca Skordas, said in a telephone interview Monday."
Link to Original Source
top

Facebook Is Ripping Chat Out Of Its Mobile App

Advocatus Diaboli Advocatus Diaboli writes  |  about two weeks ago

Advocatus Diaboli (1627651) writes "Facebook is taking its standalone app strategy to a new extreme today. It’s starting to notify users they’ll no longer have the option to send and receive messages in Facebook for iOS and Android, and will instead have to download Facebook Messenger to chat on mobile. Facebook’s main apps have always included a full-featured messaging tab. Then a few months ago, users who also had Facebook’s standalone Messenger app installed had the chat tab of their main apps replaced with a hotlink button that would open Messenger. But this was optional. If you wanted to message inside Facebook for iOS or Android, you just didn’t download Messenger. That’s not going to be an option anymore."
Link to Original Source
top

More on the "Cuban Twitter" Scam

Advocatus Diaboli Advocatus Diaboli writes  |  about two weeks ago

Advocatus Diaboli (1627651) writes "These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.

The documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda."

Link to Original Source
top

NSA infiltrated RSA security more deeply than thought

Advocatus Diaboli Advocatus Diaboli writes  |  about three weeks ago

Advocatus Diaboli (1627651) writes "A group of professors from Johns Hopkins, the University of Wisconsin, the University of Illinois and elsewhere now say they have discovered that a second NSA tool exacerbated the RSA software's vulnerability. The professors found that the tool, known as the "Extended Random" extension for secure websites, could help crack a version of RSA's Dual Elliptic Curve software tens of thousands of times faster, according to an advance copy of their research shared with Reuters."
Link to Original Source
top

Dropbox's new policy of scanning files for DMCA issues

Advocatus Diaboli Advocatus Diaboli writes  |  about three weeks ago

Advocatus Diaboli (1627651) writes "This weekend, though, a small corner of the Internet exploded with concern that Dropbox was going too far, actually scanning users' private and directly peer-shared files for potential copyright issues. What's actually going on is a little more complicated than that, but shows that sharing a file on Dropbox isn't always the same as sharing that file directly from your hard drive over something like e-mail or instant messenger. The whole kerfuffle started yesterday evening, when one Darrell Whitelaw tweeted a picture of an error he received when trying to share a link to a Dropbox file with a friend via IM. The Dropbox web page warned him and his friend that "certain files in this folder can't be shared due to a takedown request in accordance with the DMCA.""
Link to Original Source
top

The inside story of MIT and Aaron Swartz

Advocatus Diaboli Advocatus Diaboli writes  |  about three weeks ago

Advocatus Diaboli (1627651) writes "That cooperation with law enforcement also extended to a senior MIT network engineer who monitored traffic to and from Swartz’s laptop and appeared to be looking to Pickett for instructions. On Jan. 5, having collected 70 gigabytes of network traffic, he e-mailed the agent, “I was just wondering what the next step is.” Swartz’s lawyers argued that MIT, by monitoring Swartz and turning over materials to law enforcement without a court order, violated his Fourth Amendment rights. Abelson, who wrote MIT’s own review, disagreed, and legal experts interviewed by the Globe differed on whether those arguments had merit. They were never ruled on by the judge in the case."
Link to Original Source
top

GCHQ and NSA Targeted Private German Companies

Advocatus Diaboli Advocatus Diaboli writes  |  about three weeks ago

Advocatus Diaboli (1627651) writes "Documents show that Britain's GCHQ intelligence service infiltrated German Internet firms and America's NSA obtained a court order to spy on Germany and collected information about the chancellor in a special database. Is it time for the country to open a formal espionage investigation? The headquarters of Stellar, a company based in the town of Hürth near Cologne, are visible from a distance. Seventy-five white antennas dominate the landscape. The biggest are 16 meters (52 feet) tall and kept in place by steel anchors. It is an impressive sight and serves as a popular backdrop for scenes in TV shows, including the German action series "Cobra 11."

Also see this post

NSA Put Merkel on List of 122 Targeted Leaders (https://firstlook.org/theintercept/article/2014/03/29/der-spiegel-nsa-ghcq-hacked-german-companies-put-merkel-list-122-targeted-leaders/)"

Link to Original Source
top

Feds want an expanded ability to hack criminal suspects' computers

Advocatus Diaboli Advocatus Diaboli writes  |  about three weeks ago

Advocatus Diaboli (1627651) writes "What could go wrong?

"The U.S. Department of Justice is pushing to make it easier for law enforcement to get warrants to hack into the computers of criminal suspects across the country. The move, which would alter federal court rules governing search warrants, comes amid increases in cases related to computer crimes. Investigators say they need more flexibility to get warrants to allow hacking in such cases, especially when multiple computers are involved or the government doesn’t know where the suspect’s computer is physically located.""

Link to Original Source
top

Inside the NSA's Secret Efforts to Hunt and Hack System Administrators

Advocatus Diaboli Advocatus Diaboli writes  |  about a month ago

Advocatus Diaboli (1627651) writes "Across the world, people who work as system administrators keep computer networks in order – and this has turned them into unwitting targets of the National Security Agency for simply doing their jobs. According to a secret document provided by NSA whistleblower Edward Snowden, the agency tracks down the private email and Facebook accounts of system administrators (or sys admins, as they are often called), before hacking their computers to gain access to the networks they control. The document consists of several posts – one of them is titled “I hunt sys admins” – that were published in 2012 on an internal discussion board hosted on the agency’s classified servers. They were written by an NSA official involved in the agency’s effort to break into foreign network routers, the devices that connect computer networks and transport data across the Internet. By infiltrating the computers of system administrators who work for foreign phone and Internet companies, the NSA can gain access to the calls and emails that flow over their networks."
Link to Original Source
top

US tech giants knew of NSA data collection, agency's top lawyer insists

Advocatus Diaboli Advocatus Diaboli writes  |  about a month ago

Advocatus Diaboli (1627651) writes "The senior lawyer for the National Security Agency stated unequivocally on Wednesday that US technology companies were fully aware of the surveillance agency’s widespread collection of data, contradicting months of angry denials from the firms. Rajesh De, the NSA general counsel, said all communications content and associated metadata harvested by the NSA under a 2008 surveillance law occurred with the knowledge of the companies – both for the internet collection program known as Prism and for the so-called “upstream” collection of communications moving across the internet."
Link to Original Source
top

Homeland Security is seeking a national license plate tracking system

Advocatus Diaboli Advocatus Diaboli writes  |  about 1 month ago

Advocatus Diaboli (1627651) writes "The Department of Homeland Security wants a private company to provide a national license-plate tracking system that would give the agency access to vast amounts of information from commercial and law enforcement tag readers, according to a government proposal that does not specify what privacy safeguards would be put in place.
The national license-plate recognition database, which would draw data from readers that scan the tags of every vehicle crossing their paths, would help catch fugitive illegal immigrants, according to a DHS solicitation. But the database could easily contain more than 1 billion records and could be shared with other law enforcement agencies, raising concerns that the movements of ordinary citizens who are under no criminal suspicion could be scrutinized.

Also see this..

Reports of the Death of a National License-Plate Tracking Database Have Been Greatly Exaggerated (https://firstlook.org/theintercept/2014/03/17/1756license-plate-tracking-database/)"

Link to Original Source
top

NSA's MYSTIC and RETRO

Advocatus Diaboli Advocatus Diaboli writes  |  about 1 month ago

Advocatus Diaboli (1627651) writes "The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance."
Link to Original Source
top

Engine data reveals that Flight 370 flew on for hours after it "disappeared".

Advocatus Diaboli Advocatus Diaboli writes  |  about a month ago

Advocatus Diaboli (1627651) writes ""Aviation investigators and national security officials believe the plane flew for a total of five hours based on data automatically downloaded and sent to the ground from the Boeing Co. 777's engines as part of a routine maintenance and monitoring program."

"As part of its maintenance agreements, Malaysia Airlines transmits its engine data live to Rolls-Royce for analysis. The system compiles data from inside the 777's two Trent 800 engines and transmits snapshots of performance, as well as the altitude and speed of the jet. Those snippets are compiled and transmitted in 30-minute increments, said one person familiar with the system.""

Link to Original Source
top

How the NSA Plans to Infect 'Millions' of Computers with Malware

Advocatus Diaboli Advocatus Diaboli writes  |  about a month ago

Advocatus Diaboli (1627651) writes "Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks."
Link to Original Source
top

Surveillance and Dirty Tricks by GCHQ against Hacktivist Organisations

Advocatus Diaboli Advocatus Diaboli writes  |  about 2 months ago

Advocatus Diaboli (1627651) writes "One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents..

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums."

Link to Original Source
top

Speculation About The Feasibility of India's 2013 Mars Mission

Advocatus Diaboli Advocatus Diaboli writes  |  about a year and a half ago

Advocatus Diaboli (1627651) writes "Last week, I read about some morons in UK get all bitchy about an official announcement regarding India plan to launch an unmanned orbiter probe to mars during late 2013. While this project has been known to exist since 2010, most people outside ISRO never thought that it would be followed up so vigorously. This belief is understandable since Indian politicians and bureaucrats, who control the purse strings of government projects, are rightly seen as morons who drive out competent Indian scientists or destroy their dreams. However this post is not about the state of politics and governance in India, which almost every Indian has had considerable experience with. The post is about whether such a probe is feasible and deliverable within the set time-frame, with available funding using available technology. The post also briefly recounts previous unmanned orbital missions to Mars by NASA and the ESA and compares them to the proposed Indian mission."
Link to Original Source
top

Google is Trying to Hang Itself

Advocatus Diaboli Advocatus Diaboli writes  |  more than 2 years ago

Advocatus Diaboli (1627651) writes "You might have wondered about the reasons and forces behind a series of poor decisions made by Google within the last two years. From the gaffes of former CEO Eric Schmidt, Chrome OS debacle, Chrome OS netbook debacle, half-assed development of Android OS, building the ghost town known as Google + to its recent change in policies regarding pseudonym use and recent changes in user agreements.

Why would a company which was once so innovative and capable of getting things right lapse into such a pathetic state of affairs?

So let us start.."

Link to Original Source
top

Fall of traditional entertainment conglomerates

Advocatus Diaboli Advocatus Diaboli writes  |  more than 3 years ago

Advocatus Diaboli (1627651) writes "We no longer live in the era of ‘plantation-type’ movie studios or recording houses. However large private companies still have considerable power over content production, distribution and promotion. Technology has been slowly changing this state of affairs for almost 30-40 years, however certain new technological advances, enabling systems and cost considerations WILL change the entertainment industry as we know it -within 5 years."
Link to Original Source
top

Snake eats Bird on Chatroulette

Advocatus Diaboli Advocatus Diaboli writes  |  about 4 years ago

Advocatus Diaboli (1627651) writes "I got over 5,000 views (with 24 hours) for a short video I reuploaded on youtube. It shows a chatroulette session (most likely partially faked) of two girls not flashing their boobs to stop a chick from being eaten by a python.

My guess the prerecorded python clip was stopped before the chick gets eaten if the gals flashed their boobs. If they did not, the clip was run till the end and they saw the bird being eaten.

Maybe.. something similar could be done with newborn bunny rabbits and pythons.

Note that I did not promote it beyond facebook, my blog and a couple of other blogs. Most views came from people searching for that clip and forwarding it to others.

Nobody went broke by appealing to the lowest common denominator.

http://www.youtube.com/watch?v=qWvj17Rpqdo&feature=player_embedded"

Link to Original Source

Journals

Advocatus Diaboli has no journal entries.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account

Loading...