Forgot your password?
typodupeerror
Communications

FCC Reminds ISPs That They Can Be Fined For Lacking Transparency 16

Posted by Unknown Lamer
from the beware-the-$5-fine dept.
An anonymous reader writes The FCC issued a notice on Wednesday reminding ISPs that, according to the still-intact transparency rule of the 2010 Open Internet Order, they are required to be transparent about their services. "The FCC's transparency rule requires that consumers get the information they need to make informed choices about the broadband services they purchase." Applicable scenarios include "poorly worded service offers or inaccurate counts of data against a data cap...[as well as] blocking or slowing certain types of traffic without explaining that to the customer." The transparency rule gives the FCC the power to fine ISPs for non-compliance.
Networking

How the Internet of Things Could Aid Disaster Response 41

Posted by samzenpus
from the when-the-microwave-calls dept.
jfruh writes While the Internet has made communications easier, that ease had made us very dependent on the Internet for communications — and, when disaster strikes, power and infrastructure outages tend to shut down those communications networks when we need them most. But now researchers are examining how the so-called "Internet of Things" — the proliferating array of Internet-communicating devices in our lives — can transmit emergency messages via ad-hoc networks even when the Internet backbone in a region is inoperable.
Communications

'Optical Fiber' Made Out of Thin Air 101

Posted by Soulskill
from the sufficiently-advanced-technology dept.
Dave Knott writes: Scientists from the University of Maryland say they have turned thin air into an "optical fiber" that can transmit and amplify light signals without the need for any cables. As described in the research, this was accomplished by generating a laser with its light split into a ring of multiple beams forming a pipe. Very short and powerful pulses from the laser are used to heat the air molecules along the beam extremely quickly. Such rapid heating produces sound waves that take about a microsecond to converge to the center of the pipe, creating a high-density area surrounded by a low-density area left behind in the wake of the laser beams. The lower density region of air surrounding the center of the air waveguide has a lower refractive index, keeping the light focused, and allowing the higher-density region (with its correspondingly higher index of refraction) to act like an optical fiber. The findings, reported in the journal Optica, have applications in long range laser communications, high-resolution topographic mapping, air pollution and climate change research, and could also be used by the military to make laser weapons.
Transportation

New Toyota Helps You Yell At the Kids 205

Posted by samzenpus
from the scream-better dept.
An anonymous reader writes If you're tired of yelling at the kids without the help of technology, Toyota has a van for you. From the article: "The latest version of the company's Sienna minivan has a feature called 'Driver Easy Speak.' It uses a built-in microphone to amplify a parent's voice through speakers in the back seats. Toyota says it added Easy Speak 'so parents don't have to shout to passengers in the back.' But chances are many parents will yell into the microphone anyway. And the feature only works one way, so the kids can't talk back. At least not with amplified voices. The feature is an option on the 2015 Sienna, which is being refreshed with a totally new interior. It also has an optional 'pull-down conversation mirror' that lets drivers check on kids without turning around."
Communications

New York Judge OKs Warrant To Search Entire Gmail Account 150

Posted by samzenpus
from the we-want-everything dept.
jfruh writes While several U.S. judges have refused overly broad warrants that sought to grant police access to a suspect's complete Gmail account, a federal judge in New York State OK'd such an order this week. Judge Gabriel W. Gorenstein argued that a search of this type was no more invasive than the long-established practice of granting a warrant to copy and search the entire contents of a hard drive, and that alternatives, like asking Google employees to locate messages based on narrowly tailored criteria, risked excluding information that trained investigators could locate.
Space

Preparing For Satellite Defense 114

Posted by Soulskill
from the road-to-kessler-syndrome dept.
Taco Cowboy sends a report into China's development of anti-satellite technology, and efforts by the U.S. and Japan to build defenses for this new potential battleground. Last year, China launched what they said was a science space mission, but they did so at night and with a truck-based launch system, which are not generally used for science projects. Experts believe this was actually a missile test for targets in geostationary orbit. U.S. and Japanese analysts say China has the most aggressive satellite attack program in the world. It has staged at least six ASAT missile tests over the past nine years, including the destruction of a defunct Chinese weather satellite in 2007. ... Besides testing missiles that can intercept and destroy satellites, the Chinese have developed jamming techniques to disrupt satellite communications. In addition, ... the Chinese have studied ground-based lasers that could take down a satellite's solar panels, and satellites equipped with grappling arms that could co-orbit and then disable expensive U.S. hardware. To defend themselves against China, the U.S. and Japan are in the early stages of integrating their space programs as part of negotiations to update their defense policy guidelines. ... Both countries have sunk billions of dollars into a sophisticated missile defense system that relies in part on data from U.S. spy satellites. That's why strategists working for China's People's Liberation Army have published numerous articles in defense journals about the strategic value of chipping away at U.S. domination in space.
Open Source

Open Hardware and Digital Communications Conference On Free Video, If You Help 15

Posted by samzenpus
from the put-some-money-in-the-box dept.
Bruce Perens writes The TAPR Digital Communications Conference has been covered twice here and is a great meeting on leading-edge wireless technology, mostly done as Open Hardware and Open Source software. Free videos of the September 2014 presentations will be made available if you help via Kickstarter. For an idea of what's in them, see the Dayton Hamvention interviews covering Whitebox, our Open Hardware handheld software-defined radio transceiver, and Michael Ossman's HackRF, a programmable Open Hardware transceiver for wireless security exploration and other wireless research. Last year's TAPR DCC presentations are at the Ham Radio Now channel on Youtube.
Businesses

Time Warner Turns Down Takeover Bid From Rupert Murdoch 70

Posted by Unknown Lamer
from the even-worse-than-comcast dept.
Dave Knott (2917251) writes The media giant 21st Century Fox, the empire run by Rupert Murdoch, made an $80 billion takeover bid in recent weeks for Time Warner Inc. but was rebuffed. Time Warner on Wednesday confirmed that it had rejected a cash and stock offer from 21st Century Fox, saying that it was not in the company's best interests. Time Warner's board discussed the proposal at length and early this month it sent a terse letter rejecting the offer, saying the company was better off remaining independent. A Time Warner statement pointed to its own strategic plan, what it said was "uncertainty" over the value of 21st Century Fox stock and regulatory risks as among the reasons for its rebuff. The company said that 21st Century Fox had offered a premium of roughly 22 percent to Time Warner's closing price on Tuesday. Shares of Time Warner were up about 20 percent in premarket trading on Wednesday morning. The combined company would have total revenue of $65 billion.
Security

Google's Project Zero Aims To Find Exploits Before Attackers Do 62

Posted by Unknown Lamer
from the evil-hackers-respond-with-negative-one-day-exploits dept.
DavidGilbert99 (2607235) writes "Google has announced Project Zero, a group of security experts who will hunt down security flaws in all software which touches the Internet. Among the group is a 24-year-old called George Hotz who shot to fame in 2007 when he was the first to unlock the iPhone before reverse engineering the PlayStation 3." Quoting the Project Zero announcement: You should be able to use the web without fear that a criminal or state-sponsored actor is exploiting software bugs to infect your computer, steal secrets or monitor your communications. Yet in sophisticated attacks, we see the use of "zero-day" vulnerabilities to target, for example, human rights activists or to conduct industrial espionage. This needs to stop. ... We're not placing any particular bounds on this project and will work to improve the security of any software depended upon by large numbers of people, paying careful attention to the techniques, targets and motivations of attackers. All issues will be reported to the usual public vulnerability databases after vendors are given a short period to fix their systems and software.
Networking

Led By Nest, 'Thread' Might Be Most Promising IoT Initiative Yet 79

Posted by Unknown Lamer
from the n+1-standards dept.
An anonymous reader writes Nest, Big A%@ Fans, Yale door locks, ARM, Freescale, Samsung and Silicon Labs launch the Thread Group, a standards initiative for using 6LoWPAN-based network technology with mesh capabilities optimized for home automation. Because it blends IPv6 with low-power 802.15.4 radios, a layer of security, peer-to-peer communications, and other special sauce for whole-house connectivity, Thread looks extremely promising in an increasingly crowded field. Plus, millions of units of enabled products are already deployed by way of Nest's little-known Weave technology. There's a press release. Thread is based on open technology, but it's not clear that the protocol specifications will be available for non-members. No hardware changes are required for devices with 802.15.4 radios, and the group claims the new protocol fixes enough flaws in existing standards (mostly ZigBee) to be worth the software upgrade. Promises include increased reliability (mesh network with multiple routing points), lower power use (by not requiring sensors to wake up for traffic from other sensors), and easier bridging between the mesh network and Internet (thanks to using IPv6).
Security

German NSA Committee May Turn To Typewriters To Stop Leaks 243

Posted by Unknown Lamer
from the how-to-tell-wikileaks-is-winning dept.
mpicpp (3454017) writes with news that Germany may be joining Russia in a paranoid switch from computers to typewriters for sensitive documents. From the article: Patrick Sensburg, chairman of the German parliament's National Security Agency investigative committee, now says he's considering expanding the use of manual typewriters to carry out his group's work. ... Sensburg said that the committee is taking its operational security very seriously. "In fact, we already have [a typewriter], and it's even a non-electronic typewriter," he said. If Sensburg's suggestion takes flight, the country would be taking a page out of the Russian playbook. Last year, the agency in charge of securing communications from the Kremlin announced that it wanted to spend 486,000 rubles (about $14,800) to buy 20 electric typewriters as a way to avoid digital leaks.
United States

NSA Says Snowden Emails Exempt From Public Disclosure 231

Posted by samzenpus
from the for-our-eyes-only dept.
AHuxley (892839) writes "The Desk reports on a FOIA request covering "... all e-mails sent by Edward Snowden" and the NSA's refusal to release all documents. "The National Security Agency has acknowledged it retains a record of e-mail communications from former contractor turned whistleblower Edward Snowden, but says those records are exempt from public disclosure under the federal Freedom of Information Act. In a letter responding to a June 27 FOIA request from The Desk, the NSA’s chief FOIA officer Pamela Phillips wrote that while the agency has retained records related to Snowden’s employment as a contractor, they are being withheld from public examination because, among other things, releasing the records 'could interfere with law enforcement proceedings, could cause an unwarranted invasion of personal privacy, could reveal the identities of confidential sources or would reveal law enforcement techniques and procedures.' Other records are being withheld because those documents were 'also found to be currently and properly classifiedand remains classified TOP SECRET, SECRET and CONFIDENTIAL.' The letter marks the first time the NSA has publicly acknowledged retaining communication and employment records related to Snowden’s time as a contractor."
Communications

New Technology Uses Cellular Towers For Super-Accurate Weather Measurements 42

Posted by timothy
from the gives-each-droplet-ipv6-address dept.
Iddo Genuth (903542) writes "Israeli scientists from the Tel Aviv University perfected a method for using cell phone service towers' microwave emitters to measure rain and snow and even (for the first time ) detect fog with great accuracy over vast areas in real time. The research team members have analyzed endless amounts of raw cellular data and developed more accurate ways to measure meteorological information and added more parameters that they can now measure using their growing database. When combined with existing meteorological monitoring technologies such as radars and local ground based weather stations, the results show unprecedented level of accuracy that can give better and further weather forecast as well as special warnings about upcoming floods, fog and hail which can affect both people and crop production."
Bitcoin

Finnish National TV Broadcaster Starts Sending Bitcoin Blockchain 73

Posted by timothy
from the in-the-air dept.
New submitter Joel Lehtonen (3743763) writes "The Finnish national digital TV broadcaster Digita is co-operating with startup company Koodilehto to start transmission of Bitcoin blockchain and transactions in Terrestrial Digital TV (DVB-T) signal that covers almost the entire Finnish population of 5 million people. The pilot broadcasting starts September 1st and lasts two months. The broadcast can be received by a computer with any DVB-T adapter (like this $20 dongle). A commercial production phase is planned to begin later this year."
Space

O3b Launches Four More Satellites To Bring Internet To 'Other 3 Billion' 80

Posted by timothy
from the from-above dept.
An anonymous reader writes "O3b Networks is aiming to provide internet access through satellite, to the "other three billion" people in under-served equatorial regions (Africa, the Pacific, South America). O3b launched four more satellites [Thursday], to add to the four they already have in orbit. This is a very international effort; a Russian Soyuz rocket went up from South America, carrying satellites built in France. There's a video of the rocket and payloads coming together and a video of the rocket launch. There's also an academic paper describing using the O3b system from the Cook Islands in the Pacific, giving an idea of what it does and those all-important ping times."
Wireless Networking

FCC Approves Plan To Spend $5B Over Next Five Years On School Wi-Fi 54

Posted by Soulskill
from the all-about-the-wireless-benjamins dept.
itwbennett writes: The Federal Communications Commission, in a 3-2 party-line vote Friday, approved a plan to revamp the 17-year-old E-Rate program, which pays for telecom services for schools and libraries, by phasing out funding for voice service, Web hosting and paging services, and redirecting money to Wi-Fi. FCC Chairman Tom Wheeler had proposed a $5 billion budget for Wi-Fi, but Republican commissioners and some lawmakers had questioned where the money would come from. Still, the E-Rate revamp (PDF) approved Friday contemplates a $1 billion-a-year target for Wi-Fi projects "year after year," Wheeler said.
Privacy

William Binney: NSA Records and Stores 80% of All US Audio Calls 278

Posted by Soulskill
from the must-use-a-good-compression-algorithm dept.
stephendavion sends a report at The Guardian about remarks from whistleblower William Binney, who left the NSA after its move toward overreaching surveillance following the September 11th attacks. Binney says, "At least 80% of all audio calls, not just metadata, are recorded and stored in the U.S. The NSA lies about what it stores." He added, "The ultimate goal of the NSA is total population control, but I’m a little optimistic with some recent Supreme Court decisions, such as law enforcement mostly now needing a warrant before searching a smartphone." One of Binney's biggest concerns about government-led surveillance is its lack of oversight: "The FISA court has only the government’s point of view. There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for U.S. domestic audiences and you can double that globally."
Botnet

Gameover ZeuS Re-Emerges As Fast-Fluxing Botnet 62

Posted by Soulskill
from the game-not-quite-over-after-all dept.
New submitter tylke (621801) writes: "Brian Krebs is reporting that the Gameover ZeuS botnet recently taken down by the U.S. Justice Department in June has re-emerged. The new variant of the Trojan is "stripped of the P2P code, and relies instead on an approach known as fast-flux hosting," a kind of round-robin technique that lets botnets hide phishing and malware delivery sites behind a network of compromised systems. Krebs says, "[T]his variant also includes a 'domain name generation algorithm' or DGA, which is a failsafe mechanism that can be invoked if the botnet’s normal communications system fails. The DGA creates a constantly-changing list of domain names each week (gibberish domains that are essentially long jumbles of letters). In the event that systems infected with the malware can’t reach the fast-flux servers for new updates, the code instructs the botted systems to seek out active domains from the list specified in the DGA. All the botmasters need to do in this case to regain control over his crime machine is register just one of those domains and place the update instructions there." (Disclosure: I work for Malcovery Security, the company credited with identifying the new variant.)
The Courts

Tor Project Sued Over a Revenge Porn Business That Used Its Service 311

Posted by Soulskill
from the tor-is-a-series-of-eeeeevil-tubes dept.
redletterdave writes: The Tor Project has been sued in the state of Texas over a revenge porn website that used its free encrypted communications service. The plaintiff in the case — Shelby Conklin, a criminal justice major at the University of North Texas — alleges a revenge porn site called Pinkmeth "gained unauthorized access to nude photographs" she owned and posted them to the internet. She also said Tor, which The Economist once called "a dark corner of the web," was involved in an active "civil conspiracy" with Pinkmeth because the revenge porn website used the anonymous communications service to prevent others from tracking its location.
Australia

Australian Police Use Telcos For Cell "Tower Dump" of All Connected Users' Data 60

Posted by timothy
from the banning-opaque-envelopes-too dept.
AHuxley (892839) writes The Sydney Morning Herald is reporting that Australian federal and state police are using a no warrant cell phone tower metadata access technique called a "tower dump". A "tower dump" provides the identity, activity and location of all cell phones that connect a cellphone tower(s) over time (an hour or two). The metadata from thousands of phones and numbers connected are then sorted. Australian law-enforcement agencies made 330,000 requests for metadata in 2012-13. AHuxley links to some U.S. views on the same kind of massive data grab: The Wall Street Journal says they caputure innocent users' data; the Chicago Police Department is being sued for information on its purchases of equipment associated with this kind of slurping; and the EFF asks whether warrant protection for users' data will be extended by voice-comm companies as it has been for ISPs. I wonder what people would think of an occasional "postal zone dump" employing the same kind of dragnet but for communications on paper.

fortune: not found

Working...