×
Republicans

Cracking The Code On Trump Tweets (time.com) 330

jIyajbe writes: From Electoral-Vote.com: "A theory has been circulating that the Donald Trump tweets that come from an Android device are from the candidate himself, while the ones that come from an iPhone are the work of his staff. David Robinson, a data scientist who works for Stack Overflow, decided to test the theory. His conclusion: It's absolutely correct. Robinson used some very sophisticated algorithms to analyze roughly 1,400 tweets from Trump's timeline, and demonstrated conclusively that the iPhone tweets are substantively different than the Android tweets. The former tend to come later at night, and are vastly more likely to incorporate hashtags, images, and links. The latter tend to come in the morning, and are much more likely to be copied and pasted from other people's tweets. In terms of word choice, the iPhone tweets tend to be more neutral, with their three most-used phrases being 'join,' '#trump2016,' and '#makeamericagreatagain.' The Android tweets tend to be more emotionally charged, with their three most-used phrases being 'badly,' 'crazy,' and 'weak.'" reifman adds: In an excellent forensic text analysis of Trump's tweets with the Twitter API, data geek David Robinson demonstrates Trump authors his angriest, picture-less, hashtag-less Android tweets often in the morning, while staff tweet from an iPhone with pictures, hashtags and greater joy mostly in the middle of the day. Robinson's report was inspired by a tweet by artist Todd Vaziri. As for why Robinson decided to look into Trump's tweets, he told TIME, "For me it's more about finding a really interesting story, a case where people suspect something, but don't have the data to back it up. For me it was much more about putting some quantitive details to this story that has been going around than it was about proving something about Trump's campaign."
Encryption

Tor Promises Not To Build Backdoors Into Its Services (engadget.com) 69

An anonymous reader quotes a report from Engadget: Tor has published what it calls a "Social Contract" comprised of promises to users and the principles the team believes in. Whatever the reason is, its social contract contains one interesting pledge: "We will never implement front doors or back doors into our projects," the team wrote. Tor's ability to keep users anonymous made it the go-to browser of people looking for drugs, illegal firearms, hitmen, child porn and other things you won't find on eBay or YouTube. If there's a browser law enforcement agencies would want a backdoor to, it's Tor, especially since its main source of funding is the U.S. government. That's right -- the famous anonymizing network gets most of its money from a government known for conducting mass surveillance on a global scale. Loudly proclaiming that it will never build a backdoor into its services might not even matter, though. The government already proved once that it's capable of infiltrating the dark web. If you'll recall, the FBI identified 1,500 users of a child porn website called "Playpen" by deploying a Tor hacking tool. It led to numerous court battles that opened up the discussion on the validity of evidence obtained without warrant through malware. "We believe that privacy, the free exchange of ideas, and access to information are essential to free societies. Through our community standards and the code we write, we provide tools that help all people protect and advance these rights," Tor writes in the contract.
Censorship

Twitter CEO Dick Costolo Secretly Censored Abusive Responses To President Obama, Says Report (buzzfeed.com) 308

An anonymous reader quotes a report from BuzzFeed: In 2015, then-Twitter CEO Dick Costolo secretly ordered employees to filter out abusive and hateful replies to President Barack Obama during a question and answer session, sources tell BuzzFeed News. According to a former senior Twitter employee, Costolo ordered employees to deploy an algorithm (which was built in-house by feeding it thousands of examples of abuse and harassing tweets) that would filter out abusive language directed at Obama. Another source said the media partnerships team also manually censored tweets, noting that Twitter's public quality-filtering algorithms were inconsistent. Two sources told BuzzFeed News that this decision was kept from senior company employees for fear they would object to the decision. According to sources, the decision upset some senior employees inside the company who strictly followed Twitter's long-standing commitment to unfettered free speech. A different source alleges that Twitter did the same thing during a question and answer with Caitlyn Jenner.
Security

Hack of Democrats' Accounts Was Wider Than Believed, Officials Say (nymag.com) 285

A Russian cyberattack that targeted Democratic politicians was bigger than it first appeared and breached private email accounts of more than 100 party officials and groups (could be paywalled; alternate source), reports The New York Times, citing officials with knowledge of the case. From the report: The widening scope of the attack has prompted the F.B.I. to broaden its investigation, and agents have begun notifying a long list of Democratic officials that the Russians may have breached their personal accounts. The main targets appear to have been the personal email accounts of Hillary Clinton's campaign officials and party operatives, along with a number of party organizations. Officials have acknowledged that the Russian hackers gained access to the Democratic Congressional Campaign Committee, which is the fund-raising arm for House Democrats, and to the Democratic National Committee, including a D.N.C. voter analytics program used by Mrs. Clinton's presidential campaign.
Communications

Assange Implies Murdered DNC Staffer Was WikiLeaks' Source (washingtonpost.com) 706

Okian Warrior quotes a report from Fox News: WikiLeaks founder Julian Assange implied in an interview that a murdered Democratic National Committee staffer was the source of a trove of damaging emails the rogue website posted just days before the party's convention. Speaking to Dutch television program Nieuswsuur Tuesday after earlier announcing a $20,000 reward for information leading to the arrest of Seth Rich's killer, Assange said the July 10 murder of Rich in Northwest Washington was an example of the risk leakers undertake. The Washington Post provides some details of the murder in its report: "Rich was shot twice in the back as he walked to his townhouse about 4:20 a.m. Nothing was taken, but police have said attempted robbery is their leading theory for a motive, noting a spike in robberies in the neighborhood in the preceding weeks. WikiLeaks released the trove of emails later that month, on July 22. Rich, 27, had worked for the DNC for two years and helped develop a computer program to make it easier for people to find polling places on Election Day. After his death, the DNC's then-chairwoman, Rep. Debbie Wasserman Schultz (Fla.), attended a vigil for Rich in front of his home, and Hillary Clinton, before she was nominated in her run for president, evoked his name during a speech in which she advocated for limiting the availability of guns."
China

China To UK: 'Golden' Ties At Crucial Juncture Over Nuclear Delay (reuters.com) 170

mdsolar quotes a report from Reuters: China has cautioned Britain against closing the door to Chinese money and said relations were at a crucial juncture after Prime Minister Theresa May delayed signing off on a $24 billion nuclear power project. In China's sternest warning to date over May's surprise decision to review the building of Britain's first nuclear plant in decades, Beijing's ambassador to London said that Britain could face power shortages unless May approved the Franco-Chinese deal. "The China-UK relationship is at a crucial historical juncture. Mutual trust should be treasured even more," Liu Xiaoming wrote in the Financial Times. "I hope the UK will keep its door open to China and that the British government will continue to support Hinkley Point -- and come to a decision as soon as possible so that the project can proceed smoothly." The comments signal deep frustration in Beijing at May's move to delay, her most striking corporate intervention since winning power in the political turmoil which followed Britain's June 23 referendum to leave the European Union.
Education

Immigration Attorneys: Industry Pushes Foreign Labor, Claiming 'US Students Can't Hack It In Tech' (breitbart.com) 472

geek writes: According to Caroline May from Breitbart News, "The tech industry is seeking to bolster its argument for more white-collar foreign tech workers with the insulting claim that the education system is insufficiently preparing Americans for tech fields, according to pro-American worker attorneys with the Immigration Reform Law Institute (IRLI). [In an op-ed published at The Daily Caller, IRLI attorneys John Miano and Ian Smith take the tech industry to task for its strategy to promote the H-1B visa program -- alleging a labor shortage of apt American tech workers while importing thousands of foreign workers on H1-B visas from countries with lower educational results than the U.S.]" John Miano and Ian Smith write via The Daily Caller: "But if the H-1B program really is meant to correct the failings of our education system, as BigTech's new messaging-push implies, why is it importing so many people from India? According to results from the Programme for International Student Assessment (PISA), a global standardized math and science assessment sponsored by the OECD, India scored almost dead last among the 74 countries tested. The results were apparently so embarrassing, the country pulled out of the program all together. Not surprisingly then, there isn't a single Indian university that appears within the top 250 spots of the World University Rankings Survey. And unlike American bachelor's degrees, obtaining a bachelor's in India takes only three years of study."
Crime

32 States Offer Online Voting, But Experts Warn It Isn't Secure (bostonglobe.com) 182

Long-time Slashdot reader Geoffrey.landis writes: According to the Washington Post, 32 states have implemented some form of online voting for the 2016 U.S. presidential election -- even though multiple experts warn that internet voting is not secure. In many cases, the online voting options are for absentee ballots, overseas citizens or military members deployed overseas. According to Verified Voting, "voted ballots sent via Internet simply cannot be made secure and make easy and inviting targets for attackers ranging from lone hackers to foreign governments seeking to undermine US elections."
And yet 39% of this year's likely voters said they'd choose to vote online if given the option, according a new article in the Boston Globe, noting that "All 50 states and D.C. send ballots to overseas voters electronically," with Alabama even allowing them to actually cast their ballots through a special web site. "Security is exponentially increased over any other kind of voting because each ballot, as well as the electronic ballot box, has military-grade encryption," argues the founder of the software company that assures the site's security. "She also claims that Web voting is more accurate," reports the Boston Globe. "No more hanging chads or marks on a paper ballot that may be difficult to interpret. Web systems can also save money and can be upgraded or reconfigured as laws change..."
Crime

Edward Snowden Is Not Dead Despite Mysterious Tweets, Says Glenn Greenwald (inquisitr.com) 93

Saturday Slashdot reader MouseTheLuckyDog wrote:Some mysterious going ons on the web is causing people to ask if everything is alright with Edward Snowden. His last two tweets, since deleted, were a cryptic message...followed a few days later by a 64 character hex string. This combined with the recent move against torrents sites has the more conspiratorially oriented people speculating that perhaps he is dead and various agencies are slamming torrent sites to slow the spread of more Snowden leaks.
Saturday night The Inquisitr reported: The cryptic code tweets led many to believe that Snowden may have been captured or killed and the codes were the result of a "dead man's switch" designed to release if he did not check in to the computer at a certain time. However, a journalist with The Intercept that has worked with the whistleblower in the past says that Snowden is "fine," but would not elaborate further.
On Saturday Glenn Greenwald tweeted simply, "He's fine". While Snowden's first tweet was reported as "It's time," its complete text seems to suggest Snowden was gathering information for a book. "Did you work with me? Have we talked since 2013? Please recontact me securely, or talk to @bartongellman. It's time." That tweet ended with a URL that led to a tweet by Gellman. "If you have information on the work @Snowden did in the IC, help me tell it truthfully." And Saturday night Gellman also added a message on Twitter for "everyone requesting proof" that Snowden was alive. "Take a deep breath..."
Crime

Assange Says Wikileaks is 'Working On' Hacking Donald Trump's Tax Return (slate.com) 231

Julian Assange made headlines Friday when talk-show host Bill Maher asked him why Wikileaks wasn't hacking into Donald's Trump's tax returns. "Well, we're working on it," Assange replied. But it was apparently the culmination of a larger back-and-forth. An anonymous reader quotes Slate: Earlier in the interview, Maher said it sure looked like Assange was "working with a bad actor, Russia" to hurt "the one person who stands in the way of us being ruled by Donald Trump." Assange then tried to move the conversation toward what he thought was a smoking gun against Maher, saying he had found there was a "William Maher" who "gave a Clinton-affiliated entity $1 million." Maher explained he had famously given President Obama $1 million in 2012 and he never tried to hide it. When Assange pressed on whether he had also given money to Clinton, Maher shot back: "Fuck no."
Slate has a video of the entire interview, and while Friday WikiLeaks was publicizing Assange's appearance on the show on Twitter, Saturday they were tweeting a clarification. "WikiLeaks isn't 'working on' hacking Trump's tax-returns. Claim is a joke from a comedy show. We are 'working on' encouraging whistleblowers."
Government

Conservative Site Argues Profiting from Snowden 'Treason' May Violate Law (judicialwatch.org) 236

"A federal appellate court has ruled that government employees, such as Snowden, who signed privacy agreements can't profit from disclosing information without first obtaining agency approval," writes the conservative advocacy site Judicial Watch. Slashdot reader schwit1 quotes their article: This would make it illegal to profit from his crimes and the Department of Justice should confiscate all money made by the violators. Snowden is no whistleblower. In fact he violated his secrecy agreement, which means he and his conspirators can't materially profit from his fugitive status, violation of law, aiding and abetting of a crime and providing material support to terrorism.
In addition, they argue that both an upcoming movie about Snowden by Oliver Stone and the 2014 documentary Citizenfour "may be in violation of the Anti-Terrorism Act, which forbids providing material support or resources for acts of international terrorism... It's bad enough that people are profiting from Snowden's treason, but adding salt to the wound, the Obama administration is doing nothing about it. "
Electronic Frontier Foundation

Malware Linked To Government of Kazakhstan Targets Journalists, Political Activists and Lawyers, Says Report (eff.org) 23

An anonymous reader quotes a report from EFF: Journalists and political activists critical of Kazakhstan's authoritarian government, along with their family members, lawyers, and associates, have been targets of an online phishing and malware campaign believed to be carried out on behalf of the government of Kazakhstan, according to a new report by the Electronic Frontier Foundation (EFF). Malware was sent to Irina Petrushova and Alexander Petrushov, publishers of the independent newspaper Respublika, which was forced by the government of Kazakhstan to stop printing after years of exposing corruption but has continued to operate online. Also targeted are family members and attorneys of Mukhtar Ablyazov, co-founder and leader of opposition party Democratic Choice of Kazakhstan, as well as other prominent dissidents. The campaign -- which EFF has called "Operation Manul," after endangered wild cats found in the grasslands of Kazakhstan -- involved sending victims spearphishing emails that tried to trick them into opening documents which would covertly install surveillance software capable of recording keystrokes, recording through the webcam, and more. Some of the software used in the campaign is commercially available to anyone and sells for as little as $40 online.
Security

Ask Slashdot: Should The DHS Designate Elections As Critical Infrastructure? (politico.com) 279

The Department of Homeland Security is reportedly looking at designating elections as critical infrastructure, on par with the electricity grid or banking system, to help protect against cybersecurity threats. DHS Secretary Jeh Johnson said during a breakfast with reporters on August 3rd, "We should carefully consider whether our election system, our election process, is critical infrastructure. There is a vital national interest in our election process, so I do think to consider whether it should be considered by my department and others as critical infrastructure." Demerara writes: I'm fascinated to hear the opinions of Slashdotters on the practical implications of any decision to designate "elections" as critical national infrastructure. For those of you who have worked on systems that are already under this regime: given that there are just over 90 days to the November elections, what can be achieved with respect to elections and in particular to electronic voting machines (whether direct-recording electronic (DRE), touch screen etc., or precinct ballot scanning machines)? What might the designation require of state and county boards (the buyers of these systems) and what would the vendors have to do?
Facebook

Police Asked Facebook To Deactivate Woman's Account During Deadly Standoff (abc7.com) 447

An anonymous reader quotes a report from KABC-TV: In the midst of a five-hour standoff that turned deadly, Facebook granted an emergency request from the Baltimore County Police Department to take offline the social media accounts belonging to a woman who wielded a shotgun at officers. Baltimore County Police officers shot and killed Korryn Gaines, 23, after she barricaded herself inside her Randallstown apartment with her 5-year-old son and pointed a shotgun at officers attempting to serve an arrest warrant. Police Chief Jim Johnson said Tuesday that the department made the emergency request to have Gaines' social media accounts suspended after she posted videos online showing the standoff. People who saw the postings, Johnson said, responded by encouraging her to not comply with police. Videos posted on Facebook and Instagram appeared to show Gaines, who was black, talking with police in the doorway to her apartment and to her son during the standoff. The standoff Monday began after three officers went to Gaines' apartment to serve arrest warrants on her and her boyfriend, Kareem K. Courtney, 39, according to police. Gaines' bench warrant stemmed from charges during a March 10 stop, including disorderly conduct and resisting arrest. Authorities said she was armed with a 12-gauge pistol grip shotgun that was legally purchased last year and toward the end of the negotiations pointed it directly at an officer and said, "If you don't leave, I'm going to kill you." An officer shot at her and Gaines fired two shots, but missed the officers, who returned fire and killed her, police said. Facebook's policy says that it may grant law enforcement permission to suspend accounts in cases where there is a substantial risk of harm. Facebook has received roughly 855 requests for emergency disclosures of information to government agencies due to the threat of harm or violence between July and December 2015, according to their Government Request Report. About 73 percent of those requests were granted.
Communications

Top DNC Staffers Leave Following WikiLeaks Email Scandal (usatoday.com) 424

An anonymous reader writes from a report via USA Today: Following the leak of nearly 20,000 Democratic National Committee emails and the resignation of DNC Chairwoman Debbie Wasserman Schultz, several more staffers are leaving their positions. USA Today reports Amy Dacey, the chief executive officer of the DNC, Luis Miranda, the party's communications director, and Brad Marshall, chief financial officer, are all leaving the DNC. The statement announcing the staff changes praises the outgoing aides and makes no mention of the email issue. "Thanks in part to the hard work of Amy, Luis, and Brad, the Democratic Party has adopted the most progressive platform in history, has put itself in financial position to win in November, and has begun the important work of investing in state party partnerships. I'm so grateful for their commitment to this cause, and I wish them continued success in the next chapter of their career," said Donna Brazile, the party's interim chairwoman. Some of the leaked emails from party staffers depicted officials favoring now-Democratic nominee Hillary Clinton over Vermont Sen. Bernie Sanders during their primary campaign.
IOS

Apple Replaces The Pistol Emoji With A Water Gun (cnn.com) 246

Apple has a announced a number of new emoji changes on Monday, but the most controversial new change is that the pistol emoji will be replaced with a green water gun emoji in the company's upcoming iOS 10 operating system: The water gun swap is not Apple's first foray into cartoon gun control. Earlier this year the governing body in charge of emojis nixed a proposed rifle emoji. It was one of a number of possible new additions, but Unicode Consortium members Apple and Microsoft argued against the Olympics-inspired gun, according to Buzzfeed. Last year, an organization called New Yorkers Against Gun Violence started a campaign to get Apple to replace its version of the pistol emoji. It launched a site, disarmtheiphone.com, and sent an open letter to remove the firearm emoji "as a symbolic gesture to limit gun accessibility." As it stands, Microsoft is the only major software company to use a toy gun emoji instead of a pistol emoji in Windows -- Google, Samsung, Facebook and Twitter all use realistic pistol emojis. Apple's iOS 10 will be released in fall, but you can download the iOS 10 public beta to be one of the first to wield the toy gun emoji.
United Kingdom

Britain's Scientists Are 'Freaking Out' Over Brexit (washingtonpost.com) 517

"To use a nonscientific term, the scientists in the country are freaking out," reports the Washington Post. An anonymous Slashdot reader quotes their report: The researchers worry that Britain will not replace funding it loses when it leaves the E.U., which has supplied about $1.2 billion a year to support British science, approximately 10 percent of the total spent by government-funded research councils. There is a whiff of panic in the labs.

Worse than a possible dip in funding is the research community's fear that collaborators abroad will slink away and the country's universities will find themselves isolated. British research today is networked, expensive, competitive and global. Being part of a pan-European consortium has helped put Britain in the top handful of countries, based on the frequency of citations of its scientific papers... Anecdotal evidence suggests that headhunters may already be circling.

Meanwhile, NPR reports that Britain's vote to leave the EU "has depressed the value of the British pound," prompting many Britons to vacation at home rather than abroad -- while "Americans will find their dollars go further in Britain these days." And an anonymous Slashdot reader quotes a report from CNBC that Ford "is considering closing plants in the UK and across Europe in response to Britain's vote to leave the EU, as it forecast a $1 billion hit to its business over the next two years."
The Military

Russian Government Gets 'Hacked Back', Attacks Possibly Launched By The NSA (bbc.com) 173

An anonymous reader write: Russian government bodies have been hit by a "professional" cyber attack, according to the country's intelligence service, which said the attack targeted state organizations and defense companies, as well as Russia's "critically important infrastructures". The agency told the BBC that the powerful malware "allowed those responsible to switch on cameras and microphones within the computer, take screenshots and track what was being typed by monitoring keyboard strokes."
ABC News reports that the NSA "is likely 'hacking back' Russia's government-linked cyber-espionage teams "to see once and for all if they're responsible for the massive breach at the Democratic National Committee, according to three former senior intelligence officials... Robert Joyce, chief of the NSA's shadowy Tailored Access Operations, declined to comment on the DNC hack specifically, but said in general that the NSA has technical capabilities and legal authorities that allow the agency to 'hack back' suspected hacking groups, infiltrating their systems to gather intelligence about their operations in the wake of a cyber attack... In some past unrelated cases...NSA hackers have been able to watch from the inside as malicious actors conduct their operations in real time."
The Military

Russia's Rise To Cyberwar Superpower (dailydot.com) 79

"The Russians are top notch," says Chris Finan, an ex-director at DARPA for cyberwar research, now a CEO at security firm Manifold Technology, and a former director of cybersecurity legislation in the Obama administration. "They are some of the best in the world... " Slashdot reader blottsie quotes an article which argues the DNC hack "may simply be the icing on the cyberwar cake": In a flurry of action over the last decade, Russia has established itself as one of the world's great and most active cyber powers. The focus this week is on the leak of nearly 20,000 emails from the Democratic National Committee... The evidence -- plainly not definitive but clearly substantial -- has found support among a wide range of security professionals. The Russian link is further supported by U.S. intelligence officials, who reportedly have "high confidence" that Russia is behind the attack...

Beyond the forensic evidence that points to Russia, however, is the specter of President Vladimir Putin. Feeling encircled by the West and its expanding NATO alliance, the Kremlin's expected modus operandi is to strike across borders with cyberwar and other means to send strong messages to other nations that are a real or perceived threat.

The article notes the massive denial of service attack against Estonia in 2007 and the "historic and precedent-setting" cyberattacks during the Russian-Georgian War. "Hackers took out Georgian news and government websites exactly in locales where the Russian military attacked, cutting out a key communication mode between the Georgian state and citizens directly in the path of the fight."
Security

Bruce Schneier: Our Election Systems Must Be Secured If We Want To Stop Foreign Hackers (schneier.com) 204

Okian Warrior writes: Bruce Schneier notes that state actors are hacking our political system computers, intending to influence the results. For example, U.S. intelligence agencies have concluded that Russia was behind the release of DNC emails before the party convention, and WikiLeaks is promising more leaked dirt on Hillary Clinton. He points out, quite rightly, that the U.S. needs to secure its electronic voting machines, and we need to do it in a hurry lest outside interests hack the results. From the article: "Over the years, more and more states have moved to electronic voting machines and have flirted with internet voting. These systems are insecure and vulnerable to attack. But while computer security experts like me have sounded the alarm for many years, states have largely ignored the threat, and the machine manufacturers have thrown up enough obfuscating babble that election officials are largely mollified. We no longer have time for that. We must ignore the machine manufacturers' spurious claims of security, create tiger teams to test the machines' and systems' resistance to attack, drastically increase their cyber-defenses and take them offline if we can't guarantee their security online."

Slashdot Top Deals