Articles, Page 9 of 205
Can the USA make laws that bind non Americans living in other countries?
Julian Assange, an Australian living in London, and founder of Wikileaks, greatly embarrassed and offended the USA by publishing sensitive dioplomatic documents that had been given to him (and other media) by a US serviceman.
Clearly the serviceman broke a US law, making him liable to prosecution. Call him well meaning, whistleblower. naive, or a fool, but he was a sergeant and so should have known better than to breach the trust placed in him by his country.
Can anyone explain to me how Assange can be held accountable to US law. As a non citizen of the USA, he had no representation in the legislature that made publishing that information an offence for Americans in its jurisdiction. How can that domestic censorship law now be applied to a non citizen who at the time of the alleged crime was living in another country far outside of the jurisdiction of the USA?
Increased data storage density, retrieval speed and archival accuracy is always a huge IT problem as the volumes of information produced by business, science and academia continue to expand. Half a decade ago, the data demands were already somewhat enormous and growing exponentially. The Harvard Medical School in Boston recently made a breakthrough on the data storage front using DNA. Everyone always talks of the sheer capacity DNA has for storing massive amounts of information densely, however, the manifestation of using DNA for data storage has never come to fruition. Obviously, living organisms have little use for arbitrary data in their DNA and were actually killed by it. Furthermore, if the organisms lived, the natural process of genetic mutation would corrupt the data over time. Synthetic biologist George Church got around the hurdle by storing DNA fragments on the surface of a glass chip, all indexed and cross referenced against one another to ultimately store a genetics textbook as proof of concept. Other researchers utilize genetic watermarks, akin to digital ECC, in order to detect and prevent data mutation.
With exception to Stuxnet, all of the recent big discoveries in malware trampling the Middle East have not been destructive. Duqu, Flame and Gauss among others all seem to be oriented towards spying as they feature the traditional key loggers, microphone enablers, etc. Yet another piece of malware has been found lurking about, this time in Saudi Arabian energy systems and its destructive. The malware has bounced between being named Shamoon and Wiper, based on strings found internally. In a nutshell, reverse engineers have discovered it uses a legitimate, signed driver (stolen) in order to gain low level disk access to perform a data wipe. A continued effort suggests the malware also exfiltrates infomation about the target computer to an internal node used as a single point of presence for assessing its destructive success. All of this is consolidated in a nice, neat little delivery package totaling only about 900kb.
Have you ever wanted to talk to the bastards who pay people to drop those inane spam comments on our Omninerd web site?
The comments are usually a totally irrelevant and meaningless statement from an anonymous who knows nothing about some subject thread that has been dormant for a long time. They always include a hyper-link to a commercial web site, and the parasites are paid for the hits generated.
Perhaps you don’t see many of these contributions. If that is so it is because many of the regulars on this site are empowered to delete them.
With the collapse of mainstream commercial print and electronic media, the advertising industry is desperate for ways to target commercials and it would like to fuck up any and all internet discussion forums and social or professional web sites with this crap.
Recent reports call out the silent presence of a Russian Akula class submarine in the Gulf of Mexico as a failure of American national defenses. The matter naturally adds fuel to the running Internet memes that Vladimir Putin is among the most bad-ass of all Russians. In reality, the activity is nothing new per se, the Russians and Americans have parked submarines near each others coasts or flown sorties across each others land masses for decades. The proximity of this particular Akula class submarine and the duration for which it went undetected sets it apart from the others. American officials commented, “The Akula was built for one reason and one reason only: To kill U.S. Navy ballistic missile submarines and their crews. It’s a very stealthy boat so it can sneak around and avoid detection and hope to get past any protective screen a boomer might have in place.”
There have been quite a few anonymous leaks from the present administration – ranging from taking credit for the infamous Stuxnet, the kill lists to details on the bin Laden raid. While all of the actions are egregious disclosures of classified information, the bin Laden raid details particularly raised the ire of the special forces community across the military services. Although the active component has generally simmered in silence, the community’s members that have departed service are now speaking up. One former SEAL commented, “If you disclose how we got there, how we took down the building, what we did, how many people were there, that it’s going to hinder future operations, and certainly hurt the success of those future operations.” And flipping the President’s own words about small business owners back at him, “Mr. President, you did not kill Osama bin Laden. America did.” The disgruntled veterans, tired of being used to bolster Obama’s re-election campaign, put together a 22 minute video to air their concerns publicly.
Mothra is a giant butterfly/moth hybrid that terrorized Japan in a series of monster genre movies. Unfortunately for Japan, Patient Zero of the butterfly world has emerged outside of the Fukushima nuclear plant. Thanks to a massive release of radioactive particles, the Zizeeria Maha Serica are showing genetic abnormalities that have only been reproduced scientifically using doses of radiation. These abnormalities have not yet resulted in gigantism or similar destructive features but include changes to wing patterns, antenna length and eye deformities.
So OmniNerds, who is this guy and why should we care? After all, the Vice President really doesn’t do much at all except wait for the President to die.
If you’ve been completely under a rock, Paul Ryan is Mitt Romney’s chosen running mate for Vice President. CNN has a basic rundown of Paul Ryan facts to establish a few starting point metrics. Naturally, the Obama camp already has their this guy is a sham articles up and posted.
No doubt you already know ‘merica has conquered Mars once again. NASA’s Curiosity rover touched down in a dramatic sky crane landing a few days ago. Instead of bouncing across the landscape in a giant beachball like the Spirit and Opportunity rovers, Curiosity plunged through the atmosphere on a parachute whereupon it’s rocket backpack fired before impact allowing it to be lowered to Mars on a rappelling tether. That’s super bad ass NASA … fist bump. Prior to conducting any science, the vehicle is performing integrity checks which included more or less holding an iPhone up to a mirror and taking a picture of its butt. The images were created when the mast instrument checks were performed with the panoramic cameras providing a view of both Curiosity and the surrounding scorch marks from the landing rockets. Curiosity is expected to run for at least two years and packs 15 times as many instruments as its predecessors into its car sized frame.
BlackHat 2012 proved once again to be an interesting conference full of the latest security research, training and hacks. One interesting presentation proved how insecure hotel locks are, specifically the ones utilizing the magnetic card keys. Hacker Cody Brocious used nothing more than a simple Arduino to read digital data and replay it. More specifically, a DC power port on the bottom of Onity locks allows for recharging the on-board battery and configuring a hotel specific code into the door. Using the Arduino, Brocious plugged into the DC port, read the 32bit hotel specific code and simply played it back which has the simple effect of … unlocking the door. A full technical write-up is available at the hacker’s website.
Chick-fil-A became embroiled in controversy over comments by Dan Cathy, the company’s CEO. In a nutshell, he didn’t just provide his opinion on same-sex marriage but indicated his company took an anti-same-sex marriage position based on its Christian values. Of course, they immediately became a poster child business for ardent Christians But the issue went further as some municipalities made public statements against the business for its inflammatory stance. This led to a rather interesting turnabout of additional protesters (that the religious right are incorrectly assuming take their side) that are simply arguing a government entity cannot punish a business for First Amendment rights. (After all, Romney made the news for declaring corporations are people too). The issue is now both anti/pro same-sex marriage AND first amendment rights for businesses against political opinions.
Anybody else think NBC’s coverage of the 2012 Olympics suck? Personally, I find it ridiculous that sports are on-going throughout the day and yet if I turn on the television there is nothing showing until the evening. By that point, any events I’m interested in, I’ve already found out the results from the Internet. And then, despite a plethora of athletes from around the world competing, all NBC seems to air are Americans, lengthy commercials and long winded background stories. I remember while living in Europe their sports channels carried nearly non-stop Olympic coverage spanning all sorts of events and showing as many athletes as possible. It’s not really a surprise so few people seem to care anymore.
How do you delineate software engineers, software developers and computer scientists from one another? There are, of course, “definitions” for these individuals but practical reality often differs.
One amusing anecdote I’ve seen said, “A Software Engineer is the person you call to reset your password. A Software Developer is the person you call to set up a new Excel macro. Nobody knows what a Computer Scientist is.”
Women in the Army are on the verge of getting new armor. The simple fact of the matter is that current vest and plate designs just don’t fit right on women due to different body form factors. While it’s easy to simply redesign the shapes, the “challenge right now is that when you bring in those complex curvatures, the plate loses some of its strength.” In other words, 0xB16B00B5 get in the way and weaken contemporary plate designs if they’re simply reshaped to form. Perhaps this is the first step towards a military uniform consisting of form-fitting spandex just like the comic books said would happen.