For 20 Years the Nuclear Launch Code at US Minuteman Silos Was 00000000

Today I found out that during the height of the Cold War, the US military put such an emphasis on a rapid response to an attack on American soil, that to minimize any foreseeable delay in launching a nuclear missile, for nearly two decades they intentionally set the launch codes at every silo in the US to 8 zeroes. Read more…        

Read More:
For 20 Years the Nuclear Launch Code at US Minuteman Silos Was 00000000

Sweden Is Closing Many Prisons Due to Lack of Prisoners

rtoz writes “Sweden is taking steps to close many prisons due to lack of prisoners. This year alone, four prisons and a detention center got closed in Sweden. The percentage of the population in Sweden prison is significantly lower than in most other countries. … Though the Swedish Government is taking steps to close the prisons, the crime rate in Sweden has increased slightly. It seems they are planning to take steps for preventing crime rather than focusing on jailing people involved in criminal activities.” Read more of this story at Slashdot.

See more here:
Sweden Is Closing Many Prisons Due to Lack of Prisoners

Climb Your Family Tree With These Online Genealogy Tools

The questions of who we are and where we came from can often be answered, not by looking inward, but by looking backward. While nature and nurture certainly play the primary roles in our development as individuals, it’s only through the study of one’s ancestry that we develop a more complete view of ourselves as how we fit into the larger scope of human history. Luckily, tracing one’s roots is easier than ever thanks to the Internet. Read more…        

Read More:
Climb Your Family Tree With These Online Genealogy Tools

T-Mobile Announces Free, Unlimited Roaming in 100 Countries

Starting October 31st, T-Mobile users will be gain unlimited texts and data in over 100 countries, at no additional cost. That’s right—if you’re on a supported Simple Choice plan, you no longer have to worry about exorbitant roaming charges when you travel. Read more…        

Link:
T-Mobile Announces Free, Unlimited Roaming in 100 Countries

The FDA Isn’t Inspecting Food During The Government Shutdown

E-coli outbreaks crop up every now and then. Some are more widespread then others, but if they’re related to food and especially if that food may have crossed state lines, the FDA starts tracing to find the source. If foodborne bacteria cause an outbreak in the U.S. today, though, the FDA won’t do anything. Because the FDA is closed. Read more…        

Read the original post:
The FDA Isn’t Inspecting Food During The Government Shutdown

Apple Now Relaying All FaceTime Calls Due To Lost Patent Dispute

Em Adespoton writes “Before the VirnetX case, nearly all FaceTime calls were done through a system of direct communication. Essentially, Apple would verify that both parties had valid FaceTime accounts and then allow their two devices to speak directly to each other over the Internet, without any intermediary or ‘relay’ servers. However, a small number of calls—5 to 10 percent, according to an Apple engineer who testified at trial—were routed through ‘relay servers.’ At the August 15 hearing, a VirnetX lawyer stated that Apple had logged ‘over half a million calls’ complaining about the quality of FaceTime [since disabling direct connections].” Read more of this story at Slashdot.

See original article:
Apple Now Relaying All FaceTime Calls Due To Lost Patent Dispute

Cry (foam-padded) havoc! A day at Darkon’s Bellum Aeternus II

Armies face off during a bridge battle at Bellus Aeternum II in Upper Marlboro, Maryland. Jonah Gallagher PATUXENT RIVER STATE PARK, Maryland—For four days, the Darkon Wargaming Club took over a section of a park outside Upper Marlboro that once served as a grass airfield. Temporarily, it became a combination of festival encampment and battleground. The event was the second edition of Bellum Aeternuthe club’s invitational event for live-action role-play (LARP) and combat, open to participants from across the medieval-themed LARP community. As I described in my feature on the first Bellum Aeternus last November , Darkon is a live-action combination of fantasy tabletop role-play (like Dungeons and Dragons ) and wargaming (like Warhammer ), combining a full-contact battle sport with a strategic land warfare game and scenario-driven adventures. Darkon is an offshoot of the “boffer” combat gaming community that originally sprung up in Maryland, Washington DC, and Northern Virginia. Unlike the Society for Creative Anachronism’s armored combat , Darkon and similar combat games use padded weapons for safety and to allow unarmored (and occasionally barely dressed) participants. Unlike Dagorhir , from which Darkon and most of the other US fantasy combat LARP games evolved, Darkon incorporates a magic system that has spellcasters throwing beanbag “fireballs” and “lightning bolts” in combat. Participants also use other magic to avoid taking hits in battle or rendering opponents’ defenses useless. And unlike Amtgard, another fantasy LARP, Darkon allows for some serious full-contact combat—using tactics such as “shield bashing” to knock opponents over and allowing the use of bows with pad-tipped arrows. The combination of archers and spellcasters drives some of those from other, larger game communities to distraction. It changes the balance of the combat game from pure martial beatdown to one where players with a wide range of physical abilities can take part. Read 3 remaining paragraphs | Comments        

Link:
Cry (foam-padded) havoc! A day at Darkon’s Bellum Aeternus II

Three Banks Lose Millions After Wire Transfer Switches Hacked

mask.of.sanity writes “Criminals have stolen millions from three unnamed U.S. banks by launching slow and stealthy denial of service attacks as a distraction before attacking wire payment switches. The switches manage and execute wire transfers and could have coughed up much more cash should the attackers have pressed on. RSA researcher Limor Kessem said, ‘The service portal is down, the bank is losing money and reliability, and the security team is juggling the priorities of what to fix first. That’s when the switch attack – which is very rare because those systems are not easily compromised [and require] high-privilege level in a more advanced persistent threat style case – takes place.'” Read more of this story at Slashdot.

Read More:
Three Banks Lose Millions After Wire Transfer Switches Hacked

Radiohead’s Thom Yorke Pulls Albums From Spotify In Protest of Low Royalties

First time accepted submitter rpopescu writes “Thom Yorke of Radiohead fame has pulled his solo album ‘Eraser’ (as well as music made as Atoms for Peace) from the music streaming service Spotify, as a protest at how much it pays the artists. Quote: ‘”Make no mistake. These are all the same old industry bods trying to get a stranglehold on the delivery system.”‘” Read more of this story at Slashdot.

Originally posted here:
Radiohead’s Thom Yorke Pulls Albums From Spotify In Protest of Low Royalties

Computer scientists to FBI: don’t require all our devices to have backdoors for spies

In an urgent, important blog post, computer scientist and security expert Ed Felten lays out the case against rules requiring manufacturers to put wiretapping backdoors in their communications tools. Since the early 1990s, manufacturers of telephone switching equipment have had to follow a US law called CALEA that says that phone switches have to have a deliberate back-door that cops can use to secretly listen in on phone calls without having to physically attach anything to them. This has already been a huge security problem — through much of the 1990s, AT&T’s CALEA controls went through a Solaris machine that was thoroughly compromised by hackers, meaning that criminals could listen in on any call; during the 2005/6 Olympic bid, spies used the CALEA backdoors on the Greek phone company’s switches to listen in on the highest levels of government. But now, thanks to the widespread adoption of cryptographically secured messaging services, law enforcement is finding that its CALEA backdoors are of declining utility — it doesn’t matter if you can intercept someone else’s phone calls or network traffic if the data you’re captured is unbreakably scrambled. In response, the FBI has floated the idea of “CALEA II”: a mandate to put wiretapping capabilities in computers, phones, and software. As Felten points out, this is a terrible idea. If your phone is designed to secretly record you or stream video, location data, and messages to an adverse party, and to stop you from discovering that it’s doing this, it puts you at huge risk when that facility is hijacked by criminals. It doesn’t matter if you trust the government not to abuse this power (though, for the record, I don’t — especially since anything mandated by the US government would also be present in devices used in China, Belarus and Iran) — deliberately weakening device security makes you vulnerable to everyone, including the worst criminals: Our report argues that mandating a virtual wiretap port in endpoint systems is harmful. The port makes it easier for attackers to capture the very same data that law enforcement wants. Intruders want to capture everything that happens on a compromised computer. They will be happy to see a built-in tool for capturing and extracting large amounts of audio, video, and text traffic. Better yet (for the intruder), the capability will be stealthy by design, making it difficult for the user to tell that anything is amiss. Beyond this, the mandate would make it harder for users to understand, monitor, and fix their own systems—which is bad for security. If a system’s design is too simple or its operation too transparent or too easy to monitor, then wiretaps will be evident. So a wiretappability mandate will push providers toward complex, obfuscated designs that are harder to secure and raise the total cost of building and operating the system. Finally, our report argues that it will not be possible to block non-compliant implementations. Many of today’s communication tools are open source, and there is no way to hide a capability within an open source code base, nor to prevent people from simply removing or disabling an undesired feature. Even closed source systems are routinely modified by users—as with jailbreaking of phones—and users will find ways to disable features they don’t want. Criminals will want to disable these features. Ordinary users will also want to disable them, to mitigate their security risks. Felten’s remarks summarize a report [PDF] signed by 20 distinguished computer scientists criticizing the FBI’s proposal. It’s an important read — maybe the most important thing you’ll read all month. If you can’t trust your devices, you face enormous danger. CALEA II: Risks of wiretap modifications to endpoints        

Read more here:
Computer scientists to FBI: don’t require all our devices to have backdoors for spies