Are those lost IRS e-mails “unbelievable”? Not really

Former IRS official Lois Lerner giving testimony to a Congressional committee in 2013. The IRS says it can’t find her e-mails from before 2011. During a hearing held yesterday by the House Oversight Committee, Committee Chairman Darrel Issa said that it was “unbelievable” that the IRS had lost the e-mails of former IRS official Lois Lerner. While Congressman Issa is not generally ignorant on tech issues, he’s clearly not familiar with just how believable such a screw-up is. The IRS claims that many of Lerner’s e-mails were lost when the hard drive on her desktop computer crashed in 2011. In a Monday night hearing, IRS Commissioner John Koskinen told Issa and the Oversight Committee that there was no way to recover these e-mails. “If you have a magical way for me to do that,” he told Issa, “I’d be happy to hear about it.” The IRS is not the only federal agency to lose e-mails over the past few years. In fact, despite efforts at many agencies to standardize and improve e-mail by moving to services like Google Apps for Government and Microsoft Office 365 Government, many agencies still run their e-mail like it’s 1999. It’s not just a technology issue—it’s an IT policy issue, a staffing issue, and a cultural issue within government, one that the federal government shares with many private corporations. Read 12 remaining paragraphs | Comments

View article:
Are those lost IRS e-mails “unbelievable”? Not really

NASA melds vacuum tube tech with silicon to fill the terahertz gap

Vacuum tubes in a guitar amplifier. Shane Gorski The transistor revolutionized the world and made the abundant computing we now rely on a possibility, but before the transistor, there was the vacuum tube. Large, hot, power hungry, and prone to failure, vacuum tubes are a now-forgotten relic of the very earliest days of computing. But there’s a chance that vacuum tube technology could make its way back into computers—albeit without the vacuum—thanks to NASA research that has put together nanoscale “vacuum channel” transistors that can switch at more than 400GHz. Vacuum tubes have three important components: two electrodes—the negative, electron-emitting cathode, and the positive, electron-receiving anode—and a control grid placed between them. The flow of current between the cathode and the anode is controlled by the grid; the higher the voltage applied to the grid, the greater the amount of current that can flow between them. All three parts are housed in an evacuated glass tube or bulb and look somewhat like a kind of overcomplicated light bulb. The thing that made vacuum tubes so hot and power hungry was the cathode. Electrons can be encouraged to cross gaps by using very high voltages, but these tend to be difficult to work with. Instead, a phenomenon called thermionic emission is used—heat a piece of metal up enough, and the thermal energy lets the electrons escape the metal. Vacuum tubes have heating elements to make the cathode hot enough to emit electrons. Read 8 remaining paragraphs | Comments

View post:
NASA melds vacuum tube tech with silicon to fill the terahertz gap

Mint 17 is the perfect place for Linux-ers to wait out Ubuntu uncertainty

The team behind Linux Mint unveiled its latest update this week—Mint 17 using kernel 3.13.0-24, nicknamed “Qiana.” The new release indicates a major change in direction for what has quickly become one of the most popular Linux distros available today. Mint 17 is based on Ubuntu 14.04, and this decision appears to have one major driver.  Consistency.  Like the recently released Ubuntu 14.04, Mint 17 is a Long Term Support Release. That means users can expect support to continue until 2019. But even better, this release marks a change in Mint’s relationship with Ubuntu. Starting with Mint 17 and continuing until 2016, every release of Linux Mint will be built on the same package base—Ubuntu 14.04 LTS. With this stability, instead of working to keep up with whatever changes Ubuntu makes in the next two years, Mint can focus on those things that make it Mint. With major changes on the way for Ubuntu in the next two years, Mint’s decision makes a lot of sense. Not only does it free up the Mint team to focus on its two homegrown desktops (Cinnamon and MATE), but it also spares Mint users the potential bumpy road that is Ubuntu’s future. Read 53 remaining paragraphs | Comments

Original post:
Mint 17 is the perfect place for Linux-ers to wait out Ubuntu uncertainty

Report: Seattle paid $17,500 to boost online reputation of city official

tdlucas5000 A newly-published document shows that Seattle’s publicly-owned electrical utility paid thousands of dollars to Brand.com to manage the online reputation of CEO Jorge Carrasco. The document , which was received and published Saturday by the Seattle Times after a public records request, shows that Brand.com charged City Light $5,000 in December 2013. As the contract states: Read 6 remaining paragraphs | Comments

Excerpt from:
Report: Seattle paid $17,500 to boost online reputation of city official

Unicode 7.0 introduces 2,834 new characters, including 250 emoji

We can leave dumb old “words” behind as soon as emoji evolve to express all forms of human feeling and emotion. Andrew Cunningham The Unicode Consortium has just announced the release of version 7.0 of the Unicode Standard , the list of characters ” which specifies the representation of text in all modern software products and standards .” Unicode 7.0 adds 2,834 new characters to the existing list of 110,187 characters defined by Unicode 6.3, including new symbols for currency, new “lesser-used and historic scripts,” and extended support “for written languages of North America, China, India, other Asian countries, and Africa.” Of course, the Internet being what it is, what people seem the most excited about are the 250 new emoji characters, listed here by Emojipedia . Notable additions include “hot pepper,” “sleuth or spy,” “man in business suit levitating,” “reversed hand with middle finger extended,” and “raised hand with part between middle and ring fingers” (aka the ” live long and prosper ” thing). The list of emoji also extends the character set’s adorable fascination with outmoded technology thanks to icons like “soft shell floppy disk,” “fax icon,” and “old personal computer.” Mostly absent from that list of new emoji are the more racially diverse characters Apple said it was trying to introduce back in March . There are a few characters that suggest progress on that front (“sideways black left pointing index,” “black up pointing backhand index,” and so on, assuming that “index” is a reference to index fingers), but those additions don’t introduce parity between black- and white-skinned icons, nor do they account for other skin tones. That’s not necessarily surprising, since these standards take a long time to change—hopefully more characters are introduced in a future Unicode release. Read 1 remaining paragraphs | Comments

View article:
Unicode 7.0 introduces 2,834 new characters, including 250 emoji

Local cops in 15 US states confirmed to use cell tracking devices

ACLU A new map released  Thursday by the American Civil Liberties Union shows that fake cell towers, also known as stingrays, are used by state and local law enforcement in 15 states. Police departments in Baltimore, Chicago, Houston, Tucson, Los Angeles, and even Anchorage, among others, have been confirmed to use the devices. Beyond those states, 12 federal law enforcement agencies, ranging from the FBI to the National Security Agency, also employ them. Relatively little is known about precisely how police decide when and where to deploy them, but stingrays are used to track targeted phones and can also be used to intercept calls and text messages. However, privacy advocates worry that while the devices go after specific targets, they also often capture data of nearby unrelated people. Read 4 remaining paragraphs | Comments

Read More:
Local cops in 15 US states confirmed to use cell tracking devices

Google’s university book scanning can move ahead without authors’ OK

random letters/Flickr A federal appeals court on Tuesday upheld the right of universities, in conjunction with Google, to scan millions of library books without the authors’ permission. The 2nd US Circuit Court of Appeals, ruling in a case brought by the Authors Guild and other writers’ groups, argued that the universities were not breaching federal copyright law, because the institutions were protected by the so-called “fair use” doctrine. More than 73 percent of the volumes were copyrighted. The guild accused 13 universities in all of copyright infringement for reproducing more than 10 million works without permission and including them in what is called the HathiTrust Digital Library  (HDL) available at 80 universities. The institutions named in the case include the University of California, Cornell University, Indiana University, and the University of Michigan. Read 7 remaining paragraphs | Comments

Read the original:
Google’s university book scanning can move ahead without authors’ OK

Is Chicago using cell tracking devices? One man tries to find out

David D’Agostino A local activist has filed a new lawsuit against the Chicago Police Department in an attempt to learn how the city uses fake cell tower devices, also known as stingrays. Relatively little is known about the devices, which are used to track targeted phones and can also be used to intercept calls and text messages. The American Civil Liberties Union recently began a campaign to learn more about how stingrays are used by filing public records requests in Florida, the home state of the Stingray’s manufacturer, Harris Corporation. (While “Stringray” is a trademarked name and particular product, it has entered the technical lexicon as a generic term, like Kleenex or Xerox.) In nearly every sales agreement , that firm has required law enforcement agencies to sign nondisclosure agreements forbidding them from discussing whether or not an agency even possesses such a device, much less describing its capabilities. Read 8 remaining paragraphs | Comments

More:
Is Chicago using cell tracking devices? One man tries to find out

We “will be paying no ransom,” vows town hit by Cryptowall ransom malware

Cisco Systems The town manager of a hamlet in south eastern New Hampshire has defied demands that he pay a ransom to recover police department computer files taken hostage by Cryptowall, a newer piece of malware that encrypts hard drive contents of infected machines until victims pay for them to be decrypted. “Make no mistake, the Town of Durham will be paying no ransom,” Town Manager Todd Selig was quoted as saying by CBS Boston news. Police department computers for the town of almost 15,000 residents were reportedly infected Thursday after an officer opened what appeared to be a legitimate file attachment to an e-mail. By Friday morning, widespread “issues” were hitting the department computer network . It was shut down by noon that day to prevent the infection from spreading to other systems. The game may be RIGged The department was reportedly hit by Cryptowall, a newer form of crypto malware that rivals the better known CryptoLocker . According to a blog post published Thursday by researchers from Cisco Systems, Cryptowall has been gaining ground since April, when it was folded into the RIG exploit kit, which is software sold in underground forums that automates computer scams and malware attacks for less technically knowledgeable criminals. Cisco’s Cloud Web Security service has been blocking requests tied to more than 90 infected Internet domains pushing Cryptowall scams to more than 17 percent of service customers. Read 6 remaining paragraphs | Comments

Excerpt from:
We “will be paying no ransom,” vows town hit by Cryptowall ransom malware

“WARNING Your phone is locked!” Crypto ransomware makes its debut on Android

Eset Security researchers have documented another first in the annals of Android malware: a trojan that encrypts photos, videos, and documents stored on a device and demands a ransom for them to be restored. The crudeness of Android/Simplocker, as the malicious app has been dubbed, suggests it’s still in the proof-of-concept phase, Robert Lipovsky, a malware researcher for antivirus provider Eset, said in a recent blog post . The malware also addresses users in Russian and demands that payments be made in Ukrainian hryvnias, an indication that it targets only people in Eastern Europe. Still, the trojan—with its combination of social engineering, strong encryption, and robust Internet architecture—could be a harbinger of more serious and widespread threats to come. After all, the first Android trojans to make hefty SMS charges also debuted in the same region. Once installed on a device, the app delivers the following message: Read 3 remaining paragraphs | Comments

More:
“WARNING Your phone is locked!” Crypto ransomware makes its debut on Android