FBI agent tries to copyright super-secret torture manual, inadvertently makes it public

The ACLU has spent years in court trying to get a look at a top-secret FBI interrogation manual that referred to the CIA’s notorious KUBARK torture manual. The FBI released a heavily redacted version at one point — so redacted as to be useless for determining whether its recommendations were constitutional. However, it turns out that the FBI agent who wrote the manual sent a copy to the Library of Congress in order to register a copyright in it — in his name! (Government documents are not copyrightable, but even if they were, the copyright would vest with the agent’s employer, not the agent himself). A Mother Jones reporter discovered the unredacted manual at the Library of Congress last week, and tipped off the ACLU about it. Anyone can inspect the manual on request. Go see for yourself! The 70-plus-page manual ended up in the Library of Congress, thanks to its author, an FBI official who made an unexplainable mistake. This FBI supervisory special agent, who once worked as a unit chief in the FBI’s counterterrorism division, registered a copyright for the manual in 2010 and deposited a copy with the US Copyright Office, where members of the public can inspect it upon request. What’s particularly strange about this episode is that government documents cannot be copyrighted. “A document that has not been released does not even need a copyright,” says Steven Aftergood, a government secrecy expert at the Federation of American Scientists. “Who is going to plagiarize from it? Even if you wanted to, you couldn’t violate the copyright because you don’t have the document. It isn’t available.” “The whole thing is a comedy of errors,” he adds. “It sounds like gross incompetence and ignorance.” Julian Sanchez, a fellow with the libertarian Cato Institute who has studied copyright policy, was harsher: “Do they not cover this in orientation? [Sensitive] documents should not be placed in public repositories—and, by the way, aren’t copyrightable. How do you even get a clearance without knowing this stuff?” You’ll Never Guess Where This FBI Agent Left a Secret Interrogation Manual [Nick Baumann/Mother Jones] ( via Techdirt ) ( Image: FBI , a Creative Commons Attribution Share-Alike (2.0) image from 10542402@N06’s photostream )        

Read More:
FBI agent tries to copyright super-secret torture manual, inadvertently makes it public

Army Laser Passes Drone-Killing Test

Nerval’s Lobster writes “Commercial package-delivery drones such as those revealed by Amazon and DHL could face danger from more than shotgun-toting, UAV-hunting yahoos following the successful test of a drone-killing laser by the U.S. Army. Though it’s more likely to take aim at enemy observation drones than Amazon’s package-deliver ‘copters, the U.S. Army’s High Energy Laser Mobile Demonstrator (HEL-MD) did prove itself in tests last week by shooting down 90 incoming mortars and a series of Unmanned Aerial Vehicles (UAV). The original goal during the test at White Sands Missile Range in New Mexico was to burn out or blow up mortar rounds and blind the cameras or other sensors carried by drones. The laser proved capable enough to damage or slice off the tails of target drones, which brought them down, according to Terry Bauer, HEL MD program manager, as quoted in the Dec. 11 Army announcement of the test. The quarter-sized beam of super-focused light set off the explosives in the 60-millimeter mortars in mid-flight, leaving the rest to fall ‘like a rock, ‘ Bauer said. The laser could target only one mortar at a time, but could switch targets quickly enough to bring down several mortars fired in a single volley. The laser and its power source are contained in a single 500-horsepower, four-axle truck but was directed by a separate Enhanced Multi Mode Radar system. The next step is a move from New Mexico to a testing range in Florida early next year ‘to test it in ran and fog and things like that, ‘ according to Bauer.” Read more of this story at Slashdot.

See the original article here:
Army Laser Passes Drone-Killing Test

DeLorean’s Next Radical Idea: An Engine that Starts Using Lasers

You might not realize what a great engineer DeLorean was — until you look at these never-before-seen sketches for a next-generation engine. Which included laser ignition, and something that looks curiously like a flux capacitor. Read more…        

Read More:
DeLorean’s Next Radical Idea: An Engine that Starts Using Lasers

Aluminum castings of ant-nests

Anthill Art fills ant colonies with molten aluminum, creating massive, intricate castings of the architecture of the ants’ nests. They’re for sale on Ebay (surprisingly cheap, too), and they’re spectacular. I make casts of ant colonies using molten aluminum to fill the tunnels and chambers of the nest. The result is an amazing sculpture showing the intricate detail of the nest architecture. The cast is then mounted for display on a wood base. Each display has a stainless steel plaque mounted on it with information on the cast and a unique cast number. These make perfect displays for a home or as an educational piece for teachers and professors to display in a science classroom or laboratory. Anthill Art – Artistic and Educational Ant Colony Castings ( Thanks, Fipi Lele! )        

See the original post:
Aluminum castings of ant-nests

FreeBSD won’t use Intel & Via’s hardware random number generators, believes NSA has compromised them

The maintainers of the security-conscious FreeBSD operating system have declared that they will no longer rely on the random number generators in Intel and Via’s chips , on the grounds that the NSA likely has weakened these opaque hardware systems in order to ease surveillance. The decision is tied to the revelations of the BULLRUN/EDGEHILL programs, wherein the NSA and GCHQ spend $250M/year sabotaging security in standards, operating systems, software, and networks. “For 10, we are going to backtrack and remove RDRAND and Padlock backends and feed them into Yarrow instead of delivering their output directly to /dev/random,” FreeBSD developers said. “It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more.” In separate meeting minutes, developers specifically invoked Snowden’s name when discussing the change. “Edward Snowdon [sic] — v. high probability of backdoors in some (HW) RNGs,” the notes read, referring to hardware RNGs. Then, alluding to the Dual EC_DRBG RNG forged by the National Institute of Standards and Technology and said to contain an NSA-engineered backdoor, the notes read: “Including elliptic curve generator included in NIST. rdrand in ivbridge not implemented by Intel… Cannot trust HW RNGs to provide good entropy directly. (rdrand implemented in microcode. Intel will add opcode to go directly to HW.) This means partial revert of some work on rdrand and padlock.” “We cannot trust” Intel and Via’s chip-based crypto, FreeBSD developers say [Dan Goodin/Ars Technica]        

Read the original post:
FreeBSD won’t use Intel & Via’s hardware random number generators, believes NSA has compromised them

Spooks of Warcraft: how the NSA infiltrated gamespace

A new Snowden leak details how he NSA and GCHQ tasked its agents to infiltrate Second Life, World of Warcraft, and other MMOs to find jihadis and spy on them. The battalions of undercover orcs did indeed take much of gamespace, but there’s no evidence they ever spotted a plot. I was once questioned by members of an “unnamed branch of the State Department” at a games and public diplomacy event about the likelihood that jihadis were playing MMOs; and I said something like, “Sure, of course. Everyone plays MMOs.” I didn’t realize they’d take it all quite so much to heart. The absurdity of sending spies to infiltrate Warcraft can best be understood as a natural outflow of the doctrine that holds that if any two bad guys, anywhere in the world, can communicate in such a way that the NSA can’t listen in on them, all of society will crumble. Once you set yourself the insane task of eavesdropping on all conversations, everywhere, always, it’s inevitable that you’ll send Secret Squirrel and his pals to Azeroth. At the request of GCHQ, the NSA had begun a deliberate effort to extract World of Warcraft metadata from their troves of intelligence, and trying to link “accounts, characters and guilds” to Islamic extremism and arms dealing efforts. A later memo noted that among the game’s active subscribers were “telecom engineers, embassy drivers, scientists, the military and other intelligence agencies”. The UK agency did not stop at World of Warcraft, though: by September a memo noted GCHQ had “successfully been able to get the discussions between different game players on Xbox Live”. Meanwhile, the FBI, CIA, and the Defense Humint Service were all running human intelligence operations – undercover agents – within the virtual world of Second Life. In fact, so crowded were the virtual worlds with staff from the different agencies, that there was a need to try to “deconflict” their efforts – or, in other words, to make sure each agency wasn’t just duplicating what the others were doing. By the end of 2008, such human intelligence efforts had produced at least one usable piece of intelligence, according to the documents: following the successful takedown of a website used to trade stolen credit card details, the fraudsters moved to Second Life – and GCHQ followed, having gained their first “operational deployment” into the virtual world. This, they noted, put them in touch with an “avatar [game character] who helpfully volunteered information on the target group’s latest activities”. Second Life continued to occupy the intelligence agencies’ thoughts throughout 2009. One memo noted the game’s economy was “essentially unregulated” and so “will almost certainly be used as a venue for terrorist laundering and will, with certainty, be used for terrorist propaganda and recruitment”. Revealed: spy agencies’ covert push to infiltrate virtual world of online games [James Ball/The Guardian]        

See the article here:
Spooks of Warcraft: how the NSA infiltrated gamespace

Medieval kids’ birch-bark doodles

Michael sez, “Apparently medieval Russian schoolroooms used birch bark for things like writing practice. Erik Kwakkel, medieval book historian at Leiden University, Netherlands, has some charming photos of stick-figure illustrations on bark by kids who, like kids everywhere, got a bit bored with the lesson and started doodling in the margins. There are links to more images (and an interesting scholarly article) at the bottom of the post .” The most special items, however, are the ones shown above, which are from a medieval classroom. In the 13th century, young schoolboys learning to write filled these scraps with alphabets and short texts. Bark was ideal material for writing down things with such a short half-life. Then the pupils got bored and started to doodle, as kids do: crude drawings of individuals with big hands, as well as a figure with a raised sword standing next to a defeated beast (lower image). The last one was drawn by Onfim, who put his name next to the victorious warrior. The snippets provide a delightful and most unusual peek into a 13th-century classroom, with kids learning to read – and getting bored in the process. Medieval kids’ doodles on birch bark [Erik Kwakkel] ( Thanks, Michael ! )        

See the article here:
Medieval kids’ birch-bark doodles

Botnet of 20,000 point-of-sale machines

Details are emerging about Stardust, a piece of malicious software that targets point-of-sale credit-card processing machines. Stardust has reportedly compromised over 20,000 PoS machines and turned them into a easy-to-control botnet. The malware’s masters can monitor the botnet in realtime and issue fine-grained commands to its components, harvesting a titanic volume of payment card details. The discovery comes as researchers from a separate security firm called Arbor Networks published a blog post on Tuesday reporting an active PoS compromise campaign. The advisory is based on two servers found to be hosting Dexter and other PoS malware. Arbor researchers said the campaign looks to be most active in the Eastern Hemisphere. There was no mention of a botnet or of US restaurants or retailers being infected, so the report may be observing a campaign independent from the one found by IntelCrawler. It remains unclear how the attackers manage to initially infect PoS terminals and servers that make up the botnet. In the past, criminals have targeted known vulnerabilities in applications that many sellers of PoS software use to remotely administer customer systems. Weak administrator passwords, a failure to install security updates in a timely fashion, or unknown vulnerabilities in the PoS applications themselves are also possibilities. Credit card fraud comes of age with advances in point-of-sale botnets [Dan Goodin/Ars Technica]        

Read this article:
Botnet of 20,000 point-of-sale machines

Terabyte laptop SDDs for $435!

For the second half of the 1990s, my standard advice to people buying computers was to max out the RAM as the cheapest, best way to improve their computers’ efficiency. The price/performance curve hit its stride around 1995, and after decades when a couple gigs of RAM would cost more than the server you were buying it for, you could max out all the RAM slots in any computer for a couple hundred bucks. Operating systems, though, were still being designed for RAM-starved computers, and when you dropped a gig or two of RAM in a machine, it screamed . It’s still good practice to max out your RAM, but it doesn’t get you much of a dividend. The turbo-charger of the 2010s is solid-state disk-drives, and they’re screaming up the same price/performance curve that RAM traversed twenty years ago. Two years ago, I traded my laptop drive for a 400GB SDD, spending as much on the drive as I had on the machine, and it was worth every penny. My laptop battery-life nearly doubled, and I stopped getting watch-cursors altogether; no matter what task I performed, it was done instantly. In October, I bought a one terabyte SDD for a ridiculous $435 — about a third of what I paid for a 600GB drive a little over a year ago! — and having run it for two months now, I’m prepared to pronounce it good. I wasn’t familiar with the manufacturer, Crucial, but they got very good reviews on Amazon, and at that price I was prepared to give them the benefit of the doubt. My machine — a Thinkpad X230 running Ubuntu 13.10 — chugs along with nary a beach-ball, and I can go six to eight hours on a six-cell battery with full brightness, and continuous Wifi and Bluetooth usage. I’m rough on my computer, and it’s taken plenty of knocks and bumps without any noticeable impact on the drive. To accompany the new drive, I bought a pair of $78 Toshiba USB3 1TB drives (one for backing up at the office, the other for my travel bag). They’re nothing near as fast as the SDD, but combined with the USB3 bus, they’re plenty quick for daily incremental backups, which take less than five minutes. If your storage needs aren’t as massy as mine, there’s a whole line of Crucial SDDs, 480GB for $269 , 240GB for $140 and so on. They all come with three year warranties, though I haven’t had cause to get service for my drive yet (knock wood). The drive is 7mm high, and comes with an easy-to-fit adapter for 9mm enclosures. I was less impressed with the adapter I bought to copy the files over; it was fiddly and prone to losing its connection. Ultimately, I slapped the new drive into a case in order to make the transfer. Crucial M500 960GB SATA 2.5-Inch 7mm (with 9.5mm adapter/spacer) Internal Solid State Drive CT960M500SSD1        

More here:
Terabyte laptop SDDs for $435!