Slashdot Deals: Cyber Monday Sale! Courses ranging from coding to project management - all eLearning deals 25% off with coupon code "CYBERMONDAY25". ×

US Marshals Jump Into 'Cyber Monday' Mania ( 34

coondoggie writes: "Cyber Monday is generally thought to be the start of the online holiday shopping season. We would like to encourage shoppers who are already online in search of bargains to consider stopping by our auction website to bid on forfeited assets," said Jason Wojdylo, Chief Inspector of the U.S. Marshals Service Asset Forfeiture Division in a statement. These online auctions are designed to generate proceeds from ill-gotten gains to give back to victims, he stated. One auction includes a wine collection of approximately 2,800 bottles seized from once prominent wine dealer Rudy Kurniawan, who is serving a 10-year federal prison sentence following his conviction of selling millions of dollars of counterfeit wine.
The Almighty Buck

AT&T Will Raise Cost of Old Unlimited Data Plans By $5 In February ( 39

An anonymous reader writes: AT&T customers trying to hold on to their old unlimited-data plans will have to pay a little more starting in February. AT&T's legacy plans for unlimited data will soon be $35 a month, instead of the current $30, on top of normal monthly bill costs. The Verge reports: "This is the first price hike AT&T has levied on grandfathered unlimited customers in seven years; the plan in question was discontinued in 2010 and as such is no longer offered to new customers. The $35 unlimited data feature is in addition to the costs associated with your voice and texting plan(s)."
The Courts

Young Climate Activists Sue Obama Over Climate Change Inaction ( 285

EmagGeek writes A recent lawsuit against Obama alleges he has a legal duty to act against climate change, and young climate activists, including 15-year-old Xiuhtezcatl Tonatiuh, are taking him to task on it. CNN reports: "Xiuhtezcatl Tonatiuh became a climate change activist at age 6 when he saw an environmental documentary. He asked his mom to find a way for him to speak at a rally. Now 15, the long-haired, hip-hop-savvy Coloradan is one of 21 young activists joining climate scientist James Hansen in suing the Obama administration for failing to ditch fossil fuels. 'It's basically a bunch of kids saying you're not doing your job,' he told me here at the U.N. COP21 climate change summit in Paris. 'You're failing, you know. F-minus. We're holding you accountable for your lack of action.'"

Book Review: Security Operations Center 11

benrothke writes: Large enterprises have numerous information security challenges. Aside from the external threats; there's the onslaught of security data from disparate systems, platforms and applications. Getting a handle on the security output from numerous point solutions (anti-virus, routers/switches, firewalls, IDS/IPS, ERP, access control, identity management, single sign on and others), often generating tens of millions of messages and alerts daily is not a trivial endeavor. As attacks becoming more frequent and sophisticated and with regulatory compliance issues placing an increasing burden, there needs to be a better way to manage all of this. Getting the raw hardware, software and people to create a SOC is not that difficult. The challenge, and it's a big challenge, is integrating those 3 components to ensure that a formal SOC can operate effectively. In Security Operations Center: Building, Operating, and Maintaining your SOC, authors Joseph Muniz, Gary McIntyre and Nadhem AlFardan have written an indispensable reference on the topic. The authors have significant SOC development experience, and provide the reader with a detailed plan on all the steps involved in creating a SOC. Keep reading for the rest of Ben's review.

Rikers Inmates Learn How To Code Without Internet Access ( 164

An anonymous reader sends the story of another prison where inmates are learning the basics of programming, despite having no access to the vast educational resources on the internet. Instructors from Columbia University have held a lengthy class at New York's Rikers Island prison to teach the basics of Python. Similar projects have been attempted in California and Oklahoma. The goal wasn’t to turn the students into professional-grade programmers in just a few classes, [Instructor Dennis] Tenen emphasizes, but to introduce them to the basics of programming and reasoning about algorithms and code. "It’s really to give people a taste, to get people excited about coding, in hopes that when they come out, they continue," says Tenen. ...Having an explicit goal—building the Twitter bot—helped the class focus its limited time quickly on learning to do concrete tasks, instead of getting bogged down in abstract discussions of syntax and algorithms.

MST3K Kickstarter Poised To Break Kickstarter Record ( 92

New submitter the_Bionic_lemming writes: Recently Joel Hodgson, the creator of Mystery Science 3000 -- which had a successful run of over 197 shows -- has after 15 years launched a kickstarter to relaunch the series. In just over two weeks Joel has been wildly successful in not only having over 25000 fans contribute, but actually scoring the second-highest show kickstarter on record — he has just under two weeks to shoot past the Number 1 kickstarter, Veronica Mars.

Israel Meets With Google and YouTube To Discuss Censoring Videos ( 469

An anonymous reader writes: Various sources report Israel's Deputy Minister for Foreign Affairs Tzipi Hotovely meeting with representatives of Google and YouTube to discuss censoring Palestinian videos believed to incite violence. Original aricle (in Hebrew) from Maariv The open question is how Google and Youtube will define "inciting violence." Currently, all foreign journalists in the Palestinian territories are required to register with the Israeli military, and all footage must be approved through the Israeli Military Censor's office before being released. However, according to the article in alternet individual Palestinians have been uploading videos showing violence by Israeli soldiers, including execution-style killings, and highlighting the living conditions in the territories, which Israeli authorities consider inflammatory.

Purdue Experiments With Income-Contingent Student Loans 217 writes: Danielle Douglas-Gabriel writes in the Washington Post that Purdue University is partnering with Vemo Education, a Reston-based financial services firm, to create income-share agreements, or ISAs, that its students can tap to pay for tuition, room and board. In return, students would pay a percentage of their earnings after graduation for a set number of years, replenishing the fund for future investments. Purdue president Mitch Daniels calls the contracts a constructive addition to today's government loan programs and perhaps the only option for students and families who have low credit ratings and extra financial need. "From the student's standpoint, ISAs assure a manageable payback amount, never more than the agreed portion of their incomes. Best of all, they shift the risk of career shortcomings from student to investor: If the graduate earns less than expected, it is the investors who are disappointed; if the student decides to go off to find himself in Nepal instead of working, the loss is entirely on the funding providers, who will presumably price that risk accordingly when offering their terms. This is true "debt-free" college."

However some observers worry that students pursuing profitable degrees in engineering or business would get better repayment terms than those studying to become nurses or teachers. "Income share agreements have the potential to create another option for students looking to pay for college while seeking assurances they will not be overwhelmed by future payments," says Robert Kelchen. "However, given the current generosity of federal income-based repayment programs and the likely hesitation of those who expect six-figure salaries to sign away a percentage of their income for years to come, the market for these programs may be somewhat limited."

Canadian, UK Law Professors Condemn Space Mining Provisions of Commercial Space Act ( 211

MarkWhittington writes: The Commercial Space Launch Act, which includes provisions allowing American companies the right to keep resources that they mine in space, was recently signed into law by President Barack Obama. While the act has been hailed as groundbreaking in the United States, the space mining title has gotten an angry reaction overseas. In an article in Science Alert, Gbenga Oduntan, Senior Lecturer in International Commercial Law, University of Kent, condemned the space mining provisions as environmentally risky and a violation of international law. Ram Jakhu, a professor at Canada's McGill University's Institute of air and space law, adds that space mining is a violation of the Outer Space Treaty and should not be allowed.

Bill Gates To Headline Paris Climate Talks 88

theodp writes: The NY Times and others report that Bill Gates will announce the creation of a multibillion-dollar clean energy fund on Monday at the opening of the two-week long Paris Climate Change Conference. The climate summit, which will be attended by President Obama and 100+ world leaders, is intended to forge a global accord to cut planet-warming emissions. The pending announcement was first reported by ClimateWire. A spokesman for the Bill and Melinda Gates Foundation did not respond to a request for comment. Let's hope it goes better than BillG school reform!

How Bad of a World Are We Really Living In Right Now? 200

New submitter Y.A.A.P. writes: Slate has a surprisingly relevant article of the state of the world today. A reasonable number of graphs and statistical comparisons show that our world is more peaceful than it has been for a long time. The article tells us that, despite what most news outlets (and political candidates) tell us, The World Is Not Falling Apart. Well, not from violence, at least.

DecryptorMax/CryptInfinite Ransomware Decrypted, No Need To Pay Ransom ( 48

An anonymous reader writes: Emsisoft has launched a new tool capable of decrypting files compromised by the DecryptorMax (CryptInfinite) ransomware. The tool is quite easy to use, and will generate a decryption key. For best results users should compare an encrypted and decrypted file, but the tool can also get the decryption key by comparing an encrypted PNG with a random PNG downloaded off the Internet.
The Military

Air Force Hires Civilian Drone Pilots For Combat Patrols ( 74

schwit1 writes: For the first time, civilian pilots and crews now operate what the Air Force calls "combat air patrols," daily round-the-clock flights above areas of military operations to provide video and collect other sensitive intelligence. Civilians are not allowed to pinpoint targets with lasers or fire missiles. They operate only Reapers that provide intelligence, surveillance and reconnaissance, known as ISR, said Air Force Gen. Herbert "Hawk" Carlisle, head of Air Combat Command.

Parts of Falcon 9 Launcher Wash Ashore In England ( 20

RockDoctor writes with news as reported by the BBC that parts of a Falcon 9 launcher have washed ashore on the Isles of Scilly off the SW coast of Britain. Early impressions are that the pieces are from the failed Falcon 9 ISS launch which exploded after take-off in June. That's not the only possibility, though; according to the article, However Jonathan McDowell, an astronomer at the Harvard-Smithsonian Center for Astrophysics, said many experts believed, due to the size and markings which have now been revealed, it was from a different mission. "All the geeks have been getting together and looking at fine details, and we're pretty sure it's a launch from September 2014 that successfully sent a cargo mission to the space station. "It didn't look like an exploded rocket to me, it looked like a fairly normal piece of space junk when the lower stage of a rocket falls from a hundred miles up and hits the ocean. Large sections can remain in tact and it's really quite normal," he said.
United Kingdom

Celebrating ARM's 25th Anniversary With the Visual ARM1 ( 37

In a slow-burn series of posts going back to 2010, the has presented diagrams and commentary on "ancient microchips," mosly based on painstaking microphotography after just-as-painstaking depackaging and cleaning of the actual chips.Today, reader trebonian writes an excerpt from their latest entry, in honor of the 25th anniversary of ARM Ltd., UK, which is somewhat different: To celebrate and honor their amazing work, we present the Visual ARM1, created in collaboration with some of ARM's founding engineers.

Designed by Sophie Wilson and Steve Furber before there was an ARM Ltd., the Acorn RISC Machine was the first of a line of processors that power our cell phones and tablets today. Unlike our projects based on microscope images, the Visual ARM was created from a resurrected .cif chip layout file, used under our license agreement with ARM. We also photographed one of the few ARM1 chips at very high resolution, and our photograph is featured at the Centre for Computing History in Cambridge.

Credit goes to ARM founding engineers John Biggs for inspiring the project, discovering the tape, and recovering a usable .cif file, Lee Smith for spotting the variable record format used to encode the file (an artifact of the VMS on Acorn's VAX that at first appeared to be widespread corruption of the file), to Cambridge University Computing Services for reading the Exabyte tape, and to ARM founder Dave Howard for help unraveling the VLSI CIF dialect. Our chip simulation and visualization was developed by Barry Silverman, Brian Silverman, Ed Spittles, and Greg James.


NSA To End Bulk Phone Surveillance By Sunday ( 138

An anonymous reader writes: The White House announced today that the NSA will be shutting down the program responsible for the bulk collection of phone records by the end of tomorrow. The program will be immediately replace with a new, scaled back version as enumerated by the USA Freedom Act. "Under the Freedom Act, the NSA and law enforcement agencies can no longer collect telephone calling records in bulk in an effort to sniff out suspicious activity. Such records, known as "metadata," reveal which numbers Americans are calling and what time they place those calls, but not the content of the conversations. Instead analysts must now get a court order to ask telecommunications companies ... to enable monitoring of call records of specific people or groups for up to six months."
The Almighty Buck

'No Such Thing As a Free Gift' Casts a Critical Eye At Gates Foundation ( 153

theodp writes: The Intercept's Michael Massing takes a look at "How the Gates Foundation Reflects the Good and the Bad of 'Hacker Philanthropy." He writes, "Despite its impact, few book-length assessments of the foundation's work have appeared. Now Linsey McGoey, a sociologist at the University of Essex, is seeking to fill the gap. 'Just how efficient is Gates's philanthropic spending?' she asks in No Such Thing as a Free Gift. 'Are the billions he has spent on U.S. primary and secondary schools improving education outcomes? Are global health grants directed at the largest health killers? Is the Gates Foundation improving access to affordable medicines, or are patent rights taking priority over human rights?' As the title of her book suggests, McGoey answers all of these questions in the negative. The good the foundation has done, she believes, is far outweighed by the harm." Massing adds, "Bill and Melinda Gates answer to no electorate, board, or shareholders; they are accountable mainly to themselves. What's more, the many millions of dollars the foundation has bestowed on nonprofits and news organizations has led to a natural reluctance on their part to criticize it. There's even a name for it: the 'Bill Chill' effect."

The First Online Purchase Was a Sting CD (Or Possibly Weed) ( 53

tedlistens writes: On August 11, 1994, 21-year-old Dan Kohn, founder of a pioneering, online commerce site, made his first web sale. His customer, a friend of his in Philadelphia, spent $12.48, plus shipping costs on Sting's CD "Ten Summoner's Tales," in a transaction protected by PGP encryption. "Even if the N.S.A. was listening in, they couldn't get his credit card number," Kohn told a New York Times reporter in an article about NetMarket the following day. According to a new short video about the history of online shopping, there were a few precedents, including a weed deal between grad students on the ARPANET and a 74-year-old British grandmother who in 1984 used a Videotex—essentially a TV connected to telephone lines—to order margarine, eggs, and cornflakes.
The Media

Montana Newspaper Plans To Out Anonymous Commenters Retroactively ( 246 writes: Eugene Volokh reports at the Washington Post that in a stunning policy shift, The Montana Standard, a daily newspaper in Butte, Montana, has decided to replace commenters' pseudonyms with their real names. "The kicker here is that the change is retroactive," writes Paul Alan Levy. "Apparently unwilling to part with the wealth of comments that are already posted on its web site under the old policy, but also, apparently, unwilling to configure its software so that comments posted before the new policy is implemented remain under the chosen screen names, the Standard announces that past comments will suddenly appear using the users' real names unless users contact the paper no later than December 26 to ask that their comments be removed." In a November 12 editorial outlining the new real-name policy, the newspaper said, "We have encountered consistent difficulty with posts that exceed the bounds of civil discourse — as have many sites where comments from anonymous posters are allowed."

The paper's new policy has proven controversial among readers. "This is the end of open and honest comments on this site," wrote one user, who goes by the name BGF. "It is easy to put your name to your comments if you are retired. But it is another thing altogether if you have to worry about upsetting your peers and bosses at work." The newspaper editor, David McCumber, says he has extensively investigated the feasibility of configuring the newspaper's software to keep comments posted before the new policy is implemented under the chosen screen names. He says he was told by his content-management software experts that such a configuration is impossible. "Based on that, I am trying to do what is most equitable to all of our readers," says McCumber. "When a relatively small city is at the center of your market, just about everybody commented about is known, and the anonymous comments sting."