Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
Yet the public record shows that over the years the NSA has honed its ability to steal encryption keys. Recent reports about the compromise of Gemalto's network and sophisticated firmware manipulation programs by the Office of Tailored Access Operations underscore this reality.
The inconvenient truth is that the current cyber self-defense formulas being presented are conspicuously incomplete. Security tools can and will fail. And when they do, what then? It's called Operational Security (OPSEC), a topic that hasn't received much coverage — but it should.
The letters come after evidence emerged over the weekend that Wei-Hock Soon, known as Willie, a scientist at the Harvard-Smithsonian Center for Astrophysics, had failed to disclose the industry funding for his academic work. The documents also included correspondence between Dr. Soon and the companies who funded his work in which he referred to his papers and testimony as "deliverables." Soon accepted more than $1.2 million in money from the fossil-fuel industry over the last decade while failing to disclose that conflict of interest in most of his scientific papers. At least 11 papers he has published since 2008 omitted such a disclosure, and in at least eight of those cases, he appears to have violated ethical guidelines of the journals that published his work. "What it shows is the continuation of a long-term campaign by specific fossil-fuel companies and interests to undermine the scientific consensus on climate change," says Kert Davies.
Peters alleged that her personal information had been exposed in the breach and then disseminated in the public domain, where it was being "misused by unauthorized and unknown third parties." Specifically: Peters reported that, subsequent to the breach at St. Josephs, her Discover credit card was used to make a fraudulent purchase and that hackers had tried to infiltrate her Amazon.com account — posing as her son. Also: telemarketers were using the stolen information. Peters claimed that, after the breach, she was besieged with calls and solicitations for medical products and services companies, with telemarketers asking to speak to her and with specific family members, whose contact information was part of the record stolen from St. Joseph's.
As a result, Peters argued that she faced an "imminent injury" due to "increased risk" of future identity theft and fraud because of the breach at St. Joseph, and wished to sue the hospital for violations of the Fair Credit Reporting Act (FCRA). But the court found otherwise, ruling that Peters lacked standing to bring the case in federal court under Article III of the Constitution.
In major cities, the Wi-Fi-first network makes sense. People use smartphones frequently while sitting around their offices and apartments, and Wi-Fi can handle the job just fine. But once people start moving around, it is not so simple. The benefit of a cell service is that your phone can switch among multiple towers while you are on the go which wi-fi is not designed to handle. Google may be experimenting with a hybrid approach similar to the small companies'. A person briefed on Google's plans, who spoke on the condition of anonymity because the conversations were private, says the company wants to make use of the fiber network it has installed in various cities to create an enormous network of Wi-Fi connections that phones could use to place calls and use apps over the Internet. In areas out of reach, Google's network would switch over to cell towers leased by T-Mobile USA and Sprint. Still many wonder if even the biggest companies could make a Wi-Fi-based phone network work. "There are just so many places where Wi-Fi doesn't reach," says Jan Dawson "and the quality of Wi-Fi that you can find is often subpar."