How does the prevalence of public corruption touch election security? Exactly in the way you might think. "You don't know at any given time if the people handling your votes are honest or not," Harris said. "But you shouldn't have to guess. There should be a way to check." And in the decentralized, poorly monitored U.S. elections system, there often isn't. At the root of our current problem isn't (just) vulnerable equipment, it's also a shoddy "chain of custody" around votes, says Eric Hodge, the director of consulting at Cyber Scout, which is working with the Board of Elections in Kentucky and in other states to help secure elections systems. That includes where and how votes are collected, how they are moved and tabulated and then how they are handled after the fact, should citizens or officials want to review the results of an election. That lack of transparency leaves the election system vulnerable to manipulation and fraud, Harris and Hodge argue.
[T]he history of Personal Audio dates to the late 1990s, when founder Jim Logan created a company seeking to create a kind of proto-iPod digital music player. But his company flopped. Years later, Logan turned to lawsuits to collect money from those investments. He sued companies over both the "episodic content" patent, as well as a separate patent, which Logan and his lawyers said covered playlists. He and his lawyers wrung verdicts or settlements from Samsung and Apple.
'Accounts that actively spread misinformation are significantly more likely to be bots,' say Shao and co. 'Social bots play a key role in the spread of fake news.' Shad and co say bots play a particularly significant role in the spread of fake news soon after it is published. What's more, these bots are programmed to direct their tweets at influential users. 'Automated accounts are particularly active in the early spreading phases of viral claims, and tend to target influential users,' say Shao and co."
Slashdot reader mi asks: "Why are you and I subsidizing Elon Musk's products and when will his businesses be able to compete on their own?"
"The law directs the FCC to look at ISP services as distinct from those services that ride over the networks. The FCC's proposal contravenes our intent... While some may argue that this distinction should be abandoned because of changes in today's market, that choice is not the FCC's to make. The decision remains squarely with those of us in Congress -- and we have repeatedly chosen to leave the law as it is."
In another letter Thursday, 15 Congressmen asked FCC Chairman Ajit Pai to extend the time period for comments. They note the proposed changes have received more than 16 million comments, more than four times the number of comments on any previous FCC item. The Hill reports that the previous record was 4 million comments -- during the FCC's last net neutrality proceeding in 2014 -- and "the lawmakers also noted that the comment period for approving net neutrality in 2014 was 60 days. Pai has only allowed a 30-day comment period for his plan to rollback the rules."
This particular CN-235, with the serial 96-6042, is one of six that researchers commonly associated with the Air Force's top secret 427th Special Operations Squadron... The 427th occupies the same space with a host of other "black" U.S. military aviation elements, most of which are affiliated to some degree with Joint Special Operations Command and the Intelligence Community... [I]f the military placed the aircraft under civilian control to some degree and with an appropriate legal justification, the U.S. military could possibly fly it in support of a domestic operation or one focused on a foreign suspect or organization operating within the United States... It's also entirely possible, if not probable, that the aircraft could be involved in a realistic training exercise rather than an actual operation... The area could have simply provided a suitable urban area to test existing or new surveillance technologies, too, though this could spark serious privacy concerns if true.
Friday an Air Force Special Operations Command public affairs officer confirmed that the plane was one of theirs, describing its activity as "just a training mission," according to Russia Today.
Microsoft's VP of Worldwide Education said the event helps students "to become more employable to companies that build their businesses around the Microsoft suite." For example, the article points out, "Past winners have gone on to attend Ivy League colleges and even work at, yes, Microsoft... Delaware resident Anirudh Narayanan, 17, prepared all summer to compete in the Excel 2013 category, 'looking up obscure facts just in case I might need to know it during the test.' He's hoping the skills he honed will help him at Carnegie Mellon University, where he will begin studying economics in the fall. 'I make sure I do a minimum of five hours a week in Excel,' Anirudh said. 'Then for a while I'll be on YouTube watching videos about Excel.'"
John eventually won the first-place prize in the Excel category -- which was $7,000 and an Xbox.
In fact, the video is almost entirely silent, augmented with a few awkward coughs as Han Solo and Luke Skywalker plod noiselessly toward Princess Leia in a two-minute scene where they're awarded ceremonial medallions. Wired's article describes it as "a tongue-in-cheek tribute" to John Williams' Star Wars score for the film's final scene, also reporting that it had been online for almost three years before Warner/Chappell music publishing claimed rights to all money the video would receive: When I tried to get Warner/Chappell's side of this story, the company offered no comment. But apparently my reporting helped bring the "Star Wars Minus Williams" copyright dispute to an unexpectedly speedy resolution. When Koonce told his YouTube partner manager that a journalist had interviewed him, YouTube stepped in and removed the copyright claim against the video.
YouTube has also created a "Fair Use Protection" program covering legal costs for channels they believe are unfairly targeted with video takedown notices. But the article points out that 95% of the time music companies just chose YouTube's "monetize" option to claim the ad revenue rather than asking that a video be blocked -- and that last year YouTube paid the music industry $1 billion. (Though the music industry insists that amount is still below what they're receiving from streaming music services.)
Lauren Weinstein has a broader warning: While the browser firms work extensively to build top-notch security and privacy controls into the browsers themselves, the unfortunate fact is that these can be undermined by add-ons, some of which are downright crooked, many more of which are sloppily written and poorly maintained. Ironically, some of these add-on extensions and apps claim to be providing more security, while actually undermining the intrinsic security of the browsers themselves. Others (and this is an extremely common scenario) claim to be providing additional search or shopping functionalities, while actually only existing to silently collect and sell user browsing activity data of all sorts.
Lauren also warns about sites that "push users very hard to install these privacy-invasive, data sucking extensions" -- and believes requests for permissions aren't a sufficient safeguard for most users. "Expecting them to really understand what these permissions mean is ludicrous. We're the software engineers and computer scientists -- most users aren't either of these. They have busy lives -- they expect our stuff to just work, and not to screw them over."
The article talks about the (limited) value of this information with regard to specific target computers, but I have another question: how valuable would this database be for finding new zero-day Windows vulnerabilities to exploit?
It's part of a push to make it easier to share money, PayPal writes: Over the past year, we've partnered with Apple, Slack and Microsoft to enable peer-to-peer payments with PayPal and Venmo in more places and in more contexts where people are connecting online and on mobile, such as a voice command with Siri, in chat with iMessage and Slack, and in email via Microsoft's Outlook.com.
That tweet has since gone viral, prompting @KalebPrime to joke that "At this rate when I publish my novel the quotes will read 'FROM THE GUY THAT MADE THE WOW GOLD > VENEZUELAN BOLIVAR TWEET.'"
NPR describes Wells Fargo actually repossessing the car of a man who was "marked as delinquent for not paying this insurance -- which he didn't want or need or even know about." Friday the bank also revealed the number of "potentially unauthorized accounts" from its earlier fake accounts scandal could be much higher than previous estimates -- and that they're now expecting their legal costs to exceed the $3.3 billion they'd already set aside.
And Reuters reports that the bank will also be paying $108 million "to settle a whistleblower lawsuit claiming it charged military veterans hidden fees to refinance their mortgages, and concealed the fees when applying for federal loan guarantees."
Grsecurity used to allow others to redistribute its patches, but the biz ended that practice for stable releases two years ago and for test patches in April this year. It offers its GPLv2 licensed software through a subscription agreement. The agreement says that customers who redistribute the code -- a right under the GPLv2 license -- will no longer be customers and will lose the right to distribute subsequent versions of the software. According to Perens, "GPL version 2 section 6 explicitly prohibits the addition of terms such as this redistribution prohibition." A legal complaint (PDF) filed on behalf of Grsecurity in San Francisco, California, insists the company's software complies with the GPLv2. Grsecurity's agreement, the lawsuit states, only applies to future patches, which have yet to be developed. Perens isn't arguing that the GPLv2 applies to unreleased software. Rather, he asserts the GPLv2, under section 6, specifically forbids the addition of contractual terms.
Give us an example of a topic taught in a traditional lecture versus an "active learning" setting. A good example would be the teaching of what we would call pharmacokinetics -- the science of drug delivery. So, how does a drug get to the target organ or targeted receptor? A lot of the science of pharmacokinetics is simply mathematical equations. If you have a lecture, it's simply presenting those equations and maybe giving examples of how they work. In an active learning setting, you expect the students to learn about the equations before they get there. And when you get into the classroom setting, the students work in groups solving pharmacokinetic problems. Cases are presented where the patient gets a drug in a certain dose at a certain time, and you're looking at the action of that over time and the concentration of the drug in the blood. So, those are the types of things where you're expecting the student to know the knowledge in order to use the knowledge. And then they don't forget it.
Dean Garfield, President and CEO of the council said, "This is not the right proposal to fix our immigration system because it does not address the challenges tech companies face, injects more bureaucratic dysfunction, and removes employers as the best judge of the employee merits they need to succeed and grow the U.S. economy." Garfield argues that the tech industry cannot find enough STEM-skilled Americans to fill open positions and that U.S. immigration policy "stops us from keeping the best and brightest innovators here in the U.S. and instead we lose out to our overseas competitors."
Carr served as Pai's Wireless, Public Safety and International Legal Advisor for three years. After President Trump elevated Pai to the chairmanship in January, Pai appointed Carr to become the FCC's general counsel. Rosenworcel had to leave the commission at the end of last year when the Republican-led US Senate refused to re-confirm her for a second five-year term. But Democrats pushed Trump to re-nominate Rosenworcel to fill the empty Democratic spot and he obliged. FCC commissioners are nominated by the president and confirmed by the Senate. esides Pai, Carr, and Rosenworcel, the five-member commission includes Republican Michael O'Rielly and Democrat Mignon Clyburn.
The documents underscore the lengths to which the agrochemical company goes to protect its image. Documents show that Henry I. Miller, an academic and a vocal proponent of genetically modified crops, asked Monsanto to draft an article for him that largely mirrored one that appeared under his name on Forbes's website in 2015. Mr. Miller could not be reached for comment. A similar issue appeared in academic research. An academic involved in writing research funded by Monsanto, John Acquavella, a former Monsanto employee, appeared to express discomfort with the process, writing in a 2015 email to a Monsanto executive, "I can't be part of deceptive authorship on a presentation or publication." He also said of the way the company was trying to present the authorship: "We call that ghost writing and it is unethical." Mr. Miller's 2015 article on Forbes's website was an attack on the findings of the International Agency for Research on Cancer, a branch of the World Health Organization that had labeled glyphosate a probable carcinogen, a finding disputed by other regulatory bodies. In the email traffic, Monsanto asked Mr. Miller if he would be interested in writing an article on the topic, and he said, "I would be if I could start from a high-quality draft." The article appeared under Mr. Miller's name, and with the assertion that "opinions expressed by Forbes Contributors are their own." The magazine did not mention any involvement by Monsanto in preparing the article.
The KING 5 Investigators have discovered those statements are incorrect. An internal CH2M Hill email sent to their employees on July 21 was obtained by KING. It states that 301 (test kits) have been issued to employees and of the first 65 workers tested, a "small number of employees" showed positive results for "internal exposures" (by radioactive plutonium). Sources tell KING the "small number of employees" is twelve. Twelve people out of 65 is 20 percent. Still outstanding are 236 tests. A communication specialist with CH2M Hill sent a statement that more positive results are expected. "We expect additional positive results because analytical tests like a bioassay can detect radiological contamination at levels far lower than what field monitoring can detect," said Destry Henderson of CH2M Hill Plateau Remediation Company.