v3rgEz writes with this story of top secret Cold War plan which would have brought the U.S. under martial law. Starting on April 19, 1956, the federal government practiced and planned for a near-doomsday scenario known as Plan C. When activated, Plan C would have brought the United States under martial law, rounded up over ten thousand individuals connected to 'subversive' organizations, implemented a censorship board, and prepared the country for life after nuclear attack. There was no Plan A or B....Details of this program were distributed to each FBI field office. Over the following months and years, Plan C would be adjusted as drills and meetings found holes in the defensive strategy: Communications were more closely held, authority was apparently more dispersed, and certain segments of the government, such as the U.S. Attorneys, had trouble actually delineating who was responsible for what. Bureau employees were encouraged to prepare their families for the worst, but had to keep secret the more in-depth plans for what the government would do if war did break out. Families were given a phone number and city for where the relocated agency locations would be, but not the exact location.
Press2ToContinue writes In their attempts to kill off strong encryption once and for all, top officials of the intelligence services are coming out with increasingly hyperbolic statements about why this should be done. Now, a former head of GCHQ, Sir David Omand has said: "One of the results of Snowden is that companies are now heavily encrypting [communications] end to end. Intelligence agencies are not going to give up trying to get the bad guys. They will have to get closer to the bad guys. I predict we will see more close access work." According to The Bureau of Investigative Journalism, which reported his words from a talk he gave earlier this week, by this he meant things like physical observation, bugging rooms, and breaking into phones or computers. "You can say that will be more targeted but in terms of intrusion into personal privacy — collateral intrusion into privacy — we are likely to end up in an ethically worse position than we were before." That's remarkable for its implied threat: if you don't let us ban or backdoor strong encryption, we're going to start breaking into your homes.
An anonymous reader sends word that the Secret Service is investigating a "device," described as a small drone, found on the grounds of the White House. "A small drone was found on the White House grounds overnight, two law enforcement sources told ABC News, but White House Press Secretary Josh Earnest said the situation 'does not pose any sort of ongoing threat.' The Secret Service is investigating the device, Earnest said. Police, fire and other emergency vehicles swarmed around the White House in the pre-dawn hours, with several clustered near the southeast entrance to the mansion. The White House was dark and the entire perimeter was on lockdown until around 5 a.m., when pass holders who work in the complex were allowed inside."
Ariastis writes Google took almost three years to disclose to the open information group WikiLeaks that it had handed over emails and other digital data belonging to three of its staffers to the FBI under a secret search warrant issued by a federal judge. WikiLeaks were told last month of warrants which were served in March 2012. The subjects of the warrants were the investigations editor of WikiLeaks, the British citizen Sarah Harrison; the spokesperson for the organisation, Kristinn Hrafnsson; and Joseph Farrell, one of its senior editors. When it notified the WikiLeaks employees last month, Google said it had been unable to say anything about the warrants earlier as a gag order had been imposed.
An anonymous reader writes In a Sacramento Bee op-ed, (in)famous computer security researcher Ed Felten responds to the State of the Union cybersecurity proposal. He doesn't mince words: "The odds of clearing Congress: low. The odds of materially improving security: even lower. "What he suggests as an alternative, though, is a surprise. "California," he writes, "could blaze a trail for effective cybersecurity policy." He calls for the state government to protect critical infrastructure and sensitive data, relying on outside auditors and experts. It's an interesting idea. Even if it doesn't go anywhere, at least it's some fresh thinking in this area of backward policy. From Felten's essay: Critical infrastructure increasingly relies on industrial automation systems. And those systems are often vulnerable – they keep a default password, for instance, or are accessible from the public Internet. These are not subtle or sophisticated errors. Fixing them requires basic due diligence, not rocket science. Requiring the state’s critical infrastructure providers to undergo regular security audits would be straightforward and inexpensive – especially relative to the enormous risks. Areas of sensitive data are also low-hanging cyber fruit. In health care, education and finance, California already imposes security and privacy requirements that go beyond federal law. Those legal mandates, though, are mostly enforced through after-the-fact penalties. Much like critical infrastructure, sectors that rely upon sensitive data would benefit from periodic outside auditing. Of any state government's, California's policies also have the chance to help (or harm) the most people: nearly 39 million people, according to a 2014 U.S. Census estimate.
hypnosec writes The US Air Force and private space flight company SpaceX have settled their dispute involving the military's expendable rocket program, thereby paving the way for SpaceX to join the spy satellite launch program known as Evolved Expendable Launch Vehicle (EELV). The settlement opens doors for SpaceX to compete with United Launch Alliance (ULA) for launch of spy satellites. ULA is a joint Boeing-Lockheed venture – the only private player to have received clearance for launching black ops satellites.
BarbaraHudson (3785311) writes "Researchers were startled to find fish, crustaceans and jellyfish investigating a submersible camera after drilling through nearly 2,500 feet (740 meters) of Antarctic ice. The swimmers are in one of the world's most extreme ecosystems, hidden beneath the Ross Ice Shelf, roughly 530 miles (850 kilometers) from the open ocean. "This is the closest we can get to something like Europa," said Slawek Tulaczyk, a glaciologist at the University of California, Santa Cruz and a chief scientist on the drilling project. More pictures here."
An anonymous reader writes In the recent Slashdot discussion on the D programming language, I was surprised to see criticisms of Pascal that were based on old information and outdated implementations. While I'm sure that, for example, Brian Kernighan's criticisms of Pascal were valid in 1981, things have moved on since then. Current Object Pascal largely addresses Kernighan's critique and also includes language features such as anonymous methods, reflection and attributes, class helpers, generics and more (see also Marco Cantu's recent Object Pascal presentation). Cross-platform development is fairly straightforward with Pascal. Delphi targets Windows, OS X, iOS and Android. Free Pascal targets many operating systems and architectures and Lazarus provides a Delphi-like IDE for Free Pascal. So what do you think? Is Pascal underrated?
New submitter AlCapwn writes [Fark founder] Drew Curtis announced on Friday that he will be running for governor of Kentucky. "We have a theory that we're about to see a huge change in how elections and politics work. Across the country, we have seen regular citizens stepping up and challenging the status quo built by political parties and career politicians. They have been getting closer and closer to victory and, here in Kentucky, we believe we have a chance to win and break the political party stronghold for good."
Press2ToContinue writes While you can make a public domain dedication or (more recently) use the Creative Commons CC0 tool to do so, there's no clear way within the law to actually declare something in the public domain. Instead, the public domain declarations are really more of a promise not to make use of the exclusionary rights provided under copyright. On the "public domain day" of Copyright Week, Public Knowledge has pointed out that it's time that it became much easier to put things into the public domain. Specifically, the PK post highlights that thanks to the way copyright termination works, even someone who puts their works into the public domain could pull them back out of the public domain after 35 years.
Bram Stolk writes So, I am running GNU/Linux on a modern Haswell CPU, with an old Radeon HD5xxx from 2009. I'm pretty happy with the open source Gallium driver for 3D acceleration. But now I want to do some GPGPU development using OpenCL on this box, and the old GPU will no longer cut it. What do my fellow technophiles from Slashdot recommend as a replacement GPU? Go NVIDIA, go AMD, or just use the integrated Intel GPU instead? Bonus points for open sourced solutions. Performance not really important, but OpenCL driver maturity is.
theodp writes Maybe Bill Gates' Summer Reading this year will include The Art of R Programming. Pushing further into Big Data, Microsoft on Friday announced it's buying Revolution Analytics, the top commercial provider of software and services for the open-source R programming language for statistical computing and predictive analytics. "By leveraging Revolution Analytics technology and services," blogged Microsoft's Joseph Sirosh, "we will empower enterprises, R developers and data scientists to more easily and cost effectively build applications and analytics solutions at scale." Revolution Analytics' David Smith added, "Now, Microsoft might seem like a strange bedfellow for an open-source company [RedHat:Linux as Revolution Analytics:R], but the company continues to make great strides in the open-source arena recently." Now that it has Microsoft's blessing, is it finally time for AP Statistics to switch its computational vehicle to R?
An anonymous reader writes As reported by CNN and Time, the Bulletin of the Atomic Scientists has moved their famed Doomsday Clock two minutes closer to midnight. Now at 23:57, this clock attempts to personify humanity's closeness to a global catastrophe (as caused by either climate change or nuclear war). According to the Bulletin of the Atomic Scientists, this change is due to a lack of action regarding climate issues, the continued existence of nuclear weapon stockpiles, and the increased animosity that now exists between the United States and Russia.
kthreadd writes The OpenSSL project has released its second feature release of the OpenSSL 1.0 series, version 1.0.2 which is ABI compatible with the 1.0.0 and 1.0.1 series. Major new features in this release include Suite B support for TLS 1.2 and DTLS 1.2 and support for DTLS 1.2. selection. Other major changes include TLS automatic EC curve selection, an API to set TLS supported signature algorithms and curves, the SSL_CONF configuration API, support for TLS Brainpool, support for ALPN and support for CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH.
The Atlanta Journal-Constitution reports that "Credible" bomb threats were made Saturday against two flights bound for Atlanta, an airport spokesman said. The flights landed safely after being escorted into Atlanta by military fighter jets. Hartsfield-Jackson International Airport spokesman Reese McCrainie told The Atlanta Journal-Constitution at 3 p.m. that both flights — Delta 1156 and Southwest 2492 — had landed and were sitting on a taxiway waiting to be swept by the Atlanta police Bomb Squad. ... Witnesses reported seeing multiple emergency vehicles on the tarmac, and the Federal Aviation Administration said just before 3 p.m. that departing flights were experiencing gate holds and delays of up to 30 minutes due to a bomb threat. USA Today says that the flights were on their way to Atlanta from, respectively, Portland, Oregon and Milwaukee, and adds that "NORAD Media Relations Specialist Preston Schlachter confirmed that two F-16 jets launched from McIntire Air Force Base in South Carolina as a precautionary measure."
An anonymous reader writes Details have emerged on the new UHD Blu-ray spec and players set to start shipping this summer. UHD promises resolutions 4X greater than Blu-ray 1080p as well as much higher data rates, enhanced color space and more audio options. But, will consumers care, and will they be willing to upgrade their HDTV's, AV Receivers, and Blu-ray players to adopt a new format whose benefits may only be realized on ultra large displays or close viewing distances? The article makes the interesting point that UHD isn't synonymous with 4K, even if both handily beat the resolution of most household displays.
itwbennett writes They of the square jaws and famous dispute with Mark Zuckerberg over the origins of Facebook, are also believed to be among the largest holders of Bitcoin in the world. Now they want to launch a regulated Bitcoin exchange—named Gemini, of course. To bolster confidence, they said they have formed a relationship with a chartered bank in the state of New York. "This means that your money will never leave the country," the twins wrote in a blog post. "It also means that U.S. dollars on Gemini will be eligible for FDIC insurance and held by a U.S.-regulated bank.
jones_supa writes There has been quite a debate around the Linux version of The Witcher 2: Assassins of Kings and the fact that it wasn't really a port. A special kind of wrapper was used to make the Windows version of the game run on Linux systems, similar to Wine. The performance on Linux systems took a hit and users felt betrayed because they thought that they would get a native port. However, after the game stopped launching properly at some point, the reason was actually found to be a Linux regression. Linus quickly took care of the issue on an unofficial Witcher 2 issue tracker on GitHub: "It looks like LDT_empty is buggy on 64-bit kernels. I suspect that the behavior was inconsistent before the tightening change and that it's now broken as a result. I'll write a patch. Serves me right for not digging all the way down the mess of macros." This one goes to the bin "don't break userspace". Linus also reminds of QA: "And maybe this is an excuse for somebody in the x86 maintainer team to try a few games on steam. They *are* likely good tests of odd behavior.."
mrspoonsi writes The National Highway Traffic Safety Administration is adding crash imminent braking and dynamic braking support to its list of recommended advanced safety features for new cars. The former uses sensors to activate the brakes if a crash is imminent and the driver already hasn't. Dynamic braking support, on the other hand, increases stopping power if you haven't put enough pressure on the brake pedal. Like lane-departure and front collision warning systems, these features are available on some models already — this move gives them high-profile attention, though. And for good reason: As the NHSTA tells it, a third of 2013's police-reported car accidents were the rear-end crashes and a "large number" of the drivers either didn't apply the brakes at all (what?!) or fully before impact.