Instead, the Baden-Wurttemberg now bears the undesirable distinction of being the first ship the German Navy has ever refused to accept after delivery. In fact, the future of the whole class of German frigates is now in doubt because of the huge number of problems experienced with the first ship during sea trials. So the Baden-Wurttemberg won't be shooting its guns at anything for the foreseeable future (and neither will the Zumwalt for the moment, since the U.S. Navy cancelled orders for their $800,000-per-shot projectiles). System integration issues are a major chunk of the Baden-Wurrenberg's problems. About 90 percent of the ship's systems are so new that they've never been deployed on a warship in fact -- they've never been tested together as part of what the U.S. Navy would call "a system of systems." And all of that new hardware and software have not played well together -- particularly with the ship's command and control computer system, the Atlas Naval Combat System (ANCS). schwit1 adds: "Perhaps most inexcusable, the ship doesn't even float right. It has a permanent list to starboard."
Barlow knew that new technology could create and empower evil as much as it could create and empower good. He made a conscious decision to focus on the latter: "I knew it's also true that a good way to invent the future is to predict it. So I predicted Utopia, hoping to give Liberty a running start before the laws of Moore and Metcalfe delivered up what Ed Snowden now correctly calls 'turn-key totalitarianism.'" Barlow's lasting legacy is that he devoted his life to making the Internet into "a world that all may enter without privilege or prejudice accorded by race, economic power, military force, or station of birth... a world where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity."
Although iPhones and Android phones, computers, and instant messengers all come with encryption, camera makers have fallen behind. Not only does encryption protect reported work from prying eyes, it also protects sources -- many of whom put their lives at risk to expose corruption or wrongdoing... The lack of encryption means high-end camera makers are forcing their customers to choose between putting their sources at risk, or relying on encrypted, but less-capable devices, like iPhones. We asked the same camera manufacturers if they plan to add encryption to their cameras -- and if not, why. The short answer: don't expect much any time soon.
- After alerting workers on the wrong shift, the night supervisor "had started the drill by calling the day shift warning officers, who had not been told there was to be an exercise, and pretending to be U.S. Pacific Command," reports the Guardian, citing the FCC's investigation. The investigation confirmed that his script for the drill included the phrase "this is not a drill" (though it also began and ended with the words "exercise, exercise, exercise.")
- The New York Daily News reports that the warning officer missed those words "because someone in the office picked up the receiver instead of hitting the speaker." And he insists that "I'm really not to blame in this. It was a system failure. And I did what I was trained to do. I can't say that I would do anything differently based on what I saw and heard." His lawyer adds that "The place was a circus and they got their scapegoat... All that was missing were clowns and balloons."
- The fired worker now plans to sue the state of Hawaii for defamation, and possibly also for libel and slander, according to his lawyer, "because they lied about what happened." He also says that his client has already received numerous death threats.
- Washington Post audience editor says the incident happened "because Hawaii rewards incompetence," noting the employee behind the missile alert "had a history of performance problems and had been 'a source of concern,'" adding that the FCC reported that previously the employee "has confused real life events and drills on at least two separate occasions."
What's more, several people who knew Colbert's top suspect, a man named Robert W. Rackstraw, have noted possible connections to the CIA and to top-secret operations, Colbert said. "The new decryptions include a dare to agents, directives to apparent partners, and a startling claim that is followed by Rackstraw's own initials: If captured, he expects a get-out-of-jail card from a federal spy agency," Colbert said in a news release... In a brief phone call last year, Rackstraw only told SeattlePI to verify Colbert's claims; he didn't issue a denial, or comment further on Colbert's investigation...
Late last year, Colbert's team obtained a fifth letter allegedly sent by Cooper that Colbert said supports a possible FBI cover-up, but also included random letters and numbers. A code breaker on Colbert's team was able to decode the letters and numbers and find they pointed to three Army units Rackstraw was connected to during his military service in Vietnam. The code was meant to serve as a signal to his co-conspirators that he was alive and well after the jump, Colbert said... Another letter, in which Cooper claimed to be CIA openly, also had the letters "RWR" at the end -- the initials of Robert W. Rackstraw, according to Colbert.
However, over the weekend military analysts noticed that the map is also detailed enough that it potentially gives away extremely sensitive information about a subset of Strava users: military personnel on active service... In locations like Afghanistan, Djibouti and Syria, the users of Strava seem to be almost exclusively foreign military personnel, meaning that bases stand out brightly. In Helmand province, Afghanistan, for instance, the locations of forward operating bases can be clearly seen, glowing white against the black map.
One analyst analyst predicted that after this discovery, "A lot of people are going to have to sit through lectures come Monday morning."
Another military analyst told the Guardian "U.S bases are clearly identifiable" -- though he added that the map "looks very pretty."
"Our approach uses machine learning features that treat the whole face as a canvas," writes the lead researcher, adding "One challenge we faced for this project was finding a dataset with accurately labeled data to establish ground truth.
"Few existing databases capture subjects' suppressed reactions...."
Kanyon is designed to attack coastal areas, destroying cities, naval bases, and ports. The mega-bomb would also generate an artificial tsunami that would surge inland, spreading radioactive contamination with the advancing water. To make matters worse there are reports the warhead is "salted" with the radioactive isotope Cobalt-60. Contaminated areas would be off-limits to humanity for up to 100 years.
Slashdot reader schwit1 adds that "being sea-based makes it immune to ballistic missile defense."
The threat, called Dark Caracal by EFF and Lookout researchers, may be a nation-state actor and appears to employ shared infrastructure which has been linked to other nation-state actors. In a new report, EFF and Lookout trace Dark Caracal to a building belonging to the Lebanese General Security Directorate in Beirut. "People in the U.S., Canada, Germany, Lebanon, and France have been hit by Dark Caracal. Targets include military personnel, activists, journalists, and lawyers, and the types of stolen data range from call records and audio recordings to documents and photos," said EFF Director of Cybersecurity Eva Galperin. "This is a very large, global campaign, focused on mobile devices. Mobile is the future of spying, because phones are full of so much data about a person's day-to-day life."
Dark Caracal apparently gets installed through carefully-targeted spearphishing attacks, accoridng to the EFF. "Several types of phishing emails directed people -- including military personnel, activists, journalists, and lawyers -- to go to a fake app store-like page, where fake Android apps waited. There is even evidence that, in some cases, Dark Caracal used physical access to people's phones to install the fake apps."
"We couldn't have made the engine itself -- it would have melted down into slag if we had tried to produce it five years ago," O'Banion said. "But now we can digitally print that engine with an incredibly sophisticated cooling system integral into the material of the engine itself and have that engine survive for multiple firings for routine operation." The aircraft is also agile at hypersonic speeds, with reliable engine starts, he said. A half-decade before, he added, developers "could not have even built it even if we conceived of it."
So does that mean he thinks we'll eventually see the deployment of fully autonomous weapons in combat? I think it's very hard to imagine a world where you physically take the capacity out of the hands of rogue regimes... The technology is so ubiquitous that a reasonably competent programmer could build a crude autonomous weapon in their garage. The idea of putting some kind of nonproliferation regime in place that actually keeps the underlying technology out of the hands of people -- it just seems really naive and not very realistic. I think in that kind of world, you have to anticipate that there are, at a minimum, going to be uses by terrorists and rogue regimes. I think it's more of an open question whether we cross the threshold into a world where nation-states are using them on a large scale.
And if so, I think it's worth asking, what do we mean by"them"? What degree of autonomy? There are automated defensive systems that I would characterize as human-supervised autonomous weapons -- where a human is on the loop and supervising its operation -- in use by at least 30 countries today. They've been in use for decades and really seem to have not brought about the robopocalypse or anything. I'm not sure that those [systems] are particularly problematic. In fact, one could see them as being even more beneficial and valuable in an age when things like robot swarming and cooperative autonomy become more possible.
Long-time Slashdot reader 0x2A shares a report from a former British Army officer who calls drones "the poor man's Air Force," who writes that the attack shows "a strategic grasp of the use of drones, as well as a high level of planning." The lack of cameras on the drones suggest that they are likely pre-loaded with a flight plan and then flown autonomously to their target, where they dropped their payload en masse on a given GPS coordinate... The lack of any kind of claim, or even rumours from the rebels, indicates that whoever is producing these drone and launching these attacks has a high level of discipline and an understanding of operational and personal security...
Although some regard the threat from commerical off-the-shelf and improvised drones as negligible, they have the power to inflict losses at both a tactical and strategic level... Although the plastic sheeting, tape and simple design may belie the illusion of sophistication, it seems that the use of drones, whether military, commerical off-the-shelf or improvised, is taking another step to becoming the future of conflict.
The article notes there's already been four weaponized drone attacks in Syria over the last two weeks, which according to CNBC may be part of a growing trend. "Experts said swarm-like attacks using weaponized drones is a growing threat and likely to only get worse. They also said the possibility exists of terrorists using these drones in urban areas against civilians."
Anon-IB is a free-to-use message board where users post images, typically of women, and which is split into various genre or location sections. Some parts are focused on countries, while U.S. sections may narrow down to a state. Many users pursue so-called wins, which are nude or explicit photos, and may egg each other on to share more images. Anon-IB was also intertwined with a 2014 breach of celebrity nudes referred to as The Fappening. "Looking for wins of [redacted]. She used to send nudes to my friend all of the time. Would love to see some more," someone connecting from the U.S. Senate IP address wrote last August.