By msmash from Slashdot's further-scrutiny department
A day after the US Department of Justice charged two Chinese nationals for being members of a state-sponsored hacking group and accused the Chinese government of orchestrating a string of hacks around the world, five other governments have stepped in with similar accusations. From a report: Australia, Canada, Japan, New Zealand, and the UK have published official statements today formally blaming China of hacking their government agencies and local companies. All statements are in regards to the supposed involvement of the Chinese Ministry of State Security (MSS) in supporting the activity of a hacking group known as APT10. In a DOJ indictment yesterday, the US says this group hacked companies in 12 countries, and later breached cloud service providers, wormed through their infrastructure, and hacked even more companies. US officials said the primary purpose of these hacks was to steal trade secrets and intellectual property that the Chinese government later passed to local Chinese companies, helping create an unfair advantage for local firms on the global market.Read Replies (0)
By msmash from Slashdot's interesting-question department
The creator of the year's biggest game is facing a slew of lawsuits over its alleged use of famous dance moves. But will courts tap to the same tune? From a report: Fresh Prince of Bel-Air star Alfonso Ribeiro alleges that Fornite used his Carlton Dance, devised for a memorable episode of the hit US sitcom, without permission or credit. And earlier this week, Russell Horning, AKA the Backpack Kid, launched his own lawsuit claiming Epic breached copyright laws for including his signature dance move "The Floss." So while the copyright disco fills up and solicitors perform their (wallet) stretching exercises, the big question is: can you realistically copyright a dance move? The answer is yes. Kind of. It's complicated.
"A dance can be protected under copyright law in England under the protection afforded to literary, dramatic or musical works (section 3 (2) of the Copyright, Design and Patents Act)," says Alex Tutty of specialist entertainment law firm Sheridans. "But copyright can subsist in it only when it is recorded in writing or otherwise. It doesn't just exist because you did the dance; it needs to be written down or filmed" This is handy for the Fortnite complainants, because there is video evidence of all of them performing their respective moves. However, it's not quite that easy. "There are all kinds of complexities in practice," says entertainment and tech industry lawyer, Jas Purewal of Purewal & Partners. "For example, who owns the dance -- the original creator, the dancers or the choreographer? How can they prove they actually created something new? How can they show that someone else actually infringed their dance and didn't independently come up with it? The law is pretty archaic, too. It's just not been an area that has had a lot of attention."Read Replies (0)
By msmash from Slashdot's burning-questions department
Technological changes such as automation and artificial intelligence are expected to transform the employment landscape. The question is: will our education system keep up? From a report: The answer matters because an estimated 65% of children entering primary schools today will work in jobs and functions that don't currently exist, according to a recent Universities UK report. The research, which explores the "rapid pace of change and increasing complexity of work", also warns that the UK isn't even creating the workers that will be needed for the jobs that can be anticipated. By 2030, it will have a talent deficit of between 600,000 and 1.2 million workers in the financial and business sector, and technology, media and telecommunications sector.
University leaders would be "foolish" not to pay attention, says Lancaster University vice-chancellor Mark E Smith. "We look at the trends in the job market and the skills employers are looking for, and we listen to what employers are saying. We don't want to be talking about yesterday's problem." This is one of the reasons the university is a partner in the National Institute of Coding. The programme, led by the University of Bath, is bringing 25 universities together with small and medium-sized enterprises (SMEs) and global companies including IBM, Cisco, BT and Microsoft to create "the next generation of digital specialists".
< article continued at Slashdot's burning-questions department
>Read Replies (0)
By msmash from Slashdot's up-next department
Lubuntu, a popular Ubuntu flavor which announced earlier this year that it would stop supporting old hardware, is now dropping support for 32-bit x86 releases. BetaNews adds: "Lubuntu has been and continues to be the go-to Ubuntu flavor for people who want the most from their computers, especially older hardware that cannot handle today's workloads. However, the project and computing as a whole has drastically changed in many ways since its origin ten years ago. Computers have become faster, more secure, and most notably, have moved off of the traditional 32-bit i686 (generalized as i386 in Debian and Ubuntu) architecture," says Simon Quigley, Lubuntu.
Quigley further says , "As an increasing number of Linux distributions have focused their attention on the 64-bit x86 architecture (amd64) and not on i386, we have found that it is harder to support than it once was. With i386-only machines becoming an artifact of the past, it has become increasingly clear to the Lubuntu Team that we need to evaluate its removal from the architectures we support. After careful consideration, we regret to inform our users that Lubuntu 19.04 and future versions will not see a release for the i386 architecture. Please do note that we will continue to support Lubuntu 18.04 LTS i386 users as a first-class citizen until its End of Life date in April of 2021."Read Replies (0)
By msmash from Slashdot's Orwellian-state department
Several readers have shared a report: The Indian government has authorized 10 central agencies to intercept, monitor, and decrypt data on any computer, sending a shock wave through citizens and privacy watchdogs. Narendra Modi's government late Thursday broadened the scope of Section 69 of the nation's IT Act, 2000 to require a subscriber, service provider, or any person in charge of a computer to "extend all facilities and technical assistance to the agencies." Failure to comply with the agencies could result in seven years of imprisonment and an unspecified fine. In a clarification posted today, the Ministry of Home Affairs said each case of interception, monitoring, and decryption is to be approved by the competent authority, which is the Union Home Secretary.
Explaining the rationale behind the order, India's IT minister, Ravi Shankar Prasad, said that the measure was undertaken in the interests of national security. He added that some form of "tapping" has already been going on in the country for a number of years and that the new order would help bring structure to that process. "Always remember one thing," he said in a televised interview. "Even in the case of a particular individual, the interception order shall not be effective unless affirmed by the Home Secretary."
The Internet Freedom Foundation, a nonprofit organization that protects the online rights of citizens in India, cautioned that the order goes beyond telephone tapping. It includes looking at content streams and might even involve breaking encryption in some cases. "Imagine your search queries on Google over [a number of] years being demanded -- mixed with your WhatsApp metadata, who you talk to, when, and how much [and add] layers of data streams from emails + Facebook," it said. "To us this order is unconstitutional and in breach of the telephone tapping guidelines, the Privacy Judgement and the Aadhaar Judgement,"
it asserted.Read Replies (0)
By BeauHD from Slashdot's orbital-launches department
Privately funded space startups are changing China's space industry, helping it become a space power on par with the United States. "2018 is shaping up to be the first year in which more rockets reach Earth orbit from China than from any other country," reports MIT Technology Review. "As of mid-December, China had made 35 successful launches, as against 30 for the U.S." "As American and Russian space programs struggle with uncertain budgets, China is expanding its efforts on every front: communications and reconnaissance satellites; a navigation and positioning constellation to rival America's GPS; a human spaceflight program; and ambitious space-science and robotic exploration projects. All of these are enabled by a menagerie of new rockets with advanced capabilities." Here's an excerpt from the report summarizing some of China's space ambitions: In 2014, the Chinese government decided to allow private investment in space-related industry. Landspace began with a few dozen people. It now has over 200 employees at a manufacturing base in Huzhou in eastern China and at assembly and testing facilities in X'ian, a central Chinese city. The company plans to work incrementally, beginning with nano-satellites -- devices weighing between 1 and 10 kilograms (2 to 22 pounds) -- then moving to larger cargoes and, eventually, into human spaceflight. In September 2018, iSpace launched three nanosatellites on a brief suborbital flight, becoming the first Chinese space startup to successfully get beyond Earth's atmosphere. Another company, LinkSpace, plans to launch a vertical takeoff, vertical landing rocket in 2020. Landspace, OneSpace, iSpace, LinkSpace, and ExPace (which fashions itself as a startup though it's a subsidiary of a state-owned enterprise) are the leaders of a bevy of lesser-known Chinese launch startups.
< article continued at Slashdot's orbital-launches department
>Read Replies (0)
By BeauHD from Slashdot's not-approved-for-combat department
According to a Navy Inspector General report, U.S. military troops used two Android apps that contained severe vulnerabilities in live combat scenarios. "The two apps are named KILSWITCH (Kinetic Integrated Low-Cost Software Integrated Tactical Combat Handheld) and APASS (Android Precision Assault Strike Suite)," reports ZDNet. From the report: Both apps work by showing satellite imagery of surroundings, including objectives, mission goals, nearby enemy and friendly forces. The two apps work as a modern-day replacement for radios and paper maps and allow troops to use a real-time messaging client to coordinate with other military branches, and even call in air-strike support with a few simple screen taps, according to a DARPA press release and accompanying YouTube video. The apps have been under development since 2012 and starting 2015, they have been made generally available to all U.S. troops via a public app store managed by the National Geospatial-Intelligence Agency. But according to a Navy Inspector General report from March that was made public today, both apps contained vulnerabilities that could have allowed enemy forces access to troops' information.
The heavily redacted report doesn't detail the nature of the two vulnerabilities, but it does point out that the Navy had failed to control the distribution of these two applications, and later failed to act in warning troops of the danger they were in for almost a year. The report says that the two apps, KILSWITCH and APASS, were never meant or approved to be deployed in live combat zones. But the two apps, because of their flashy features and easier to use interface, became wildly popular among U.S. troops, but also other military branches, including foreign allied forces.Read Replies (0)
By BeauHD from Slashdot's let's-try-this-again department
Nine months after an Uber self-driving car struck and killed pedestrian Elaine Herzberg in Tempe, Arizona, Uber has decided that it's time to resume testing its self-driving cars on public roads. The company received a letter from Pennsylvania's Department of Transportation authorizing it to restart its program, although it will be massively scaled back from the one it had last year. The Verge reports: For the time being, Uber's self-driving Volvo SUVs will be confined to a one-mile loop around Pittsburgh's Strip District, where the company's Advanced Technologies Group (ATG) is headquartered. Only two vehicles are being tested for now, though more will be added. The cars won't exceed the posted speed limit of 25 mph, and will have two safety drivers in them at all times -- Uber calls them "mission specialists." For now, the cars aren't picking up any passengers. A spokesperson for Pittsburgh Mayor Bill Peduto said since Uber has "accepted established state guidelines, demonstrated transparency, and conformed to our expectations in addressing the unique conditions of a complex urban environment, the city is satisfied that self-driving testing operations by Uber will not introduce an increased level of safety risk in Pittsburgh," the spokesperson said.Read Replies (0)