Articles about Document Pdf

Pic of Garda car. editorial use only Photo by SHutterstock/abd

Ireland goes Big Brother as police upgrade IT snooping abilities

The Garda Síochána has proposed to expand its surveillance on Irish citizens by swelling the amount of data it collects on them through an increase in its CCTV and ANPR set-ups, and will also introduce facial and body-in-a-crowd biometrics technologies. Announced as part of its new five-year programme to “professionalise” and …
HiFire 5B launch

Hypersonic flight test hits Mach 7.5

Australia's venerable Woomera rocket range last week hosted a successful hypersonic test in which the experimental HiFiRE rocket hit Mach 7.5 and an apogee of 278 km. The data-gathering experiment wasn't testing a hypersonic motor – sorry “Sydney to London in two hours” fans – but rather carried instruments to observe the …

DARPA wants god-mode attribution platform to pin and predict crime

The US Military skunkworks Defense Advanced Research Projects Agency (DARPA) is hoping to build a platform to help bolster the treacherous world of attack attribution that would generate, anonymise, and share threat data. The agency is seeking proposals for an "Enhanced Attribution" program which would bring high quality " …
Darren Pauli, 09 May 2016
Snooping image via Shutterstock

Stop resetting your passwords, says UK govt's spy network

The UK government has, on World Password Day, repeated its advice against the common security practice of routinely changing passwords. "In 2015, we explicitly advised against [the practice]," a post by GCHQ's Communications-Electronics Security Group (CESG) notes. "This article explains why we made this unexpected …
Kieren McCarthy, 05 May 2016

Ten years in the clink, file-sharing monsters! (If UK govt gets its way)

Analysis The UK government will insist on jail sentences of up to 10 years for illegal file sharing, despite its own public consultation saying the opposite. In an act of almost unparalleled Whitehall hubris, the decision was announced in the foreword to a report [PDF] that revealed only two per cent of respondents agreed with the …
Kieren McCarthy, 22 Apr 2016
A still from the Arizona flight

'GPS 2.0' outline calls for open, hackable, interfaces

The group that created GPS wants it opened up so it's easier for people to compete on its individual components. Californian nonprofit The Aerospace Corporation also wants to address the weaknesses that have emerged in GPS in the decades since it was first created – things like jamming and resiliency – without compromising …
C-17 aircraft

Bloke coughs to leaking US military aircraft blueprints to China

A Chinese national has pleaded guilty to charges that he funneled US military aircraft secrets back to his controllers in the Middle Kingdom. "Su Bin admitted to playing an important role in a conspiracy, originating in China, to illegally access sensitive military data, including data relating to military aircraft that are …
Iain Thomson, 29 Mar 2016
Bear

Oracle fights Russian software policy with Postgres smear

Oracle's Russian paw has found a way to fight the nation's regulations about software purchasing for government agencies, by sending local customers a letter containing stern criticisms of PostgreSQL. As of January 1st 2016, Russia's government agencies are required to use locally-produced software whenever it is functionally …
Simon Sharwood, 21 Mar 2016

Apple tells iPhone court 'the Founders would be appalled' by Feds

Apple's latest response to US Department of Justice (DoJ) demands that it alter its operating system to allow access to a terrorist's iPhone using the 1789 All Writs Act is typically blunt. "According to the government, short of kidnapping or breaking an express law, the courts can order private parties to do virtually …
Iain Thomson, 16 Mar 2016

If your ISP is selling info about you, that has to be opt-in, says FCC boss

FCC chairman Tom Wheeler has proposed new rules that would bring ISPs in line with general data privacy laws and give citizens the right to opt out of their personal information being shared commercially. Wheeler has put forward a proposed "notice of rulemaking" to the other FCC Commissioners, who will vote on it later this …
Kieren McCarthy, 11 Mar 2016

Norman Conquest, King Edward, cyber pathogen and illegal gambling all emerge in Apple v FBI

Analysis OK, we got it: Apple good, FBI bad. But seeing as the court case between these two powerful institutions is taking on ever-increasing importance, we figured it was time to actually listen to what law enforcement has to say about the case of the locked phone. And the truth is, it makes a lot of sense. Certainly enough sense …
Kieren McCarthy, 05 Mar 2016
Selection of Australian banknotes

RSA: Fraud may double as 2017 Oz snap bank transfers cut safety nets

Australia's long-awaited instant bank transfer reform will result in more fraud attempts and fewer theft recoveries according to RSA fraud boffin Tim Dalgleish. The reforms known as the New Payments Platform (NPP) is slated for operation late next year and is designed to push the antipodean banks to innovate, while providing …
Darren Pauli, 16 Feb 2016

GCHQ spies quashed this phone encryption because it was too good against snoopers

The researcher who discovered that the UK government's phone encryption standard has a huge backdoor installed has made another discovery: GCHQ's rejection of a better encryption standard because it didn't allow for undetectable spying. Dr Steven Murdoch has updated his original post on the MIKEY-SAKKE standard, developed by …
Kieren McCarthy, 21 Jan 2016
dunce_cap_648

FCC revises router update rules after outcry

The US Federal Communications Commission (FCC) has put out a "revision" to its proposed rules for updating wireless equipment, stating that it does not want to control software updates to Wi-Fi routers and smartphones. The four-page document [PDF] was accompanied by a blog post and messages on social media confirming that the …
Kieren McCarthy, 12 Nov 2015

UK govt sneaks citizen database aka 'request filters' into proposed internet super-spy law

A secret database of citizens' personal lives and habits isn't explicitly spelled out in the UK's latest surveillance law. No, instead, it's described as a set of "request filters." The term is buried in the draft Investigatory Powers Bill (IPB), which was introduced to Parliament on Wednesday. Turn to page 254 of the 299-page …
Kelly Fiveash, 04 Nov 2015

German Govt mulls security standards for SOHOpeless routers

The German Government is mulling an assessment of the security chops of consumer routers in a bid to lift current abysmal standards and help inform buyers. Berlin's Ministry of the Interior IT security office says it wants to test routers for support of security features like WPS, encryption, and brute force protection of …
Darren Pauli, 21 Oct 2015
shutterstock_197375177-doctor

Has somebody shared your 'anonymised' health data? Bad news

Researchers from Harvard University have published a paper claiming a 100 per cent success rate in de-anonymising patients from their supposedly anonymised healthcare data in South Korea. The study, which bears the ronseal title of "De-anonymizing South Korean Resident Registration Numbers Shared in Prescription Data", was …
BT Openreach van

BT circles wagons round Openreach as Ofcom mulls forced split-up

BT has launched an offensive against moves to have its Openreach division completely hived off, with its view being that maintaining a near monopoly is the best thing for the country. Ofcom’s 2005 strategic review resulted in Openreach being repositioned to become a separate part of BT, but rivals have long been pushing for …
Simon Rockman, 16 Jul 2015

ICANN's leaving the nest, so when will it grow up?

Comment ICANN is 17 years old. It's about to be given the keys to its dad's car. And we are all going to have to take a ride with it every day. On June 30, 2016, ICANN, which oversees the global domain name service (DNS), will take over the IANA contract on a semi-permanent basis from the US government. The IANA contract means very …
Kieren McCarthy, 25 Jun 2015
NBN logo

Property developers face NBN build sting

The federal government has moved to mollify the fibre operators left out in the cold by previous national broadband network (NBN) policy, re-writing the rules that apply to new property developments. There will, however, be a sting for developers, since to preserve third parties' ability to compete, the NBN will no longer arrive …
TOR Logo

New relay selection fix for Tor to spoil spooks' fun (eventually)

Research by American and Israeli academics has lead to the development of Astoria, a new Tor client specifically designed to spoil spooks' traffic analysis of the surveillance-dodging network. Astoria all-but decimates the number of vulnerable connections on the Tor network, bringing the figure from 58 per cent of total users …

Google App Engine Java sandbox is leaking, say researchers

Security Explorations hacker Adam Gowdiak says three partial Java sandbox security holes still exist in Google App Engine. Gowdiak says the problems stem from buggy implementations and lax security checks that mean evildoers could gain access to the Google cloud's Java environment. He dropped exploitation code after the ad …
Darren Pauli, 18 May 2015
Dido Harding, Chief Executive of TalkTalk

TalkTalk unveils best results ever – and its share price dips

TalkTalk's share price dropped two per cent after it delivered its best ever quarterly financial results, for the end of 2014. The company posted revenue in the 12 months to 31 March 2015 of £1.8bn, up 4.2 per cent on the previous year, and profit of £76m, up 24.6 per cent, helped by improved efficiency. Unusually for …
Simon Rockman, 14 May 2015
GEC PABX 3 switchboard and operator

NZ used XKEYSCORE to spy on World Trade Org election emails

New Zealand used the National Security Agency's XKEYSCORE to spy on World Trade Organisation elections targeting candidates from Indonesia, Brazil, and South Korea as its Trade Minister vied for the top job, according to reports. Secret documents obtained by the New Zealand Herald and Snowden spout The Intercept reveal …
Darren Pauli, 23 Mar 2015

Ofcom: We're going to shake up the digi comms market

UK regulator Ofcom has announced a wide-ranging review of digital communications, looking at infrastructure and competition. The review will examine incentives for efficient investment and effective competition drive good outcomes: coverage, choice, price and quality of service for consumers, citizens and businesses. It will …
Simon Rockman, 13 Mar 2015
Google UK office logos

Google wins fight to keep Adwords FBI drug sting docs secret

Special Report Google has won a crucial battle in its campaign to keep under wraps millions of documents relating to an FBI drugs probe into the company. And the web giant has done so using a law designed to combat porn sites. At least 20 US states, led by Mississippi’s elected state prosecutor, opened a probe to find out whether Google was …
Andrew Orlowski, 06 Mar 2015

Privacy? What privacy? EU's draft law on your data is useless, say digital rights orgs

Activists have leaked the latest draft of Europe’s planned data protection law – which is supposed to safeguard Europeans' personal information when in the hands of businesses and governments. The proposed rules have been agreed by the European Parliament. Now Euro nations' government ministers, who sit on the Council of the …
Jennifer Baker, 04 Mar 2015
Android 5.0 "Lollipop"

Google's 'encrypted-by-default' Android is NOT encrypting by default

Updated Last year, Google said Android 5, codenamed Lollipop, will encrypt the contents of smartphones and tablets by default. Now it's had to do some backtracking. In short, despite Google's boasts that Lollipop will encrypt handhelds' data by default "out of the box," that simply isn't being enforced on all devices running Android 5. …
Iain Thomson, 02 Mar 2015

El Reg's plucky Playmonaut eyes suborbital rocket shot

Those of you who like your rockets liquid-fuelled and your altitudes suborbital might like to have a shufti at "Earendel", which promises to be "the first vehicle capable of reaching space, ie, greater than 100km, with an entirely open source design". Cutaway view of the Earendel rocket Earendel (left) - named for the Anglo- …
Lester Haines, 13 Feb 2015
A concept design for a submarine to explore Titan's seas

TITANIC: Nuclear SUBMARINE cruising 'Sea of KRAKENS' may be FOUND ON icy MOON

NASA boffins have come up with a design for a submarine they reckon could one day be used to explore the liquefied hydrocarbon seas of Saturn's mysterious freezing moon, Titan - the only bodies of surface liquid confirmed to exist off Earth. The submarine – to be revealed at the 46th Lunar and Planetary Science Conference in …
Simon Sharwood, 13 Feb 2015

Meerkats helped Ofcom unlock White Space spectrum-hopping

A trial at London Zoo has paved the way for Ofcom guidelines on using the unused “White Space” parts of the radio spectrum in the 470 to 790 MHz frequency band. Three webcams were set up: two in the meerkats' home and one in the otters' enclosure. All three were linked to a web server using White Space radio as TVWS – TV White …
Simon Rockman, 12 Feb 2015

Twitter complies with Turkey's 'national security' blackout demand – BLOCKS newspaper's tweets

Turkey has once again browbeat Twitter into censoring some of the content posted on the micro-blogging site, after being threatened with an outright ban in the country. The demand came after the Turkish government issued a court order in Adana on Thursday. According to the New York Times, officials had told news organisations …
Kelly Fiveash, 18 Jan 2015

Microsoft lets YOU kill POODLE in Protected Mode sites

Microsoft has granted sysadmins the ability to kill exposure to rabid POODLE websites under SSL 3.0 for Internet Explorer Protected Mode sites. The Christmas gift will be switched on by default from February next year as Redmond moves to euthanised the Padding Oracle on Downgrade Legacy Encryption attack across its web presences …
Darren Pauli, 11 Dec 2014
Dunce

Australia to social media: self-censor or face AU$17,000 FINES

Australia's long-threatened plan to compel social networks to remove bullying material directed at children has emerged, complete with a naughty corner for networks who don't play nice with others. The bill seeks to ensure that all social networks operating in Australia implement “basic online safety requirements” including …
Simon Sharwood, 03 Dec 2014

Sony quietly POODLE-proofs Playstations

Sony has patched the POODLE SSL vulnerability in its Playstation 3 and 4 gaming consoles. The rolling patch, introduced over the last fortnight, brings Transport Layer Security into Playstation's browsers and apps. SSL 3.0 is dispelled, off the Padding Oracle on Downgrade Legacy Encryption attack. The patch is a 200MB mandatory …
Darren Pauli, 24 Nov 2014

Google, Rockstar to bury zombie Nortel patent lawsuit

Google has reportedly laid to rest its long-running squabble with zombie patent supertroll Rockstar, although terms of the settlement were not disclosed. Rockstar is the puerile moniker given to the consortium formed by Apple, BlackBerry, Ericsson, Microsoft, and Sony, which pooled their resources in 2011 to buy the patent …
Neil McAllister, 20 Nov 2014
iPhone shop Shenzhen

ITU thought bubble ponders mass mobe-tracking to kill fake IT

The International Telecommunications Union (ITU) will next week meet to consider the issue of “counterfeit and substandard ICT products” and what can be done about them, but some of the proposals on the table look more than a little worrying. Notice of the meeting was posted in late September, when the ITU announced next week's …
Simon Sharwood, 13 Nov 2014

In dot we trust: If you keep to this 124-page security rulebook, you can own yourname.trust

NCC Group has published a set of security standards that you'll have to follow if you want to operate a .trust website. The company owns the rights to sell dot-trusts, and uploaded the 124-page policy document [PDF] earlier this month. It provides a technical rundown covering network security to secure DNS settings, and NCC …
Kieren McCarthy, 22 Oct 2014

Doubts cast over FBI 'leaky CAPTCHA' Silk Road rapture

Rather than a conspiracy involving NSA wiretaps, the FBI claims the downfall of Silk Road begun with a leaky CAPTCHA. Responding to a request for information from former kingpin Ross Ulbricht's defence lawyers, the Feds says the CAPTCHA left a trail from the TOR-protected Silk Road servers to the public Internet. That revealed …
Darren Pauli, 08 Sep 2014
Intel 'Haswell' 4th-Generation Core i7 Extreme Edition eight-core processor

Intel disables hot new TSX tech in early Broadwells and Haswells

One of Intel's new ways to make software go faster is called Transactional Synchronization Extensions (TSX), an innovation that gives developers fine control over how multi-threaded code uses a CPU's resources. TSX is a reasonably big deal, because as Intel never tires of pointing out it long-ago decided that grunt alone is not …
Simon Sharwood, 14 Aug 2014

Operators get the FEAR as Ofcom proposes 275% hike in mobile spectrum fees

Ofcom has “rethought” the fees that UK mobile networks pay for their 900MHz and 1800MHz spectrum, based on the industry's reaction to its latest proposal. Previously Ofcom decided to hike the annual fee that the networks pay for access to spectrum from £65m to £309m – a relative rise of 375 per cent. That’s now been modified …
Simon Rockman, 01 Aug 2014
NBN Co logo

NBN Co reveals 1 Gbps business plans in new product roadmap

NBN Co, the entity charged with building and operating Australia's national broadband network (NBN), has released a detailed product roadmap stretching out until 2016. The document (PDF) offers a few interesting insights into the network's progress. One item of special interest is a promised “Enterprise Ethernet Service” that …
Simon Sharwood, 01 Jul 2014
Aston Martin DB5

Vodafone: SPOOKS are plugged DIRECTLY into our network

Vodafone has published a report detailing how cops, g-men and spies around the world tap into its systems – in some cases, directly hooking into phone networks without a warrant. The dossier covers the 29 countries in which the mobile telco operates, including joint-ventures in Australia, Kenya and Fiji. The document [PDF] …
Simon Rockman, 06 Jun 2014
Parrot Ar.Drone

Spain clamps down on drones

Spain's Agencia Estatal de Seguridad Aérea (State Air Security Agency - AESA) has issued a declaration in which it reminds citizens that the commercial or professional use of "drones" is illegal, and that amateur UAV operation is restricted to "authorised areas". The document (PDF) stresses that "the use of remote control …
Lester Haines, 07 May 2014

Reg probe bombshell: How we HACKED mobile voicemail without a PIN

Special report Voicemail inboxes on two UK mobile networks are wide open to being hacked. An investigation by The Register has found that even after Lord Leveson's press ethics inquiry, which delved into the practice of phone hacking, some telcos are not implementing even the most basic level of security. Your humble correspondent has just …
Simon Rockman, 24 Apr 2014
Mustang drag racer

Dell tanks up with hot Fluid Cache, drives databases twice as fast

Dell has extended its Compellent array's automated data tiering to place hot data in connected server's PCIe flash caches, nearly doubling database access speed, increasing user counts 6 X and lowering per user costs by 70 per cent. The news of the Fluid Cache for SAN product came at Dell's Enterprise Forum in Frankfurt. Marius …
Chris Mellor, 15 Apr 2014

IEEE signs off on 400 Gb/s Ethernet development

As we foreshadowed last month, the The Institute of Electrical and Electronics Engineers (IEEE) has green-lighted development of 400 Gb/s Ethernet. Now known as IEEE P802.3bs, the nascent standard now has an official IEEE task force working to make it a reality and a goal, stated in this IEEE document (PDF) , to “Define Ethernet …
Simon Sharwood, 04 Apr 2014

Eurocops want to build remote car-stopper, shared sensor network

Civil liberties monitoring group Statewatch has uncovered a document sent from the General Secretariat of the European Council to the Standing Committee on operational cooperation on internal security that suggests European law enforcement agencies develop technology that would allow them to stop any car using wireless networks …
Simon Sharwood, 31 Jan 2014
Students using MacBooks in a lecture hall

You're more likely to get a job if you study 'social' sciences, say fuzzy-studies profs

There's great news this week for young persons who'd like to get a good job one day but don't want to do much work at university. A report just out says that actually there's no need to get a tough degree in real science, maths, engineering, medicine, IT or similar - in fact, you don't want one of those. What you want, …
Lewis Page, 30 Oct 2013

US military: 'Help us build the ROBO-WARFIGHTER OF THE FUTURE'

The US military has issued a formal solicitation for ideas about technologies that could help create a futuristic fighting suit for its special forces. TALOS-wearing US serviceman You can only hope that when this guy is suited up, he's on your side The United States Special Operations Command (USSOCOM), headquartered at …
Rik Myslewski, 06 Sep 2013