Earth

Iran Plans To Launch an 'Islamic Google Earth' 181

Shipwack sends this quote from the Guardian: "The Iranian authorities have long accused Google Earth of being a tool for western spy agencies, but now they have taken their attacks on the 3D mapping service one step further — by planning the launch of an 'Islamic' competitor. ... The minister, however, gave little information on what he meant by an Islamic 3D map. 'We are developing this service with the Islamic views we have in Iran and we will put a kind of information on our website that would take people of the world towards reality Our values in Iran are the values of God and this would be the difference between Basir and the Google Earth, which belongs to the ominous triangle of the U.S., England and the Zionists [a reference to Israel].' Experts, however, have serious doubts about the project. An IT consultant who has worked on Iran's national internet project in the past said the announcement was merely an excuse to obtain funds and secure working contracts for the future. 'They have claimed to run their service in four months and said their data centre capacity will reach Google's size in three years,' he said. 'Three-year project, no business model and only relying on government funding, a piece of cake indeed. To have a data centre with such capacity and security level they need power stations, cooler systems, bandwidth, etc, which will require billions of dollars of investment that doesn't fit with Iran's sanctions-hit economy.'"
United Kingdom

Margaret Thatcher Dies At 87 539

syngularyx writes "Margaret Thatcher, the former British prime minister who became one of the most influential global leaders of the postwar period, died on Monday, three decades after her championing of free-market economics and individual choice transformed Britain's economy and her vigorous foreign policy played a key role in the end of the Cold War."
Government

"The Kissinger Cables": WikiLeaks Releases 1.7M Historical Records 199

An anonymous reader writes to note the latest large-scale document release from WikiLeaks: "The cables are all from the time period of 1973 to 1976. Without droning about too many numbers that can be found in the press release, about 200,000 of the cables relate directly to former U.S. Secretary of State Henry Kissinger. These cables include significant revelations about U.S. involvements with fascist dictatorships, particularly in Latin America, under Franco's Spain (including about the Spanish royal family) and in Greece under the regime of the Colonels. The documents also contain hourly diplomatic reporting on the 1973 war between Israel, Egypt and Syria (the 'Yom Kippur war'). While several of these documents have been used by U.S. academic researchers in the past, the Kissinger Cables provides unparalleled access to journalists and the general public. 'The illegal we do immediately; the unconstitutional takes a little longer.' — Henry A. Kissinger, U.S. Secretary of State, March 10, 1975."
Politics

Anonymous' "OpIsrael" Has Little Impact 136

An anonymous reader writes "The Times Of Israel and AlArabiya.net report that the planned and announced April 7th attack by Anonymous failed to frustrate the Israeli government or its citizens. The country's national Cyber Bureau quipped 'So far it is as was expected, there is hardly any real damage,' Ben Yisrael said. 'Anonymous doesn't have the skills to damage the country's vital infrastructure. And if that was its intention, then it wouldn't have announced the time of attack. It wants to create noise in the media about issues that are close to its heart,' he said."
Encryption

The Activists Who Bring Security To the Oppressed 33

msm1267 writes "Tibetans inside China or in exile, along with Syrians, Iranians and other groups oppressed by autocratic regimes, rely on technology to communicate and organize protests. Yet state-sponsored attackers have infiltrated the devices and platforms used by the oppressed to put their freedom or lives in danger. Groups such as Tibet in Action or Citizen Lab Munk School of Global Affairs have put together resources to help educate and enhance the security of oppressed people."
IT

The RFP and IT Logistics For Washington's "Pot Czar" 117

Esther Schindler writes "Last fall, the state of Washington passed a marijuana legalization referendum, and needed to acquire an outside consultant to run the program. 'As it normally does, the state put out a request for proposal for a consultant to run the new legal marijuana program,' writes Ron Miller. 'As word leaked out that there was an RFP open for what essentially was a "pot czar," the floodgates opened. It would be the most popular RFP in the state's history. The Liquor Control Board needed a way to process these requests quickly and cheaply.' In a typical RFP scenario, they would get maybe half a dozen responses. This one got close to 100. Miller writes about the cloud workflow required to solve the task: 'He chose these particular tools because they all had open APIs, which allowed him to mash them together easily into the solution. They were easy to use, so reviewers could learn the system with little or no training, and they were mobile, so users could access the system from any device. In particular he wanted reviewers to be able to use the system on a tablet.' I suppose this could have been written about more mundane RFPs, but I bet you'll find this more interesting than most."
Australia

WikiLeaks Party Launching This Week 52

PuZZleDucK writes "The ABC (audio) and the Canberra Times (text) are reporting on Greg Barns and Julian Assange teaming up to form the WikiLeaks Party. From the article: 'Mr Barns said on Monday he had agreed to be the WikiLeaks Party campaign director following conversations with Mr Assange, who has announced he will run for a Senate seat in Victoria in the September 14 federal election. "The party will offer a refreshing change from the Australian government culture of secrecy, whether Labor or Liberal," he said.'"
Security

Cyber-Terrorists Attacking U.S. Banks Are Well-Funded 83

An anonymous reader writes "A DDoS attack targeting American Express on March 28th was just one in a series of incidents by self-proclaimed 'cyber-fighters' over the past few weeks. Beyond that, it's part of a much longer campaign to disrupt financial infrastructure using attacks over the internet. Ars details the group behind the most recent attacks, called 'the cyber-fighters of Izz ad-Din al-Qassam.' From the article: 'Named after a Muslim cleric who led The Black Hand, an anti-British and anti-Zionist jihadist organization in the 1920s and 1930s, and sharing a name with the military wing of Hamas (which the group's statements claim it is tied to), Izz ad-Din al-Qassam has taken credit for a variety of attacks on U.S. financial institutions over the past year, all allegedly in protest against the posting of trailers for the film The Innocence of Muslims on YouTube. Until the film is removed, the group said it would target "properties of American-Zionist CapitalistsThis attack will continue till the Erasing of that nasty movie." [sic]' There are concerns that the group is providing cover for organizations looking to defraud those banks. 'But even if the group behind the attacks isn't profiting from them, [Arbor Networks' Dan Holden] said it's clear that there are very real investments being made in their activities—maybe not in servers or hard assets, but in the form of countless hours of maintenance of the botnet by finding new servers to exploit, and further development of attacks. "Regardless of who's behind this," Holden said, "it has to be funded at some level. Even if it's hacktivists, it's got to be funded hacktivism." That, he says, is because of both the amount of time dedicated to the attack, and to its ongoing refinement. "It's not that these are the most sophisticated things in the world," he explained, "but it has been getting more sophisticated, and it's growing."'"
NASA

NASA Asteroid Capture Mission To Be Proposed In 2014 Budget 106

MarkWhittington writes "Included in President Obama's 2014 budget request will be a $100 million line item for NASA for a mission to capture and bring an asteroid to a high orbit around the moon where it will be explored by astronauts. Whether the $2.6 billion mission is a replacement or a supplement to the president's planned human mission to an asteroid is unclear. The proposal was first developed by the Keck Institite in April, 2012 and has achieved new impetus due to the meteor incident over Russia and new fears of killer asteroids."
Earth

PlanetIQ's Plan: Swap US Weather Sats For Private Ones 128

We've mentioned over the last few years several times the funding problems that mean the U.S. government's weather satellite stable is thinner than we might prefer. A story at the Weather Underground outlines the plan of a company called PlanetIQ to fill the needs met with the current constellation of weather sats with private ones instead. From the article, describing testimony last week before the House Appropriations Subcommittee on Commerce: "PlanetIQ's solution includes launching a constellation of 12 small satellites in low-Earth orbit to collect weather data, which PlanetIQ says the federal government could access at less cost and risk than current government-funded efforts. ... [PlanetIQ Anne Hale] Miglarese added that within 28 to 34 months from the beginning of their manufacture, all 12 satellites could be in orbit. As for the cost, she says, "We estimate that for all U.S. civilian and defense needs globally for both terrestrial and space weather applications, the cost to government agencies in the U.S. will be less than $70 million per year. As the satellites collect data, PlanetIQ would sell the data to government weather services around the world as well as the U.S. Air Force. The most recently launched polar-orbiting satellite, sent into space by the U.S. in 2011, cost $1.5 billion."
Cloud

Massachusetts May Try To Tax the Cloud 172

CowboyRobot writes "A proposed tax in Massachusetts may affect software services and Web design and hosting. If approved, the state estimates the tax may bring in a quarter billion dollars in 2014 by expanding its tax on 'canned software' to include some elements of cloud computing. The tax would cover custom-designed software and services based in the cloud. "Custom" software includes the design of Web sites, so the cost to local businesses of a new Web site would increase by 4.5% on contracts to design the site, write Java, PHP or other custom code. The cost of site hosting and bandwidth would also be taxed."
Bitcoin

Will Legitimacy Spoil Bitcoin? 490

New submitter F9rDT3ZE writes "Salon writer Andrew Leonard examines the U.S. Treasury's Financial Crimes Enforcement Network's (FinCEN) first 'guidance' regarding 'de-centralized virtual currencies,' noting that Bitcoin's supporters call it a 'currency of resistance,' while others suggest that 'the more popular Bitcoin gets, whether as a symbol of resistance or a perceived safe haven in financially troubled times, the more government attention it will inevitably draw, and the more inexorably it will be sucked into existing regulatory structures.'"
The Internet

FCC Chair Genachowski Resigns; What Effect on Net Regulation? 42

New submitter RougeFemme writes with news of Friday's announcement that FCC chairman Julius Genachowski will step down in the next several weeks (also at Politico), and asks "Obama promised us the continuation of a free, open Internet. Will the resignation of the FCC chairman have any affect on that 'net neutrality'?"
Power

'Energy Beet' Power Is Coming To America 238

Hugh Pickens writes writes "Gosia Wonzniacka reports that farmers in Fresno County, California, supported by university experts and a $5 million state grant, are set to start construction of the nation's first commercial-scale bio-refinery to turn beets into biofuel with farmers saying the so-called 'energy beets' can deliver ethanol yields more than twice those of corn per acre because beets have a higher sugar content per ton than corn. 'We're trying to reduce greenhouse gas emissions and to shift our transportation fuels to a lower carbon content,' says Robert Weisenmiller. 'The beets have the potential to provide that.' Europe already has more than a dozen such plants, so the bio-refinery would resurrect a crop that has nearly vanished. The birthplace of the sugar beet industry, California once grew over 330,000 acres of the gnarly root vegetable (PDF), with 11 sugar mills processing the beets but as sugar prices collapsed, the mills shut down. So what's the difference between sugar beets and energy beets? To produce table sugar, producers are looking for sucrose, sucrose and more sucrose. Energy beets, on the other hand, contain multiple sugars, meaning sucrose as well as glucose, fructose and other minor sugars, called invert sugars. To create energy beet hybrids, plant breeders select for traits such as high sugar yield, not just sucrose production. America's first commercial energy beet bio-refinery will be capable of producing 40 million gallons of ethanol annually but the bio-refinery will also bring jobs and investment, putting about 80 beet growers and 35,000 acres back into production."
Government

US Senate Passes National Internet Sales Tax Mandate 297

SonicSpike writes with the news that the U.S. Senate yesterday "passed a nonbinding proposal to allow states to collect sales tax on Internet sellers that have no presence within their borders. The proposal was an amendment to a 2014 budget bill that the Senate debated Friday. It was pushed by Senators Mike Enzi, a Wyoming Republican, and Dick Durbin, an Illinois Democrat, and was designed to give backers a sense of whether they had enough votes to push forward with final legislation to impose an Internet sales tax. The vote showed they have plenty of backing to overcome any filibuster seeking to block a final sales tax bill."
Government

Do Nations Have the Right To Kill Enemy Hackers? 482

Nerval's Lobster writes "Cyber-attacks are much in the news lately, thanks to some well-publicized hacks and rising concerns over malware. Many of these attacks are likely backed in some way by governments anxious to seize intellectual property, or simply probe other nations' IT infrastructure. But do nations actually have a right to fire off a bomb or a clip of ammunition at cyber-attackers, especially if a rival government is backing the latter as part of a larger hostile action? Should a military hacker, bored and exhausted from twelve-hour days of building malware, be regarded in the same way as a soldier with a rifle? Back in 2009, the NATO Cooperative Cyber Defence Centre of Excellence (which also exists under the lengthy acronym NATO CCD COE) commissioned a panel of experts to produce a report on the legal underpinnings of cyber-warfare. NATO CCD COE isn't funded by NATO, and nor is it a part of that organization's command-and-control structure—but those experts did issue a nonbinding report (known as "The Tallinn Manual on the International Law Applicable to Cyber Warfare") exploring the ramifications of cyber-attacks, and what targeted nations can do in response. It's an interesting read, and the experts do suggest that, under circumstances, a nation under cyber-attack can respond to the cyber-attackers with "kinetic force," so long as that force is proportional. Do you agree?"
NASA

Political Pressure Pushes NASA Technical Reports Offline 140

Trepidity writes "The extensive NASA Technical Report Archive was just taken offline, following pressure from members of U.S. Congress, worried that Chinese researchers could be reading the reports. U.S. Representative Frank Wolf (R-VA) demanded that 'NASA should immediately take down all publicly available technical data sources until all documents that have not been subjected to export control review have received such a review,' and NASA appears to have complied. Although all reports are in the public domain, there doesn't appear to be a third-party mirror available (some university libraries do have subsets on microfiche)."
Democrats

Internet Sales Tax Vote This Week In US Senate 434

SonicSpike excerpts from CNet's coverage of the latest in the seemingly inevitable path toward consistently applied Internet sales taxes for U.S citizens: "Internet tax supporters are hoping that a vote in the U.S. Senate as early as today will finally give them enough political leverage to require Americans to pay sales taxes when shopping online. Sens. Mike Enzi (R-Wy.) and Dick Durbin (D-Ill.) are expected to offer an amendment to a Democratic budget resolution this week that, by allowing states to 'collect taxes on remote sales,' is intended to usher in the first national Internet sales tax." There goes one of the best ways to vote with your dollars.
Government

Declassified LBJ Tapes Accuse Richard Nixon of Treason 536

Hugh Pickens writes writes "After the Watergate scandal taught Richard Nixon the consequences of recording White House conversations, none of his successors has dared to do it. But Nixon wasn't the first. He got the idea from his predecessor Lyndon Johnson, who felt there was an obligation to allow historians to eventually eavesdrop on his presidency. Now David Taylor reports on BBC that the latest set of declassified tapes of President Lyndon Johnson's telephone calls show that by the time of the Presidential election in November 1968, LBJ had evidence that Nixon had sabotaged the Vietnam war peace talks — or, as he put it, that Nixon was guilty of treason and had 'blood on his hands'. It begins in the summer of 1968. Nixon feared a breakthrough at the Paris Peace talks designed to find a negotiated settlement to the Vietnam war that he knew would derail his campaign. Nixon therefore set up a clandestine back-channel to the South Vietnamese involving Anna Chennault, a senior campaign adviser. In late October 1968 there were major concessions from Hanoi which promised to allow meaningful talks to get underway in Paris. This was exactly what Nixon feared. Chennault was dispatched to the South Vietnamese embassy with a clear message: the South Vietnamese government should withdraw from the talks, refuse to deal with Johnson, and if Nixon was elected, they would get a much better deal. Meanwhile the FBI had bugged the ambassador's phone and transcripts of Chennault's calls were sent to the White House. Johnson was told by Defense Secretary Clark Clifford that the interference was illegal and threatened the chance for peace. The president gave Humphrey enough information to sink his opponent but by then, a few days from the election, Humphrey had been told he had closed the gap with Nixon and would win the presidency so Humphrey decided it would be too disruptive to the country to accuse the Republicans of treason, if the Democrats were going to win anyway. In the end Nixon won by less than 1% of the popular vote, escalated the war into Laos and Cambodia with the loss of an additional 22,000 American lives, and finally settled for a peace agreement in 1973 that was within grasp in 1968."

Slashdot Top Deals