Are there any tech related aspects of NCIS you would hail as remotely realistic? Remember the enthusiastic praise of their Windows phones? And genetic profiling doesn't really end with electronic honking and "DNA MATCH" Flashing on screen. As for Major Mass.......
Posts by David Glasgow
186 publicly visible posts • joined 24 Aug 2007
Up to 18,000 Amazon workers in firing line as it chops cost
Another day, another ERP project behind schedule: This time it's Norfolk County Council and an Oracle system
Perseverance on the rocks: Pebbles clog up the rover's Martian sample collection
Google employee helped UK government switch from disastrous COVID-19 strategy, according to Dominic Cummings
NHS-backed org reacted to GitHub leak disclosure with legal threats and police call, complains IT pro
A trip to the dole queue: CEO of $2bn Bay Area tech biz says he was fired for taking LSD before company meeting
Apple's macOS Gatekeeper asleep on the job: Exploited flaw put users 'at grave risk' of malware infection
Turns out humans are leading AI systems astray because we can't agree on labeling
A Code War has replaced The Cold War. And right now we’re losing it
It's a double bluff?
Cunning plan, in a nutshell:
We're in, and we've got what we need
Ok. In a stupid way, say we're going to do something stupidly
Job for a Politician?
Yup
Should we actually do something stupid?
It's always an option.
Misdirection?
Yup. And they'll carry on thinking we're idiots.
Bonus!
Toxic: Intel ordered to pay chip fab worker almost $1m after he was gassed at its facility in 2016
Here's an interesting thing about hydrogen sulphide
Can't be arsed to check if it's already been said, so apologies if it has. In low concentrations it is instantly recognisable by the rotten egg shell. In high concentrations it is almost immediately odourless.
So not much point on relying on employees to smell something badly wrong. Only slightly wrong.
If the Samsung Galaxy S20 Fan Edition doesn't make you a fan, we don't know what will
Single-line software bug causes fledgling YAM cryptocurrency to implode just two days after launch
I don't even understand how real money works
"I thought of calling the secretary of the treasury, Kermit Winkler, a man who had graduated from Harvard two years after me, and saying this to him: “I just tried out two of your dimes on Times Square, and they worked like a dream. It looks like another great day for the coinage!”"
Kurt Vonnegut
I've seen things you people wouldn't believe. Black hole quasar tsunamis moving at 46 million miles per hour
Review of IR35 is in: Quelle surprise, UK.gov will forge ahead with controversial tax reforms in the private sector
B-but it doesn't get viruses! Not so, Apple fanbois: Mac malware is growing faster than nasties going for Windows
These data make no sense as reported
"In 2019, we detected an average of 11 threats per Mac endpoint — nearly double the average of 5.8 threats per endpoint on Windows."
This can't be an absolute measure of attacks, the numbers are far too low. Presumably its new threats. So attacks which represent a novel malware exemplar. But if so, what is the "per endpoint" condition for? It doesn't add or explain anything. Average attacks per machine would be interesting, as would the proportion of these representing novel malware. The trouble is that the base rates of malware across platforms is skewed, which is a practical concern, but more importantly in this instance, directly impacts on the number of exploits available to be err... exploited by novel malware.
Kind of looks like smoke and mirrors designed to sell a product, rather than meaningful statistics.
Super-leaker Snowden punts free PDF* of tell-all NSA book with censored parts about China restored, underlined
Interpol: Strong encryption helps online predators. Build backdoors
Re: Internet predator behaviour
"I just realised you're 'one of those'"
Ah! Quite possibly.
In 25 plus years I have worked on 2 cases of female internet predators. Of course, that is a biased sample, because I only see the cases referred to me, and there are several reasons why women might be under-represented. Still, I have seen a few hundred cases of males. Not mentioning female, child, white or asian offenders in my post does not mean they don't exist, or that their behaviour is excused.
The point is that unless the issues are considered in a balanced way, accommodating child protection AND technical AND forensic issues, the result will only be divisive polarisation. Fashionable at the moment, but not helpful.
Re: Internet predator behaviour
Completely agree with all points.
The pressure to do something about this particular problem arises substantially from people who do not consider the issue as part of an equation. On the other hand, why would you expect them to? Their starting point (whether parents or 'authorities') is that they don't want internet predators targeting children via encrypted messaging, because it renders them (said parents or 'authorities') powerless in a way much more complete than more traditional communications.
Also, ElectronicsRUs, (unlike some folks) you did not suggest I am making things up, and I appreciate that. In fact, those who dismiss legitimate researchers and child protection professionals as cranks or dishonest are doing a service to those who would mandate back doors. I assume that isn't what they wanted.
Re: Internet predator behaviour
Good point.... it was a near miss, because it was a case I worked, and I know the context. Which of course is everything. Once you have found the attempted switch to encrypted, you can investigate exactly who is talking to whom and why - unless it is encrypted and not stored locally.
I have also investigated similar communications in non-predator messages, and they arise at a surprisingly low rate.
Internet predator behaviour
I can't comment on whether the position in the expected report is honest or not, but I have been researching and assessing internet offenders for years. The comments declaring that most children are sexually abused by family and 'friends' are correct, but off the point. The issue is that there is a growing problem of men using various forms of messaging platforms to communicate with and ultimately sexually abuse children.
In my work I found most references to any form of social media or communication channel were associated with an attempt to establish an alternative ‘back-channel’, access to video chat or, most often, switch to a more secure channel. For example:
[13:33] <H> u have torchat?
[13:34] <K> what is that sorry
[13:34] <H> nm all good
[13:37] <K> i have heard of snapchat not torchat
[13:38] <H> oh k... just an encrypted one thats all
So there's a near miss. Favoured encrypted channels evolve over time, and there has been a definite shift to mobile. However, the effect is so strong that it is worth searching all digital evidence for any reference to encrypted communication, because most of them are associated with a grooming process, if one is present.
Whether this real threat justifies a backdoor in all messaging systems is another question, I just didn't want the prevailing tone of dismissal of risk and harm to children in the comments so far to continue unchallenged.
A copy-paste of Europe and a '5G' hotel: El Reg's Adventures in Huawei Land were fairly wacky
Is your kid looking at GCSE in computer science? It's exam-only from 2022 – Ofqual
Chinese rover pootles about... on the far side of the friggin' MOON
That 'Surface will die in 2019' prediction is still a goer, says soothsayer
Now that's a dodgy Giza: Eggheads claim Great Pyramid can focus electromagnetic waves
Russia's national vulnerability database is a bit like the Soviet Union – sparse and slow
Boffin botheration as IET lifts axe on 20-year-old email alias service
Decision time for AI: Sometimes accuracy is not your friend
Oi. Where's the curve?
One of the benefits of receiver operating characteristics is that the method generates a curve, not a spot on a chart. Sadly omitted from this article. You use this to choose an optional cut point on the continuous measure depending on the positive and negative utilities of the outcomes. You could easily create an algorithm to do this.
Nothing much to do with AI though. Intermediate statistics.