A Newbie’s Guide to Publishing: Unconscionability

An author picks apart the standard publishing contract, showing how ridiculously one-sided it is.

Unconscionability also known as unconscientious dealings is a term used in contract law to describe a defense against the enforcement of a contract based on the presence of terms that are excessively unfair to one party. Typically, such a contract is held to be unenforceable because the consideration offered is lacking or is so obviously inadequate that to enforce the contract would be unfair to the party seeking to escape the contract.

If you read this blog, you know where I’m going with this. I’m going to point out some of the more one-sided, onerous terms in a standard publishing contract. And make no mistake–these are practically universal, and for the most part, non-negotiable.

via A Newbie's Guide to Publishing: Unconscionability.

Is this the fuel cell that will crack the code to the data center? | Gigaom

Microsoft is exploring putting fuel cells directly in datacenter racks and skipping the DC/AC/DC conversion.

The controversial idea of using fuel cells to power data centers has been under discussion for the past couple of years. Probably the most famous project out there is Apple’s 10 MW fuel cell farm, which uses 50 fuel cells from Silicon Valley startup Bloom Energy installed next to its east coast data center in North Carolina.

But Microsoft is just starting to kick off a pretty unusual and innovative project using fuel cells and data centers that could some day draw a lot of interest. Microsoft is working with young startup Redox Power Systems and using a grant from the Department of Energy’s ARPA-E program, to test out Redox’s fuel cells to power individual server racks within a data center.

via Is this the fuel cell that will crack the code to the data center? | Gigaom.

Reporters on the CIA take

The story of Ken Dilanian playing footsie with the CIA brought to mind a comment I heard a few years back from someone in a position to know who insisted that news anchor Ted Koppel was a paid CIA asset. That was quite an extraordinary claim but I did not follow up and I could not find much evidence on the web to back it up.

It is not, however, a new phenomenon. Legendary journalist Carl Bernstein wrote a lengthy story about improper CIA involvement with the media. Wikipedia describes “Operation Mockinbgird” as a CIA plan to influence media and speaks of it in the past tense, though there is no indication that the operation has ended. Perhaps it hasn’t.

AP reporter soft-pedals phone key theft

Ken Dilanian

Ken Dilanian

Associated Press Intelligence reporter Ken Dilanian reports on the NSA/GCHQ’s theft of mobile phone keys, as reported by The Intercept.

WASHINGTON AP — Britain’s electronic spying agency, in cooperation with the U.S. National Security Agency, hacked into the networks of a Dutch company to steal codes that allow both governments to seamlessly eavesdrop on mobile phones worldwide, according to the documents given to journalists by Edward Snowden.

via AP News | The Times-Tribune | thetimes-tribune.com.

Dilanian’s soft-pedaling arrives in the second paragraph:
Continue reading

The VA’s crystal ball

VA diagnosis by crystal ball

VA diagnosis by crystal ball


The Veterans Administration is the most amazing medical system anywhere, bar none. I had always been under the impression that rendering a diagnosis required a doctor but somehow the VA can do it without one.

After years of mysterious health issues, I finally got mad enough two weeks ago to file paperwork to enroll in VA coverage. A day or two after mailing my paperwork I was delighted to receive a phone call from a VA representative who helpfully set me up with an appointment. Having long worked in customer service, I was impressed with my representative’s knowledge of his job and his rapport with his customer. In fact, I was already working on a blog post and even considered sharing my praise with Rep. David Price. All was looking up until I got this fancy-looking, full-color customized booklet in the mail yesterday. On page five was the bad news:
Continue reading

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle

NSA hacked SIM card manufacturer Gemalto and stole millions of encryption keys without the company’s knowledge. While I don’t particularly mind NSA targeting bad guys (that’s why we have NSA), I consider hacking the good guys to get the bad guys to be very poor form.

I am not surprised that this took place on Obama’s watch, either. His record is just as bad as George W. Bush’s. Perhaps worse.

The monitoring of the lawful communications of employees of major international corporations shows that such statements by Obama, other U.S. officials and British leaders — that they only intercept and monitor the communications of known or suspected criminals or terrorists — were untrue. “The NSA and GCHQ view the private communications of people who work for these companies as fair game,” says the ACLU’s Soghoian. “These people were specifically hunted and targeted by intelligence agencies, not because they did anything wrong, but because they could be used as a means to an end.”

via The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle.

Lenovo shipping laptops with pre-installed adware that kills HTTPS | CSO Online

Whoops. Lenovo shipped computers with adware that breaks ALL SSL on its laptops. Not only that, but the private key is also widely available, meaning anyone can spoof any website on an unsuspecting Lenovo owner’s computer. Major security fail!

Lenovo is in hot water after it was revealed on Wednesday that the company is shipping consumer laptops with Superfish Adware pre-installed. Security experts are alarmed, as the software performs Man-in-the-Middle attacks that compromises all SSL connections.

It’s a fact of life; PC manufacturers are paid to install software at the factory, and in many cases this is where their profit margin comes from. However, pre-installed software is mostly an annoyance for consumers. Yet, when this pre-installed software places their security at risk, it becomes a serious problem.

via Lenovo shipping laptops with pre-installed adware that kills HTTPS | CSO Online.

Update: More technical info here and here.

New Snowden Docs Indicate Scope of NSA Preparations for Cyber Battle – SPIEGEL ONLINE

Germany’s Der Spiegel published Snowden documents last month that describe an NSA project to modify hard drive firmware for spying purposes. This pretty much fingers the NSA as the “Equation Group” Kaspersky mentioned in its report.

Normally, internship applicants need to have polished resumes, with volunteer work on social projects considered a plus. But at Politerain, the job posting calls for candidates with significantly different skill sets. We are, the ad says, "looking for interns who want to break things."

Politerain is not a project associated with a conventional company. It is run by a US government intelligence organization, the National Security Agency (NSA). More precisely, it’s operated by the NSA’s digital snipers with Tailored Access Operations (TAO), the department responsible for breaking into computers.

via New Snowden Docs Indicate Scope of NSA Preparations for Cyber Battle – SPIEGEL ONLINE.

Equation Group: NSA-linked spying team have software to hack into any computer – News – Gadgets and Tech – The Independent

Astonishing. The apparent creators of Stuxnet have learned how to alter the firmware in hard drives to hide spying software in hidden sectors.

The US security services have developed software that has enabled it to spy on home computers almost anywhere in the world.Russian researchers at Kaspersky Lab have claimed that the software gave those behind it, thought to be the US National Security Agency, the power to listen in on the majority of the world’s computers.

It could be installed on practically any of the world’s most common hard drives and spy on the computer while going undetected.

It was used to break in to government and other important institutions in 30 countries across the world, they claim.

via Equation Group: NSA-linked spying team have software to hack into any computer – News – Gadgets and Tech – The Independent.

Update 10:20 PM: Read Kaspersky’s blog post on the Equation Group and it’s Equation Group Q&A [PDF].

Why Tesla’s battery for your home should terrify utilities | The Verge

Telsa and SolarCity are working on a residential battery that might let people drop off the electric grid completely. The utilities are sweating.

Earlier this week, during a disappointing Tesla earnings call, Elon Musk mentioned in passing that he’d be producing a stationary battery for powering the home in the next few months. It sounded like a throwaway side project from someone who’s never seen a side project he doesn’t like. But it’s a very smart move, and one that’s more central to Musk’s ambitions than it might seem.

via Why Tesla's battery for your home should terrify utilities | The Verge.