Major internet providers slowing traffic speeds for thousands across US

In Atlanta, for example, Comcast provided hourly median download speeds over a CDN called GTT of 21.4 megabits per second at 7pm throughout the month of May. AT&T provided speeds over the same network of ⅕ of a megabit per second. When a network sends more than twice the traffic it receives, that network is required by AT&T to pay for the privilege. When quizzed about slow speeds on GTT, AT&T told Ars Technica earlier this year that it wouldn’t upgrade capacity to a CDN that saw that much outgoing traffic until it saw some money from that network (as distinct from the money it sees from consumers).

Source: Major internet providers slowing traffic speeds for thousands across US | Technology | The Guardian

Help, I’m Trapped in Facebook’s Absurd Pseudonym Purgatory

omeone reported my account as pseudonymous, and Facebook kicked me out. To get back in, I must provide various forms of identification proving the authenticity of my username. I’m not going to.

I am one of many casualties of Facebook’s recently rejiggered “authentic name” policy, wherein anonymous users can report a name as fake and trigger a verification process.

Source: Help, I’m Trapped in Facebook’s Absurd Pseudonym Purgatory | WIRED

You get what you pay for.

Encryption “would not have helped” at OPM, says DHS official

But when pressed on why systems had not been protected with encryption prior to the recent discovery of an intrusion that gave attackers access to sensitive data on millions of government employees and government contractors, she said, “It is not feasible to implement on networks that are too old.” She added that the agency is now working to encrypt data within its networks.

Source: Encryption “would not have helped” at OPM, says DHS official | Ars Technica

A consultant who did some work with a company contracted by OPM to manage personnel records for a number of agencies told Ars that he found the Unix systems administrator for the project “was in Argentina and his co-worker was physically located in the [People’s Republic of China]. Both had direct access to every row of data in every database: they were root.

Rosetta’s lander Philae wakes up from hibernation

For 85 seconds Philae “spoke” with its team on ground, via Rosetta, in the first contact since going into hibernation in November.

Source: Rosetta’s lander Philae wakes up from hibernation | Rosetta – ESA’s comet chaser

Now the scientists are waiting for the next contact.  There are still more than 8000 data packets in Philae’s mass memory which will give the DLR team information on what happened to the lander in the past few days on Comet 67P/Churyumov-Gerasimenko.

Short recap:  Philae is the craft that landed on the comet and Rosetta is circling about being the direct link to the lander kind of like how Apollo missions operated for manned moon landings.  Both Philae and Rosetta travelled to the comet together and then 211 days ago Rosetta launched Philae onto the surface of the comet where it bounced funny landing next to a cliff that blocked sunlight to its solar panels.  Apparently it now has gathered enough juice to be somewhat operational.  This is quite an amazing feat involving every STEM discipline from mathematics to rocket science.

I wonder if they’ll reconsider shutting down this program as mentioned here.

xkcd has been all over this story from the landing;  From: http://xkcd.com/1446/

Chinese hack compromised security-clearance database

Last week, the OPM announced that a database containing the personal information of about 4 million current and former federal employees was hacked. Privately, U.S. officials said the Chinese government was behind the breach. The administration has not publicly pointed a finger at Beijing.

Source: Chinese hack compromised security-clearance database – The Washington Post

I’m surprised the Washington Post continues with this Chinese narrative as there has been no official condemnation of China over this and determining the true source of an intrusion is extremely difficult if not impossible in many cases.  They still haven’t caught the culprits in the Target and Home Depot data breaches.  The list of suspects with motive to obtain this kind of data is probably quite long so it’s irresponsible to assume a guilty party before any evidence has been leaked.  No doubt consultants are working furiously tracing log records but at least wait until there is something concrete.  The Washington Post is an institution with top notch journalists so they should know better.

And here’s the blurb that made me laugh.

Offensive actions might include directing a U.S. agency to locate the servers holding the stolen data and deleting or altering the data, the former official said.

Haha.  Like whoever did this wouldn’t have backups 6 ways to Sunday of every bit gathered.  There’s no way to delete anything digital once it’s out in the ether.  Why would anyone publish a statement like that?  The only thing an offensive cyber attack can accomplish is making the US government behave like the criminals who they denounce.

A400M probe focuses on impact of accidental data wipe

Computers operating each engine cannot work if this data, which is unique to each of the turboprops, is missing.

Source: Exclusive: A400M probe focuses on impact of accidental data wipe | Reuters

Under the A400M’s design, the first warning pilots would receive of the engine data problem would be when the plane was 400 feet (120 meters) in the air, according to a safety document seen by Reuters. On the ground, there is no cockpit alert.

Sounds like these data files became a single point of failure.

Confidential USTR Emails Show Close Industry Involvement In TPP Negotiations

In another email in 2011, McCoy told GE lobbyists, “In case your CEO will be at the patent reform bill signing, I wanted to let you know that NZ Trade Minister Tim Groser is planning to attend. It would be a lovely opportunity for a CEO to turn to him and, for example, encourage NZ to support a strong IP chapter in the TPP…”

At another point, Jim DeLisi of Fanwood Chemical said he had just seen the text on rules of origin, and remarked, “Someone owes USTR a royalty payment. These are our rules. … This is a very pleasant surprise.”

Source: Confidential USTR Emails Show Close Industry Involvement In TPP Negotiations