Politics, Technology

How Australia Bungled Its $36 Billion High-Speed Internet Rollout

The story of Australia’s costly internet bungle illustrates the hazards of mingling telecommunication infrastructure with the impatience of modern politics. The internet modernization plan has been hobbled by cost overruns, partisan maneuvering and a major technical compromise that put 19th-century technology between the country’s 21st-century digital backbone and many of its homes and businesses.

The government-led push to modernize its telecommunications system was unprecedented, experts say — and provides a cautionary tale for others who might like to try something similar.

Australia was the first country where a totally national plan to cover every house or business was considered, said Rod Tucker, a University of Melbourne professor and a member of the expert panel that advised on the effort. The fact it was a government plan didn’t necessarily make it doomed. In Australia, we have changes of governments every three years, which really works against the ability to undertake long-term planning, and the long-term rollouts of networks like this.

Australia poses natural connectivity challenges. It lies oceans away from other countries, and any network would have to connect far-flung cities separated by its sparsely populated interior.

Still, Australia had high hopes for its ambitious internet project. Started in 2009, the initiative, known as the National Broadband Network, was intended to bring advanced fibre-optic technology to the doorstep of just about every home and business. It was initially estimated to cost 43 billion Australian dollars, shared by the government and the private sector — via redwolf.newsvine.com

Technology

Google invests in new undersea cable from Australia to Southeast Asia

Google announced Wednesday that it’s investing in a new subsea cable system that will run between Australia and Asia. The investment is Google’s latest move to strengthen its ties to the APAC region.

Called Indigo, the cable will connect Perth, Sydney, and Singapore, with a branch to Jakarta. To build the cable, Google is partnering with AARNet, Indosat Ooredoo, Singtel, SubPartners and Telstra, while Alcatel Submarine Networks will construct the cable. Span approximately 9,000km, it’s expected to be completed by mid-2019.

Indigo will initially have two fibre pairs with a design capacity of around 18 terabits per second — enough capacity for people in Singapore and Sydney to join 8 million simultaneous high-definition Google Hangout video conference calls — via redwolf.newsvine.com

Technology

Google Has Finally Killed the CAPTCHA

CAPTCHA’s are an irritating but necessary evil. The system that is used to verify whether or not a user is human has been around a while and it had to evolve because machines were getting better at reading the text than humans. With its latest iteration, Google says you’ll no longer have to input anything at all.

Invisible CAPTCHA’s are the latest development in the Completely Automated Public Turing test to tell Computers and Humans Apart. Google acquired reCaptcha back in 2009. It updated the system in 2013 to allow for the ubiquitous I’m not a robot checkbox that’s all over the internet. That version worked by determining the user’s humanity through their clicking style. If the click seemed fishy, a more elaborate test would be offered. But the Invisible CAPTCHA is able to recognize that a user is not a bot simply by analysing their browsing behaviour — via redwolf.newsvine.com

Technology

Wikipedia bans Daily Mail as ‘unreliable’ source

Wikipedia editors have voted to ban the Daily Mail as a source for the website in all but exceptional circumstances after deeming the news group generally unreliable.

The move is highly unusual for the online encyclopaedia, which rarely puts in place a blanket ban on publications and which still allows links to sources such as Kremlin backed news organisation Russia Today, and Fox News, both of which have raised concern among editors.

The editors described the arguments for a ban as centred on the Daily Mail’s reputation for poor fact checking, sensationalism and flat-out fabrication.

The Wikimedia Foundation, which runs Wikipedia but does not control its editing processes, said in a statement that volunteer editors on English Wikipedia had discussed the reliability of the Mail since at least early 2015.

It said: Based on the requests for comments section [on the reliable sources noticeboard], volunteer editors on English Wikipedia have come to a consensus that the Daily Mail is generally unreliable and its use as a reference is to be generally prohibited, especially when other more reliable sources exist — via redwolf.newsvine.com

Technology

Impact of the Internet / David Bowie

In a BBC interview in 1999 David Bowie predicted the huge impact of the Internet in society and the new ways of expression, art and communication while interviewer Jeremy Paxman looks quite sceptical about the real application of the new tool — via Youtube

Technology

The Cryptographic Capability of the Barbie Typewriter

In 1998, Mattel began selling the electronic Barbie Typewriter to replace the earlier mechanical typewriter in the Barbie line, thus continuing the toy industry habit of introducing young children to technology that is 30 years out of date. Nonetheless, it could keep children busy learning to read and write away from your word processor. But the typewriter had a secret. It was manufactured by Mehano in Slovenia, which already made other children’s typewriters. Mehano took an older model and made it pink and purple for Mattel. The base model they used had a wonderful secret capability that was sadly never included in Mattel’s marketing.

Apart from a range of typesetting features, such as letter-spacing and underline, this children’s toy was capable of encoding and decoding secret messages, using one of 4 built-in cipher modes. These modes were activated by entering a special key sequence on the keyboard, and was explained only in the original documentation.

When the E-115 was adopted by Mattel as an addition to the Barbie product line, it was aimed mainly at girls with a minimum age of 5 years. For this reason the product was given a pink-and-purple case and the Barbie logo and image were printed on the body. As it was probably thought that secret writing would not appeal to girls, the coding/decoding facilities were omitted from the manual. Nevertheless, these facilities can still be accessed if you know how to activate them.

If you happen to have one of these typewriters sitting around, you can find the instructions for using the crypto codes at Crypto Museum — via Neatorama

Technology, Wildlife

How technology is helping homeless pets find a new home

In Australia, over 137,390 animals once called pets are received annually by the RSPCA [PDF] alone, with rescue homes and animal shelters receiving surrendered animals faster than they can re-home those already in care.

With few options other than euthanasia for those animals unable to be placed, self-taught coder John Bishop decided he needed to do something and launched Pet Rescue in 2003, an online service connecting former pets with new owners.

Working with approximately 98 percent of the rescue groups in Australia from the RSPCA to animal welfare leagues, vets, pounds, and foster carers, non-profit Pet Rescue currently has over 8,600 animals from 952 rescue groups on its website.

Essentially it’s an aggregation service but that’s not very sexy, Bishop explained. We look at ourselves as providing connections between pets in care with the rescue groups and the public that are looking to adopt.

As Pet Rescue operates at a not-for-profit, Bishop has been faced with the mammoth task of keeping up with technology since day one — via redwolf.newsvine.com

Technology

First Levitating Turntable / Mag-Lev Audio

Cool and clever trump common sense and normal physics in this levitating record turntable, which aims to bring a vintage technology into the future. Mag-Lev Audio wants to push audio technology in a new (vertical) direction, creating an uplifting experience of music in the form of the world’s first floating record player — via Urbanist

Technology

Tesla unveils residential ‘solar roof’ with updated battery storage system

Tesla will build and sell its own line of solar panels with integrated batteries, the company announced at a press event at Universal Studios in LA, today. The Powerwall 2 will allow residential homeowners to replace their entire roof with solar panels and an updated Powerwall 2 battery system, making it much simpler for homes to be entirely powered by solar power.

The roof is made of a textured glass tile with integrated solar cells. The roofs look as good or better than conventional roofs, according to Musk. They look like normal roofing tiles from the ground, but are completely transparent to the sun. The tiles are hydrographically printed, which, Musk says, makes each one a special snowflake tile, and no two roofs will be the same. You can take any two roofs that look like that and they will be different — because they are different, said Musk.

There are a number of different versions of solar panels: Textured Glass Tile, Slate Glass Tile, Tuscan Glass Tile, and Smooth Glass Tile. Tesla says its glass tiles are much more durable than conventional roof tile — something that’s important in areas with risk of hail.

The products are a joint collaboration between SolarCity and Tesla, according to SolarCity CEO Lyndon Rive. Tesla is attempting to acquire SolarCity for $2.6 billion and shareholders of both companies will vote on the proposed acquisition in the middle of November.

The Powerwall 2 can store 14 kWh of energy, with a 5 kW continuous power draw, and 7 kW peak. The battery is warranted for unlimited power cycles for up to 10 years. It can be floor or wall mounted, inside or outside. It can be used for load shifting or back-up power — via redwolf.newsvine.com

Food, Technology

Sundrop Farms pioneering solar-powered greenhouse to grow food without fresh water

A groundbreaking greenhouse that relies on sunlight and seawater to grow tomatoes officially opens next week, 300 kilometres north of Adelaide.

The company Sundrop Farms spent several years developing the idea at a pilot plant on the outskirts of Port Augusta, before building a commercial facility that is 100 times larger.

This is a very special project, head grower Adrian Simkins said.

The 20-hectare futuristic-looking facility includes a field of more than 23,000 mirrors that capture the sunlight and direct it to a central receiver at the top of a 127-metre power tower.

At its peak it produces 39 megawatts of thermal energy, which is used for electricity, heating and making water.

All the water used for irrigating the crops is piped from the Spencer Gulf and converted into fresh water using a thermal desalination unit.

Mr Simkins has spent more than two decades running tomato greenhouses in Europe and North America and says the desalinated water is first-class.

It’s almost the perfect water, he said.

You’re taking all the salt out of it, there’s no disease aspects, it’s very pure and then we’re able to enhance it with the nutrition that the plants require — via redwolf.newsvine.com

Technology

Why the silencing of KrebsOnSecurity opens a troubling chapter for the ‘Net

For the better part of a day, KrebsOnSecurity, arguably the world’s most intrepid source of security news, has been silenced, presumably by a handful of individuals who didn’t like a recent series of exposés reporter Brian Krebs wrote. The incident, and the record-breaking data assault that brought it on, open a troubling new chapter in the short history of the Internet.

The crippling distributed denial-of-service attacks started shortly after Krebs published stories stemming from the hack of a DDoS-for-hire service known as vDOS. The first article analyzed leaked data that identified some of the previously anonymous people closely tied to vDOS. It documented how they took in more than $600,000 in two years by knocking other sites offline. A few days later, Krebs ran a follow-up piece detailing the arrests of two men who allegedly ran the service. A third post in the series is here.

On Thursday morning, exactly two weeks after Krebs published his first post, he reported that a sustained attack was bombarding his site with as much as 620 gigabits per second of junk data. That staggering amount of data is among the biggest ever recorded. Krebs was able to stay online thanks to the generosity of Akamai, a network provider that supplied DDoS mitigation services to him for free. The attack showed no signs of waning as the day wore on. Some indications suggest it may have grown stronger. At 4.00pm, Akamai gave Krebs two hours’ notice that it would no longer assume the considerable cost of defending KrebsOnSecurity. Krebs opted to shut down the site to prevent collateral damage hitting his service provider and its customers.

It’s hard to imagine a stronger form of censorship than these DDoS attacks because if nobody wants to take you on then that’s pretty effective censorship, Krebs told Ars on Friday. I’ve had a couple of big companies offer and then think better of offering to help me. That’s been frustrating.

Until recently, a DDoS attack in excess of 600Gb was nearly impossible for all but the most sophisticated and powerful actors to carry out. In 2013, attacks against anti-spam organization Spamhaus generated headlines because the 300Gb torrents were coming uncomfortably close to Internet-threatening size. The assault against KrebsOnSecurity represents a much greater threat for at least two reasons. First, it’s twice the size. Second and more significant, unlike the Spamhaus attacks, the staggering volume of bandwidth doesn’t rely on misconfigured domain name system servers which, in the big picture, can be remedied with relative ease — via redwolf.newsvine.com

Technology

NIST’s new password rules – what you need to know

It’s no secret. We’re really bad at passwords. Nevertheless, they aren’t going away any time soon.

With so many websites and online applications requiring us to create accounts and think up passwords in a hurry, it’s no wonder so many of us struggle to follow the advice of so-called password security experts.

At the same time, the computing power available for password cracking just gets bigger and bigger.

OK, so I started with the bad news, but this cloud does have a silver lining.

It doesn’t need to be as hard as we make it and the government is here to help.

That’s right, the United States National Institute for Standards and Technology (NIST) is formulating new guidelines for password policies to be used in the whole of the US government (the public sector).

Why is this important? Because the policies are sensible and a great template for all of us to use within our own organisations and application development programs.

Anyone interested in the draft specification for Special Publication 800-63-3: Digital Authentication Guidelines can review it as it evolves over on Github or in a more accessible form on NIST’s website.

For a more human approach, security researcher Jim Fenton did a presentation earlier this month at the PasswordsCon event in Las Vegas that sums up the changes nicely — via redwolf.newsvine.com

Politics, Technology

#CensusFail is a failure to listen to ‘experts’ and it’s complicated…

Australia just had a massive jump in IT jargon, well, sort of LOL! DDoS is now a thing you hear punters inserting into a conversation, so are servers, hacks, VPN’s and more. The problem is, most don’t actually really understand what the hell they are saying. As is often the case when it comes to the technical, a little bit of knowledge is dangerous.

But you know what, you don’t need to understand it all.

Yes, we are in a so-called Digital era, but the point is, do you know exactly how your car works, all the intimate details of how it is built, what is used, all the safety parameters, engineering, designing etc? In general the answer would be No. It is a tool. You know how to drive it, not the ducks nuts about how it is put together and all the moving parts. You do know you need to lock it so it won’t get stolen, you know there are certain laws to abide by so you don’t endanger yourself and others, but the actual chunk of steel that propels you – sometimes at great speed – down the road is beyond your knowledge and to be perfectly frank, we don’t need to know — via redwolf.newsvine.com

Politics, Technology

Census 2016: no sign of any DDoS attack

While the head of the Australian Bureau of Statistics David Kalisch is claiming that hackers forced the closure of the organisation’s website on census night, there is no evidence to show that any such attack occurred.

The website digitalattackmap.com tracks events of this nature but as security pro Matthew Hackling posted last night, the site detected no unusual activity in Australia at all.

Hackling commented in a tweet: Hmmm. Nothing unusual DDoS wise for Australia and yesterday #censusfail — via redwolf.newsvine.com

Technology

Adam Demo / Unity

The Adam demo is a real-time-rendered short film created with the Unity engine by their demo team. It runs at 1440p on a GeForce GTX980 and was shown on the booths at the Unite Europe conference — via Youtube

Rights, Technology

FBI Wants Biometric Database Hidden From Privacy Act

The FBI is working to keep information contained in a key biometric database private and unavailable, even to people whose information is contained in the records.

The database is known as the Next Generation Identification System, and it is an amalgamation of biometric records accumulated from people who have been through one of a number of biometric collection processes. That could include convicted criminals, anyone who has submitted records to employers, and many other people. The NGIS also has information from agencies outside of the FBI, including foreign law enforcement agencies and governments. Because of the nature of the records, the FBI is asking the federal government to exempt the database from the Privacy Act, making the records inaccessible through information requests.

The bureau says in a proposal to exempt the database from disclosure that the NGIS should be exempt from the Privacy Act for a number of reasons, including the possibility that providing access could compromise sensitive law enforcement information, disclose information which would constitute an unwarranted invasion of another’s personal privacy; reveal a sensitive investigative technique; could provide information that would allow a subject to avoid detection or apprehension; or constitute a potential danger to the health or safety of law enforcement personnel, confidential sources, and witnesses — via redwolf.newsvine.com

Technology

Must listen: We’ve found the real Bastard Operator From Hell

Nobody likes having to deal with cold calls to the office. But when you’re manning the IT help desk, you have no choice but to pick up the phone — even when it’s a pushy sales pitch.

So what to do about those annoying calls from over-enthusiastic sales staff itching to shift their technology wares? One spectacularly resourceful, and possibly sadistic, IT department has a solution: boot them all to Hell.

An IT boss — whose identity and employer we’re keeping anonymous, lest they be flooded with calls from people eager to experience it first-hand – explained to El Reg the story behind Extension 666 — via redwolf.newsvine.com