×
IT

HealthCare.gov Back-End Status: See You In September 251

theodp writes: "The consumer-facing parts of the Obamacare website may now work (most of the time) for people buying insurance, writes Politico, but beneath the surface, HealthCare.gov is still missing massive, critical pieces that are essential for key functions such as accurately paying insurers — and the deadline for finishing them keeps slipping. Without a fully built and operational system, federal officials can't determine how many of the 8 million Obamacare sign-ups announced last week will have actually paid their premiums. The Obama administration earlier this month indicated that insurers will continue to be paid through an 'interim' accounting process — pretty much a spreadsheet and some informed estimates — until at least September, when what is being called 'the mother of all reconciliations' will be conducted, which some fear could reveal the need for a massive correction and rate adjustments. Still, Oregon decided Friday to switch to Healthcare.gov from its own nothing-wrong-that-$78-million-couldn't-fix Cover Oregon online healthcare exchange."
Security

Security At Nuclear Facilities: Danger Likely Lurks From Within 72

mdsolar (1045926) sends this excerpt from the Stanford Report: "Insider threats are the most serious challenge confronting nuclear facilities in today's world, a Stanford political scientist says. In every case of theft of nuclear materials where the circumstances of the theft are known, the perpetrators were either insiders or had help from insiders, according to Scott Sagan and his co-author, Matthew Bunn of Harvard University, in a research paper published this month by the American Academy of Arts and Sciences. 'Given that the other cases involve bulk material stolen covertly without anyone being aware the material was missing, there is every reason to believe that they were perpetrated by insiders as well,' they wrote. And theft is not the only danger facing facility operators; sabotage is a risk as well ... While there have been sabotage attempts in the United States and elsewhere against nuclear facilities conducted by insiders, the truth may be hard to decipher in an industry shrouded in security, [Sagan] said. The most recent known example occurred in 2012 – an apparent insider sabotage of a diesel generator at the San Onofre nuclear facility in California. Arguably the most spectacular incident happened at South Africa's Koeberg nuclear power plant (then under construction) in South Africa in 1982 when someone detonated explosives directly on a nuclear reactor."
Security

How the Code War Has Replaced the Cold War 79

An anonymous reader writes "After years on the defensive, governments are building their own offensive capabilities to deliver digital attacks against their enemies. It's all part of a secret arms race, where countries spend billions of dollars to create stockpiles of digital weapons and zero-day flaws. But is this making us any safer, or putting us and the internet at risk? 'Estonia is a small state with a population of just 1.3 million. However, it has a highly-developed online infrastructure, having invested heavily in e-government services, digital ID cards, and online banking. ... The attacks on Estonia were a turning point, proving that a digital bombardment could be used not just to derail a company or a website, but to attack a country. Since then, many nations have been scrambling to improve their digital defenses -- and their digital weapons. While the attacks on Estonia used relatively simple tools against a small target, bigger weapons are being built to take on some of the mightiest of targets.'"

Slashdot Top Deals