It's the latter and seems to be confined to the United States at the moment. European and Asian forces seem to get the cooperation they need and African forces, those countries who have them, are way too busy with actual crime to bother with making crimes up.
I was in Manila awhile back, and something I found interesting is the huge difference in the attitude of law enforcement and security forces. I always feel very nervous around armed security forces in the US and Mexico, but in Manila it was as if you were the customer, and they were there to serve you. They would say yes sir and no sir, hold doors open for you, and were simply pleasant and helpful. That's the kind of police force we need here at home. One that sees us as their customer, rather than there enemy.
So would that include something like a Terramax UGV (http://oshkoshdefense.com/technology-1/unmanned-ground-vehicle/) coupled with a Boomerang anti sniper system (http://en.wikipedia.org/wiki/Boomerang_%28countermeasure%29)?
This would give a military the ability to send an unmanned vehicle into almost any terrain (rural or urban), which could respond instantly to shots fired at it with its own deadly return fire. And, considering the hell that Marines faced in Helmand with IEDs and snipers while slogging through muddy fields, wouldn't this present a far better option (particularly for the Marines and their families)?
+2 Informative
Or is Seattle saying McDonald's cashiers are worth the same as coders?
Hello from Seattle AC! I couldn't have said it better myself.
I guess you don't count the fact that the US Federal government is spending billions of dollars to try to repair some of the damage from Snowden's theft and leaks as detrimental. You'll be helping to pay for that since you live in the US. No doubt GCHQ will be paying some bills as well.
There has certainly been other fallout from that, but apparently we can count on you to never go looking for it.
Wait, that argument isn't logical. What is the government spending billions of dollars trying to repair some of the damage if there are no detrimental affects from the leaks (which you confirmed in your rebuttal)? Sounds to me like they are spending billions of dollars covering up the mess they themselves created. Maybe they should just stop doing that. Problem solved.
Wow, someone that can say "Raspberry Pi" but can't google "file permissions on linux" or umask.
Nice snark there rtard. If a user has permission to "edit" a directory, this includes both editing and deleting files owned by the same user. File permissions or umask will not help you there. I suppose you could rig the system to create a new user for every mac address that connects, but that could be easily circumvented. Im sure it's possible someone, just not as easy as googling how filer permissions work.
Java as an idea was great....write a program that compiles once and the binary can run on anything.
<rant> Java as an implementation has failed miserably for just the reason mentioned by the parent. I have encountered too many apps that won't run unless a specific version of the VM is available.
Then there is Tomcat, evil software container...I have lost too many hours of my life trying to keep that beast happy....just today I got an email from a colleague who wants to restart tomcat weekly because something is causing it to leak file descriptors. More than 1024 files open at the same time...I could probably figure it out, but that would again be more hours lost to java. </rant>
You just have crappy Java developers, it has nothing to do with Tomcat. The same thing would happen to any "always on" Java program that loads leaky external code. Don't feel bad, most of the Java code I've seen is total crap. You usually just don't notice it because of the short life-cycle of the process, unlike Tomcat.
Measures could have been taken... but then again, what better way for the NSA and other government spies to infiltrate a computer independent of an operating system than this? Seriously.
Perhaps this?
http://www.theregister.co.uk/2013/09/23/intel_stuns_world_with_wakeon3g/
NSA already have a hidden 3G enabled backdoor straight in to your CPU and can even power up computers remotely and provide power to HDDs and access them remotely.
It even has it's own OS within the chip so your OS of choice doesn't matter
You say it as if fact, but you must have missed this line in the article: "No evidence is offered for the assertions detailed above."
Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker