Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
"Here we have the world's most comprehensive database about people: their relationships, their names, their addresses, their locations, their communications, their relatives – all sitting within the United States, all accessible to US intelligence."
"Facebook, Google, Yahoo all these major US organizations have built-in interfaces for US intelligence. It's not a matter of serving a subpoena, they have an interface they have developed for US intelligence to use."
Link to Original Source
The abstract of the patent reads as follows:
"A location aware mobile device can include a baseband processor for communicating with one or more communication networks, such as a cellular network or WiFi network. In some implementations, the baseband processor can collect network information (e.g., transmitter IDs) over time. Upon request by a user or application, the network information can be translated to estimated position coordinates (e.g., latitude, longitude, altitude) of the location aware device for display on a map view or for other purposes. A user or application can query the location history database with a timestamp or other query to retrieve all or part of the location history for display in a map view."
The patent text goes on to outline how the tracking data could be accessed by applications, indicating Apple intends to build salable services around the collected data and allow third parties the ability to access it:
"A user or application can query the location history database with a timestamp or other query to retrieve all or part of the location history for display in a map view. In some implementations, the size and "freshness" of the location history database can be managed by eliminating duplicate entries in the database and/or removing older entries. The location history can be used to construct a travel timeline for the location aware device. The travel timeline can be displayed in a map view or used by location aware applications running on the location aware device or on a network. In some implementations, an Application Programming Interface (API) can be used by an application to query the location history database."
The patent application then goes on to describe how the location tracking data can include transmitter identifiers that correlate the data to a specific phone — which means a specific user — and how the data can be transmitted to network servers for processing:
"In some implementations, the network information can include transmitter identifiers (IDs). For example, Cell IDs can be tracked and recorded. The Cell IDs can be mapped to corresponding cell tower locations which can be used to provide estimated position coordinates of the location aware device. When a location history is requested by a user or application (e.g., through an API), the transmitter IDs can be translated to position coordinates of the location aware device which can be reverse geocoded to map locations for display on a map view or for other purposes. In other implementations, the network information can include WiFi scan data (e.g., access point IDs) which can be used to determine position coordinates of the location aware device, which can be reverse geocoded for display on a map view. In some implementations, the network information can be sent to a network server, which can translate the network information into position coordinates, which can be returned to the location aware device for processing by a location aware application."
Revelations of the patent application now confirm suspicions that Apple was quite aware of the storage of geolocation tracking data, that it was not merely a database of Wi-Fi locations, and the building of location histories on their customers was not due to a software glitch."
Link to Original Source
Persona management entails not just the deconfliction of persona artifacts such as names, email addresses, landing pages, and associated content. It also requires providing the human actors technology that takes the decision process out of the loop when using a specific persona. For this purpose we custom developed either virtual machines or thumb drives for each persona. This allowed the human actor to open a virtual machine or thumb drive with an associated persona and have all the appropriate email accounts, associations, web pages, social media accounts, etc. pre-established and configured with visual cues to remind the actor which persona he/she is using so as not to accidentally cross-contaminate personas during use.
And all of this is for the purposes of infiltration, data mining, and (here's the one that really worries me) ganging up on bloggers, commenters and otherwise "real" people to smear enemies and distort the truth."
Link to Original Source
Maik Schmidt, Arduino: A Quick-Start Guide — The Pragmatic Bookshelf, $35
Maik Schmidt is our guide in the Pragmatic Bookshelf's venture into the world of electronics. This is a compact work, like all others in the series, it goes straight to applicable examples and makes you get your hands dirty with real work. The Arduino platform has been described in many ways, but the best I have heard so far insightfully labels it "The 555 of the future," referring to the ubiquitous timer chip so many simple electronic projects make use of. If you haven't been hiding under a rock for the past few years, you have doubtlessly seen the plethora of material on the subject that's out there: even O'Reilly, which usually does not ship multiple titles on a single subject, has a variety of them. Most of these works are rather similar, the ones I prefer are Massimo Banzi's Getting Started with Arduino (O'Reilly, 2008), by one of the original developers of the platform, and the strongly related Getting started with Processing by Casey Reas and Ben Fry. These are brief books in the 100-page range, not exhaustive works, but covering the core philosophy and basic operation of the tools is sometimes the best way to jump into a new subject.
There is a lot of material on the subject, even the current issue of Make magazine has a very good roundup (and not for the first time, if I may add). So, how does Maik's work stand out in the fray? Right after a brief introduction to ease you into the Arduino environment, the book turns to interesting projects, more sophisticated than the usual fare (read: not the usual LED-blinking using pulse-width modulation that every tutorial out there walks you through). Examples of this include connecting with a Wii Nunchuk, motion sensing, networking, infrared remote control interfaces, and more. These projects are the high-note of the book, and span almost two-thirds of its length — and are significantly better than most other project material currently in print.
This is a hands-on book, theory is kept to a minimum, as you don't really need previous experience to tackle an Arduino: the platform was specifically designed to cater to artists and designers, it is meant to be approachable by users who are not EE wizards. That said, if what you are after is learning the underpinnings of low-level electronics or hardcore embedded systems programming, this book is not for you: pick up a copy of Horowitz and Hill's The Art of Electronics (possibly including the student manual), and check back with us in a year or so for the digital followup recommendation. But if you have less time on your hands, and you just want to network-enable a coffeepot or build some interactive art display, the introduction to Arduino Maik delivers is quite sufficient for your aims, and it spans material other authors have been remiss to include, like developing libraries and (Appendix C) use of serial line protocols.
Zooming in on the details, perhaps the comment can be made that it would be good if there was a single kit available including all components used in the text: perhaps Makershed or Adafruit Industries will supplement their existing kits with one comprising the full range of the author's selection. On the plus side, I must highlight the extensive illustrations, which visually represent the breadboard linkage between the Arduino and the sensor or actuator being used with extreme clarity, and are much more effective in teaching neophytes than more traditional circuit designs. Where these are not actual pictures, they were generated using the alpha release of Fritzing, a very interesting piece of software (see fritzing.org) aiming at facilitating circuit design for those of us without a background in electronics.
The landscape of Arduino publications is shifting faster than many other subjects in print, and doubtlessly Maik's status as "king of the Hill" is but temporary — however, among those books on the subject I have personally surveyed, I am pleased to say that he currently holds the championship cup.
Federico Lucifredi is the maintainer of man (1) and a Product Manager for the SUSE Linux Enterprise and openSUSE distributions."
Link to Original Source
The “roving wiretap” provision allows the FBI to obtain wiretaps from a secret intelligence court, known as the FISA court, without identifying the target or what method of communication is to be tapped.
The “lone wolf” measure allows FISA court warrants for the electronic monitoring of a person for whatever reason — even without showing that the suspect is an agent of a foreign power or a terrorist. The government has said it has never invoked that provision, but the Obama administration said it wanted to retain the authority to do so.
The “business records” provision allows FISA court warrants for any type of record, from banking to library to medical, without the government having to declare that the information sought is connected to a terrorism or espionage investigation.
The failure of the bill, sponsored by Rep. James F. Sensenbrenner Jr. (R-Wis), for the time being is likely to give airtime to competing measures in the Senate that would place limited checks on the act's broad surveillance powers. The White House, meanwhile, said it wanted the expiring measures extended through 2013."
Link to Original Source
Link to Original Source
- Only candidates approved by non elected officials can stand.
- The same officials can veto any law.
- The same officials can veto election results.
Yes, technically they have elections, but that isn't enough to make it a democracy.
On the eve of the Ides of March protest, from the source of the recent 'Anonymous' submitted CCHR leak on wikileaks, comes this message
"Dear $cientology,You attempt injunctions.I respond.Shall we continue the game? Much Love, DEEP CLAM"
Included was yet another PDF this time including yet more emails leaked from a Church of Scientology front group.
From: "Mike Kaplan" <email@example.com>
Subject: Fw: RE-ELECT FRANK HIBBARD, MAYOR OF CLEARWATER
Date: Sun, 6 Jan 2008 11:53:07 -0400
See below. Everyone in Clearwater MUST vote. Every vote will be needed to be
sure Hibbard gets re-elected. The alternative is Rita Garvey who is an SP.
— Original Message —
From: Shelly <mailto:shelly.bauer@Earthlink.net> Bauer
To: Shelly Bauer <mailto:firstname.lastname@example.org>
Sent: Sunday, January 06, 2008 8:09 AM
Subject: RE-ELECT FRANK HIBBARD, MAYOR OF CLEARWATER
DO YOUR PART
RE-ELECT FRANK HIBBARD
MAYOR OF CLEARWATER
TAKE NOTHING FOR GRANTED!
Lunch with your preferred Presidential candidates for a high price?
ONE SEAT LEFT
I have arranged a private one-hour luncheon with Ron Paul on 11/28 in St.
Pete when he will be in town for the CNN/YouTube Republican debate.
This luncheon is reserved for $1000+ donors to Ron Paul's presidential
campaign. 19 people so far have paid and confirmed and will have the honor
and pleasure of having lunch and communicating with Ron Paul directly.
From the head of the "Non Proffit" CCHR Bruce Wiseman
Go the the HELP committee website. The link is here.
Here you will see the names of the Committee members on the left hand
of the page. Please go to the individual websites of the Republican =
(this will take just a bit of leg work on your part by putting their =
into Google) and calling their office or sending a fax to them (email is =
least effective) stating your opposition to S. 1375 The Mother's Act.
Currently, the law prohibits political campaign activity by charities and churches by defining a 501(c)(3) organization as one "which does not participate in, or intervene in (including the publishing or distributing of statements), any political campaign on behalf of (or in opposition to) any candidate for public office."
An OCMB (Operation Clambake Message Board)regular adds
I downloaded myself a copy and started looking through them. I found an interesting one on pages 47-48.
Karin Pouw of OSA of CofS writes a message.
It's forwarded by Michael Genung. He's the guy who runs ACSR, Association for Citizens Sociel Reform. http://www.citizensforsocialreform.org/ ["CSR Background and Philosopy: CSR was founded in 2001 by a group of Scientologists and other like-minded individuals concerned with the escalating social ills in society. CSR's purpose is to work with in the field of public policy to bring about more effective and humane solutions to these social ills of illiteracy, criminality substance abuse and general decay of character."]
Then it's forwarded by Doyle Mills, of LEAF fame (Letters to the Editor Attack Force).
Then it's forwarded by Mary C. (possibly one of two Mary C's I'm thinking of, but unsure).
Then it's forwarded by Mike Kaplan, another person who runs an email list and forwards CCHR type stuff to CofS members.
If that ain't stringing a line from the CofS to CCHR and the CofS front group ("grassroots") movements, then I don't know what is!
Apologies in advance as the Enturbulation servers will not be up to a slashdotting so the Coral Cache link is here Enturbulation Discussion (already cached for you)
ANYONE CAN REPORT TAX FRAUD DIRECTLY TO THE IRS : http://www.irs.gov/compliance/enforcement/article/0,,id=106778,00.html It does require that you print out and mail in an actual hardcopy, but it does not require you to identify yourself.
Just a casual user passing on a message from the Enturbulation forum, this is already out there, there's no reason to attack the messenger."
Link to Original Source