from the everything's-more-sanguinary-in-texas dept.
Presto Vivace writes "Carlton Purvis of Security Management News reports that a tip from an amateur UAV enthusiast 'is what led Texas authorities to open a major criminal investigation into the waste practices of a Dallas meat packing plant.' The photo shows a river of blood."
An anonymous reader writes: Until now, there has never been a ruling on whether it violated the Fifth Amendment to require a defendant to decrypt a hard drive. The ruling essentially allows encrypted files to be treated much like private property, which can be searched with the proper warrants.
pigrabbitbear writes: "Remember your first visit to the planetarium? Neil DeGrasse Tyson does — it was what inspired him to become an astrophysicist in the first place. That same planetarium, now under Tyson’s direction, is currently undergoing a transformation the likes of which Neil’s young self couldn’t have possibly imagined: It’s becoming a giant videogame."
freakxx writes: As Boa Sr., 85, the last speaker of a 65000 years old language died in Andaman Islands of India, the ancient language "Bo" also goes extinct. She was the last speaker of the language since last 30-40 years since her parents died.
Stephen Corry, the director of Survival International, summaries it as a great loss to the human history and it should not be allowed to repeat: "Boa's loss is a bleak reminder that we must not allow this to happen to the other tribes of the Andaman Islands". However, the fact is that the surviving number of people belonging to these tribes are now only 52 and it may not be that far when we see these other tribes also go extinct.
The biggest question that comes along is whether we should let the evolution follow its course of "only the fittest can survive" or should we intervene and protect these ancient treasures! What is even more important is "how ?", because according to the article, when the British came, they tried to civilize these tribal people by putting few of them in modern houses but non of the 150 children born could survive more than 2 years.
from the proof-of-concept dept.
The demonstration of the Chromium tablet begins at about 11:20 into the video. The Android and Ubuntu versions are displayed earlier.
LlamaZorz writes: Dear Slashdot community, I have been wondering for quite some time as to why American citizens do not have access to cell phones with encrypted data and voice communication. We all know that the government has such technology and makes very good use of it, so why cant the populace? Is their a set regulation by the FCC or something which prohibits companies from marketing encrypted cell phones to the everyday person? I have searched and cannot find one.
I am aware that both GSM and CDMA all have their own encryption standard which is mainly used to stop everyday people from listening in. But such minor encryption in no way stops our government and its agencies or a criminal organisation. The US government has numerous known programs like ECHELON, where they are capable of listening to your calls, screening for keywords. What is even more scary a majority of our intelligence is outsourced to private enterprise. I find all of these things completely ridiculous. We as citizens should have our privacy and it shouldn't compromised no matter how bad the threat.
So I mainly wanted to ask Slashdot if it were legal & ethical to create such a phone which would use known secure public key encryption trying to completely secure all voice communication. I think such is both possible and practical. What do you guys think?
Sherri Davidoff writes: "Here's a real copy of an American citizen's DHS Travel Record retrieved from the U.S. Customs and Border Patrol's Automated Targeting System (ATS). This was obtained through a FOIA/Privacy Act request... The document reveals that the DHS is storing the reader's:
Credit card number and expiration
IP address used to make web travel reservations
Hotel information and itinerary
Full airline itinerary, including flight numbers and seat numbers
Phone numbers, incl. business, home & cell
Every frequent flyer and hotel number associated with the subject, even ones not used for the specific reservation
from the first-plan-your-safeguards dept.
ChelleChelle writes "Participatory sensing technologies are greatly expanding the possible uses of mobile phones in ways that could improve our lives and our communities (for example, by helping us to understand our exposure to air pollution or our daily carbon footprint). However, with these potential gains comes great risk, particularly to our privacy. With their built-in microphones, cameras and location awareness, mobile phones could, at the extreme, become the most widespread embedded surveillance tools in history. Whether phones engaged in sensing data are tools for self and community research, coercion or surveillance depends on who collects the data, how it is handled, and what privacy protections users are given. This article gives a number of opinions about what programmers might do to make this sort of data collection work without slipping into surveillance and control."