They should target the Coyotes and drug Cartel members instead. Don’t attack the innocent. Attack the human traffickers.
 May 28, 2014 at 11:36pm
“The government dictates what companies are required to include…” Maybe so…but, bugs do crop up. It is too bad fellow programmers do not realize bugs CAN happen. They, most definitely, DO on my project.
 May 28, 2014 at 11:08pm
There is something everyone is missing. I am an old programmer. And the capabilities Snowden is describing can ONLY be done if the device operating systems are written in such a way as to support this type of use in the first place. For instance,if you take a picture on your iPhone you not only get a sound but a visual flash on your screen in low light. For this capability to be enabled as a remote feature and covert, the features have to be decoupled within the OS such that each can be disabled to remain hidden by the owner of the device. In short, if this is true then this is proof positive that the manufacturers are purposefully enabling this capability. Else, this would have been bullet proofed a very very long time ago. It is not hard to do. It is not expensive to do.
The government dictates what companies are required to include in their products. Gun to the head type.
Snowden doesn't stand a chance in court if he returns. The guy that made that video is still in jail because the government says so.
Kerry just said that Snowden should return to the U.S. and take his case to the justice system and the people. Fat chance of ever seeing him again if he returns.
Maybe. But I don't like using a flash, and several cameras and phones now have offered not to make the shutter noise, which isn't necessary anymore. Much of this is taking advantage of other capabilities, but I DO think you are right... There was a history channel show on counterterrorism when windows XP was new,that talked about using a home computer in a hostage situation to get intelligence.
The more wired we are, the more hooks we leave dangling... I always wonder what fool will put in these electronic monitoring systems with indoor cameras and electronic locks
I'm not an expert but i have heard that NSA installs backdoors into the software post-manufacture and then repackages it in violation of numerous trade agreements.
@Jidcoit: Small ic's are made in ring of fire They remain proprietary as long as manufacturers maintain integrity.
Chicken or the Egg? Apple or the Samsung? When IBM accepted Bill Gates cheapo for their disk OS, were they concerned that it needed band-aid just to run?
Board members weighed engineering recommendation and accounting both. You know design teams never get the budget and time frame for 98% reliability.
June 13, 2013 at 9:17pm
Enough of the PC stupidity! Plan a protest in front of every FBI building, Monday at noon est. your signs should say “You killed them!”
Prepare, show up, and bring someone.
May 8, 2013 at 10:09pm
I have never posted before. I am shocked and disgusted. If this is true, then I have to say this is unacceptable. I have a hero worship for the operator community and their families. My office is filled with their successes and failures. If this is acceptable to them, then I think the stories are wrong. Honor in those pages are nothing but fiction.