An unidentified man jumped on some subway tracks in New York City to retrieve his dropped cellphone this morning.
When the train came flying down the tracks, he was able to lay down in a space between the tracks, noted CBS New York.
After the subway train stopped, the uninjured man got up and left the station, reports the Associated Press.
“We can’t say it enough. You should never, ever under any circumstances go onto the tracks to retrieve anything,” Metropolitan Transportation Authority spokesman Kevin Ortiz told radio station 1010 WINS.
“Your life is certainly much more important than a cellphone," added Ortiz. “In essence, those trains can come at you very quickly. What most people don’t understand is that often it’s very difficult to climb back onto the platform from the tracks.”
Sources: CBS New York and Associated Press
Most people use social media sites to connect with others, but a new app is helping users avoid certain folks.
Cloak is an iPhone app that uses check-in info posted on Foursquare and Instagram to help users spot certain people on a virtual map and avoid them.
According to UPI, this "antisocial network" was created by programmer Brian Moore and former Buzzfeed creative director Chris Baker.
According to Cloak's description on iTunes, users can "avoid exes, co-workers, that guy who likes to stop and chat, anyone you'd rather not run into."
By flagging certain people, users get warning messages from Cloak when the undesirables are within a certain range.
Of course, that dreaded person must use Foursquare and Instagram, but Cloak is planning to expand to other sites.
"We've got a lot more planned for Cloak, with Facebook being pretty important," representatives for Cloak told The Los Angeles Times.
The Los Angeles Police Department (LAPD) and Los Angeles Sheriff’s Department (LASD) use an electronic camera program called the "Automatic License Plate Reader" (ALPR) that records all of the license plates of cars on the road.
The ALPR cameras are mounted on police and sheriff cruisers, and on street poles.
Under the California Public Records Act, the Electronic Frontier Foundation (EFF) and the American Civil Liberties Union (ACLU) asked the LAPD and LASD what the ALPR had recorded for the past two years and what their policies were for using this technology, noted Reason.com.
However, the LAPD and LASD refused to answer.
According to the EFF, the LAPD and LASD stated in a court brief: "All ALPR data is investigatory—regardless of whether a license plate scan results in an immediate 'hit' because, for instance, the vehicle may be stolen, the subject of an 'Amber Alert,' or operated by an individual with an outstanding arrest warrant."
This means that all motorists in Los Angeles are under 24/7 surveillance for and their information may be kept for an unlimited amount of time.
However, the EFF claims this huge data sweep is not part of any actual "investigation" as the LAPD and LASD claim.
Ironically, the LAPD told the court that releasing this information might violate "individual citizens’ privacy interests," which it did not mention to citizens when secretly recording their plate information.
The LASD also claimed that to be concerned about releasing the "personal identifying information” that it got from people's license plates without their knowledge.
The EFF is scheduled to argue their case in court tomorrow.
A state appeals court in California ruled that while it may be illegal to text-message or talk on a mobile phone while driving, it is not illegal to use the mobile phone as a navigation device. A Fresno driver was pulled over and given a $165 ticket after a highway patrol officer observed him using his smartphone to look at a map. According to SFGate.com, this marks “the first appellate interpretation of a 2006 state law that restricts handheld uses of a mobile telephone while driving.”
The law was passed before the smartphone revolution that made the device much more than a phone, although there were some rudimentary navigation services on older devices. However, the law does allow for hands-free use of the phone, via headset or Bluetooth interface, so limits to the kinds of distractions that are illegal were written in at the start.
One does not need quantitative statistics to reach the conclusion that if a driver becomes distracted, he or she is more likely to be involved in an accident. However, some distractions are unavoidable, while others are simply calculated risks. For example, driving while talking on the phone is a distraction because no matter how one does it, some part of one's attention will be off of the road. Hands-free conversations allow the driver to keep both hands on the wheel, limiting the distraction but not removing it completely.
To try to legislate against all distractions would be counterproductive and might sour the public against the idea of any such regulation. Blanket bans against the usage of mobile devices seem to be over-cautious at best, with many critics identifying them as another example of the “nanny state.” Since looking at a paper map is perfectly legal while driving, it makes sense that looking at a digital map should be treated in the same way, especially considering the audio features of many navigation applications.
Instead, it seems laws like “Jake’s Law” in Maryland have gotten it right. According to WBAL, the law’s main goal is "to create tougher penalties for drivers who cause crashes as a result of using their cellphone while driving.” This treats device-related distracted driving much like drunk driving, wherein the penalties come as a result of recklessness on the road and do not rely on officers to actively police the inside of motorists’ vehicles.
With the preponderance of the use of satellite technology—from broadcasting television to providing walking directions to people’s smartphones—one would imagine that the area just above the atmosphere is cluttered with them. However, there are less than 3000 satellites up there doing “a job.”
There are between 20,000-35,000 objects spiraling around the Earth at any given time, mostly debris from space missions. In order to keep a better eye on all of that stuff whirling above our heads, the U.S. Air Force recently declassified their plan to launch a satellite system for just that purpose.
Called a “neighborhood watch” satellite by General William Shelton, the Geosynchronous Space Situational Awareness Program “will supplement ground-based radars and optical telescopes in tracking” both space-debris and the activities of foreign satellites, according to Reuters. While the GSSAP will monitor the positions of purposeful satellites in order to avoid collisions with space junk—which travels at about 17,000 miles-per-hour—it will also remain on guard for satellites that are trying to avoid detection, perhaps for the purposes of monitoring U.S. interests or other clandestine activities.
The GSSAP are scheduled to go up in the last quarter of 2014 on an unmanned Delta 4 rocket, and critics wonder why the U.S. government declassified the program and effectively informed “our enemies” of this satellite’s capabilities. Yet, according to Brian Weeden, technical advisor with the Secure World Foundation and quoted by Reuters, that is precisely what the Obama Administration intended. He says they are “being more honest when [they say] it declassified this program to try and deter attacks on U.S. satellites.”
Rather than catching adversaries or, worse, allies attempting to interfere with our national satellite system, the White House prefers to simply let everyone know that they have the ability to monitor the satellites closely.
The Armatix Smart System iP1, a new gun from Germany that is being sold in California, won’t fire unless it’s in range of a special wristwatch worn by the gun’s owner.
When the wristwatch and the Armatix iP1 are close enough to each other, a light in the gun turns from red to green.
Gun control advocates are supporting this new "smart gun," but so are gun rights proponents.
“It could revolutionize the gun industry,” James Mitchell, owner of the Oak Tree Gun Club, told The Washington Post.
However, the National Rifle Association isn't happy about about this new gun.
The NRA's lobbying arm is worried that smart guns have “the potential to mesh with the anti-gunner’s agenda, opening the door to a ban on all guns that do not possess the government-required technology."
However, Belinda Padilla, president of Armatix’s U.S. office, disagrees. "If you have two cars, and one has an air bag and one doesn’t, are you going to buy the one without the air bag?" she said. "It’s your choice, but why would you do that?”
According to ExtremeTech.com, the Armatix iP1 costs $1,399, while the watch is $399. It may be a worthwhile investment to create a safer country.
While Comcast plans to buy Time-Warner Cable and takeover the cable/Internet market, the Media Development Investment Fund (MDIF) has its own plan: to provide free Internet for the whole planet.
MDIF hopes to launch hundreds of low-cost miniature satellites into low Earth orbit (pictured), notes the Daily Mail.
MDIF is going to use datacasting, which sends data via radio waves and will theoretically broadcast the web around the world in what they call the "Outernet."
But MDIF first needs to raise tens of millions of dollars in donations, which they accept on their website.
"We have a very solid understand of the costs involved, as well as experience working on numerous spacecraft," MDIF's Syed Karim stated on the social media site Reddit.
"There isn't a lot of raw research that is being done here; much of what is being described has already been proven by other small satellite programs and experiments. There's really nothing that is technically impossible to this," added Karim.
A new device that costs only $26 to build can take over your car if it is physically plugged into your vehicle's Controller Area Network (CAN) bus.
Your CAN bus allows computerized devices inside your car to communicate without a host computer, and this new device, called the CAN Hacking Tool or CHT, can control your CAN bus.
The CHT recently made its debut at the DefCon 21 Hacking Conference (video below).
According to Jalopnik.com, once installed in your car, the CHT is controlled via wireless Bluetooth, which would give anyone with a cell phone control over your vehicle.
The developers of the CHT, Alberto Garcia Illera and Javier Vazquez Vidal, claimed they wanted to play with the settings of their cars to get better gas mileage.
The CHT uses a protocol designed for cars manufactured before 2010, but Vidal and Illera said the CHT could be configured for newer protocols and cars.
While the CHT creators do not have any criminal intent, it is possible that car thieves could use the CHT to control your car's headlights, steering, brakes, locks and alarms, noted the Daily Mail.
“It can take five minutes or less to hook it up and then walk away,” Vidal told Forbes. “We could wait one minute or one year, and then trigger it to do whatever we have programmed it to do.”
U.S. Military personnel and CIA operatives in Yemen, Somalia and Afghanistan are using their targets' cell phone locations based on metadata from the National Security Agency (NSA) to launch drone attacks, which leads to the deaths of innocent civilians, says a new report.
According to The Intercept, NSA documents provided by whistleblower Edward Snowden and statements by a former drone operator say the NSA uses "geolocation," which locks onto the SIM card of a cell phone of a suspected terrorist.
The NSA's "Geo Cell" program does not verify whether the carrier of the cell phone is actually the suspected terrorist. Instead of confirming a target with human intelligence on the ground, the CIA or the U.S. military then orders a drone strike based on the activity and location of the cell phone.
“They might have been terrorists,” said the former drone operator. “Or they could have been family members who have nothing to do with the target’s activities.”
“Once the bomb lands or a night raid happens, you know that phone is there, but we don’t know who’s behind it, who’s holding it. It’s of course assumed that the phone belongs to a human being who is nefarious and considered an ‘unlawful enemy combatant,’" the former drone operator adds. "This is where it gets very shady.”
Based on his experience, the former drone operator believes that drone attacks are basically death sentences based on unreliable metadata.
Lest anyone accuse Snowden of informing the terrorists of U.S. secrets, they already know how the drone attack system works.
Some Taliban leaders intentionally distribute SIM cards among their units in order to elude the United States.
“They would do things like go to meetings, take all their SIM cards out, put them in a bag, mix them up, and everybody gets a different SIM card when they leave,” the former drone operator said. “That’s how they confuse us.”
Some unaware terrorist suspects may loan their cell phones to friends and family, who get killed by drones instead.
“It’s really like we’re targeting a cell phone," Brandon Bryant, another former drone sensor operator with the U.S. Air Force, told The Intercept. "We’re not going after people, we’re going after their phones, in the hopes that the person on the other end of that missile is the bad guy."
RT.com notes that this new information contradicts claims by the Obama administration, which has said that drone strikes are conducted with precision accuracy to minimize civilian casualties.
"Before any strike is taken, there must be near-certainty that no civilians will be killed or injured,” President Barack Obama said in 2013.
According to a 2012 study by Stanford Law School and New York University's School of Law, U.S. drone strikes in Pakistan alone have killed far more people than the United States will admit, reported CNN.
It seems like a problem ripe for science-fiction: whether or not to mandate a permanent “kill switch” in mobile devices to stop the statistically high number of smartphone thefts in California. A bill was finally unveiled by State Sen. Mark Leno and District Attorney George Gascon of San Francisco that, if passed, will require all phones sold in California to have the ability by 2015.
According to RT.com, thefts of mobile phones “account for almost one in three U.S. robberies” and the instances are even higher in California. The proposed law would require the installation of a mechanism that could permanently disable the device, ending all potential for the phone to be reactivated in America or abroad.
Given that Americans currently spend about $7.8 billion in phone insurance, San Francisco Chief of Police Greg Suhr told the Associated Press, “I can’t imagine someone would vote against” this proposed law. However, CTIA, a trade group for wireless providers, disputes the assertion that phone insurance is its only worry.
The main concern about a permanent kill switch embedded in smartphones is that, like any device connected to the internet, it is susceptible to hacking. A recent NBC News report about hacking in Sochi, Russia is but one example of how vulnerable our data really can be. Government officials or public profile individuals who use smartphones could face an extra risk of attack from hackers looking to exploit the kill switch.
Phone insurance is both aggressively pushed by wireless providers and not a terrible idea for consumers who are purchasing very expensive pieces of technology. Shattered screens, broken buttons, and myriad other problems that can affect the phone make the insurance a product consumers want. It seems as if California lawmakers are treating a side-effect and not the disease. There are other ways to reduce this specific criminal problem than by placing restrictions on citizens and private companies.