SonicSpike sends word of an FAA report that a small, remote-controlled aircraft was nearly struck by an American Airlines passenger jet as the jet was preparing to land. The pilot saw it briefly as he flew by — it was close enough that he was sure it stuck the plane, but no damage was found upon inspection. Jim Williams, head of the FAA's drone office, said the incident highlights the risk of ubiquitous, unregulated drone use. He said,
"The risk for a small UAS to be ingested into a passenger airline engine is very real. The results could be catastrophic." The article notes that the FAA "currently bans the commercial use of drones in the United States and is under growing pressure to set rules that would permit their broader use. Hobby and many law-enforcement uses are permitted. Last year, the agency began establishing test sites where businesses can try out commercial uses."
dryriver sends this BBC report:
"The USB flash drive is one of the most simple, everyday pieces of technology that many people take for granted. Now it's being eyed as a possible solution to bridging the digital divide, by two colourful entrepreneurs behind the start-up Keepod. Nissan Bahar and Franky Imbesi aim to combat the lack of access to computers by providing what amounts to an operating-system-on-a-stick. In six weeks, their idea managed to raise more than $40,000 (£23,750) on fundraising site Indiegogo, providing the cash to begin a campaign to offer low-cost computing to the two-thirds of the globe's population that currently has little or no access. The test bed for the project is the slums of Nairobi in Kenya. The typical income for the half a million people in the city's Mathare district is about $2 (£1.20) a day. Very few people here use a computer or have access to the net. But Mr Bahar and Mr Imbesi want to change that with their Keepod USB stick. It will allow old, discarded and potentially non-functional PCs to be revived, while allowing each user to have ownership of their own 'personal computer' experience — with their chosen desktop layout, programs and data — at a fraction of the cost of providing a unique laptop, tablet or other machine to each person.'"
An anonymous reader writes "An article by David Cole at the NY Review of Books lays out why we should care as much about the collection of metadata as we do about the collection of the data itself. At a recent debate, General Michael Hayden, who formerly led both the NSA and the CIA, told Cole, 'we kill people based on metadata.' The statement is stark and descriptive: metadata isn't just part of the investigation. Sometimes it's the entire investigation. Cole talks about the USA Freedom Act, legislation that would limit the NSA's data collection powers if it passes. The bill contains several good steps in securing the privacy of citizens and restoring due process. But Cole says it 'only skims the surface.' He writes, 'It does not address, for example, the NSA's guerilla-like tactics of inserting vulnerabilities into computer software and drivers, to be exploited later to surreptitiously intercept private communications. It also focuses exclusively on reining in the NSA's direct spying on Americans. ... In the Internet era, it is increasingly common that everyone's communications cross national boundaries. That makes all of us vulnerable, for when the government collects data in bulk from people it believes are foreign nationals, it is almost certain to sweep up lots of communications in which Americans are involved.' He concludes, '[T]he biggest mistake any of us could make would be to conclude that this bill solves the problem.'"
An anonymous reader writes "A article on The Register titled talks about a demo that was given in London last month by NCC Group where they turned a modern TV into an audio bug. 'The devices contain microphones and cameras that can be utilized by applications — Skype and similar apps being good examples. The TV has a fairly large amount of storage, so would be able to hold more than 30 seconds of audio – we only captured short snippets for demonstrations purposes. A more sophisticated attack could store more audio locally and only upload it at certain times, or could even stream it directly to a server, bypassing the need to use any of the device’s storage.' Given the Snowden revelations and what we've seen previously about older tech being deprecated, how can we protect ourselves with the modern devices (other than not connecting them to the Internet)?"
An anonymous reader writes "PBS has an article about the growth of jobs that really don't need to exist. It includes an interview with professor David Graebner, who's known for his 2013 article 'BS jobs.' The premise is simple: as technology has automated huge portions of work that used to fill the days for millions of workers, many jobs simply involve less work. How often have you sat at your desk browsing the internet instead of being productive? If your company is such that you can aggregate that lost time across a bunch of workers, you could probably reduce the headcount significantly if everybody just stayed on task all the time. But that's not even an expectation at a lot of companies. Graebner ballparks the number of effectively useless jobs at around 20%. (It's not that the individual workers are useless, just that there are, for example, 12 people doing the work of 10.) So, how about it: how much actual productivity goes into your 40-hour workweek? What about your co-workers? How many people could your company fire if everybody just paid attention all the time?"
phmadore writes: "Some clever German pranksters managed to put one over on a sect of the intelligentsia just the other day. In this 30-minute presentation (video) at the re:publica 2014 tech conference, activists going under the pseudonyms of Paul von Ribbeck and Gloria Spindle presented four new (and moderately credible) Google products making up the 'Google Nest': Google Trust, Google Hug, Google Bee, and Google Bye. 'We can't really guarantee that we protect your information, but we can do our very best to protect you,' says Spindle about eight minutes in. Google is reportedly rather upset about the whole affair. The conference organizers were in on the joke — the audience were clued in afterward and asked to participate in order to fool the media. For me, the discussion-worthy items here are: data insurance and the value of data."
An anonymous reader writes "Lost amid the disappointment of the Star Wars prequels were the unfortunate edits George Lucas has made to the original trilogy when he re-released them. Lee Hutchinson points out a few of the worst: 'In Return of the Jedi, Jabba's palace gains an asinine CGI-filled song-and-dance interlude. Dialogue is butchered in Empire Strikes Back. And in the first movie, perhaps most famously, Han no longer shoots first.' Lucas flat-out refused to spend time and money remastering the original versions of the movies. But now Disney is in control of the franchise (and the business case for releasing different versions of the same films has been proven). So there's hope, right? According to Hutchinson: maybe, but not for a while. While technological advances have reduced the price tag for such an endeavour, lawyers will keep it expensive. It turns out 20th Century Fox still owns distribution rights to the Star Wars films. Because of complex and irritating legal reasons, Disney was not able to acquire those as well. Thus, Disney will have to get Fox's approval and probably cut Fox in for some of the profits, if they were to re-release the series."
An anonymous reader writes "The U.S. Department of Justice says it needs greater authority to hack remote computers in the course of an investigation. The agency reasons that criminal operations involving computers are become more complicated, and argues that its own capabilities need to scale up to match them. An ACLU attorney said, 'By expanding federal law enforcement's power to secretly exploit "zero-day"' vulnerabilities in software and Internet platforms, the proposal threatens to weaken Internet security for all of us.' This is particularly relevant in the wake of Heartbleed — it's been unclear whether the U.S. government knew about it before everyone else did. This request suggests that the DOJ, at least, did not abuse it — but it sure looks like they would've wanted to. You can read their request starting on page 499 of this committee meeting schedule."
An anonymous reader writes "Nintendo has been taking heat recently for their decision not to allow same sex relationships in Tomodachi Life, an upcoming life simulation game for the 3DS. An advocacy group for LGBT issues said, 'In purposefully limiting players' relationship options, Nintendo is not only sending a hurtful message to many of its fans and consumers by excluding them, but also setting itself way behind the times.' The group also pointed out that The Sims allowed such choices over a decade ago. Nintendo originally replied that the game was not intended to be social commentary, and pointed out that the U.S. release of Tomodachi Life is just a localization of the Japanese version (gay marriage is not legal in Japan). Now Nintendo has officially apologized for 'failing to include same-sex relationships' in the game, and they promised to build a more inclusive experience if they make a sequel."
Hugh Pickens DOT Com (2995471) writes "Jaikumar Vijayan reports at Computerworld that a physician at Columbia University Medical Center (CU) attempted to "deactivate" a personally owned computer from a hospital network segment that contained sensitive patient health information, creating an inadvertent data leak that is going to cost the hospital $4.8 million to settle with the U.S. Department of Health and Human Services (HHS). The error left patient status, vital signs, laboratory results, medication information, and other sensitive data on about 6,800 individuals accessible to all via the Web. The breach was discovered after the hospital received a complaint from an individual who discovered personal health information about his deceased partner on the Web. An investigation by the HHS Office for Civil Rights (OCR) found that neither Columbia University nor New York Presbyterian Hospital, who operated the network jointly, had implemented adequate security protections, or undertook a risk analysis or audit to identify the location of sensitive patient health information on the joint network. "For more than three years, we have been cooperating with HHS by voluntarily providing information about the incident in question," say the hospitals. "We also have continually strengthened our safeguards to enhance our information systems and processes, and will continue to do so under the terms of the agreement with HHS." HHS has also extracted settlements from several other healthcare entities over the past two years as it beefs up the effort to crack down on HIPAA violations. In April, it reached a $2 million settlement with with Concentra Health Services and QCA Health Plan. Both organizations reported losing laptops containing unencrypted patient data."
An anonymous reader writes "Welcome to the club, Euro friends. A World Health Organization analysis concludes that within 15 years a majority of Europeans will be obese or severely overweight. In almost all countries the proportion of overweight and obesity in males was projected to increase – to reach 75% in UK, 80% in Czech Republic, Spain and Poland, and 90% in Ireland, the highest level calculated. Women fare a little better. In reviewing the results, the lead researcher said: "Our study presents a worrying picture of rising obesity across Europe. Policies to reverse this trend are urgently needed.""