Cloud Printing: How Printing Works from the Cloud | Virtual-Strategy Magazine - 0 views
Why Most Private Hospitals Are Nonprofit - 1 views
Military Surveillance Robot Approved for First Responders - 0 views
Why and How Apple Is Collecting Your iPhone Location Data | Gadget Lab | Wired.com - 0 views
-
Excerpt: Apple's general counsel Bruce Sewell in July 2010 sent a 13-page letter (.pdf) explaining its location-data-collection techniques in response to a request from Congressmen Joe Barton and Edward Markey asking for Apple to disclose such practices (.pdf). (Incidentally, Markey authored the "Do Not Track" bill to stop online companies from tracking children.) Note: Article has a link to this 13-page letter dated July 2010 after they were asked to disclose such practices.
South Carolina: Internal Emails Reveal Speed Trap Profit Motive - 0 views
-
Internal emails regarding Ridgeland, South Carolina speed camera system shows profit drives deployment decisions: An ongoing federal lawsuit against the speed trap town of Ridgeland, South Carolina uncovered internal emails last month that shed light on the motivation behind the state's only photo enforcement program. Since July 2010, Ridgeland has allowed the private firm iTraffic to operate a mobile speed camera van on Interstate 95, despite a state law outlawing the practice and a pair of attorney general opinions warning that the photo ticketing was not legal.
Michigan: Police Search Cell Phones During Traffic Stops - theNewspaper: A journal of ... - 6 views
-
"ACLU learned that the police had acquired the cell phone scanning devices and in August 2008 filed an official request for records on the program, including logs of how the devices were used. The state police responded by saying they would provide the information only in return for a payment of $544,680. The ACLU found the charge outrageous."
MSP - April 20, 2011 - Official Statement: Use of Cell Phone Data Extraction Devices - 0 views
-
News Release by Tiffany Brown, Public Affairs Section, Lansing: Recent news coverage prompted by a press release issued by the American Civil Liberties Union (ACLU) has brought speculation and caused inaccurate information to be reported about data extraction devices (DEDs) owned by the Michigan State Police (MSP). The MSP only uses the DEDs if a search warrant is obtained or if the person possessing the mobile device gives consent. The department*s internal directive is that the DEDs only be used by MSP specialty teams on criminal cases, such as crimes against children. The DEDs are not being used to extract citizens' personal information during routine traffic stops. The implication by the ACLU that the MSP uses these devices "quietly to bypass Fourth Amendment protections against unreasonable searches" is untrue, and this divisive tactic unjustly harms police and community relations.
FBI - The Intel-Driven FBI - 0 views
-
See photo at top left of article showcasing one of their high-tech, computer laden facilities on display for this article "What are the most significant security threats? What do we know about them? What don't we know? What is just around the corner that we should be preparing for now? These are the kinds of questions we ask ourselves every day. It's part of our intelligence-driven, threat-based, future-focused approach to defending the country from a range of national security and major crime threats. Today, the FBI combines its investigations and intelligence operations to be more predictive and preventative-more aware of emerging threats and better able to stop them before they turn into crimes. "
FBI - The Cyber Threat: Who's Doing What to Whom? - 0 views
-
Speech by Steven R. Chabinsky, Deputy Assistant Director, Cyber Division, Federal Bureau of Investigation - delivered March 23, 2010 "...to talk with you about the cyber threat, why it's important, and how you can help your organizations-and in doing so, help our country-rise to this enormous challenge. Some of you no doubt are on the front lines of the cyber security problem and are quite familiar with it, while others of you may only have passing familiarity with this growing problem. First, let me share with you the importance of the cyber security problem from the lens of the FBI. As you know, the FBI is a law enforcement agency that investigates hundreds of federal crimes as well as a domestic national security agency that combats terrorism, espionage, treason, and sabotage.
« First
‹ Previous
161 - 173 of 173
Showing 20▼ items per page