Quotulatiousness

November 17, 2015

Beyond Wires and Pigeons – Communications in World War 1 I THE GREAT WAR Special

Filed under: Europe, France, History, Military, Technology, WW1 — Tags: , — Nicholas @ 04:00

Published on 16 Nov 2015

If one thing was vital to the the new kind of modern warfare in the First World War, it was communications. The Industrial Revolution had brought wireless transmission of signals with it and the huge armies of World War 1 needed to be in contact constantly to be successful in the field. In this special episode we introduce you to the birth hour of modern military communication and signals.

The “cult of meritocracy” in hacker culture

Filed under: Politics, Technology — Tags: , , , , , — Nicholas @ 03:00

Eric S. Raymond on the demands for political correctness even within the hacker community:

I’m not going to analyze SJW ideology here except to point out, again, why the hacker culture must consider anyone who holds it an enemy. This is because we must be a cult of meritocracy. We must constantly demand merit – performance, intelligence, dedication, and technical excellence – of ourselves and each other.

Now that the Internet – the hacker culture’s creation! – is everywhere, and civilization is increasingly software-dependent, we have a duty, the duty I wrote about in Holding Up The Sky. The invisible gears have to turn. The shared software infrastructure of civilization has to work, or economies will seize up and people will die. And for large sections of that infrastructure, it’s on us – us! – to keep it working. Because nobody else is going to step up.

We dare not give less than our best. If we fall away from meritocracy – if we allow the SJWs to remake us as they wish, into a hell-pit of competitive grievance-mongering and political favoritism for the designated victim group of the week – we will betray not only what is best in our own traditions but the entire civilization that we serve.

This isn’t about women in tech, or minorities in tech, or gays in tech. The hacker culture’s norm about inclusion is clear: anybody who can pull the freight is welcome, and twitching about things like skin color or shape of genitalia or what thing you like to stick into what thing is beyond wrong into silly. This is about whether we will allow “diversity” issues to be used as wedges to fracture our community, degrade the quality of our work, and draw us away from our duty.

When hackers fail our own standards of meritocracy, as we sometimes do, it’s up to us to fix it from within our own tradition: judge by the work alone, you are what you do, shut up and show us the code. A movement whose favored tools include the rage mob, the dox, and faked incidents of bigotry is not morally competent to judge us or instruct us.

I have been participating in and running open-source projects for a quarter-century. In all that time I never had to know or care whether my fellow contributors were white, black, male, female, straight, gay, or from the planet Mars, only whether their code was good. The SJWs want to make me care; they want to make all of us obsess about this, to the point of having quotas and struggle sessions and what amounts to political officers threatening us if we are insufficiently “diverse”.

[…]

It has been suggested that djangoconcardiff might be a troll emulating an SJW, and we should thus take him less seriously. The problem with this idea is that no SJW disclaimed him – more generally, that “Social Justice” has reached a sort of Poe’s Law singularity at which the behavior of trolls and true believers becomes indistinguishable even to each other, and has the same emergent effects.

November 16, 2015

“Skunk Works” founder Kelly Johnson’s Rules Of Management

Filed under: Business, Military, Technology, USA — Tags: , , — Nicholas @ 02:00

Tyler Rogoway recounts the set of formal and informal rules Kelly Johnson used while running the famous “Skunk Works”:

Clarence “Kelly” Johnson is the Babe Ruth of aerospace design. Aircraft programs under Johnson were so cutting edge and historically influential, and his cult of personality and management strategy so effective, that he and Lockheed’s Skunk Works (which he also founded) are forever enshrined in mankind’s technological hall of fame.

[…]

Kelly’s Rules

1. The Skunk Works manager must be delegated near complete control of his program in all aspects. He should report to a division president or higher.

2. Strong but small project offices must be provided both by the military and industry.

3. The number of people having any connection with the project must be restricted in an almost vicious manner. Use a small number of good people (10% to 25% compared to the so-called normal systems).

4. A very simple drawing and drawing release system with great flexibility for making changes must be provided.

5. There must be a minimum number of reports required, but important work must be recorded thoroughly.

6. There must be a monthly cost review covering not only what has been spent and committed but also projected costs to the conclusion of the program.

7. The contractor must be delegated and must assume more than normal responsibility to get good vendor bids for subcontract on the project. Commercial bid procedures are often better than military ones.

8. The inspection system as currently used by the Skunk Works, which has been approved by both the Air Force and Navy, meets the intent of existing military requirements and should be used on new projects. Push more basic inspection responsibility back to subcontractors and vendors. Don’t duplicate so much inspection.

9. The contractor must be delegated the authority to test his final product in flight. He can and must test it in the initial stages. If he doesn’t, he rapidly loses his competency to design other vehicles.

10. The specifications applying to the hardware, including rationale for each point, must be agreed upon well in advance of contracting.

11. Funding a program must be timely so that the contractor doesn’t have to keep running to the bank to support government projects.

12. There must be mutual trust between the military project organization and the contractor, and there must be very close cooperation and liaison on a day-to-day basis. This cuts down misunderstanding and correspondence to an absolute minimum.

13. Access by outsiders to the project and its personnel must be strictly controlled by appropriate security measures.

14. Because only a few people will be used in engineering and most other areas, ways must be provided to reward good performance by pay not based on the number of personnel supervised.

Kelly also had a unofficial 15th, 16th, and 17th rules, which he is known to have stated repeatedly to his subordinates:

15. Never do business with the Navy!

16. No reports longer than 20 pages or meetings with more than 15 people.

17. If it looks ugly, it will fly the same.

It is amazing to think that one man did so much to advance mankind’s aerospace capability. Even his few dead-ends and failures had key technologies that would lead to wins or lessons learned down the road.

H/T to @NavyLookout for the link.

November 7, 2015

3D printing is coming to all sorts of markets

Filed under: Cancon, Technology, Tools — Tags: — Nicholas @ 02:00

Lee Valley now offers a 3D-printed plumb bob and shows the advantages of using 3D print capabilities:

Lee Valley 3D printed plumb bob

November 4, 2015

The XM-25 “Punisher” isn’t dead yet

Filed under: Military, Technology, USA, Weapons — Tags: , , , — Nicholas @ 04:00

Five years back, there were interesting reports about a prototype weapon that seemed to have an inside edge for getting into the hands of front-line troops in Afghanistan for specific bunker-busting and similar missions. Then it went silent. Recently, Strategy Page says it may be back in the running:

Two years after having its budget sharply cut in 2013 the U.S. Army XM25 grenade launcher is back on track and is now expected to enter service by 2017. It’s been a long road from concept to acceptance and mass production. The army began working on this type of weapon back in the 1990s as the OICW (Objective Individual Combat Weapon) and that mutated into the XM25 (the “X” in XM25 designates a system that is still in development). Since then the similar South Korean K11 and Chinese ZH05 have appeared. The XM25 is the only one of three to have been tested extensively in combat but because of a misfire during a demonstration, budget cuts and some troops finding there were not really that many situations calling for the XM25, the system was thought to be cancelled (development funding was eliminated) in 2013. But the army managed to keep the project on life support. That was mainly because a lot of troops who got to use it in combat liked it a lot and even gave it a nickname; “punisher.”

The initial spectacular success and popularity of the XM25 grenade launchers in Afghanistan led the army to request that the weapon enter regular service as the M25 in 2014. But Congress, looking for ways to reduce military spending in 2013 cut all money for the M25. The army never gave up and managed to scrounge enough cash to build 1,100 of them. Currently the XM25 cost $35,000 each with the 25mm ammo going for $55 per round. Initially SOCOM (Special Operations Command) had some XM25s and some enthusiastic users but in 2013, with few American troops in combat there is not a lot of demand for a weapon like this. The resumption of counter-terrorism efforts in the Middle East and Afghanistan changed that led to more support for reviving the project.

When the first evaluation models of the XM25 arrived in Afghanistan in 2011 the weapon soon became much sought after by infantry troops. There were never more than a few dozen XM25s in Afghanistan and limited supplies of ammunition. Despite that the weapon quickly developed a formidable reputation. The Special Forces had priority on the weapon because it is very useful for special operations missions. The army planned to buy enough so that they could issue one per infantry squad. There are 27 squads in an infantry battalion.

November 2, 2015

The National Air Force Museum of Canada

Filed under: Cancon, History, Military, Technology — Tags: , , , , — Nicholas @ 03:00

Elizabeth and I spent the weekend in the Bay of Quinte area, visiting Prince Edward County, Belleville, and Trenton. While we were in Trenton, we stopped in at the National Air Force Museum of Canada. While the Sea King may not be in the collection yet (at least, not in the collection visible to the public), many other Canadian Armed Forces aircraft are, including the prize of the museum, the Handley Page Halifax heavy bomber:

Handley Page Halifax 1

It’s a big enough aircraft that it’s hard to do it justice in a photograph.

Handley Page Halifax 2

This particular restored aircraft was shot down late in the war on a mission to deliver supplies to Norwegian resistance fighters and later recovered from a Norwegian lake.

Handley Page Halifax 3

Other aircraft in the collection include a replica of the Silver Dart, the first powered aircraft to fly in Canada (February 23, 1909), a replica of the Burgess-Dunne floatplane, the first aircraft purchased for the Canadian military (September, 1914), a CF-86 Sabre, a CF-100 Canuck, a CF-5 Freedom Fighter, a CF-104 Starfighter, a CF-101 Voodoo, a CF-18 Hornet, a CP-107 Argus, a CC-130 Hercules, and a CP-102 Tracker among other aircraft.

October 29, 2015

Free HTTPS certificates coming soon

Filed under: Technology — Tags: , , , — Nicholas @ 02:00

At Ars Technica, Dan Goodin discussed the imminent availability of free HTTPS certificates to all registered domain owners:

lets-encrypt

A nonprofit effort aimed at encrypting the entire Web has reached an important milestone: its HTTPS certificates are now trusted by all major browsers.

The service, which is backed by the Electronic Frontier Foundation, Mozilla, Cisco Systems, and Akamai, is known as Let’s Encrypt. As Ars reported last year, the group will offer free HTTPS certificates to anyone who owns a domain name. Let’s Encrypt promises to provide open source tools that automate processes for both applying for and receiving the credential and configuring a website to use it securely.

HTTPS uses the transport layer security or secure sockets layer protocols to secure websites in two important ways. First, it encrypts communications passing between visitors and the Web server so they can’t be read or modified by anyone who may be monitoring the connection. Second, in the case of bare bones certificates, it cryptographically proves that a server belongs to the same organization or person with control over the domain, rather than an imposter posing as that organization. (Extended validation certificates go a step beyond by authenticating the identity of the organization or individual.)

October 26, 2015

Going price for a working Enigma machine – $365,000

Filed under: Europe, History, Military, Technology, WW2 — Tags: , , — Nicholas @ 03:00

Lester Haines reports on a recent record auction price for an Enigma machine:

A fully-functioning four-rotor M4 Enigma WW2 cipher machine has sold at auction for $365,000.

Enigma machine

The German encryption device, as used by the U-Boat fleet and described as “one of the rarest of all the Enigma machines”, went under the hammer at Bonham’s in New York last night as part of the “Conflicts of the 20th Century” sale.

The M4 was adopted by the German Navy, the Kriegsmarine, in early 1942 following the capture of U-570 in August 1941*. Although the crew of U-570 had destroyed their three-rotor Enigma, the British found aboard written material which compromised the security of the machine.

The traffic to and from the replacement machines was dubbed “Shark” by codebreakers at Bletchley Park. Decryption proved troublesome, due in part to an initial lack of “cribs” (identified or suspected plaintext in an encrypted message) for the new device, but by December 1942, the British were regularly cracking M4 messages.

I recently read David O’Keefe’s One Day in August, which seems to explain the otherwise inexplicable launch of “Operation Jubilee”, the Dieppe raid … in his reading, the raid was actually a cover-up operation while British intelligence operatives tried to snatch one or more of the new Enigma machines (like the one shown above) without tipping off the Germans that that was the actual goal. Joel Ralph reviewed the book when it was released:

One Day in August, by David O’Keefe, takes a completely different approach to the Dieppe landing. With significant new evidence in hand, O’Keefe seeks to reframe the entire raid within the context of the secret naval intelligence war being fought against Nazi Germany.

On February 1, 1942, German U-boats operating in the Atlantic Ocean switched from using a three-rotor Enigma code machine to a new four-rotor machine. Britain’s Naval Intelligence Division, which had broken the three-rotor code and was regularly reading German coded messages, was suddenly left entirely in the dark as to the positions and intentions of enemy submarines. By the summer of 1942, the Battle of the Atlantic had reached a state of crisis and was threatening to cut off Britain from the resources needed to carry on with the war.

O’Keefe spends nearly two hundred pages documenting the secret war against Germany and the growth of the Naval Intelligence Division. What ties this to Dieppe and sparked O’Keefe’s research was the development of a unique naval intelligence commando unit tasked with retrieving vital code-breaking material. As O’Keefe’s research reveals, the origins of this unit were at Dieppe, on an almost suicidal mission to gather intelligence they hoped would crack the four-rotor Enigma machine.

O’Keefe has uncovered new documents and first-hand accounts that provide evidence for the existence of such a mission. But he takes it one step further and argues that these secret commandos were not simply along for the ride at Dieppe. Instead, he claims, the entire Dieppe raid was cover for their important task.

It’s easy to dismiss O’Keefe’s argument as too incredible (Zuehlke does so quickly in his brief conclusion [in his book Operation Jubilee, August 19, 1942]). But O’Keefe would argue that just about everything associated with combined operations defied conventional military logic, from Operation Ruthless, a planned but never executed James Bond-style mission, to the successful raid on the French port of St. Nazaire only months before Dieppe.

Clearly this commando operation was an important part of the Dieppe raid. But, while the circumstantial evidence is robust, there is no single clear document that directly lays out the Dieppe raid as cover for a secret “pinch by design” operation to steal German code books and Enigma material.

October 20, 2015

Soviet bugging technology and the US embassy’s IBM Selectric typewriters

Filed under: History, Technology, USA — Tags: , , , , — Nicholas @ 03:00

John Turner sent me this link on a remarkably adept (and technologically sophisticated) hack the Soviets slipped over the US government at their Moscow embassy:

A National Security Agency memo that recently resurfaced a few years after it was first published contains a detailed analysis of what very possibly was the world’s first keylogger — a 1970s bug that Soviet spies implanted in US diplomats’ IBM Selectric typewriters to monitor classified letters and memos.

The electromechanical implants were nothing short of an engineering marvel. The highly miniaturized series of circuits were stuffed into a metal bar that ran the length of the typewriter, making them invisible to the naked eye. The implant, which could only be seen using X-ray equipment, recorded the precise location of the little ball Selectric typewriters used to imprint a character on paper. With the exception of spaces, tabs, hyphens, and backspaces, the tiny devices had the ability to record every key press and transmit it back to Soviet spies in real time.

The Soviet implants were discovered through the painstaking analysis of more than 10 tons’ worth of equipment seized from US embassies and consulates and shipped back to the US. The implants were ultimately found inside 16 typewriters used from 1976 to 1984 at the US embassy in Moscow and the US consulate in Leningrad. The bugs went undetected for the entire eight-year span and only came to light following a tip from a US ally whose own embassy was the target of a similar eavesdropping operation.

“Despite the ambiguities in knowing what characters were typed, the typewriter attack against the US was a lucrative source of information for the Soviets,” an NSA document, which was declassified several years ago, concluded. “It was difficult to quantify the damage to the US from this exploitation because it went on for such a long time.” The NSA document was published here in 2012. Ars is reporting the document because it doesn’t appear to have been widely covered before and generated a lively conversation Monday on the blog of encryption and security expert Bruce Schneier.

October 18, 2015

Should we build “modern battleships”? The answer is probably “no”

Filed under: Military, Technology, USA — Tags: — Nicholas @ 02:00

The question, raised by Robert Farley at The National Interest is “Is it time to bring back the Battleships?”

Is it time to bring back the battleship?

For decades, naval architects have concentrated on building ships that, by the standards of the World Wars, are remarkably brittle. These ships can deal punishment at much greater ranges than their early 20th century counterparts, but they can’t take a hit. Is it time to reconsider this strategy, and once again build protected ships? This article examines how these trends came about, and what might change in the future.

The label “battleship” emerges from the older “ship of the line” formulation, in the sense that a navy’s largest ships participated in the “line of battle” formation that allowed them to bring their broadsides to bear on an opposing line. After the development of ironclad warships, the “battle ship” diverged from the armored cruiser based on expectations of usage; “battleships” were expected to fight enemy “battleships.” The modern battleship form settled around 1890, with the British Royal Sovereign class. These ships displaced about 15,000 tons, with two heavy guns each in turrets fore and aft, and steel armor. The rest of the navies of the world adopted these basic design parameters, which provided a ship that could both deal out and absorb punishment. The process of ensuring survivability was simplified, in these early battleships, by the predictability of the threat. The most likely vector of attack in the late 1890s came from large naval artillery carried by other ships, and consequently protective schemes could concentrate on that threat.

From the American perspective, even if through some collective congressional brain-fart the US Navy was compelled to build and deploy modern analogues to the classic battleship, what the hell would they be used for? China and Russia are not going to build opposing battleships, and it’s difficult to imagine anyone else on the planet who would have both the economic resources and the strategic desire to go toe-to-toe in Jutland fashion against the USN.

October 17, 2015

Tesla’s latest software update includes self-driving program (almost)

Filed under: Technology, USA — Tags: , , — Nicholas @ 04:00

Tesla does over-the-air updates for their electric cars (which is kinda neat). The latest update includes an almost-but-not-quite self-driving feature:

Tonight, Tesla makes its cars autonomous. Well, semi-autonomous. And it did it with an over-the-air update, effectively making tens of thousands of cars already sold to customers way better.

There are two things to talk about here. There’s the small story about the features and what the upgrade actually looks like and how it works. That’s a good place to start: This is the biggest change to the visual display of the Model S and X ever. There are new instrument panels, app windows are larger and take up more of the 17-inch touchscreen. Drivers will now get more information about what their cars are doing when in Autopilot, they can lock and unlock their car from the status bar. There’s a new clock!

These are simple cosmetic changes. The Big Story is that all of this—and really, who cares about anything beyond autopilot mode?—is being pushed through to customers’ Teslas overnight. The update will begin being pushed out tonight, and will hit every Tesla made and sold in the US in the past year over the course of this week.

Before you get too excited about an autonomous, hands-free present, you need to know that you can’t nap in the back, chauffeured around in beautiful, electric silence.

Even in Autopilot, you keep your hands on the steering wheel. Well… you don’t have to keep your hands on the steering wheel. You can rest them on your knees (resting on knees, palms up, fingertips touching the wheel is advised), or keep one pinky on the wheel. And okay, you can take your hands off altogether for a moment. But after a few seconds, your car will give you a little message, asking you to touch the wheel in some capacity.

October 12, 2015

Is the ballpoint pen the reason we all write so badly now?

Filed under: Books, Technology — Tags: , , , — Nicholas @ 04:00

In The Atlantic, Josh Giesbrecht postulates that our penmanship went south in parallel with the rise of the ballpoint pen:

Recently, Bic launched a campaign to “save handwriting.” Named “Fight for Your Write,” it includes a pledge to “encourage the act of handwriting” in the pledge-taker’s home and community, and emphasizes putting more of the company’s ballpoints into classrooms.

As a teacher, I couldn’t help but wonder how anyone could think there’s a shortage. I find ballpoint pens all over the place: on classroom floors, behind desks. Dozens of castaways collect in cups on every teacher’s desk. They’re so ubiquitous that the word “ballpoint” is rarely used; they’re just “pens.” But despite its popularity, the ballpoint pen is relatively new in the history of handwriting, and its influence on popular handwriting is more complicated than the Bic campaign would imply.

The creation story of the ballpoint pen tends to highlight a few key individuals, most notably the Hungarian journalist László Bíró, who is credited with inventing it. But as with most stories of individual genius, this take obscures a much longer history of iterative engineering and marketing successes. In fact, Bíró wasn’t the first to develop the idea: The ballpoint pen was originally patented in 1888 by an American leather tanner named John Loud, but his idea never went any further. Over the next few decades, dozens of other patents were issued for pens that used a ballpoint tip of some kind, but none of them made it to market.

These early pens failed not in their mechanical design, but in their choice of ink. The ink used in a fountain pen, the ballpoint’s predecessor, is thinner to facilitate better flow through the nib—but put that thinner ink inside a ballpoint pen, and you’ll end up with a leaky mess. Ink is where László Bíró, working with his chemist brother György, made the crucial changes: They experimented with thicker, quick-drying inks, starting with the ink used in newsprint presses. Eventually, they refined both the ink and the ball-tip design to create a pen that didn’t leak badly. (This was an era in which a pen could be a huge hit because it only leaked ink sometimes.)

The Bírós lived in a troubled time, however. The Hungarian author Gyoergy Moldova writes in his book Ballpoint about László’s flight from Europe to Argentina to avoid Nazi persecution. While his business deals in Europe were in disarray, he patented the design in Argentina in 1943 and began production. His big break came later that year, when the British Air Force, in search of a pen that would work at high altitudes, purchased 30,000 of them. Soon, patents were filed and sold to various companies in Europe and North America, and the ballpoint pen began to spread across the world.

October 11, 2015

Take all the negative aspects of social media … and then tie in your political and financial activities

Filed under: China, Government, Media, Technology — Tags: , , , — Nicholas @ 03:00

Welcome to China’s idea of the perfect social media environment. Charles Stross describes the proposal and its likely impact on Chinese life:

So, let’s start by synopsizing the Privacy Online News report. It’s basically a state-run universal credit score, where you’re measured on a scale from 350 to 950. But it’s not just about your financial planning ability; it also reflects your political opinions. On the financial side, if you buy products the government approves of your credit score increases: wastes of time (such as video games) cost you points. China’s main social networks feed data into it and you can lose points big-time by expressing political opinions without prior permission, talking about history (where it diverges from the official version — e.g. the events of 1989 in Tiananmen Square — hey, I just earned myself a negative credit score there!), or saying anything that’s politically embarrassing.

The special social network magic comes into play when you learn that if your friends do this, your score also suffers. You can see what they just did to you: are you angry yet? Social pressure is a pervasive force and it’s going to be exerted on participants whether they like it or not, by friends looking for the goodies that come from having a high citizen score: goodies like instant loans for online shopping, car rentals without needing a deposit, or fast-track access to foreign travel visas. Also, everyone’s credit score is visible online, making it easy to ditch those embarrassingly ranty cocktail-party friends who insist on harshing your government credit karma by not conforming.

The gamification of social conformity, overseen by an authoritarian government and mediated by nudge theory, is a thing of beauty and horror; who needs cops with nightsticks to beat up dissidents when their friends and family will give them a tongue-lashing on behalf of the government for the price of a discount off a new fridge?

But don’t worry, I could make it a whole lot worse.

The first notable point about this system is that it’s an oppressive system that runs at a profit. Consider the instant no-collateral loans for online shopping: the Chinese system only grants these to folks who are a good credit bet. The debt will be repaid. Meanwhile it goes into providing a Keynesian stimulus for the productive side of the economy. And it rewards people for political right-thinking. What’s not to like?

Governments love nudge theory because it offers a cheap shortcut to enforcing social policy, even when the social policy in question is utterly broken. Paying a cop costs money — not just their salary and the cost of their uniform, but the station they work out of, the support personnel who keep the police force operating (janitors, human resources, vehicle maintenance), and the far less tangible political cost of being seen to wield a big stick and force people not to do what they want to do (or to do things that you want them to). Using big data to give folks a credit score, then paying them bright and shiny but essentially cost-free bonuses if they do what you want? That’s priceless. You may not be able to track folks who like to toke up directly (if it’s illegal in your jurisdiction), but you can penalize them for hanging out with known cannabis users and buying paraphernalia. More to the point, you can socially isolate users and get their family to give them grief without the unpalatable excesses (and negative headlines) of no-knock raids and cops kicking down the wrong door and shooting children by mistake. One may ask whether the medical marijuana movement and decriminalization pressure would have got off the ground in the United States if a citizenship scoring system with downvotes for pot users was in place. Or whether emancipatory rights movements could exist at all in a society that indirectly penalizes people for “wrong lifestyle choices” rather than relying on imperfectly applied but very visible and hateful boots and nightsticks.

October 10, 2015

Free design advice for Facebook from the kindly folks at The Register

Filed under: Humour, Media, Technology — Tags: , — Nicholas @ 04:00

Facebook is reportedly rolling out a new button for their users to “dislike” posts they see on their feeds. The helpful souls at The Register offer their free, expert advice on how to go about doing this right:

The Register's Facebook Dislike buttons

  • Like: The classic.
  • Click Bait: For article links that people click on despite themselves and then feel like they’ve let themselves down shortly afterwards. The sort of posts that make you feel society has just got a little worse. Upworthy and BuzzFeed articles will be tagged with this option as a default.
  • Idiot: To confirm that the author of the post is lacking in common sense and/or rational analysis. Most useful for politics and health issues.
  • Umm: A useful passive-aggressive way of letting your friends know that you may want to take this post down or at least edit it heavily before others read it.
  • Fresh Air: A positive, life-affirming choice that says to people: “Maybe it’s time you took a break from your laptop and went out into the real world for a bit.”
  • Privacy: A direct link to the privacy settings for this particular post’s author so you are able to block, unfriend, or report them in one easy tap.
  • Holiday: A “Fresh Air” Superlike. A firm encouragement that perhaps it’s time both you and the author take an extended holiday from Facebook and do something useful with your lives rather than just read others’ mindless thoughts and respond to them with equally mindless comments and emojis.

Police body cameras

Filed under: Law, Liberty, Technology — Tags: , , , — Nicholas @ 03:00

There’s plenty of argument about whether body cams are a pro- or anti-police innovation. Here’s an example of the way body cams can actually help to show when the police are doing everything right, and things still go wrong:

We’ve written a lot here at Ars about how video surveillance has captured cops doing bad things. We cover this area because the technology of body cams, Taser cams, dash cams, and even images taken by bystanders has changed our perspective on police behavior that would likely have been swept under the rug previously.

But this surveillance technology also captures officers who, in the words of a local Cleveland county prosecutor, have acted with “remarkable restraint.” In this instance, body cam footage of several Cleveland patrol officers shows them doing everything they could to convince a man to put down his weapon.

Police came to visit Theodore Johnson’s Cleveland residence after his wife claimed he threatened to kill her. The man had already shot one officer, striking the chest of a patrolman David Muniz’s ballistic vest. “I know you shot me, but I’m not going to shoot you,” Muniz tells the 64-year-old Johnson, according to police body cam footage taken at the scene.

To be honest, I’m quite impressed at the restraint these officers managed to show. If a member of my team had just been shot, I know it’d be very tough for me not to return fire…

« Newer PostsOlder Posts »

Powered by WordPress