Japan aims to build Moon base by 2030
Japan's space agency has provoked surprise among other space experts by re-affirming its ambition to build a habitable base on the Moon within decades. At a lunar exploration symposium in Tokyo this week, head of the country's lunar and planetary exploration programme Junichiro Kawaguchi announced a deadline of 2020 for sending astronauts to the Moon, and 2030 for constructing the base.
The dates and details presented by Kawaguchi build upon the country's 20-year vision for space exploration, released in the spring of 2005, which began to consider far-flung ideas such as a Moon base.
A unilateral move by any country to colonize the Moon doesn't make sense, comments Louis Friedman of the Planetary Society in Pasadena, California. "I don't think you'll see separate countries each with bases on the Moon - there's not that much to do there," he says.
Hackers Clone E-Passports
A German computer security consultant has shown that he can clone the electronic passports that the United States and other countries are beginning to distribute this year.
The controversial e-passports contain radio frequency ID, or RFID, chips that the U.S. State Department and others say will help thwart document forgery. But Lukas Grunwald, a security consultant with DN-Systems in Germany and an RFID expert, says the data in the chips is easy to copy.
"The whole passport design is totally brain damaged," Grunwald says. "From my point of view all of these RFID passports are a huge waste of money. They're not increasing security at all."
In addition to the danger of counterfeiting, Grunwald says that the ability to tamper with e-passports opens up the possibility that someone could write corrupt data to the passport RFID tag that would crash an unprepared inspection system, or even introduce malicious code into the backend border-screening computers.
Kevin Mahaffey and John Hering of Flexilis released a video Wednesday demonstrating that a privacy feature slated for the new passports may not work as designed.
Using a mockup e-passport modeled on the U.S. design, they showed how an attacker could connect a hidden, improvised bomb to a reader such that it triggers an explosion when a passport-holder comes within range.
Children arrested for playing in a tree
To the 12-year-old friends planning to build themselves a den, the cherry tree seemed an inviting source of material.
But the afternoon adventure turned into a frightening ordeal for Sam Cannon, Amy Higgins and Katy Smith after they climbed into the 20ft tree - then found themselves hauled into a police station and locked in cells for up to two hours.
Officers considered charging the children with criminal damage but eventually decided a reprimand - the equivalent of a caution for juveniles - was sufficient.
The parents of the children, who all live in Halesowen, West Midlands, say they are angry with police for treating their children as hardened criminals and accused officers of over-reacting.
'To detain them, DNA them and treat them that way was simply cruel and an over-reaction by the police. Generations of children have played in that tree and my son and his friends won't be the first to have thought of building a tree den.'
'West Midlands Police deals robustly with anti-social behaviour. By targeting what may seem relatively low-level crime we aim to prevent it developing into more serious matters.'
Study confirms young people dig new technology
A trend may be afoot to bring social networking to the older set, but according to a new study from Forrester, it's actually -- get this -- young people who are more inclined to use social networking sites, IM and SMS. Think that seems obvious? It gets better. Among baby boomers, younger ones use new technologies more than their older counterparts. It seems these analyst firms just can't resist putting out painfully obvious studies relating to internet use. It's not clear exactly what purpose a study like this serves other than to grab a few headlines and confirm the old saw that if you want to learn how a new device works, you better find a kid. Of course, if you do find this useful, a fuller explanation of these insights are available for a mere $995.00.
Worst ever security flaw found in Diebold TS
"This may be the worst security flaw we have seen in touch screen voting machines," says Open Voting Foundation president, Alan Dechert. Upon examining the inner workings of one of the most popular paperless touch screen voting machines used in public elections in the United States, it has been determined that with the flip of a single switch inside, the machine can behave in a completely different manner compared to the tested and certified version.
"Diebold has made the testing and certification process practically irrelevant," according to Dechert. "If you have access to these machines and you want to rig an election, anything is possible with the Diebold TS -- and it could be done without leaving a trace. All you need is a screwdriver." This model does not produce a voter verified paper trail so there is no way to check if the voter’s choices are accurately reflected in the tabulation.
"These findings underscore the need for open testing and certification. There is no way such a security vulnerability should be allowed. These systems should be recalled"
Microsoft demos Vista speech
Quite what's left of the promised features in Vista, is hard to list. But speech recognition is one of the components that's expected to launch with the product in January. Probably.
Unfortunately not all has gone well with recent press preview's of the new recognition technology, with Vista being unable to cope with the majority of the speech and commands by a Microsoft PR man. Check out this video for another laugh at the expense of Microsoft.
Microsoft was allegedly unhappy with the video's airing, citing background ambient noise, which the reporter's expensive sensitive camera mics didn't seem to pick up.
RIAA/MPAA adopt new stealth tactic
I had the misfortune of seeing the new Miami Vice movie Thursday night, but the experience wasn't all wasted, I stumbled upon the newest stealth rights removal reeducation campaign from the people that brought you DRM. Yes, the MPAA, RIAA or BSA, I am not sure which are behind this new tact, stealth infection of modern culture.
To use the Disco Steve method of rating movies, a scale from 1 to infinity of how many miles he would walk to avoid the movie, I would give this an 8. It was a B grade drug movie with only the most tenuous ties to the original TV show.
There was a scene in Miami Vice where they were discussing the big bad drug dealers, and how international they were. The good guys listed all the thing the bad guys were capable of bringing into the US, Cocaine, Heroin, etc etc. They listed it as coke from Coumbia, heroin from Afganistan, X from Y and A from B. Pretty normal stuff. At the end, they added 'pirated software from China'.
RIAA Will Drop Cases
For years, the RIAA has claimed that having the IP address of a computer that has shared unauthorized files is the equivalent of having the evidence of who was actually sharing files. That, of course, is false. The IP address simply can help you know who paid for the internet access, but not who was using what computer on a network. In fact, this even had some people suggesting that, if you want to win a lawsuit from the RIAA, you're best off opening up your WiFi network to neighbors. It seems like this strategy might actually be working. Earlier this month the inability to prove who actually did the file sharing caused the RIAA to drop a case in Oklahoma and now it looks like the same defense has worked in a California case as well. In both cases, though, as soon as the RIAA realized the person was using this defense, they dropped the case, rather than lose it and set a precedent showing they really don't have the unequivocal evidence they claim they do. The RIAA certainly has the legal right to go after people, even if it simply ends up pissing off their best fans and driving people to spend their money on other forms of entertainment -- but, if they want to do so, they should at least have legitimate evidence. It's good to see that some are finally pointing out how flimsy the evidence really is.
Can border agents search your laptop? Yes.
Stuart Romm boarded a plane in Las Vegas on February 1, 2004. When he got off the plane in British Columbia, Canada's Border Services Agency stopped Romm for questioning. After learning that Romm had a criminal background, Agent Keith Brown searched his laptop and discovered child porn sites in Romm's Internet history list. Canada then bundled Romm back onto a plane to Seattle, where US Customs agents had a chance to question him further.
An appeal of the case went to the Ninth Circuit in San Francisco, which was charged with deciding an important issue: can border patrol agents search laptops without a warrant and without probable cause? The court's ruling was handed down on Monday, and said that yes, agents can search laptops for any reason.
The court argued that the forensic analysis fell under the "border search exception to the warrant requirement." This exception was established by United States v. Montoya de Hernandez in 1985, and says that "the government may conduct routine searches of persons entering the United States without probable cause, reasonable suspicion, or a warrant." The court goes on to note that international airports count as border terminals, even if not physically located on a US border.
Deja vu 'recreated in laboratory'
Scientists believe they have found a way to probe the mysterious phenomenon of feeling you have witnessed something before - deja vu.
Leeds Memory Group researchers say they have gone some way to recreating the sensation in the lab using hypnosis.
Two key processes are thought to occur when someone recognises a familiar object or scene.
First, the brain searches through memory traces to see if the contents of that scene have been observed before.
If they have, a separate part of the brain then identifies the scene or object as being familiar.
In deja vu, this second process may occur by mistake, so that a feeling of familiarity is triggered by a novel object or scene.