Reliable Answers - News and Commentary

Technology in the News

Technology is constantly changing and providing the casual user with challenges never dreamed of. Technology in the News is provided in an effort to assist you in getting the most out of your computer, while avoiding some of the pitfalls. Your computer really isn't out to get you. Why not learn to be friends?

 Title   Date   Author   Host

by Robert Johnson

December 17, 2012

A troubling look into drone warfare.

The New Mexico desert gets blistering hot, but inside the small windowless container where Brandon Bryant worked as a drone operator for the U.S. Air Force it stays a cool 63 degrees all year long. Sixty-three finger numbing degrees and Bryant describes sitting with a group of other pilots looking at more than a dozen computer monitors. The crew are directing drones over Afghanistan 6,250 miles away and the screens jump with a two to five second delay, as infrared video sent from the UAVs whips through the air to New Mexico. When the order to fire on a target arrives, Bryant paints the roof of a hut with the laser that will guide in a Hellfire missile fired by the pilot beside him. "These moments are like in slow motion," he says to Abé.

by Kevin Graman

August 10, 2011

A family rights group is planning protests on Friday (August 12, 2011) against the child welfare system at courthouses across the nation, including Spokane.

The protests, planned in 42 states and Washington, D.C., are being organized by an Internet-based movement known as Govabuse and will target family courts, child protective services and foster care systems that it says "separate and financially demolish families," according to the organization's website,

July 15, 2013

A Swedish sociology professor has nominated Edward Snowden for the Nobel Peace Prize.

He says the NSA whistleblower could help "save the prize from the disrepute incurred by the hasty and ill-conceived decision" to give the 2009 award to Barack Obama. In his letter addressed to the Norwegian Nobel Committee, Stefan Svallfors praised Snowden for his "heroic effort at great personal cost." He stated that by revealing the existence and the scale of the US surveillance programs, Snowden showed "individuals can stand up for fundamental rights and freedoms."

June 20, 2012

The media has been pounded in recent days after several blatantly obvious attempts to spin the national narrative were identified and condemned.

Yesterday, for instance, MSNBC's Andrea Mitchell took Mitt Romney wildly out of context to make it seem like he's never been to a particular convenience store when he was really making a comparison between the public and private sectors, and today, a Bloomberg article allegedly left the comment, "(OK?-I'M MAKING THIS UP)" in the text when it was published.


September 29, 2013

The difference between privacy and anonymity, Internet freedom and NSA surveillance, and the future of the web - at RT's Google Hangout, Rick Falkvinge answers the most pressing questions that concern all Internet users in their everyday lives.

When you’re using mail use PGP or GPG, that does not protect the wiretapping who you’re communicating with, so it does not protect you at the source of the press but it does protect the content. It is essentially an envelope. When you’re talking on the phone, it is easy to determine today if your phone has been wiretapped. Did you make a phone call? If the answer is yes then your phone was wiretapped. It is easy to determine if you’re being tracked on the streets in the same way. If you’re carrying this device [smartphone] than you’re being tracked. But there are some ways we can mitigate this. If you’re running Android, than I would suggest moving to text secure, which is an encrypted SMS solution for all your text messaging and red phone which is end to end encrypted phone calls, when you’re making a phone call that needs to be secret. Red phone has end to end encryption, meaning that the phone is encrypted and another phone is decrypted in your phone, so no one can listen in even if they wiretap it midway, they will only see an encrypted conversation. This is in contrast with GSM crypto where it is encrypted to the cell phone tower but then it moves in clear text on telecom wires, so anybody in the telecom network can wiretap your phone call.

June 8, 2013

President Barack Obama ordered national security leaders to compile a list of potential overseas "adversaries" for US cyber-attacks which could be targeted with "little or no warning", a top secret document reveals.

The 18-page, classified document, entitled Presidential Policy Directive 20, outlines plans for Offensive Cyber Effects Operations (OCEO), cyber-attacks which would target US adversaries around the world. "OCEO can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging," the Washington Post cites the document as saying. "The United States government shall identify potential targets of national importance where OCEO can offer favorable balance of effectiveness and risk as compared with other instruments of national power," it continues. The directive also mulls the potential use of cyber actions within the US, though any such operations must be conducted with prior authorization of the White House, unless "it qualifies as an Emergency Cyber Action."

by Rep. Pete Olson

June 29, 2014

What's also troubling is the lack of outrage from the media on behalf of the Americans who were bullied by the IRS.

The First Amendment to the Constitution, in the Bill of Rights, "prohibits the making of any law... abridging the freedom of speech." Every American is protected by this inalienable right that ensures that the government cannot attack its citizens for their beliefs. Yet, one of the most powerful federal agencies, the Internal Revenue Service, did exactly that when they targeted conservative non-profit organizations seeking tax-exempt status. Officials at the IRS have admitted to these actions and Congress has been investigating. Yet, the IRS has refused to provide critical information about the extent of the targeting and who was involved. After promising for a year to deliver emails related to how certain conservative groups were targeted and who was involved in the decision making process, the IRS informed Congress last Friday that they cannot locate many of the emails in question prior to 2011 as the result of a computer crash during that year. Lois Lerner, former head of the IRS division that processes applications to determine tax-exempt status, is currently under investigation by three congressional committees, the Justice Department and the IRS inspector general. Her emails are the ones the IRS claims have both been erased and the data is unrecoverable due to the hard drive in question being recycled.

November 2, 2011

Google Apps administrators have a link available in their Gmail inbox which allows them to easily access their administrator control panel.

July 17, 2013

A 'master key' that could give cyber-thieves open access to almost any Android phone has been discovered by security researchers.

The bug could be exploited to let an attacker do what they want to a phone including stealing data, eavesdropping or using it to send junk messages. The loophole has been present in every version of the Android operating system released since 2009. Google said it currently had no comment to make on BlueBox's discovery. Writing on the BlueBox blog, Jeff Forristal, said the implications of the discovery were "huge". The bug emerges because of the way Android handles cryptographic verification of the programs installed on the phone.

November 24, 2015

Are you one of 17 million Facebook users using the "Most Used Words" wordcloud the Facebook app? If so, you might want to delete the app as soon as possible.

According to Comparitech, a tech comparison and review website, the popular app is a "privacy nightmare." The app reportedly scans all posts in 2015 and is "harvesting a tranche" of personal information. Comparitech said app users must elect to "give up almost every private detail" about themselves to use the app.

[cshelp] - learn and discuss C#

Take me to the top

Reliable does not endorse any Google advertisers, these ads are managed by Google. They are here to pay for hosting expenses. If you notice an inappropriate ad, please contact Shawn with the domain of the offensive advertiser.

Take me to the top

Your Ad Here?

Contact our Marketing department for information about advertising on this domain.

Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Photo Gallery - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit to learn about your preschool options. Dave's Quick Search Deskbar
Reliable AddThis Social Bookmark Button