Government On The Lookout

Former General David Petraeus becomes one of the more than 7,969 Google users whose personal data has been usurped by the government for investigative purposes. In the first six months of 2012 alone, Google responded to the government’s request for personal information for over 20,000 private customer accounts. Last week, Google released its bi-annual “Transparency Report”, which documents the number of government requests for private individual information. Google reports that it typically complies with 90% the information requests. That is an increase of 2,681 governmental requests since the last half of 2011.

As the report clearly demonstrates, government surveillance activity is increasing at an alarming rate. This is the sixth Transparency report published by Google that reflects increased surveillance activities every year for the last three years. In addition to emails, information such as Google Drive accounts, IP addresses and other stored data is included in the government requests. Google receives requests for personal data from governments located across the globe. The U.S. is easily the most prolific seeker for personal data of Google users. Interestingly, India comes in at #2 for information requests. Google also entertains request to have certain information removed from platforms such as YouTube, blog posts and other content.

Continue Reading
  Post Hits
Post Hits

Navy Seals Take Heat

Not long after the successful headline-grabbing Bin Laden raid conducted by Team Seal 6, the Obama administration was accused of politically ‘spiking the ball” by leaking top secret information that concerns some of the raid’s sensitive details. These deliberate leaks infuriated the highly secretive hi-tech warriors. They viewed the scuttlebutt as the kind of information that could get them killed. In spite of congressional outrage over the intentionally spilled intelligence, no repercussions have developed over those who may have released the sensitive data.

Recently, the members of that elite group of true American heroes are now under fire for acting as consultants for Electronic Arts, a video game developer that produced the first authentic electronic video game based on the historic Bin Laden raid. The research for the raid’s details was meticulous in the company’s attempt to re-create the actual event that was true to every detail.

Continue Reading
  Post Hits
Post Hits

New Military Aircraft Ideas

For years, the army has spent millions, if not billions of dollars building high-tech flying machines that can skim under radar while launching missiles thousands of miles to countries overseas. What they have failed to do is worry about the budget that they are using, and the money that they spend with every vehicle that comes off of the assembly line. Now, they’ve taken a greener look at some of their surveillance technology and recently unveiled a “Super Blimp”, the LEMV Airship. It isn’t what this ship can’t do when compared to stealth bombers, it’s what it can do that no other aircraft the army has can.

The LEMV Airship, or Long Endurance Multi-Intelligence Vehicle is essentially the Rolls Royce of blimps, and is designed to fly continuously for 21 straight days while providing “unblinking” surveillance of the graound below. The LEMV can barely fit inside Dallas Cowboys Stadium and towers more than seven stories. Built by Northrop Grumman, the blimp is designed to be a hybrid version of what most peo

Continue Reading
  Post Hits
Post Hits

Cyberwarfare - The Future of War

The internet isn’t just about finding resources to do your homework with. It’s also not just about advertising your business and sending out joke emails to your friends and family. The internet is a communication tool. Whether you’re sending out a casual email that says hello, or an email with highly sensitive information about your next business strategy, we use online resources to communicate quickly and efficiently with the people in our world. Sadly, the same holds true for those in a position to declare or break peace with other countries, and possibly other cities. While we may think of war as the act military advances against others, these attacks could also occur online. Cyber warfare isn’t regarded as much of a threat since people don’t think anyone could actually be hurt from it. Remember, everything that we do on a daily basis, from turning on lights to pumping gas, is somehow being tracked and is connected to the world wide web.

Cyber warfare is the act of communicatively attacking another connected resource for the purposes of shutting it down, similar to one country’s military attacking another, to shut them down. You can also use cyber warfare to change or update information, as well as steal classified information from other resources.

Continue Reading
  Post Hits
Post Hits

Spherical Flying Machine

We got our first look at Japan’s Defense Ministry’s spherical flying machine earlier this year, but at a recent technology expo in Tokyo the hovering ball got the full coming-out treatment, complete with public demos eliciting “ooohs” and “aaaahs.” The video below shows the drone doing everything it was designed to do: zipping around omnidirectionally, rolling across the floor, and staying aloft even when it strikes or is struck by an obstacle.

Perhaps most impressive: the thing is built with off-the-shelf parts and costs a ridiculously lean $1,400. For that you get airborne speeds topping out at nearly 40 miles per hour and stability backed up by three on-board gyros that keep the thing aloft even when it runs into objects. Not bad bang for your buck.

Continue Reading
  Post Hits
Post Hits

Popular Blog Posts

Administrator
27 September 2011
Tech Blog
Boeing Dreamliner Delivered to First Customer After three years of costly setbacks and scary failed test flights, the Boeing 787 Dreamliner finally made its debut on Sunday when it was delivered to it...
Administrator
05 May 2012
Marketing Blog
Most people and businesses who have a website have one main goal in mind…to attract new visitors and prospective customers. While the idea of many websites is to drive revenue through e-commerce, all ...
Administrator
08 August 2012
Web Design Blog
Google Wallet was once considered to be the only potential competition for the Paypal system. While that is still the case, Google has recently unveiled several changes in an effort to win the war tha...
Administrator
29 November 2012
Web Design Blog
While RSS feeds have often been the subject of being considered obsolete, the fact is that millions of people use them every day, and they have the potential to drive a lot of traffic to your website....
Administrator
11 December 2013
Web Design Blog
These days, almost everyone is online, and consequently cyber security is of ever-increasing importance. We’ve all heard stories about identity theft, password phishing, credit card fraud, and all sor...
Administrator
05 October 2018
Web Design Blog
HTML Tutorials
This tutorial will go into more details about HTML and iFrame creation. iFrames are a great way to load website and HTML content within a webpage. Follow this tutorial and learn how to properly use iF...
Administrator
24 October 2011
Tech Blog
London-based Bodymetrics and 3D machine vision company PrimeSense have developed a full 3D body scanner that is designed to make finding the perfect pair of jeans a whole lot easier. Its "Body Mapping...

Fields marked with * are required

Contact Final Web Design Today!

Call Today: Call us local at 305-349-3208 or nationally at 888-674-7779.

Email Us: Email us a message at "[email protected]WebDesign.com" or fill out the contact form below and we will respond

Name:*
Email:*
Phone:
Project Details:
Expertise Certification Google Partners Bing Elite Agency BBB Accredited Business INC 500
Wordpress Joomla Drupal Magento Dreameaver