
- •Module II
- •Engineering
- •Lesson 1
- •Engineering - what's it all about?
- •It’s time to have fun!
- •Lesson 2 engineering materials
- •Metals and alloys
- •Lesson 3 mechanisms
- •Mechanisms
- •Scissors
- •Lesson 4 safety at work
- •Safety signs and colour at work
- •Accident investigation
- •Lesson 5 lasers
- •We have the solution! our new 1500 watt cnc-controlled laser cutter is at your disposal
- •We have the solution! our new 1500 watt cnc-controlled laser cutter is at your disposal
- •Lesson 2 bizarre inventions
- •Bizarre inventions
- •Student a
- •Student b
- •Lesson 3
- •Inventors
- •Who invented the X-ray?
- •Patent protection
- •What you can patent
- •Lesson 4 robots - the future is now
- •Lesson 5 practical innovations
- •Cork floors, old pickle barrels
- •Technology
- •Lesson 1
- •Modern technology
- •The advantages and disadvantages of technology
- •Anonymous no more You can’t hide—from anybody
- •It’s time to have fun!
- •Lesson 2 nanotechnology
- •Ibm discoveries add promise for nanotech
- •Nanotechnology unfolds futuristic green cars
- •Lesson 3 alternate fuel
- •Asu professors working on cost effective fuel conversion process
- •Alternative fuel sources
- •Solar powered cars
- •Lesson 4 space
- •Life in space
- •Lesson 5 home movie
- •Home movie viewing gets jumstart with new technologies
- •Communication
- •Lesson 1
- •Mobile television
- •Lessons from south korea’s experiment with mobile tv
- •The advantages of mobile tv
- •Estimates peg digital mobile television to reach two-thirds of us homes by 2012
- •Lesson 2 radio
- •Wireless takes many forms
- •What is a wireless device?
- •Lesson 3 a world of connections
- •A world of connections
- •Lesson 4 mobile phones
- •Building the green mobile phone
- •To do with the price of fish
- •Lesson 5 the means of communication in the past, today and the future
- •Is the tide turning for twitter and facebook? one in four young people is 'bored' with social media
- •The blackberry riots Rioters used BlackBerrys against the police; can police use them against rioters?
- •Technical progress and the environment
- •Lesson 1
- •We and the environment
- •Lesson 2 paying for environmental damage
- •Paying for environmental damage
- •Lesson 3 protecting the environment
- •China plan to protect environment
- •Lesson 4 green technology
- •Green day
- •Lesson 5 technological disasters
- •Hungary threatened by 'ecological catastrophe' as toxic sludge escapes factory
- •Japan's nuclear catastrophe
- •Additional lessons
- •Appendix 1 making a presentation
- •Introduction
- •Conclusion
- •Questions
- •Appendix 2 writing a summary
- •Useful phrases
The blackberry riots Rioters used BlackBerrys against the police; can police use them against rioters?
AS BRITONS ask themselves what has changed in their country that might have caused these riots, one obvious answer stands out: technology. The digital revolution allows people to organise against the authorities—not just in the Middle East, but also in Britain.
The communications tool of choice for rioters has been the BlackBerry. It has 37% of the teenage mobile market. Young people like its BlackBerry Messenger (BBM) feature, which allows users to send free messages to individuals, or to all their contacts at once. It was used to summon mobs to particular venues. David Lammy, the MP for Tottenham, has called for BBM to be suspended.
The rioters use BBM against the police. But can the police use it against the rioters? Research in Motion (RIM), the firm behind the BlackBerry, and the mobile operators hold at least one, and probably two, sorts of useful information. The first is traffic data: who messaged whom, when and from where. Used in conjunction with CCTV pictures, that could well help police put names to faces—though if many of the rioters were using pay-as-you-go phones, it will prove less useful, as it is harder to track their owners down.
Security experts say it is pretty clear that the law empowers police to demand that phone companies hand over traffic information. The Data Protection Act, which normally prevents companies from sharing such information, has a get-out clause for cases where it is clear that a crime has been committed. The legal position is less clear when it comes to the actual content of messages.
BlackBerry messages are widely thought to be tightly encrypted. But that is the case only for BlackBerrys tied to corporate networks. The security on BlackBerrys sold to individuals is no tighter than for normal phones, according to Richard Clayton of the University of Cambridge; and copies of the messages sent on them should still exist.
Handing content over could, however, cause problems for RIM and the phone companies. Revealing such information to the police could be bad for business; they might be sued for breach of confidentiality. The police could issue warrants, but it is not clear whether they have the power to intercept phone messages en masse.
But the biggest problem, says Ross Anderson, also of Cambridge university, is that police computer forensics departments are chronically under-resourced. “All they can do is kiddie porn, terrorism and murder. They don’t even bother with bank fraud,” he says. “There’ll be petabytes of traffic data and CCTV data. They won’t be able to cope. If you want the surveillance society to become a reality, you’re going to have to increase budgets by an order of magnitude.”
Task 2a. Make up questions to the text beginning with the following words. Ask your partner to answer them.
What Where Why When Who
Task 3a. Summarize the article.
UNIT 6