Wikileaks has turned up a copy of a 2003 standard operating procedure manual for the prison camp at Guantanamo Bay.
Dakwar sees hints of Abu Ghraib in a section instructing guards to use dogs to intimidate prisoners. He also raises concerns over a section on the International Committee of the Red Cross, or ICRC, which indicates that some prisoners were hidden from Red Cross representatives.
The manual shows how the military coded each prisoner according to the level of access the Red Cross would have. The four levels are:
* No Access
* Visual Access -- ICRC can only look at a prisoner's physical condition.
* Restricted Access -- ICRC representatives can only ask short questions about the prisoner's health.
* Unrestricted Access
Where are our petabyte drives? Brian Hayes takes us through the reasons storage is “stuck” in the low terabytes. The tl;dr is that we got such exceptional capacity growth in the late 90s and early 00s we don’t need much more right now, so the focus since then has been on SSDs, networking, interfaces, etc, […]
Amélie Lamont, a former staffer at website-hosting startup Squarespace, writes that she often found herself disregarded and disrespected by her colleagues. One comment in particular, though, set her reeling — and came to exemplify her experiences there.
In this episode of the Flash Forward podcast we travel to a future where humans have decided to eradicate the most dangerous animal on the planet: mosquitos. How would we do it? Is it even possible? And what are the consequences? Flash Forward: RSS | iTunes | Twitter | Facebook | Web | Patreon We […]
Jared Sinclair developed the RSS reader app Unread, which made $10,000 in its first 24 hours on the iOS market. And we’ve all heard the story of Flappy Bird developer Dong Nguyen, whose creation was reportedly earning $50,000 a day at the height of its 2013 explosion. While those are rare examples, they’re also testament to the […]
If you or your company’s IT system are besieged by black hat cyber attacks, an ethical hacker might be all that stands between crippling damage and a company’s long-term prosperity. It’s no wonder that the market for IT security specialists is exploding. Certification is the key – so learn the tenets of ethical hacking and get […]
Your laptop and mobile devices are top of the line…so why are you trotting out that raggedy decades-old suitcase when you go somewhere? Time to up your travel game with a complete 5-piece Herschel Travel Luggage bundle…and we’ll even give it to you for free!Of course, you’ve got to win the Ultimate Herschel Travel Bundle […]