We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
timothy from the for-a-nice-toasty-fire dept.
Dupple writes "When a cellphone is reported stolen in New York, the Police Department routinely subpoenas the phone's call records, from the day of the theft onward. The logic is simple: If a thief uses the phone, a list of incoming and outgoing calls could lead to the suspect. But in the process, the Police Department has quietly amassed a trove of telephone logs, all obtained without a court order, that could conceivably be used for any investigative purpose. The call records from the stolen cellphones are integrated into a database known as the Enterprise Case Management System, according to Police Department documents from the detective bureau. Each phone number is hyperlinked, enabling detectives to cross-reference it against phone numbers in other files."
At the source of every error which is blamed on the computer you will find
at least two human errors, including the error of blaming it on the computer.