Feeds

US considers audible warnings for cameraphones

'Attention! Possible voyeur taking picture!'

The Power of One Brief: Top reasons to choose HP BladeSystem

Proposed US legislation could, if adopted, force manufacturers to produce cameraphones that issue audible warnings each time you snap anything from friends and family to your neighbour’s bloomers on the washing line.

The Camera Phone Predator Alert Act – put forward earlier this month by New York Republican Peter King - is designed to protect people from “a new brand of criminal” that takes “photographs under children's skirts” and in female changing rooms.

The bill – which has been referred to the House Committee on Energy and Commerce – states that “any mobile phone containing a digital camera... shall sound a tone or other sound audible within a reasonable radius of the phone whenever a photograph is taken”.

It also states that users mustn’t be able to disable the tone. But the law would only apply to cameraphones, so snappers equipped with digital SLRs or compact cameras would still be free to click away under cover.

It’s worth noting that the Camera Phone Predator Alert Act was first introduced way back in September 2007. And, according to a 2008 report on King’s website, a young girl “fighting back against these [cameraphone] predators” came up with the bill’s principal points.

However, it all seems rather daft to us. Imagine snapping a picture of your girlfriend in a park, with every nearby mugger alerted by your iPhone warning: “Attention! Cameraphone activated!” ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.