Posted by:
admin
15 years, 11 months ago
Yet another sign that China will surpass the US in technological expertise: They will soon be using computers to hand out death penalties.
The software, which was designed by a Beijinghi-tech firm as a way of reigning in corrupt judges, has already helped determine sentences in 1,500 cases over the past two years in a trial run in China's eastern Shandongprovince.
Now the programme is being extended to other provincial courts and may be eventually used in court rooms across the nation of 1.3 billion, where more criminals are put to death than anywhere else in the world. Software designer Qin Ye has been working on the programme since 2003 and, helped by Shandonglegal officials, has loaded it with a huge database of Chinese law and case precedents.
On the plus site, the computer program is often less, shall we say jugdemental than judges, offering placations:
"Look Deng, I can see you're really upset about this. I honestly think you ought to sit down calmly, take a stress pill, and think things over."
I sure hope Ed Felton et all have a peak at this before it is implemented here in the US. I understand that Texas is already taking a look at the code:
10 print "Death" 20 Goto 10I don't spot any backdoors there, but I think there is potential for that, in particular for extremely tight housing markets like New York where apartments typically only become available after death.
Interestingly, computer hacking is punishable by death in China. Hat Tip: To The People, my favorite celebrity gossip, NSFW, libertarian blog.
Share on Twitter Share on FacebookRecent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)