#The Senate Advances NSA Surveillance Reform Legislation As Deadline Approaches The Senate voted 77-to-17 to take up the USA Freedom Act,
a bill already passed in the House that would reform National security agency (NSA), in a rare Sunday session.
It was one of the first programs reported by The Guardian after former government contractor Edward Snowden leaked secret documents about American surveillance processes.
the surveillance reform bill did receive the support of many tech companies. President Barack Obama has committed also to signing the bill into law.
Passage of the bill would mark the first time lawmakers have reined in the surveillance powers of the intelligence community in the two years since Snowden first revealed the controversial intelligence gathering programs.
so that the surveillance programs would not expire. Mcconnell also attempted to temporarily extend two lesser known Patriot act provisions expiring tomorrow that involve roving wiretaps and tracking one wolfterrorist suspects.
The Freedom Act does not go far enough in curtailing American surveillance practices. It only addresses the bulk collection of American phone records
The bill does not address the surveillance of non-Americans or the communications of U s. citizens with people outside the country under FISA Section 702 or Executive Order 12333.
But today vote remains a victory for the advocates that have been fighting for two years to limit the scope of the NSA surveillance.
It hard to plan for emergencies, which is why we have 911 phone services handy. The system was developed by AT&T in the late 1960s to centralize access to public safety services such as fire, police,
Thus, if you have a medical emergency and press the button, it will automatically send potential allergies
reducing confusion in an emergency. Today, such alerts are broadcasted often without regard to a user location,
which can greatly increase the risk of misunderstanding police instructions. Finally, the company also has a product for emergency call centers called Next Generation 911,
Michael Martin, a cofounder and CEO of the startup, said that many of the founding members of the team came together because of their own personal experiences with emergencies. eople have rallied around to change
Longer term, Martin expects that the company data around emergencies will allow it to offer a predictive analytics platform that might be of interest to Wall street investment funds and insurance companies.
Emergencies are one of the few times when every piece of technology really just has to work.
This clarification she says significantly reduces the risks of these opportunities for medical technology companies.
Risk analysis is key and careful system design will ensure that safety critical functions are implemented appropriately.
Next is designing the high-level system architecture to minimize patient risk and ensure that it is usable.
##As an example of how to manage the risks of including apps in connected systems Tighe cites the Verihaler which Sagentia has developed to monitor patient adherence to treatment for asthma or chronic obstructive pulmonary disease (COPD.
Examples include pay-peruse analytics risk-sharing reimbursement and patient self-payment. She recommends defining the MMA s targeted value proposition and business model up front.#
This clarification she says significantly reduces the risks of these opportunities for medical technology companies.
Risk analysis is key and careful system design will ensure that safety critical functions are implemented appropriately.
Next is designing the high-level system architecture to minimize patient risk and ensure that it is usable.
##As an example of how to manage the risks of including apps in connected systems Tighe cites the Verihaler which Sagentia has developed to monitor patient adherence to treatment for asthma or chronic obstructive pulmonary disease (COPD.
Examples include pay-peruse analytics risk-sharing reimbursement and patient self-payment. She recommends defining the MMA s targeted value proposition and business model up front.#
The day after the Super bowl we had reports to Godaddy Intuit the NFL by 8 A m. Analytics can also help protect advertisers from fraud risks without forcing them to build their own investigative efforts.
and security workers document events in the field. ash-cams really set precedent, Schaff says. hen it comes down to it,
and aims to staunch the kinds of security breaches that have occurred at major retailers like Target Neiman Marcus
As science links these variants to disease risk, the idea has been that genotypes could predict your chance of getting cancer or heart disease
But predicting risk is tricky. Most genes don say anything decisive about you. And if they do,
when you find out. don believe that this kind of risk assessment is mature enough to be a consumer product yet,
or lower, their risk for drug reactions, common diseases, or personality traits such as a lack of empathy.
Promethease makes little effort to combine the genetic risks for any one disease into a single comprehensible number.
He says 23andme stepped on shaky scientific ground by trying to merge risks into one neat score. veryone wants to sell a simple answer:
ere is your risk. But we don know how these things interact, he says. At the same time, he believes the uncertain value of DNA information is not a reason to keep it away from lay people. t not reasonable to think there some specific dateay 18,
For now, consumers have to fend for themselves in a thicket of scientific informationnd make their own decisions about risks.
It told her that her versions of 11 genes carried some increased risk of breast cancer
if I had a high risk or genetic predisposition toward heart disease, diabetes, or Alzheimer. I don,
#Sharing Flood Mitigation Strategies with At-Risk Countries After a 1953 North sea storm surge killed nearly 2000 people in The netherlands the country s government built massive new protective seawalls along the coast.
Initially it will offer technologies for assessing an area s vulnerability over time. The land area of The netherlands includes a vast river delta formed by the Rhine and two other rivers.
making plans to allow some areas such as low-lying farms to flood in an emergency; constructing buildings that can float
The DELTAS project initially aims to deliver tools for assessing vulnerability over time for people in the Ganges-Brahmaputra-Meghna delta
along with a onetime security code for that particular transaction, and approves the salell in less than 10 seconds.
Apple focus on security is timely, too. In recent months, card data breaches At home Depot, Target,
& Research cited security concerns as a key reason theye holding back on mobile payments. Although credit cards are used in Apple Pay
so even if hackers intercept the numbers, they can do anything with them. Though Google Wallet and others have used tokens,
Improved security is even more important to banks and retailers than it is to consumers, who have limited liability for fraudulent charges on stolen cards.
Better security seems to have made up for any reservations that banks may have about Apple role as a powerful new middleman on transactions
In Cracking the Brain s Codes from our July/August issue researchers Christof Koch and Gary Marcus foreshadowed today s Nobel awards:
and security with biometric data says Mark Thomas the executive director of Vaxtrac a nonprofit that worked with the Benin trials.
Intellectual property privacy security##those are some of the friction points in terms of growth. For existing business models the immediate challenges include preparing for the new workforce and identifying exactly
The catch is that contact must be made as data is unlocked with a keyuring decryption of a folder or an e-mail message, for instance.
Tromer says his research team has used all those methods to extract encryption keys based on widely used, high-security standards, 096-bit RSA keys and 3, 072-bit Elgamal keys.
But even Gorilla Glass is vulnerable to scratching and cracking, and replacing the glass is expensive.
as well as James Collins, an expert in genetic engineering at Arizona State university, ene drives present environmental and security challenges.
the scientists who authored the editorial say society needs to develop ntegrated risk managementincluding genetic antidotes that could reverse the effect,
This lead time enables public discussion of environmental and security concerns, research into areas of uncertainty,
It allows adaptation of regulations and conventions in light of emerging information on benefits, risks,
and has favored features by IT managers such as encrypted connections and fine-grained access controls. No doubt the folks at Dropbox took notice;
#Cyber attacks In the real world, you only have to worry about the criminals in your city.
hacktivists, and governments who can invest big money to craft attacks that deliver massive payoffs.
What are the biggest threats? Bitcoins Bitcoins only have value when the transactions are confirmed by at least six members of the peer-to-peer network.
for example, may be mining Bitcoins worth tens of thousands of dollars a day for a Russian cybercrime gang.
Cyber-spies Companies and governments spend money on espionage. Cyber-spies use rojansand ack doorsto access data on their targetscomputer networks,
Exploits Cyber attacks rely on exploitation of ulnerabilitiesbugs in the source code of commonly used software to infect target computers.
When professional criminals and governments got into the cyber attack game demand for new xploitsgreatly increased,
As the U s. has engaged in offensive cyber attacks on other countries, other countries have followed suit, creating a cyber arms race that will continue to increase demand for exploits.
Government surveillance The two most important inventions of our time, the Internet and the mobile phone, changed the world
but they also have turned out to be perfect tools for the surveillance state. And in a surveillance state
everybody is assumed guilty. PRISM, one of the governmental surveillance programs unveiled by Edward Snowden, monitors people known to be innocent and builds dossiers on everyone based on their Internet activity.
Because the U s. is home to the most ubiquitous Internet services, search engines, webmail sites, browsers,
However, the same advancements in computing power and data storage that have made wholesale surveillance possible have made also leaking possible.
where she directs the Cylab Usable Privacy and Security Laboratory. Facebook ran an experiment on 689,003 users to see
and that a statement of the procedures includes a escription of any reasonably foreseeable risks or discomforts to the subject.
#Aereo Ruling Means Uncertainty for Cloud Streaming Services In the U s. Supreme court smackdown of Internet TV upstart Aereo today, some legal watchers see a threat to other cloud storage and content-streaming models,
or provide a means of access control, he said. Given the boom in fitness monitors and other wearable gadgets tethered wirelessly to smartphones,
Besides, Solar City may need to take the risk of investing in a large new manufacturing plant in New york. Existing subsidies that have helped the company grow quickly in recent years may soon disappear.
#A Simple Plan to Impede the NSA Is Taking hold A year after revelations first emerged from former National security agency contractor Edward Snowden about mass Internet surveillance,
more e-mail providers are adopting encryption, a simple change that could make it harder for spy agencies to vacuum up huge numbers of communications in transit.
when delivered, meaning the recipient provider also supports the encryption needed to establish a secure connection for transmission of the message.
Establishing a secure communication channel requires both e-mail providers to exchange encryption keys beforehand. Even if an e-mail provider tries to encrypt messages by default,
messages will be sent in the clear to providers that do not support encryption.)Gmail has more than 425 million accounts worldwide
and was an early adopter of e-mail encryption. Only 50 percent of incoming messages are encrypted,
And the numbers could get even better as more providers offer encryption by default to their customers.
and plans to radually ramp up encryption with Gmail in the coming weeks. There are still significant gaps:
many Silicon valley giants are advertising increased use of encryption. Last month, Facebook reported that about 58 percent of the notification e-mails it sent out were encrypted from its systems to recipientse-mail providers i
But it would also introduce new risks. Once trains of trucks get too long, it much harder for drivers of other cars to change lanes. would not advocate running very long sequences of these trucks close together,
which risks disrupting another gene, potentially causing cells to turn cancerous. Second, some diseases, such as Huntington
because the risk of death from infectious disease is extremely likely). Children with this genetic condition have been treated with the additive gene therapy method in the past,
which means they are at high risk for stroke heart failure and kidney failure he says. Implanted electrical devices that control bodily functions have been used for many years.
Where his predecessor Steve Ballmer clutched the fading Windows operating system like a frayed security blankethe ios version of Office appeared four years after the iphone debutadella has acknowledged the company need to move on,
Apps built to exploit such device-to-device schemes can offer security and privacy benefits over those that rely on the Internet.
Recent revelations about large-scale surveillance of online services and the constant litany of data breaches make this a good time for apps that don t rely on central servers he says.
As users become more mindful of the security and privacy implications of technologies they rely on moving in the direction of local ad hoc networking makes a lot of sense.
However peer-to-peer and mesh networking apps also come with their own risks since an eavesdropper could gain access to local traffic just by using a device within range.
director of product strategy and infotainment for GM vehicles. hey go through rigorous safety and security standards,
Documents leaked last June by former U s. intelligence contractor Edward Snowden revealed a global surveillance operation coördinated by the U s. National security agency and its counterpart in Britain
There is a risk that the Internet could fracture into smaller national networks, protected by security barriers.
In this view, Brazil new cable is akin to China Great Firewall (that country system for censoring Web results
So pervasive and successful has digital espionage become that in 2012, Keith Alexander, the Army general in charge of the NSA, described it as he greatest transfer of wealth in history.
Security experts have been warning for some time that computer networks are not secure from intruders. But in 2013
A half dozen boutique R&d houses, like Italy Hacking Team, develop computer vulnerabilities and openly market them to government attackers.
That is a threat mainstream technology companies are grappling with. The U s. government circumvented Google security measures and secretly collected customer data.
British spies scooped up millions of webcam images from Yahoo. In December, on Microsoft official blog, the company top lawyer, Brad Smith, said he had reason to view surreptitious overnment snoopingas no different from criminal malware.
Microsoft, along with Google and Yahoo, has responded by greatly widening its use of encryption. ee living in a very interesting time,
where companies are becoming unwilling pawns in cyberwarfare, says Menny Barzilay, a former Israeli intelligence officer now working in IT SECURITY for the Bank hapoalim Group,
because the U s. government has claimed long that Huawei gear is a Trojan horse for China intelligence services.
Thanks to its privacy laws and discreet culture, the country is emerging as a hub for advanced security technology.
chief research officer of the Finnish security company F-Secure. efore, the idea was that the Web had no borders, no countries.
particularly in cases where the patient is at risk of dying, "said Kedzierska. The research was published in the Nature Communications journal l
The system also provides far-reaching implications for new security and graphics applications. The idea is simple:
Chinese researchers have developed successfully the first automated teller machine (ATM) with facial recognition technology to reduce the risk of theft,
a Hangzhou firm in eastern China's Zhejiang province that provides security protection for financial transactions.
The new ATMS are expected to connect with the country's banks and public security networks, which allows only guarantees that only cardholders to withdraw money,
Chinese researchers have developed successfully the first automated teller machine (ATM) with facial recognition technology to reduce the risk of theft,
a Hangzhou firm in eastern China's Zhejiang province that provides security protection for financial transactions.
The new ATMS are expected to connect with the country's banks and public security networks, which allows only guarantees that only cardholders to withdraw money,
#Tata doctors find way to cut oral cancer risk Tata Memorial Hospital, the cancer hub in Parel, announced a breakthrough on Tuesday that could
not only reduce the risk of death for oral cancer patients by 36 %but also prevent recurrence of the disease by 55%.
they may be at the risk of not diagnosing the cancer's complete spread early enough.
#Tata docs find way to cut oral cancer risk Tata Memorial Hospital, the cancer hub in Parel, announced a breakthrough on Tuesday that could
not only reduce the risk of death for oral cancer patients by 36 %but also prevent recurrence of the disease by 55%.
they may be at the risk of not diagnosing the cancer's complete spread early enough.
"The only risk is that the nerves don't reconnect properly and the feelings fail to return,
"The only risk is that the nerves don't reconnect properly and the feelings fail to return,
which poses more of a risk, Hu said. For decades, researchers around the world have tried to grow muscle stem cells independent of a human carrier
extensive clinical trials would be needed to reduce the risk of side effects on humans, such as mutations that could lead to tumours.
and viruses that could pose a threat to humans. Until recently, the idea of culling through mosquitoes to try to find diseases that are known both
which of these viruses could present a threat to humans or animals that humans rely on.
Pipas expects that it will be very difficult to figure out which of the viruses they identify in mosquitoes are a threat
and viruses that could pose a threat to humans. Until recently, the idea of culling through mosquitoes to try to find diseases that are known both
which of these viruses could present a threat to humans or animals that humans rely on.
Pipas expects that it will be very difficult to figure out which of the viruses they identify in mosquitoes are a threat
Chemically analysing breath specimens from patients in intensive care can reveal bacterial infection in the lower respiratory tract of ventilated patients at risk of developing pneumonia.
while posing a greater threat to public health. The study is the first to demonstrate how leptospira mutates to form a biofilm, an extra protective layer of microbial cells,
since it was becoming clear that making people wait involved unethical and unnecessary risk. The trial is now being continued
With dynamic thermal guard feature, Samsung T1 will automatically turn off during extreme temperatures. Samsung offers three year warranty for the SSD.
The Dft statement has revealed that driverless vehicle testing has been approved by the government on the condition that there should be a driver present in the vehicles to take control of the vehicles in case of an emergency.
and veins-the surgery would have called for a removal of the entire kidney in most cases to avoid the risk of causing further damage to a patient.
and will often case security alarms to beep. Fortunately this 3d printed biological Redura doesn suffer from these problems,
of which are at high risk for virus-related epidemics. And, given the incredibly high success rates of the clinical trials so far, it can only be hoped that this lifesaving device is put to good use as soon as humanly possible. a
what if a terrorist hijack a plane using this 4d printing since objects can be changed into any shape.
The project goal is to develop new tools to elucidate the mechanism of action of a threat agent, drug, biologic or chemical on living cells within 30 days from exposure.
and support the development of effective threat mitigations and countermeasures. REDICHIP is formatted as a disposable, single use
The software uses a machine-learning algorithm the sort computers connected to security cameras might use for automated facial recognition.
but using them routinely raises the risk of deadly multidrug-resistant bacteria emerging. The new QPIU technology promises to deliver better point-of-care diagnostics by reducing the time it takes to specifically identify bacteria
the new method may be useful in the food industry or for homeland security applications. In principle, the approach could be scaled up to screen for contaminated food or suspicious packages i
including nanoscale visual arts, security marking and information storage. The researchersprinting surface consists of a sandwich-like structure made up of two thin films of silver separated by a pacerfilm of silica.
and relevant applications such as security marking and information storage. ther co-authors of the Scientific Reports paper are Dr. Fei Cheng,
in order to avoid risks and painful treatments in people with secondary blindness due to chronic degenerative blindness such as diabetic retinopathy and degeneration of the eye.
but without the inherent risks of this procedure, such as infection or retinal detachment. Current talks are being held with COFEPRIS to conduct a study within several diseases and increase its use for different conditions.
and other threats,"says Dr. Aly Fathy, Professor, Department of Electrical and Computer engineering at UT Knoxville."
the nanoparticles can form the basis for developing pesticide products that reduce risk, have minimal environmental impact,
Dr. K. Fukuda, WHO's (World health organization) Assistant Director-General for Health Security stated that "Unless we take significant actions to improve efforts to prevent infections. the implications will be devastating."
minimizing the risks of leaving toxic secondary products to persist in, say, a body of water. nce they switch to this macro situation where theye big clumps,
It is an example of environmental intelligence technology Exelis is focused on for growth in the area of intelligence, surveillance, reconnaissance and analytics.
and commercial applications, including mobile phones, notebooks, tablets and webcams, digital still and video cameras, security and surveillance, entertainment devices, automotive and medical imaging systems.
Youngbull envisions use of the device in homeland security, mass transit, public spaces, hospitals, schools, food production and combat theater analytics.
banknotes are equipped with special security features. These include tiny structures that are not visible to the naked eye, such as holograms with a tilt effect.
The AIT Austrian Institute of technology is a leader in the international market in the production of such test systems for security printing.
and developing innovative risk analytics tools are critical to mitigate these growing costs, and the key is more high-quality weather data."
Banner Engineering. his allows facility managers to reduce labor costs by eliminating manual checks and the risk of human error."
whether it is necessary to take action against potential threats. Here, image quality makes an important difference a blurry image may show someone holding a long object
have reduced a quality of life and face a higher risk of death. Source: http://www. sw. org
"This research team have removed the risk of human error by emulating the natural insulin generators of the body beta cells.
Regular insulin injections can cause blood glucose levels to plummet dangerously low the patch has been found not to pose this risk.
#Smart Mouth Guard with Sensors Detects Teeth Grinding The next big thing in wearable technology may show up right inside your mouth.
What more, the next version of the guard, currently under development, may be able to tell when an athlete is becoming dehydrated
Wong said. he advantage is that the guard extends the treatment beyond the time spent in the clinic,
Yoon said one population that could stand to benefit from the smart mouth guard is combat veterans with posttraumatic stress,
But the smart mouth guard potential extends beyond dentistry. The next iteration could be aimed at athletes.
The device could help address the weaknesses reported earlier this month in America airport security, where mock weapons and explosives were smuggled through airports,
FLIR advanced thermal imaging and threat detection systems are used for a wide variety of imaging, thermography,
and security applications, including airborne and ground-based surveillance, condition monitoring, research and development, manufacturing process control, search and rescue, drug interdiction, navigation, transportation safety, border
and maritime patrol, environmental monitoring, and chemical, biological, radiological, nuclear, and explosives (CBRNE) detection. For more information, go to FLIR web site at www. FLIR. com o
posing a potentially higher risk to the heart and other internal organs. Finer-grained particles are also harder to block with the simple surgical masks that many people in Asian cities have worn traditionally as protection against air pollution.
is that the general public does not yet view haze as a serious health threat. eople view it as,
The Counter-Terrorism and Security Act places a legal duty on schools to"prevent people from being drawn into terrorism".
"Head teachers'leader Russell Hobby said schools should see the regulations in terms of"safeguarding"and not"surveillance"."
""Recent events have shown the risks of young people being targeted by radical groups should not be underestimated,
""being drawn into terrorism includes not just violent extremism but also nonviolent extremism, which can create an atmosphere conducive to terrorism
and can popularise views which terrorists exploit, "says the government guidance for schools. Teachers will have to assess the risk of pupils being drawn into extremist ideologies.
There will be training for staff to identify children at risk and"to challenge extremist ideas"."Schools will have to ensure that pupils do not access extremist material online.
Mr Hobby, leader of the National Association of Head teachers, said schools should"see their duties on radicalisation as another safeguarding duty"."
""Schools are used to keeping their students safe from harm and this is a version of that.
This means looking out for students rather than conducting surveillance on them.""It means understanding the risk and acting proportionately.
And it does mean reporting serious concerns so that any danger can be prevented before it materialises."
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011