Toggle light / dark theme

What Is End-to-End Encryption? Another Bull’s-Eye on Big Tech

Law enforcement and technologists have been arguing over encryption controls for more than two decades. On one side are privacy advocates and tech bosses like Apple’s chief executive, Timothy D. Cook, who believe people should be able to have online communications free of snooping. On the other side are law enforcement and some lawmakers, who believe tough encryption makes it impossible to track child predators, terrorists and other criminals.


After years of on-and-off debate over nearly snoop-proof security, the industry is girding for new pressure from law enforcement around the world.

Future Consequences of Cryptocurrency Use: Systemic Investigation of Two Scenarios

We face complexity, ambiguity, and uncertainty about the future consequences of cryptocurrency use. There are doubts about the positive and negative impacts of the use of cryptocurrencies in the financial systems. In order to address better and deeper the contradictions and the consequences of the use of cryptocurrencies and also informing the key stakeholders about known and unknown emerging issues in new payment systems, we apply two helpful futures studies tools known as the “Future Wheel”, to identify the key factors, and “System Dynamics Conceptual Mapping”, to understand the relationships among such factors. Two key scenarios will be addressed. In on them, systemic feedback loops might be identified such as a) terrorism, the Achilles’ heel of the cryptocurrencies, b) hackers, the barrier against development, and c) information technology security professionals, a gap in the future job market. Also, in the other scenario, systemic feedback loops might be identified such as a) acceleration of technological entrepreneurship enabled by new payment systems, b) decentralization of financial ecosystem with some friction against it, c) blockchain and shift of banking business model, d) easy international payments triggering structural reforms, and e) the decline of the US and the end of dollar dominance in the global economy. In addition to the feedback loops, we can also identify chained links of consequences that impact productivity and economic growth on the one hand, and shift of energy sources and consumption on the other hand.

Watch the full length presentation at Victor V. Motti YouTube Channel

Rogue drones to be targeted by new hi-tech ‘detect and destroy’ unit set up by Home Office

Rogue drones will be brought down by “detect and destroy” technology under plans for a new national counter-drone force to prevent Gatwick-style disruption, ministers have announced.

The new mobile special unit, to be set up by the Home Office, will be available to any police force or law enforcement agency in the UK to counter potential drone threats at major events or malicious attacks such as the chaos at Gatwick airport last Christmas.

The unit is expected to have military-grade cameras, radar and radio frequency scanners to detect rogue drones, similar to those deployed by the Army at Gatwick.

This Malware Makes ATMs Spit Out All Their Money

Hackers equipped with black market software are targeting cash machines with dated software and substandard security and walking away with millions over the course of a series of attacks, according to a collaborative investigation by Motherboard and German newsroom Bayerischer Rundfunk. Though law enforcement agencies are tightlipped about the trend, it’s a sign that banks may be surprisingly vulnerable to cybercrime.


Other sources, granted anonymity by Motherboard, described the same trend: “There are attacks happening, but a lot of the time it’s not publicized,” said one.

Plug-And-Play

The German attacks and others throughout Europe seem to be carried out with Russian software called Cutlet Maker, which Motherboard reports can be bought for $1,000. In the U.S., a program called Ploutus. D is more popular.

Both programs can be installed into ATMs through a USB or other physical access point — though the hackers usually need to break into the ATM’s hardware to access it.

Rough Science 1 Mediterranean Mystery

Time for my yearly proselytizing for PBS UK’s Rough Science. Awesome educational show where a bunch of scientists are dumped on an island and have to work together to make something crazy out of local scavenged materials.


The group is taken to a disused prison on the island where they have to determine the longitude and latitude of the island, create a radio from a saucepan and create an insect repellent.

Researchers’ new method enables identifying a person through walls from candidate video footage, using only WiFi

Researchers in the lab of UC Santa Barbara professor Yasamin Mostofi have enabled, for the first time, determining whether the person behind a wall is the same individual who appears in given video footage, using only a pair of WiFi transceivers outside.

This novel video-WiFi cross-modal gait-based person identification system, which they refer to as XModal-ID (pronounced Cross-Modal-ID), could have a variety of applications, from surveillance and security to smart homes. For instance, consider a scenario in which law enforcement has a of a robbery. They suspect that the robber is hiding inside a house. Can a pair of WiFi transceivers outside the house determine if the person inside the house is the same as the one in the robbery video? Questions such as this have motivated this new technology.

“Our proposed approach makes it possible to determine if the person behind the wall is the same as the one in video footage, using only a pair of off-the-shelf WiFi transceivers outside,” said Mostofi. “This approach utilizes only received power measurements of a WiFi link. It does not need any prior WiFi or video training data of the person to be identified. It also does not need any knowledge of the operation area.”

Bernie Sanders Wants to Ban Facial Recognition for Policing, I Disagree

Under his plan, “Justice and Safety for All,” Bernie Sanders wants to ban facial recognition software for policing. As a supporter of Sanders, I’m going to have to respectfully disagree. Here’s why…


Last Sunday, presidential-hopeful Bernie Sanders released on his website what is arguably one of the most extensive plans for law enforcement oversight and criminal justice overhaul that the United States has ever seen. As a progressive, myself, and supporter of Sanders during his primary run, I fully endorse everything that’s been laid out in this plan— that is, except for one minor policy.

The plan, titled “Justice and Safety for All,” calls to “Ban the use of facial recognition software for policing.” It also calls for a “moratorium on the use of the algorithmic risk assessment tools in the criminal justice system until an audit is completed,” whereby the audit would “ensure these tools do not have any implicit biases that lead to unjust or excessive sentences.”

I’m perfectly fine with the policy on algorithmic risk assessment tools being used by our criminal justice system. It’s not a total ban; it simply serves as a temporary safety measure until it’s been proven that these algorithms won’t carry with them any unjust biases. But when it comes to Sanders’ policy on banning facial recognition software for policing, I simply cannot get behind it.

Boston Strangler Case Solved After 50 Years

A water bottle recovered from a construction site where Tim DeSalvo – whose uncle Albert DeSalvo had confessed to being the internationally notorious Boston Strangler – gave police the DNA evidence they needed to bring closure to a case that has been a mystery for nearly 50 years, murders for which no one has ever been charged.

“This is really a story of relentlessness,’’ Boston Police Commissioner Ed Davis explained today as Massachusetts top law enforcement officials revealed that DNA preserved from the body of the Boston Strangler’s last victim—raped and murdered in 1964—can now be linked with ”99.9 percent certainty” to the late Albert DeSalvo.

”This is good evidence. This is strong evidence. This is reliable evidence,’’ Suffolk County District Attorney Dan Conley said of the new DNA result. ”But there can be no doubt.”

The Palm Beach Post

This article appears in Weekly Health Page July 31.

Researchers found that more than four out of five Ohio women who had been physically abused by their partners had suffered a head injury. A study that found domestic violence survivors had sustained staggering rates of head trauma and violent choking incidents suggests that many are left with ongoing health problems from “invisible injuries” to the brain.

But the effects of such injuries often go unrecognized by advocates, health care providers, law enforcement — even the victims themselves, researchers said.