Wednesday, 22. June 2016

Europe Will Spend €1 Billion to Turn Quantum Physics Into Quantum Technology


A 10-year-long megaproject will go beyond quantum computing and cryptography to advance other emerging technologies. European quantum physicists have done some amazing things over the past few decades: sent single photons to Earth orbit and back, created quantum bits that will be at the heart of computers that can crack today’s encryption, and “teleported” the quantum states of photons, electrons, and atoms. But they’ve had less success at turning the science into technology. At least that’s the feeling of some 3,400 scientists who signed the “Quantum Manifesto,” which calls for a big European project to support and coordinate quantum-tech R&D. The European Commission heard them, and answered in May with a €1 billion, 10-year-long megaproject called the Quantum Technology Flagship, to begin in 2018. “Europe had two choices: either band together and compete, or forget the whole thing and let others capitalize on research done in Europe,” says Anton Zeilinger, a physicist at the University of Vienna who did breakthrough work in quantum teleportation, which would be key to a future Internet secured by quantum physics.

Quantum Physics

spectrum.ieee.org

... Link (0 comments) ... Comment



Revealed: US spy operation that manipulates social media


Military's 'sock puppet' software creates fake online identities to spread pro-American propaganda. The US military is developing software that will let it secretly manipulate social media sites by using fake online personas to influence internet conversations and spread pro-American propaganda. A Californian corporation has been awarded a contract with United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop what is described as an "online persona management service" that will allow one US serviceman or woman to control up to 10 separate identities based all over the world.

theguardian.com

... Link (0 comments) ... Comment



There’s a new tool to take down terrorism images online. But social-media companies are wary of it.


President Obama suggested that extremist information spread online inspired a Florida man to commit the deadliest mass shooting in U.S. history at a gay nightclub in Orlando last week — the latest in a long line of terrorist attacks in which Islamist propaganda played some role in radicalizing the assailant. Now a Dartmouth College researcher and a nonprofit group say they have created a technology that can help Internet companies instantly detect images and videos generated by terrorists and their supporters and remove them from their platforms.

washingtonpost.com

... Link (0 comments) ... Comment



Beim Brexit dürfte das Parlament das Volk ignorieren - Nichts wird am 23. Juni endgültig entschieden


Die Mehrheit der britischen Abgeordneten ist gegen den Brexit – und darf den Willen des Volkes durchaus ignorieren. Es wäre nicht das erste Mal, dass das Parlament sich seinen Wählern widersetzt. In der Aufregung um das britische Referendum ist ein wichtiger Mitspieler völlig übersehen worden: das Parlament. Der Premierminister mag sich an das Ergebnis des 23. Juni gebunden fühlen und die "Instruktion" des Volkes, wie er es nennt, ausführen. Aber die Verfassung besagt etwas anderes: Hoheit über das, was passiert, hat nicht die Regierung, sondern das Parlament.

welt.de

... Link (0 comments) ... Comment



When Kodak Accidentally Discovered A-Bomb Testing


The ground shook, a brilliant white flash enveloped the sky, and the world changed forever. Code name "Trinity," the bomb test at dawn on July 16, 1945 in Alamogordo, New Mexico was the first large-scale atomic weapons testing in history. Only three weeks later two atomic bombs were dropped on Japan. More than 1,900 miles away from Alamogordo, at the Rochester, NY headquarters of Eastman Kodak, a flood of complaints came in from business customers who had recently purchased sensitive X-ray film from the company. Black exposed spots on the film, or "fogging," had rendered it unusable. This perplexed many Kodak scientists, who had gone to great lengths to prevent contaminations like this.

popularmechanics.com

... Link (0 comments) ... Comment



Refugees in Greece need internet so badly that they’ll stop a riot to let the wifi guys work


Kevin MacRitchie surveyed the inferno spreading across Diavata refugee camp. From his vantage point on the roof, where he had been fixing a satellite dish, he could see a column of thick black smoke twisting toward the sky above two rows of incinerated tents. While Greek army and police helped battle the fire, a protest had erupted at the front gate, by Syrian refugees frustrated with conditions in the camp and the asylum backlog that was keeping them there. That meant MacRitchie was now alone. His teammate, David Tagliani, had run out to drive their equipment van into the camp, and in the meantime, the angry mass had blocked the entrance. Yet when they recognized Tagliani behind the wheel, the protestors stopped. “Wifi,” they called to each other, “wifi.” And they cleared a path to let the van pass.

qz.com

... Link (0 comments) ... Comment



How 'Deleted' Yahoo Emails Led to a 20-Year Drug Trafficking Conviction


In 2009, Russell Knaggs, from Yorkshire, England, orchestrated a plan to import five tonnes of cocaine from South America hidden in boxes of fruit. Somehow, he did this all from the cell of a UK prison, while serving a 16-year sentence for another drug crime. As part of the plan, a collaborator in Colombia would log into a Yahoo email account and write a message as a draft. Another accomplice in Europe would read the message, delete it, and then write his own. The point of this was to avoid creating any emails that could be found by law enforcement.

/motherboard.vice.com

... Link (0 comments) ... Comment



On Legalizing Medical Cannabis: The DEA Responds


The DEA wants to remove the barriers to cannabis research, a spokesman told aNewDomain in a lengthy interview today. But how and when will it reschedule cannabis as a Schedule II drug? [Exclusive]

A DEA official responded at length today to a widely-circulated report that the DEA plans to effectively legalize medical cannabis this August. In an interview with aNewDomain today, DEA staff coordinator Russ Baer wouldn’t confirm the Santa Monica Observer report that the DEA will reschedule cannabis as a prescription-only Schedule II drug on Aug. 1, 2016. But he did comment at length about the agency’s thoughts around legalizing medical cannabis and how rescheduling cannabis from its current Schedule I status would have to work.

anewdomain.net

... Link (0 comments) ... Comment



Live-Ticker zur Wahlanfechtung: "Alles sehr korrekt" in Liezen


Bis zum Mittag vernehmen die Richterinnen und Richter weitere Zeugen aus jenen Bezirken, in denen die FPÖ Unregelmäßigkeiten gemeldet hat

Zeugen aus den Bezirken Liezen, Bregenz, Kufstein, Graz-Umgebung, Gänserndorf, Leibnitz, Völkermarkt und Reutte wollen die Richterinnen und Richter des Verfassungsgerichtshofs (VfGH) bis Donnerstag noch anhören. Der erste vernommene Beisitzer aus Liezen erklärte aber – im Gegensatz zu vielen anderen Befragten aus der FPÖ – bei der Auszählung der Wahlkarten anwesend gewesen zu sein. Manipulationsverdacht hegt er nicht: "Nein. Aus meiner Sicht war das korrekt."

derstandard.at

... Link (0 comments) ... Comment


Tuesday, 21. June 2016

How Terrorists Use Encryption


Abstract: As powerful encryption increasingly becomes embedded in electronic devices and online messaging apps, Islamist terrorists are exploiting the technology to communicate securely and store information. Legislative efforts to help law enforcement agencies wrestle with the phenomenon of “going dark” will never lead to a return to the status quo ante, however. With the code underlying end-to-end encryption now widely available, unbreakable encryption is here to stay. However, the picture is not wholly bleak. While end-to-end encryption itself often cannot be broken, intelligence agencies have been able to hack the software on the ends and take advantage of users’ mistakes.

ctc.usma.edu

... Link (0 comments) ... Comment



New 'Hardened' Tor Browser Protects Users From FBI Hacking


According to a new paper, security researchers are now working closely with the Tor Project to create a "hardened" version of the Tor Browser, implementing new anti-hacking techniques which could dramatically improve the anonymity of users and further frustrate the efforts of law enforcement... "Our solution significantly improves security over standard address space layout randomization (ASLR) techniques currently used by Firefox and other mainstream browsers," the researchers write in their paper, whose findings will be presented in July at the Privacy Enhancing Technologies Symposium in Darmstadt, Germany.

slashdot.org

... Link (0 comments) ... Comment



ACID BODHISATTVA: THE HISTORY OF THE TIMOTHY LEARY ARCHIVES DURING HIS PRISON AND EXILE YEARS, 1970-1976


How a scholarly hippie got pulled into the orbit of the psychedelic revolutionary whom then-President Nixon labeled “the most dangerous man in America” Lisa Rein conducts the first in-depth interview of Timothy Leary’s longtime archivist, Michael Horowitz Interview 1: December 1969 – November 1970 LR: How did you become Timothy Leary’s personal archivist? MH: I was uniquely suited for the role with my background working with rare books and manuscripts, and my immersion in the psychedelic counterculture, first in New York City and later in San Francisco. The immediate catalyst was meeting Robert Barker in San Francisco at the tail end of the ‘60s. Bob was a fellow consciousness explorer and an art book collector. He’s a Gemini from San Antonio, I’m a Sagittarius from Brooklyn. We clicked.

timothylearyarchives.org

... Link (0 comments) ... Comment