bothernews

Archive for the ‘Business’ Category

Scientists discover that our brain waves can be sent by electrical fields – ScienceAlert

with 2 comments

PETER DOCKRILL

15 JAN 2016

“The implications are that such directed fields can be used to modulate both pathological activities, such as seizures, and to interact with cognitive rhythms that help regulate a variety of processes in the brain.”

The results indicate that electric fields (ephaptic effects) are capable of mediating propagation of self-regenerating neural waves,” they write. “This novel mechanism coupling cell-by-volume conduction could be involved in other types of propagating neural signals, such as slow-wave sleep, sharp hippocampal waves, theta waves, or seizures.”

If their findings, which are reported in The Journal of Neuroscience, can be expounded in further studies, it could help us to better understand how brain waves are associated with things like memory, epilepsy, and healthy physiology.

Source URL:   http://www.sciencealert.com/scientists-discover-new-method-of-brain-wave-transmission-electrical-fields

Advertisements

Lest We Forget: The NSA already has backdoor access to your iPhone

leave a comment »

Amidst current attention on the Federal Court’s attempt to require Apple to install a backdoor allowing the FBI to access a criminal’s iPhone, may we remind ourselves of the NSA’s spectacular access to the same device using  DROPOUT JEEP:

From 2013

How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP)

DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”

The flowchart of how the NSA makes your iPhone its iPhone is presented below:

  • NSA ROC operator
  • Load specified module
  • Send data request
  • iPhone accepts request
  • Retrieves required SIGINT data
  • Encrypt and send exfil data
  • Rinse repeat

And visually:

 

Jewel v NSA: EFF Allowed to Conduct Discovery Against Unwarranted NSA Surveillance Programs

leave a comment »

From:  https://www.eff.org/deeplinks/2016/02/big-victory-judge-pushes-jewel-v-nsa-forward

February 19, 2016 | By David Greene

Big Victory: Judge Pushes Jewel v. NSA Forward

We won a groundbreaking legal victory late Friday in our Jewel v. NSA case, which challenges the NSA’s Internet and telephone surveillance. Judge Jeffrey White has authorized EFF, on behalf of the plaintiffs, to conduct discovery against the NSA. We had been barred from doing so since the case was filed in 2008, which meant that the government was able to prevent us from requesting important information about how these programs worked.

This marks the first time a party has been allowed to gather factual evidence from the NSA in a case involving the agency’s warrantless surveillance. The government had fought all our requests to proceed with this lawsuit, arguing that the state secrets privilege protects it against both discovery and liability. Judge White previously rejected that argument for our statutory claims under the Wiretap Act, the Foreign Intelligence Surveillance Act, the Electronic Communications Privacy Act, and the Stored Communications Act. This ruling affirms Judge White’s previous decision and opens the door for discovery.

This is an important step forward to lifting the cloak of secrecy that has thus far shielded the NSA from judicial scrutiny, and EFF looks forward to finally getting to the nuts and bolts of this extraordinarily important lawsuit.

Who Has Your Back? Government Data Requests 2015 | Electronic Frontier Foundation

leave a comment »

 

From EFF:

In this, our fifth annual Who Has Your Back report, we took the main principles of the prior reports and rolled them into a single category: Industry-Accepted Best Practices. We’ve also refined our expectations around providing users notice and added new categories to highlight other important transparency and user rights issues.

We designed this report to take the basic principles of Who Has Your Back up a notch and see which companies were still leading the pack. Already, our newest report has had a similar effect on the industry as a whole, encouraging companies large and small to strive for more when it comes to standing by their users. In the months since we first told the companies what this year’s criteria would be, we’ve seen significant improvement in company practices. And we hope—and expect—that over the next year, we’ll see even more.

 

Download Report

Download the complete Who Has Your Back? 2015: Protecting Your Data From Government Requests report as a PDF.

 

Who Has Your Back? Government Data Requests 2015 | Electronic Frontier Foundation

Written by bothernews

July 22, 2015 at 1:59 am

Banking Culture Encourages Dishonesty

leave a comment »

What is it about the financial sector that encourages bad behavior?

December 30, 2014 |By Francesca Gino

A paper recently published in Nature magazine found that the financial sector’s culture encourages dishonesty.

For the study published in Nature, Alain Cohn and his colleagues divided 128 employees of a large bank into two groups. In the first group, bankers were primed to think about their professional identity, with questions such as “what is your function at this bank?” Bankers in the second group, instead, completed a survey about their wellbeing and everyday life that did not include questions about to their professional life. Next they all tossed a virtual coin 10 times, in private, knowing each time which outcome would earn them $20 for the flip. They then had to report their results online to claim any winnings. The second group of bankers behaved honestly—reporting half heads, half tails—but there was cheating among those whose professional identity had been primed. In their case, in fact, the percentage of winning tosses came in at an incredibly fortunate 58.2 percent. Interestingly, the researchers also conducted the same experiment in other industries but did not find the same skewing when employees were primed to think about their work.

The authors conclude that the prevailing business culture in the banking industry weakens and undermines honesty.

Research in moral psychology and behavioral ethics, however, suggests that the dishonesty may be due something more basic: money and number crunching are an important part of the banking industry.

When people are focused on money, research shows, they behave in self-interested ways. Even thinking about money leads people to be less helpful and fair in their dealings with others, to be less sensitive to social rejection, and to work harder toward personal goals. In fact, money can make us so focused on our selfish motives that it can even lead to unethical behavior.

Full Story: http://www.scientificamerican.com/article/banking-culture-encourages-dishonesty/

Written by bothernews

December 31, 2014 at 7:34 pm

Posted in Business, Corruption

Tagged with , ,

Automated Mass Surveillance is Unconstitutional, EFF Explains in Jewel v. NSA | Electronic Frontier Foundation

leave a comment »

 

October 24, 2014

Today EFF filed our latest brief in Jewel v. NSA, our longstanding case on behalf of AT&T customers aimed at ending the NSA’s dragnet surveillance of millions of ordinary Americans’ communications. The brief specifically argues that the Fourth Amendment is violated when the government taps into the Internet backbone at places like the AT&T facility on Folsom Street in San Francisco.

Full Story:  Automated Mass Surveillance is Unconstitutional, EFF Explains in Jewel v. NSA | Electronic Frontier Foundation

 

[NOTE:]

Fourth Amendment to the Constitution of the United States of America:

The right of the people to be secure in their persons, houses, papers, and effects,

against unreasonable searches and seizures, shall not be violated,

and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation,

and particularly describing the place to be searched, and the persons or things to be seized

Written by bothernews

October 26, 2014 at 5:27 pm