Showing posts with label prevent. Show all posts
Showing posts with label prevent. Show all posts

Monday, January 27, 2014

US looks at ways to prevent spying on its spying



(AP) — The U.S. government is looking into encryption techniques that could prevent eavesdroppers from spying on its own surveillance of Americans’ phone records.


As the Obama administration considers shifting the collection of those records from the National Security Agency to requiring that they be stored at phone companies or elsewhere, it’s quietly funding research to prevent phone company employees or eavesdroppers from seeing whom the U.S. is spying on, The Associated Press has learned.


The Office of the Director of National Intelligence has paid at least five research teams across the country to develop a system for high-volume, encrypted searches of electronic records kept outside the government’s possession. The project is among several ideas that would allow the government to discontinue storing Americans’ phone records, but still search them as needed.


Under the research, U.S. data mining would be shielded by secret coding that could conceal identifying details from outsiders and even the owners of the targeted databases, according to public documents obtained by The Associated Press and AP interviews with researchers, corporate executives and government officials.


The administration has provided only vague descriptions about changes it is considering to the NSA’s daily collection and storage of Americans’ phone records, which are presently kept in NSA databanks. To resolve legal, privacy and civil liberties concerns, President Barack Obama this month ordered the attorney general and senior intelligence officials to recommend changes by March 28 that would allow the U.S. to identify suspected terrorists’ phone calls without the government holding the phone records itself.


One federal review panel urged Obama to order phone companies or an unspecified third party to store the records; another panel said collecting the phone records was illegal and ineffective and urged Obama to abandon the program entirely.


Internal documents describing the Security and Privacy Assurance Research project do not cite the NSA or its phone surveillance program. But if the project were to prove successful, its encrypted search technology could pave the way for the government to shift storage of the records from NSA computers to either phone companies or a third-party organization.


A DNI spokesman, Michael Birmingham, confirmed that the research was relevant to the NSA’s phone records program. He cited “interest throughout the intelligence community” but cautioned that it may be some time before the technology is used.


The intelligence director’s office is by law exempt from disclosing detailed budget figures, so it’s unclear how much money the government has spent on the SPAR project, which is overseen by the DNI’s Intelligence Advanced Research Projects Activity office. Birmingham said the research is aimed for use in a “situation where a large sensitive data set is held by one party which another seeks to query, preserving privacy and enforcing access policies.”


A Columbia University computer sciences expert who heads one of the DNI-funded teams, Steven M. Bellovin, estimates the government could start conducting encrypted searches within the next year or two.


“If the NSA wanted to deploy something like this it would take one to two years to get the hardware and software in place to start collecting data this way either from phone companies or whatever other entity they decide on,” said Bellovin, who is also a former chief technologist for the Federal Trade Commission.


The NSA’s surveillance program collects millions of Americans’ daily calling records into a central agency database. When the agency wants to review telephone traffic associated with a suspected terrorist — the agency made 300 such queries in 2012 — it then searches that data bank and retrieves matching calling records and stores them separately for further analysis.


Using a “three-hop” method that allows the NSA to pull in records from three widening tiers of phone contacts, the agency could collect the phone records of up to 2.5 million Americans during each single query. Obama this month imposed a limit of “two hops,” or scrutinizing phone calls that are two steps removed from a number associated with a terrorist organization, instead of the current three.


An encrypted search system would permit the NSA to shift storage of phone records to either phone providers or a third party, and conduct secure searches remotely through their databases. The coding could shield both the extracted metadata and identities of those conducting the searches, Bellovin said. The government could use encrypted searches to ensure its analysts were not leaking information or abusing anyone’s privacy during their data searches. And the technique could also be used by the NSA to securely search out and retrieve Internet metadata, such as emails and other electronic records.


On Monday, the Justice Department and leading Internet companies agreed to a compromise that would allow the firms to reveal how often they are ordered to turn over information about their customers in national security investigations. The government deal with Google Inc., Microsoft Corp., Yahoo Inc., Facebook Inc.,, and LinkedIn Corp. would provide public information in general terms. Other tech companies are also expected to participate.


Some computer science experts are less sanguine about the prospects for encrypted search techniques. Searches could bog down because of the encryption computations needed, said Daniel Weitzner, principal research scientist at MIT’s Computer Science and Artificial Intelligence Laboratory and former deputy U.S. chief technology officer for the Obama administration.


“There’s no silver bullet that guarantees the intelligence community will only have access to the records they’re supposed to have access to,” Weitzner said. “We also need oversight of the actual use of the data.”


Intelligence officials worry that phone records stored outside the government could take longer to search and could be vulnerable to hackers or other security threats. The former NSA deputy director, John Inglis, told Congress last year that privacy — both for the agency and for Americans’ whose records were collected — is a prime consideration in the agency’s preference to store the phone data itself.


The encrypted search techniques could make it more difficult for hackers to access the phone records and could prevent phone companies from knowing which records the government was searching.


“It would remove one of the big objections to having the phone companies hold the data,” Bellovin said.


Similar research is underway by researchers at University of California at Irvine; a group from the University of Wisconsin-Madison and the University of Texas at Austin; another group from MIT, Yale and Rensselaer Polytechnic Institute; and a fourth from Stealth Software Technologies, a Los Angeles-based technology company.


Associated Press



Powered By WizardRSS.com | Full Text RSS Feed | RFID | Amazon Affiliate

Top Headlines

US looks at ways to prevent spying on its spying

US looks at ways to prevent spying on its spying








FILE – In this Jan. 23, 2014 file photo, President Barack Obama speaks in the East Room of the White House in Washington. The U.S. government is looking at ways to prevent anyone from spying on its own surveillance of Americans’ phone records. As the Obama administration considers shifting the collection of Americans’ phone records from the National Security Agency to requiring that they be stored at phone companies or elsewhere, it’s quietly funding research that would allow it to search the information using encryption so that phone company employees or eavesdroppers couldn’t see who the U.S. is spying on, The Associated Press has learned. (AP Photo/Carolyn Kaster, File)





FILE – In this Jan. 23, 2014 file photo, President Barack Obama speaks in the East Room of the White House in Washington. The U.S. government is looking at ways to prevent anyone from spying on its own surveillance of Americans’ phone records. As the Obama administration considers shifting the collection of Americans’ phone records from the National Security Agency to requiring that they be stored at phone companies or elsewhere, it’s quietly funding research that would allow it to search the information using encryption so that phone company employees or eavesdroppers couldn’t see who the U.S. is spying on, The Associated Press has learned. (AP Photo/Carolyn Kaster, File)













Buy AP Photo Reprints







WASHINGTON (AP) — The U.S. government is looking at ways to prevent anyone from spying on its own surveillance of Americans’ phone records.


As the Obama administration considers shifting the collection of those records from the National Security Agency to requiring that they be stored at phone companies or elsewhere, it’s quietly funding research to prevent phone company employees or eavesdroppers from seeing who the U.S. is spying on, The Associated Press has learned.


The Office of the Director of National Intelligence has paid at least five research teams across the country to develop a system for high-volume, encrypted searches of electronic records kept outside the government’s possession. The project is among several ideas that would allow the government to no longer store Americans’ phone records but still search them as needed.


Under the research, U.S. data mining would be shielded by secret coding that could conceal identifying details from outsiders and even the owners of the targeted databases, according to public documents obtained by The Associated Press and AP interviews with researchers, corporate executives and government officials.


The administration has provided only vague descriptions about changes it is considering to the NSA’s daily collection and storage of Americans’ phone records, which are presently kept in NSA databanks. To resolve legal, privacy and civil liberties concerns, President Barack Obama this month ordered the attorney general and senior intelligence officials to recommend changes by March 28 that would allow the U.S. to identify suspected terrorists’ phone calls without the government holding the phone records itself.


One federal review panel urged Obama to order phone companies or an unspecified third party to store the records; another panel said collecting the phone records was illegal and ineffective and urged Obama to abandon the program entirely.


Internal documents describing the Security and Privacy Assurance Research project do not cite the NSA or its phone surveillance program. But if the project were to prove successful, its encrypted search technology could pave the way for the government to shift storage of the records from NSA computers to either phone companies or a third-party organization.


A DNI spokesman, Michael Birmingham, confirmed that the research was relevant to the NSA’s phone records program. He cited “interest throughout the intelligence community” but cautioned that it may be some time before the technology is used.


The intelligence director’s office is by law exempt from disclosing detailed budget figures, so it’s unclear how much money the government has spent on the SPAR project, which is overseen by the DNI’s Intelligence Advanced Research Projects Activity office. Birmingham said the research is aimed for use in a “situation where a large sensitive data set is held by one party which another seeks to query, preserving privacy and enforcing access policies.”


A Columbia University computer sciences expert who heads one of the DNI-funded teams, Steven M. Bellovin, estimates the government could start conducting encrypted searches within the next year or two.


“If the NSA wanted to deploy something like this it would take one to two years to get the hardware and software in place to start collecting data this way either from phone companies or whatever other entity they decide on,” said Bellovin, who is also a former chief technologist for the Federal Trade Commission.


The NSA’s surveillance program collects millions of Americans’ daily calling records into a central agency database. When the agency wants to review telephone traffic associated with a suspected terrorist — the agency made 300 such queries in 2012 — it then searches that data bank and retrieves matching calling records and stores them separately for further analysis.


Using a “three-hop” method that allows the NSA to pull in records from three widening tiers of phone contacts, the agency could collect the phone records of up to 2.5 million Americans during each single query. Obama this month imposed a limit of two hops, or scrutinizing phone calls that are two steps removed from a number associated with a terrorist organization, instead of the current three.


An encrypted search system would permit the NSA to shift storage of phone records to either phone providers or a third party, and conduct secure searches remotely through their databases. The coding could shield both the extracted metadata and identities of those conducting the searches, Bellovin said. Encrypted searches could also be used by the NSA to retrieve Internet metadata and other electronic records securely. And the government could use them to ensure its analysts were not leaking information or abusing anyone’s privacy during their data searches, Bellovin said.


Other computer science experts are less sanguine. Searches could bog down because of the encryption computations needed, said Daniel Weitzner, principal research scientist at MIT’s Computer Science and Artificial Intelligence Laboratory and former deputy U.S. chief technology officer for the Obama administration.


“There’s no silver bullet that guarantees the intelligence community will only have access to the records they’re supposed to have access to,” Weitzner said. “We also need oversight of the actual use of the data.”


Intelligence officials worry that phone records stored outside the government could take longer to search and could be vulnerable to hackers or other security threats. The former NSA deputy director, John Inglis, told Congress last year that privacy — both for the agency and for Americans’ whose records were collected — is a prime consideration in the agency’s preference to store the phone data itself.


The encrypted search techniques could make it more difficult for hackers to access the phone records and could prevent phone companies from knowing which records the government was searching.


“It would remove one of the big objections to having the phone companies hold the data,” Bellovin said.


Similar research is underway by researchers at University of California at Irvine; a group from the University of Wisconsin-Madison and the University of Texas at Austin; another group from MIT, Yale and Rensselaer Polytechnic Institute; and a fourth from Stealth Software Technologies, a Los Angeles-based technology company.


Associated Press




Top Headlines



US looks at ways to prevent spying on its spying

Tuesday, October 29, 2013

Should Lithium Be Added To Drinking Water To Prevent Suicides?



lithiumMother Nature Network has the latest news on the previously discussed sort-of-logical-yet-profoundly-horrifying concept:


A study carried out in June of 2011 demonstrated that drinking water contaminated with lithium could actually lower suicide rates. So should lithium be added as a supplement to the water supply, as is done with fluoride?


In the study, 6,460 samples of drinking water were tested across 99 districts in Austria. Districts with higher levels of lithium tended to report lower suicide rates. In some areas lithium occurs naturally in the water supply, likely leached out of rocks and stones.


The results weren’t terribly shocking, as lithium has been used for decades to treat depression. This was the first time its effect was measured based on trace amounts within drinking water, however.




disinformation



Should Lithium Be Added To Drinking Water To Prevent Suicides?

Thursday, September 19, 2013

Bacteria or virus: New diagnose tests to prevent pandemics and bad prescriptions



Published time: September 19, 2013 14:22

Reuters/Ints Kalnins

Reuters/Ints Kalnins




When unsure whether you suffer from a virus or bacteria, just take a snapshot of your immune system. So say American researchers, who are developing a blood test that could save millions, prevent pandemics and cut back on wrongly prescribed medication.


The crux of the problem is that symptoms are not enough for a diagnosis. The doctor’s only weapon is to prescribe a test which detects a certain pathogen. Presently, the test is usually chosen based on common sense, e.g. “is there currently a flu epidemic?” And if the usual suspects do not show up, additional testing – which may take days – is necessary. 


Correct identification of ‘signatures’ in every affliction is in this case necessary. Here is the solution the Duke researchers came up with: photographing gene activity at the onset of infection. Before a person even feels the first symptoms of an illness, sets of genes are dispatched by the organism to battle it. But a viral infection is fought with a different set of genes than a bacterial one, for instance. This also leads to differing RNA and protein formations, otherwise known as a genetic fingerprint. 


With this information doctors will be able to identify and diagnose diseases correctly and in time, prevent pandemics, possibly recognize infections at the incubation stage, as well as dramatically cut back on erroneous prescriptions.


For instance, knowing that an infection is not a virus automatically rules out antibiotics as treatment. And it is becoming common knowledge that germs mutate and become resistant to antibiotics. Drug-resistant germs are the cause of over 23,000 deaths annually. And when dangerous viruses, such as the new MERS, begin to spread rapidly, a revolutionary technique like genetic fingerprinting could be a solution in the future. 


Dr. Geoffrey Ginsburg, who is the head of genomic medicine at Duke University, told the Associated Press that the “viral signature could be quite powerful, and may be a game-changer.” On Wednesday, his team got results back from a 102-person study that proves the new test works.


Dr. Aimee Zaas, who is lead researcher at Duke, explains how the new test works. The Duke team recognized 30 genes that switch on during a viral attack. This led the scientists to the idea of taking a still of their activity at the time of infection or “what those genes are doing at the moment in time that it’s captured.”


Concrete evidence of a viral signature was first spotted in people who volunteered to be infected with differing strains of flu for the experiment. For a more real comparison, researchers then took blood samples from previously sick walk-in patients who were diagnosed much later.


The results of the genome test proved remarkably accurate: in 89 percent of the cases a viral signature showed itself to be distinct from a bacterial one, according to Zaas’ Wednesday report in the Science Translational Medicine journal. Her results took about 12 hours. Now, everyone’s hope is to speed that up to being almost instant, the way in-office tests work. 


As Dr. Octavio Ramilo of Nationwide Children’s Hospital in Columbus (Ohio) pointed out, children are usually the first victims of slow diagnosis, because “in the beginning [virus and bacteria] look completely alike.” Therefore, he agrees that this is groundbreaking and predicts that the Duke team will come up with a working, widely used procedure within five years. 


Ramilo, whose research runs parallel to the Duke discoveries, has decided to take their finds a step further. One very pressing problem is diagnosing and saving infants with serious bacterial infections in time. To do this, Ramilo has taken a sample of 22 pediatric emergency rooms to attempt to extrapolate a fraction of high-risk babies that need an extensive set of tests. Because this is currently the default procedure for any infant with fever, the success of genetic fingerprinting could drastically cut waiting time.




RT – News



Bacteria or virus: New diagnose tests to prevent pandemics and bad prescriptions

Monday, August 12, 2013

Police Are Now Entering and Inspecting Homes to “Prevent Crimes”


Print Friendly

Photo: Gizmado

Photo: Gizmado



By Kit Daniels
Infowars.com
August 9, 2013


Waco, Texas police officers are now allegedly entering apartments and rental homes on “crime prevention” inspections.


An alleged inspection notice from the Sanger Oaks Apartments’ management states that the Waco Police Department will inspect “security features” inside apartments as part of the Waco Crime Free Multi-Housing Program.


The Waco Police Department created the program in order to build a partnership between the police and property managers to “keep drugs and other illegal activity” out of rental properties.


The police train landlords on “applicant screening, recognizing illegal drug activity, combating crime problems, the eviction process, managing risks, and working with the police.”


Landlords in the program must also meet standard security requirements for the dwellings and common areas as outlined under Crime Prevention Through Environmental Design.


The requirements include metal dead bolts, eye viewers in front doors and strike plates, which according to the notice the police will inspect.


If police are alone inside your apartment or rental house, what really prevents them from digging through your closet, your drawers, and even your trash?


In 2001, after an informant accused Daniel Serrano of cocaine dealing, an Austin police detective picked through Serrano’s trash can, which was sitting out in the street in front of his house.


The detective found a “plastic baggie with white powder residue” in the garbage.


The residue tested positive for cocaine.


A court granted the detective a warrant to search Serrano’s house based on his garbage can find.


Police found cocaine inside Serrano’s home and arrested him.


He was later convicted of cocaine possession with intent to deliver.


The Texas District Court, however, reversed Serrano’s conviction, stating that because trash cans sitting outside are readily accessible to the public, the cocaine residue could have easily been planted by someone else.


Serrano beat the charge because the evidence obtained for a search warrant was found outside of his home.


But what if police “uncover” evidence against you inside your home while checking the deadbolts on a “crime prevention” inspection?


What would stop them from saying that they “smelled marijuana,” claiming that it gave them “probable cause” to search through your closet and drawers?


Police could also easily identify gun owners for future confiscations through these inspections.


Even further, what would prevent a corrupt cop from planting false evidence on your property?




Intellihub.com



Police Are Now Entering and Inspecting Homes to “Prevent Crimes”

Saturday, August 10, 2013

Assad sends air force to prevent rebel advances in home province

BEIRUT (Reuters) – Warplanes bombed a village in Syria’s north overnight in an apparent effort by President Bashar al-Assad to prevent rebels fighting him from advancing on communities in the stronghold region of his Alawite sect.


Reuters: Top News



Assad sends air force to prevent rebel advances in home province

Saturday, June 8, 2013

Philadelphia mayor seeks measures to prevent building collapses

PHILADELPHIA (Reuters) – Philadelphia Mayor Michael Nutter on Friday recommended random drug tests for heavy equipment operators and other safeguards as part of a sweeping set of reforms in the wake of this week’s fatal building collapse.



Reuters: Top News



Philadelphia mayor seeks measures to prevent building collapses