Menu

Blog

Archive for the ‘surveillance’ category: Page 22

Mar 1, 2020

How China is using AI and big data to combat coronavirus outbreak

Posted by in categories: biotech/medical, information science, robotics/AI, surveillance

Authorities in China step up surveillance and roll out new artificial intelligence tools to fight deadly epidemic.

Feb 22, 2020

The next chapter for African genomics

Posted by in categories: biotech/medical, evolution, genetics, surveillance

The rest of the world is interested, too. Africa contains much more genetic diversity than any other continent because humans originated there. This diversity can provide insights into human evolution and common diseases. Yet fewer than 2% of the genomes that have been analysed come from Africans. A dearth of molecular-biology research on the continent also means that people of African descent might not benefit from drugs tailored to unique genetic variations. Infectious-disease surveillance also falls short, meaning that dangerous pathogens could evade detection until an outbreak is too big to contain easily.


Nigeria is poised to become a hub for genetics research, but a few stubborn challenges block the way.

Feb 21, 2020

Moscow deploys facial recognition technology for coronavirus quarantine

Posted by in categories: biotech/medical, robotics/AI, security, surveillance

Sobyanin said last month that the city had begun using facial recognition as part of its city security surveillance programme.

Kremlin spokesman Dmitry Peskov said he had not seen details of the actions being taken in Moscow but that measures to curb the spread of the coronavirus should not be discriminatory.

The clamp down on quarantine rules comes after a woman in St. Petersburg staged an elaborate escape from a hospital where she said she was being kept against her will.

Feb 9, 2020

Information theft via manipulating screen brightness in air-gapped computers

Posted by in categories: computing, internet, security, surveillance

Data can be stolen from an air gapped personal computer just by using variations in screen brightness. Researchers at Ben-Gurion University wrote a paper on it.

As the team defines them, “Air-gapped computers are systems that are kept isolated from the Internet since they store or process .”

Continue reading “Information theft via manipulating screen brightness in air-gapped computers” »

Feb 8, 2020

H-IIA conducts IGS Optical 7 launch

Posted by in categories: existential risks, government, satellites, surveillance

Making its first flight in over a year, Mitsubishi Heavy Industries’ H-IIA rocket lifted off from the Tanegashima Space Centre on Sunday with a reconnaissance satellite for the Japanese government. Liftoff occurred at10:34 local time 01:34 UTC, during a five-minute launch window.

Sunday’s launch deployed the IGS Optical 7 satellite for the Cabinet Satellite Intelligence Centre, an agency of the Japanese government responsible for space-based surveillance. IGS Optical 7 is part of the Information Gathering Satellite (IGS) or Joho Shushu Eisei (JSE) system, consisting of spacecraft collecting optical and radar images of the Earth.

Japan began development of IGS in the late 1990s, following North Korea’s attempted satellite launch in 1998. Although the North Korean launch failed to reach orbit, the rocket carrying it crossed Japan during its ascent, sparking fears that North Korean missiles would be able to target the islands. With IGS, Japan aimed to develop an independent reconnaissance capability to monitor future threats. The constellation can also be used for disaster monitoring and other civilian applications by the Japanese government.

Feb 8, 2020

Inspection drone with five-hour flight time released

Posted by in categories: drones, surveillance

Drone maker Skyfront has partnered with Silvus Technologies to create a drone with a maximum flight time of five hours and an operating distance of 100km. The new long-range drone will allow operators to inspect pipelines and other assets as well as conduct long-range surveillance missions.

Feb 4, 2020

DARPA is testing drones it can launch from a plane—then collect mid-air

Posted by in categories: drones, media & arts, military, surveillance

The news: The Defense Advanced Research Projects Agency (DARPA) has conducted the first test of a new type of drone that can be launched from a plane in a swarm and recovered in mid-air when it’s done its job.

How it works: A military transport or bomber plane releases a series of drones in rapid succession. They carry out the task designated to them (surveillance, for example) and then return to the plane, docking on a line before being winched in. It looks a bit like the airborne refueling process.

Continue reading “DARPA is testing drones it can launch from a plane—then collect mid-air” »

Feb 1, 2020

Surveillance of Bat Coronaviruses in Kenya Identifies Relatives of Human Coronaviruses NL63 and 229E and Their Recombination History

Posted by in categories: biotech/medical, genetics, surveillance

Circa 2017 Bats harbor a large diversity of coronaviruses (CoVs), several of which are related to zoonotic pathogens that cause severe disease in humans. Our screening of bat samples collected in Kenya from 2007 to 2010 not only detected RNA from several novel CoVs but, more significantly, identified sequences that were closely related to human CoVs NL63 and 229E, suggesting that these two human viruses originate from bats. We also demonstrated that human CoV NL63 is a recombinant between NL63-like viruses circulating in Triaenops bats and 229E-like viruses circulating in Hipposideros bats, with the breakpoint located near 5′ and 3′ ends of the spike (S) protein gene. In addition, two further interspecies recombination events involving the S gene were identified, suggesting that this region may represent a recombination “hot spot” in CoV genomes. Finally, using a combination of phylogenetic and distance-based approaches, we showed that the genetic diversity of bat CoVs is primarily structured by host species and subsequently by geographic distances.


bMarie Bashir Institute for Infectious Diseases and Biosecurity, Charles Perkins Centre, School of Life and Environmental Sciences and Sydney Medical School, The University of Sydney, Sydney, Australia.

Find articles by Mang Shi

Continue reading “Surveillance of Bat Coronaviruses in Kenya Identifies Relatives of Human Coronaviruses NL63 and 229E and Their Recombination History” »

Jan 21, 2020

Why Gene Editors Like CRISPR/Cas May Be a Game-Changer for Neuroweapons

Posted by in categories: bioengineering, biotech/medical, genetics, governance, health, neuroscience, policy, surveillance

This year marks the Eighth Review Conference (RevCon) of the Biological Toxins and Weapons Convention (BWC). At the same time, ongoing international efforts to further and more deeply investigate the brain’s complex neuronal circuitry are creating unprecedented capabilities to both understand and control neurological processes of thought, emotion, and behavior. These advances have tremendous promise for human health, but the potential for their misuse has also been noted, with most discussions centering on research and development of agents that are addressed by existing BWC and Chemical Weapons Convention (CWC) proscriptions. In this article, we discuss the dual-use possibilities fostered by employing emergent biotechnologic techniques and tools—specifically, novel gene editors like clustered regular interspaced short palindromic repeats (CRISPR)—to produce neuroweapons. Based on our analyses, we posit the strong likelihood that development of genetically modified or created neurotropic substances will advance apace with other gene-based therapeutics, and we assert that this represents a novel—and realizable—path to creating potential neuroweapons. In light of this, we propose that it will be important to re-address current categorizations of weaponizable tools and substances, so as to better inform and generate tractable policy to enable improved surveillance and governance of novel neuroweapons.

Keywords: : CRISPR, Gene editing, Neuroweapon, Neurotherapeutic pathways, Dual-use neuroscience, Biosecurity policy.

T his year marks the Eighth Review Conference (RevCon) of the Biological Toxins and Weapons Convention (BWC), the purpose of which is to ensure that the convened parties’ directives continue to be relevant to and viable for prohibiting the development, production, and stockpiling of biological weapons in the face of newly emerging scientific advancements and biotechnologies. Apropos of issues raised at previous RevCons and elsewhere, there are growing concerns about current and future weaponization of neurobiological agents and tools (ie, “neuroweapons”1–6).

Jan 18, 2020

Thousands of Chinese Students’ Data Exposed on Internet

Posted by in categories: cybercrime/malcode, education, internet, surveillance

A Chinese facial-recognition database with information on thousands of children was stored without protection on the internet, a researcher discovered, raising questions about school surveillance and cybersecurity in China.

The cache was connected to a surveillance system labeled “Safe School Shield” and contained facial-identification and location data, according to Victor Gevers, a researcher at the Dutch nonprofit GDI Foundation, which scans the internet for vulnerabilities and flags them to owners for fixing.

Page 22 of 38First1920212223242526Last