Science & Technology
Map


Eye 2

Google faces lawsuit for offering data-mined consumer data to advertisers

Google te espia
© Desconocido
A federal judge has denied Google Inc's attempt to dismiss a privacy lawsuit brought against the technology giant for commingling user data across its different products and offering that data to advertisers without permission.

US District Judge Paul Grewal ruled Monday evening that Google has to face the breach of contract and fraud claims brought by users of Android devices who downloaded at least one Android application through Google Play.

"Like Rocky rising from Apollo's uppercut in the 14th round, plaintiffs' complaint has sustained much damage but just manages to stand," Grewal wrote in a 28-page decision, referring to the 'Rocky' film series while alluding to how close his decision ultimately was. Two earlier versions of the lawsuit were previously dismissed by Grewal.

Grewal did dismiss on Monday other aspects of the current lawsuit, including claims brought by users who say they were compelled to switch away from Android devices to non-Android devices after Google altered its privacy policy in 2012 that allowed the data commingling.
Cut

Scientists cut HIV out of human genome using enzymes

© Reuters/Suzanne Plunkett
US scientists have physically cut the HIV virus out of infected cells by using enzymes. The method could, in theory, lead to a permanent cure for AIDS, though researchers warn there is still a long way to go.

Scientists from Temple University School of Medicine in Philadelphia have pioneered a technique which uses a targeting strand of RNA (called guide RNA, or gRNA) that locates the virus. A "DNA snipping" enzyme (called a nuclease) then removes it from the infected cell. The cell, now free of the HIV virus, then repairs itself.

Cells armed with the nuclease-RNA combination proved impervious to HIV infection, the research states.

"This is an important step on the path toward a permanent cure for AIDS. It's an exciting discovery, but it's not yet ready to go into the clinic. It's a proof of concept that we're moving in the right direction," said Dr. Khalili, director of the Comprehensive NeuroAIDS Center at Temple and lead author of the study.

The editing process was successful in several cell types that can harbor HIV-1, including microglia and macrophages, as well as T-lymphocytes. "T-cells and monocytic cells are the main cell types infected by HIV-1, so they are the most important targets for this technology," Khalili said.
Cell Phone

Top security researcher found secret backdoors in Apple devices running latest iOS

© AFP Photo / Getty Images / Justin Sullivan
A security researcher considered to be among the foremost experts in his field says that more than a half-billion mobile devices running Apple's latest iOS operating system contain secret backdoors.

Jonathan Zdziarski, also known by his online alias "NerveGas," told the audience attending his Friday morning presentation at the Hackers on Planet Earth conference in New York City that around 600 million Apple devices, including iPhones and tablets, contain hidden features that allow data to be surreptitiously slurped from those devices.

During Zdziarski's HOPE presentation, "Identifying Backdoors, Attack Points and Surveillance Mechanisms in iOS Devices," the researcher revealed that several undocumented forensic services are installed on every new iPhone and iPad, making it easier that ever for a third-party to pull data from those devices in order to compromise a target and take hold of their personal information, including pictures, text messages, voice recordings and more.
Beaker

Study finds over 100 genes linked to schizophrenia

© Reuters/Stefan Wermuth
Researchers identified more than 80 previously undiscovered genes which may be related to the development of schizophrenia, bringing the total of potentially associated genes to over 100, the largest international study ever published on the subject says.

"We identify 128 independent associations spanning 108 conservatively defined loci that meet genome-wide significance, 83 of which have not been previously reported," the abstract of the study, published in Nature magazine on Tuesday, states.

The findings are the result of the collaboration of Psychiatric Genomics Consortium (PGC), which included more than 80 institutions such as the Broad Institute of Harvard and MIT, Massachusetts General Hospital (MGH), and others around the world.

The identification of specific triggers which could lead to schizophrenia help boost the development of new ways to treat the mental illness, which has been stalling for the last 60 years, according to Michael O'Donovan, a psychiatrist who led the study from the UK's Cardiff University.

Schizophrenia is known to impact one in 100 people. Characteristics of the disease include hallucinations and delusions. Some patients hear voices and report symptoms of paranoia.
Syringe

As above, so below? Horseshoe crabs harvested for their blue blood

horseshoe crabs
© PBS
A still from the PBS Nature documentary Crash
The thing about the blood that everyone notices first: It's blue, baby blue. The marvelous thing about horseshoe crab blood, though, isn't the color. It's a chemical found only in the amoebocytes of its blood cells that can detect mere traces of bacterial presence and trap them in inescapable clots.

To take advantage of this biological idiosyncrasy, pharmaceutical companies burst the cells that contain the chemical, called coagulogen. Then, they can use the coagulogen to detect contamination in any solution that might come into contact with blood. If there are dangerous bacterial endotoxins in the liquid - even at a concentration of one part per trillion - the horseshoe crab blood extract will go to work, turning the solution into what scientist Fred Bang, who co-discovered the substance, called a "gel."

"This gel immobilized the bacteria but did not kill them," Bang wrote in the 1956 paper announcing the substance. "The gel or clot was stable and tough and remained so for several weeks at room temperature."

If there is no bacterial contamination, then the coagulation does not occur, and the solution can be considered free of bacteria. It's a simple, nearly instantaneous test that goes by the name of the LAL, or Limulus amebocyte lysate, test (after the species name of the crab, Limulus polyphemus). The LAL testreplaced the rather horrifying prospect of possibly contaminated substances being tested on "large colonies of rabbits." Pharma companies didn't like the rabbit process, either, because it was slow and expensive.
Robot

Robots are set to conduct National Security clearance interviews

Robot
© NCAA
The US government robot that will be asking you about your drug abuse.

Advancing a career in the US government might soon require an interview with a computer generated head who wants to know about that time you took ketamine.

Psychologists at the National Center for Credibility Assessment (NCCA) are developing an interview system that uses a responsive on-screen avatar for the first stage of the national security clearance process.

Initial screening for a variety of government jobs currently requires applicants to fill out a form disclosing past drug use, criminal activity, and mental health issues, which is then reviewed during an interview - with a human.

But a recent NCCA study published in the journal Computers and Human Behavior asserts that not only would a computer-generated interviewer be less "time consuming, labor intensive, and costly to the Federal Government," people are actually more likely to admit things to the robot.

The study used US Army basic trainees as volunteer subjects for a mock national security clearance interview. The trainees were not told that the questions would be asked by a robot. After being hooked up to electrodes for cardiographic and electrodermal (heart and skin) responses the volunteers were told that the interview would be with a computer avatar, and were left alone in a chamber with their on-screen interrogator.

The program used for the study was capable of responding to vocal cues and taking multiple conversation paths depending on the subject's answers. The researchers were hoping to leverage the power of presence: the idea that people recognize another sentient being in the environment, and are more responsive as a result.
Bulb

Transition phase: NASA's Fermi finds a 'transformer' pulsar

© NASA's Goddard Space Flight Center
These artist's renderings show one model of pulsar J1023 before (top) and after (bottom) its radio beacon (green) vanished. Normally, the pulsar's wind staves off the companion's gas stream. When the stream surges, an accretion disk forms and gamma-ray particle jets (magenta) obscure the radio beam.
In late June 2013, an exceptional binary containing a rapidly spinning neutron star underwent a dramatic change in behavior never before observed. The pulsar's radio beacon vanished, while at the same time the system brightened fivefold in gamma rays, the most powerful form of light, according to measurements by NASA's Fermi Gamma-ray Space Telescope.

"It's almost as if someone flipped a switch, morphing the system from a lower-energy state to a higher-energy one," said Benjamin Stappers, an astrophysicist at the University of Manchester, England, who led an international effort to understand this striking transformation. "The change appears to reflect an erratic interaction between the pulsar and its companion, one that allows us an opportunity to explore a rare transitional phase in the life of this binary."

A binary consists of two stars orbiting around their common center of mass. This system, known as AY Sextantis, is located about 4,400 light-years away in the constellation Sextans. It pairs a 1.7-millisecond pulsar named PSR J1023+0038 -- J1023 for short -- with a star containing about one-fifth the mass of the sun. The stars complete an orbit in only 4.8 hours, which places them so close together that the pulsar will gradually evaporate its companion.

Comment: For a lot more information about our 'electric universe' including solar cycles, plasma phenomenon, the Sun's dark companion and the cyclical impact on humanity, read: Earth Changes and the Human Cosmic Connection: The Secret History of the World - Book 3

Robot

The third machine age could destroy us

Robot Caregiver
© American Psychological Association
There have been one and a half machine ages already. The first began in the nineteenth century, with machines taking over manual labor. Then in the twentieth century machines began taking over mental labor (they still are). When the third age comes, says one sociologist, we're doomed.

Sociologist Zeynep Tufekci has written an interesting article in response to the idea that we need robots to do "emotional labor" like caring for children and the elderly. She identifies the third machine age as one where machines take over the realm of emotional labor, whether that's teaching Kindergarten or working as a nurse.

Basically, she's using emotional labor as shorthand to describe a broad range of caretaking professions, especially in heath and medicine, that are currently booming.

Though she worries about handing over this deeply human kind of work to machines, she makes a deeper point about why this third machine age may be the last. Because it continues in the tradition of our previous machine ages, which have all eliminated jobs and created massive unemployment and social unrest.
Magnify

Are sterile neutrinos lurking in the Universe?

Universe
© WGBH Educational Foundation
searching the Universe for sterile neutrinos

A completely new subatomic particle - one so reclusive and strange that it passes undetected through ordinary matter - could be lurking in the universe.


If so, a detector set to turn on later this year could find the first convincing evidence for the particle, called a sterile neutrino. The new experiment, whose 30-ton detector was recently lowered into place at Fermi National Accelerator Laboratory in Illinois, will look for traces of this elusive particle transforming into another type of neutrino.

Unlike the Higgs boson, the particle thought to explain why other particles have mass and which most physicists predicted should exist for decades, sterile neutrinos would be in the realm of completely unknown physics that only some physicists believe exist, said Bonnie Fleming, the experiment's spokeswoman and a physicist at Yale University. "It would be completely revolutionary," Fleming said.
Cookie

Canvas fingerprinting: The online tracking device virtually impossible to block

man and code
© www.veooz.com
Researchers found canvas fingerprinting computer code, primarily written by a company called AddThis , on 5% of the top 100,000 websites.
A new, extremely persistent type of online tracking is shadowing visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.com.

First documented in a forthcoming paper by researchers at Princeton University and KU Leuven University in Belgium, this type of tracking, called canvas fingerprinting, works by instructing the visitor's Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user's device a number that uniquely identifies it.
Like other tracking tools, canvas fingerprints are used to build profiles of users based on the websites they visit - profiles that shape which ads, news articles, or other types of content are displayed to them. But fingerprints are unusually hard to block: They can't be prevented by using standard Web browser privacy settings or using anti-tracking tools such as AdBlock Plus.
The researchers found canvas fingerprinting computer code, primarily written by a company called AddThis, on 5 percent of the top 100,000 websites. Most of the code was on websites that use AddThis' social media sharing tools. Other fingerprinters include the German digital marketer Ligatus and the Canadian dating site Plentyoffish. (A list of all the websites on which researchers found the code is here).

Rich Harris, chief executive of AddThis, said that the company began testing canvas fingerprinting earlier this year as a possible way to replace "cookies," the traditional way that users are tracked, via text files installed on their computers.

Comment: You are being tracked online and offline by email addresses given at walk-in retail stores, advertisers tracking your real name through onboarding services, routine purchase tracking, and matching online and offline identities by data brokers. These are some of the known mechanisms. What else are they doing? A BIG OPT-OUT anyone? Here's one: AddThis opt-out

Top