×
Space

How a Billion-Dollar Satellite Risks Upending the Space Insurance Industry (yahoo.com) 86

"Viasat Inc. has more than $1 billion of orbiting satellites in trouble," reports Bloomberg, "and space insurers are girding for market-rattling claims." The company's roughly $1 billion ViaSat-3 Americas satellite, central to expanding its fixed-broadband coverage and fending off rivals including Elon Musk's Starlink, suffered an unexpected problem as it deployed its antenna in orbit in April. Should Viasat declare it a total loss, industry executives estimate the claim would reach a record-breaking $420 million and, in turn, make it harder — and more expensive — for other satellite operators to get insurance... Viasat on Aug. 24 reported another stricken spacecraft, saying its Inmarsat-6 F2 satellite launched in February suffered a power problem. The failure may end the craft's useful life and result in a $350 million insurance claim, Space Intel Report said.

Viasat's troubles in orbit come a few years after big-name insurers like American International Group Inc. and Allianz SE have shuttered their space portfolios. That's left a smaller pool of providers to absorb the risks in the notoriously high-stakes $553 million market...

Following news of the Inmarsat-6 anomaly, Viasat and other industry participants "will likely experience significant challenges with obtaining insurance for future satellite launches," [investment banking firm] William Blair's Louie DiPalma said in an Aug. 25 note... In 2019, the total losses from satellite claims amounted to $788 million, which overwhelmed the total premiums for the year at $500 million, according to launch and satellite database Seradata. In the years that followed, big names like American International Group Inc., Swiss Re AG, and Allianz SE all closed the door on satellite insurance.

Earlier this month Viasat's CEO says before deciding whether they'll file a claim, "There's no consequences to us taking another couple or three months to get good measurements and then making those decisions."
IT

Samsung Unveils Industry's First 32Gbit DDR5 Memory Die (anandtech.com) 17

Samsung today revealed the world's first 32 Gb DDR5 DRAM die. From a report: The new memory die is made on the company's 12 nm-class DRAM fabrication process and not only offers increased density, but also lowers power consumption. The chip will allow Samsung to build record 1 TB RDIMMs for servers as well as lower costs of high-capacity memory modules. "With our 12nm-class 32 Gb DRAM, we have secured a solution that will enable DRAM modules of up to 1 TB, allowing us to be ideally positioned to serve the growing need for high-capacity DRAM in the era of AI (Artificial Intelligence) and big data," said SangJoon Hwang, executive vice president of DRAM product & technology at Samsung Electronics.

32 Gb memory dies not only enable Samsung to build a regular, single-rank 32 GB module for client PCs using only eight single-die memory chips, but they also allow for higher capacity DIMMs that were not previously possible. We are talking about 1 TB memory modules using 40 8-Hi 3DS memory stacks based on eight 32 Gb memory devices. Such modules may sound overkill, but for artificial intelligence (AI), Big Data, and database servers, more DRAM capacity can easily be put to good use. Eventually, 1TB RDIMMs would allow for up to 12 TB of memory in a single socket server (e.g. AMD's EPYC 9004 platform), something that cannot be done now.

Government

IBM Returns To the Facial Recognition Market 17

During the Black Lives Matter protests in 2020, IBM announced that it would no longer offer "general purpose" facial recognition technology due to concerns about racial profiling, mass surveillance, and other human rights violations. Now, according to The Verge and Liberty Investigates, "IBM signed a $69.8 million contract with the British government to develop a national biometrics platform that will offer a facial recognition function to immigration and law enforcement officials." From the report: A contract notice for the Home Office Biometrics Matcher Platform outlines how the project initially involves developing a fingerprint matching capability, while later stages introduce facial recognition for immigration purposes -- described as "an enabler for strategic facial matching for law enforcement." The final stage of the project is described as delivery of a "facial matching for law enforcement use-case." The platform will allow photos of individuals to be matched against images stored on a database -- what is sometimes known as a "one-to-many" matching system. In September 2020, IBM described such "one-to-many" matching systems as "the type of facial recognition technology most likely to be used for mass surveillance, racial profiling, or other violations of human rights."

IBM spokesman Imtiaz Mufti denied that its work on the contract was in conflict with its 2020 commitments. "IBM no longer offers general-purpose facial recognition and, consistent with our 2020 commitment, does not support the use of facial recognition for mass surveillance, racial profiling, or other human rights violations," he said. "The Home Office Biometrics Matcher Platform and associated Services contract is not used in mass surveillance. It supports police and immigration services in identifying suspects against a database of fingerprint and photo data. It is not capable of video ingest, which would typically be needed to support face-in-a-crowd biometric usage."

Human rights campaigners, however, said IBM's work on the project is incompatible with its 2020 commitments. Kojo Kyerewaa of Black Lives Matter UK said: "IBM has shown itself willing to step over the body and memory of George Floyd to chase a Home Office contract. This won't be forgotten." Matt Mahmoudi, PhD, tech researcher at Amnesty International, said: "The research across the globe is clear; there is no application of one-to-many facial recognition that is compatible with human rights law, and companies -- including IBM -- must therefore cease its sale, and honor their earlier statements to sunset these tools, even and especially in the context of law and immigration enforcement where the rights implications are compounding."
Transportation

Airline Close Calls Happen Far More Often in the US Than Previously Known (yahoo.com) 36

The New York Times explores harrowing stories about recent airplane near-miss "close calls" on U.S. runways: The incidents — highlighted in preliminary F.A.A. safety reports but not publicly disclosed — were among a flurry of at least 46 close calls involving commercial airlines last month alone... While there have been no major U.S. plane crashes in more than a decade, potentially dangerous incidents are occurring far more frequently than almost anyone realizes — a sign of what many insiders describe as a safety net under mounting stress. So far this year, close calls involving commercial airlines have been happening, on average, multiple times a week, according to a Times analysis of internal F.A.A. records, as well as thousands of pages of federal safety reports and interviews with more than 50 current and former pilots, air traffic controllers and federal officials.

The incidents often occur at or near airports and are the result of human error, the agency's internal records show... The close calls have involved all major U.S. airlines and have happened nationwide... In addition to the F.A.A. records, The Times analyzed a database maintained by NASA that contains confidential safety reports filed by pilots, air traffic controllers and others in aviation. The analysis identified a similar phenomenon: In the most recent 12-month period for which data was available, there were about 300 accounts of near collisions involving commercial airlines... One problem is that despite repeated recommendations from safety authorities, the vast majority of U.S. airports have not installed warning systems to help prevent collisions on runways.

But the most acute challenge, The Times found, is that the nation's air traffic control facilities are chronically understaffed. While the lack of controllers is no secret — the Biden administration is seeking funding to hire and train more — the shortages are more severe and are leading to more dangerous situations than previously known. As of May, only three of the 313 air traffic facilities nationwide had enough controllers to meet targets set by the F.A.A. and the union representing controllers, The Times found. Many controllers are required to work six-day weeks and a schedule so fatiguing that multiple federal agencies have warned that it can impede controllers' abilities to do their jobs properly.

Medicine

Blue-Blocking Glasses Might Not Do Much of Anything, Says New Review 36

According to a new study of studies, researchers have concluded that blue light-filtering eyeglasses might not deliver on claims made by advertisers or optometrist offices. NewAtlas reports: To reach their conclusion, researchers at the University of Melbourne with colleagues from Monash University, and City, University of London looked at 17 published studies from six different countries relating to the use of eyeglasses that block blue light. The randomized control studies ranged in size from five to 156 participants and each took place over a time period of just less than one day to five weeks. They found that based on the current research, nothing conclusive could be said about the benefits of blue-light-blocking glasses on overall eye health, sleep quality, or visual performance. This is despite the facts that there are a range of advertising claims regarding these very benefits, and that such lenses are often prescribed for patients based on their alleged efficacy.

Downie and her team are quick to point out that even with such a comprehensive review of the current research on blue-blocking glasses, it would take a much larger study to reach truly valuable data about the use of such specs. One of the issues they point out is that none of the studies reviewed had long enough follow-up periods for the researchers to make conclusions about the long-term use of the glasses. Singh also points out that even without larger, longer, and more rigorous studies, the efficacy of blue-light-blocking glasses remains dubious. "The amount of blue light our eyes receive from artificial sources, such as computer screens, is about a thousandth of what we get from natural daylight," he said. "It's also worth bearing in mind that blue-light filtering lenses typically filter out about 10-25% of blue light, depending on the specific product. Filtering out higher levels of blue light would require the lenses to have an obvious amber tint, which would have a substantial effect on color perception."
The new study has been published in the Cochrane Database of Systematic Reviews.
Security

Discord.io Temporarily Shuts Down After Breach Affecting 760,000 Members (bleepingcomputer.com) 3

Long-time Slashdot reader destinyland shares a report from BleepingComputer: The Discord.io custom invite service has temporarily shut down after suffering a data breach exposing the information of 760,000 members. Discord.io is not an official Discord site but a third-party service allowing server owners to create custom invites to their channels. Most of the community was built around the service's Discord server, with over 14,000 members.

Yesterday, a person known as 'Akhirah' began offering the Discord.io database for sale on the new Breached hacking forums. As proof of the theft, the threat actor shared four user records from the database. The most sensitive information in the breach is a member's username, email address, billing address (small number of people), salted and hashed password (small number of people), and Discord ID. "This information is not private and can be obtained by anyone sharing a server with you. Its inclusion in the breach does, however, mean that other people might be able to link your Discord account to a given email address," Discord.io explained about the leaking of Discord IDs.

Crime

Serial Murders Have Dwindled, Thanks To a Cautious Citizenry and Improved Technology (nytimes.com) 184

An anonymous reader quotes a report from the New York Times: Rex Heuermann, the meticulous architectural consultant who the authorities say murdered three women and buried them on a Long Island beach more than a decade ago, may have been among the last of the dying breed of American serial killers. Even as serial killers came to inhabit a central place in the nation's imagination -- inspiring hit movies, television shows, books, podcasts and more -- their actual number was dwindling dramatically. There were once hundreds at large, and a spike in the 1970s and '80s terrified the country. Now only a handful at most are known to be active, researchers say. The techniques that led to the arrest of Mr. Heuermann, who has pleaded not guilty to the crimes, help explain the waning of serial killing, which the F.B.I. defines as the same person killing two or more victims in separate events at different times.

It is harder to hide. Rapid advances in investigative technology, video and other digital surveillance tools, as well as the ability to analyze mountains of information, quickly allow the authorities to find killers who before would have gone undetected. At the same time, Americans have adopted more cautious habits in their everyday lives -- hitchhiking, for example, is less common, and children are driven to and from school. That reduces easy targets. And, some theorize, those bent on killing now opt for spectacular mass murders. "The 'perfect crime' concept is more of a concept than it ever has been before," said Adam Scott Wandt, an assistant professor at John Jay College of Criminal Justice. More than a decade ago, prosecutors said, Mr. Heuermann tried to cover his digital tracks by communicating with victims using so-called burner phones, prepaid units purchased anonymously for temporary use. But thanks to exponential progress in technology since 2010, investigators were able not only to chart Mr. Heuermann's decade-old movements; they could also monitor exactly what he was searching online in recent months. They saw that he was using an anonymous account for internet queries like "Why could law enforcement not trace the calls made by the long island serial killer," prosecutors said. He had also been visiting massage parlors and contacting women working as escorts, they said.

The ubiquity of technology has made it harder to get away with murder, Mr. Wandt said. The amount of data people create in their daily lives is more than many can conceptualize, he said. Just by walking outside, people are now tracked by ever-present cameras, from Amazon's Ring units outside homes to surveillance at banks and retail stores, he said. Every use of a phone or computer creates streams of data that are collected directly on devices or immortalized on servers, he said. A concerted effort by the federal government to ensure that even the smallest police departments can use technology to their benefit has also helped give investigators an upper hand, Mr. Wandt said. In 1987, there were 198 known active serial killers -- people connected to at least two murders -- and 404 known victims across the United States, according to a report published three years ago by researchers who run Radford University and Florida Gulf Coast University's Serial Killer Database. By 2018, there were only 12 known serial killers and 44 victims, according to the report.
"The big question is: Are they going underground and finding other techniques?â said Terence Leary, an associate professor in the psychology department at Florida Gulf Coast University and the team leader for the database.

He said that some serial murderers have killed for discrete periods before taking prolonged breaks: "Maybe they decided to give it up. Who knows?"
Security

Spyware Maker LetMeSpy Shuts Down After Hacker Deletes Server Data (techcrunch.com) 20

An anonymous reader quotes a report from TechCrunch: Poland-based spyware LetMeSpy is no longer operational and said it will shut down after a June data breach wiped out its servers, including its huge trove of data stolen from thousands of victims' phones. In a notice on its website in both English and Polish, LetMeSpy confirmed the "permanent shutdown" of the spyware service and that it would cease operations by the end of August. The notice said LetMeSpy is blocking users from logging in or signing up with new accounts. A separate notice on LetMeSpy's former login page, which no longer functions, confirmed earlier reports that the hacker who breached the spyware operation also deleted the data on its servers. "The breach consisted of unauthorized access to the LetMeSpy website's database, downloading and at the same time deleting data from the website by the author of the attack," the notice reads. LetMeSpy's app no longer functions, a network traffic analysis by TechCrunch shows, and the spyware maker's website no longer provides the spyware app for download.

LetMeSpy was an Android phone monitoring app that was purposefully designed to stay hidden on a victim's phone home screen, making the app difficult to detect and remove. When planted on a person's phone -- often by someone with knowledge of their phone passcode -- apps like LetMeSpy continually steal that person's messages, call logs and real-time location data. A copy of the database was obtained by nonprofit transparency collective DDoSecrets, which indexes leaked datasets in the public interest, and shared with TechCrunch for analysis. The data showed that LetMeSpy, until recently, had been used to steal data from more than 13,000 compromised Android devices worldwide, though LetMeSpy's website claimed prior to the breach that it controlled more than 236,000 devices. The database also contained information that shows the spyware was developed by a Krakow-based tech company called Radeal, whose chief executive Rafal Lidwin did not respond to a request for comment.

Privacy

Brave Cuts Ties With Bing To Offer Its Own Image and Video Search Results (theregister.com) 14

Brave Software, maker of the Brave web browser, has tuned its search engine to run on a homegrown index of images and videos in an effort to end its dependency on "Big Tech" rivals. The Register reports: On Thursday, the company said that image and video results from Brave Search -- available on the web at search.brave.com and via its browser -- will be served from Brave's own index. Search indexes are made by visiting online resources -- typically web pages, images, videos, or other files -- with a crawler bot and recording the locations of these resources in a database. And when an internet user submits a query to a search engine, the search engine checks its index (and possible other sources) to find the addresses of resources that correspond to the query keywords. There's actually a lot more to it but that's the basic idea.

Brave now aims to ride the wave of discontent with "Big Tech" by highlighting its commitment to privacy and independence â" small tech. "Brave Search is 100 percent private and anonymous, which sets a high bar for image/video search to meet," the company said in a blog post provided to The Register. "Whether it's a matter of personal safety or personal preference, users should be able to discover content without their search engine reporting and profiling those results to a Big Tech company." [...] Brave argues that having its own index frees the company from content decisions made by others.
"Brave is on a mission to build a user-first Web," the company said in its blog post. "That mission starts with the Brave browser and Brave Search. With the release of image and video search, we're continuing to innovate within the search industry, providing viable and preferable products for users who want choice and transparency in their search for information online."
The Internet

AWS To Start Charging For Public IPv4 Addresses (theregister.com) 140

Long-time Slashdot reader nairnr shares a report from The Register: Cloud giant AWS will start charging customers for public IPv4 addresses from next year, claiming it is forced to do this because of the increasing scarcity of these and to encourage the use of IPv6 instead. It is now four years since we officially ran out of IPv4 ranges to allocate, and since then, those wanting a new public IPv4 address have had to rely on address ranges being recovered, either from from organizations that close down or those that return addresses they no longer require as they migrate to IPv6.

If Amazon's cloud division is to be believed, the difficulty in obtaining public IPv4 addresses has seen the cost of acquiring a single address rise by more than 300 percent over the past five years, and as we all know, the business is a little short of cash at the moment, so is having to pass these costs on to users. "This change reflects our own costs and is also intended to encourage you to be a bit more frugal with your use of public IPv4 addresses and to think about accelerating your adoption of IPv6 as a modernization and conservation measure,' writes AWS Chief Evangelist Jeff Barr, on the company news blog.

The update will come into effect on February 1, 2024, when AWS customers will see a charge of $0.005 (half a cent) per IP address per hour for all public IPv4 addresses. These charges will apparently apply whether the address is attached to a service or not, and like many AWS charges, appear inconsequential at first glance but can mount up over time if a customer is using many of them. These charges will apply to all AWS services including EC2, Relational Database Service (RDS) database instances, Elastic Kubernetes Service (EKS) nodes, and will apply across all AWS regions, the company said. However, customers will not be charged for IP addresses that they own and bring to AWS using Amazon's BYOIP feature. AWS offers a free tier for EC2, and this will include 750 hours of public IPv4 address usage per month for the first 12 months, starting from the same date the charges do.

AI

AI Watches Millions of Cars and Tells Cops if You Might Be a Criminal (forbes.com) 155

Forbes' senior writer on cybersecurity writes on the "warrantless monitoring of citizens en masse" in the United States.

Here's how county police armed with a "powerful new AI tool" identified the suspicious driving pattern of a grey Chevy owned by David Zayas: Searching through a database of 1.6 billion license plate records collected over the last two years from locations across New York State, the AI determined that Zayas' car was on a journey typical of a drug trafficker. According to a Department of Justice prosecutor filing, it made nine trips from Massachusetts to different parts of New York between October 2020 and August 2021 following routes known to be used by narcotics pushers and for conspicuously short stays. So on March 10 last year, Westchester PD pulled him over and searched his car, finding 112 grams of crack cocaine, a semiautomatic pistol and $34,000 in cash inside, according to court documents. A year later, Zayas pleaded guilty to a drug trafficking charge.

The previously unreported case is a window into the evolution of AI-powered policing, and a harbinger of the constitutional issues that will inevitably accompany it... Westchester PD's license plate surveillance system was built by Rekor, a $125 million market cap AI company trading on the NASDAQ. Local reporting and public government data reviewed by Forbes show Rekor has sold its ALPR tech to at least 23 police departments and local governments across America, from Lauderhill, Florida to San Diego, California. That's not including more than 40 police departments across New York state who can avail themselves of Westchester County PD's system, which runs out of its Real-Time Crime Center... It also runs the Rekor Public Safety Network, an opt-in project that has been aggregating vehicle location data from customers for the last three years, since it launched with information from 30 states that, at the time, were reading 150 million plates per month. That kind of centralized database with cross-state data sharing, has troubled civil rights activists, especially in light of recent revelations that Sacramento County Sheriff's Office was sharing license plate reader data with states that have banned abortion...

The ALPR market is growing thanks to a glut of Rekor rivals, including Flock, Motorola, Genetec, Jenoptik and many others who have contracts across federal and state governments. They're each trying to grab a slice of a market estimated to be worth at least $2.5 billion... In pursuit of that elusive profit, the market is looking beyond law enforcement to retail and fast food. Corporate giants have toyed with the idea of tying license plates to customer identities. McDonalds and White Castle have already begun using ALPR to tailor drive-through experiences, detecting returning customers and using past orders to guide them through the ordering process or offer individualized promotion offers. The latter restaurant chain uses Rekor tech to do that via a partnership with Mastercard.

A senior staff attorney at the ACLU tells Forbes that "The scale of this kind of surveillance is just incredibly massive."

Thanks to long-time Slashdot reader Geek_Cop for sharing the article.
Games

Ubisoft Will Suspend and Then Delete Long-Inactive Accounts (pcgamer.com) 51

Leaving a Ubisoft account inactive for too long "apparently puts it at risk of permanent deletion," writes PC Gamer, calling the policy "a customer-unfriendly practice." A piracy and anti-DRM focused Twitter account, PC_enjoyer, recently shared a screenshot of a Ubisoft support email telling the user that their Ubisoft account had been suspended for "inactivity," and would be "permanently closed" after 30 days. The email provided a link to cancel the move. Now, that sounds like a phishing scam, right? I and many commenters wondered that, looking at the original post, but less than a day later, Ubisoft's verified support account responded to the tweet, seemingly confirming the screenshotted email's legitimacy.

"You can avoid the account closure by logging into your account within the 30 days (since receiving the email pictured) and selecting the Cancel Account Closure link contained in the email," Ubisoft Support wrote. "We certainly do not want you to lose access to your games or account so if you have any difficulties logging in then please create a support case with us."

I was unable to find anything regarding account closure for inactivity in Ubisoft's US terms of use or its end user licence agreement, but the company does reserve the right to suspend or end services at any time. Ubisoft has a support page titled "Closure of inactive Ubisoft accounts." The page first describes instances where the service clashes with local data privacy laws, then reads: "We may also close long-term inactive accounts to maintain our database. You will be notified by email if we begin the process of closing your inactive account."

This page links to another dedicated to voluntarily closing one's Ubisoft account, and seems to operate by the same rules: a 30-day suspension before permanent deletion. "As we will be unable to recover the account once it has been closed, we strongly recommend only putting in the request if you are absolutely sure you would like to close your account."

"If you have a good spam filter or just reasonably assume it's a phishing attempt, then you might one day try your old games and find they're just gone," worries long-time Slashdot reader Baron_Yam. "If you're someone who still plays games from decades ago every so often, this is a scenario you might want to think about."

The site Eurogamer reports that when a Twitter user complained that "I lost my Ubisoft account, and all the Ubisoft Steam game[s] I've bought are now useless", Ubisoft Support "responded to say that players can raise a ticket if they would like to recover their account."

The original tweet now includes this "reader-added context" supplied by other Twitter users — along with three informative links: For added context, Ubisoft can be required under certain data protection laws, such as the GDPR, to close inactive accounts if they deem the data no longer necessary for collection.

Ubisoft has claimed they don't close accounts that are inactive for less than 4 years.

Microsoft

Microsoft Launches Vector Search in Preview, Voice Cloning in General Availability (techcrunch.com) 4

At its annual Inspire conference, Microsoft announced a number of new AI features headed to Azure, perhaps the most notable of which is Vector Search. From a report: Available in preview through Azure Cognitive search, Vector Search uses machine learning to capture the meaning and context of unstructured data, including images and text, to make search faster. Vectorization, an increasingly popular technique in search, involves converting words or images into vectors, or series of numbers, that encode their meaning -- allowing them to be processed mathematically. Vectors enable machines to structure and make sense of data, enabling them to understand, for example, that words close together in "vector space" -- like "king" and "queen" -- are related and quickly surface them from a database of millions of words.

[...] Rounding out the AI unveilings at Inspire, Microsoft announced the public preview of Real-time Diarization, an AI-driven speech service that can identify which of several people are speaking in real time. The company also announced the general availability of Custom Neural Voice, which taps AI to closely reproduce an actor's voice or create an original synthetic voice. Previously, Custom Neural Voice was in limited access, meaning that customers had to apply and be approved by Microsoft in order to use it.

China

TikTok Executive Admits Australian Users' Data Accessed By Employees In China (theguardian.com) 15

An anonymous reader quotes a report from The Guardian: Australian user data is accessible to TikTok employees based in China on a "very strict basis," the company's head of data security, Will Farrell, has said. In their first public appearance before Australian members of parliament since the government joined Canada, the US and the UK in banning TikTok from government-owned devices amid concerns about the company's connections to China, TikTok executives were questioned at length by a parliamentary committee examining foreign interference on social media. Liberal senator and chair of the committee James Paterson, who has led the opposition's push against the app, questioned how many times Australian user data had been accessed by TikTok staff based within China. Farrell could not provide the number immediately, but admitted it did happen.

Farrell said there were "a number of protections in place", including that employees only get the minimum amount of access to data to do their job, and when they access that data they need to provide a business justification that needs to be approved by their manager and the database owner within TikTok. If the data is being accessed across a national border, it has to be approved by the global security team based in the US, which also monitors all data access. "Employees can't get access without a clear justification and levels of approval," Farrell said. A similar security review would apply if an employee based in China tried to change the recommendations algorithm, he said.

The company's local head of public policy, Ella Woods-Joyce, said China's 2017 national security law -- which requires companies to give the government any personal data relevant to national security -- would apply to any company that had operations and staff in China. When asked on what ground TikTok would refuse to comply with the law, Woods-Joyce said TikTok had never been asked for personal data by the Chinese government and would refuse if asked. [...] It was revealed in December that employees had used the app to attempt to identify the source of a leak to journalists. Hunter told the committee that he stood by the sentiments expressed in his original article, and blamed "rogue employees" who had since been fired from the company for accessing the data. He said "serious misconduct from these rogue employees" had taken place. He said GPS location information was not collected in Australia.

Medicine

Dispute Over Database Use Could Disrupt US Organ Transplant System (wric.com) 20

"The flow of lifesaving organs to 63 U.S. transplant centers could be disrupted..." reported the Washington Post on Monday, "by a dispute over the use of data."

Or, as a local news station WRIC puts it, "Two entities dedicated to fighting to save lives through organ transplant operations are now fighting with each other." Buckeye Transplant Services filed a lawsuit against the United Network for Organ Sharing — or UNOS — on July 3 after the Richmond-based non-profit accused the transplant screening service of putting donor and patient privacy at risk.

UNOS claimed Buckeye did so by using technology to gain unauthorized, improper access to a DonorNet database. Buckeye denied any wrongdoing and insisted that the company has always complied with data accessibility protocol... This isn't UNOS's first controversy, but the reason this particular debate has become high-profile is due to rumors that it could impact transplant operations. Prior to the lawsuit, UNOS threatened to cut off Buckeye's access to data necessary for its operation. UNOS still insists that no transplant program will experience any interruptions in receiving organ offers as a result of the dispute. However, Buckeye warned that if it loses access to crucial data, 63 hospitals across the country — two in Virginia — could have to take on extra burdens.

One of those healthcare systems, the University of Virginia's Transplant Center, told 8News that its team is closely monitoring the situation and is already coming up with plans to prevent any legal hiccups from interrupting the lifesaving organ donation process.

Buckeye was involved in over 13% of America's organ transplants in 2022, according to figures cited by the Washington Post. "Buckeye said it is doing nothing wrong," according to the article, "and that other organizations across the transplant system act similarly." Meanwhile, UNOS's general counsel "stressed that cutting off Buckeye is a last resort in a negotiation that has been underway for two months," the Washington Post reported. "Certain features of Buckeye's electronic systems are capable of and have collected from UNOS systems various large volumes of patient-specific and facility-specific information related to transplant services," a UNOS attorney wrote to Buckeye on June 21. Livingston, the UNOS general counsel, said in an interview that the data belongs to UNOS and that transplant centers are able to obtain it from the organization if they want it. But Buckeye is not allowed to collect it in bulk and sell it to its customers. He said if Buckeye retrieves and "scrapes" the data, UNOS does not know how well it is secured, whether it is being "misused or mishandled" and how it is being stored. He also said Buckeye could create an alternate database with the information.
On Tuesday the Washington Post reported that UNOS had issued a two-week extension (through July 19): Anne Paschke, a spokesperson for UNOS, said the group provided the extension to "allow the court an appropriate amount of time" to consider the company's request for a temp restraining order. "We are confident in our position," Paschke said... Buckeye sued UNOS in federal court on Monday seeking an injunction that would stop the nonprofit group from blocking its access to the national transplant database system...

[The U.S. Health Resources and Services Administration] unveiled plans in March to overhaul the transplant system, including changes to the 37-year monopoly UNOS has held as manager of the organ database... Buckeye is potentially interested in bidding for a part of the contract UNOS now holds, according to company representatives. Its lawsuit contends UNOS "has monopolistic intent to squash the development of technology that could eventually supplant" the UNOS transplant system.

Thanks to long-time Slashdot reader belmolis for sharing the article.
Privacy

Bangladesh Government Website Leaks Citizens' Personal Data (techcrunch.com) 3

A Bangladeshi government website leaked the personal information of citizens, including full names, phone numbers, email addresses and national ID numbers. TechCrunch reports: Viktor Markopoulos, a researcher who works for Bitcrack Cyber Security, said he accidentally discovered the leak on June 27, and shortly after contacted the Bangladeshi e-Government Computer Incident Response Team (CERT). He said the leak includes data of millions of Bangladeshi citizens. TechCrunch was able to verify that the leaked data is legitimate by using a portion to query a public search tool on the affected government website. By doing this, the website returned other data contained in the leaked database, such as the name of the person who applied to register, as well as -- in some cases -- the name of their parents. We attempted this with 10 different sets of data, which all returned correct data.

TechCrunch is not naming the government website because the data is still available online, according to Markopoulos, and we haven't heard back from any of the Bangladeshi government organizations that we emailed asking for comment and alerting of the data exposure. In Bangladesh, every citizen aged 18 and older is issued a National Identity Card, which assigns a unique ID to every citizen. The card is mandatory and gives citizens access to several services, such as getting a driver's license, passport, buying and selling land, opening a bank account, and others.

Markopoulos said finding the data "was too easy." "It just appeared as a Google result and I wasn't even intending on finding it. I was Googling an SQL error and it just popped up as the second result," he told TechCrunch, referring to SQL, a language designed for managing data in a database. The exposure of email addresses, phone numbers and national ID card numbers is bad on its own, but Markopoulos said that having this type of information could also "be used in the web application to access, modify, and/or delete the applications as well as view the Birth Registration Record Verification."

News

Why Human Societies Still Use Arms, Feet, and Other Body Parts To Measure Things (science.org) 199

Body-based measurements may have persisted because they are convenient and offer ergonomic advantages over standardized units. From a report: Although standardized units are often upheld as superior to informal corporeal measures, people in many societies have continued to use their bodies this way well after standardization has taken root, notes Roope Kaaronen, a cognitive scientist who studies cultural evolution at the University of Helsinki. To explore how widespread such practices have been in human history, Kaaronen and colleagues pored over ethnographic data from 186 past and present cultures across the world, looking for descriptions of body-based units of measurement in a database called the Human Relations Area Files. This database is the product of an international nonprofit organization that has been collecting and administering ethnographies and anthropological literature since the 1950s.

The team found these systems used in every culture they looked at, particularly in the construction of clothes and technologies. For example, in the early 1900s, the Karelian people, a group indigenous to Northern Europe, traditionally designed skis to be a fathom plus six hand spans long. In the late 1800s the Yup'ik people from the Alaskan coast recorded building kayaks that were 2.5 fathoms long plus a cockpit, which was the length of an arm with a closed fist. Next, the team looked at a subsample of 99 cultures that, according to a widely used benchmark in anthropology, developed relatively independently of one another. Fathoms, hand spans, and cubits were the most common body-based measurements, each popping up in about 40% of these cultures. Different societies likely developed and incorporated such units because they were especially convenient for tackling important everyday tasks, the authors argue, such as measuring clothes, designing tools and weapons, and building boats and structures.

AI

Should UK Stores Use Facial Recognition Tech to Fight Shoplifting? (yahoo.com) 109

The New York Times tells the story of Simon Mackenzie, a security officer at a U.K. discount store uploading security camera footage of shoplifters into a facial recognition program called Facewatch. "The next time those people enter any shop within a few miles that uses Facewatch, store staff will receive an alert."

Facewatch — now in nearly 400 stores across Britain — licenses facial recognition software made by Real Networks and Amazon. Though it only sends alert about repeat offenders, "Once added, a person remains there for a year before being deleted." For as little as 250 pounds a month, or roughly $320, Facewatch offers access to a customized watchlist that stores near one another share. When Facewatch spots a flagged face, an alert is sent to a smartphone at the shop, where employees decide whether to keep a close eye on the person or ask the person to leave. Mr. Mackenzie adds one or two new faces every week, he said, mainly people who steal diapers, groceries, pet supplies and other low-cost goods. He said their economic hardship made him sympathetic, but that the number of thefts had gotten so out of hand that facial recognition was needed. Usually at least once a day, Facewatch alerts him that somebody on the watchlist has entered the store...

Among democratic nations, Britain is at the forefront of using live facial recognition, with courts and regulators signing off on its use. The police in London and Cardiff are experimenting with the technology to identify wanted criminals as they walk down the street. In May, it was used to scan the crowds at the coronation of King Charles III. But the use by retailers has drawn criticism as a disproportionate solution for minor crimes. Individuals have little way of knowing they are on the watchlist or how to appeal. In a legal complaint last year, Big Brother Watch, a civil society group, called it "Orwellian in the extreme...." Madeleine Stone, the legal and policy officer for Big Brother Watch, said Facewatch was "normalizing airport-style security checks for everyday activities like buying a pint of milk."

There is a human in the loop, the article points out. "Every time Facewatch's system identifies a shoplifter, a notification goes to a person who passed a test to be a 'super recognizer' — someone with a special talent for remembering faces. Within seconds, the super recognizer must confirm the match against the Facewatch database before an alert is sent."

The company's founder tells the Times that in general, "mistakes are rare but do happen... If this occurs, we acknowledge our mistake, apologize, delete any relevant data to prevent reoccurrence and offer proportionate compensation."

And the article adds this official response from the U.K. government: Fraser Sampson, Britain's biometrics and surveillance camera commissioner, who advises the government on policy, said there was "a nervousness and a hesitancy" around facial recognition technology because of privacy concerns and poorly performing algorithms in the past. "But I think in terms of speed, scale, accuracy and cost, facial recognition technology can in some areas, you know, literally be a game changer," he said. "That means its arrival and deployment is probably inevitable. It's just a case of when."
Databases

FBI Forms National Database To Track and Prevent 'Swatting' (nbcnews.com) 71

According to NBC News, the FBI created a national online database in May to facilitate information sharing between hundreds of police departments and law enforcement agencies across the country pertaining to swatting incidents. From the report: No central agency has tracked swatting incidents or suspects in the U.S., so official statistics are not available. By 2019, there were an estimated 1,000 swatting incidents domestically each year, according to a report from the Anti-Defamation League, and each incident is estimated to cost at least $10,000 to affected communities, even before expenditures on follow-up work like investigations, property repairs and counseling. Swatting is increasingly enabled by technology that can be used to mask a caller's real voice, their phone number or IP address (also called "spoofing") or to make their false report sound more credible.

[Chief Scott Schubert with the bureau's Criminal Justice Information Services headquarters in Clarksburg, West Virginia] told NBC News that the FBI's new centralized database should help the agency "get that common picture of what's going on across our nation so we can learn from that." [...] While the earliest recorded case of swatting occurred in 2002, to this day, there is no specific law criminalizing swatting in the U.S., says John Jay's Shapiro. "Without a statute in place, there's no designated resources or training for investigating swatting incidents," she said. "And the 911 dispatchers do not have the resources and training they need to differentiate between actual emergencies and false reports."

Legally, the False Information and Hoaxes statute, also known as section 1038, is most frequently used to prosecute swatting. Other statutes can sometimes apply -- one pertaining to interstate threats involving explosives and another pertaining to interstate communications, which refers to extortion or threats to injure or kidnap somebody. "Too often, perpetrators are getting a slap on the wrist compared to the consequences suffered by their victims," Shapiro said.

The Courts

Lawsuit Says OpenAI Violated US Authors' Copyrights To Train AI Chatbot (reuters.com) 82

Two U.S. authors have filed a proposed class action lawsuit against OpenAI, claiming that the company infringed their copyrights by using their works without permission to train its generative AI system, ChatGPT. The plaintiffs, Massachusetts-based writers Paul Tremblay and Mona Awad, claim the data used to train ChatGPT included thousands of books, including those from illegal "shadow libraries." Reuters reports: The complaint estimated that OpenAI's training data incorporated over 300,000 books, including from illegal "shadow libraries" that offer copyrighted books without permission. Awad is known for novels including "13 Ways of Looking at a Fat Girl" and "Bunny." Tremblay's novels include "The Cabin at the End of the World," which was adapted in the M. Night Shyamalan film "Knock at the Cabin" released in February.

Tremblay and Awad said ChatGPT could generate "very accurate" summaries of their books, indicating that they appeared in its database. The lawsuit seeks an unspecified amount of money damages on behalf of a nationwide class of copyright owners whose works OpenAI allegedly misused.

Slashdot Top Deals