Baryshnikov Arts Center to Return to Live Performance in Spring – The New York Times

The Baryshnikov Arts Center will return to in-person performances this spring after two years of online programming.

The season features eight dance and music performances, with three presented virtually. The streamed performances are a part of the centers commissioning program, which began in fall 2020 as a way of sustaining the organization and encouraging artists to continue creating during the pandemic.

Cora Cahan, the centers president and chief executive, said the delay in the return to live performances was because of the postponement during the pandemic of a long-planned replacement of its buildings heating, ventilation and cooling systems.

Were going very slowly and carefully here because were moving back to having audiences on site for the first time in so long, Cahan said. Were thrilled to be planning for live performances in lock step with our commissioning program thats been so vibrant and dynamic since we began it almost two years ago.

The season is to open with two virtual presentations: the high-wire artist Philippe Petits Open Practice, about his creative process (Feb. 7-21); and a film and sound installation by the Toronto choreographer Peggy Baker, her body as words, inspired by Simone de Beauvoirs The Second Sex (Feb. 28-March 14).

The first live performances will be evenings of music by Chromic Duo, genre-fluid musicians who use prepared piano, toy piano and synthesizers (March 14-15); the violinist and producer Johnny Gandelsman, who will present the New York premiere of his project This Is America (March 16-17); and Andy Akiho, whose Seven Pillars, an evening-length work for percussion, will have its New York premiere (April 7-8).

Dance programming includes performances by Ashwini Ramaswamy (April 13-15), whose Let the Crows Come deconstructs the Bharatanatyam form, and the world premiere of Donna Uchizonos Wings of Iron (May 18-21). Both were originally scheduled for the centers spring 2020 season. A new dance film by Omar Romn De Jess will be presented virtually (April 25-May 9).

See the original post here:
Baryshnikov Arts Center to Return to Live Performance in Spring - The New York Times

Podcast 151: The Hackiest VR Glove, Plotting Boba Fett With Shoelaces, ECU Hacking, And Where Does Ammonia Come From? | Hackaday – Hackaday

Hackaday Editor-in-Chief Elliot Williams and Managing Editor Tom Nardi are back again to talk about all the weird and wonderful stories from our corner of the tech world. Canon had to temporarily give up on chipping their ink cartridges due to part shortages, and thats just too perfect to ignore. Theres also some good news for the International Space Station as the White House signals theyre ready to support the orbiting outpost until 2030.

Well also look at an extremely promising project to deliver haptic feedback for VR, programming bare-metal x86 with the Arduino IDE, and the incredible reverse engineering involved in adding a DIY autonomous driving system to a 2010 Volkswagen Golf. Finally well find out why most of the human life on this planet depends on a process that many people have never heard of, and learn about the long history of making cars heavier than they need to be.

Take a look at the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download

Read the rest here:
Podcast 151: The Hackiest VR Glove, Plotting Boba Fett With Shoelaces, ECU Hacking, And Where Does Ammonia Come From? | Hackaday - Hackaday

Android vs. iPhone Which One Is Right for You? – The Horn

With Google Android and Apple iOS making upmore than 99%of global smartphone shares, the question isnt which operating system (OS) is better, but which one is better for you. Each OS boasts similar features, and the characteristics that set them apart make them an equally valuable option. Whether you want a device with top-of-the-line security, premium design, affordability or a combination of qualities, there is a smartphone for you somewhere in Androids and Apples vast market of products.

Android vs. iPhone how do you choose? Both operating systems are continually evolving with each new update, and either will likely meet any casual phone users needs. Consider the following characteristics to understand better what you value in a device and which OS you should be shopping for.

Androids customizable interface and iOSs simplicity are both easy to use and adapt to when switching brands, but they do have some key differences:

Aesthetics

For many, the perfect smartphone must balance durability and ease of use with a sleek, attractive aesthetic. Designs have changed over the years while shoppers once flocked to stores over compact devices in neutral colors, todays phones offer larger, flat or curved edge designs in multiple colors, finishes and materials.

iPhones devices tend to look more premium across the board and are usually the most expensive as a result. Android offers a wider variety of appearances and sizes. Accessories also play an important part in aesthetics. While theyre readily available for most modern-day devices, its typically easier to find Apple cases and accessories than it is with Android since Android covers such a wide berth of manufacturers.

Open vs. Closed System

One of the most notable differences between the two operating systems is Androids open system and iOSs closed system. Androids operations are based on the Android Open Source Project, or AOSP, which lets users use source code to create or mod operating systems. Apple doesnt have an open-source code, though some elements are less closed than others. So, what does this look like for the average cell phone user?

iOS phones dont have bloatware like Android and nearly everything is written in the same coding language with advanced chipsets. This allows for a more fluid user experience and control over third-party resources. It also adds to Apples clean user aesthetic, minimizing a lot of home page and app clutter.

Android platforms may allow more third-party apps and multiple programming languages, but this makes it far more flexible and customizable than an iOS device. For example, unlike Apple devices, you can permanently change an Android phones defaults, like an email client or web browser.

Updates

Operating systems need regular updates to stay current with changing technology, retain app compatibility and patch security concerns. Keeping your devices up to date is also the easiest and most affordable way to stay current on tech evolution without buying a new phone every time a new feature is available.

Apple tends to offer more iOS updates than Google does for Android devices, and they offer updates and security support for devices for longer after launch than Android does.

Security

According to one survey,more than halfof todays cell phone users are worried about identity theft, fraud, stolen passwords, confusion and misinformation over data use, data sales, location tracking and undisclosed data collection online. A phones security depends on the apps it allows on its app store, how it handles your online browsing data, what protections are in place against malware and viruses and what third-party security apps are available for download.

Cost

While iOS is available only on Apple devices, you can find Android on a range of manufacturer devices, which gives Android users a larger selection of affordable options to choose from. While its often true that you get what you pay for iPhones cameras and premium design set it apart from its competitors their most affordable option is currently the$399 iPhone SE 2020, while Android hasseveral mid-range modelsavailable for far less.

If keeping costs low is your number one priority in a device, consider shopping thecertified refurbished smartphonemarket. At Gazelle, we have some of the most popular releases, including iOS and Android devices, available at lower prices. Each phone has undergone extensive quality checks for appearance and performance, and you never have to sign contracts or pay hidden fees.

Support

Ongoing support is an important part of smartphone ownership, especially if youre investing a lot of money into a new device. With more than270 Apple storesacross the United States, Apple is a leader in brand-to-consumer support. They also offer AppleCare, a comprehensive service plan, for an additional fee.

AppleCare includes features like:

While many Android manufacturers offer programs similar to AppleCare, you wont find quite as many retailers nearby, and some devices may not be eligible for a care plan.

An iPhone Might Be Right for You If

Are iPhones better than Android phones? Many people seem to think so. In addition to the various design options and premium feel that come with Apple smartphones, iOS users praise the vastness of Apples device ecosystem, the App Stores strict security standards and lack of problematic bloatware.

You Already Have Apple Products

Apple users are famouslyloyal to the brand they may just be the most loyal consumer base on todays market. Many believe iPhones are better than Androids because the sheer number of Apple items users can sync activity across. Taking a picture with your iPhone 12? You can easily move it to your Mac for editing. Copying an important address from your Safari browser? You can use Universal Clipboard to paste it to your phones GPS.

While many Android devices have similar integration features, its not nearly as vast as Apples family of iOS-enabled devices.

You Value Security and Privacy

Both operating systems have increasingly innovative and effective security features, but Apples closed-source system gives them more control over whats available on their platform and adds a layer of security against potentially invasive third parties. Much of Googles business model rests on collecting user data to create more customized browsing experiences, while Apple has little need for the same level of browsing data. Their frequent OS updates mean they can also address any developing concerns more quickly than Androids slower OS update releases.

Regardless of which operating system youre using, you should take proactive steps to protect your information, such as:

You Want All the Apps Without the Bloatware

Apples App Store has4.3 million apps, while Androids Google Play falls behind with 2.9 million. Of Apples 4.3 million apps, many are exclusive to iOS, including user-favorites like Tweetbot, Enlight and Hyperlapse. Apple delivers all of this app value without extensive bloatware preinstalled apps and software that may slow performance, take up valuable storage space or be unable to be deleted from your device while Androids bloatware remains a top complaint among shoppers.

An Android Might Be Right for You If

Many smartphone users believe Android is better than iPhone because the OS is available on so many different types of phones, including Samsung, OnePlus, Google Pixel, Nokia and ZTE. They also rely on the highly versatile and adaptive USB-C universal charging and data transfer cord instead of Apples lightning charger, which is only compatible with other iPhones. This extensive inventory of product manufacturers has helped Android become thetop operating systemin the world, accounting for nearly 73% of the market.

You Want a Variety of Price Points

As weve covered, Androids biggest asset is the variety of products it powers. Whether youre shopping on a budget, hoping for a balance between design and performance or want to invest in a top-of-the-line smartphone with all the latest bells and whistles, youll have no trouble finding an Android device to fit your lifestyle.

Consider the range of prices for some of 2020s top sellers, all unused and straight from the box:

You Want More Customization

Androids open-source system gives users more options to organize and move apps, create shortcuts and adjust the interface launcher. They can also download third-party replacements, set new defaults for some core services and add fun themes across the system.

The latest example is Googles Material You, anew custom approach to design that adapts to Android users preferences, screen sizes and more. The company plans to launch it with theAndroid 12 updateon Google Pixel devices in late 2021 before expanding to other devices.

You Want More Storage

Googles cloud storage, including Google Drive, offers a place to create and store documents, spreadsheets, and presentations, which you can easily access from any device linked with the same Google account. Apples iCloud is extensive but doesnt offer as much cross-platform support. For example, you can access your Google Drive on an iPhone, but you can only connect to your iCloud from an iOS device.

Many Android devices including the Samsung Galaxy Note 20 Ultra, Sony Xperia 1 II and Nokia 7.2 also have expandable storage options with their smartphones, like microSD slots.

Shop Affordable iOS and Android Smartphones at Gazelle

Both iOS and Android-enabled devices offer plenty of exciting features that enhance the user experience, protect sensitive information and transform your cell phone into a multi-tasking tool for everyday life.

Android cell phones are the ideal fit for the tech-savvy consumer who wants room to play with source codes or the average consumer looking for more versatility, flexibility and design options. All tastes are welcome find an Android phone in just about every type, size, color and price point, including niche-specific devices, like gaming smartphones and note-taking phones.

Apple iPhones are a staple in smartphone culture, leading the way in security, privacy and a streamlined user experience. The brand has earned strong loyalty among its shoppers because of its sleek, premium design offerings and vast ecosystem of connectable iOS devices.

No matter which operating system fits your lifestyle, Gazelle has you covered. When youshop with us, you enjoy:

Shop our iOS and Android smartphones today, orbrowse our blogfor more insider tips and how-to guides for your device.

comments

Read the rest here:
Android vs. iPhone Which One Is Right for You? - The Horn

Why Everyones Talking About Event Streaming – CIO UK

By Chris Latimer, vice president, product management, DataStax

Theres a lot of talk about the importance of streaming data and event-driven architectures right now. You might have heard of it, but do you really know why its so important to a lot of enterprises? Streaming technologies unlock the ability to capture insights and take instant action on data thats flowing into your organization; theyre a critical building block for developing applications that can respond in real-time to user actions, security threats, or other events. In other words, theyre a key part of building great customer experiences and driving revenue.

Heres a quick breakdown of what streaming technologies do, and why theyre so important to enterprises.

Organizations have gotten pretty good at creating a relatively complete view of so-called data at rest the kind of information thats often captured in databases, data warehouses, and even data lakes to be used immediately (in real time) or to fuel applications and analysis later.

Increasingly, data thats driven by activities, actions, and events that happen in real-time across an organization pours in from mobile devices, retail systems, sensor networks, and telecommunications call-routing systems.

While this data in motion might ultimately get captured in a database or other store, its extremely valuable while its still on the move. For a bank, data in motion might enable it to detect fraud in real time and act upon it instantly. Retailers can make product recommendations based on a consumers searching or purchasing history, the instant someone visits a web page or clicks on a particular item.

Consider Overstock, a U.S. online retailer. It must consistently deliver engaging customer experiences and derive revenue from in-the-moment monetization opportunities. In other words, Overstock sought the ability to make lightning-fast decisions based on data that was arriving in real-time (generally, brands have 20 seconds to connect with customers before they move on to another website).

Its like a self-driving car, says Thor Sigurjonsson, Overstocks head of data engineering. If you wait for feedback, youre going to drive off the road.

To maximize the value of their data as its created instead of waiting hours, days, or even longer to analyze it once its at restOverstock needed a streaming and messaging platform, which would enable them employ real-time decision-making to deliver personalized experiences and recommend products likely to be well-received by customers at the perfect time (really fast, in other words).

Data messaging and streaming is a key part of an event-driven architecture, which is a software architecture or programming approach built around the capture, communication, processing, and persistence of eventsmouse clicks, sensor outputs, and the like.

Processing streams of data involves taking actions on a series of data that originates from a system that continuously creates events. The ability to query this non-stop stream and find anomalies, recognize that something important has happened, and act on it quickly and in a meaningful way, is what streaming technology enables.

This is in contrast to batch processing, where an application would store a data after intaking it, process it, and then store the processed result or forward it to another application or tool. Processing might not start until after, say, 1000 data points have been collected. Thats too slow for the kind of applications that require reactive engagement at the point of interaction.

Its worth pausing to break that idea down:

Some enterprises have recognized that they need to derive value from their data-in-motion and have assembled their own event-driven architectures from a variety of technologies, including message-oriented middleware systems like Java messaging service (JMS) or message queue (MQ) platforms.

But these platforms were built on a fundamental premise that the data they processed was transient and should be immediately discarded once each message had been delivered. This essentially throws away a highly valuable asset: data thats identifiable as arriving at a particular point in time. Time-series information is critical for applications that involve asynchronous analysis, like machine learning. Data scientists cant build machine learning models without it. A modern streaming system needs to not only pass events along from one service to another, but also store them in a way that retains their value or usage later.

The system also needs to be able to scale to manage terabytes of data and millions of messages per second. The old MQ systems are not designed to do either of these.

As I touched upon above, there are a lot of choices available when it comes to messaging and streaming technology.

They include various open-source projects like RabbitMQ, ActiveMQ, and NATS, along with proprietary solutions such as IBM MQ or Red Hat AMQ. Then there are the two well-known, unified platforms for handling real-time data: Apache Kafka, a very popular technology that has become almost synonymous with streaming; and Apache Pulsar, a newer streaming and message queuing platform.

Both of these technologies were designed to handle the high throughput and scalability that many data-driven applications require.

Kafka was developed by LinkedIn to facilitate data communication between different services at the job networking company and became an open source project in 2011. Over the years its become a standard for many enterprises looking for ways to derive value from real-time data.

Pulsar was developed by Yahoo! to solve messaging and data problems faced by applications like Yahoo! Mail; it became a top-level open source project in 2018. While still catching up to Kafka in popularity, it has more features and functionality. And it carries a very important distinction: MQ solutions are solely messaging platforms, and Kafka only handles an organizations streaming needsPulsar handles both of these needs for an organization, making it the only unified platform available.

Pulsar can handle real-time, high-rate use cases like Kafka, but its also a more complete, durable, and reliable solution when compared to the older platform. To have streaming and queuing (an asynchronous communications protocol that enables applications to talk to one another), for example, a Kafka user would need to bolt on something like RabbitMQ or other solutions. Pulsar, on the other hand, can handle many of the use cases of a traditional queuing system without add-ons.

Pulsar carries other advantages over Kafka, including higher throughput, better scalability, and geo-replication, which is particularly important when a data center or cloud region fails. Geo-replication enables an application to publish events to another data center without interruption, preventing the app from going downand preventing an outage from affecting end users. (Heres a more technical comparison of Kafka and Pulsar).

In the case of Overstock, Pulsar was chosen as the retailers streaming platform. With it, the company built what its head of engineering Sigurjonsson describes as an integrated layer of data and connected processes governed by a metadata layer supporting deployment and utilization of integrated reusable data across all environments.

In other words, Overstock now has a way to understand and act upon real-time data organization-wide, enabling the company to impress its customers with magically fast, relevant offers and personalized experiences.

As a result, teams can reliably transform data in flight in a way that is easy to use and requires less data engineering. This makes it that much easier to delight their customersand ultimately drive more revenue.

To learn more about DataStax, visit us here.

About Chris Latimer

Chris Latimer is a technology executive whose career spans over twenty years in a variety of roles including enterprise architecture, technical presales, and product management. He is currently Vice President of Product Management at DataStax where he is focused on building the companys product strategy around cloud messaging and event streaming. Prior to joining DataStax, Chris was a senior product manager at Google where he focused on APIs and API Management in Google Cloud. Chris is based near Boulder, CO, and when not working, he is an avid skier and musician and enjoys the never-ending variety of outdoor activities that Colorado has to offer with his family.

See the article here:
Why Everyones Talking About Event Streaming - CIO UK

National Park Foundation Funds Powerful and Innovative Learning Opportunities During Second Half of School Year – PRNewswire

WASHINGTON, Jan. 13, 2022 /PRNewswire/ --With students and teachers settling back into school after winter break, the National Park Foundation (NPF) is excited to announce 92 Open OutDoors for Kids grants to connect children to meaningful learning experiences with parks across the country. Open OutDoors for Kids is a program within NPF's Youth Engagement and Education initiative.

National parks are America's largest classrooms and NPF seeks to connect as many kids as possible to them.

"National parks are America's largest classrooms, and Open OutDoors for Kids seeks to connect as many kids as possible to them," said National Park Foundation President and CEO Will Shafroth. "With parks, learning is fun, memorable, and hands-on. Parks open kids' eyes to the wonder and complexities of nature and history, sharing diverse perspectives that offer a wider understanding of our country's progress and struggles."

At the core of Open OutDoors for Kids, NPF is making educational experiences in parks more accessible for all people, with a specific focus on children who live in communities that are striving to overcome a lack of resources to offer innovative learning opportunities for students. Programs such as Open OutDoors for Kids also help students, teachers, and families feel safe and supported as they explore national parks.

"Education and access are central to the National Park Service mission and we are grateful to the National Park Foundation for their continuous work to bring unique national park experiences to students and teachers through the Open OutDoors for Kids program," said National Park Service Director Chuck Sams.

This school year, NPF is partnering with the National Park Service, Expeditions in Education, and National Park Trust to support educational experiences, both in-person and virtual, across the country. Programs supported by NPF include:

"We are honored and grateful to receive this grant from the National Park Foundation, and eager to provide high-quality, curriculum-based programming to local youth," saidBirmingham Civil Rights National Monument Acting Superintendent William (Bill) Reilley.

Viewthe full listof NPF Open OutDoors for Kids grantee projects for the 2021/2022 school year.

Thanks to partners and donors, NPF is investing more than $2.3 million in its Open OutDoors for Kids program in fiscal year 2022, including support from Youth Engagement and Education premier partner Union Pacific Railroad and supporting partner GoGo squeeZ. Additional funding is provided by Alicia and Peter Pond, Apple, Columbia Sportswear, Sierra, Parks Project, Humana, The Batchelor Foundation, Inc., and many other donors.

Since 2011, NPF has engaged more than one million students in educational programs connecting them with national parks across the country. NPF's goal is to connectanother one million studentsto parks by the end of the 2024-25 school year.

"Sparking the wonder that comes from exploring a national park whether it's in person or virtually is something Union Pacific is proud to have helped students nationwide experience, as we partner with NPF to create the next generation of adventurers and environmental stewards," saidUnion Pacific's Senior Vice President Corporate Relations, Chief Administrative Officer and Foundation President Scott Moore. "These new Open OutDoors for Kids grants fuel that sense of adventure as we work toward our joint goal of helping another one million students experience all that our national parks have to offer."

Individuals, foundations, and companies can support NPF's Open OutDoors for Kids program by visiting theNational Park Foundation website.

ABOUT THE NATIONAL PARK FOUNDATION

The National Park Foundation works to protect wildlife and park lands, preserve history and culture, educate and engage youth, and connect people everywhere to the wonder of parks. We do it in collaboration with the National Park Service, the park partner community, and with the generous support of donors, without whom our work would not be possible.Learn more at nationalparks.org.

Endnote

The majority of funding for this program supports fourth grade students atTitle I schools. These schools receive financial assistance through the Elementary and Secondary Education Act to help ensure students have the resources to meet academic standards. Nationally, school districts in high-poverty communities have thehighest total Title I allocations per eligible student. Schools in these communities are less likely to have the resources to engage national parks and outdoor education into student curriculum.

SOURCE National Park Foundation

More:
National Park Foundation Funds Powerful and Innovative Learning Opportunities During Second Half of School Year - PRNewswire

Exclusive: Intel’s 12th-gen Core i9 is the fastest laptop CPU ever in our early tests – PCWorld

Intels Core i9-12900HK indeed fulfills the companys proclamation of being the The fastest mobile processor. Ever, based on the results of our early, exclusive hands-on performance testing of several 12th-gen laptops.

Intel, which unveiled its 12th-gen Alder Lake laptop CPUs just last week at CES, let PCWorld take four nearly identical laptops outfitted with the Core i9-12900HK for a spin during a live stream of our Full Nerd podcast. You can watch us run the benchmarks live in the recording of our live stream below, or check out the video version of our performance analysis over here.

While the four preproduction laptops arent quite final units, theyre based on MSIs GE76 Raider with final drivers, firmware and tuning still to come. The laptops were outfitted with the 14-core Core i9-12900HK CPU, an Nvidia GeForce RTX 3080 Laptop GPU, 32GB of DDR5/4800 RAM, and Windows 11. The updated GE76 remains the same externally as the previous-gen model, but there have been some upgrades to it, including a new MSI phase-change liquid metal thermal pad that boosts the CPUs performance. MSI has also tweaked the 12th-gen laptops GPU to 175 watts, versus the 11th-gen versions 165 watt TGP GPU.

We ran all but the gaming benchmarks on laptops set to MSIs balanced profile, rather than its extreme performance profile, and also set to hybrid GPU mode rather than discrete mode. Thats actually how Intel set the laptops up in its lab, which we left intact. Normally wed opt for the higher performance profile to get the best possible performance, but we left them as set and just wanted to point it out to shoot down assumptions that Intel might have rigged this performance preview by opting for the maximum cooling settings.

We picked the tests we wanted to run, and ran them ourselves live on The Full Nerd (subscribe to PCWorlds YouTube channel if you arent already), but make no mistakethese are laptops from Intels own testing labs so you should always read the results with some modicum of salt until independent reviews are performed. We do believe the CPU performance you see here is likely be fairly representative of performance the production laptop reaches. But no two laptops are the exact sameeven among the same make and modelso you should expect a little variance in high-end Alder Lake gaming laptops, but hopefully not huge swings.

You should know, however, that a CPU and GPUs performance isnt static. The magic each PC maker brings to it in cooling, tuning, and chosen parts can have very large impacts on performance. Basically, there is no such thing as completely isolating the CPU in a laptop. You must evaluate performance based on the total platform, not just the CPU or GPU inside of it.

To give you a point of comparison, weve included two additional laptops:

Unfortunately, due to our time constraints we were unable to update the 11th-gen Core and Ryzen 9 laptops to Windows 11. Fortunately, for many of the CPU benchmarks we ran, the OS difference can be minimal.

Well kick off our preview with Maxons popular Cinbench R20 using its default multi-threaded test. Cinebench is based on the companys Cinema4D 3D modelling and rendering engine thats sold as a stand-alone application and also included in other products, such as Adobes After Effects. It hugs cores to its body, and more cores means more speed. The results we see arent much of a surprise when you remember that Intels 12th-gen Alder Lake H processors feature a hybrid design, using six improved performance cores coupled with eight efficiency cores in this flagship Core i9-12900HK. That means 14-cores (even if eight of them are lighter weight than the Ryzens and 11th gen cores) nets more performance in Cinebench R20.

Still, youre looking at the 12th-gen Core i9 outpacing the Ryzen 9 5900HX and the Core i9-11980HK by roughly 30 percent.

Longer bars indicate better performance. Right mouse click and select open in new tab to see original image.

IDG

As much as we wish they would, the vast majority of applications people use dont tap into every core available. In fact, single-core performance may matter what for what you do everyday more than multi-core performance, so we also ran Cinebench R20 using a single-thread to gauge performance there.

Intels 12th-gen Alder Lake cores greatly boost efficiency per clock and we see that manifest itself here, where the 12th gen Core i9-12900HK is roughly 16 percent faster than the Ryzen 9 5900HX and 9.3 percent faster than the 11th gen Core i9-11980HK. Mind you, neither of those rival CPUs are slow chips either. Last summer, in fact, it felt like AMDs newly released Ryzen 9 5900HX was a monster compared to all previously released CPUs, which was then itself somewhat eclipsed by the equally impressive 11th Core i9-11980HK. Obviously, theres a new goliath in town.

Longer bars indicate better performance. Right mouse click and select open in new tab to see original image.

IDG

Up next is the very similar Cinebench R23, which unlike Cinebench R20, takes about 10 minutes to run. That point is important because modern CPUs all generate heat as they run and ease off the pedal when they heat up. While Cinebench R20 takes maybe a minute or so to run, the 10 minutes of Cinebench R23 is likely to depress performance. The good news for 12th-gen is its still the winner, since 14 cores is still more than 8 cores. The performance difference between the CPUs close up a little but the Core i9-12900HK still offers a commanding 23 percent advantage over the Ryzen 9 5900HX and 16 percent over the 11th-gen Core i9.

One other advantage to running Cinebench R23 is Mac fans can also compare performance directly, since Maxons Cinebench R23 has native version for Apples new M1 line. While we have not directly tested the MacBook Pro 14, our sister publication Macworld has, and recorded a score of 12,381 for the MacBook Pro 14 with its 10-core M1 Pro CPU. That would give the 12th gen Core i9-12900HK a 21 percent advantage over a MacBook Pro 14. Macworld didnt review the M1 Max, but others outlets have outlets have reported performance to range from 12,300 to 12,700 for the faster M1 Max.

Longer bars indicate better performance. Right mouse click and select open in new tab to see original image.

IDG

Like Cinebench R20, we also record a score in Cinebench R23 using a single thread. Interestingly, we actually see the gap open up a little here, with the 12th gen Core i9-12900HK outpacing the Ryzen 9 5900HX by about 26.5 percent and the 11th gen Core i9-11980HK by 16.6 percent. For the M1 Pro in the MacBook Pro 14, Macworld recorded a score of 1,531. Thats an advantage of 23.6 percent for the 12th-gen CPU over the M1 Pro.

Longer bars indicate better performance. Right mouse click and select open in new tab to see original image.

IDG

Up next is BAPCos CrossMark benchmark. Its essentially a scaled-down version of its sprawling SYSMark test, which uses real applications to gauge performance. But rather than commercial applications, CrossMark is built using open-source programs and intended to gauge productivity, creative (photo and video), and responsiveness, which it defines as switching between software or starting an application. Its compiled with open-source compilers and is designed to run on Windows, MacOS, iOS and Android alike. On the Windows PCs, the 12th-gen Core i9 is a beefy 36 percent faster than the Ryzen 9 5900HX and also impressive 21.5 percent faster than the 11th-gen Intel chip.

Again, we didnt have a score for CrossMark for MacOS, but the public database BAPCo publishes puts the fastest M1 Max laptop at 1,670, which lands the Core i9-12900HK at about 18 percent faster. Like all public benchmark databases, its always hard to know the provenance of the results, but well hope for the best. Looking into the details, M1 Max does slightly outpace the 12th-gen Core i9 in the Creativity portion, with a score of 2,254 vs. the 12th gens 2,132, but the newest Intel CPU beats it in productivity by 25 percent with a score of 1,874. Interestingly the Alder Lake H system also crushes the M1 Max in CrossMarks Responsive test to the tune of 59.9 percent, with a score of 1,836 for the Core i9.

Longer bars indicate better performance. Right mouse click and select open in new tab to see original image.

IDG

All-in-one suites such as CrossMark attempt to measure everything you might do on your computer, but the vast majority of the world brings home the turkey bacon using Microsofts Office suite. So to keep Bill Lumberg happy, we also ran ULs Procyon Office test, which uses Microsoft Word, PowerPoint, Excel, and Outlook to simulate what most people do all day while waiting for 5 p.m. to come. The 12th gen Core i9-12900HK wins, but its really just a meh, with Intels new chip outpacing the 11th-gen Core and Ryzen 9 systems by only 5 percent. Frankly, if youre using a Core i9 or Ryzen 9 with a GeForce RTX 3080 to primarily pound out a PowerPoint, youre probably doing it wrong.

Longer bars indicate better performance. Right mouse click and select open in new tab to see original image.

IDG

Our next result is Principled Technologies WebXprt 3. Its a web-based benchmark designed to measure browser performance at photo enhancement, organizing an album using AI, stock option pricing, encryption notes, OCR scans, sales graphs, and online homework. These are fairly advanced features for a browser test. All of our results were generated using Edge on the Chromium 97.

The Core i9-12900HK again leads the field, turning in a score about 9.5 percent faster than the 11th-gen chip and 16.2 percent faster than the Ryzen 9.

Longer bars indicate better performance. Right mouse click and select open in new tab to see original image.

IDG

We did manage to run games on the 12th gen Core i9-12900HK, but there are a lot of caveats with our comparison that we really want to highlight in yellow. Although all of the laptops feature GeForce RTX 3080 Laptop GPUs, their power ratings werent the same, which can make any comparison in gaming really sketchy. Thats especially true for the Ryzen 9 system, which was paired with a GPU rated at 130 watts vs. the 11th-gens 165 watts, and the 12th-gens 175 watts. Thats basically a 27 percent larger thermal and power budget for the 11th-gen laptop and 35 percent for the Core i9-12900HK laptop. Between the 11th-gen and the 12th-gen, theres only about a 6 percent difference in GPU power.

That said, should also point out that one of the problems we saw last year was difficulty in getting a lot of gaming laptops with higher wattage GPUs. So if most 165 watt GPUs were only in Intel machines, then maybe its actually a fair comparison?

Gaming performance isnt always about GPU wattage though and we see that below in our first result from Ashes of the Singularity: Escalation. We ran this benchmark at 1080p using the Crazy preset for graphics and opt for the CPU-focused benchmark run. The CPU-focused benchmark puts more units on the screen, which should push the CPU harder than the regular GPU-focused test. You can see the Ryzen 9 and 11th-gen systems are dead-even despite have a sizeable GPU thermal budget difference. That actually makes us even more impressed by the Core i9-12900HKs 11.7 percent lead over the others. The test basically doesnt seem to care about GPU wattage yet Intels new chip is ahead by double-digits in the CPU test.

Longer bars indicate better performance. Right mouse click and select open in new tab to see original image.

IDG

Our next game result is Far Cry New Dawn run at 1080p using the ultra preset. The caveat here is this game series has long given AMDs chips the raspberry, but that changed with the Ryzen 5000-series of desktop chips, which saw AMD actually eclipse Intels best 10th-gen desktop chip at last. The laptop Ryzen 5000, however, features less cache, which may not give it the same boost. Still, given the 35 percent larger GPU thermal budget in the Core i9-12900HK laptop, we dont think its necessarily fair to make direct comparisons with the Ryzen 9 system, so consider it there for reference.

We do think its fair to compare performance against the 11th-gen GE76 Raider, however, since both GPUs are separated by just 10 watts of power. The 12th-gen GE76 with a Core i9-12900HK inside pulls up the win by double digits, with a frame rate about 11.8 percent faster.

Longer bars indicate better performance. Right mouse click and select open in new tab to see original image.

IDG

Our last game result is from the popular Counter Strike: Global Offensive which is a graphically low-intensity game in this age. We assumed that would make it mostly a CPU-intensive game, but the results interestingly mostly mirror the GPU wattage differences between the different laptops. The Core i9-12900HK laptop is still faster than the 11th-gen notebook, but were oly looking at roughly a 6 percent win. Well just have to wait for final drivers to really make any determination in gaming.

Longer bars indicate better performance. Right mouse click and select open in new tab to see original image.

IDG

We saved our last official result for the Official Benchmark of Twitter Shouting Matches: Geekbench 5. Its a popular, cross-platform benchmark based around a set of small programming loops that are designed to simulate various functions such as JPEG decompression, text decompression, encryption, AI and more. We find most of Geekbenchs value to be in the sub-scores that let you dive into each individual results performance. We also generally only compare results on the same platform. But thats not how Twitter hot takes are created, so well stick with just the overall score here.

The result gives the Intel Core i9-12900HK a massive 56.6 percent advantage over the Ryzen 9 5900HX chip. The 12th-gen chip is equally impressive compared to its predecessor, with a 40 percent increase in performance over the 11th-gen Core i9. Again, its worth remembering that these are not slow CPUs, with the 11th-gen Core and Ryzen 9 chips delivering jaw-dropping performance just last summermaking the 12900HKs win all the more staggering.

We dont have an in-house score for the M1 Pro, so well crib from Macworld again. It reports a score of 12,590 for the 10-core M1 Max and a score of 12,544 for the 10-core M1 Pro. That puts the M1 Max just 6 percent away from the 12th-gen Core i9, and although Geekbenchs utility as the final word on performance has some real limits, its still an impressive showing nonetheless for both Apples M1 and Intels 12th-gen chips.

Longer bars indicate better performance. Right mouse click and select open in new tab to see original image.

IDG

What happens when you try to deconstruct the performance of an 8-core Ryzen 9 or 11th-gen Core i9 versus a 10-core M1 Max and the 14-core Core i9-12900HK? You look at GeekBench 5s single-core performance benchmark. Against the Ryzen 9, the 12th-gen Core i9 shows an advantage of 27 percent, and a 14.6 percent gain versus the 11th-gen Core chip.

Referencing Macworlds review of the MacBook Pro again, we see near identical scores of 1,774 for the M1 Max and 1,778 for the M1 Probasically within the margin of error. That puts the Core i9-12900HK with a 6.8 percent win over the M1 Pro and M1 Max so, yes, head for Twitter folks.

Longer bars indicate better performance. Right mouse click and select open in new tab to see original image.

IDG

For our last score, we ran PugetBenchs Premiere Pro benchmark, but this is one test where we wonder if more tuning is yet to come. PugetBench is Puget Systems popular benchmark that measures a fairly advanced set of actions and exports in Adobes Premiere Pro.

We unfortunately dont have scores for the Ryzen 9 and the 11th-gen Core i9 laptops using the current version of Premiere Pro (22.1), so we dug up some published scores from PugetBenchs database of user generated scores. Since we have no idea what conditions they were run in, we dont have the same faith in them as the scores from, say, Macworld or other reviewers. Still we did see a score in the database of 693 for a Ryzen 9 5900HX laptop with a GeForce RTX 3080 Laptop GPU, and a score of 892 from an Core i9-11980HK laptop with a GeForce RTX 3080 Laptop GPU. The Core i9-12900HK coughed up a solid 1,037, which would make you think its case closed. The problem for the 12th-gen Core i9 is the reported score in PugetBenchs database for an M1 Max MacBook Pro: 1,324. Like the Ryzen 9 and 11th gen Core i9, we dont know the conditions run for that MacBook Pro, but its impressive nonetheless.

At the same time, weve seen very large performance swings in PugetBenchs Premiere Pro benchmark based on the QuickSync capability in Intels integrated graphics cores. Its entirely possible well see the Core i9-12900HKs PugetBench score move up with final drivers. And its also possible it wont move at all either. Well have to wait and see.

And that, ultimately, is the weakness of any performance preview. While its been fun to see Intels 12th-gen Core i9-12900HK strut its stuff and outpace its Ryzen 9, 11th-gen Core i9, and M1 Max rivals in many tasks, you need to wait until we have final numbers from reviewers of final products before making any buying decisions. Hopefully you wont have to wait long.

Editors note: After publication, we updated this article to tweak the color-coding in the charts for easier differentiation, and to correct the TGP info in the listings of some graph. We apologize for the error.

One of founding fathers of hardcore tech reporting, Gordon has been covering PCs and components since 1998.

See the rest here:
Exclusive: Intel's 12th-gen Core i9 is the fastest laptop CPU ever in our early tests - PCWorld

First RancHER program promotes women in beef – Farm Progress

Dr. Carla D. Sanford, with Dean Farms in Georgia, gave a presentation on beef cattle reproductive technology advances at the first RancHER program hosted by Oregon State University.

This webinar series in December was organized by Juliana Ranches, Assistant Professor and Beef Extension Specialist at Oregon State University. This first edition of RancHER was developed to bring information to beef cattle producers by highlighting the work of talented women in the beef industry. The program was sponsored by the OSU Womens Giving Circle, and was free for attendees.

The program was well received with more than 200 registrations and 120 attendees from the U.S., Canada, and Brazil. Female speakers from across the U.S. were invited to discuss different topics related to beef cattle production. Sanford discussed recent trends in reproductive technologies for beef cattle producers, with a talk entitled Strategies for Optimizing Beef Cattle Reproductive Performance on Your Ranch.

Sanford is from Georgia, where she obtained her B.S. in Animal Science. She completed her M.S. degree at Texas Tech University with an emphasis on applied reproductive strategies in horses, and earned her Ph.D. at University of Florida where she focused on fetal developmental programming in beef heifers and cows. She continued this research at Montana State University where she was an Assistant Professor and Beef Cattle Specialist in Bozeman, Mont. During her time in academia, she worked with other researchers and extension programs on continuing efforts to improve reproductive efficiency, heifer and bull development, as well as investigating nutrition and reproduction interactions.

I have since returned to our family farm operation in southern Georgia. My husband and I are the 6th generation on this diversified operation with row-crop, produce, hay production and commercial beef cattle, Sanford said.

She was recently hired as the Southeast regional verification specialist for IMI Global, a division of Where Food Comes From. She verifies producers for third-party verification and value-added programs. Sanford also works on her familys cow-calf operation and feels that reproductive performance is critical for success.

A complete reproductive beef cattle herd plan may consist of several assisted reproductive technologies including synchronization of estrus, artificial insemination, embryo transfer, in-vitro fertilization, or ovum pickup. In her presentation for the RancHER program, she discussed the foundation of a sound reproductive herd plan, where to start, and how to get the most from your ranch breeding program.

I met Juliana while we were both doing our doctoral programs at the University of Florida. When she invited me to give this talk on beef cattle reproductive performance in her RancHER program, I appreciated her objectives and lineup of speakers. I hope she will continue to put on more programs like this, in years to come, Sanford said.

I started my presentation by saying I grew up hearing the quote that You do not want to be a jack of all trades and a master of none but the full quote goes on to say that being a jack of all trades and master of none is oftentimes better than being a master of one. Cattle producers today have to be versatile and able to do many things!

So I mentioned the full quote from Adam Savage, because all too often its been shortened. I remember being told the short version when I was a participant in youth ag programs growing up--but I had many interests in many different areas. In my RancHER presentation I talked about the need to be a jill of all trades. To survive in agriculture a person has to be innovative, open to new ideas, trying new things.

On our ranch, my husband goes from working cattle to being a mechanic, working with software in high-tech tractors and other pieces of equipment, to being a business manager. My whole familyfather, mother, sister, brother-in-law, brother and sister-in-lawis involved in ag business. One thing Ive learned from my family is that you have to be able to work well with people and also willing to get your hands dirty, Sanford said.

Farming and ranching is often romanticized, but ag families understand the sacrifices that have to be made on a daily basis, to do this type of work. I was excited to be able to present at the RancHER program and talk about women in U.S. agriculture. I quoted a statistic from the USDA Census of Agriculture; back in 2012 only 31.5% of American producers were women. By 2017 this number had increased to 36%, and 56% of all operations had at least one woman operator, It is becoming more evident, how important women are in agriculture, so I felt it was very timely for Juliana to have this program with various presentations by women.

Sanfords talk focused on beef cattle reproduction, which was the focus of her Ph.D. work at the University of Florida. She worked with Dr. Cliff Lamb before he went to Texas A&M. His research focused on applied reproductive physiology in cattle, emphasizing synchronization of estrus in replacement heifers and postpartum cows.

I talked about the impact of reproductive efficiency and how important it is to the beef industry, and some of the things a person can do on their own ranch or farm to optimize reproductive efficiency. Data from the Beef Cattle Research Council in 1977 indicated that reproduction is 5 times more important than growth rate and 10 times more important than carcass quality, and this is still very true. A cow must first become pregnant and have a calf before you can even start to think about the growth and quality of that calf.

In her presentation for RancHER, she summed up by saying estrus synchronization and AI can add value to an operation. Theres usually a protocol that will work, for any individual situation, especially if producers can be diligent about the task and the timing.

Other speakers focused on various aspects of ranching, and some of the new research. Fernanda Ferreira, Cooperative Extension Specialist with the University of California, Davis School of Veterinary Medicine discussed how the beef-on-dairy trend among dairy producers could potentially affect beef cattle production. Vanessa Schroeder, faculty research assistant for Oregon State Universitys Extension Service presented data on her masters work evaluating the potential effects of cattle grazing and weather on wildlife in sagebrush country. Virginia Brandao, Dairy Technical Manager at Micronutrients, presented an overview focused on mineral nutrition of beef cattle with emphasis on mineral sources.

The last day of RancHER included information regarding beef quality, presented by Carol Lorenzen, Animal and Rangeland Sciences Department head at Oregon State University. Natalie Kovarik, from Kovarik Ranch, shared information and tips on how to share your history and how to advocate using social media.

The webinars were recorded and can still be accessed by interested people at https://extension.oregonstate.edu/collection/rancher-2021-webinar-recordings. The current goal is to host RancHER annually, either online or in a hybrid format.

Read more here:
First RancHER program promotes women in beef - Farm Progress

Global surveillance disclosures (2013present) – Wikipedia

Disclosures of NSA and related global espionage

Ongoing news reports in the international media have revealed operational details about the Anglophone cryptographic agencies' global surveillance[1] of both foreign and domestic nationals. The reports mostly emanate from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden, which he obtained whilst working for Booz Allen Hamilton, one of the largest contractors for defense and intelligence in the United States.[2] In addition to a trove of U.S. federal documents, Snowden's cache reportedly contains thousands of Australian, British and Canadian intelligence files that he had accessed via the exclusive "Five Eyes" network.[2] In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention.[3] The disclosure continued throughout 2013, and a small portion of the estimated full cache of documents was later published by other media outlets worldwide, most notably The New York Times (United States), the Canadian Broadcasting Corporation, the Australian Broadcasting Corporation, Der Spiegel (Germany), O Globo (Brazil), Le Monde (France), L'espresso (Italy), NRC Handelsblad (the Netherlands), Dagbladet (Norway), El Pas (Spain), and Sveriges Television (Sweden).[4]

These media reports have shed light on the implications of several secret treaties signed by members of the UKUSA community in their efforts to implement global surveillance. For example, Der Spiegel revealed how the German Federal Intelligence Service (German: Bundesnachrichtendienst; BND) transfers "massive amounts of intercepted data to the NSA",[5] while Swedish Television revealed the National Defence Radio Establishment (FRA) provided the NSA with data from its cable collection, under a secret treaty signed in 1954 for bilateral cooperation on surveillance.[6] Other security and intelligence agencies involved in the practice of global surveillance include those in Australia (ASD), Britain (GCHQ), Canada (CSE), Denmark (PET), France (DGSE), Germany (BND), Italy (AISE), the Netherlands (AIVD), Norway (NIS), Spain (CNI), Switzerland (NDB), Singapore (SID) as well as Israel (ISNU), which receives raw, unfiltered data of U.S. citizens that is shared by the NSA.[7][8][9][10][11][12][13][14]

On June 14, 2013, United States prosecutors charged Edward Snowden with espionage and theft of government property. In late July 2013, he was granted a one-year temporary asylum by the Russian government,[15] contributing to a deterioration of RussiaUnited States relations.[16][17] Towards the end of October 2013, the British Prime Minister David Cameron warned The Guardian not to publish any more leaks, or it will receive a DA-Notice.[18] In November 2013, a criminal investigation of the disclosure was being undertaken by Britain's Metropolitan Police Service.[19] In December 2013, The Guardian editor Alan Rusbridger said: "We have published I think 26 documents so far out of the 58,000 we've seen."[20]

The extent to which the media reports have responsibly informed the public is disputed. In January 2014, Obama said that "the sensational way in which these disclosures have come out has often shed more heat than light"[21] and critics such as Sean Wilentz have noted that many of the Snowden documents released do not concern domestic surveillance.[22] The US & British Defense establishment weigh the strategic harm in the period following the disclosures more heavily than their civic public benefit. In its first assessment of these disclosures, the Pentagon concluded that Snowden committed the biggest "theft" of U.S. secrets in the history of the United States.[23] Sir David Omand, a former director of GCHQ, described Snowden's disclosure as the "most catastrophic loss to British intelligence ever".[24]

Barton Gellman, a Pulitzer Prizewinning journalist who led The Washington Post's coverage of Snowden's disclosures, summarized the leaks as follows:

Taken together, the revelations have brought to light a global surveillance system that cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret legal authorities empowered the NSA to sweep in the telephone, Internet and location records of whole populations.

The disclosure revealed specific details of the NSA's close cooperation with U.S. federal agencies such as the Federal Bureau of Investigation (FBI)[26][27] and the Central Intelligence Agency (CIA),[28][29] in addition to the agency's previously undisclosed financial payments to numerous commercial partners and telecommunications companies,[30][31][32] as well as its previously undisclosed relationships with international partners such as Britain,[33][34] France,[12][35] Germany,[5][36] and its secret treaties with foreign governments that were recently established for sharing intercepted data of each other's citizens.[7][37][38][39] The disclosures were made public over the course of several months since June 2013, by the press in several nations from the trove leaked by the former NSA contractor Edward J. Snowden,[40] who obtained the trove while working for Booz Allen Hamilton.[2]

George Brandis, the Attorney-General of Australia, asserted that Snowden's disclosure is the "most serious setback for Western intelligence since the Second World War."[41]

As of December2013[update], global surveillance programs include:

The NSA was also getting data directly from telecommunications companies code-named Artifice, Lithium, Serenade, SteelKnight, and X. The real identities of the companies behind these code names were not included in the Snowden document dump because they were protected as Exceptionally Controlled Information which prevents wide circulation even to those (like Snowden) who otherwise have the necessary security clearance.[64][65]

Although the exact size of Snowden's disclosure remains unknown, the following estimates have been put up by various government officials:

As a contractor of the NSA, Snowden was granted access to U.S. government documents along with top secret documents of several allied governments, via the exclusive Five Eyes network.[68] Snowden claims that he currently does not physically possess any of these documents, having surrendered all copies to journalists he met in Hong Kong.[69]

According to his lawyer, Snowden has pledged not to release any documents while in Russia, leaving the responsibility for further disclosures solely to journalists.[70] As of 2014, the following news outlets have accessed some of the documents provided by Snowden: Australian Broadcasting Corporation, Canadian Broadcasting Corporation, Channel 4, Der Spiegel, El Pais, El Mundo, L'espresso, Le Monde, NBC, NRC Handelsblad, Dagbladet, O Globo, South China Morning Post, Sddeutsche Zeitung, Sveriges Television, The Guardian, The New York Times, and The Washington Post.

In the 1970s, NSA analyst Perry Fellwock (under the pseudonym "Winslow Peck") revealed the existence of the UKUSA Agreement, which forms the basis of the ECHELON network, whose existence was revealed in 1988 by Lockheed employee Margaret Newsham.[71][72] Months before the September 11 attacks and during its aftermath, further details of the global surveillance apparatus were provided by various individuals such as the former MI5 official David Shayler and the journalist James Bamford,[73][74] who were followed by:

In the aftermath of Snowden's revelations, The Pentagon concluded that Snowden committed the biggest theft of U.S. secrets in the history of the United States.[23] In Australia, the coalition government described the leaks as the most damaging blow dealt to Australian intelligence in history.[41] Sir David Omand, a former director of GCHQ, described Snowden's disclosure as the "most catastrophic loss to British intelligence ever".[24]

In April 2012, NSA contractor Edward Snowden began downloading documents.[86] That year, Snowden had made his first contact with journalist Glenn Greenwald, then employed by The Guardian, and he contacted documentary filmmaker Laura Poitras in January 2013.[87][88]

In May 2013, Snowden went on temporary leave from his position at the NSA, citing the pretext of receiving treatment for his epilepsy. Towards the end of May, he traveled to Hong Kong.[89][90] Greenwald, Poitras and the Guardian's defence and intelligence correspondent Ewen MacAskill flew to Hong Kong to meet Snowden.

After the U.S.-based editor of The Guardian, Janine Gibson, held several meetings in New York City, she decided that Greenwald, Poitras and the Guardian's defence and intelligence correspondent Ewen MacAskill would fly to Hong Kong to meet Snowden. On June 5, in the first media report based on the leaked material,[91] The Guardian exposed a top secret court order showing that the NSA had collected phone records from over 120 million Verizon subscribers.[92] Under the order, the numbers of both parties on a call, as well as the location data, unique identifiers, time of call, and duration of call were handed over to the FBI, which turned over the records to the NSA.[92] According to The Wall Street Journal, the Verizon order is part of a controversial data program, which seeks to stockpile records on all calls made in the U.S., but does not collect information directly from T-Mobile US and Verizon Wireless, in part because of their foreign ownership ties.[93]

On June 6, 2013, the second media disclosure, the revelation of the PRISM surveillance program (which collects the e-mail, voice, text and video chats of foreigners and an unknown number of Americans from Microsoft, Google, Facebook, Yahoo, Apple and other tech giants),[94][95][96][97] was published simultaneously by The Guardian and The Washington Post.[85][98]

Der Spiegel revealed NSA spying on multiple diplomatic missions of the European Union and the United Nations Headquarters in New York.[99][100] During specific episodes within a four-year period, the NSA hacked several Chinese mobile-phone companies,[101] the Chinese University of Hong Kong and Tsinghua University in Beijing,[102] and the Asian fiber-optic network operator Pacnet.[103] Only Australia, Canada, New Zealand and the UK are explicitly exempted from NSA attacks, whose main target in the European Union is Germany.[104] A method of bugging encrypted fax machines used at an EU embassy is codenamed Dropmire.[105]

During the 2009 G-20 London summit, the British intelligence agency Government Communications Headquarters (GCHQ) intercepted the communications of foreign diplomats.[106] In addition, GCHQ has been intercepting and storing mass quantities of fiber-optic traffic via Tempora.[107] Two principal components of Tempora are called "Mastering the Internet" (MTI) and "Global Telecoms Exploitation".[108] The data is preserved for three days while metadata is kept for thirty days.[109] Data collected by GCHQ under Tempora is shared with the National Security Agency (NSA) of the United States.[108]

From 2001 to 2011, the NSA collected vast amounts of metadata records detailing the email and internet usage of Americans via Stellar Wind,[110] which was later terminated due to operational and resource constraints. It was subsequently replaced by newer surveillance programs such as ShellTrumpet, which "processed its one trillionth metadata record" by the end of December 2012.[111]

The NSA follows specific procedures to target non-U.S. persons[112] and to minimize data collection from U.S. persons.[113] These court-approved policies allow the NSA to:[114][115]

According to Boundless Informant, over 97 billion pieces of intelligence were collected over a 30-day period ending in March 2013. Out of all 97 billion sets of information, about 3 billion data sets originated from U.S. computer networks[116] and around 500 million metadata records were collected from German networks.[117]

In August 2013, it was revealed that the Bundesnachrichtendienst (BND) of Germany transfers massive amounts of metadata records to the NSA.[118]

Der Spiegel disclosed that out of all 27 member states of the European Union, Germany is the most targeted due to the NSA's systematic monitoring and storage of Germany's telephone and Internet connection data. According to the magazine the NSA stores data from around half a billion communications connections in Germany each month. This data includes telephone calls, emails, mobile-phone text messages and chat transcripts.[119]

The NSA gained massive amounts of information captured from the monitored data traffic in Europe. For example, in December 2012, the NSA gathered on an average day metadata from some 15 million telephone connections and 10 million Internet datasets. The NSA also monitored the European Commission in Brussels and monitored EU diplomatic Facilities in Washington and at the United Nations by placing bugs in offices as well as infiltrating computer networks.[120]

The U.S. government made as part of its UPSTREAM data collection program deals with companies to ensure that it had access to and hence the capability to surveil undersea fiber-optic cables which deliver e-mails, Web pages, other electronic communications and phone calls from one continent to another at the speed of light.[121][122]

According to the Brazilian newspaper O Globo, the NSA spied on millions of emails and calls of Brazilian citizens,[123][124] while Australia and New Zealand have been involved in the joint operation of the NSA's global analytical system XKeyscore.[125][126] Among the numerous allied facilities contributing to XKeyscore are four installations in Australia and one in New Zealand:

O Globo released an NSA document titled "Primary FORNSAT Collection Operations", which revealed the specific locations and codenames of the FORNSAT intercept stations in 2002.[127]

According to Edward Snowden, the NSA has established secret intelligence partnerships with many Western governments.[126] The Foreign Affairs Directorate (FAD) of the NSA is responsible for these partnerships, which, according to Snowden, are organized such that foreign governments can "insulate their political leaders" from public outrage in the event that these global surveillance partnerships are leaked.[128]

In an interview published by Der Spiegel, Snowden accused the NSA of being "in bed together with the Germans".[129] The NSA granted the German intelligence agencies BND (foreign intelligence) and BfV (domestic intelligence) access to its controversial XKeyscore system.[130] In return, the BND turned over copies of two systems named Mira4 and Veras, reported to exceed the NSA's SIGINT capabilities in certain areas.[5] Every day, massive amounts of metadata records are collected by the BND and transferred to the NSA via the Bad Aibling Station near Munich, Germany.[5] In December 2012 alone, the BND handed over 500 million metadata records to the NSA.[131][132]

In a document dated January 2013, the NSA acknowledged the efforts of the BND to undermine privacy laws:

The BND has been working to influence the German government to relax interpretation of the privacy laws to provide greater opportunities of intelligence sharing.[132]

According to an NSA document dated April 2013, Germany has now become the NSA's "most prolific partner".[132] Under a section of a separate document leaked by Snowden titled "Success Stories", the NSA acknowledged the efforts of the German government to expand the BND's international data sharing with partners:

The German government modifies its interpretation of the G-10 privacy law to afford the BND more flexibility in sharing protected information with foreign partners.[49]

In addition, the German government was well aware of the PRISM surveillance program long before Edward Snowden made details public. According to Angela Merkel's spokesman Steffen Seibert, there are two separate PRISM programs one is used by the NSA and the other is used by NATO forces in Afghanistan.[133] The two programs are "not identical".[133]

The Guardian revealed further details of the NSA's XKeyscore tool, which allows government analysts to search through vast databases containing emails, online chats and the browsing histories of millions of individuals without prior authorization.[134][135][136] Microsoft "developed a surveillance capability to deal" with the interception of encrypted chats on Outlook.com, within five months after the service went into testing. NSA had access to Outlook.com emails because "Prism collects this data prior to encryption."[45]

In addition, Microsoft worked with the FBI to enable the NSA to gain access to its cloud storage service SkyDrive. An internal NSA document dating from August 3, 2012, described the PRISM surveillance program as a "team sport".[45]

Even if there is no reason to suspect U.S. citizens of wrongdoing, the CIA's National Counterterrorism Center is allowed to examine federal government files for possible criminal behavior. Previously the NTC was barred to do so, unless a person was a terror suspect or related to an investigation.[137]

Snowden also confirmed that Stuxnet was cooperatively developed by the United States and Israel.[138] In a report unrelated to Edward Snowden, the French newspaper Le Monde revealed that France's DGSE was also undertaking mass surveillance, which it described as "illegal and outside any serious control".[139][140]

Documents leaked by Edward Snowden that were seen by Sddeutsche Zeitung (SZ) and Norddeutscher Rundfunk revealed that several telecom operators have played a key role in helping the British intelligence agency Government Communications Headquarters (GCHQ) tap into worldwide fiber-optic communications. The telecom operators are:

Each of them were assigned a particular area of the international fiber-optic network for which they were individually responsible. The following networks have been infiltrated by GCHQ: TAT-14 (EU-UK-US), Atlantic Crossing 1 (EU-UK-US), Circe South (France-UK), Circe North (Netherlands-UK), Flag Atlantic-1, Flag Europa-Asia, SEA-ME-WE 3 (Southeast Asia-Middle East-Western Europe), SEA-ME-WE 4 (Southeast Asia-Middle East-Western Europe), Solas (Ireland-UK), UK-France 3, UK-Netherlands 14, ULYSSES (EU-UK), Yellow (UK-US) and Pan European Crossing (EU-UK).[142]

Telecommunication companies who participated were "forced" to do so and had "no choice in the matter".[142] Some of the companies were subsequently paid by GCHQ for their participation in the infiltration of the cables.[142] According to the SZ, GCHQ has access to the majority of internet and telephone communications flowing throughout Europe, can listen to phone calls, read emails and text messages, see which websites internet users from all around the world are visiting. It can also retain and analyse nearly the entire European internet traffic.[142]

GCHQ is collecting all data transmitted to and from the United Kingdom and Northern Europe via the undersea fibre optic telecommunications cable SEA-ME-WE 3. The Security and Intelligence Division (SID) of Singapore co-operates with Australia in accessing and sharing communications carried by the SEA-ME-WE-3 cable. The Australian Signals Directorate (ASD) is also in a partnership with British, American and Singaporean intelligence agencies to tap undersea fibre optic telecommunications cables that link Asia, the Middle East and Europe and carry much of Australia's international phone and internet traffic.[143]

The U.S. runs a top-secret surveillance program known as the Special Collection Service (SCS), which is based in over 80 U.S. consulates and embassies worldwide.[145] The NSA hacked the United Nations' video conferencing system in Summer 2012 in violation of a UN agreement.[145]

The NSA is not just intercepting the communications of Americans who are in direct contact with foreigners targeted overseas, but also searching the contents of vast amounts of e-mail and text communications into and out of the country by Americans who mention information about foreigners under surveillance.[146] It also spied on Al Jazeera and gained access to its internal communications systems.[147]

The NSA has built a surveillance network that has the capacity to reach roughly 75% of all U.S. Internet traffic.[148][149][150] U.S. Law-enforcement agencies use tools used by computer hackers to gather information on suspects.[151][152] An internal NSA audit from May 2012 identified 2776 incidents i.e. violations of the rules or court orders for surveillance of Americans and foreign targets in the U.S. in the period from April 2011 through March 2012, while U.S. officials stressed that any mistakes are not intentional.[153][154][155][156][157][158][159]

The FISA Court that is supposed to provide critical oversight of the U.S. government's vast spying programs has limited ability to do so and it must trust the government to report when it improperly spies on Americans.[160] A legal opinion declassified on August 21, 2013, revealed that the NSA intercepted for three years as many as 56,000 electronic communications a year of Americans not suspected of having links to terrorism, before FISA court that oversees surveillance found the operation unconstitutional in 2011.[161][162][163][164][165] Under the Corporate Partner Access project, major U.S. telecommunications providers receive hundreds of millions of dollars each year from the NSA.[166] Voluntary cooperation between the NSA and the providers of global communications took off during the 1970s under the cover name BLARNEY.[166]

A letter drafted by the Obama administration specifically to inform Congress of the government's mass collection of Americans' telephone communications data was withheld from lawmakers by leaders of the House Intelligence Committee in the months before a key vote affecting the future of the program.[167][168]

The NSA paid GCHQ over 100 Million between 2009 and 2012, in exchange for these funds GCHQ "must pull its weight and be seen to pull its weight." Documents referenced in the article explain that the weaker British laws regarding spying are "a selling point" for the NSA. GCHQ is also developing the technology to "exploit any mobile phone at any time."[169] The NSA has under a legal authority a secret backdoor into its databases gathered from large Internet companies enabling it to search for U.S. citizens' email and phone calls without a warrant.[170][171]

The Privacy and Civil Liberties Oversight Board urged the U.S. intelligence chiefs to draft stronger US surveillance guidelines on domestic spying after finding that several of those guidelines have not been updated up to 30 years.[172][173] U.S. intelligence analysts have deliberately broken rules designed to prevent them from spying on Americans by choosing to ignore so-called "minimisation procedures" aimed at protecting privacy[174][175] and used the NSA's agency's enormous eavesdropping power to spy on love interests.[176]

After the U.S. Foreign Secret Intelligence Court ruled in October 2011 that some of the NSA's activities were unconstitutional, the agency paid millions of dollars to major internet companies to cover extra costs incurred in their involvement with the PRISM surveillance program.[177]

"Mastering the Internet" (MTI) is part of the Interception Modernisation Programme (IMP) of the British government that involves the insertion of thousands of DPI (deep packet inspection) "black boxes" at various internet service providers, as revealed by the British media in 2009.[178]

In 2013, it was further revealed that the NSA had made a 17.2 million financial contribution to the project, which is capable of vacuuming signals from up to 200 fibre-optic cables at all physical points of entry into Great Britain.[179]

The Guardian and The New York Times reported on secret documents leaked by Snowden showing that the NSA has been in "collaboration with technology companies" as part of "an aggressive, multipronged effort" to weaken the encryption used in commercial software, and GCHQ has a team dedicated to cracking "Hotmail, Google, Yahoo and Facebook" traffic.[186]

Germany's domestic security agency Bundesverfassungsschutz (BfV) systematically transfers the personal data of German residents to the NSA, CIA and seven other members of the United States Intelligence Community, in exchange for information and espionage software.[187][188][189] Israel, Sweden and Italy are also cooperating with American and British intelligence agencies. Under a secret treaty codenamed "Lustre", French intelligence agencies transferred millions of metadata records to the NSA.[62][63][190][191]

The Obama Administration secretly won permission from the Foreign Intelligence Surveillance Court in 2011 to reverse restrictions on the National Security Agency's use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans' communications in its massive databases. The searches take place under a surveillance program Congress authorized in 2008 under Section 702 of the Foreign Intelligence Surveillance Act. Under that law, the target must be a foreigner "reasonably believed" to be outside the United States, and the court must approve the targeting procedures in an order good for one year. But a warrant for each target would thus no longer be required. That means that communications with Americans could be picked up without a court first determining that there is probable cause that the people they were talking to were terrorists, spies or "foreign powers." The FISC extended the length of time that the NSA is allowed to retain intercepted U.S. communications from five years to six years with an extension possible for foreign intelligence or counterintelligence purposes. Both measures were done without public debate or any specific authority from Congress.[192]

A special branch of the NSA called "Follow the Money" (FTM) monitors international payments, banking and credit card transactions and later stores the collected data in the NSA's own financial databank "Tracfin".[193] The NSA monitored the communications of Brazil's president Dilma Rousseff and her top aides.[194] The agency also spied on Brazil's oil firm Petrobras as well as French diplomats, and gained access to the private network of the Ministry of Foreign Affairs of France and the SWIFT network.[195]

In the United States, the NSA uses the analysis of phone call and e-mail logs of American citizens to create sophisticated graphs of their social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information.[196] The NSA routinely shares raw intelligence data with Israel without first sifting it to remove information about U.S. citizens.[7][197]

In an effort codenamed GENIE, computer specialists can control foreign computer networks using "covert implants," a form of remotely transmitted malware on tens of thousands of devices annually.[198][199][200][201] As worldwide sales of smartphones began exceeding those of feature phones, the NSA decided to take advantage of the smartphone boom. This is particularly advantageous because the smartphone combines a myriad of data that would interest an intelligence agency, such as social contacts, user behavior, interests, location, photos and credit card numbers and passwords.[202]

An internal NSA report from 2010 stated that the spread of the smartphone has been occurring "extremely rapidly"developments that "certainly complicate traditional target analysis."[202] According to the document, the NSA has set up task forces assigned to several smartphone manufacturers and operating systems, including Apple Inc.'s iPhone and iOS operating system, as well as Google's Android mobile operating system.[202] Similarly, Britain's GCHQ assigned a team to study and crack the BlackBerry.[202]

Under the heading "iPhone capability", the document notes that there are smaller NSA programs, known as "scripts", that can perform surveillance on 38 different features of the iOS 3 and iOS 4 operating systems. These include the mapping feature, voicemail and photos, as well as Google Earth, Facebook and Yahoo! Messenger.[202]

On September 9, 2013, an internal NSA presentation on iPhone Location Services was published by Der Spiegel. One slide shows scenes from Apple's 1984-themed television commercial alongside the words "Who knew in 1984..."; another shows Steve Jobs holding an iPhone, with the text "...that this would be big brother..."; and a third shows happy consumers with their iPhones, completing the question with "...and the zombies would be paying customers?"[203]

On October 4, 2013, The Washington Post and The Guardian jointly reported that the NSA and GCHQ had made repeated attempts to spy on anonymous Internet users who have been communicating in secret via the anonymity network Tor. Several of these surveillance operations involved the implantation of malicious code into the computers of Tor users who visit particular websites. The NSA and GCHQ had partly succeeded in blocking access to the anonymous network, diverting Tor users to insecure channels. The government agencies were also able to uncover the identity of some anonymous Internet users.[204][205][206][207][208][209][210][211][212]

The Communications Security Establishment (CSE) has been using a program called Olympia to map the communications of Brazil's Mines and Energy Ministry by targeting the metadata of phone calls and emails to and from the ministry.[213][214]

The Australian Federal Government knew about the PRISM surveillance program months before Edward Snowden made details public.[215][216]

The NSA gathered hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world. The agency did not target individuals. Instead it collected contact lists in large numbers that amount to a sizable fraction of the world's e-mail and instant messaging accounts. Analysis of that data enables the agency to search for hidden connections and to map relationships within a much smaller universe of foreign intelligence targets.[217][218][219][220]

The NSA monitored the public email account of former Mexican president Felipe Caldern (thus gaining access to the communications of high-ranking cabinet members), the emails of several high-ranking members of Mexico's security forces and text and the mobile phone communication of current Mexican president Enrique Pea Nieto.[221][222] The NSA tries to gather cellular and landline phone numbersoften obtained from American diplomatsfor as many foreign officials as possible. The contents of the phone calls are stored in computer databases that can regularly be searched using keywords.[223][224]

The NSA has been monitoring telephone conversations of 35 world leaders.[225] The U.S. government's first public acknowledgment that it tapped the phones of world leaders was reported on October 28, 2013, by the Wall Street Journal after an internal U.S. government review turned up NSA monitoring of some 35 world leaders.[226] GCHQ has tried to keep its mass surveillance program a secret because it feared a "damaging public debate" on the scale of its activities which could lead to legal challenges against them.[227]

The Guardian revealed that the NSA had been monitoring telephone conversations of 35 world leaders after being given the numbers by an official in another U.S. government department. A confidential memo revealed that the NSA encouraged senior officials in such Departments as the White House, State and The Pentagon, to share their "Rolodexes" so the agency could add the telephone numbers of leading foreign politicians to their surveillance systems. Reacting to the news, German leader Angela Merkel, arriving in Brussels for an EU summit, accused the U.S. of a breach of trust, saying: "We need to have trust in our allies and partners, and this must now be established once again. I repeat that spying among friends is not at all acceptable against anyone, and that goes for every citizen in Germany."[225] The NSA collected in 2010 data on ordinary Americans' cellphone locations, but later discontinued it because it had no "operational value."[228]

Under Britain's MUSCULAR programme, the NSA and GCHQ have secretly broken into the main communications links that connect Yahoo and Google data centers around the world and thereby gained the ability to collect metadata and content at will from hundreds of millions of user accounts.[229][230][231][232][233]

The mobile phone of German Chancellor Angela Merkel might have been tapped by U.S. intelligence.[234][235][236][237][238][239][240] According to the Spiegel this monitoring goes back to 2002[241][242] and ended in the summer of 2013,[226] while The New York Times reported that Germany has evidence that the NSA's surveillance of Merkel began during George W. Bush's tenure.[243] After learning from Der Spiegel magazine that the NSA has been listening in to her personal mobile phone, Merkel compared the snooping practices of the NSA with those of the Stasi.[244] It was reported in March 2014, by Der Spiegel that Merkel had also been placed on an NSA surveillance list alongside 122 other world leaders.[245]

On October 31, 2013, Hans-Christian Strbele, a member of the German Bundestag, met Snowden in Moscow and revealed the former intelligence contractor's readiness to brief the German government on NSA spying.[246]

A highly sensitive signals intelligence collection program known as Stateroom involves the interception of radio, telecommunications and internet traffic. It is operated out of the diplomatic missions of the Five Eyes (Australia, Britain, Canada, New Zealand, United States) in numerous locations around the world. The program conducted at U.S. diplomatic missions is run in concert by the U.S. intelligence agencies NSA and CIA in a joint venture group called "Special Collection Service" (SCS), whose members work undercover in shielded areas of the American Embassies and Consulates, where they are officially accredited as diplomats and as such enjoy special privileges. Under diplomatic protection, they are able to look and listen unhindered. The SCS for example used the American Embassy near the Brandenburg Gate in Berlin to monitor communications in Germany's government district with its parliament and the seat of the government.[240][247][248][249]

Under the Stateroom surveillance programme, Australia operates clandestine surveillance facilities to intercept phone calls and data across much of Asia.[248][250]

In France, the NSA targeted people belonging to the worlds of business, politics or French state administration. The NSA monitored and recorded the content of telephone communications and the history of the connections of each target i.e. the metadata.[251][252] The actual surveillance operation was performed by French intelligence agencies on behalf of the NSA.[62][253] The cooperation between France and the NSA was confirmed by the Director of the NSA, Keith B. Alexander, who asserted that foreign intelligence services collected phone records in "war zones" and "other areas outside their borders" and provided them to the NSA.[254]

The French newspaper Le Monde also disclosed new PRISM and Upstream slides (See Page 4, 7 and 8) coming from the "PRISM/US-984XN Overview" presentation.[255]

In Spain, the NSA intercepted the telephone conversations, text messages and emails of millions of Spaniards, and spied on members of the Spanish government.[256] Between December 10, 2012, and January 8, 2013, the NSA collected metadata on 60 million telephone calls in Spain.[257]

According to documents leaked by Snowden, the surveillance of Spanish citizens was jointly conducted by the NSA and the intelligence agencies of Spain.[258][259]

The New York Times reported that the NSA carries out an eavesdropping effort, dubbed Operation Dreadnought, against the Iranian leader Ayatollah Ali Khamenei. During his 2009 visit to Iranian Kurdistan, the agency collaborated with GCHQ and the U.S.'s National Geospatial-Intelligence Agency, collecting radio transmissions between aircraft and airports, examining Khamenei's convoy with satellite imagery, and enumerating military radar stations. According to the story, an objective of the operation is "communications fingerprinting": the ability to distinguish Khamenei's communications from those of other people in Iran.[260]

The same story revealed an operation code-named Ironavenger, in which the NSA intercepted e-mails sent between a country allied with the United States and the government of "an adversary". The ally was conducting a spear-phishing attack: its e-mails contained malware. The NSA gathered documents and login credentials belonging to the enemy country, along with knowledge of the ally's capabilities for attacking computers.[260]

According to the British newspaper The Independent, the British intelligence agency GCHQ maintains a listening post on the roof of the British Embassy in Berlin that is capable of intercepting mobile phone calls, wi-fi data and long-distance communications all over the German capital, including adjacent government buildings such as the Reichstag (seat of the German parliament) and the Chancellery (seat of Germany's head of government) clustered around the Brandenburg Gate.[261]

Operating under the code-name "Quantum Insert", GCHQ set up a fake website masquerading as LinkedIn, a social website used for professional networking, as part of its efforts to install surveillance software on the computers of the telecommunications operator Belgacom.[262][263][264] In addition, the headquarters of the oil cartel OPEC were infiltrated by GCHQ as well as the NSA, which bugged the computers of nine OPEC employees and monitored the General Secretary of OPEC.[262]

For more than three years GCHQ has been using an automated monitoring system code-named "Royal Concierge" to infiltrate the reservation systems of at least 350 prestigious hotels in many different parts of the world in order to target, search and analyze reservations to detect diplomats and government officials.[265] First tested in 2010, the aim of the "Royal Concierge" is to track down the travel plans of diplomats, and it is often supplemented with surveillance methods related to human intelligence (HUMINT). Other covert operations include the wiretapping of room telephones and fax machines used in targeted hotels as well as the monitoring of computers hooked up to the hotel network.[265]

In November 2013, the Australian Broadcasting Corporation and The Guardian revealed that the Australian Signals Directorate (DSD) had attempted to listen to the private phone calls of the president of Indonesia and his wife. The Indonesian foreign minister, Marty Natalegawa, confirmed that he and the president had contacted the ambassador in Canberra. Natalegawa said any tapping of Indonesian politicians' personal phones "violates every single decent and legal instrument I can think ofnational in Indonesia, national in Australia, international as well".[266]

Other high-ranking Indonesian politicians targeted by the DSD include:

Carrying the title "3G impact and update", a classified presentation leaked by Snowden revealed the attempts of the ASD/DSD to keep up to pace with the rollout of 3G technology in Indonesia and across Southeast Asia. The ASD/DSD motto placed at the bottom of each page reads: "Reveal their secretsprotect our own."[267]

Under a secret deal approved by British intelligence officials, the NSA has been storing and analyzing the internet and email records of British citizens since 2007. The NSA also proposed in 2005 a procedure for spying on the citizens of the UK and other Five-Eyes nations alliance, even where the partner government has explicitly denied the U.S. permission to do so. Under the proposal, partner countries must neither be informed about this particular type of surveillance, nor the procedure of doing so.[37]

Towards the end of November, The New York Times released an internal NSA report outlining the agency's efforts to expand its surveillance abilities.[268] The five-page document asserts that the law of the United States has not kept up with the needs of the NSA to conduct mass surveillance in the "golden age" of signals intelligence, but there are grounds for optimism because, in the NSA's own words:

The culture of compliance, which has allowed the American people to entrust NSA with extraordinary authorities, will not be compromised in the face of so many demands, even as we aggressively pursue legal authorities...[269]

The report, titled "SIGINT Strategy 20122016", also said that the U.S. will try to influence the "global commercial encryption market" through "commercial relationships", and emphasized the need to "revolutionize" the analysis of its vast data collection to "radically increase operational impact".[268]

On November 23, 2013, the Dutch newspaper NRC Handelsblad reported that the Netherlands was targeted by U.S. intelligence agencies in the immediate aftermath of World War II. This period of surveillance lasted from 1946 to 1968, and also included the interception of the communications of other European countries including Belgium, France, West Germany and Norway.[270] The Dutch Newspaper also reported that NSA infected more than 50,000 computer networks worldwide, often covertly, with malicious spy software, sometimes in cooperation with local authorities, designed to steal sensitive information.[40][271]

LARGE CABLE20 major points of accesses, many of them located within the United States

According to the classified documents leaked by Snowden, the Australian Signals Directorate (ASD), formerly known as the Defense Signals Directorate, had offered to share intelligence information it had collected with the other intelligence agencies of the UKUSA Agreement. Data shared with foreign countries include "bulk, unselected, unminimized metadata" it had collected. The ASD provided such information on the condition that no Australian citizens were targeted. At the time the ASD assessed that "unintentional collection [of metadata of Australian nationals] is not viewed as a significant issue". If a target was later identified as being an Australian national, the ASD was required to be contacted to ensure that a warrant could be sought. Consideration was given as to whether "medical, legal or religious information" would be automatically treated differently to other types of data, however a decision was made that each agency would make such determinations on a case-by-case basis.[272] Leaked material does not specify where the ASD had collected the intelligence information from, however Section 7(a) of the Intelligence Services Act 2001 (Commonwealth) states that the ASD's role is "...to obtain intelligence about the capabilities, intentions or activities of people or organizations outside Australia...".[273] As such, it is possible ASD's metadata intelligence holdings was focused on foreign intelligence collection and was within the bounds of Australian law.

The Washington Post revealed that the NSA has been tracking the locations of mobile phones from all over the world by tapping into the cables that connect mobile networks globally and that serve U.S. cellphones as well as foreign ones. In the process of doing so, the NSA collects more than five billion records of phone locations on a daily basis. This enables NSA analysts to map cellphone owners' relationships by correlating their patterns of movement over time with thousands or millions of other phone users who cross their paths.[274][275][276][277][278][279][280][281]

The Washington Post also reported that both GCHQ and the NSA make use of location data and advertising tracking files generated through normal internet browsing (with cookies operated by Google, known as "Pref") to pinpoint targets for government hacking and to bolster surveillance.[282][283][284]

The Norwegian Intelligence Service (NIS), which cooperates with the NSA, has gained access to Russian targets in the Kola Peninsula and other civilian targets. In general, the NIS provides information to the NSA about "Politicians", "Energy" and "Armament".[285] A top secret memo of the NSA lists the following years as milestones of the NorwayUnited States of America SIGINT agreement, or NORUS Agreement:

The NSA considers the NIS to be one of its most reliable partners. Both agencies also cooperate to crack the encryption systems of mutual targets. According to the NSA, Norway has made no objections to its requests from the NIS.[286]

Read the original here:
Global surveillance disclosures (2013present) - Wikipedia

Is the allure of cryptocurrency fading? – The San Diego Union-Tribune

Bitcoin dropped to a three-month low recently and its movement has closely mirrored financial markets in its decline.

Bitcoin bulls often describe it as an asset that is uncorrelated to traditional financial markets, CNBC reported, however experts have noticed growing parallels in the price movements of bitcoin and stocks.

It also comes as Dogecoin co-founder Jackson Palmer wrote a lengthy Twitter essay about cryptocurrency preying on the most vulnerable.

These days even the most modest critique of cryptocurrency will draw smears from the powerful figures in control of the industry, he wrote, and the ire of retail investors who theyve sold the false promise of one day being a fellow billionaire.

Q: Is the allure of cryptocurrency fading?

Ray Major, SANDAG

NO: The allure of crypto remains, but recent market fluctuations reinforce the reality that crypto is highly speculative. Much of its value is based on a general gambling mentality rather than sound investment principles. Many people invest in crypto like lottery tickets, hoping for a big payout without understanding or caring about what is driving the price. Crypto is here to stay. Some of the allure will fade as it matures, but for now, stay tuned for a wild ride.

Lynn Reaser, Point Loma Nazarene University

YES: As the Federal Reserve begins to tighten monetary policy, riskier assets will look much less appealing. Cryptocurrencies clearly fall in that category. Their volatility diminishes their use as a stable store of value or medium of exchange. Their secrecy continues to foster illegal activity. Environmental concerns have also risen over their intensive electricity use. Central banks have pushed back and are likely to move to stablecoins, backed by national currencies, or their own digital currencies.

Reginald Jones, Jacobs Center for Neighborhood Innovation

NO: Cryptocurrencies continue to expand as emerging currency. There are now thousands of cryptos in the asset class. Though still far from being used as mainstream sources of payment, last year saw more U.S. businesses accepting cryptocurrency like bitcoin. A trend likely to increase. Prediction is more countries will follow in accepting the currency as legal tender. All this is not to say cryptocurrency will escape the topsy-turvy perhaps even topping market position we have seen.

Kelly Cunningham, San Diego Institute for Economic Research

NO: The government printing money at an astonishing pace in response to lockdowns and associated economic disruption causes significant inflation, which makes virtual currencies even more appealing. Cryptocurrencies are designed to create financial sovereignty for everyone and have as much future as the Internet itself. Cryptocurrencies could displace central banks, conventional banking, and challenge national money monopolies. Virtual currencies provide their own accounting units and payment systems, which allow peer-to-peer transactions without central clearinghouses and without central banking.

Phil Blair, Manpower

YES: I compare it to the public perception of a Ponzi scheme. Too good to be true. And with trusted financial advisers not pushing the crypto products, and usually stating buy at your own risk, the product will never become mainstream. It feels like such a desperate move for people with limited resources to take hard-earned dollars and roll the dice on whether the product, for unknown reasons, will soar or crash on a daily basis.

Gary London, London Moeder Advisors

YES: As an investable commodity it smells like tulips. While it will have a permanent place in world currency, its appeal as an investment vehicle with limitless upside is bound to fade. The early investors have often won big. Its promise is in its basic premise of decoupling money from banks or government, making it a very fungible world currency.

Alan Gin, University of San Diego

Not participating this week.

James Hamilton, UC San Diego

YES: There is a market value for cryptocurrency. But as an asset class its something the vast majority of investors should avoid. Bitcoins value is far too unstable for it or other cryptos to replace traditional currency as a logical way to store wealth or pay for transactions. Far too many people were jumping on the bandwagon in the mistaken belief that anything thats been going up in value will continue to do so.

Austin Neudecker, Weave Growth

NO: Cryptocurrency represents a shift in the way value is created and transferred. Fundamentally, cryptocurrency is built on an underlying protocol called blockchain, which enables people to transfer digital ownership of anything without the need for a middleman. Regardless of the success or failure of any specific digital currency, their existence is not a fad. This technology is going to change how transactions, even business models, function.

Chris Van Gorder, Scripps Health

YES: Cryptocurrency has garnered unwelcome attention from regulators and taxing authorities as they recognize that a small, but growing number of transactions are being used for illegal purposes, such as money laundering, tax evasion, fraud and outright theft. According to Chainalysis, illicit transactions totaled $14 billion in 2021, up 79 percent from $7.8 billion the previous year. The threat of greater government scrutiny and potential fraud may have diminished the appeal of transacting and investing in cryptocurrencies.

Norm Miller, University of San Diego

NO: With the likes of Matt Damon pushing Crypto on every channel with lines like Fortune Favors the Brave and Crytpo.com now sponsoring sporting arenas, it is nowhere ready to fade, even though no one knows how to estimate underlying value. Crypto investors say the supply is limited, but it is easy to start new cryptos and hope they catch on like Dogecoin or Polkadot (not a joke). Coinbase claims 68 million verified users and 6,000 different crypto currencies, with new ones starting weekly.

Bob Rauch, R.A. Rauch & Associates

Not participating this week.

Jamie Moraga, IntelliSolutions

NO: Cryptocurrency is a risky endeavor due to its volatility. Investors who care strictly about the price may be disheartened as prices are down from the highs of 2021, but they still have increased year over year. Other metrics including developer activity, startup funding, and active users, indicate continued strong interest. Non-fungible tokens (NFTs) are an emerging crypto technology that is increasing in popularity where unique digital assets (art, music, images, videos) not easily replicated are sold to fans via blockchain services. Cryptocurrency is evolving, not fading.

David Ely, San Diego State University

NO: Prices and trading activity of cryptocurrencies, like other speculative assets, react to changes in interest rates, forecasts of future economic conditions, and uncertainty. Investor sentiment toward cryptocurrencies will fluctuate over time leading to changes in the volume of inflows into these markets. However, aggregate investor interest remains strong. Derivatives now offer additional ways to gain exposure to cryptocurrencies. Cryptocurrency regulations adopted in the future may have the greatest impact on the pace of expansion.

Have an idea for an EconoMeter question? Email me at phillip.molnar@sduniontribune.com.

Follow me on Twitter: @PhillipMolnar

View original post here:
Is the allure of cryptocurrency fading? - The San Diego Union-Tribune

Job Postings With Terms Like ‘Bitcoin’ and ‘Cryptocurrency’ Grew Almost 400% on LinkedIn Last Year – Money

Many companies featured on Money advertise with us. Opinions are our own, but compensation and in-depth research determine where and how companies may appear. Learn more about how we make money.

Companies are seriously ramping up recruiting efforts for workers with cryptocurrency skills. A recent analysis from LinkedIn found that the number of job postings containing the terms bitcoin, ethereum, blockchain and cryptocurrency" grew 395% in the United States between 2020 and 2021.

Thats significantly bigger growth than the increase in listings for the wider tech industry, which saw a 98% bump in postings over the same period. The most common titles in LinkedIn listings included blockchain developers and engineers.

("The term "cryptocurrency" refers to digital currency that's underpinned by computer code rather than a central bank or other government authority. The technology behind that code is called blockchain. Some of the most popularly traded cryptocurrencies, or "cryptos," including Bitcoin, Dogecoin and Ethereum.)

LinkedIn said most of the postings were in the software and finance industries, but noted that the professional services industry (including accountants and consultants), the staffing industry and the computer hardware industry also boosted hiring for crypto-related jobs. A recent search for cryptocurrency on LinkedIns job platform turned up more than 11,000 results, including listings at major companies like PayPal and Deloitte.

And applicants are interested: An August report from the job site Indeed found that the volume of crypto-related job searches during one week last summer was 300% higher than a comparable week in 2020.

Searches for blockchain-related jobs soared 137% over the same period. Indeed also found that crypto and blockchain software development jobs are more likely to be remote compared to non-crypto software development jobs. Thats a major perk of the industry for people seeking a career that will allow them to work from home.

Cryptocurrency continued its meteoric rise into the mainstream in 2021. Bitcoin gained some 50% in value over the course of the year (though not without its characteristic volatility along the way) and notched new record highs. Experts expect that trend to continue, with some saying that Bitcoin will hit $100,000 per coin (more than double its current value) sometime in the near future. Meanwhile, altcoins like Dogecoin and Ether saw even more dramatic gains last year.

As the value of cryptocurrencies grew, so has the community surrounding the technology. People are asking for crypto gifts in their wedding registries. Investing clubs are growing more popular on college campuses, and students are increasingly interested in crypto. The mayors of Miami and New York City made headlines when they announced that they would take some paychecks in Bitcoin rather than dollars to boost the crypto industries in their cities. Some first-time homebuyers have even used proceeds from the sale of cryptocurrency investments to help fund down payments on houses.

The gist is that if youre looking for a new job this year or even just a side hustle the crypto world may have something to offer.

Build your professional brand with a Resume Builder.

TopResume offers a place to take your career stories and create your professional brand, starting with a great resume. Click below to get started.

From Pet Nanny to Metaverse Real Estate Agent, These Side Hustles Scream '2022'

5 Crypto Predictions for 2022

6 Best Job Search Sites

Read more:
Job Postings With Terms Like 'Bitcoin' and 'Cryptocurrency' Grew Almost 400% on LinkedIn Last Year - Money