Bill Whitaker: Protesters lost control of their message in summer of chaos – Waco Tribune-Herald

German, who added that more than 800 acts of police violence against protesters nationwide have been captured on video since Floyds death on Memorial Day, made a compelling point about the questionable display of apparently undisciplined federal forces in Portland, noting that studies of civil disturbances in the 1960s and 70s showed that aggressive law enforcement tactics were often a determinant factor in instigating and escalating and spreading violence a point embraced by local police departments across the nation (including Wacos) who now coach their officers on how to de-escalate tense situations. Ironically, this point was lost in the parliamentary and partisan charade on ugly display during Tuesdays Senate subcommittee hearing.

Can we find a way forward?Is it too late for a do-over, maybe with a little more John Lewis and Mahatma Gandhi, a little less Sun Tzu and the Great Ahmed Khan? Probably, which makes the death of George Floyd even more tragic given the resulting legislative inaction (well, except for a stubborn effort to make Juneteenth a national holiday, as if this will atone for racial injustice). Perhaps its to be expected of any genuine grassroots movement. As some of us saw with the tea party a decade ago, little time passes before such movements are overtaken, whether by corporate interests, political manipulators or out-and-out renegades whose agendas and motives are never quite so pure. Perhaps, too, the young and idealistic souls who spilled out into Americas streets this summer succumbed to the same impulses seasoned voters do when we send one lawmaker after another to Washington and Austin to fight tooth and nail for us, and to never compromise, rather than pursuing real conciliation, lasting solutions and a dynamic way forward.

Bill Whitaker is Trib opinion editor.

Link:

Bill Whitaker: Protesters lost control of their message in summer of chaos - Waco Tribune-Herald

US Army and Navy unban Twitch commenter who criticized the military – Yahoo Tech

The US Army and Navy have agreed to unban Jordan Uhl, the activist who linked to a Wikipedia page listing US military war crimes in their Twitch chats. After the incident, Uhl wrote an article criticizing the military for using Twitch to scout for potential recruits, especially since recruiters can interact with kids as young as 13.

In a letter sent to Columbia Universitys Knight First Amendment Institute, which represented Uhl, the Navy justified his ban by pointing out that he violated the channels spam policy when he kept posting similar messages over a period of three days. The Navy agreed, however, that it needs to post comprehensive rules on its page to ensure its viewers are aware of them. It has already posted its policies under its About section and has unbanned Uhl and all other previously banned users as a gesture of good faith.

The Armys letter was much shorter, merely telling the Knight Institute that it has approved its request to unban Uhl. It previously told Vice, however, that its reinstating access for accounts previously banned for harassing and degrading behavior on its Twitch stream. The Army is also returning to the platform after pausing its streaming activities following Uhls ban, which generated a lot of criticism from First Amendment groups. It told Vice that its now reviewing and clarifying its policies and procedures for the stream.

While neither military branch mentioned the reason for the other users ban, the Knight Institute said in a statement that they were prohibited from posting in chat for engaging in core political speech. The institutes whole statement reads:

Were pleased that both the Army and Navy have agreed to unban users who were banned for engaging in core political speech. Its also good to see that the Navy is committing not to ban users on the basis of viewpoint. Of course, it matters how these new policies are applied. We will monitor the Navys practices closely to ensure that the new policies are enforced consistently and in a viewpoint-neutral manner. We look forward to reviewing the Armys policies once they are posted.

See the original post:

US Army and Navy unban Twitch commenter who criticized the military - Yahoo Tech

"Artificial Intelligence Will Make Medicine Better in the Long Run" – Biophotonics.World

Image source: Leibniz IPHT

By: Sven Dring

Leibniz IPHT is increasingly focusing on artificial intelligence and learning systems. Thomas Bocklitz is heading the new research department "Photonic Data Science". We asked him how AI could help shape the future of diagnostics

What new possibilities does Photonic Data Science open up for diagnostics?

Photonic Data Science is a potpourri combining mathematical and statistical methods with algorithms and domain knowledge to translate measurement data into useful information. We usually translate photonic data into biomedical for example diagnostic information. By translating with the computer, robust diagnostic information can be extracted. Tiny details in complex data can be made useful for diagnostics. This opens up new possibilities for diagnostics.

Artificial intelligence (AI) then helps to evaluate this data. Which technologies researched at the institute are based on AI?

In the laser-based rapid test of infectious pathogens, machine learning methods and algorithms for data pre-treatment are used to translate Raman spectra of bacteria into a resistance prediction i.e. to predict pathogens and antibiotic resistances on the basis of the spectroscopically recorded data. For the compact microscope Medicars we use deep and machine learning techniques to translate multimodal image data into a tissue prediction for the detection of tumor margins. In smartphone microscopy, which is being researched by Rainer Heintzmann's team, image enhancement is achieved by means of deep learning procedures.

Where do the data sets come from that are currently mainly used? Can they be applied equally to all patients?

The data sets are generated within clinical studies, which we supervise from the beginning. The studies are still too small to exclude a gender bias, but we are working on the experimental design so that there is no gender bias in the training data set and we hope that the models will not generate any bias.

Does the automated analysis of medical control data also carry a risk? A loss of control?

Of course, every technology has risks, although these are manageable here. Artificial intelligence or machine learning processes only work well if the new test data is similar to the training data. We try to tackle this problem by creating the necessary similarity through standardization and model transfer in order to im- prove the predictions. There is a loss of control when the models are applied fully automatically. But in the medium term the models will only represent a second opinion, so there will be no loss of control.

Can physicians improve the learning systems? Is the procedure of AI applications comprehensible for them?

Physicians can increase the database or reduce the uncertainty of the metadata i.e. labels by pooling or voting, which leads to better models. The traceability of AI models is a major topic in current machine learning research Keyword "Explainable AI". The aim is to decipher these models in order to make it clearly understandable how mass-based learning methods and deep learning systems achieve their results.

Can AI be perfected to the point where it can eventually make better diagnoses than a human?

I think so, if the data is highly standardized. Another challenge is to demonstrate that improvement. This requires quite long clinical trials and is ethically problematic.

Could AI ever replace doctors instead of just to supporting them? For example, could operations be performed by AI-controlled robots at some point?

I don't think so, because there are many uncertainties in an operation that must be reacted to flexibly. This is not a prominent feature of current AI procedures. It's more likely that the surgical robots will do very specific things directly on the operator's instructions.

Will AI make medicine better?

In the long run, I think so. But first, it will make diagnostics more comparable and it will also allow data to be used not only sequentially, but in combination.

Artificial Intelligence, Machine Learning, Deep Learning

Decision making, problem solving, learning these are actions that we commonly associate with human thinking. We call their automation artificial intelligence (AI). An important part of AI is machine learning (ML). Scientists are researching algorithms andstatistical or mathematical methods with which computer systems can solve specific tasks.

For this purpose, machine learning methods construct a statistical-mathematical model from an example data set, the training data. On this basis, ML methods can make predictions or make decisions without having been explicitly programmed for it. ML techniques are used, for example, for spam detection in e-mail accounts, in image processing, and for the analysis of spectroscopic data. Deep learning is a method of machine learning that is similar to the way the human brain processes visual and other stimuli. Artificial neurons receive input, process it and pass it on to other neurons.Starting from a first, visible layer, the characteristics in the subsequent, hidden intermediate layers become increasingly abstract. The result is output in the last, again visible layer.

Making Tumor Tissue Visible with AI

Did the surgeon remove the entire tumor during surgery? In order to find out, researchers are combining optical methods with artificial intelligence (AI) and data pre-processing methods. AI is behind the compact Medicars microscope, for example, which enables rapid cancer diagnosis during surgery. Here, patterns and molecular details of a tissue sample irradiated with laser light are automatically evaluated and translated into classical images of standard diagnostics. Thus, tumor margins become visible.

"For this purpose, we train AI algorithms together with pathologists," explains Thomas Bocklitz. We take multimodal images of a tissue sample with our laser-based multi- modal microscope. In pathology, the tissue section is then embedded, stained, and an image of the HE- stained tissue section is taken (HE = haematoxylin-eosin). This enables the pathologist to recognize tumor tissue. Then we put the multimodal and the HE image side by side."

Based on the pathologist's analysis of the tissue structure and morphology, the research team teaches the algorithm which tissue is healthy and which is sick. "In this supervised approach, the algorithm learns to distinguish successive, healthy and diseased areas." With success: The accuracy of the predictions is more than 90 percent according to tests on a small group of patients.

Source: Leibniz IPHT

Continue reading here:
"Artificial Intelligence Will Make Medicine Better in the Long Run" - Biophotonics.World

Morphisec Knowledge Update: New WastedLocker Ransomware Causes Havoc Among Some of the Leading Enterprises in the U.S. – Security Boulevard

Garmin has confirmed that the recent outage its users experienced was indeed the result of a successful ransomware attack. However, the extent of the damage done is still unclear. The attack, which compromised Garmins servers for five days, impacted millions of users globally and will likely end up costing Garmin millions of dollars in lost productivity and reputation alone. While Garmin says that no customer data was leaked, Garmins call centers, web site, and cloud-based services such as Garmin Connect and FlyGarmin (a commercial aviation navigation service) were either taken offline or negatively impacted as a result of the attack.

According to reliable sources, the Garmin attack appears to have been the result of a successful WastedLocker ransomware infiltration by the notorious Russian cybercrime group known as Evil Corp. The groups apparent success in this recent attack highlights the danger of organized threat actors to companies of all sizes. It also provides a lesson for companies seeking to protect their corporate networks against similar threats. The first step towards improving your own network security is understanding how Garmin fell victim to this attack.

The type of attack chain that Garmin witnessed is likely no different from those experienced by other victims of Evil Corp malware breaches. Like their previous Bitpaymer attacks, Evil Corp spread WastedLocker malware payloads by masquerading them as software or system updates. These malicious updates are delivered via a Javascript-based framework known as SocGholish, which, running under the privileges of a browser user, lures targets into downloading fake updates to applications such as Chrome and Firefox web browsers. Evil Corp has previously used a similar framework to trick targeted users into downloading Dridex malware, Cobalt Strike beacons, Netwire, and more.

While attacks conducted by Evil Corp are often tailored explicitly towards targeted organizations, they tend to follow a similar attack chain:

After its execution, WastedLocker will attempt to encrypt all the files it can access within the infected target network while deleting shadow files and backups. Ignoring files with a size of fewer than 10 bytes, Wastedlocker encrypts victims files in batches of 64mb with the AES algorithm. The encrypted filenames are also renamed to include the victims name alongside the string wasted, i.e., file.doc.companynamewasted. The service also creates a separate ransom note which appears alongside each file, i.e., file.doc.companynamewasted_info.

After this process, the encryption service itself is deleted and a log file of encrypted files created. In return for unlocking the files, Evil Corp demands, through a specified email address, a ransom payable in Bitcoin. Most Evil Corp ransom demands range between $500,000 and $10 million.

The pathways that Evil Corp targets might not be immediately recognizable as significant assets. They often look for higher-value targets like file servers and database services alongside lower-value targets like virtual machines and physical workstations that could turn into high-value targets if used for lateral movement.

Evil Corp gains a foothold in these vulnerable endpoints by exploiting a critical weakness in many companies cybersecurity posture memory. Despite breached companies possessing EDR and AV security tools, EvilCorp has consistently demonstrated a capacity to bypass many advanced endpoint protection and antivirus methods with its full attack chain.

For organizations faced with highly sophisticated and targeted attacks from well-resourced cybercrime gangs like Evil Corp, standard AV and EDR platforms are of little use. While siloed backups can provide mitigation in case of a successful attack, targeted ransomware like WastedLocker usually aim to knock out backups as a key attack priority.

However, its still possible to protect corporate networks from these kinds of sophisticated attacks. A proactive cyber defense strategy prevents WastedLocker and other advanced ransomware attacks from progressing by preemptively detecting it and stopping its payload being delivered. With a dedicated memory defense layer, attacks never have a chance to infiltrate a targeted network in the first place. The Proactive Endpoint Protection solutions offered by Morphicsec protect corporate networks against zero-day and unknown attacks without needing any rules, signatures, or any other type of prior knowledge.

Read the original here:
Morphisec Knowledge Update: New WastedLocker Ransomware Causes Havoc Among Some of the Leading Enterprises in the U.S. - Security Boulevard

BREAKING: New York Judge Requests Testimony from Julian …

A New York magistrat judge is requesting testimony from Wikileaks founder Julian Assange in a case involving slain DNC voter data director Seth Rich.

U.S. Magistrate Judge Sarah Netburn requested the international assistance in order to get the testimony.

The parents of Seth Rich are suing FOX News and Judge Netburn wants Assange to testify on Seths role in the leaked DNC documents.

Julian Assange has repeatedly said the documents did not come from Russia. And Robert Mueller interviewed hundreds of witnesses in his anti-Trump witch hunt but never got around to questioning Julian Assange who was the source of leaked DNC documents.

The parents of Seth Rich believe he had nothing to do with the leaked documents to Wikileaks.They may not like what they find out.

TRENDING: EXCLUSIVE: Killer Cuomo Not Only Murdered Thousands of Elderly In Homes, He Also Targeted Adult Care Facilities and Group Homes for People with Disabilities

On November 9, 2016 Ellen Ratner admitted publicly that she met with Julian Assange for three hours the Saturday before the 2016 election. According to Ratner, Julian Assange told her the leaks were not from the Russians, they were from an internal source from the Hillary Campaign.

Rich was murdered before the election in 2016 late at night in Washington DC.

The Epoch Times reported:

A federal magistrate judge in New York requested assistance from a UK court on Aug. 5 in obtaining testimony from WikiLeaks founder Julian Assange for a U.S. civil lawsuit brought against Fox News and others by the parents of slain Democratic National Committee voter data director Seth Rich.

U.S. Magistrate Judge Sarah Netburn requested the international assistance in accordance with the Hague Convention.

In the proper exercise of its authority, this court has determined that the evidence cannot be secured except by the intervention of the English courts and that assistance from the English courts would serve to further the international interests of justice and judicial cooperation, the judge wrote in a memorandum for the senior master of the Royal Courts of Justice.

Joel and Mary Rich, Seth Richs parents, sued Fox News in March 2018 nearly a year after the news network published and retracted an article titled Seth Rich, slain DNC staffer, had contact with WikiLeaks, say multiple sources. The Riches claimed the network inflicted intentional emotional distress on them by slandering their son. The case was dismissed in August 2018, but the Second Circuit Court of Appeals overturned the dismissal more than a year later.

The case has since entered the discovery phase and the judge determined that Assanges testimony is crucial for determining the central dispute between the partieswhether the article was a sham as the Riches claim, or substantially true as maintained by Fox News.

Mr. Assange, as founder of WikiLeaks, is exceptionally suited to provide testimony that will be highly relevant to these issues. Therefore, Fox News, by and through this letter of request issued by the District Court, is formally requesting the testimony of Mr. Assange for use at trial, the request to the UK court states.

Read this article:
BREAKING: New York Judge Requests Testimony from Julian ...

Detailed examination of the Quantum Cryptography Services Market to hold a high potential for growth by 2027 – The Daily Chronicle

Stratagem Market Insights has released the latest research report on Global Quantum Cryptography Services Market. This Quantum Cryptography Services industry report provides information related to market size, production, CAGR, gross margin, growth rate, emerging trends, price, and other important factors. Focusing on the key momentum and restraining factors in this market, the report also provides a complete study of future trends and developments in the market.

The Quantum Cryptography Services report contains all the details of the expected market dynamics and new market opportunities due to the COVID-19 outbreak. Stratagem Market Insights tried to cover all the market analysis of annual economic growth in the latest report on the Quantum Cryptography Services market.

To learn more about this report, request a sample copy*

[The sample copy includes: Report Summary, Table of Contents, Segmentation, Competitive Landscape, Report Structure, Methodology.]

Get Sample Copy of this report:https://www.stratagemmarketinsights.com/sample/21552

According to analysts, the growth of the Quantum Cryptography Services market will have a positive impact on the global platform and will witness gradual growth over the next few years. This report study incorporates all the market growth and restraining factors along with the important trends mentioned between 2020 and 2027.

Competitive Landscape

This section of the report identifies various major manufacturers in the market. It helps readers understand the strategies and collaborations players are focusing on fighting competition in the marketplace. The comprehensive report gives a microscopic view of the market. The reader can identify the manufacturers footprint by knowing about the manufacturers global revenue, the manufacturers global price, and the manufacturers production during the forecast period.

The major manufacturers covered in this report:

(MagiQ Technologies, Quantum XC, Qubitekk, QuintessenceLabs, NuCrypt, Qasky, Crypta Labs)

Market segmentation:

The Quantum Cryptography Services market has been segmented into a variety of essential industries including applications, types, and regions. In the report, each market segment is studied extensively, taking into account market acceptance, value, demand, and growth prospects. Segmentation analysis allows customers to customize their marketing approach to make better orders for each segment and identify the most potential customers.

Lucrative opportunities:

This report examines the challenges facing the global metallurgical complex, as the study listed them all. This made it possible to understand the market and take advantage of all the lucrative opportunities available. The researchers provided a comprehensive study of the current market scenario while focusing on new business goals. There is a comprehensive analysis of the changing customer requirements, customer preferences, and supplier landscape of the overall market.

Regional Insights ofQuantum Cryptography ServicesMarket

In terms of geography, this research report covers almost all major regions around the world such asNorth America, Europe, South America, Middle East, Africa, and the Asia Pacific.Europe and North America are expected to increase over the next few years. Quantum Cryptography Services markets in the Asia-Pacific region are expected to experience significant growth during the forecast period. Advanced technology and innovation are the most important characteristics of North America and the main reason why the United States dominates the world market. The Quantum Cryptography Services market in South America is also expected to expand in the near future.

The main questions answered in the report:

The research and analysis conducted for the Quantum Cryptography Services market have focused on emerging market trends. Research analysts have provided clients with actionable insights to help them identify market opportunities and plan and develop effective strategies to optimize their market position accordingly.

The conclusion of this report provides an overview of the potential for the success of new projects in the market in the near future, with a full range of global Quantum Cryptography Services markets in terms of investment potential in various market segments.

Need a discount?

Note: * Discount is offered on the standard price of the report.

Request a discount for this report @https://www.stratagemmarketinsights.com/discount/21552

Explore by U. Pawar

Originally posted here:
Detailed examination of the Quantum Cryptography Services Market to hold a high potential for growth by 2027 - The Daily Chronicle

How the Army Is Really Using AI – AI Daily

It has always been controversial for the army to implement artificial Intelligence within their task force (particularly with the use of drones) because ethics of it, however artificial intelligence is being implemented within the army in other less controversial ways forget the movie Terminator, artificial intelligence is performing many tedious and manual tasks that would use a lot of time and resources and providing assistance to recognition and conversation systems to predictive analytics pattern matching and autonomous systems.

The army leverage artificial intelligence by (for a more detail example) predicting when vehicle parts may need to be replaced which saves a lot of time, money and increase operational safety. Some programs that leverage data using machine learning include Project Maven that retrieves data from drones and aids to automate some of the work that analysts do again saving time and money. As you can see artificial intelligence is being used to improve the armys efficiency.

Continued here:
How the Army Is Really Using AI - AI Daily

Cryptocurrency Cards: An Unnecessary Solution That Should Be Stopped – Cointelegraph

Crypto cards have become a must-have for many crypto services. Hoping to reduce the risk of blocking transactions, companies have been looking again and again for reason why their customers should use plastic. But a crypto card is a placebo that does not solve the problems of either users or fintech companies its only goal is to bring profit to payment systems and intermediaries.

Crypto cards are not needed in the same way that special financial instruments are not needed to buy gold, oil, precious metals or any other resource. The word cryptocurrency like dollar or euro indicates only the currency for transactions with which the card can be used and does not make the banking product any more innovative. However, until banks and payment systems recognize this, we will be forced to eliminate the consequences of cooperation with Wirecard, WaveCrest and other processors that arent the most conscientious, wanting to make money by taking risks but without being able to manage them.

Bank card technologies have gone through a rapid evolutionary path in a very short period of time. They are the fundamental and connecting element for all retail trade relationships. According to Nilson Report, there are currently more than 22 billion payment cards in circulation around the world debit, credit and prepaid. Taking into account that 1.7 billion people do not use banking services at all, for each of the remaining 6 billion people, there are on average 3.6 cards.

All cards are serviced by payment systems that create a closed consumption ecosystem. Heres what happens:

Banks and processor companies pay Visa, Mastercard, UnionPay, American Express and other international payment systems for the possibility of issuing cards.

Cardholders pay banks an annual fee or transaction fees.

Sellers transfer to banks on average 1%4% of the transaction amount for acquiring servicing.

Various intermediaries, aggregators, API providers, etc. also collect a commission.

The main thing is that in each commission payment between all participants, a share of Visa, Mastercard or another payment system is included. If we are talking about cryptocurrency transactions, then the commission of payment systems will be higher, since the traditional financial industry regards these transactions as high-risk.

And yet, bank cards are almost indispensable for transactions worth up to $5,000. This is the fastest and most convenient way to buy crypto from numerous wallets and/or exchanges. Therefore, it would be naive to think that fintech companies could quickly get rid of the intermediation of payment systems and stop paying them for every transaction.

Nevertheless, Visa and Mastercard can do a lot to make their native cards much friendlier to crypto and become a part of the solution, not part of the problem, which Wirecard has been trying to get around, making this kind of change seem inevitable.

Today, when the volume of non-cash payments in many countries has surpassed cash payments, any company wanting to issue bank cards under its own brand, in theory, has three options.

1. Become a principal (direct) participant in the international system. To do this, you need to meet a number of mandatory criteria: have the necessary technological platform and qualified personnel, meet information security requirements, provide security funds, etc.

For example, last year, a principal Visa participant had to have capital of at least $56 million directly with the Visa payment system. Therefore, you need to have an account in United States dollars in the U.S. or in euro in the European Union. The licensing procedure itself can cost about $1 million, excluding the funds required for the security deposit and direct royalties. This is not a realistic option for small and medium fintech companies.

2. Become an associated member of the payment system through the sponsoring bank. In this case, it is the bank that takes care of the compliance with the payment system requirements. The license fee is $200,000$300,000, plus a deposit of several million dollars.

However, even under such conditions, financial organizations do not want to directly cooperate with crypto companies since transactions with cryptocurrency are classified by payment systems as high-risk due to the lack of a unified approach to regulating this area. This results in higher fees and chargebacks for transactions that have been challenged by the cardholder.

3. Contact a processing company. Unlike banks, processors are responsible for issuing payment cards. Among such processors, crypto services usually find partners with a high-risk appetite that are willing to cooperate. Such companies are ready to use various tricks so that payments passing through them are not blocked by the payment system. For example:

Conceal or falsify before the payment system the main activity of the company for which the issue occurs.

Use incorrect Merchant Category Codes.

Issue crypto cards on their own Bank Identification Number, while according to the rules of payment systems, a separate BIN must be allocated for each individual product.

Issue co-branded cryptocurrency cards, which are, in fact, bank cards with an individual design and are then sold through a crypto service.

Expand the limits of card transactions, regardless of the requirements of payment systems and/or the regulator, etc.

All of these are often unjustified risks that processors like Wirecard take on, increasing the cost of issuing and maintaining crypto cards for both crypto services and end-users. Meanwhile, the value of these crypto cards continues to depreciate.

Until recently, people were forced to buy a fourth or even fifth payment card, only for the sake of the crypto prefix in order to save their money from being blocked during operations with cryptocurrency. However, regulated crypto services have already learned to tackle this problem differently by acting strictly within the framework of compliance requirements and forging links with traditional financial institutions.

High-risk processors like Wirecard or Wavecrest can be compared to microfinance institutions, or MFIs, that lend out at huge interest rates. Usually, people turn to MFIs after numerous and not always objective refusals by banks to issue a loan. Sometimes, the money is needed urgently, and the consideration of the application in the bank is delayed; sometimes the banks scoring system does not like the place of work, marital status or the gender of a person. There may be many reasons, but the result is the same: The bank does not want to take risks and people go to less discerning financial intermediaries. Crypto services are forced to do this, too.

A cryptocurrency card is a ridiculous, temporary and forced necessity because banks and payment systems do not want to manage risks on their own. All the risks that Wirecard once assumed when working with crypto companies are now easily eliminated.

Licensing of activities in the field of cryptocurrencies, the implementation of KYC/AML procedures, obtaining a compliance certificate of the payment card industry data security standards and other measures allow crypto services to successfully work with the traditional financial system.

Banks should have the courage to start making money by partnering with regulated crypto services. And for this, above all else, it is necessary to develop internal expertise in the field of compliance. As bank employees have had little motivation to deal with the peculiarities of high-risk transactions, it is easier for them to refuse service to potential clients and/or stop transactions.

However, if a banks compliance service monitors and skips high-risk transactions on a regular and systematic basis, this will create additional cash flow, from which banks could also receive commissions. I am sure that cryptocurrency users right to dispose of honestly received assets should be ensured in an absolutely transparent, legal way, and not by gray schemes. Any card can be crypto, and this is the reality we should all be living in sooner rather than later.

The views, thoughts and opinions expressed here are the authors alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.

Alex Axelrod is the founder and CEO of Aximetria and Pay Reverse. He is also a serial entrepreneur with over a decade of experience in leading world-class technological roles within a large, number-one national mobile operator and leading financial organizations. Prior to these roles, he was the director of big data at the research and development center of JSFC AFK Systems.

See the original post here:
Cryptocurrency Cards: An Unnecessary Solution That Should Be Stopped - Cointelegraph

Free speech experts call on public schools to not penalize students for sharing images of maskless classmates – ABC 57 News

(CNN) -- As scores of American children return to classrooms under the shadow of the coronavirus pandemic, free speech experts have bristled at the sight of a public school punishing a student for practicing her right to free speech by sharing a photo of classmates not wearing masks and not social distancing on campus.

This issue became a flashpoint this week after sophomore Hannah Watters was disciplined for posting a photo on Twitter showing many of her fellow North Paulding High School classmates in Dallas, Georgia not wearing masks while walking down a crowded hallway. The photo was posted on Twitter at the end of dismissal, Watters said.

"I took it mostly out of concern and nervousness after seeing the first days of school," she said. "I was concerned for the safety of everyone in that building and everyone in the county because precautions that the CDC and guidelines at the CDC has been telling us for months now weren't being followed."

Watters, who also shared a video showing what dismissal looked like at the end of a school day, was suspended for five days for violating several parts of the school's code of conduct, she said. Those violations included using a cell phone during school hours, using social media during school hours and violating student privacy by photographing them, she said. The school reversed the suspension on Friday; Watters can return to class on Monday, she added.

What happened to Watters can befall other students as the pandemic persists and schools reopen around the US, said Mike Hiestand, senior legal counsel for the Student Press Law Center. The center is a non-profit organization that works to support and defend the First Amendment and press freedom rights of high school and college journalists and their advisers.

"I've little doubt that these sorts of conflicts are going to dominate my life over the next many months," Hiestand told CNN. "People tend to assume that most censorship issues involving student journalists concern stories about sex, drugs and rock and roll sort of stuff. Not true. By far the most common targets for censorship are accurate, lawful stories that school officials believe cast the school in a negative light. Student stories showing their school's response to Covid has censorship written all over them."

There is no expectation of privacy in a crowded public school hallway, Hiestand said. As such, there's no reasonable claim that these sorts of photos are violating anyone's legal right to privacy, particularly now when the lead headline of many news organizations has to do with students returning to school during a global pandemic, he added.

Watters' photo "is about as newsworthy -- and therefore, non-private -- as it gets," Hiestand said.

The freedom of speech protection afforded by the First Amendment applies to people of any age and, thanks to the Supreme Court, that unequivocally includes students.

The Supreme Court has famously ruled that students do not shed their First Amendment rights at the schoolhouse gate, and that holds true today as much as it did in 1969, said Roy Gutterman, an attorney and director of the Tully Center for Free Speech at Syracuse University's Newhouse School.

In the case of Tinker v. Des Moines Independent School District, the Supreme Court ruled in 1969 that Iowa public school officials had violated the First Amendment rights of several students after suspending them for wearing black armbands protesting the US involvement in Vietnam, according to the Middle Tennessee State University Free Speech Center's website.

The court determined that school officials could not censor student expression unless they can reasonably predict that the expression would cause a substantial disruption of school activities, the center said.

When it comes to cell phones and whether they are a disruption, administrators can impose reasonable restrictions such as not using them during school hours but a principal cannot legally control what students post on social media off campus or after hours, though these attempts are seen from time to time, Gutterman said.

"It would be unreasonable to punish students who are exposing misbehavior or other problems during this public health crisis. If a student exposes something like this, the student is more akin to a whistleblower or public critic and should be praised rather than punished," Gutterman added.

Zach Parsons is a sophomore at North Paulding High School who said it's dangerous for schools to have in-person instruction. He's not wrong, particularly when it comes to students in Georgia.

Four students from three Georgia high schools who attended classes in person this week have tested positive for Covid-19, Columbia County School District Superintendent Sandra Carraway told CNN.

Teachers gathered outside of Gwinnett County Schools this week in their cars honking in protest over reopening schools. As of Wednesday, there were 28 confirmed and 67 suspected cases of Covid-19 among employees of Gwinnett County Public Schools, according to the district. The district has identified 168 close contacts of those people, resulting in a total of 263 employees impacted by either a positive test result or quarantine, it said.

In Georgia's Cherokee County School District, at least 260 students and eight teachers were quarantined after several individuals have tested positive for Covid-19 during the first week of school. The district returned to in-person learning on Aug. 3.

This trend has extended beyond Georgia. Students in Mississippi and Indiana have tested positive for Covid-19 after school districts reopened.

At North Paulding High School, following Watters' photo, around 40% of students were seen wearing masks, Parsons, the student, said. In a letter to the community this week, Paulding County Superintendent Brian Otott said "Wearing a mask is a personal choice, and there is no practical way to enforce a mandate to wear them."

For any students concerned about their health and who are facing circumstances like in North Paulding High School, Hiestand of the Student Press center has two words of advice: be brave.

"Use the new speech tools that are available to say what you need to say," Hiestand added. "As John Lewis said a month before he died: 'And to see all of the young people...standing up, speaking up, being prepared to march. They are going to help redeem the soul of America and save our country and maybe help save the planet.'"

The-CNN-Wire & 2018 Cable News Network, Inc., a Time Warner Company. All rights reserved.

Continued here:

Free speech experts call on public schools to not penalize students for sharing images of maskless classmates - ABC 57 News

Rick Gates, Ex-Trump Aide and Mueller Witness, Is Publishing a Memoir – The New York Times

News of Mr. Gatess book was reported earlier by Business Insider.

Other books from former Trump aides and associates are in the pipeline, including a memoir from Michael D. Cohen, Mr. Trumps former lawyer, who is serving a three-year prison sentence for campaign finance violations and other crimes that were part of an effort to pay for the silence of two women who said they had affairs with Mr. Trump. Mr. Cohens book is tentatively titled Disloyal: The True Story of Michael Cohen, Former Personal Attorney to President Donald J. Trump. Last month, Mr. Cohen, who was on furlough because of the coronavirus, said that a decision to return him to prison was an attempt by the administration to punish him for writing the book, and a judge agreed, ordering him released back to home confinement.

Mr. Gates, who has never spoken publicly about his experience on the Trump campaign apart from his testimony, is likely to face fewer obstacles to sharing his account. He never served in the administration so does not face a government review to ensure he isnt sharing classified information. In his book, Wicked Game, Mr. Gates adds context to the publicized, politicized public account provided in the Mueller investigation, including information that was left out of the report, he said in an interview on Friday.

Readers hoping for another explosive tell-all about the president may be disappointed. Mr. Gates said he isnt trying to settle scores and that his book takes a middle of the road approach, a position that could hamper the books commercial prospects in a polarized media environment. At one point, Mr. Gates had a deal with a big publishing house, but it fell through because he declined to make changes that the publisher requested, including removing passages that were critical of the Mueller investigation, he said. Instead, Wicked Game is being released by a smaller, independent press that specializes in conservative political books, as well as business, self-help, health, military and Christian titles. Mr. Gates co-wrote it with Mark Dagostino, who has worked on books with Chip and Joanna Gaines and Hulk Hogan.

Its not a salacious book, Mr. Gates said.

He added that his book will shed new light on the inner workings of the Mueller investigation, which he is highly critical of, as the books subtitle, An Insiders Story on How Trump Won, Mueller Failed, and America Lost suggests. He describes the hard-nosed tactics prosecutors used and notes that Robert S. Mueller III never interviewed him. Mr. Gates said he isnt aiming to walk back his guilty plea.

I accepted the charges, and I knew the consequences that were associated with them, Mr. Gates said. At the end of the day, they did find me as the most credible fact witness.

The rest is here:

Rick Gates, Ex-Trump Aide and Mueller Witness, Is Publishing a Memoir - The New York Times