How the Portland Secret Police Happened – The Bulwark

The rule of law matters most in times of crisis.

Today, America is in crisis along multiple fronts and instead, we may be sliding into unauthorized and unaccountable federal policing and domestic security activity.

This is the story of what has happened.

On May 25, George Floyd was killed by police officers in Minneapolis. In the weeks that followed there were public protests across the nation, as well some concurrent acts of violence.

During the period, federal law enforcement personnel were deployed robustlypurportedly to protect federal property and restore public safetyin the nations capital and elsewhere. Over 15 different federal government agencies or components, including multiple agencies across the Department of Justice and the Department of Homeland Security (DHS) were reported as taking part in the federal law enforcement response in the District of Columbia in May.

This past week, DHS personnel, including officers of the Customs and Border Patrol (CBP), were deployed by the Acting Secretary of Homeland Security to conduct domestic law enforcement activities in Portland.

But policing protest activity, in particular, requires a special sensitivity to and protection of constitutional rights. And the reports out of Portland indicate that DHS has provided an uncontrolled and over-militarized response.

Moreover, these assignments of federal officers to control domestic unrest may be part of a broader slide toward a federal domestic security expansion that has neither been announced, nor vetted either by the citizenry, the Congress, or the courts.

The unfolding situation in Portland as it relates to DHS, in particular, has been brewing for some time due to a combination of inherent insufficiencies within DHSs internal controls and inappropriate political pressure.

First, lets look at the politicization. During the campaign of 2016, candidate Trump ingratiated himself to the Border Patrol union, previewing a potential politicization of that workforce. In a spring 2019 visit with border agents at Calexico, California, Trump indicated a willingness to use his pardon authority for if CBP refused to allow migrants U.S. entry pursuant to existing asylum laws.

Meanwhile, the president has marginalized the FBI while pivoting to DHS to carry out his law and order agenda. Trump has fired, removed or pressured to resign nearly every Senate-confirmed leadership official in DHS, leaving the department with inadequate leadership relative to the size, budget, and broad scope of responsibilities. Last year, Garrett Graff and I warned that DHSs trouble stemming from internal public corruption, inadequate training and lack of transparency makes it more susceptible to inappropriate political pressure.

In May, as a result of a years worth of research and consultation with former DHS senior officials, former legislative staff and outside experts, I put forth a report arguing that DHS requires immediate congressional attention to improve its internal oversight and accountability mechanisms. In particular, the report called attention to the need for modernized and department-wide guidelines for conducting law enforcement activity, as well as updating the departments mission, which has become wildly out of sync with its day to day activities.

In short: The extent to which DHS is becoming almost a rogue arm of federal law enforcement should not surprise anyone who has followed the department for the last four years.

But the expanding federal domestic security presence may not be limited to DHS.

In connection with the May protests in the District of Columbia an associate deputy attorney general approved a request from the acting administrator of the Drug Enforcement Administration (DEA) for the temporary authority to enforce any federal crime committed as a result of protests over the death of George Floyd.

This memo, first reported and published by Buzzfeed, could be subject to ongoing reauthorization. The policy authorizes DEA to enforce other criminal laws outside of its usual remit of drug enforcement by supplementing law enforcement efforts of other organizations for the purposes of public safety. This expansion alone, under the circumstances, would be unobjectionable. But the memo went further. It also authorizes DEA to conduct covert surveillance and share intelligence as part of its supplemental activities.

Those provisions open the door to DEA agents conducting physical surveillance without identifying themselves, using technical surveillance techniques over crowds of individuals without suspicion of wrongdoing, and otherwise collecting intelligencecovertlyon individuals purposefully exercising their First Amendment rights.

And this sort of clandestine activity clearly crosses the line into domestic security activities.

Most law enforcement activities do not require covert activity. And when undercover activities are needed, they are performed according to strict rules and procedures and approvals. These approvals are given on a case by case basis.

In the normal course of events, law enforcement activity is conducted openly: agents identify themselves when they conduct interviews, execute searches, or make arrests.

Why should law enforcement need to use covert means to protect public safety in the context of public protests?

Indeed, it is hard to imagine a scenario where covert surveillance would be necessary in such a context. The United States of America is not Colombia and the people protesting the death of George Floyd are not sicarios who track down government agents for retribution.

The DEA memo is also missing an important qualifier: That surveillance or investigative activity would not be permitted solely on the basis of First Amendment activity.

That simple proviso is the key between allowing police or federal authorities to use investigative techniques inside the United States for legitimate reasons versus allowing the creation of an unfettered domestic security apparatus. Its the key to requiring that there be some other reasonsuch as an indication of criminal activity or foreign intelligence threatto apply the weighty powers of the federal government against an individual in contradiction of his or her constitutional rights.

Existing attorney general-approved guidelines include this very proviso, prohibiting conducting investigations solely for the purpose of monitoring First Amendment activity. Congress added a similar requirement to the Foreign Intelligence Surveillance Act, ensuring that surveillance and searches conducted for foreign intelligence purposes could not be based solely on First Amendment activity.

If we were going to take the most generous possible interpretation here, we might suggest the following:

Given Attorney General Bill Barrs public statements regarding purported violent Antifa activity concurrent with legitimate protest activityand the presidents public statements about domestic terrorismthat DOJ is increasing its domestic terrorism investigative activity against that or other networks of affiliated individuals who are causing real damage and committing acts of violence.

But even if you took that extremely friendly view, doing so would not require a special order to the DEA. Such activity would appropriately be conducted under the attorney generals standing guidelines governing FBI domestic operations and would take place in accordance with internal FBI policies and procedures.

It is important to understand that these changes are new. America has never had a purely domestic security service.

After September 11 there was a robust debate in this country over whether or not one should be created. The 9/11 Commission specifically rejected the notion that creating a domestic intelligence agency was a good idea.

Why? The reason here is vitally important: The Report argued that the creation of such an organization could lead to abuses of civil liberties [that] could create a backlash that would impair the collection of needed intelligence to combat actual national security threats.

Read that again: Standing up a domestic security service would lead to abuses of civil liberties [that] could create a backlash that would impair the collection of needed intelligence to combat actual national security threats.

Instead, Congress provided additional resources to the FBI, and Robert Mueller directed an organizational transformation to strengthen the Bureaus national security division, especially its counterterrorism activities. The FBI went from prioritizing mobsters to prioritizing terrorists.

The post-9/11 government structure provided for:

The United States should not feel compelled to stick with the post-9/11 structure without sufficient attention to modernizing the governments ability to address a changing threat environment. But the changing threat environment does not call for a federalized police force or internal security service.

Yet among the agencies that have been deployed to conduct physical security and law enforcement over the past two months are various components of DHS. Perhaps an unintended consequence, DHS is now the organization with the largest number of federal law enforcement officers of any government department.

It should be obvious, but in case it needs saying out loud:

The reason to not have a domestic security service is rooted in aversion to creating anything that might have the potential to morph into a Stasi-like organization.

Because a domestic security service is incongruous with the exercise of constitutional rights.

But its not enough just to avoid the active creation of a dedicated domestic security service. We must also guard against the unintentional authorization of federal domestic security activities due to neglect, or bureaucratic chaos, or the political ambitions of appointees trying to curry favor with a proto-authoritarian president.

Original post:

How the Portland Secret Police Happened - The Bulwark

First Thing: American scientists wade into politics with a Trump rebuke – The Guardian

Good morning.

As Donald Trump continues to downplay or denigrate the advice of his own administrations scientists, more than 1,200 members of the US National Academy of Sciences have now signed an open letter urging the president to restore science-based policy in government. The letter began in 2016 as a response to Trumps refusal to act on their warnings over the climate crisis, but it has rapidly accumulated fresh signatures amid the Covid-19 pandemic.

The White Houses most recent affront to science is its bid to prevent billions of dollars being spent on crucial coronavirus track-and-trace efforts. On Sunday, with US deaths surpassing 140,000 and confirmed case numbers moving inexorably towards 4 million, Trump described the nations top infectious disease expert, Dr Anthony Fauci, as a little bit of an alarmist.

It was one of the most troubling moments in an interview that was by turns shocking and unintentionally hilarious: speaking to Chris Wallace of Fox News on Sunday, Trump refused to commit to accepting the election result if his rival, Joe Biden, wins the presidency in November. I have to see, Trump said. Im not going to just say yes.

Kanye West launched his presidential campaign with a chaotic rally in South Carolina on Sunday, and a rambling speech that took in abortion, Harriet Tubman and the terms of the rappers promotional deal with Adidas.

The former red state of Arizona is now an electoral battleground, which could decide the result in 2020, as Lauren Gambino and Maanvi Singh report.

After more than 50 nights of anti-racist protest in Portland, Oregon, sparked by the death of George Floyd, the city is now patrolled by federal agents, parachuted in by the Trump administration, wearing camouflage gear and driving unmarked vehicles. The citys mayor has demanded they be removed, saying their presence is actually leading to more violence and vandalism, while Oregons attorney general has vowed to seek a restraining order against them.

These shock troops are there to exert power, bully dissenters and intimidate Americans into giving up their first amendment protections, argues Francine Prose:

Government-funded thugs, assaulting citizens, still conjure up repellent images of Hitlers brown shirts stomping their fellow Germans, and the street kidnapping of civilians has been the hallmark of authoritarian dictatorships.

The British government is expected to suspend its extradition treaty with Hong Kong in response to Chinas security crackdown on the supposedly autonomous territory, as the UK is drawn further into the dispute over Beijings dire human rights record.

Over the weekend, the Chinese ambassador to the UK was confronted on a TV news show with drone footage of hundreds of blindfolded, shackled prisoners being herded on to trains in Xinjiang, amid widespread reports of large-scale persecution of the regions Muslim Uighur minority. Uighur people enjoy peaceful, harmonious coexistence with other ethnic groups, Liu Xiaoming insisted.

The UAE has launched the Arab worlds first mission to Mars. The unmanned probe called Al-Amal, or Hope took off from Japan early on Monday, joining the US and China in the race to the red planet.

John Lewis should be honoured with a new voting rights bill, the House majority whip James Clyburn has argued. Clyburn also suggested the Edmund Pettus Bridge in Selma, Alabama, be renamed in honour of the late congressman who famously led civil rights marchers across it in 1965.

Roger Stone used a racial slur during a radio interview with host Morris OKelly, who is black. The veteran political dirty trickster was being grilled on Trumps controversial commutation of his prison sentence, when he could be heard to mutter that he was arguing with this negro.

Haley Joel Osment: Acting was like going to camp

Haley Joel Osment was 10 years old when he made The Sixth Sense. Now a successful character actor in his 30s, he tells Elle Hunt why Hollywood child stardom doesnt always lead to a blowout: I think the percentage of people having a positive experience working as children is much higher than most people imagine.

How coronavirus is reshaping Europes tourist hotspots

Europes major tourist cities have been near-deserted amid the lockdown. But now that they can begin to welcome visitors back, the likes of Venice and Prague also have an opportunity to rethink their model for deleterious mass tourism. Stephen Burgen and Angela Giuffrida report from Barcelona and Rome respectively.

The black creatives holding K-pop to account

A striking number of K-pop hits are written and produced by black Americans and a significant percentage of Americas K-pop fans are black. But many of them are still waiting for Koreas music industry to develop a more sensitive and global understanding of race, as Elizabeth de Luna writes.

Joe Biden has done what Democratic presidential candidates almost never do after winning the primary: tack to the left. His climate plans are the most ambitious ever proposed by a nominee, says Julian Brave NoiseCat. Its the Green New Deal in all but name.

Biden views the workers, unions and communities of color most impacted by the fossil fuel economy and the potential shift away from it as deserving special attention. In his view, climate action cannot be separated from economic, environmental and social justice.

Many people became gardeners during lockdown. A few of those gardeners also became archaeologists. The British Museum says the period has seen a spate of historical discoveries by people in the UK, who have unearthed coins, arrowheads and other ancient artefacts, all while digging up their own flowerbeds.

First Thing is delivered to thousands of inboxes every weekday. If youre not already signed up, subscribe now.

Read the rest here:

First Thing: American scientists wade into politics with a Trump rebuke - The Guardian

New Process Simplifies the Transmission of Quantum Data – AZoQuantum

Written by AZoQuantumJul 17 2020

Everyone knows that the quantum world can transform communication technology. Quantum technology offers the potential of impenetrable security and unparalleled performance, and is taking its initial steps towards the decisive goal of applications such asextremely encrypted yet virtually fast-as-light financial transactions.

But the potential for quantum computers to interact with each other has been restricted by the resources needed for such kinds of exchanges. This has consequently limited the proportion of data that can be traded, and also the amount of time it can be preserved.

Now, Japan-based researchers have taken a significant step toward dealing with such limitations in resources. The team has published its findings in the Physical Review Letters journal on May 27th, 2020.

To connect remote quantum computers together, we need the capacity to perform quantum mechanical operations between them over very long distances, all while maintaining their important quantum coherence.

Kae Nemoto, Study Author, Professor and Director, Global Research Center for Quantum Information Science, National Institute of Informatics

Nemoto continued, However, interestingly, while quantum computers have emerged at the small scale, quantum communication technology is still at the device level and has not been integrated together to realize communication systems. In this work, we show a route forward.

Quantum data needs to be protected from the considerable level of noise surrounding it, and data is also likely to be lost from the preliminary message. Such a protection process is referred to as quantum error correction, which intertwines a single piece of data over several qubits. Qubits happen to be the most fundamental unit of quantum data.

Individuals can envision a letter shredded into nine pieces, with each piece placed inside an envelope and each envelope delivered to the same kind of destination to be again organized and read.

Similarly, in the quantum realm, the envelopes are sent through photons and each envelope contains a sufficient amount of data to reproduce the whole letter if any of the delivered envelopes are damaged or lost.

The overhead to protect quantum information from noise and loss will be large, and the size of the required devices to realize this will cause serious problems, as we have started to see in today's quantum computer development. As the efforts to realize the quantum internet are occurring worldwide, it is important to think of it as a system, and not simple devices.

Kae Nemoto, Study Author, Professor and Director, Global Research Center for Quantum Information Science, National Institute of Informatics

Along with her research team, Nemoto tackled this problem by employing a procedure known as quantum multiplexing, where they decreased the noise and also the number of resources required to relay the data.

In multiplexing, the data stored inside a pair of individual photons is integrated into a single photon, similar to a couple of envelopes being delivered in a portfolio, and therefore, the data is still protected individually but only a single stamp is required to transmit the information.

In this system, quantum error correction will play an essential role, not only of protecting the quantum information transmitted, but also for significantly reducing the necessary resources to achieve whatever tasks one needs. Quantum multiplexing enables significant resource reduction without requiring new technology to be developed for such quantum communication devices.

William J. Munro, Study Co-Author and Researcher, Basic Research Laboratories, NTT

At present, the scientists are extending their study to large-scale quantum complex network situations.

The quantum revolution has allowed us to design and create new technologies previously thought impossible in our classical world, added Nemoto. Small-scale quantum computers have already shown computing performance better than todays largest supercomputers.

However, many other forms of quantum technology are emerging and one of the most profound could be the quantum internet a quantum-enabled version of todays internetwhich will allow us to network devices together, including quantum computers, Nemoto further stated.

The scientists will next build on the initial steps that they have already adopted to boost the amount of data as well as the storage time.

The study was partly funded by the Japan Society for the Promotion of Science and the John Templeton Foundation.

Others who contributed to the study are Nicol Lo Piparo, Michael Hanks, Claude Gravel, and William J. Munro, all affiliated with the National Institute of Informatics. In addition, Munro is affiliated with the NTT Basic Research Laboratories as well as the NTT Research Center for Theoretical Quantum Physics.

Lo Piparo, N., et al. (2020) Resource Reduction for Distributed Quantum Information Processing Using Quantum Multiplexed Photons. Physical Review Letters. doi.org/10.1103/PhysRevLett.124.210503.

Source: https://www.rois.ac.jp/en/

Continue reading here:
New Process Simplifies the Transmission of Quantum Data - AZoQuantum

Researchers Develop Graphene Ribbons That Behave Like Semiconductors – News – All About Circuits

As we all know, graphene is a revolutionary material consisting of a single layer of carbon atoms arranged in a honeycomb lattice.

Since its discovery, it has been a material of great interest because of its properties, making it useful for a broad range of potential next-gen applications, including several in electronics. These properties include excellent electrical conductivity as well as high strength and rigidity.

Today, research teams worldwide are working around the clock to build on these characteristics by substituting the carbon atoms in graphene's crystal lattice with atoms of different elements.

Professor Ernst Meyer leads one of these teams at the University of Basel, which, along with colleagues from the University of Bern, claim to have succeeded in producing the world's first graphene ribbons whose crystal lattice contains both periodic pores and a regular pattern of nitrogen atoms.

The team's material structure takes the form of a ladder, with each rung on this "ladder" containing two atoms of nitrogen. The researchers heated the individual building blocks in a step-by-step process on a silver surface in a vacuum to synthesize these porous, nitrogen-containing graphene ribbons.

It is only when temperatures hit 220C that graphene ribbons are formed. By using atomic force microscopy, the researchers were able to monitor the individual steps in the synthesis of the material and confirm the perfect ladder structure and its stability.

Individual building blocks are heated on a silver surface in order to synthesize a porous graphene ribbon that exhibits semiconducting properties and a ladder-like structure, in each rung of the ladder, two carbon atoms have been replaced with nitrogen atoms (blue). Image credited to University of Basel

Furthermore, through scanning tunneling microscopy, the research team also demonstrated that their new graphene ribbons were no longer electrical conductors like pure graphene, but rather that they behaved as semiconductors. These findings were confirmed by researchers at the University of Bern and the University of Warwick through additional theoretical calculations of the electronic properties.

"The semiconducting properties are essential for the potential applications in electronics, as their conductivity can be adjusted specifically," said Dr. Rmy Pawlak.

And although further research is yet to be carried out, we know that a high concentration of nitrogen atoms in the crystal lattice causes the graphene ribbons to magnetize when exposed to a magnetic field.

"We expect these porous, nitrogen-doped graphene ribbons to display extraordinary magnetic properties," says Ernst Meyer. Thus, it is thought that the ribbons could be of interest for potential applications in the field of quantum computing.

Continued here:
Researchers Develop Graphene Ribbons That Behave Like Semiconductors - News - All About Circuits

This felon still has more to answer for – Las Vegas Sun

By Harry Litman

Monday, July 20, 2020 | 2 a.m.

President Donald Trumps commutation of Roger Stones sentence is a body blow to two core democratic values.

The first, and most immediate, is the principle of fair and impartial justice for all. It is a travesty that Stone who was plainly guilty of serious crimes, who thumbed his nose repeatedly at the justice system, who continues to challenge his convictions is now a free man. There is little that can be done now to reverse that injustice.

The second principle is the publics right to know, in this case about the full story of the 2016 election and the Trump campaigns complicity in Russias attack on American institutions. Here Stone may yet be called to account, and that should be a goal shared across political boundaries.

The perversion of justice in Stones case stinks. The commutation vividly illustrates Trumps corrupt two-tiered system: the full force of law for everyone but his cronies and supporters. The special status of Trumpers provided Stone a pass on the most basic of the norms associated with such executive branch actions: People convicted of crimes are not supposed to be eligible for commutation until they begin to serve their sentences and cease challenging their convictions, neither of which Stone has done.

In fact, Stones commutation is arguably the most corrupt use of the presidents constitutionally granted pardon power in history and one of the most corrupt acts of Trumps abysmal presidency. Other controversial pardons in history have provided preferential treatment to friends of the president; this one served to directly protect Boss Trump himself. Trump got Stones silence, Stone got freedom, and the public got shafted.

The exact nature of that shafting is not trivial. As special counsel Robert Muellers report makes clear, Stones lies and his obstruction, including witness tampering are major reasons why to this day, there are large gaps in our understanding of the Russian attack on the 2016 election and the Trump campaigns complicity in it.

Stone is the key witness on two not fully answered questions. The first is whether Trump and the campaign knew in advance about or even collaborated on the WikiLeaks dump of purloined emails from the Clinton campaign. Indeed, freshly unredacted material in the Mueller report indicates that Paul Manafort told Mueller that Stone had been tipped off and had passed that info along to Trump or the campaign. The second question is whether Trump lied in his written answers to Mueller when he claimed he couldnt remember the specifics of any conversation with Stone in the six months before the election.

On both issues, the government should not be finished with Stone. He can and should be made to testify under penalty of perjury.

If he is subpoenaed, Stone could assert his Fifth Amendment right not to incriminate himself. Because his sentence was commuted, as opposed to his being pardoned, his convictions stand and the book is not fully closed on the crimes. His further testimony could be used against him as regards those crimes.

But theres a fairly easy workaround, as Muellers deputy Andrew Weissmann explained in a New York Times op-ed this week. If Stone takes the Fifth, the government could grant him immunity, and his liability would disappear.

Immunity isnt something the government offers casually, but it is appropriate when the value of witness testimony is paramount as is the case here and there is no other way to get it. Once immunized, if Stone were to persist in refusing to answer questions, he could be jailed for civil contempt until he agreed to talk. And if he lied (again), he would be subject to brand new perjury charges.

Where should this testimony take place? I suggest Congress, either as part of regular congressional hearings or, possibly, under the aegis of a broad-based commission on Russian election interference, much like the commissions that investigated 9/11 and the Kennedy assassination. Such investigations are specifically meant to inform the American people.

It is galling that the president has managed to foil nearly every effort to impose punishment on his cronies and himself. The ledger is not yet closed, however, and a fuller reckoning may await them after Trump leaves office.

In the meantime, the American people and their lawmakers urgently need to get the fullest possible account of exactly what happened to our election infrastructure in 2016. Examining systemic failures and enemy attacks is what democracies do, not least because it is the only way to reduce the risk of similar harms going forward.

Trump seems to believe that by commuting Stones sentence he closed the book on what Stone knows, ensuring his buddys lifelong silence. Trump has the power to keep Stone out of prison for the felonies he has been convicted of, but keeping him silent is another matter. Commutation notwithstanding, its likely the day will come when Stone has to sing or sink.

Harry Litman is a columnist for the Los Angeles Times.

See the article here:
This felon still has more to answer for - Las Vegas Sun

Ignition to identification – the ‘car key’ is evolving – Lexology

The function of the car key is changing. The ignition lock was initially invented in the early 20th century although cars still required a driver to crank the engine by hand before the car could be driven. With the introduction of the starter motor the car key also functioned as a means of initiating ignition, as well as a means of securing access to the vehicle. In the mid-1990s central locking systems led to the development of the smart key, the mere presence of which enabled the driver to access and drive the car without placing it into the ignition. The car key was now electronic, and any mechanical engagement with car was no longer needed.

Recent developments have seen car keys evolve further, and the very idea of the car key is now as much about digital identity as it is about access and ignition.

Recent developments

UK-based security innovator Trustonic recently announced that it is providing a secure digital car key system to Volkswagen and Hyundai that is based on the provision of a secure communication path between a drivers mobile device and the cloud. This utilises the concept of a Trusted Execution Environment, which protects the part of the mobile device that executes the relevant program code from the threats from the remainder of the device; and a Trusted User Interface which enables applications to interact with the driver whilst providing complete isolation from the devices main operating system. This provides a secure cryptographic exchange between a drivers mobile device and the vehicle for the purpose of accessing the vehicle.

Less about access and more about the identity of the driver, the recently launched Volvo Care Key enables the owner of the car to set a speed limit on their car depending on who is driving it. This means that in the same way that parents have become used to setting user restrictions on phones and tablets, a car owner can set a reduced speed limit if lending their vehicle to a younger relative or a less experienced driver.

Direction

The development of these technologies have slightly different aims. The former is about authentication of the driver and the latter is about authorisation and the ability to place restrictions on the way a driver is able to control the vehicle.

As cars become more and more connected as part of the internet-of-things, this expanded functionality of the car key becomes more and more about the digital identity of the driver than about accessing the car or switching the engine on. The digital identity of the driver represents the interaction of the driver with the car and the wider network, whether that be the internet-of-things, the connected car infrastructure or even just the internal management systems which control the car whilst it is being driven. It seems likely that each of us will have a user profile linked to our car keys, that will allow the car to adapt automatically to our driving permissions, physical requirements and even our streaming playlists.

Cybersecurity

Digital identity management has been discussed as an improvement to cybersecurity and its application to drivers and their interaction with their vehicles is no different. The increased cybersecurity provided by the latest car key solutions will make cars more difficult to steal and more difficult to misuse as an entry point into a network of connected devices or as a physical tool to nefariously cause physical damage.

However, cybercriminals see opportunities and weaknesses even in the strongest systems and what seems ironclad today could become a weakness tomorrow. It is therefore imperative that innovators in the automotive sector stay ahead of cybercriminals by understanding the vulnerabilities in both their technologies and the wider transport infrastructure, as well as recognising the opportunities these provide for improving driver experience and security.

Moving forward

The management of a drivers digital identity is vitally important as cars become extensions of our connected environment rather than simply tools to move us from the proverbial A to B. Maintaining the cybersecurity is also vital as any vehicle can be a source of enormous problems in the hands of a cybercriminal. As personal data becomes intertwined with vehicle usage, it is also important that user privacy is respected, as indicated in the recently published guidelines from the European Data Protection Board, discussed previously. At the same time, the ability to identify a driver will remain essential for the purpose of law enforcement.

A trusted automotive infrastructure needs to meet all of these challenges if it is going to be fully accepted and adopted by the public. Embedding a car key inside a mobile device using cryptography is a very elegant solution to preventing unauthorised access to a vehicle, but the safety of the user and their data must remain a priority.

More here:
Ignition to identification - the 'car key' is evolving - Lexology

Five practical issues in machine learning and the business implications – ITProPortal

Businesses today are dealing with huge amounts of data and it's arriving faster than ever before. At the same time, the competitive landscape is changing rapidly and its critical to be able to make decisions fast.

As Jason Jennings and Laurence Haughton put it Its not the big that eat the small It's the fast that eat the slow.

Business success comes from making fast decisions using the best possible information.

Machine learning (ML) is powering that evolution. Whether a business is trying to make recommendations to customers, hone its manufacturing processes or anticipate changes to a market, ML can assist by processing large volumes of data to better support companies as they seek a competitive advantage.

However, while machine learning offers great opportunities, there are some challenges. ML systems rely on lots of data and the ability to execute complex computations. External factors, such as shifting customer expectations or unexpected market fluctuations, mean ML models need to be monitored and maintained.

In addition, there are several practical issues in machine learning that need to be solved. Here we will take a close look at five of the key practical issues and their business implications.

Machine learning systems rely on data. That data can be broadly classified into two groups: features and labels.

Features are the inputs to the ML model. For example, this could be data from sensors, customer questionnaires, website cookies or historical information.

The quality of these features can be variable. For example, customers may not fill questionnaires correctly or omit responses. Sensors can malfunction and deliver erroneous data, and website cookies may give incomplete information about a users precise actions on a website. The quality of datasets is important so that models can be correctly trained.

Data can also be noisy, filled with unwanted information that can mislead a machine learning model into making incorrect predictions.

The outputs of ML models are labels. The sparsity of labels, where we know the inputs to a system but are unsure of what outputs have occurred, is also an issue. In such cases, it can be extremely challenging to detect the relationships between features and the labels of a model. In many cases, this can be labour intensive as it requires human intervention to associate labels to inputs.

Without accurate mapping of inputs to outputs, the model might not be able to learn the correct relationship between the inputs and outputs.

Machine learning relies on the relationships between input and output data to create generalisations that can be used to make predictions and provide recommendations for future actions. When the input data is noisy, incomplete or erroneous, it can be extremely difficult to understand why a particular output, or label, occurred.

Building robust machine learning models requires substantial computational resources to process the features and labels. Coding a complex model requires significant effort from data scientists and software engineers. Complex models can require substantial computing power to execute and can take longer to derive a usable result.

This represents a trade-off for businesses. They can choose a faster response but a potentially less accurate outcome. Or they can accept a slower response but receive a more accurate result from the model. But these compromises arent all bad news. The decision of whether to go for a higher cost and more accurate model over a faster response comes down to the use case.

For example, making recommendations to shoppers on a retail shopping site requires real-time responses, but can accept some unpredictability in the result. On the other hand, a stock trading system requires a more robust result. So, a model that uses more data and performs more computations is likely to deliver a better outcome when a real-time result is not needed.

As Machine Learning as a Service (MLaaS) offerings enter the market, the complexity and quality of trade-offs will get greater attention. Researchers from the University of Chicago looked at the effectiveness of MLaaS and found that they can achieve results comparable to standalone classifiers if they have sufficient insight into key decisions like classifiers and feature selection.

Many companies use machine learning algorithms to assist them in recruitment. For example, Amazon discovered that the algorithm they used to assist with selecting candidates to work in the business was biased. Also, researchers from Princeton found that European names were favoured by other systems, mimicking some human biases.

The problem here isnt the model specifically. The problem is that the data used to train the model comes with its own biases. However, when we know the data is biased, there are ways to debias or to reduce the weighting given to that data.

The first challenge is determining if there is inherent bias in the data. That means conducting some pre-processing. And while it may not be possible to remove all bias from the data, its impact can be minimised by injecting human knowledge.

In some cases, it may also be necessary to limit the number of features in the data. For example, omitting traits such as race or gender can help limit the impact of biased data on the results from a model.

Machine learning models operate within specific contexts. For example, ML models that power recommendation engines for retailers operate at a specific time when customers are looking at certain products. However, customer needs change over time, and that means the ML model can drift away from what it was designed to deliver.

Models can decay for a number of reasons. Drift can occur when new data is introduced to the model. This is called data drift. It can also occur when our interpretation of the data changes. This is concept drift.

To accommodate this drift, you need a model that continuously updates and improves itself using data that comes in. That means you need to keep checking the model.

That requires the collection of features and labels and to react to changes so the model can be updated and retrained. While some aspects of the retraining can be conducted automatically, some human intervention is needed. Its critical to recognise that the deployment of a machine learning tool is not a one-off activity.

Machine learning tools require regular review and update to remain relevant and continue to deliver value.

Creating a model is easy. Building a model can be automatic. However, maintaining and updating the models requires a plan and resources.

Machine learning models are part of a longer pipeline that starts with the features that are used to train the model. Then there is the model itself, which is a piece of software that can require modification and updates. That model requires labels so that the results of an input can be recognised and used by the model. And there may be a disconnect between the model and the final signal in a system.

In many cases when an unexpected outcome is delivered, its not the machine learning that has broken down but some other part of the chain. For example, a recommendation engine may have offered a product to a customer, but sometimes the connection between the sales system and the recommendation could be broken, and it takes time to find the bug. In this case, it would be hard to tell the model if the recommendation was successful. Troubleshooting issues like this can be quite labour intensive.

Machine learning offers significant benefits to businesses. The ability to predict future outcomes to anticipate and influence customer behaviour and to support business operations are substantial. However, ML also brings challenges to businesses. By recognising these challenges and developing strategies to address them, companies can ensure they are prepared and equipped to handle them and get the most out of machine learning technology.

Dr. Shou-De Lin, Chief Machine Learning Scientist, Appier

Original post:
Five practical issues in machine learning and the business implications - ITProPortal

Research Report on Data Encryption Service Market by Current Industry Status, Growth Opportunities, Top Key Players, and Forecast to 2025 -…

Global Data Encryption Service Market Report added by Market Study report scrutinizes the overall market synopsis globally, their restraining factors, drivers, major challenges, opportunities, latest trends to stabilize the global Data Encryption Service industry situation, future developmental plans, and values pertaining to various marketing states. This global Data Encryption Service market report also enables users to make a decision and considering the overall market feasibility. It also offers thorough information on market size, product, key players, various application and major geographical regions.

The Data Encryption Service market report offers an in-depth study of this business sphere which involves key insights pertaining to industry deliverables, particularly market trends, market share, market size, current valuation, and revenue estimations for the forecast period. The summary of the industry also identifies the Data Encryption Service market growth rate during the forecast timeline, spurred by certain catalysts, an idea of which has been explained in this research report, in tandem with the foremost challenges and growth opportunities present in the industry.

Request a sample Report of Data Encryption Service Market at:https://www.marketstudyreport.com/request-a-sample/2563392?utm_source=algosonline.com&utm_medium=SK

Important components highlighted in the Data Encryption Service market report:

Illuminating the regional spectrum of the Data Encryption Service market:

Data Encryption Service Market Segmentation: USA, Europe, Japan, China, India, South East Asia.

Understandings incorporated in the market study have been framed with respect to the industry indicators:

A comprehensive guideline of the Data Encryption Service market with regards to product & application spectrum:

Product landscape:

Product types:

Key understandings contained within the report:

Application landscape:

Application bifurcation:

Particulars highlighted in the report:

Ask for Discount on Data Encryption Service Market Report at:https://www.marketstudyreport.com/check-for-discount/2563392?utm_source=algosonline.com&utm_medium=SK

Other important pointers included in the report:

What does the competitive terrain of the Data Encryption Service market indicate?

Manufacturer base of the industry:

Competitive analysis outlined in the report includes:

In addition to the aforementioned pointers, the Data Encryption Service market study also delivers vital information referring to the industrys concentration ratio, that would likely aid active competitors in defining their business strategy to outdo other prominent players participating in the business sphere.

For More Details On this Report: https://www.marketstudyreport.com/reports/global-data-encryption-service-market-growth-status-and-outlook-2020-2025

Related Reports:

1. Global WiFi Hotspot Software Market Growth (Status and Outlook) 2020-2025Read More: https://www.marketstudyreport.com/reports/global-wifi-hotspot-software-market-growth-status-and-outlook-2020-2025

2. Global Consumer Ratings & Reviews Software Market Growth (Status and Outlook) 2020-2025Read More: https://www.marketstudyreport.com/reports/global-consumer-ratings-reviews-software-market-growth-status-and-outlook-2020-2025

Related Report : https://www.marketwatch.com/press-release/at-1540-cagr-global-low-speed-vehicle-market-size-poised-to-cross-usd-319053-million-by-2025-2020-07-20

Contact Us:Corporate Sales,Market Study Report LLCPhone: 1-302-273-0910Toll Free: 1-866-764-2150 Email: [emailprotected]

Follow this link:
Research Report on Data Encryption Service Market by Current Industry Status, Growth Opportunities, Top Key Players, and Forecast to 2025 -...

Quantum Cryptography Market 2020: Growing Demand, Business Opportunities, Developments, Trends, Top Regions, Types and Applications, Forecasts 2025 -…

The Quantum Cryptography Market report upholds the future market predictions related to Quantum Cryptography market size, revenue, production, Consumption, gross margin, and other substantial factors. It also examines the role of the prominent Quantum Cryptography market players involved in the industry including their corporate overview. While emphasizing the key driving factors for the Quantum Cryptography market, the report also offers a full study of the future trends and developments of the market.

Get sample copy of Quantum Cryptography Market report @ https://www.adroitmarketresearch.com/contacts/request-sample/958

Quantum Cryptography Market boons an in-depth synopsis of the competitive landscape of the market globally, thus helping establishments understand the primary threats and prospects that vendors in the market are dealt with. It also incorporates thorough business profiles of some of the prime vendors in the market. The report includes vast data relating to the recent discovery and technological expansions perceived in the market, wide-ranging with an examination of the impact of these intrusions on the markets future development.

Top Leading Key Players are:

ID Quantique, MagiQ Technologies, Infineon Technologies, QuintenssenceLabs, Crypta Labs, ISARA, Toshiba, Microsoft, IBM, HP, PQ Solutions, and Qubitekk.

Browse the complete report @ https://www.adroitmarketresearch.com/industry-reports/quantum-cryptography-market

This Quantum Cryptography market report provides description about the complete market analysis with inputs from industry experts. Furthermore, businesses can decide upon the strategies about the product, customer, key player, sales, promotion or marketing by acquiring a detailed analysis of competitive markets. The research and analysis performed in this Quantum Cryptography report assists clients to forecast investment in an emerging market, expansion of market share or success of a new product. A comprehensive analysis of the market structure along with the forecast of the various segments and sub-segments of the market have been delivered through this Quantum Cryptography market report.

Based on application, the market has been segmented into:

NA

This crucial research report on Global Quantum Cryptography Market is an in-depth and crucial extensive market presentation presented meticulously to derive optimum understanding on market developments as well as the growth factors, dynamics, in the form of growth drivers, restraints, threats, challenges and the like that have a thumping catalytic impact on onward growth trail of Quantum Cryptography market.

This research documentation built on the basis of in-depth market analysis is aiming at offering report readers with accurate, market specific synopsis of the industry, evaluating it across dynamics and touchpoint analysis, thus shedding ample light on various classifications, industry chain review, dynamic applications, besides harping largely on overall competitive scenario, including leading market players, their growth objectives, long and short term business goals, a thorough evaluation of their tactical business moves, winning business strategies as well as investment details that cohesively influence onward growth trail of the Quantum Cryptography market besides positioning themselves in an advantageous manner in global Quantum Cryptography market.

Global Quantum Cryptography Market Report Provides Comprehensive Analysis of Following:-Market segments and sub-segments Industry size & shares-Market trends and dynamics Market Drivers and Opportunities Supply and demand of world Quantum Cryptography industry Technological inventions in Quantum Cryptography trade-Marketing Channel Development Trend Global Quantum Cryptography industry Positioning Pricing and Brand Strategy Distributors/Traders List enclosed in Positioning Quantum Cryptography Market

For Any Query on the Quantum Cryptography Market: https://www.adroitmarketresearch.com/contacts/enquiry-before-buying/958

About Us :

Adroit Market Research is an India-based business analytics and consulting company. Our target audience is a wide range of corporations, manufacturing companies, product/technology development institutions and industry associations that require understanding of a markets size, key trends, participants and future outlook of an industry. We intend to become our clients knowledge partner and provide them with valuable market insights to help create opportunities that increase their revenues. We follow a code- Explore, Learn and Transform. At our core, we are curious people who love to identify and understand industry patterns, create an insightful study around our findings and churn out money-making roadmaps.

Contact Us :

Ryan JohnsonAccount Manager Global3131 McKinney Ave Ste 600, Dallas,TX 75204, U.S.APhone No.: USA: +1 972-362 -8199 / +91 9665341414

Link:
Quantum Cryptography Market 2020: Growing Demand, Business Opportunities, Developments, Trends, Top Regions, Types and Applications, Forecasts 2025 -...

Cryptocurrency And Blockchain Technology Market size Reap Excessive Revenues size COVID-19 2022 – Kentucky Journal 24

Overview:

Cryptocurrencyis a digital currency that utilizes cryptography techniques to make the transactions secure and to limit the creation of additional units of currency. Cryptocurrency is decentralized and there is no third-party/central body/governing body involved in producing new currency, verifying transactions, and protecting the currency supply. The blockchain acts as a ledger that shows the transaction activities between the peers. Cryptocurrency opts as a future revenue stream in the digital finance world. Furthermore, cryptocurrency is not bound by any rules or regulations of any specific government or exchange rates, interest rates, and country to country transaction fee, which makes international transactions faster. The prime drivers of the cryptocurrency market include proper security, authentication and ease of transactions. The Cryptocurrency and Blockchain technology allows the users to send exactly what they want without involvement of third party.Globally, more than 70% of the mobile phone users prefer transactions over their phones, which is one of the major drivers for the cryptocurrency market growth.

Request for Report Sample:https://www.trendsmarketresearch.com/report/sample/9796

Market Analysis:

The Worldwide Crypto-currency and Blockchain Technology Market is estimated to witness a CAGR of 35.2% during the forecast period 20162022. The crypto-currency market is analyzed based on two segments verticals and regions. The increasing online transaction, less transaction fees, easy and faster transaction, changing consumer and business landscape have led the demand for the market growth.

Regional Analysis:

The regions covered in the report are Americas, Europe, Asia Pacific and Middle East & Africa; along with the analysis of major countries in each region. The Americas is set to be the leading region for the cryptocurrency market growth followed by Europe. The Asia Pacific and MEA are set to be the emerging regions. India is set to be the most attractive destination and in Africa, the popularity and the usage of various cryptocurrencies are expected to increase in the coming years. The MEA market revenue is expected to reach $3.02 billion by 2022. The major countries covered in this report are the US, Canada, Argentina, the UK, Germany, Italy, France, Poland, China, Japan, Singapore, Vietnam, GCC Countries, Africa and Others.

Vertical Analysis:

Day-to-day, the consumers demands are changing and they are looking for the best and less time-consuming services to make their life easier. With these changes, the industry players have started moving towards the online business services and are adopting mobile based technology in their business units to reach their customer demands. In the current market scenario, the rise of online transactions has led the demand for the cryptocurrency and blockchain technology market. The major verticals covered are BFSI, retail, media & entertainment, gaming industry, healthcare, travel & tourism, transportation & logistics and education. Globally, the industry players are showing interest towards the blockchain and crypto-currency acceptance and making a partnership and discussing with value chain players in order to understand the benefits of blockchain technology. Additionally, few of the verticals have already started the acceptance of crypto-currencies (e.g. Bitcoin) as a payment option. Especially, the retail industry is set to be the leading vertical after BFSI for the crypto-currencies acceptance and the retail market revenue is expected to reach $10,447.2 million by 2022.

Key Players:

Zebpay, Coinsecure, Coinbase, Bitstamp Ltd., Litecoin, Poloniex Inc., Bitfury Group Limited, Unocoin, Ripple, Bitfinex, Global Area Holding Inc., BTL Group Ltd., Digital Limited, IBM Corp., Microsoft Corp. and other predominate and niche players.

Competitive Analysis:

In the current market scenario, the crypto-currency and blockchain technology market is at a nascent stage. But, a lot of new players are entering the market as it holds huge business opportunities. Especially, new start-ups are coming with new products/services in the market and they are expecting to see a double-digit growth in the upcoming years. In this space, venture funding in this market is expected to grow and collaborations, merger & acquisition activities are expected to continue.

Benefits:

The report provides complete details about the usage and adoption rate of crypto-currency and blockchain technology in various industry verticals and regions. With that, key stakeholders can know about the major trends, drivers, investments, vertical players initiatives, government initiatives towards the crypto-currency market adoption in the upcoming years. In other end, the report provides details about the major challenges that are going to impact on the market growth. Furthermore, the report gives the complete details about the key business opportunities to key stakeholders to expand their business and capture the revenue in the specific verticals. In addition, each vertical provides the key reason for the crypto-currency adoption, key opportunities, and government bodies information. This will help the key stakeholders to analyze before investing or expanding the business in this market.

More Info of ImpactCovid19@https://www.trendsmarketresearch.com/report/covid-19-analysis/9796

Read more here:
Cryptocurrency And Blockchain Technology Market size Reap Excessive Revenues size COVID-19 2022 - Kentucky Journal 24