Scientists make transparent materials absorb light

A group of physicists from Russia, Sweden and the U.S. has demonstrated a highly unusual optical effect. They managed to “virtually” absorb light using a material that has no light-absorbing capacity. The research findings, published in Optica, break new ground for the creation of memory elements for light.

The absorption of electromagnetic radiation, including light, is one of the main effects of electromagnetism. This process takes place when electromagnetic energy is converted to heat or another kind of energy within an absorbing material (for instance, during electron excitation). Coal, black paint and carbon nanotube arrays—also known as Vantablack—appear black because they absorb the energy of the incident light almost completely. Other materials, such as glass or quartz, have no absorbing properties and therefore look transparent.

In their theoretical research, the results of which were published in the journal Optica, the physicists managed to dispel that simple and intuitive notion by making a completely transparent material appear perfectly absorbing. To achieve that, the researchers employed special mathematical properties of the scattering matrix—a function that relates an incident electromagnetic field with the one scattered by the system. When a light beam of time-independent intensity hits a transparent object, the light is not absorbed, but is scattered by the material—a phenomenon caused by the unitary property of the scattering matrix. It turned out, however, that if the intensity of the incident beam is varied with time in a certain fashion, the unitary property can be disrupted, at least temporarily. In particular, if the intensity growth is exponential, the total incident light energy will accumulate in the transparent material without leaving it (fig. 1). That being the case, the system will appear perfectly absorbent from the outside

Source: Scientists make transparent materials absorb light

AirHelp zet volgende stap in kunstmatige intelligentie

Air Help, het claimbedrijf voor vliegtuigpassagiers, zet kunstmatige intelligentie in om real-time te beslissen of een claim sterk genoeg is om in te dienen. De juridische bot Lara bepaalt of vertragingen en annuleringen conform de Europese regelgeving in aanmerking komen voor een vergoeding.De bot is geprogrammeerd om onder andere de vluchtstatus, luchthavenstatistieken en weerrapporten te beoordelen. Lara is getest op meer dan zesduizend aanvragen. Het zelflerende systeem beoordeelt claims met een accuratesse van 95 procent vergeleken met een menselijke score van 91 procent.

Source: AirHelp zet volgende stap in kunstmatige intelligentie – Emerce

66 Percent of Popular Android Cryptocurrency Apps Don’t Use Encryption

High-Tech Bridge used its free mobile app analysis software, called Mobile X-Ray, to peek under the hood of the top 30 cryptocurrency apps in the Google Play store at three different popularity levels: apps with up to 100,000 downloads, up to 500,000 downloads, and apps with more than 500,000 downloads. So, a total of 90 apps altogether. Of the most popular apps, 94 percent used outdated encryption, 66 percent didn’t use HTTPS to encrypt user information in transit, 44 percent used hard-coded default passwords (stored in plain text in the code), and overall 94 percent of the most popular apps were found to have “at least three medium-risk vulnerabilities.”

Source: 66 Percent of Popular Android Cryptocurrency Apps Don’t Use Encryption – Motherboard

Former DHS employee had 246000 DHS employee records at home to sell. DHS waits 3 months(!) to notify employees.

The sensitive personal information of 246,000 Department of Homeland Security employees was found on the home computer server of a DHS employee in May, according to documents obtained by USA TODAY.

Also discovered on the server was a copy of 159,000 case files from the inspector general’s investigative case management system, which suspects in an ongoing criminal investigation intended to market and sell, according to a report sent by DHS Inspector General John Roth on Nov. 24 to key members of Congress.

The information included names, Social Security numbers and dates of birth, the report said.

The inspector general’s acting chief information security officer reported the breach to DHS officials on May 11, while IG agents reviewed the details.

.Acting DHS Secretary Elaine Duke decided on Aug. 21 to notify affected employees who were employed at the department through the end of 2014 about the breach.

Source: Former DHS employee had sensitive info stashed on home computer s

As Apple fixes macOS root password hole, here’s what went wrong (note: get patching!)

The patch addresses a flaw in its operating system that allows anyone sitting at a Mac to gain administrator access by entering “root” as the username and leaving the password box blank in authentication prompts. This works when altering system settings, logging into the machine, and accessing it remotely via VNC, RDP, screen sharing, and so on. It can also be used to log into system accounts, such as _uucp, and via the command line, which is useful for malware seeking to gain superuser privileges.

If you’re running High Sierra, you’re urged to install the update as soon as possible.

Source: As Apple fixes macOS root password hole, here’s what went wrong • The Register

Coinbase ordered to report 14,355 users to the IRS

A California federal court has ordered Coinbase to turn over identifying records for all users who have bought, sold, sent, or received more than $20,000 through their accounts in a single year between 2013 and 2015. Coinbase estimates that 14,355 users meet the government’s requirements. The full order is embedded below.

For each account, the company has been asked to provide the IRS with the user’s name, birth date, address, and taxpayer ID, along with records of all account activity and any associated account statements. The result is both a definitive link to the user’s identity and a comprehensive record of everything they’ve done with their Coinbase account, including other accounts to which they’ve sent money.

Source: Coinbase ordered to report 14,355 users to the IRS – The Verge

Bacteria found on International Space Station may be alien in origin, says cosmonaut

Bacteria found on the outside of the International Space station could be alien life, according to a cosmonaut who has visited the satellite.

Spacewalkers regularly take samples and materials from the outside of the station when they head outside for what are officially called “extravehicular activity”. Those samples are then taken down to scientists on Earth, who study them to understand the workings of the International Space Station and possibly life in space.

“Bacteria that had not been there during the launch of the ISS module were found on the swabs,” Mr Shkaplerov told TASS. “So they have flown from somewhere in space and settled on the outside hull.”

He made clear that “it seems, there is no danger​”, and that scientists are doing more work to find out what they are.

He said also that similar missions had found bacteria that could survive temperatures between -150 degrees celsius and 150. That bacteria appears to have made its way from Earth – but suggests that it can survive in the harsh environments of space.

Source: Bacteria found on International Space Station may be alien in origin, says cosmonaut | The Independent

Amazon Announces Five New Machine Learning Services and the World’s First Deep Learning-Enabled Video Camera for Developers

AWS Announces Five New Machine Learning Services and the World’s First Deep Learning-Enabled Video Camera for Developers

Amazon SageMaker makes it easy to build, train, and deploy machine learning models

AWS DeepLens is the world’s first deep learning-enabled wireless video camera built to give developers hands-on experience with machine learning

Amazon Transcribe, Amazon Translate, Amazon Comprehend, and Amazon Rekognition Video allow app developers to easily build applications that transcribe speech to text, translate text between languages, extract insights from text, and analyze videos

Source: Amazon – Press Room – RSS Content

Using heart size by scanning using doppler radar as a biometric

Forget fingerprint computer identification or retinal scanning. A University at Buffalo-led team has developed a computer security system using the dimensions of your heart as your identifier.

The system uses low-level Doppler radar to measure your heart, and then continually monitors your heart to make sure no one else has stepped in to run your computer.

Source: Goodbye, login. Hello, heart scan. – University at Buffalo

Empirical evidence on how to interrogate: build rapport, not conflict

The Alisons, husband and wife, have done something no scholars of interrogation have been able to do before. Working in close cooperation with the police, who allowed them access to more than 1,000 hours of tapes, they have observed and analysed hundreds of real-world interviews with terrorists suspected of serious crimes. No researcher in the world has ever laid hands on such a haul of data before. Based on this research, they have constructed the world’s first empirically grounded and comprehensive model of interrogation tactics.

The Alisons’ findings are changing the way law enforcement and security agencies approach the delicate and vital task of gathering human intelligence. “I get very little, if any, pushback from practitioners when I present the Alisons’ work,” said Kleinman, who now teaches interrogation tactics to military and police officers. “Even those who don’t have a clue about the scientific method, it just resonates with them.” The Alisons have done more than strengthen the hand of advocates of non-coercive interviewing: they have provided an unprecedentedly authoritative account of what works and what does not, rooted in a profound understanding of human relations. That they have been able to do so is testament to a joint preoccupation with police interviews that stretches back more than 20 years.
[…]
Each interview had to be minutely analysed according to an intricate taxonomy of interrogation behaviours, developed by the Alisons. Every aspect of the interaction between interviewee and interviewer (or interviewers – sometimes there are two) was classified and scored. They included the counter-interrogation tactics employed by the suspects (complete silence? humming?), the manner in which the interviewer asked questions (confrontational? authoritative? passive?), the demeanour of the interviewee (dominating? disengaged?), and the amount and quality of information yielded. Data was gathered on 150 different variables in all.
[…]
Despite its reputation among elite practitioners, “rapport” has been vaguely defined and poorly understood. It is often conflated with simply being nice – Laurence Alison refers to this, derisively, as the “cappuccinos and hugs” theory. In fact, he observes, interviewers can fail because they are too nice, acquiescing too quickly to the demands of a suspect, or neglecting to pursue a line of purposeful questioning at a vital moment.

The best interviewers are versatile: they know when to be sympathetic, when to be direct and forthright. What they rarely do is impose their will on the interviewee, either overtly, through aggression, or covertly, through the use of “tricks” – techniques of unconscious manipulation, which make the interviewer feel smart but are often seen through by interviewees. Above all, rapport, in the sense used by the Alisons, describes an authentic human connection. “You’ve got to mean it,” is one of Laurence’s refrains.

Source: The scientists persuading terrorists to spill their secrets | News | The Guardian